0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x38, 0x8b, 0x1}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x6, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x39, 0x8b}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x1e, 0x8b, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x39, 0x8b}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b, 0x1}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x1e, 0x8b, 0x1}, 0x20) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x2a, 0x8b, 0x1}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x39, 0x8b}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x2a, 0x8b, 0x1}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x3a, 0x8b, 0x1}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x2a, 0x8b, 0x1}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x3a, 0x8b, 0x1}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x3a, 0x8b, 0x1}, 0x20) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x38, 0x8b}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x1d, 0x8b, 0x1}, 0x20) 10:14:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x1d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x1d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x30, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func_proto]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x29, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x2f, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func_proto]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x29, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x1e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func_proto]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x29, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x1e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x6}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x1e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x30, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x2f, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x3a, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61]}}, &(0x7f0000000280)=""/139, 0x34, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e]}}, &(0x7f0000000280)=""/139, 0x33, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61]}}, &(0x7f0000000280)=""/139, 0x34, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x2}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x30, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/139, 0x3a, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e]}}, &(0x7f0000000280)=""/139, 0x33, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x2f, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x39, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x38, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x30, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x2f, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61]}}, &(0x7f0000000280)=""/139, 0x3c, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x7, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3b, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3a, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x39, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x4, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x38, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61]}}, &(0x7f0000000280)=""/139, 0x34, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0x2}, {0x5}, {}]}, @func_proto, @restrict]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x65, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e]}}, &(0x7f0000000280)=""/139, 0x33, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x6, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {0x6, 0x5}]}, @func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x5e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x0, 0x1}, {0x2}, {}, {0x5}, {}]}, @restrict]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x61, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x67, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x67, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x67, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x67, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x30, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x69, 0x8b, 0x1}, 0x20) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x67, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x2f, 0x8b, 0x1}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x69, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x67, 0x8b, 0x1}, 0x20) 10:14:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b, 0x1}, 0x20) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x5, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto, @restrict={0xd}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x69, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x36, 0x8b}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x6, 0x5}]}, @func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x59, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}, {0x0, 0x5}]}, @func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x61, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x35, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}, {0x0, 0x5}]}, @func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x61, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x5b, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61]}}, &(0x7f0000000280)=""/139, 0x34, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}, {0x0, 0x5}]}, @func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x61, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x5b, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x4f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e]}}, &(0x7f0000000280)=""/139, 0x33, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x1b, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@func_proto]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x2d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x4f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x9, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "0f"}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x1b, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x6, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x32, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x1b, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}, @func_proto]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x5d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x1b, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:28 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x450000, 0x0) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x5, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x31, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x1b, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x51, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x450000, 0x0) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x30, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x1b, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x3, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x2f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x1d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000280)=""/139, 0x0, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x450000, 0x0) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x1d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x55, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x1d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x4f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x9}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x21, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x4f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x4d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x4f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x4d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:28 executing program 5: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x4d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x51, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000280)=""/139, 0x2e, 0x8b}, 0x20) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x4f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x55, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x51, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x4f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x5, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x51, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x55, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x3, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x4f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x9, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x5, 0x2}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x55, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bind$pptp(0xffffffffffffffff, 0x0, 0x0) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x4d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bind$pptp(0xffffffffffffffff, 0x0, 0x0) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x5, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x49, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x4d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: bind$pptp(0xffffffffffffffff, 0x0, 0x0) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x41, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x3, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3}, {0x2}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x47, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x4d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x41, 0x8b, 0x1}, 0x20) 10:14:28 executing program 1: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, 0x0, 0x0) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x41, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x3}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x4d, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 1: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, 0x0, 0x0) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x41, 0x8b, 0x1}, 0x20) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x45, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:28 executing program 1: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, 0x0, 0x0) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x45, 0x8b, 0x1}, 0x20) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x39, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x45, 0x8b, 0x1}, 0x20) 10:14:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x41, 0x8b, 0x1}, 0x20) 10:14:28 executing program 5: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x39, 0x8b, 0x1}, 0x20) 10:14:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 5: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x2, 0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x45, 0x8b, 0x1}, 0x20) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3}, {}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x5, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x39, 0x8b, 0x1}, 0x20) 10:14:29 executing program 1: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 10:14:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:29 executing program 5: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x41, 0x8b, 0x1}, 0x20) 10:14:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 1: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 10:14:29 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x40, 0x8b, 0x1}, 0x20) 10:14:29 executing program 1: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x37, 0x8b, 0x1}, 0x20) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:29 executing program 2: openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x802, 0x0) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x2, 0x400) syz_open_procfs$namespace(0x0, &(0x7f0000000400)='ns/mnt\x00') ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000340)={'syztnl1\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x8000, 0x7800, 0xfffffff8, 0x1000, {{0x27, 0x4, 0x3, 0x13, 0x9c, 0x66, 0x0, 0xe, 0x29, 0x0, @remote, @empty, {[@cipso={0x86, 0x22, 0x3, [{0x0, 0x8, "75c09c2f041c"}, {0x7, 0x10, "c2198355c3517b3d0ddc004d04c6"}, {0x1, 0x4, "8011"}]}, @end, @timestamp={0x44, 0x10, 0xe1, 0x0, 0x1, [0xc41a, 0x9, 0x0]}, @ssrr={0x89, 0x23, 0x71, [@remote, @empty, @multicast2, @multicast2, @empty, @local, @remote, @broadcast]}, @generic={0x83, 0x10, "dc38020f5abb3152334f49205a25"}, @cipso={0x86, 0x17, 0x3, [{0x7, 0xe, "b2c77e4884cb142fb13f42c6"}, {0x2, 0x3, 'K'}]}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000740)={'wg1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x1c, 0x1, &(0x7f0000000380)=@raw=[@ldst={0x2, 0x2, 0x0, 0x9, 0x7, 0x50, 0xffffffffffffffe1}], &(0x7f0000000580)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0x1, '\x00', r2, 0x4, r0, 0x8, &(0x7f0000000600)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x1, 0xffff, 0xfffff1fd}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000680)=[r0]}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f00000003c0)={'gretap0\x00', &(0x7f0000000440)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="000100070000000500000002460e001800640000f005907800000000640101010100000082536eb3cb0e556b0051319f42f6c3db369f07fd73e76906cc5c8764b89dd14e6a841bc7e17d273472a43568bc2d323d5b180055bf07305ced851bb9dc3ea9eff3c7d4e24f9ee028d2445e9bb3207fcdd3912df144a0b7dfa35a413b96126037a4932487378c93fca8bf75a84f8d162076e1fb9dda2ee2eded79a12ebca545ba6da365b4f08eb422ea8a9fe1d3515b54e0de5d56406bb36ace19a8c9a23bf5028f93c86f948470c9b8e572db38721fbf554170e86f775d0bc4ad6545158ac531338a8cef8e0c7755bd99"]}) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, {'syz0\x00', 'syz1\x00', 'syz1\x00', 0x3c, 0x7, 0x1, 0x7, 0x4, 0x8962, "5ab49bd4e429af3d87b08d983cf82372a04d9f83e0b707a3fc7b14706696243982141a7ba0824891794743b76c12f92183183d72cf20136c6d897113"}}, 0x154) 10:14:29 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:29 executing program 1: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3, 0x1}, {0x0, 0x5}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x45, 0x8b, 0x1}, 0x20) 10:14:29 executing program 1: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b, 0x1}, 0x20) 10:14:29 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:29 executing program 2: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000f00", @ANYRES16=r1, @ANYBLOB="000825bd7000fcdbdf25090000000500370000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x40090}, 0x2004c848) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b, 0x1}, 0x20) 10:14:29 executing program 1: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x3, 0x1}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x45, 0x8b, 0x1}, 0x20) 10:14:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) getpeername(r0, &(0x7f0000000000)=@x25, &(0x7f0000000080)=0x80) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), r0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f0000000280)={'ip_vti0\x00', 0x0, 0x700, 0x7800, 0x0, 0x5, {{0x40, 0x4, 0x1, 0x30, 0x100, 0x67, 0x0, 0x82, 0x29, 0x0, @rand_addr=0x64010100, @multicast2, {[@timestamp={0x44, 0xc, 0x65, 0x0, 0x5, [0x2, 0x1]}, @timestamp_prespec={0x44, 0x14, 0x3f, 0x3, 0x1, [{@multicast1, 0x8001}, {@broadcast, 0xffffffc0}]}, @timestamp_addr={0x44, 0xc, 0x69, 0x1, 0x8, [{@multicast2, 0x6}]}, @lsrr={0x83, 0x17, 0xdf, [@rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x37}, @loopback, @multicast2, @local]}, @cipso={0x86, 0x5a, 0x1, [{0x1, 0x11, "30feb99c73cc9b0aab3a476b6fd5f6"}, {0x0, 0x5, "e2a305"}, {0x1, 0x9, "ea58c1c48688cc"}, {0x7, 0xc, "6807cdde22a8f7d41d9f"}, {0x5, 0xe, "606a7ebdc4f7acf719c9d21c"}, {0x0, 0xe, "377101439c36d764c8175798"}, {0x7, 0xa, "85e544ede66c8f14"}, {0x5, 0x3, "f3"}]}, @timestamp_prespec={0x44, 0x44, 0xcd, 0x3, 0x5, [{@broadcast, 0x8}, {@private=0xa010100, 0xba}, {@multicast2, 0x1}, {@dev={0xac, 0x14, 0x14, 0x2d}, 0x7}, {@rand_addr=0x64010102, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xfffe0000}, {@multicast2, 0x7}, {@private=0xa010101, 0x80000000}]}, @generic={0x89, 0xa, "e2b75c45de6a473a"}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000180)={'tunl0\x00', 0x0, 0x7803, 0x700, 0x8, 0x80, {{0x10, 0x4, 0x0, 0x5, 0x40, 0x68, 0x0, 0x19, 0x2f, 0x0, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@noop, @generic={0x86, 0x2}, @end, @end, @timestamp_prespec={0x44, 0x24, 0x18, 0x3, 0x4, [{@private=0xa010102, 0x3}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x9}, {@multicast2, 0x4}, {@private=0x7, 0x9}]}]}}}}}) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x7c, r3, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x101}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x13e}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r4}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r5}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e24}, @WGDEVICE_A_FLAGS={0x8}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0x7c}}, 0x800) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x4, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffeee, 0x10, 0x0, 0x0, 0x0, r1}, 0x80) 10:14:29 executing program 5: r0 = bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r5 = syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000880)={&(0x7f0000000540)=@newlinkprop={0x318, 0x6c, 0x4, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x14801}, [@IFLA_VF_PORTS={0xc0, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "9c67e3836836383ea001baa1f1fa2b29"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8c5ae78e867389d2e12119721fba2ab6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ab87f1be396612286ff9273a170ffb8f"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "618283a93efe139c08a982559c2ad1d5"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x23}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f780fd3ad152f5650e544d97f86b839c"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "80c49c07afef904be20b1c823de01494"}]}]}, @IFLA_AF_SPEC={0x1c8, 0x1a, 0x0, 0x1, [@AF_INET6={0x40, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_TOKEN={0x14, 0x7, @empty}, @IFLA_INET6_TOKEN={0x14, 0x7, @private2}]}, @AF_INET6={0x50, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xb9}]}, @AF_INET={0x40, 0x2, 0x0, 0x1, {0x3c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x7c000000}, {0x8, 0xa, 0x0, 0x0, 0x9}, {0x8, 0xd, 0x0, 0x0, 0x23}, {0x8, 0x21, 0x0, 0x0, 0x7}, {0x8, 0x1a, 0x0, 0x0, 0x6}, {0x8, 0x9, 0x0, 0x0, 0x2}, {0x8, 0x1, 0x0, 0x0, 0x5}]}}, @AF_INET6={0x6c, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_TOKEN={0x14, 0x7, @remote}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}}]}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}, @AF_BRIDGE={0x4}, @AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8, 0xa, 0x0, 0x0, 0x8}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x58, 0x2, 0x0, 0x1, {0x54, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x2}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0xf, 0x0, 0x0, 0x6420}, {0x8, 0xb, 0x0, 0x0, 0x22000000}, {0x8, 0xb, 0x0, 0x0, 0x1}, {0x8, 0xe, 0x0, 0x0, 0x1f}, {0x8, 0x2, 0x0, 0x0, 0x1}, {0x8, 0x21, 0x0, 0x0, 0xf070}, {0x8, 0x17, 0x0, 0x0, 0xffff}, {0x8, 0xb, 0x0, 0x0, 0xa411}]}}]}, @IFLA_PORT_SELF={0x34, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3479555257925f111103ece88cd8c5bc"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "69cae4d13e58523cf9518f770f9a2fd0"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_XDP={0x24, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r0}, @IFLA_XDP_FD={0x8, 0x1, r2}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}]}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}, @IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x4}]}, 0x318}, 0x1, 0x0, 0x0, 0x44}, 0x20000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 1: fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 2: r0 = bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r5 = syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000880)={&(0x7f0000000540)=@newlinkprop={0x318, 0x6c, 0x4, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x14801}, [@IFLA_VF_PORTS={0xc0, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "9c67e3836836383ea001baa1f1fa2b29"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8c5ae78e867389d2e12119721fba2ab6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ab87f1be396612286ff9273a170ffb8f"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "618283a93efe139c08a982559c2ad1d5"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x23}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f780fd3ad152f5650e544d97f86b839c"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "80c49c07afef904be20b1c823de01494"}]}]}, @IFLA_AF_SPEC={0x1c8, 0x1a, 0x0, 0x1, [@AF_INET6={0x40, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_TOKEN={0x14, 0x7, @empty}, @IFLA_INET6_TOKEN={0x14, 0x7, @private2}]}, @AF_INET6={0x50, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xb9}]}, @AF_INET={0x40, 0x2, 0x0, 0x1, {0x3c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x7c000000}, {0x8, 0xa, 0x0, 0x0, 0x9}, {0x8, 0xd, 0x0, 0x0, 0x23}, {0x8, 0x21, 0x0, 0x0, 0x7}, {0x8, 0x1a, 0x0, 0x0, 0x6}, {0x8, 0x9, 0x0, 0x0, 0x2}, {0x8, 0x1, 0x0, 0x0, 0x5}]}}, @AF_INET6={0x6c, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_TOKEN={0x14, 0x7, @remote}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}}]}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}, @AF_BRIDGE={0x4}, @AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8, 0xa, 0x0, 0x0, 0x8}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x58, 0x2, 0x0, 0x1, {0x54, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x2}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0xf, 0x0, 0x0, 0x6420}, {0x8, 0xb, 0x0, 0x0, 0x22000000}, {0x8, 0xb, 0x0, 0x0, 0x1}, {0x8, 0xe, 0x0, 0x0, 0x1f}, {0x8, 0x2, 0x0, 0x0, 0x1}, {0x8, 0x21, 0x0, 0x0, 0xf070}, {0x8, 0x17, 0x0, 0x0, 0xffff}, {0x8, 0xb, 0x0, 0x0, 0xa411}]}}]}, @IFLA_PORT_SELF={0x34, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3479555257925f111103ece88cd8c5bc"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "69cae4d13e58523cf9518f770f9a2fd0"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_XDP={0x24, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r0}, @IFLA_XDP_FD={0x8, 0x1, r2}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}]}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}, @IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x4}]}, 0x318}, 0x1, 0x0, 0x0, 0x44}, 0x20000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:29 executing program 5: r0 = bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r5 = syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000880)={&(0x7f0000000540)=@newlinkprop={0x318, 0x6c, 0x4, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x14801}, [@IFLA_VF_PORTS={0xc0, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "9c67e3836836383ea001baa1f1fa2b29"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8c5ae78e867389d2e12119721fba2ab6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ab87f1be396612286ff9273a170ffb8f"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "618283a93efe139c08a982559c2ad1d5"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x23}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f780fd3ad152f5650e544d97f86b839c"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "80c49c07afef904be20b1c823de01494"}]}]}, @IFLA_AF_SPEC={0x1c8, 0x1a, 0x0, 0x1, [@AF_INET6={0x40, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_TOKEN={0x14, 0x7, @empty}, @IFLA_INET6_TOKEN={0x14, 0x7, @private2}]}, @AF_INET6={0x50, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xb9}]}, @AF_INET={0x40, 0x2, 0x0, 0x1, {0x3c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x7c000000}, {0x8, 0xa, 0x0, 0x0, 0x9}, {0x8, 0xd, 0x0, 0x0, 0x23}, {0x8, 0x21, 0x0, 0x0, 0x7}, {0x8, 0x1a, 0x0, 0x0, 0x6}, {0x8, 0x9, 0x0, 0x0, 0x2}, {0x8, 0x1, 0x0, 0x0, 0x5}]}}, @AF_INET6={0x6c, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_TOKEN={0x14, 0x7, @remote}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}}]}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}, @AF_BRIDGE={0x4}, @AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8, 0xa, 0x0, 0x0, 0x8}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x58, 0x2, 0x0, 0x1, {0x54, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x2}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0xf, 0x0, 0x0, 0x6420}, {0x8, 0xb, 0x0, 0x0, 0x22000000}, {0x8, 0xb, 0x0, 0x0, 0x1}, {0x8, 0xe, 0x0, 0x0, 0x1f}, {0x8, 0x2, 0x0, 0x0, 0x1}, {0x8, 0x21, 0x0, 0x0, 0xf070}, {0x8, 0x17, 0x0, 0x0, 0xffff}, {0x8, 0xb, 0x0, 0x0, 0xa411}]}}]}, @IFLA_PORT_SELF={0x34, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3479555257925f111103ece88cd8c5bc"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "69cae4d13e58523cf9518f770f9a2fd0"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_XDP={0x24, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r0}, @IFLA_XDP_FD={0x8, 0x1, r2}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}]}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}, @IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x4}]}, 0x318}, 0x1, 0x0, 0x0, 0x44}, 0x20000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 1: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x3d, 0x8b, 0x1}, 0x20) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 2: r0 = bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r5 = syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000880)={&(0x7f0000000540)=@newlinkprop={0x318, 0x6c, 0x4, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x14801}, [@IFLA_VF_PORTS={0xc0, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "9c67e3836836383ea001baa1f1fa2b29"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8c5ae78e867389d2e12119721fba2ab6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ab87f1be396612286ff9273a170ffb8f"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "618283a93efe139c08a982559c2ad1d5"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x23}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f780fd3ad152f5650e544d97f86b839c"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "80c49c07afef904be20b1c823de01494"}]}]}, @IFLA_AF_SPEC={0x1c8, 0x1a, 0x0, 0x1, [@AF_INET6={0x40, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_TOKEN={0x14, 0x7, @empty}, @IFLA_INET6_TOKEN={0x14, 0x7, @private2}]}, @AF_INET6={0x50, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xb9}]}, @AF_INET={0x40, 0x2, 0x0, 0x1, {0x3c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x7c000000}, {0x8, 0xa, 0x0, 0x0, 0x9}, {0x8, 0xd, 0x0, 0x0, 0x23}, {0x8, 0x21, 0x0, 0x0, 0x7}, {0x8, 0x1a, 0x0, 0x0, 0x6}, {0x8, 0x9, 0x0, 0x0, 0x2}, {0x8, 0x1, 0x0, 0x0, 0x5}]}}, @AF_INET6={0x6c, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_TOKEN={0x14, 0x7, @remote}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}}]}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}, @AF_BRIDGE={0x4}, @AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8, 0xa, 0x0, 0x0, 0x8}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x58, 0x2, 0x0, 0x1, {0x54, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x2}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0xf, 0x0, 0x0, 0x6420}, {0x8, 0xb, 0x0, 0x0, 0x22000000}, {0x8, 0xb, 0x0, 0x0, 0x1}, {0x8, 0xe, 0x0, 0x0, 0x1f}, {0x8, 0x2, 0x0, 0x0, 0x1}, {0x8, 0x21, 0x0, 0x0, 0xf070}, {0x8, 0x17, 0x0, 0x0, 0xffff}, {0x8, 0xb, 0x0, 0x0, 0xa411}]}}]}, @IFLA_PORT_SELF={0x34, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3479555257925f111103ece88cd8c5bc"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "69cae4d13e58523cf9518f770f9a2fd0"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_XDP={0x24, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r0}, @IFLA_XDP_FD={0x8, 0x1, r2}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}]}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}, @IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x4}]}, 0x318}, 0x1, 0x0, 0x0, 0x44}, 0x20000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 5: r0 = bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r5 = syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000880)={&(0x7f0000000540)=@newlinkprop={0x318, 0x6c, 0x4, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x14801}, [@IFLA_VF_PORTS={0xc0, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "9c67e3836836383ea001baa1f1fa2b29"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8c5ae78e867389d2e12119721fba2ab6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ab87f1be396612286ff9273a170ffb8f"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "618283a93efe139c08a982559c2ad1d5"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x23}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f780fd3ad152f5650e544d97f86b839c"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "80c49c07afef904be20b1c823de01494"}]}]}, @IFLA_AF_SPEC={0x1c8, 0x1a, 0x0, 0x1, [@AF_INET6={0x40, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_TOKEN={0x14, 0x7, @empty}, @IFLA_INET6_TOKEN={0x14, 0x7, @private2}]}, @AF_INET6={0x50, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xb9}]}, @AF_INET={0x40, 0x2, 0x0, 0x1, {0x3c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x7c000000}, {0x8, 0xa, 0x0, 0x0, 0x9}, {0x8, 0xd, 0x0, 0x0, 0x23}, {0x8, 0x21, 0x0, 0x0, 0x7}, {0x8, 0x1a, 0x0, 0x0, 0x6}, {0x8, 0x9, 0x0, 0x0, 0x2}, {0x8, 0x1, 0x0, 0x0, 0x5}]}}, @AF_INET6={0x6c, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_TOKEN={0x14, 0x7, @remote}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}}]}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}, @AF_BRIDGE={0x4}, @AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8, 0xa, 0x0, 0x0, 0x8}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x58, 0x2, 0x0, 0x1, {0x54, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x2}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0xf, 0x0, 0x0, 0x6420}, {0x8, 0xb, 0x0, 0x0, 0x22000000}, {0x8, 0xb, 0x0, 0x0, 0x1}, {0x8, 0xe, 0x0, 0x0, 0x1f}, {0x8, 0x2, 0x0, 0x0, 0x1}, {0x8, 0x21, 0x0, 0x0, 0xf070}, {0x8, 0x17, 0x0, 0x0, 0xffff}, {0x8, 0xb, 0x0, 0x0, 0xa411}]}}]}, @IFLA_PORT_SELF={0x34, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3479555257925f111103ece88cd8c5bc"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "69cae4d13e58523cf9518f770f9a2fd0"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_XDP={0x24, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r0}, @IFLA_XDP_FD={0x8, 0x1, r2}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}]}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}, @IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x4}]}, 0x318}, 0x1, 0x0, 0x0, 0x44}, 0x20000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x0, 0x1}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x45, 0x8b, 0x1}, 0x20) 10:14:29 executing program 1: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x5}, {}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x9, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x45, 0x8b, 0x1}, 0x20) 10:14:29 executing program 3: getpgrp(0x0) bpf$PROG_LOAD(0x3, 0x0, 0x0) 10:14:29 executing program 1: socket$pptp(0x18, 0x1, 0x2) bind$pptp(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x2, {0x1, @loopback}}, 0x1e) 10:14:29 executing program 2: r0 = bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r5 = syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000880)={&(0x7f0000000540)=@newlinkprop={0x318, 0x6c, 0x4, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x14801}, [@IFLA_VF_PORTS={0xc0, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "9c67e3836836383ea001baa1f1fa2b29"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8c5ae78e867389d2e12119721fba2ab6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ab87f1be396612286ff9273a170ffb8f"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "618283a93efe139c08a982559c2ad1d5"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x23}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f780fd3ad152f5650e544d97f86b839c"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "80c49c07afef904be20b1c823de01494"}]}]}, @IFLA_AF_SPEC={0x1c8, 0x1a, 0x0, 0x1, [@AF_INET6={0x40, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_TOKEN={0x14, 0x7, @empty}, @IFLA_INET6_TOKEN={0x14, 0x7, @private2}]}, @AF_INET6={0x50, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xb9}]}, @AF_INET={0x40, 0x2, 0x0, 0x1, {0x3c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x7c000000}, {0x8, 0xa, 0x0, 0x0, 0x9}, {0x8, 0xd, 0x0, 0x0, 0x23}, {0x8, 0x21, 0x0, 0x0, 0x7}, {0x8, 0x1a, 0x0, 0x0, 0x6}, {0x8, 0x9, 0x0, 0x0, 0x2}, {0x8, 0x1, 0x0, 0x0, 0x5}]}}, @AF_INET6={0x6c, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_TOKEN={0x14, 0x7, @remote}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}}]}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}, @AF_BRIDGE={0x4}, @AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8, 0xa, 0x0, 0x0, 0x8}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x58, 0x2, 0x0, 0x1, {0x54, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x2}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0xf, 0x0, 0x0, 0x6420}, {0x8, 0xb, 0x0, 0x0, 0x22000000}, {0x8, 0xb, 0x0, 0x0, 0x1}, {0x8, 0xe, 0x0, 0x0, 0x1f}, {0x8, 0x2, 0x0, 0x0, 0x1}, {0x8, 0x21, 0x0, 0x0, 0xf070}, {0x8, 0x17, 0x0, 0x0, 0xffff}, {0x8, 0xb, 0x0, 0x0, 0xa411}]}}]}, @IFLA_PORT_SELF={0x34, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3479555257925f111103ece88cd8c5bc"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "69cae4d13e58523cf9518f770f9a2fd0"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_XDP={0x24, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r0}, @IFLA_XDP_FD={0x8, 0x1, r2}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r3}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r4}]}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}, @IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x4}]}, 0x318}, 0x1, 0x0, 0x0, 0x44}, 0x20000) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x8, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e, 0x61]}}, &(0x7f0000000280)=""/139, 0x44, 0x8b, 0x1}, 0x20) 10:14:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10000}, 0x4000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 10:14:29 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r1 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000180)={0x0, "4264f29d2558d0d8bf86b9ad76befcd734561a0b9f10ec4a9bb7c71da9334ad738a8d9f9e10be268e491fd5ad3eeddbf747c47d1ff593e47eecacd53cbb7bfb3"}, 0x48, 0xfffffffffffffffd) add_key(&(0x7f0000000280)='pkcs7_test\x00', 0x0, 0x0, 0x0, r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) keyctl$KEYCTL_WATCH_KEY(0x20, r1, r2, 0xa3) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r3, 0x5761, &(0x7f0000000080)={0x1, 0x0, [{0x11e5, 0x401, 0x9, [0xe3, 0x7, 0x400, 0xfffffffb, 0x70da82ec, 0x10000, 0x4, 0x5]}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x8, 0x11, r0, 0x0) bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, r0}, 0x80) 10:14:29 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10000}, 0x4000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e, 0x2e]}}, &(0x7f0000000280)=""/139, 0x43, 0x8b, 0x1}, 0x20) 10:14:29 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10000}, 0x4000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x0) 10:14:29 executing program 4: bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x5, 0x200801) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x3, 0x10000, 0x8, 0xddd1, 0x20, r0, 0x3, '\x00', 0x0, r1, 0x5, 0x2, 0x2}, 0x48) 10:14:29 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, 0x0, 0x0) 10:14:29 executing program 2: r0 = bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000880)={&(0x7f0000000540)=@newlinkprop={0x318, 0x6c, 0x4, 0x70bd2d, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, 0x14801}, [@IFLA_VF_PORTS={0xc0, 0x18, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "9c67e3836836383ea001baa1f1fa2b29"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "8c5ae78e867389d2e12119721fba2ab6"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ab87f1be396612286ff9273a170ffb8f"}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0xff}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "618283a93efe139c08a982559c2ad1d5"}]}, {0x44, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xc, 0x2, 'syztnl1\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x23}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x2}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "f780fd3ad152f5650e544d97f86b839c"}]}, {0x18, 0x1, 0x0, 0x1, [@IFLA_PORT_HOST_UUID={0x14, 0x5, "80c49c07afef904be20b1c823de01494"}]}]}, @IFLA_AF_SPEC={0x1c8, 0x1a, 0x0, 0x1, [@AF_INET6={0x40, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @private1={0xfc, 0x1, '\x00', 0x1}}, @IFLA_INET6_TOKEN={0x14, 0x7, @empty}, @IFLA_INET6_TOKEN={0x14, 0x7, @private2}]}, @AF_INET6={0x50, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_TOKEN={0x14, 0x7, @loopback}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x6}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xb9}]}, @AF_INET={0x40, 0x2, 0x0, 0x1, {0x3c, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x7c000000}, {0x8, 0xa, 0x0, 0x0, 0x9}, {0x8, 0xd, 0x0, 0x0, 0x23}, {0x8, 0x21, 0x0, 0x0, 0x7}, {0x8, 0x1a, 0x0, 0x0, 0x6}, {0x8, 0x9, 0x0, 0x0, 0x2}, {0x8, 0x1, 0x0, 0x0, 0x5}]}}, @AF_INET6={0x6c, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0x2}, @IFLA_INET6_ADDR_GEN_MODE={0x5, 0x8, 0xff}, @IFLA_INET6_TOKEN={0x14, 0x7, @remote}, @IFLA_INET6_TOKEN={0x14, 0x7, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}}, @IFLA_INET6_TOKEN={0x14, 0x7, @dev={0xfe, 0x80, '\x00', 0x3b}}]}, @AF_INET6={0x18, 0xa, 0x0, 0x1, [@IFLA_INET6_TOKEN={0x14, 0x7, @mcast1}]}, @AF_BRIDGE={0x4}, @AF_INET={0x10, 0x2, 0x0, 0x1, {0xc, 0x1, 0x0, 0x1, [{0x8, 0xa, 0x0, 0x0, 0x8}]}}, @AF_BRIDGE={0x4}, @AF_INET={0x58, 0x2, 0x0, 0x1, {0x54, 0x1, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x0, 0x2}, {0x8, 0x1c, 0x0, 0x0, 0x8}, {0x8, 0xf, 0x0, 0x0, 0x6420}, {0x8, 0xb, 0x0, 0x0, 0x22000000}, {0x8, 0xb, 0x0, 0x0, 0x1}, {0x8, 0xe, 0x0, 0x0, 0x1f}, {0x8, 0x2, 0x0, 0x0, 0x1}, {0x8, 0x21, 0x0, 0x0, 0xf070}, {0x8, 0x17, 0x0, 0x0, 0xffff}, {0x8, 0xb, 0x0, 0x0, 0xa411}]}}]}, @IFLA_PORT_SELF={0x34, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3479555257925f111103ece88cd8c5bc"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "69cae4d13e58523cf9518f770f9a2fd0"}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, @IFLA_XDP={0x24, 0x2b, 0x0, 0x1, [@IFLA_XDP_FD={0x8, 0x1, r0}, @IFLA_XDP_FD={0x8, 0x1, r1}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r2}, @IFLA_XDP_EXPECTED_FD={0x8, 0x8, r3}]}, @IFLA_NUM_RX_QUEUES={0x8, 0x20, 0x9}, @IFLA_NET_NS_PID={0x8, 0x13, r4}, @IFLA_TARGET_NETNSID={0x8, 0x2e, 0x4}]}, 0x318}, 0x1, 0x0, 0x0, 0x44}, 0x20000) 10:14:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10000}, 0x4000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x6, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x2e]}}, &(0x7f0000000280)=""/139, 0x42, 0x8b, 0x1}, 0x20) 10:14:29 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 4: r0 = bpf$PROG_LOAD(0x3, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000700)={0x0, 0xbdcd, 0x4, 0x0, 0x194, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000000c0)) getpeername$tipc(r1, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', r3, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 1: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x0, @loopback}}, 0x1e) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000280)=""/139, 0x41, 0x8b, 0x1}, 0x20) 10:14:29 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 10:14:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) r2 = getuid() syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40020, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@measure}]}}, 0x1, 0x9a, &(0x7f0000000180)="f912aff4738cba66cba75047d4c2d00a921e3c64f5e6454680fdcd878dbaf3f755aee2bd483d3ff30eb81bd85731d5352454d2bfdb54c714fb4a09dfba50e2f81bf89392679b4b54895afa375bc0fa5fd58a277523e7272243d745df72d4299663b897753624244888bf48bbeaf3ece296fa6ce63ed224d007dd61a4484a2f446509e8fb300228d8c46de9edb45c578985003cd41b2cf0c995d1") write$binfmt_elf32(r1, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x13, r1, 0xd4faa000) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/139, 0x40, 0x8b, 0x1}, 0x20) 10:14:29 executing program 4: r0 = bpf$PROG_LOAD(0x3, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000700)={0x0, 0xbdcd, 0x4, 0x0, 0x194, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000000c0)) getpeername$tipc(r1, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', r3, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 10:14:29 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/139, 0x3f, 0x8b, 0x1}, 0x20) 10:14:29 executing program 4: r0 = bpf$PROG_LOAD(0x3, 0x0, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000700)={0x0, 0xbdcd, 0x4, 0x0, 0x194, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000000c0)) getpeername$tipc(r1, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r0, 0xe0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000100)=[0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0], 0x0, 0x8, &(0x7f0000000180)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000240)}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r2, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', r3, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) r2 = getuid() syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40020, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@measure}]}}, 0x1, 0x9a, &(0x7f0000000180)="f912aff4738cba66cba75047d4c2d00a921e3c64f5e6454680fdcd878dbaf3f755aee2bd483d3ff30eb81bd85731d5352454d2bfdb54c714fb4a09dfba50e2f81bf89392679b4b54895afa375bc0fa5fd58a277523e7272243d745df72d4299663b897753624244888bf48bbeaf3ece296fa6ce63ed224d007dd61a4484a2f446509e8fb300228d8c46de9edb45c578985003cd41b2cf0c995d1") write$binfmt_elf32(r1, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x13, r1, 0xd4faa000) 10:14:29 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 10:14:29 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000700)={0x0, 0xbdcd, 0x4, 0x0, 0x194, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000000c0)) getpeername$tipc(r0, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b, 0x1}, 0x20) 10:14:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) r2 = getuid() syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40020, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@measure}]}}, 0x1, 0x9a, &(0x7f0000000180)="f912aff4738cba66cba75047d4c2d00a921e3c64f5e6454680fdcd878dbaf3f755aee2bd483d3ff30eb81bd85731d5352454d2bfdb54c714fb4a09dfba50e2f81bf89392679b4b54895afa375bc0fa5fd58a277523e7272243d745df72d4299663b897753624244888bf48bbeaf3ece296fa6ce63ed224d007dd61a4484a2f446509e8fb300228d8c46de9edb45c578985003cd41b2cf0c995d1") write$binfmt_elf32(r1, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x8, 0x13, r1, 0xd4faa000) 10:14:29 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000700)={0x0, 0xbdcd, 0x4, 0x0, 0x194, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000000c0)) getpeername$tipc(r0, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:29 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:14:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) r2 = getuid() syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40020, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@measure}]}}, 0x1, 0x9a, &(0x7f0000000180)="f912aff4738cba66cba75047d4c2d00a921e3c64f5e6454680fdcd878dbaf3f755aee2bd483d3ff30eb81bd85731d5352454d2bfdb54c714fb4a09dfba50e2f81bf89392679b4b54895afa375bc0fa5fd58a277523e7272243d745df72d4299663b897753624244888bf48bbeaf3ece296fa6ce63ed224d007dd61a4484a2f446509e8fb300228d8c46de9edb45c578985003cd41b2cf0c995d1") write$binfmt_elf32(r1, 0x0, 0x0) 10:14:29 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000700)={0x0, 0xbdcd, 0x4, 0x0, 0x194, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000000c0)) getpeername$tipc(r0, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:29 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000700)={0x0, 0xbdcd, 0x4, 0x0, 0x194, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000000c0)) getpeername$tipc(r0, &(0x7f0000000000)=@id, &(0x7f0000000040)=0x10) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}}, 0x0, 0x3e, 0x0, 0x1}, 0x20) 10:14:29 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x2, 0x0) 10:14:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) r2 = getuid() syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40020, &(0x7f00000000c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {}, 0x2c, {[{@allow_other}, {}], [{@fowner_eq={'fowner', 0x3d, r2}}, {@measure}]}}, 0x1, 0x9a, &(0x7f0000000180)="f912aff4738cba66cba75047d4c2d00a921e3c64f5e6454680fdcd878dbaf3f755aee2bd483d3ff30eb81bd85731d5352454d2bfdb54c714fb4a09dfba50e2f81bf89392679b4b54895afa375bc0fa5fd58a277523e7272243d745df72d4299663b897753624244888bf48bbeaf3ece296fa6ce63ed224d007dd61a4484a2f446509e8fb300228d8c46de9edb45c578985003cd41b2cf0c995d1") 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4657, &(0x7f0000000700)={0x0, 0xbdcd, 0x4, 0x0, 0x194, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000000c0)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:29 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 10:14:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) getuid() 10:14:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:29 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:29 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:30 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:30 executing program 3: bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x7, [@const={0x4, 0x0, 0x0, 0xa, 0x1}, @volatile={0xc}, @typedef={0xb, 0x0, 0x0, 0x8, 0x5}, @func={0x10, 0x0, 0x0, 0xc, 0x1}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x7}]}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x63, 0x1000, 0x1}, 0x20) 10:14:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) 10:14:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}, {0x0, 0x5}]}]}}, &(0x7f0000000280)=""/139, 0x3e, 0x8b}, 0x20) 10:14:30 executing program 3: bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x7, [@const={0x4, 0x0, 0x0, 0xa, 0x1}, @volatile={0xc}, @typedef={0xb, 0x0, 0x0, 0x8, 0x5}, @func={0x10, 0x0, 0x0, 0xc, 0x1}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x7}]}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x63, 0x1000, 0x1}, 0x20) 10:14:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 10:14:30 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:30 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:30 executing program 3: bpf$PROG_LOAD(0x2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x7, [@const={0x4, 0x0, 0x0, 0xa, 0x1}, @volatile={0xc}, @typedef={0xb, 0x0, 0x0, 0x8, 0x5}, @func={0x10, 0x0, 0x0, 0xc, 0x1}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x7}]}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x63, 0x1000, 0x1}, 0x20) 10:14:30 executing program 1: ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 10:14:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:30 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000280)={0x4, 0x41, &(0x7f0000000180)="5cc1f1616989861ce07cc0a15c5619dfb5a49fb8104c27c64126f0087196c90f6063357d4414a735c7fac412439ef7179805cf2e9065718642395f054c7f69b4c0"}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x904028}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x800) 10:14:30 executing program 1: ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x7, [@const={0x4, 0x0, 0x0, 0xa, 0x1}, @volatile={0xc}, @typedef={0xb, 0x0, 0x0, 0x8, 0x5}, @func={0x10, 0x0, 0x0, 0xc, 0x1}, @enum={0x2, 0x1, 0x0, 0x6, 0x4, [{0x3, 0x7}]}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x63, 0x1000, 0x1}, 0x20) 10:14:30 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000280)={0x4, 0x41, &(0x7f0000000180)="5cc1f1616989861ce07cc0a15c5619dfb5a49fb8104c27c64126f0087196c90f6063357d4414a735c7fac412439ef7179805cf2e9065718642395f054c7f69b4c0"}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x904028}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x800) 10:14:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:30 executing program 1: ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 10:14:30 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000280)={0x4, 0x41, &(0x7f0000000180)="5cc1f1616989861ce07cc0a15c5619dfb5a49fb8104c27c64126f0087196c90f6063357d4414a735c7fac412439ef7179805cf2e9065718642395f054c7f69b4c0"}) sendmsg$MPTCP_PM_CMD_SET_LIMITS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x904028}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r1, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x80}, 0x800) 10:14:30 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:30 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 10:14:30 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000280)={0x4, 0x41, &(0x7f0000000180)="5cc1f1616989861ce07cc0a15c5619dfb5a49fb8104c27c64126f0087196c90f6063357d4414a735c7fac412439ef7179805cf2e9065718642395f054c7f69b4c0"}) 10:14:30 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:30 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 10:14:30 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', &(0x7f00000003c0)={'tunl0\x00', 0x0, 0x7800, 0x40, 0x8, 0x2, {{0xa, 0x4, 0x3, 0x4, 0x28, 0x65, 0x0, 0x5, 0x4, 0x0, @local, @empty, {[@lsrr={0x83, 0x13, 0x81, [@private=0xa010101, @multicast1, @private=0xa010102, @private=0xa010102]}]}}}}}) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:30 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) 10:14:30 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 10:14:30 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) 10:14:30 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:30 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) 10:14:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 10:14:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:30 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) 10:14:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, 0x0) 10:14:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 10:14:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000440)={'syztnl2\x00', 0x0}) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:30 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:30 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) socket$inet_udplite(0x2, 0x2, 0x88) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:30 executing program 1: bpf$PROG_LOAD(0x9, 0x0, 0x300) 10:14:30 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8, 0x40, 0x6, 0x3, {{0x6, 0x4, 0x3, 0x14, 0x18, 0x66, 0x0, 0x6, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x11}, {[@end]}}}}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r2, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000024c0)=0x9) r3 = openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) ioctl$BTRFS_IOC_ADD_DEV(r2, 0x5000940a, &(0x7f0000001380)={{r3}, "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"}) 10:14:30 executing program 0: bpf$PROG_LOAD(0x3, &(0x7f0000000200)={0x12, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, 0x0, 0x47, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x7, [@const={0x4, 0x0, 0x0, 0xa, 0x1}, @volatile={0xc}, @typedef={0xb, 0x0, 0x0, 0x8, 0x5}, @func={0x10, 0x0, 0x0, 0xc, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x4f, 0x1000, 0x1}, 0x20) 10:14:30 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:30 executing program 0: socketpair(0x27, 0x2, 0x8e, &(0x7f0000000140)) 10:14:30 executing program 1: bpf$PROG_LOAD(0x9, 0x0, 0x300) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x7, [@const={0x4, 0x0, 0x0, 0xa, 0x1}, @volatile={0xc}, @typedef={0xb, 0x0, 0x0, 0x8, 0x5}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x43, 0x1000, 0x1}, 0x20) 10:14:30 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8, 0x40, 0x6, 0x3, {{0x6, 0x4, 0x3, 0x14, 0x18, 0x66, 0x0, 0x6, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x11}, {[@end]}}}}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r2, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000024c0)=0x9) r3 = openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) ioctl$BTRFS_IOC_ADD_DEV(r2, 0x5000940a, &(0x7f0000001380)={{r3}, "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"}) 10:14:30 executing program 1: bpf$PROG_LOAD(0x9, 0x0, 0x300) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x7, [@const={0x4, 0x0, 0x0, 0xa, 0x1}, @volatile={0xc}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x37, 0x1000, 0x1}, 0x20) 10:14:30 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:30 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8, 0x40, 0x6, 0x3, {{0x6, 0x4, 0x3, 0x14, 0x18, 0x66, 0x0, 0x6, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x11}, {[@end]}}}}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r2, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000024c0)=0x9) r3 = openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) ioctl$BTRFS_IOC_ADD_DEV(r2, 0x5000940a, &(0x7f0000001380)={{r3}, "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"}) 10:14:30 executing program 0: socketpair(0x0, 0x2, 0x8e, &(0x7f0000000140)) 10:14:30 executing program 1: socketpair(0x3, 0x80000, 0xffff6ed0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f00000001c0)={'erspan0\x00', 0x0, 0x7800, 0x8000, 0x7ff, 0xffff, {{0x29, 0x4, 0x2, 0x6, 0xa4, 0x66, 0x0, 0xff, 0x2f, 0x0, @broadcast, @remote, {[@cipso={0x86, 0x54, 0xffffffffffffffff, [{0x7, 0xd, "5ad2d0d28d6948e482562f"}, {0x6, 0x7, "8c64ad4124"}, {0x1, 0x9, "2911cfd7d78af3"}, {0x0, 0x8, "703ef1a7de14"}, {0x6, 0xb, "d5b62c65d57bc1a005"}, {0x6, 0x3, "be"}, {0x6, 0x8, "7ade3a35df7e"}, {0x7, 0x6, "5706c5d3"}, {0x0, 0xd, "20b8a2f5cb82b1e9563ee5"}]}, @cipso={0x86, 0x1e, 0x1, [{0x5, 0x6, "aec5a15a"}, {0x7, 0x12, "4910c115fe3240570277b8539c8a318f"}]}, @timestamp={0x44, 0x14, 0x7f, 0x0, 0x2, [0x20, 0x80000001, 0xd3c, 0x200]}, @generic={0x44, 0xa, "43476b53dc378132"}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r2, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x400}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80000000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x11}, 0x4000000) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x4, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:30 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'gretap0\x00', 0x0, 0x10, 0x10, 0x9, 0x5, {{0x2b, 0x4, 0x0, 0x4, 0xac, 0x65, 0x0, 0x5, 0x29, 0x0, @empty, @local, {[@end, @cipso={0x86, 0x4a, 0x3, [{0x0, 0xa, "49da10e5823ee27f"}, {0x6, 0xb, "75fb4ddda8e2c7f567"}, {0x0, 0x3, "c3"}, {0x2, 0xe, "cb70080559ba726e205946d9"}, {0x6, 0x6, "6db76f27"}, {0x1, 0xc, "9b21caf10d2ee95c8905"}, {0x1, 0xc, "1c65afe531d23940248e"}]}, @rr={0x7, 0x27, 0x28, [@remote, @remote, @empty, @empty, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @broadcast]}, @noop, @timestamp={0x44, 0x8, 0x5f, 0x0, 0x9, [0x1]}, @rr={0x7, 0x1b, 0x16, [@local, @dev={0xac, 0x14, 0x14, 0x2f}, @broadcast, @empty, @rand_addr=0x64010102, @private=0xa010101]}]}}}}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:30 executing program 1: socketpair(0x3, 0x80000, 0xffff6ed0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f00000001c0)={'erspan0\x00', 0x0, 0x7800, 0x8000, 0x7ff, 0xffff, {{0x29, 0x4, 0x2, 0x6, 0xa4, 0x66, 0x0, 0xff, 0x2f, 0x0, @broadcast, @remote, {[@cipso={0x86, 0x54, 0xffffffffffffffff, [{0x7, 0xd, "5ad2d0d28d6948e482562f"}, {0x6, 0x7, "8c64ad4124"}, {0x1, 0x9, "2911cfd7d78af3"}, {0x0, 0x8, "703ef1a7de14"}, {0x6, 0xb, "d5b62c65d57bc1a005"}, {0x6, 0x3, "be"}, {0x6, 0x8, "7ade3a35df7e"}, {0x7, 0x6, "5706c5d3"}, {0x0, 0xd, "20b8a2f5cb82b1e9563ee5"}]}, @cipso={0x86, 0x1e, 0x1, [{0x5, 0x6, "aec5a15a"}, {0x7, 0x12, "4910c115fe3240570277b8539c8a318f"}]}, @timestamp={0x44, 0x14, 0x7f, 0x0, 0x2, [0x20, 0x80000001, 0xd3c, 0x200]}, @generic={0x44, 0xa, "43476b53dc378132"}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r2, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x400}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80000000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x11}, 0x4000000) 10:14:30 executing program 0: socketpair(0x0, 0x2, 0x8e, &(0x7f0000000140)) 10:14:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:30 executing program 0: socketpair(0x0, 0x2, 0x8e, &(0x7f0000000140)) 10:14:30 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8, 0x40, 0x6, 0x3, {{0x6, 0x4, 0x3, 0x14, 0x18, 0x66, 0x0, 0x6, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x11}, {[@end]}}}}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r2, 0x0, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f00000024c0)=0x9) openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:30 executing program 1: socketpair(0x3, 0x80000, 0xffff6ed0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f00000001c0)={'erspan0\x00', 0x0, 0x7800, 0x8000, 0x7ff, 0xffff, {{0x29, 0x4, 0x2, 0x6, 0xa4, 0x66, 0x0, 0xff, 0x2f, 0x0, @broadcast, @remote, {[@cipso={0x86, 0x54, 0xffffffffffffffff, [{0x7, 0xd, "5ad2d0d28d6948e482562f"}, {0x6, 0x7, "8c64ad4124"}, {0x1, 0x9, "2911cfd7d78af3"}, {0x0, 0x8, "703ef1a7de14"}, {0x6, 0xb, "d5b62c65d57bc1a005"}, {0x6, 0x3, "be"}, {0x6, 0x8, "7ade3a35df7e"}, {0x7, 0x6, "5706c5d3"}, {0x0, 0xd, "20b8a2f5cb82b1e9563ee5"}]}, @cipso={0x86, 0x1e, 0x1, [{0x5, 0x6, "aec5a15a"}, {0x7, 0x12, "4910c115fe3240570277b8539c8a318f"}]}, @timestamp={0x44, 0x14, 0x7f, 0x0, 0x2, [0x20, 0x80000001, 0xd3c, 0x200]}, @generic={0x44, 0xa, "43476b53dc378132"}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r2, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x400}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x80000000}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5, 0x38, 0x1}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x11}, 0x4000000) 10:14:31 executing program 2: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8, 0x40, 0x6, 0x3, {{0x6, 0x4, 0x3, 0x14, 0x18, 0x66, 0x0, 0x6, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x11}, {[@end]}}}}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r2, 0x0, 0x0) openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 0: socketpair(0x27, 0x0, 0x8e, &(0x7f0000000140)) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:31 executing program 1: socketpair(0x3, 0x80000, 0xffff6ed0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip_vti0\x00', &(0x7f00000001c0)={'erspan0\x00', 0x0, 0x7800, 0x8000, 0x7ff, 0xffff, {{0x29, 0x4, 0x2, 0x6, 0xa4, 0x66, 0x0, 0xff, 0x2f, 0x0, @broadcast, @remote, {[@cipso={0x86, 0x54, 0xffffffffffffffff, [{0x7, 0xd, "5ad2d0d28d6948e482562f"}, {0x6, 0x7, "8c64ad4124"}, {0x1, 0x9, "2911cfd7d78af3"}, {0x0, 0x8, "703ef1a7de14"}, {0x6, 0xb, "d5b62c65d57bc1a005"}, {0x6, 0x3, "be"}, {0x6, 0x8, "7ade3a35df7e"}, {0x7, 0x6, "5706c5d3"}, {0x0, 0xd, "20b8a2f5cb82b1e9563ee5"}]}, @cipso={0x86, 0x1e, 0x1, [{0x5, 0x6, "aec5a15a"}, {0x7, 0x12, "4910c115fe3240570277b8539c8a318f"}]}, @timestamp={0x44, 0x14, 0x7f, 0x0, 0x2, [0x20, 0x80000001, 0xd3c, 0x200]}, @generic={0x44, 0xa, "43476b53dc378132"}]}}}}}) 10:14:31 executing program 5: bpf$PROG_LOAD(0x9, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:31 executing program 1: socketpair(0x3, 0x80000, 0xffff6ed0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x20, 0x70bd2c, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) 10:14:31 executing program 0: socketpair(0x27, 0x0, 0x0, &(0x7f0000000140)) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8, 0x40, 0x6, 0x3, {{0x6, 0x4, 0x3, 0x14, 0x18, 0x66, 0x0, 0x6, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x11}, {[@end]}}}}}) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 0: socketpair(0x27, 0x0, 0x0, 0x0) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:31 executing program 2: syz_clone(0x80100000, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:31 executing program 1: socketpair(0x3, 0x80000, 0xffff6ed0, &(0x7f0000000000)) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'gretap0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x8, 0x40, 0x6, 0x3, {{0x6, 0x4, 0x3, 0x14, 0x18, 0x66, 0x0, 0x6, 0x29, 0x0, @multicast2, @dev={0xac, 0x14, 0x14, 0x11}, {[@end]}}}}}) openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:31 executing program 0: socketpair(0x27, 0x0, 0x0, 0x0) 10:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r1, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 0: socketpair(0x27, 0x0, 0x0, 0x0) 10:14:31 executing program 1: socketpair(0x3, 0x80000, 0xffff6ed0, &(0x7f0000000000)) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x4}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:31 executing program 2: syz_clone(0x0, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:31 executing program 1: socketpair(0x0, 0x80000, 0xffff6ed0, &(0x7f0000000000)) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@const={0x4}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30]}}, &(0x7f0000000280)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 10:14:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:31 executing program 1: socketpair(0x0, 0x80000, 0xffff6ed0, &(0x7f0000000000)) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 1: socketpair(0x0, 0x80000, 0xffff6ed0, &(0x7f0000000000)) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:31 executing program 2: syz_clone(0x0, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:31 executing program 1: socketpair(0x3, 0x0, 0xffff6ed0, &(0x7f0000000000)) 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001280)={r0, 0x20, &(0x7f0000001240)={&(0x7f0000000180)=""/4096, 0x1000, 0x0, &(0x7f0000001180)=""/188, 0xbc}}, 0x10) openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:31 executing program 1: socketpair(0x3, 0x0, 0x0, &(0x7f0000000000)) 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000002380)=""/237) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:31 executing program 2: syz_clone(0x0, &(0x7f0000000380)="d66f127f4d9dd97353cb2f7467c87c1c604b99fcd48ec679daa80896f95583ff08508996cefd73891e12b9af02475afd0025bb368fc81a45ff18890159963f1e622ce164272a6a2637562506aed32b148f8191967cbcd0d0e963d2e9497144c35ad038242521a68b7de033edb0a98f87b1a27a3f1eb3b1c998d2960208683f5c06f1bc9cd184b2fabdcdabb2f91d29", 0x8f, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000012c0)=ANY=[@ANYBLOB="9feb2a00180000000000000010000000100040006ed512121e4df7477bfa030000000a0000000000000e0200000000000000005f004afae668496f3d927a075dc42555041bb624e385677cb7df77323cdc40a0321a6b466b66460a8ed0ed11149d555172ce4c0b3886aebe62f417a4cc59c2767cc0e134fc5e5eace06156efb733e434768d73f5b303042b0e7a9e5ec0975f8b8dbb6234aa710fea62c6bf1aed9220d213577290323ed9aca4356eaf"], &(0x7f0000000100)=""/45, 0x2b, 0x2d}, 0x20) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:31 executing program 1: socketpair(0x3, 0x0, 0x0, 0x0) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x2e, 0x5f, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'gretap0\x00', &(0x7f0000000280)={'syztnl1\x00', 0x0, 0x20, 0x1, 0x0, 0x42f1, {{0x29, 0x4, 0x2, 0x3, 0xa4, 0x68, 0x0, 0x4, 0x4, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}, {[@ssrr={0x89, 0x23, 0xbf, [@private=0xa010102, @private=0xa010100, @dev={0xac, 0x14, 0x14, 0x2d}, @rand_addr=0x64010100, @remote, @private=0xa010101, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @timestamp_addr={0x44, 0x14, 0xd0, 0x1, 0x2, [{@remote, 0x7ff}, {@private=0xa010100, 0x1ff}]}, @timestamp_prespec={0x44, 0x1c, 0x85, 0x3, 0x8, [{@remote, 0x1}, {@remote, 0x7}, {@empty, 0x6}]}, @timestamp_addr={0x44, 0x3c, 0xb4, 0x1, 0x8, [{@private=0xa010102, 0x8}, {@broadcast, 0x72}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@local, 0x48000000}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x6}, {@multicast2, 0x1}]}, @end]}}}}}) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:31 executing program 1: socketpair(0x3, 0x0, 0x0, 0x0) 10:14:31 executing program 4: bpf$PROG_LOAD(0x3, 0x0, 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:31 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 1: socketpair(0x3, 0x0, 0x0, 0x0) 10:14:31 executing program 2: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:31 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:31 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:31 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 2: syz_clone(0x80100000, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x2e, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:31 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, 0x0) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:32 executing program 2: syz_clone(0x80100000, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000140)={'gretap0\x00', 0x0}) 10:14:32 executing program 4: openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f00000000c0)='.log\x00', 0x200000, 0x7a) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30]}}, &(0x7f0000000280)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 10:14:32 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, 0x0, 0x200000, 0x7a) 10:14:32 executing program 5: syz_clone(0x80100000, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 2: syz_clone(0x80100000, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: syz_clone(0x80100000, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, 0x0, 0x200000, 0x7a) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}, {0x0, [0x2e]}}, &(0x7f0000000280)=""/4096, 0x27, 0x1000, 0x1}, 0x20) 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:32 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, 0x0, 0x200000, 0x7a) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: syz_clone(0x80100000, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:32 executing program 2: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x0, 0x7a) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x0, 0x7a) 10:14:32 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 10:14:32 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x0, 0x7a) 10:14:32 executing program 2: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000}, 0x20) 10:14:32 executing program 4: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) openat$incfs(r0, &(0x7f00000000c0)='.log\x00', 0x200000, 0x0) 10:14:32 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000440), &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:32 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000}, 0x20) 10:14:32 executing program 5: syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:32 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 2: socketpair(0x0, 0x2, 0x8e, &(0x7f0000000140)) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:32 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8001, 0x0) 10:14:32 executing program 5: syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:32 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x44, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6d07e6e6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8840}, 0x200000c1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) read$rfkill(0xffffffffffffffff, &(0x7f0000000600), 0x8) 10:14:32 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x2b, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x44, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6d07e6e6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8840}, 0x200000c1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) read$rfkill(0xffffffffffffffff, &(0x7f0000000600), 0x8) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 2: bpf$PROG_LOAD(0x1b, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 10:14:32 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8001, 0x0) 10:14:32 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x44, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6d07e6e6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8840}, 0x200000c1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) read$rfkill(0xffffffffffffffff, &(0x7f0000000600), 0x8) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 4: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 4: syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x2e, 0x5f, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x44, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6d07e6e6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8840}, 0x200000c1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) 10:14:32 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:32 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x8001, 0x0) 10:14:32 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f0000000740)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x44, r2, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6d07e6e6}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x8840}, 0x200000c1) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) 10:14:32 executing program 4: syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:32 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) syz_genetlink_get_family_id$batadv(&(0x7f0000000640), 0xffffffffffffffff) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:32 executing program 4: syz_clone(0x80100000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)="f7568dfc8bb12f0057d383fae0580174d51ab02a6d77152c50d2a1696781981cbd01235124ec5a2797baac92264e3b9a4c8c921e594aed3ef367298f653560486c2bddcf6c2f1158a4d523a85ad3a8a81c34dc238eb2b486fef856f71ef62b1f25b59a9d777fce05022bc4190afd624ceda4b9d1e3593d8f13c549608ab184026a75f18b1aa1d4f97a84082f6d51b43d06f1e0c1f6b8c53c575ede56522ecf0ac2ebdea55f4815096ac27e766c88") 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x2e, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:32 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x2e, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:33 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:33 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) 10:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:33 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:33 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, 0xffffffffffffffff, 0x3a0cd000) 10:14:33 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, 0xffffffffffffffff, 0x3a0cd000) 10:14:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:33 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x2e, 0x5f, 0x5f, 0x30, 0x2e]}}, &(0x7f0000000280)=""/4096, 0x1f, 0x1000, 0x1}, 0x20) 10:14:33 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (fail_nth: 1) [ 1679.599896][ T1028] FAULT_INJECTION: forcing a failure. [ 1679.599896][ T1028] name failslab, interval 1, probability 0, space 0, times 0 [ 1679.614579][ T1028] CPU: 0 PID: 1028 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1679.624561][ T1028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1679.634455][ T1028] Call Trace: [ 1679.637581][ T1028] [ 1679.640355][ T1028] dump_stack_lvl+0x151/0x1b7 [ 1679.644869][ T1028] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1679.650164][ T1028] ? do_handle_mm_fault+0x142f/0x2370 [ 1679.655371][ T1028] dump_stack+0x15/0x17 [ 1679.659363][ T1028] should_fail+0x3c0/0x510 [ 1679.663615][ T1028] __should_failslab+0x9f/0xe0 [ 1679.668213][ T1028] should_failslab+0x9/0x20 [ 1679.672555][ T1028] kmem_cache_alloc+0x4f/0x2f0 [ 1679.677162][ T1028] ? dup_task_struct+0x53/0xa60 [ 1679.681840][ T1028] ? __kasan_check_write+0x14/0x20 [ 1679.686788][ T1028] dup_task_struct+0x53/0xa60 [ 1679.691301][ T1028] ? __kasan_check_write+0x14/0x20 [ 1679.696245][ T1028] copy_process+0x579/0x3250 [ 1679.700676][ T1028] ? __kasan_check_write+0x14/0x20 [ 1679.705636][ T1028] ? proc_fail_nth_write+0x213/0x290 [ 1679.710741][ T1028] ? proc_fail_nth_read+0x220/0x220 [ 1679.715779][ T1028] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1679.720722][ T1028] ? vfs_write+0x9af/0x1050 [ 1679.725062][ T1028] ? vmacache_update+0xb7/0x120 [ 1679.729749][ T1028] kernel_clone+0x22d/0x990 [ 1679.734087][ T1028] ? file_end_write+0x1b0/0x1b0 [ 1679.738774][ T1028] ? __kasan_check_write+0x14/0x20 [ 1679.743723][ T1028] ? create_io_thread+0x1e0/0x1e0 [ 1679.748583][ T1028] ? __mutex_lock_slowpath+0x10/0x10 [ 1679.753703][ T1028] __x64_sys_clone+0x289/0x310 [ 1679.758324][ T1028] ? __do_sys_vfork+0x130/0x130 [ 1679.762990][ T1028] ? debug_smp_processor_id+0x17/0x20 [ 1679.768203][ T1028] do_syscall_64+0x44/0xd0 [ 1679.772450][ T1028] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1679.778179][ T1028] RIP: 0033:0x7f8c95eb80d9 [ 1679.782433][ T1028] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1679.801874][ T1028] RSP: 002b:00007f8c94c2b118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1679.810141][ T1028] RAX: ffffffffffffffda RBX: 00007f8c95fd7f80 RCX: 00007f8c95eb80d9 [ 1679.817931][ T1028] RDX: 00000000200001c0 RSI: 0000000000000000 RDI: 0000000080100000 [ 1679.825739][ T1028] RBP: 00007f8c94c2b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1679.833553][ T1028] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1679.841362][ T1028] R13: 00007ffff186277f R14: 00007f8c94c2b300 R15: 0000000000022000 10:14:33 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const={0x4}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) 10:14:33 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000280)=[{}, {}], 0x10, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, 0xffffffffffffffff, 0x3a0cd000) 10:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@const]}, {0x0, [0x2e, 0x5f, 0x5f, 0x30]}}, &(0x7f0000000280)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) 10:14:33 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (fail_nth: 1) 10:14:33 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0080008000000fff000001ff4789009c0064000004299078ac14dcb9bf89d463fa1f44be14bbac1414aa94040100831b69ac14143d640101017f000001ffffffff0a01010264010100440ce7a3e000000200000005070f1b843b24dcdb3e1ce3d19c96d001443c5643ac1414aa5af84e188b7dcb2c0000000364010102000000096401010200000040ac1414bb00000002000000000000000100000000000010a694040100440c09"]}) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) 10:14:33 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (fail_nth: 2) 10:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const]}, {0x0, [0x2e, 0x5f, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1679.849208][ T1028] 10:14:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 10:14:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 10:14:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@const]}, {0x0, [0x2e, 0x5f]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) [ 1679.892361][ T1044] FAULT_INJECTION: forcing a failure. [ 1679.892361][ T1044] name failslab, interval 1, probability 0, space 0, times 0 [ 1679.934127][ T1052] FAULT_INJECTION: forcing a failure. [ 1679.934127][ T1052] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1679.938492][ T1044] CPU: 0 PID: 1044 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1679.957003][ T1044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1679.966852][ T1044] Call Trace: [ 1679.969982][ T1044] [ 1679.972750][ T1044] dump_stack_lvl+0x151/0x1b7 [ 1679.977267][ T1044] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1679.982560][ T1044] ? __kasan_slab_alloc+0xc4/0xe0 [ 1679.987421][ T1044] ? kmem_cache_alloc+0x189/0x2f0 [ 1679.992281][ T1044] dump_stack+0x15/0x17 [ 1679.996271][ T1044] should_fail+0x3c0/0x510 [ 1680.000526][ T1044] ? __get_vm_area_node+0x13a/0x380 [ 1680.005558][ T1044] __should_failslab+0x9f/0xe0 [ 1680.010159][ T1044] should_failslab+0x9/0x20 [ 1680.014497][ T1044] kmem_cache_alloc_trace+0x4a/0x310 [ 1680.019619][ T1044] __get_vm_area_node+0x13a/0x380 [ 1680.024480][ T1044] __vmalloc_node_range+0xda/0x800 [ 1680.029431][ T1044] ? copy_process+0x579/0x3250 [ 1680.034031][ T1044] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1680.038888][ T1044] ? dup_task_struct+0x53/0xa60 [ 1680.043572][ T1044] dup_task_struct+0x61f/0xa60 [ 1680.048173][ T1044] ? copy_process+0x579/0x3250 [ 1680.052774][ T1044] ? __kasan_check_write+0x14/0x20 [ 1680.057719][ T1044] copy_process+0x579/0x3250 [ 1680.062148][ T1044] ? __kasan_check_write+0x14/0x20 [ 1680.067095][ T1044] ? proc_fail_nth_write+0x213/0x290 [ 1680.072214][ T1044] ? proc_fail_nth_read+0x220/0x220 [ 1680.077249][ T1044] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1680.082197][ T1044] ? vfs_write+0x9af/0x1050 [ 1680.086539][ T1044] ? vmacache_update+0xb7/0x120 [ 1680.091224][ T1044] kernel_clone+0x22d/0x990 [ 1680.095561][ T1044] ? file_end_write+0x1b0/0x1b0 [ 1680.100247][ T1044] ? __kasan_check_write+0x14/0x20 [ 1680.105197][ T1044] ? create_io_thread+0x1e0/0x1e0 [ 1680.110056][ T1044] ? __mutex_lock_slowpath+0x10/0x10 [ 1680.115180][ T1044] __x64_sys_clone+0x289/0x310 [ 1680.119777][ T1044] ? __do_sys_vfork+0x130/0x130 [ 1680.124468][ T1044] ? debug_smp_processor_id+0x17/0x20 [ 1680.129680][ T1044] do_syscall_64+0x44/0xd0 [ 1680.133921][ T1044] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1680.139651][ T1044] RIP: 0033:0x7f8c95eb80d9 [ 1680.143906][ T1044] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1680.163348][ T1044] RSP: 002b:00007f8c94c2b118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1680.171595][ T1044] RAX: ffffffffffffffda RBX: 00007f8c95fd7f80 RCX: 00007f8c95eb80d9 [ 1680.179401][ T1044] RDX: 00000000200001c0 RSI: 0000000000000000 RDI: 0000000080100000 [ 1680.187215][ T1044] RBP: 00007f8c94c2b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.195024][ T1044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1680.202922][ T1044] R13: 00007ffff186277f R14: 00007f8c94c2b300 R15: 0000000000022000 [ 1680.210738][ T1044] [ 1680.213603][ T1052] CPU: 1 PID: 1052 Comm: syz-executor.2 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1680.223581][ T1052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1680.233473][ T1052] Call Trace: [ 1680.236597][ T1052] [ 1680.239370][ T1052] dump_stack_lvl+0x151/0x1b7 [ 1680.243885][ T1052] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1680.249181][ T1052] dump_stack+0x15/0x17 [ 1680.253178][ T1052] should_fail+0x3c0/0x510 [ 1680.257422][ T1052] should_fail_usercopy+0x1a/0x20 [ 1680.262282][ T1052] _copy_from_user+0x20/0xd0 [ 1680.266711][ T1052] __sys_bpf+0x1f6/0x750 [ 1680.271223][ T1052] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1680.276519][ T1052] ? debug_smp_processor_id+0x17/0x20 [ 1680.281728][ T1052] __x64_sys_bpf+0x7c/0x90 [ 1680.285978][ T1052] do_syscall_64+0x44/0xd0 [ 1680.290229][ T1052] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1680.295958][ T1052] RIP: 0033:0x7f94657f30d9 [ 1680.300211][ T1052] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1680.319651][ T1052] RSP: 002b:00007f9464566168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1680.327897][ T1052] RAX: ffffffffffffffda RBX: 00007f9465912f80 RCX: 00007f94657f30d9 [ 1680.335707][ T1052] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000009 [ 1680.343522][ T1052] RBP: 00007f94645661d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.351328][ T1052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1680.359141][ T1052] R13: 00007fff1ee68b5f R14: 00007f9464566300 R15: 0000000000022000 [ 1680.366955][ T1052] [ 1680.443359][ T1044] syz-executor.4: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 1680.462748][ T1044] CPU: 0 PID: 1044 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1680.472727][ T1044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1680.482733][ T1044] Call Trace: [ 1680.485833][ T1044] [ 1680.488612][ T1044] dump_stack_lvl+0x151/0x1b7 [ 1680.493125][ T1044] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1680.498418][ T1044] ? pr_cont_kernfs_name+0xe6/0x100 [ 1680.503455][ T1044] dump_stack+0x15/0x17 [ 1680.507443][ T1044] warn_alloc+0x242/0x3d0 [ 1680.511612][ T1044] ? zone_watermark_ok_safe+0x280/0x280 [ 1680.516990][ T1044] ? __get_vm_area_node+0x36a/0x380 [ 1680.522027][ T1044] __vmalloc_node_range+0x2be/0x800 [ 1680.527067][ T1044] ? dup_task_struct+0x53/0xa60 [ 1680.531749][ T1044] dup_task_struct+0x61f/0xa60 [ 1680.536346][ T1044] ? copy_process+0x579/0x3250 [ 1680.540947][ T1044] ? __kasan_check_write+0x14/0x20 [ 1680.545894][ T1044] copy_process+0x579/0x3250 [ 1680.550323][ T1044] ? __kasan_check_write+0x14/0x20 [ 1680.555267][ T1044] ? proc_fail_nth_write+0x213/0x290 [ 1680.560387][ T1044] ? proc_fail_nth_read+0x220/0x220 [ 1680.565421][ T1044] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1680.570395][ T1044] ? vfs_write+0x9af/0x1050 [ 1680.574714][ T1044] ? vmacache_update+0xb7/0x120 [ 1680.579397][ T1044] kernel_clone+0x22d/0x990 [ 1680.583734][ T1044] ? file_end_write+0x1b0/0x1b0 [ 1680.588421][ T1044] ? __kasan_check_write+0x14/0x20 [ 1680.593371][ T1044] ? create_io_thread+0x1e0/0x1e0 [ 1680.598231][ T1044] ? __mutex_lock_slowpath+0x10/0x10 [ 1680.603350][ T1044] __x64_sys_clone+0x289/0x310 [ 1680.607949][ T1044] ? __do_sys_vfork+0x130/0x130 [ 1680.612638][ T1044] ? debug_smp_processor_id+0x17/0x20 [ 1680.617845][ T1044] do_syscall_64+0x44/0xd0 [ 1680.622096][ T1044] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1680.627826][ T1044] RIP: 0033:0x7f8c95eb80d9 [ 1680.632076][ T1044] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1680.651518][ T1044] RSP: 002b:00007f8c94c2b118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1680.659766][ T1044] RAX: ffffffffffffffda RBX: 00007f8c95fd7f80 RCX: 00007f8c95eb80d9 [ 1680.667573][ T1044] RDX: 00000000200001c0 RSI: 0000000000000000 RDI: 0000000080100000 [ 1680.675386][ T1044] RBP: 00007f8c94c2b1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1680.683197][ T1044] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 10:14:34 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:34 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="01002bbd7000ffdbdf2511000000e900029c04000400040004002600010080004100000000000000000008000200b8000000"], 0x38}, 0x1, 0x0, 0x0, 0x24000080}, 0x4004090) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r1, 0x3a0cd000) 10:14:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 10:14:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@const]}, {0x0, [0x2e]}}, &(0x7f0000000280)=""/4096, 0x27, 0x1000, 0x1}, 0x20) [ 1680.691006][ T1044] R13: 00007ffff186277f R14: 00007f8c94c2b300 R15: 0000000000022000 [ 1680.698822][ T1044] [ 1680.743968][ T1044] Mem-Info: [ 1680.747026][ T1044] active_anon:15475 inactive_anon:14580 isolated_anon:0 [ 1680.747026][ T1044] active_file:6545 inactive_file:65947 isolated_file:0 [ 1680.747026][ T1044] unevictable:0 dirty:32898 writeback:1176 [ 1680.747026][ T1044] slab_reclaimable:16076 slab_unreclaimable:71129 [ 1680.747026][ T1044] mapped:30818 shmem:15532 pagetables:711 bounce:0 [ 1680.747026][ T1044] kernel_misc_reclaimable:0 [ 1680.747026][ T1044] free:1481627 free_pcp:16021 free_cma:0 [ 1680.790775][ T1044] Node 0 active_anon:61900kB inactive_anon:58320kB active_file:26180kB inactive_file:258888kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:122272kB dirty:128392kB writeback:5204kB shmem:62128kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5312kB pagetables:2844kB all_unreclaimable? no [ 1680.822170][ T1044] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982424kB mlocked:0kB bounce:0kB free_pcp:5700kB local_pcp:56kB free_cma:0kB [ 1680.849386][ T1044] lowmem_reserve[]: 0 3941 3941 [ 1680.854137][ T1044] Normal free:2949532kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:61916kB inactive_anon:58152kB active_file:26180kB inactive_file:252800kB unevictable:0kB writepending:131556kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:70692kB local_pcp:23564kB free_cma:0kB [ 1680.883520][ T1044] lowmem_reserve[]: 0 0 0 10:14:34 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000, 0x1}, 0x20) [ 1680.887689][ T1044] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 1680.903015][ T1044] Normal: 3*4kB (UME) 1166*8kB (UE) 4242*16kB (UME) 4090*32kB (UME) 2801*64kB (UME) 1217*128kB (UME) 294*256kB (UME) 49*512kB (UME) 20*1024kB (UM) 6*2048kB (UE) 555*4096kB (UM) = 2949532kB [ 1680.921544][ T1044] 83538 total pagecache pages [ 1680.929015][ T1044] 0 pages in swap cache [ 1680.934342][ T1044] Swap cache stats: add 0, delete 0, find 0/0 [ 1680.940229][ T1044] Free swap = 0kB 10:14:34 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000}, 0x20) 10:14:34 executing program 5: syz_genetlink_get_family_id$tipc2(&(0x7f0000000500), 0xffffffffffffffff) r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:34 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000}, 0x20) 10:14:34 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x13bac5c7, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) [ 1680.944177][ T1044] Total swap = 0kB [ 1680.947705][ T1044] 2097051 pages RAM [ 1680.951347][ T1044] 0 pages HighMem/MovableOnly [ 1680.955907][ T1044] 342483 pages reserved [ 1680.959858][ T1044] 0 pages cma reserved 10:14:34 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x13bac5c7, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000}, 0x20) 10:14:34 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x4) 10:14:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:34 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x13bac5c7, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:34 executing program 4: syz_clone(0x80100002, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 1) 10:14:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) [ 1681.082688][ T1096] FAULT_INJECTION: forcing a failure. [ 1681.082688][ T1096] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1681.107512][ T1096] CPU: 0 PID: 1096 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1681.117509][ T1096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1681.127402][ T1096] Call Trace: [ 1681.130527][ T1096] [ 1681.133305][ T1096] dump_stack_lvl+0x151/0x1b7 [ 1681.137818][ T1096] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1681.143116][ T1096] dump_stack+0x15/0x17 [ 1681.147111][ T1096] should_fail+0x3c0/0x510 [ 1681.151355][ T1096] should_fail_usercopy+0x1a/0x20 [ 1681.156219][ T1096] _copy_from_user+0x20/0xd0 [ 1681.160642][ T1096] __sys_bpf+0x1f6/0x750 [ 1681.164734][ T1096] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1681.169931][ T1096] ? debug_smp_processor_id+0x17/0x20 [ 1681.175137][ T1096] __x64_sys_bpf+0x7c/0x90 [ 1681.179390][ T1096] do_syscall_64+0x44/0xd0 [ 1681.183646][ T1096] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1681.189368][ T1096] RIP: 0033:0x7fb4513de0d9 [ 1681.193639][ T1096] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1681.213068][ T1096] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1681.221311][ T1096] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 10:14:34 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:34 executing program 4: syz_clone(0x80100007, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:34 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x13bac5c7, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:34 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:34 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) [ 1681.229120][ T1096] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1681.236932][ T1096] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.244740][ T1096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1681.252560][ T1096] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1681.260372][ T1096] 10:14:34 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x7ffffffff000) 10:14:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 2) 10:14:34 executing program 3: r0 = bpf$PROG_LOAD(0x6, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, r0, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:34 executing program 4: syz_clone(0x80100008, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:34 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:34 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:34 executing program 4: syz_clone(0x80100009, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 1681.355668][ T1122] FAULT_INJECTION: forcing a failure. [ 1681.355668][ T1122] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.374559][ T1122] CPU: 1 PID: 1122 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1681.384546][ T1122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1681.394439][ T1122] Call Trace: [ 1681.397560][ T1122] [ 1681.400347][ T1122] dump_stack_lvl+0x151/0x1b7 10:14:34 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:34 executing program 4: syz_clone(0x80100010, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 1681.404864][ T1122] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1681.410144][ T1122] ? cred_has_capability+0x2ca/0x420 [ 1681.415354][ T1122] dump_stack+0x15/0x17 [ 1681.419349][ T1122] should_fail+0x3c0/0x510 [ 1681.423599][ T1122] ? btf_new_fd+0x11b/0x900 [ 1681.427937][ T1122] __should_failslab+0x9f/0xe0 [ 1681.432542][ T1122] should_failslab+0x9/0x20 [ 1681.436879][ T1122] kmem_cache_alloc_trace+0x4a/0x310 [ 1681.441999][ T1122] btf_new_fd+0x11b/0x900 [ 1681.446338][ T1122] bpf_btf_load+0x6f/0x90 [ 1681.450506][ T1122] __sys_bpf+0x514/0x750 10:14:34 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffef0) [ 1681.454587][ T1122] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1681.459797][ T1122] ? debug_smp_processor_id+0x17/0x20 [ 1681.464999][ T1122] __x64_sys_bpf+0x7c/0x90 [ 1681.469251][ T1122] do_syscall_64+0x44/0xd0 [ 1681.473508][ T1122] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1681.479230][ T1122] RIP: 0033:0x7fb4513de0d9 [ 1681.483484][ T1122] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:14:35 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:35 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:35 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8010, r0, 0x3a0cd000) [ 1681.502926][ T1122] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1681.511173][ T1122] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1681.518981][ T1122] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1681.526794][ T1122] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.534689][ T1122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1681.542501][ T1122] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1681.550315][ T1122] 10:14:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 3) 10:14:35 executing program 4: syz_clone(0x80100011, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffef0) bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffef0) (async) 10:14:35 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:35 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x3a0cd000) 10:14:35 executing program 4: syz_clone(0x8010038a, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 1681.596720][ T1151] FAULT_INJECTION: forcing a failure. [ 1681.596720][ T1151] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.626991][ T1151] CPU: 1 PID: 1151 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1681.637065][ T1151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1681.647056][ T1151] Call Trace: [ 1681.650181][ T1151] [ 1681.652956][ T1151] dump_stack_lvl+0x151/0x1b7 [ 1681.657469][ T1151] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1681.662765][ T1151] dump_stack+0x15/0x17 [ 1681.666756][ T1151] should_fail+0x3c0/0x510 [ 1681.671012][ T1151] ? btf_new_fd+0x28f/0x900 [ 1681.675350][ T1151] __should_failslab+0x9f/0xe0 [ 1681.679948][ T1151] should_failslab+0x9/0x20 [ 1681.684294][ T1151] kmem_cache_alloc_trace+0x4a/0x310 [ 1681.689500][ T1151] ? btf_new_fd+0x11b/0x900 10:14:35 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) [ 1681.693837][ T1151] btf_new_fd+0x28f/0x900 [ 1681.698096][ T1151] bpf_btf_load+0x6f/0x90 [ 1681.702344][ T1151] __sys_bpf+0x514/0x750 [ 1681.706420][ T1151] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1681.711631][ T1151] ? debug_smp_processor_id+0x17/0x20 [ 1681.716836][ T1151] __x64_sys_bpf+0x7c/0x90 [ 1681.721086][ T1151] do_syscall_64+0x44/0xd0 [ 1681.725346][ T1151] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1681.731067][ T1151] RIP: 0033:0x7fb4513de0d9 [ 1681.735332][ T1151] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1681.754783][ T1151] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1681.763113][ T1151] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1681.770921][ T1151] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1681.778732][ T1151] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1681.786545][ T1151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 10:14:35 executing program 4: syz_clone(0x80100700, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 5: syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x3a0cd000) 10:14:35 executing program 3: io_setup(0x0, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:35 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffef0) bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffef0) (async) 10:14:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 4) 10:14:35 executing program 0: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, 0xffffffffffffffff, 0x3a0cd000) 10:14:35 executing program 5: syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x3a0cd000) 10:14:35 executing program 4: syz_clone(0x80100900, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 1681.794355][ T1151] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1681.802169][ T1151] 10:14:35 executing program 0: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, 0xffffffffffffffff, 0x3a0cd000) 10:14:35 executing program 4: syz_clone(0x80101100, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 5: syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x3a0cd000) 10:14:35 executing program 3: io_setup(0x0, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:35 executing program 0: mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, 0xffffffffffffffff, 0x3a0cd000) 10:14:35 executing program 3: io_setup(0x0, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) [ 1681.863402][ T1173] FAULT_INJECTION: forcing a failure. [ 1681.863402][ T1173] name failslab, interval 1, probability 0, space 0, times 0 [ 1681.915072][ T1173] CPU: 0 PID: 1173 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1681.925063][ T1173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1681.934957][ T1173] Call Trace: [ 1681.938079][ T1173] [ 1681.940855][ T1173] dump_stack_lvl+0x151/0x1b7 [ 1681.945368][ T1173] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1681.950668][ T1173] dump_stack+0x15/0x17 [ 1681.954655][ T1173] should_fail+0x3c0/0x510 [ 1681.958925][ T1173] ? kvmalloc_node+0x82/0x130 [ 1681.963420][ T1173] __should_failslab+0x9f/0xe0 [ 1681.968020][ T1173] should_failslab+0x9/0x20 [ 1681.972359][ T1173] __kmalloc+0x6d/0x350 [ 1681.976353][ T1173] ? __kasan_kmalloc+0x9/0x10 [ 1681.980867][ T1173] kvmalloc_node+0x82/0x130 [ 1681.985551][ T1173] btf_new_fd+0x2cb/0x900 [ 1681.989730][ T1173] bpf_btf_load+0x6f/0x90 [ 1681.993886][ T1173] __sys_bpf+0x514/0x750 [ 1681.997964][ T1173] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1682.003260][ T1173] ? debug_smp_processor_id+0x17/0x20 [ 1682.008464][ T1173] __x64_sys_bpf+0x7c/0x90 [ 1682.012719][ T1173] do_syscall_64+0x44/0xd0 [ 1682.017058][ T1173] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1682.022958][ T1173] RIP: 0033:0x7fb4513de0d9 [ 1682.027216][ T1173] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1682.046655][ T1173] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1682.054905][ T1173] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 10:14:35 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffced) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @generic={0x60, 0x4, 0x9, 0x9, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xf, &(0x7f0000000100)=""/15, 0x41100, 0x2c, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x7, 0xffffffff, 0x3}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000200)=[r2, 0xffffffffffffffff, r0]}, 0x80) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x8000000) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r3, 0xf503, 0x0) 10:14:35 executing program 4: syz_clone(0x80101f00, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 5) 10:14:35 executing program 3: io_setup(0x3, 0x0) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:35 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x280000) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 10:14:35 executing program 4: syz_clone(0x80102000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:35 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffced) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @generic={0x60, 0x4, 0x9, 0x9, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xf, &(0x7f0000000100)=""/15, 0x41100, 0x2c, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x7, 0xffffffff, 0x3}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000200)=[r2, 0xffffffffffffffff, r0]}, 0x80) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x8000000) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r3, 0xf503, 0x0) bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffced) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @generic={0x60, 0x4, 0x9, 0x9, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xf, &(0x7f0000000100)=""/15, 0x41100, 0x2c, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x7, 0xffffffff, 0x3}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000200)=[r2, 0xffffffffffffffff, r0]}, 0x80) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) (async) syz_open_dev$char_usb(0xc, 0xb4, 0x0) (async) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x8000000) (async) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r3, 0xf503, 0x0) (async) [ 1682.062713][ T1173] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1682.070523][ T1173] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.078421][ T1173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1682.086234][ T1173] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1682.094048][ T1173] 10:14:35 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) 10:14:35 executing program 3: io_setup(0x3, 0x0) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:35 executing program 4: syz_clone(0x80108a03, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 5: syz_clone(0x80102000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 3: io_setup(0x3, 0x0) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:35 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2, 0x8010, r0, 0x3a0cd000) [ 1682.195337][ T1218] FAULT_INJECTION: forcing a failure. [ 1682.195337][ T1218] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1682.219115][ T1218] CPU: 1 PID: 1218 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1682.229103][ T1218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1682.239003][ T1218] Call Trace: [ 1682.242117][ T1218] [ 1682.244896][ T1218] dump_stack_lvl+0x151/0x1b7 [ 1682.249413][ T1218] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1682.254706][ T1218] dump_stack+0x15/0x17 [ 1682.258695][ T1218] should_fail+0x3c0/0x510 [ 1682.262947][ T1218] should_fail_usercopy+0x1a/0x20 [ 1682.267809][ T1218] _copy_from_user+0x20/0xd0 [ 1682.272235][ T1218] btf_new_fd+0x35b/0x900 [ 1682.276408][ T1218] bpf_btf_load+0x6f/0x90 [ 1682.280569][ T1218] __sys_bpf+0x514/0x750 [ 1682.284648][ T1218] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1682.289858][ T1218] ? debug_smp_processor_id+0x17/0x20 [ 1682.295063][ T1218] __x64_sys_bpf+0x7c/0x90 [ 1682.299314][ T1218] do_syscall_64+0x44/0xd0 [ 1682.303568][ T1218] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1682.309294][ T1218] RIP: 0033:0x7fb4513de0d9 [ 1682.313550][ T1218] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1682.332991][ T1218] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 10:14:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 6) 10:14:35 executing program 5: syz_clone(0x80102000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:35 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x8010, r0, 0x3a0cd000) 10:14:35 executing program 4: syz_clone(0x80100000, 0x0, 0x2, &(0x7f00000001c0), 0x0, 0x0) [ 1682.341234][ T1218] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1682.349052][ T1218] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1682.356857][ T1218] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.364669][ T1218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1682.372573][ T1218] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1682.380383][ T1218] 10:14:35 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x3a0cd000) 10:14:35 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffced) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x200, 0x0) (async, rerun: 64) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (rerun: 64) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async, rerun: 64) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x16, 0xc, &(0x7f0000000040)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x1}, @generic={0x60, 0x4, 0x9, 0x9, 0x4}, @map_idx={0x18, 0x0, 0x5, 0x0, 0xd}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @exit, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f00000000c0)='syzkaller\x00', 0x6, 0xf, &(0x7f0000000100)=""/15, 0x41100, 0x2c, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0x7, 0xffffffff, 0x3}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000200)=[r2, 0xffffffffffffffff, r0]}, 0x80) (async, rerun: 64) r4 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) (async) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0x8000000) (async) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r3, 0xf503, 0x0) 10:14:35 executing program 4: syz_clone(0x80100000, 0x0, 0x7, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 5: syz_clone(0x80102000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:35 executing program 0: syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x3a0cd000) 10:14:35 executing program 4: syz_clone(0x80100000, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x0) [ 1682.425049][ T1241] FAULT_INJECTION: forcing a failure. [ 1682.425049][ T1241] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1682.453797][ T1241] CPU: 1 PID: 1241 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1682.463780][ T1241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 10:14:35 executing program 0: syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x3a0cd000) [ 1682.473777][ T1241] Call Trace: [ 1682.476893][ T1241] [ 1682.479686][ T1241] dump_stack_lvl+0x151/0x1b7 [ 1682.484183][ T1241] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1682.489481][ T1241] dump_stack+0x15/0x17 [ 1682.493470][ T1241] should_fail+0x3c0/0x510 [ 1682.497723][ T1241] should_fail_usercopy+0x1a/0x20 [ 1682.502595][ T1241] _copy_to_user+0x20/0x90 [ 1682.506836][ T1241] bpf_verifier_vlog+0x1a1/0x330 [ 1682.511615][ T1241] __btf_verifier_log+0xd1/0x120 [ 1682.516383][ T1241] ? btf_parse_hdr+0x2c7/0x7e0 [ 1682.520983][ T1241] ? btf_check_sec_info+0x500/0x500 [ 1682.526017][ T1241] ? btf_parse_hdr+0x1e9/0x7e0 [ 1682.530615][ T1241] ? memcpy+0x56/0x70 [ 1682.534434][ T1241] btf_parse_hdr+0x31d/0x7e0 [ 1682.538862][ T1241] btf_new_fd+0x3e8/0x900 [ 1682.543096][ T1241] bpf_btf_load+0x6f/0x90 [ 1682.547192][ T1241] __sys_bpf+0x514/0x750 [ 1682.551272][ T1241] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1682.556492][ T1241] ? debug_smp_processor_id+0x17/0x20 [ 1682.561696][ T1241] __x64_sys_bpf+0x7c/0x90 [ 1682.565940][ T1241] do_syscall_64+0x44/0xd0 [ 1682.570196][ T1241] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1682.575923][ T1241] RIP: 0033:0x7fb4513de0d9 [ 1682.580179][ T1241] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1682.599616][ T1241] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1682.607864][ T1241] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1682.615674][ T1241] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 10:14:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 7) 10:14:36 executing program 0: syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x3a0cd000) 10:14:36 executing program 4: syz_clone(0x80100000, 0x0, 0x9, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 5: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) [ 1682.623486][ T1241] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.631403][ T1241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1682.639217][ T1241] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1682.647029][ T1241] [ 1682.701086][ T1278] FAULT_INJECTION: forcing a failure. [ 1682.701086][ T1278] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1682.726904][ T1278] CPU: 1 PID: 1278 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1682.736889][ T1278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1682.746787][ T1278] Call Trace: [ 1682.749918][ T1278] [ 1682.752691][ T1278] dump_stack_lvl+0x151/0x1b7 [ 1682.757206][ T1278] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1682.762497][ T1278] dump_stack+0x15/0x17 [ 1682.766490][ T1278] should_fail+0x3c0/0x510 [ 1682.770747][ T1278] should_fail_usercopy+0x1a/0x20 [ 1682.775608][ T1278] _copy_to_user+0x20/0x90 [ 1682.779851][ T1278] bpf_verifier_vlog+0x1a1/0x330 [ 1682.784636][ T1278] __btf_verifier_log+0xd1/0x120 [ 1682.789411][ T1278] ? bpf_verifier_vlog+0x1ae/0x330 [ 1682.794349][ T1278] ? btf_check_sec_info+0x500/0x500 [ 1682.799387][ T1278] ? btf_parse_hdr+0x1e9/0x7e0 [ 1682.803983][ T1278] ? memcpy+0x56/0x70 [ 1682.807802][ T1278] btf_parse_hdr+0x349/0x7e0 [ 1682.812225][ T1278] btf_new_fd+0x3e8/0x900 [ 1682.816387][ T1278] bpf_btf_load+0x6f/0x90 [ 1682.820551][ T1278] __sys_bpf+0x514/0x750 [ 1682.824636][ T1278] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1682.829839][ T1278] ? debug_smp_processor_id+0x17/0x20 [ 1682.835047][ T1278] __x64_sys_bpf+0x7c/0x90 [ 1682.839299][ T1278] do_syscall_64+0x44/0xd0 [ 1682.843551][ T1278] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1682.849282][ T1278] RIP: 0033:0x7fb4513de0d9 [ 1682.853534][ T1278] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1682.872975][ T1278] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1682.881220][ T1278] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1682.889115][ T1278] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 10:14:36 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x208000, 0x8) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f00000000c0)='autogroup\x00') r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000040)={'\x00', 0x7, 0x3, 0x1}) 10:14:36 executing program 5: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 0: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) 10:14:36 executing program 4: syz_clone(0x80100000, 0x0, 0x10, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 8) 10:14:36 executing program 5: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 4: syz_clone(0x80100000, 0x0, 0x11, &(0x7f00000001c0), 0x0, 0x0) [ 1682.896928][ T1278] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1682.904742][ T1278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1682.912552][ T1278] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1682.920364][ T1278] 10:14:36 executing program 0: syz_clone(0x80101100, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x0) (async) r0 = open(&(0x7f0000000000)='./file0\x00', 0x208000, 0x8) (async) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f00000000c0)='autogroup\x00') (async) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') (async) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000040)={'\x00', 0x7, 0x3, 0x1}) 10:14:36 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) [ 1682.964300][ T1316] FAULT_INJECTION: forcing a failure. [ 1682.964300][ T1316] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1682.989637][ T1316] CPU: 0 PID: 1316 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1682.999629][ T1316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1683.009523][ T1316] Call Trace: [ 1683.012645][ T1316] [ 1683.015423][ T1316] dump_stack_lvl+0x151/0x1b7 [ 1683.019938][ T1316] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1683.025231][ T1316] dump_stack+0x15/0x17 [ 1683.029223][ T1316] should_fail+0x3c0/0x510 [ 1683.033475][ T1316] should_fail_usercopy+0x1a/0x20 [ 1683.038358][ T1316] _copy_to_user+0x20/0x90 [ 1683.042589][ T1316] bpf_verifier_vlog+0x1a1/0x330 [ 1683.047365][ T1316] __btf_verifier_log+0xd1/0x120 [ 1683.052138][ T1316] ? bpf_verifier_vlog+0x1ae/0x330 [ 1683.057081][ T1316] ? btf_check_sec_info+0x500/0x500 [ 1683.062117][ T1316] ? btf_parse_hdr+0x1e9/0x7e0 [ 1683.066718][ T1316] ? memcpy+0x56/0x70 [ 1683.070539][ T1316] btf_parse_hdr+0x375/0x7e0 [ 1683.074965][ T1316] btf_new_fd+0x3e8/0x900 [ 1683.079131][ T1316] bpf_btf_load+0x6f/0x90 [ 1683.083295][ T1316] __sys_bpf+0x514/0x750 [ 1683.087376][ T1316] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1683.092588][ T1316] ? debug_smp_processor_id+0x17/0x20 [ 1683.097787][ T1316] __x64_sys_bpf+0x7c/0x90 [ 1683.102041][ T1316] do_syscall_64+0x44/0xd0 [ 1683.106292][ T1316] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1683.112023][ T1316] RIP: 0033:0x7fb4513de0d9 [ 1683.116273][ T1316] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1683.135714][ T1316] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1683.143959][ T1316] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1683.151771][ T1316] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 10:14:36 executing program 4: syz_clone(0x80100000, 0x0, 0x38a, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:36 executing program 0: syz_clone(0x80101100, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x208000, 0x8) r1 = getpgid(0xffffffffffffffff) syz_open_procfs(r1, &(0x7f00000000c0)='autogroup\x00') r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000040)={'\x00', 0x7, 0x3, 0x1}) bpf$PROG_LOAD(0x9, 0x0, 0x0) (async) open(&(0x7f0000000000)='./file0\x00', 0x208000, 0x8) (async) getpgid(0xffffffffffffffff) (async) syz_open_procfs(r1, &(0x7f00000000c0)='autogroup\x00') (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) symlinkat(&(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000140)='./file0\x00') (async) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, &(0x7f0000000040)={'\x00', 0x7, 0x3, 0x1}) (async) 10:14:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 9) 10:14:36 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) [ 1683.159582][ T1316] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.167393][ T1316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1683.175206][ T1316] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1683.183022][ T1316] 10:14:36 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, 0x0, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:36 executing program 4: syz_clone(0x80100000, 0x0, 0x700, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 0: syz_clone(0x80101100, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:36 executing program 0: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 1683.224034][ T1341] FAULT_INJECTION: forcing a failure. [ 1683.224034][ T1341] name failslab, interval 1, probability 0, space 0, times 0 10:14:36 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xffffffffffffffce) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x20, &(0x7f00000003c0)={&(0x7f0000000240)=""/198, 0xc6, 0x0, &(0x7f0000000340)=""/105, 0x69}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @alu={0x4, 0x1, 0x4, 0x8, 0xaeb370fb12ebac60, 0xffffffffffffffc0, 0xfffffffffffffff0}], &(0x7f0000000180)='syzkaller\x00', 0xfda, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1a, r2, 0x8, &(0x7f00000001c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x4, 0x4}, 0x10, r3, r0, 0x0, &(0x7f0000000440)=[r1]}, 0x80) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40880}, 0x0) [ 1683.290540][ T1341] CPU: 1 PID: 1341 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1683.300541][ T1341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1683.310437][ T1341] Call Trace: [ 1683.313560][ T1341] [ 1683.316335][ T1341] dump_stack_lvl+0x151/0x1b7 [ 1683.320849][ T1341] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1683.326155][ T1341] ? do_handle_mm_fault+0x142f/0x2370 [ 1683.331350][ T1341] dump_stack+0x15/0x17 [ 1683.335346][ T1341] should_fail+0x3c0/0x510 [ 1683.339597][ T1341] __should_failslab+0x9f/0xe0 [ 1683.344194][ T1341] should_failslab+0x9/0x20 [ 1683.348535][ T1341] kmem_cache_alloc+0x4f/0x2f0 [ 1683.353133][ T1341] ? dup_task_struct+0x53/0xa60 [ 1683.357819][ T1341] ? __kasan_check_write+0x14/0x20 [ 1683.362768][ T1341] dup_task_struct+0x53/0xa60 [ 1683.367281][ T1341] ? __kasan_check_write+0x14/0x20 [ 1683.372230][ T1341] copy_process+0x579/0x3250 [ 1683.376657][ T1341] ? __kasan_check_write+0x14/0x20 [ 1683.381602][ T1341] ? proc_fail_nth_write+0x213/0x290 [ 1683.386724][ T1341] ? proc_fail_nth_read+0x220/0x220 [ 1683.391756][ T1341] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1683.396705][ T1341] ? vfs_write+0x9af/0x1050 [ 1683.401041][ T1341] ? compat_start_thread+0x20/0x20 [ 1683.405992][ T1341] kernel_clone+0x22d/0x990 [ 1683.410331][ T1341] ? file_end_write+0x1b0/0x1b0 [ 1683.415018][ T1341] ? __kasan_check_write+0x14/0x20 [ 1683.419965][ T1341] ? create_io_thread+0x1e0/0x1e0 [ 1683.424823][ T1341] ? __mutex_lock_slowpath+0x10/0x10 [ 1683.429945][ T1341] __x64_sys_clone+0x289/0x310 [ 1683.434544][ T1341] ? __do_sys_vfork+0x130/0x130 [ 1683.439233][ T1341] ? debug_smp_processor_id+0x17/0x20 [ 1683.444439][ T1341] do_syscall_64+0x44/0xd0 [ 1683.448691][ T1341] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1683.454423][ T1341] RIP: 0033:0x7f03091130d9 [ 1683.458673][ T1341] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1683.478115][ T1341] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1683.486359][ T1341] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1683.494168][ T1341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1683.501983][ T1341] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.509792][ T1341] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1683.517602][ T1341] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1683.525433][ T1341] [ 1683.530057][ T1364] FAULT_INJECTION: forcing a failure. 10:14:37 executing program 0: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:37 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, 0x0, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:37 executing program 4: syz_clone(0x80100000, 0x0, 0x900, &(0x7f00000001c0), 0x0, 0x0) 10:14:37 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xffffffffffffffce) (async) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x20, &(0x7f00000003c0)={&(0x7f0000000240)=""/198, 0xc6, 0x0, &(0x7f0000000340)=""/105, 0x69}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @alu={0x4, 0x1, 0x4, 0x8, 0xaeb370fb12ebac60, 0xffffffffffffffc0, 0xfffffffffffffff0}], &(0x7f0000000180)='syzkaller\x00', 0xfda, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1a, r2, 0x8, &(0x7f00000001c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x4, 0x4}, 0x10, r3, r0, 0x0, &(0x7f0000000440)=[r1]}, 0x80) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40880}, 0x0) [ 1683.530057][ T1364] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1683.561606][ T1364] CPU: 1 PID: 1364 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1683.571594][ T1364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1683.581495][ T1364] Call Trace: [ 1683.584614][ T1364] [ 1683.587389][ T1364] dump_stack_lvl+0x151/0x1b7 [ 1683.591904][ T1364] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1683.597198][ T1364] dump_stack+0x15/0x17 [ 1683.601190][ T1364] should_fail+0x3c0/0x510 [ 1683.605444][ T1364] should_fail_usercopy+0x1a/0x20 [ 1683.610322][ T1364] _copy_to_user+0x20/0x90 [ 1683.614556][ T1364] bpf_verifier_vlog+0x1a1/0x330 [ 1683.619330][ T1364] __btf_verifier_log+0xd1/0x120 [ 1683.624102][ T1364] ? bpf_verifier_vlog+0x1ae/0x330 [ 1683.629050][ T1364] ? btf_check_sec_info+0x500/0x500 [ 1683.634084][ T1364] ? btf_parse_hdr+0x1e9/0x7e0 10:14:37 executing program 4: syz_clone(0x80100000, 0x0, 0x1100, &(0x7f00000001c0), 0x0, 0x0) [ 1683.638681][ T1364] ? memcpy+0x56/0x70 [ 1683.642499][ T1364] btf_parse_hdr+0x3a4/0x7e0 [ 1683.646928][ T1364] btf_new_fd+0x3e8/0x900 [ 1683.651093][ T1364] bpf_btf_load+0x6f/0x90 [ 1683.655258][ T1364] __sys_bpf+0x514/0x750 [ 1683.659340][ T1364] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1683.664548][ T1364] ? debug_smp_processor_id+0x17/0x20 [ 1683.669755][ T1364] __x64_sys_bpf+0x7c/0x90 [ 1683.674008][ T1364] do_syscall_64+0x44/0xd0 [ 1683.678257][ T1364] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1683.683987][ T1364] RIP: 0033:0x7fb4513de0d9 [ 1683.688240][ T1364] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1683.707684][ T1364] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1683.715928][ T1364] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1683.723739][ T1364] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1683.731554][ T1364] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 10:14:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 10) 10:14:37 executing program 4: syz_clone(0x80100000, 0x0, 0x1f00, &(0x7f00000001c0), 0x0, 0x0) 10:14:37 executing program 0: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:14:37 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xffffffffffffffce) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x20, &(0x7f00000003c0)={&(0x7f0000000240)=""/198, 0xc6, 0x0, &(0x7f0000000340)=""/105, 0x69}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @alu={0x4, 0x1, 0x4, 0x8, 0xaeb370fb12ebac60, 0xffffffffffffffc0, 0xfffffffffffffff0}], &(0x7f0000000180)='syzkaller\x00', 0xfda, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1a, r2, 0x8, &(0x7f00000001c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x4, 0x4}, 0x10, r3, r0, 0x0, &(0x7f0000000440)=[r1]}, 0x80) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40880}, 0x0) bpf$PROG_LOAD(0x9, 0x0, 0xffffffffffffffce) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={r1, 0x20, &(0x7f00000003c0)={&(0x7f0000000240)=""/198, 0xc6, 0x0, &(0x7f0000000340)=""/105, 0x69}}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000140)=@raw=[@map_fd={0x18, 0x8, 0x1, 0x0, r1}, @alu={0x4, 0x1, 0x4, 0x8, 0xaeb370fb12ebac60, 0xffffffffffffffc0, 0xfffffffffffffff0}], &(0x7f0000000180)='syzkaller\x00', 0xfda, 0x0, 0x0, 0x41000, 0xa, '\x00', 0x0, 0x1a, r2, 0x8, &(0x7f00000001c0)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x9, 0x4, 0x4}, 0x10, r3, r0, 0x0, &(0x7f0000000440)=[r1]}, 0x80) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40880}, 0x0) (async) 10:14:37 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) [ 1683.739363][ T1364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1683.747172][ T1364] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1683.754988][ T1364] [ 1683.778490][ T1384] FAULT_INJECTION: forcing a failure. [ 1683.778490][ T1384] name fail_usercopy, interval 1, probability 0, space 0, times 0 10:14:37 executing program 0: syz_clone(0x80101100, 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:37 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfc70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 10:14:37 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfc70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300beda941da90b72ba8a0000ffffffff0100000000000098fc4be600000000000600000d00000000030000000200000005000000010000000e00000000000000050000000200000006000000030000000600000004000000000000000700000d000000000700000003000000060000000200000010000000000000000d00000003000000020000000300000008000000000000000f000000050000000a000000030000060400000003000000070000000d000000020000000800000000000000040000000000000a05000000000000000300000d00000000030000000100000005000000010000000500000005000000070000000000000c040000000f00000003000006040000000e000000020000000b0000000100000006000000ff00000000002e0085273907095800ed56b8e555a28f8585351ea3d9188873c4a5"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) [ 1683.795564][ T1387] FAULT_INJECTION: forcing a failure. [ 1683.795564][ T1387] name failslab, interval 1, probability 0, space 0, times 0 [ 1683.818914][ T1384] CPU: 1 PID: 1384 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1683.828902][ T1384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1683.838799][ T1384] Call Trace: [ 1683.841923][ T1384] [ 1683.844698][ T1384] dump_stack_lvl+0x151/0x1b7 [ 1683.849210][ T1384] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1683.854509][ T1384] dump_stack+0x15/0x17 [ 1683.858499][ T1384] should_fail+0x3c0/0x510 [ 1683.862752][ T1384] should_fail_usercopy+0x1a/0x20 [ 1683.867611][ T1384] _copy_to_user+0x20/0x90 [ 1683.871863][ T1384] bpf_verifier_vlog+0x1a1/0x330 [ 1683.876636][ T1384] __btf_verifier_log+0xd1/0x120 [ 1683.881411][ T1384] ? bpf_verifier_vlog+0x1ae/0x330 [ 1683.886358][ T1384] ? btf_check_sec_info+0x500/0x500 [ 1683.891398][ T1384] ? btf_parse_hdr+0x1e9/0x7e0 [ 1683.895989][ T1384] ? memcpy+0x56/0x70 [ 1683.899809][ T1384] btf_parse_hdr+0x3cf/0x7e0 [ 1683.904237][ T1384] btf_new_fd+0x3e8/0x900 [ 1683.908401][ T1384] bpf_btf_load+0x6f/0x90 [ 1683.912565][ T1384] __sys_bpf+0x514/0x750 [ 1683.916648][ T1384] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1683.921860][ T1384] ? debug_smp_processor_id+0x17/0x20 [ 1683.927148][ T1384] __x64_sys_bpf+0x7c/0x90 [ 1683.931407][ T1384] do_syscall_64+0x44/0xd0 [ 1683.935655][ T1384] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1683.941385][ T1384] RIP: 0033:0x7fb4513de0d9 [ 1683.945637][ T1384] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1683.965076][ T1384] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1683.973322][ T1384] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1683.981134][ T1384] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1683.988946][ T1384] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1683.996756][ T1384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1684.004568][ T1384] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1684.012382][ T1384] [ 1684.016969][ T1387] CPU: 0 PID: 1387 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1684.026947][ T1387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1684.036842][ T1387] Call Trace: [ 1684.039965][ T1387] [ 1684.042745][ T1387] dump_stack_lvl+0x151/0x1b7 [ 1684.047256][ T1387] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1684.052549][ T1387] ? __kasan_slab_alloc+0xc4/0xe0 [ 1684.057410][ T1387] ? kmem_cache_alloc+0x189/0x2f0 [ 1684.062269][ T1387] dump_stack+0x15/0x17 [ 1684.066262][ T1387] should_fail+0x3c0/0x510 [ 1684.070513][ T1387] ? __get_vm_area_node+0x13a/0x380 [ 1684.075546][ T1387] __should_failslab+0x9f/0xe0 [ 1684.080147][ T1387] should_failslab+0x9/0x20 [ 1684.084488][ T1387] kmem_cache_alloc_trace+0x4a/0x310 [ 1684.089612][ T1387] __get_vm_area_node+0x13a/0x380 [ 1684.094472][ T1387] __vmalloc_node_range+0xda/0x800 [ 1684.099414][ T1387] ? copy_process+0x579/0x3250 [ 1684.104016][ T1387] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1684.108874][ T1387] ? dup_task_struct+0x53/0xa60 [ 1684.113563][ T1387] dup_task_struct+0x61f/0xa60 [ 1684.118161][ T1387] ? copy_process+0x579/0x3250 [ 1684.122767][ T1387] ? __kasan_check_write+0x14/0x20 [ 1684.127710][ T1387] copy_process+0x579/0x3250 [ 1684.132137][ T1387] ? __kasan_check_write+0x14/0x20 [ 1684.137097][ T1387] ? proc_fail_nth_write+0x213/0x290 [ 1684.142205][ T1387] ? proc_fail_nth_read+0x220/0x220 [ 1684.147237][ T1387] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1684.152184][ T1387] ? vfs_write+0x9af/0x1050 [ 1684.156523][ T1387] ? vmacache_update+0xb7/0x120 [ 1684.161210][ T1387] kernel_clone+0x22d/0x990 [ 1684.165549][ T1387] ? file_end_write+0x1b0/0x1b0 [ 1684.170235][ T1387] ? __kasan_check_write+0x14/0x20 [ 1684.175185][ T1387] ? create_io_thread+0x1e0/0x1e0 [ 1684.180048][ T1387] ? __mutex_lock_slowpath+0x10/0x10 [ 1684.185164][ T1387] __x64_sys_clone+0x289/0x310 [ 1684.189768][ T1387] ? __do_sys_vfork+0x130/0x130 [ 1684.194454][ T1387] ? debug_smp_processor_id+0x17/0x20 [ 1684.199658][ T1387] do_syscall_64+0x44/0xd0 [ 1684.203911][ T1387] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1684.209640][ T1387] RIP: 0033:0x7f03091130d9 [ 1684.213894][ T1387] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1684.233337][ T1387] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 10:14:37 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, 0x0, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:37 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 10:14:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 11) 10:14:37 executing program 0: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfc70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 10:14:37 executing program 4: syz_clone(0x80100000, 0x0, 0x2000, &(0x7f00000001c0), 0x0, 0x0) 10:14:37 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfc70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300beda941da90b72ba8a0000ffffffff0100000000000098fc4be600000000000600000d00000000030000000200000005000000010000000e00000000000000050000000200000006000000030000000600000004000000000000000700000d000000000700000003000000060000000200000010000000000000000d00000003000000020000000300000008000000000000000f000000050000000a000000030000060400000003000000070000000d000000020000000800000000000000040000000000000a05000000000000000300000d00000000030000000100000005000000010000000500000005000000070000000000000c040000000f00000003000006040000000e000000020000000b0000000100000006000000ff00000000002e0085273907095800ed56b8e555a28f8585351ea3d9188873c4a5"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (rerun: 32) [ 1684.241578][ T1387] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1684.249391][ T1387] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1684.257200][ T1387] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.265011][ T1387] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1684.272824][ T1387] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1684.280638][ T1387] 10:14:37 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082bbd7000fddbdf25050000001c000180060001000a000000060005004e24000008000300640101010800020001000000080003000800000030000180080003007f00000114000400fc00000000000000000000000000000006000100020000000600010000000000f398170e5bf73619120aa7f22c1e5d1267cc095163affab948567666b2d8de3b613fe0e99dae0eb522b23e61cb242c3558303532ac162aac"], 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 10:14:37 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082bbd7000fddbdf25050000001c000180060001000a000000060005004e24000008000300640101010800020001000000080003000800000030000180080003007f00000114000400fc00000000000000000000000000000006000100020000000600010000000000f398170e5bf73619120aa7f22c1e5d1267cc095163affab948567666b2d8de3b613fe0e99dae0eb522b23e61cb242c3558303532ac162aac"], 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082bbd7000fddbdf25050000001c000180060001000a000000060005004e24000008000300640101010800020001000000080003000800000030000180080003007f00000114000400fc00000000000000000000000000000006000100020000000600010000000000f398170e5bf73619120aa7f22c1e5d1267cc095163affab948567666b2d8de3b613fe0e99dae0eb522b23e61cb242c3558303532ac162aac"], 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x4000) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) (async) [ 1684.315191][ T1408] FAULT_INJECTION: forcing a failure. [ 1684.315191][ T1408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1684.333823][ T1414] FAULT_INJECTION: forcing a failure. [ 1684.333823][ T1414] name failslab, interval 1, probability 0, space 0, times 0 [ 1684.346518][ T1414] CPU: 1 PID: 1414 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 10:14:37 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082bbd7000fddbdf25050000001c000180060001000a000000060005004e24000008000300640101010800020001000000080003000800000030000180080003007f00000114000400fc00000000000000000000000000000006000100020000000600010000000000f398170e5bf73619120aa7f22c1e5d1267cc095163affab948567666b2d8de3b613fe0e99dae0eb522b23e61cb242c3558303532ac162aac"], 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00082bbd7000fddbdf25050000001c000180060001000a000000060005004e24000008000300640101010800020001000000080003000800000030000180080003007f00000114000400fc00000000000000000000000000000006000100020000000600010000000000f398170e5bf73619120aa7f22c1e5d1267cc095163affab948567666b2d8de3b613fe0e99dae0eb522b23e61cb242c3558303532ac162aac"], 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x4000) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) (async) [ 1684.356487][ T1414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1684.366386][ T1414] Call Trace: [ 1684.369504][ T1414] [ 1684.372285][ T1414] dump_stack_lvl+0x151/0x1b7 [ 1684.376795][ T1414] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1684.382094][ T1414] dump_stack+0x15/0x17 [ 1684.386084][ T1414] should_fail+0x3c0/0x510 [ 1684.390336][ T1414] ? security_prepare_creds+0x50/0x160 [ 1684.395631][ T1414] __should_failslab+0x9f/0xe0 [ 1684.400232][ T1414] should_failslab+0x9/0x20 [ 1684.404568][ T1414] __kmalloc+0x6d/0x350 [ 1684.408562][ T1414] security_prepare_creds+0x50/0x160 10:14:37 executing program 0: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfc70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 10:14:37 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0xa49, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) ioctl$FITHAW(r0, 0xc0045878) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x5, 0x2000) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="50000000109a99a094170ef89af5124f63151d3b27de", @ANYRES16=0x0, @ANYBLOB="000329bd7000fcdbdf25030000002800018014000400200100000000000000000000000000010800060006000000060005004e2000000800020007000000080002000100000004000180"], 0x50}}, 0x48012) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) r3 = syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000001c0)=0x40) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x18, 0x9, 0x6c0, 0x5, 0x710, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) 10:14:37 executing program 0: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfc70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300beda941da90b72ba8a0000ffffffff0100000000000098fc4be600000000000600000d00000000030000000200000005000000010000000e00000000000000050000000200000006000000030000000600000004000000000000000700000d000000000700000003000000060000000200000010000000000000000d00000003000000020000000300000008000000000000000f000000050000000a000000030000060400000003000000070000000d000000020000000800000000000000040000000000000a05000000000000000300000d00000000030000000100000005000000010000000500000005000000070000000000000c040000000f00000003000006040000000e000000020000000b0000000100000006000000ff00000000002e0085273907095800ed56b8e555a28f8585351ea3d9188873c4a5"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000000)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) [ 1684.413684][ T1414] prepare_creds+0x471/0x690 [ 1684.418110][ T1414] copy_creds+0xde/0x640 [ 1684.422211][ T1414] copy_process+0x775/0x3250 [ 1684.426617][ T1414] ? __kasan_check_write+0x14/0x20 [ 1684.431574][ T1414] ? proc_fail_nth_write+0x213/0x290 [ 1684.436790][ T1414] ? proc_fail_nth_read+0x220/0x220 [ 1684.441829][ T1414] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1684.446768][ T1414] ? vfs_write+0x9af/0x1050 [ 1684.451105][ T1414] ? vmacache_update+0xb7/0x120 [ 1684.455796][ T1414] kernel_clone+0x22d/0x990 [ 1684.460133][ T1414] ? file_end_write+0x1b0/0x1b0 [ 1684.464829][ T1414] ? __kasan_check_write+0x14/0x20 [ 1684.469767][ T1414] ? create_io_thread+0x1e0/0x1e0 [ 1684.474625][ T1414] ? __mutex_lock_slowpath+0x10/0x10 [ 1684.479747][ T1414] __x64_sys_clone+0x289/0x310 [ 1684.484418][ T1414] ? __do_sys_vfork+0x130/0x130 [ 1684.489033][ T1414] ? debug_smp_processor_id+0x17/0x20 [ 1684.494241][ T1414] do_syscall_64+0x44/0xd0 [ 1684.498578][ T1414] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1684.504308][ T1414] RIP: 0033:0x7f03091130d9 [ 1684.508561][ T1414] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1684.528004][ T1414] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1684.536246][ T1414] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1684.544058][ T1414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1684.551870][ T1414] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.559679][ T1414] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1684.567494][ T1414] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1684.575306][ T1414] [ 1684.578168][ T1408] CPU: 0 PID: 1408 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1684.588151][ T1408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1684.598046][ T1408] Call Trace: [ 1684.601168][ T1408] [ 1684.603945][ T1408] dump_stack_lvl+0x151/0x1b7 [ 1684.608458][ T1408] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1684.613753][ T1408] dump_stack+0x15/0x17 [ 1684.617743][ T1408] should_fail+0x3c0/0x510 [ 1684.621996][ T1408] should_fail_usercopy+0x1a/0x20 [ 1684.626857][ T1408] _copy_to_user+0x20/0x90 [ 1684.631113][ T1408] bpf_verifier_vlog+0x1a1/0x330 [ 1684.635883][ T1408] __btf_verifier_log+0xd1/0x120 [ 1684.640658][ T1408] ? bpf_verifier_vlog+0x1ae/0x330 [ 1684.645602][ T1408] ? btf_check_sec_info+0x500/0x500 [ 1684.650641][ T1408] ? btf_parse_hdr+0x1e9/0x7e0 [ 1684.655246][ T1408] ? memcpy+0x56/0x70 [ 1684.659055][ T1408] btf_parse_hdr+0x3fa/0x7e0 [ 1684.663488][ T1408] btf_new_fd+0x3e8/0x900 [ 1684.667652][ T1408] bpf_btf_load+0x6f/0x90 [ 1684.671814][ T1408] __sys_bpf+0x514/0x750 [ 1684.675892][ T1408] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1684.681104][ T1408] ? debug_smp_processor_id+0x17/0x20 [ 1684.686308][ T1408] __x64_sys_bpf+0x7c/0x90 [ 1684.690648][ T1408] do_syscall_64+0x44/0xd0 [ 1684.694813][ T1408] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1684.700543][ T1408] RIP: 0033:0x7fb4513de0d9 [ 1684.704799][ T1408] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1684.724236][ T1408] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1684.732481][ T1408] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1684.740292][ T1408] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1684.748104][ T1408] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1684.755914][ T1408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:14:38 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:38 executing program 0: bpf$PROG_LOAD(0x9, 0x0, 0xfc70) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:38 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0xa49, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) (async) ioctl$FITHAW(r0, 0xc0045878) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x5, 0x2000) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="50000000109a99a094170ef89af5124f63151d3b27de", @ANYRES16=0x0, @ANYBLOB="000329bd7000fcdbdf25030000002800018014000400200100000000000000000000000000010800060006000000060005004e2000000800020007000000080002000100000004000180"], 0x50}}, 0x48012) (async) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) r3 = syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) (async) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000001c0)=0x40) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00'}) (async, rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x18, 0x9, 0x6c0, 0x5, 0x710, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) 10:14:38 executing program 4: syz_clone(0x80100000, 0x0, 0x8a03, &(0x7f00000001c0), 0x0, 0x0) 10:14:38 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 10:14:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 12) [ 1684.763732][ T1408] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1684.771542][ T1408] 10:14:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300beda941da90b72ba8a0000ffffffff0100000000000098fc4be600000000000600000d00000000030000000200000005000000010000000e00000000000000050000000200000006000000030000000600000004000000000000000700000d000000000700000003000000060000000200000010000000000000000d00000003000000020000000300000008000000000000000f000000050000000a000000030000060400000003000000070000000d000000020000000800000000000000040000000000000a05000000000000000300000d00000000030000000100000005000000010000000500000005000000070000000000000c040000000f00000003000006040000000e000000020000000b0000000100000006000000ff00000000002e0085273907095800ed56b8e555a28f8585351ea3d9188873c4a5"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:38 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0xa49, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) (async) ioctl$FITHAW(r0, 0xc0045878) (async) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x5, 0x2000) (async) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000080}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="50000000109a99a094170ef89af5124f63151d3b27de", @ANYRES16=0x0, @ANYBLOB="000329bd7000fcdbdf25030000002800018014000400200100000000000000000000000000010800060006000000060005004e2000000800020007000000080002000100000004000180"], 0x50}}, 0x48012) (async) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) r3 = syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) (async) ioctl$EVIOCRMFF(r2, 0x40044581, &(0x7f00000001c0)=0x40) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000000240)={'batadv_slave_1\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x18, 0x9, 0x6c0, 0x5, 0x710, r0, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x2}, 0x48) 10:14:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1684.826370][ T1439] FAULT_INJECTION: forcing a failure. [ 1684.826370][ T1439] name fail_page_alloc, interval 1, probability 0, space 0, times 1 10:14:38 executing program 2: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x10, 0x8000, 0x98e3, 0x1, {{0x15, 0x4, 0x1, 0x3, 0x54, 0x67, 0x0, 0x47, 0x4, 0x0, @loopback, @multicast1, {[@ssrr={0x89, 0x23, 0x4b, [@multicast1, @broadcast, @rand_addr=0x64010102, @multicast2, @remote, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast]}, @end, @generic={0x88, 0xc, "e3ad79067cec93a3f717"}, @cipso={0x86, 0xf, 0x2, [{0x2, 0x9, "ac1f2cbbe15678"}]}]}}}}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x97}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffcd4) [ 1684.870510][ T1439] CPU: 1 PID: 1439 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1684.880501][ T1439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1684.890396][ T1439] Call Trace: [ 1684.893519][ T1439] [ 1684.896295][ T1439] dump_stack_lvl+0x151/0x1b7 [ 1684.900807][ T1439] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1684.906101][ T1439] ? stack_trace_save+0x12d/0x1f0 [ 1684.910961][ T1439] ? is_bpf_text_address+0x1a2/0x1c0 [ 1684.916086][ T1439] dump_stack+0x15/0x17 [ 1684.920074][ T1439] should_fail+0x3c0/0x510 [ 1684.924336][ T1439] should_fail_alloc_page+0x58/0x70 [ 1684.929362][ T1439] __alloc_pages+0x1de/0x7c0 [ 1684.933789][ T1439] ? kmem_cache_alloc+0x189/0x2f0 [ 1684.938649][ T1439] ? __x64_sys_clone+0x289/0x310 [ 1684.941284][ T1458] FAULT_INJECTION: forcing a failure. [ 1684.941284][ T1458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1684.943417][ T1439] ? __count_vm_events+0x30/0x30 [ 1684.943445][ T1439] __get_free_pages+0xe/0x30 [ 1684.965469][ T1439] kasan_populate_vmalloc_pte+0x39/0x130 10:14:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1684.970933][ T1439] ? __apply_to_page_range+0x8a5/0xb90 [ 1684.976229][ T1439] __apply_to_page_range+0x8b8/0xb90 [ 1684.981348][ T1439] ? kasan_populate_vmalloc+0x70/0x70 [ 1684.986554][ T1439] ? kasan_populate_vmalloc+0x70/0x70 [ 1684.991761][ T1439] apply_to_page_range+0x3b/0x50 [ 1684.996535][ T1439] kasan_populate_vmalloc+0x65/0x70 [ 1685.001572][ T1439] alloc_vmap_area+0x1946/0x1a90 [ 1685.006347][ T1439] ? vm_map_ram+0xa80/0xa80 [ 1685.010681][ T1439] ? __kasan_kmalloc+0x9/0x10 [ 1685.015197][ T1439] ? __get_vm_area_node+0x13a/0x380 [ 1685.020230][ T1439] __get_vm_area_node+0x17b/0x380 [ 1685.025093][ T1439] __vmalloc_node_range+0xda/0x800 [ 1685.030039][ T1439] ? copy_process+0x579/0x3250 [ 1685.034637][ T1439] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1685.039498][ T1439] ? dup_task_struct+0x53/0xa60 [ 1685.044235][ T1439] dup_task_struct+0x61f/0xa60 [ 1685.048785][ T1439] ? copy_process+0x579/0x3250 [ 1685.053387][ T1439] ? __kasan_check_write+0x14/0x20 [ 1685.058332][ T1439] copy_process+0x579/0x3250 [ 1685.062759][ T1439] ? __kasan_check_write+0x14/0x20 [ 1685.067709][ T1439] ? proc_fail_nth_write+0x213/0x290 [ 1685.072823][ T1439] ? proc_fail_nth_read+0x220/0x220 [ 1685.077859][ T1439] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1685.082894][ T1439] ? vfs_write+0x9af/0x1050 [ 1685.087235][ T1439] ? vmacache_update+0xb7/0x120 [ 1685.091921][ T1439] kernel_clone+0x22d/0x990 [ 1685.096260][ T1439] ? file_end_write+0x1b0/0x1b0 [ 1685.100943][ T1439] ? __kasan_check_write+0x14/0x20 [ 1685.105894][ T1439] ? create_io_thread+0x1e0/0x1e0 [ 1685.110755][ T1439] ? __mutex_lock_slowpath+0x10/0x10 [ 1685.115877][ T1439] __x64_sys_clone+0x289/0x310 [ 1685.120475][ T1439] ? __do_sys_vfork+0x130/0x130 [ 1685.125165][ T1439] ? debug_smp_processor_id+0x17/0x20 [ 1685.130369][ T1439] do_syscall_64+0x44/0xd0 [ 1685.134829][ T1439] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1685.140556][ T1439] RIP: 0033:0x7f03091130d9 [ 1685.144809][ T1439] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1685.164254][ T1439] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1685.172494][ T1439] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1685.180309][ T1439] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1685.188118][ T1439] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1685.195928][ T1439] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1685.203741][ T1439] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1685.211554][ T1439] [ 1685.214414][ T1458] CPU: 0 PID: 1458 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1685.224398][ T1458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1685.234293][ T1458] Call Trace: [ 1685.237415][ T1458] [ 1685.240191][ T1458] dump_stack_lvl+0x151/0x1b7 [ 1685.244705][ T1458] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1685.250000][ T1458] dump_stack+0x15/0x17 [ 1685.253993][ T1458] should_fail+0x3c0/0x510 [ 1685.258247][ T1458] should_fail_usercopy+0x1a/0x20 [ 1685.263105][ T1458] _copy_to_user+0x20/0x90 [ 1685.267359][ T1458] bpf_verifier_vlog+0x1a1/0x330 [ 1685.272134][ T1458] __btf_verifier_log+0xd1/0x120 [ 1685.276906][ T1458] ? bpf_verifier_vlog+0x1ae/0x330 [ 1685.281850][ T1458] ? btf_check_sec_info+0x500/0x500 [ 1685.286886][ T1458] ? btf_parse_hdr+0x1e9/0x7e0 [ 1685.291487][ T1458] ? memcpy+0x56/0x70 [ 1685.295308][ T1458] btf_parse_hdr+0x425/0x7e0 [ 1685.299730][ T1458] btf_new_fd+0x3e8/0x900 [ 1685.303896][ T1458] bpf_btf_load+0x6f/0x90 [ 1685.308068][ T1458] __sys_bpf+0x514/0x750 [ 1685.312141][ T1458] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1685.317354][ T1458] ? debug_smp_processor_id+0x17/0x20 [ 1685.322557][ T1458] __x64_sys_bpf+0x7c/0x90 [ 1685.326809][ T1458] do_syscall_64+0x44/0xd0 [ 1685.331064][ T1458] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1685.336788][ T1458] RIP: 0033:0x7fb4513de0d9 [ 1685.341046][ T1458] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1685.360485][ T1458] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 10:14:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1685.368730][ T1458] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1685.376541][ T1458] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1685.384352][ T1458] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1685.392164][ T1458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1685.399975][ T1458] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1685.407789][ T1458] 10:14:38 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:38 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 10:14:38 executing program 2: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x10, 0x8000, 0x98e3, 0x1, {{0x15, 0x4, 0x1, 0x3, 0x54, 0x67, 0x0, 0x47, 0x4, 0x0, @loopback, @multicast1, {[@ssrr={0x89, 0x23, 0x4b, [@multicast1, @broadcast, @rand_addr=0x64010102, @multicast2, @remote, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast]}, @end, @generic={0x88, 0xc, "e3ad79067cec93a3f717"}, @cipso={0x86, 0xf, 0x2, [{0x2, 0x9, "ac1f2cbbe15678"}]}]}}}}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x97}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffcd4) 10:14:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 13) 10:14:38 executing program 4: syz_clone(0x80100000, 0x0, 0x20010, &(0x7f00000001c0), 0x0, 0x0) [ 1685.460696][ T1470] FAULT_INJECTION: forcing a failure. [ 1685.460696][ T1470] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1685.464527][ T1473] FAULT_INJECTION: forcing a failure. [ 1685.464527][ T1473] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1685.483806][ T1470] CPU: 0 PID: 1470 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1685.496546][ T1470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1685.506439][ T1470] Call Trace: [ 1685.509564][ T1470] [ 1685.512342][ T1470] dump_stack_lvl+0x151/0x1b7 [ 1685.516854][ T1470] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1685.522154][ T1470] dump_stack+0x15/0x17 [ 1685.526141][ T1470] should_fail+0x3c0/0x510 [ 1685.530398][ T1470] should_fail_alloc_page+0x58/0x70 [ 1685.535449][ T1470] __alloc_pages+0x1de/0x7c0 [ 1685.539861][ T1470] ? __count_vm_events+0x30/0x30 [ 1685.544626][ T1470] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1685.549841][ T1470] __get_free_pages+0xe/0x30 [ 1685.554261][ T1470] kasan_populate_vmalloc_pte+0x39/0x130 [ 1685.559727][ T1470] ? __apply_to_page_range+0x8a5/0xb90 [ 1685.565022][ T1470] __apply_to_page_range+0x8b8/0xb90 [ 1685.570143][ T1470] ? kasan_populate_vmalloc+0x70/0x70 [ 1685.575350][ T1470] ? kasan_populate_vmalloc+0x70/0x70 [ 1685.580557][ T1470] apply_to_page_range+0x3b/0x50 [ 1685.585331][ T1470] kasan_populate_vmalloc+0x65/0x70 [ 1685.590369][ T1470] alloc_vmap_area+0x1946/0x1a90 [ 1685.595142][ T1470] ? vm_map_ram+0xa80/0xa80 [ 1685.599479][ T1470] ? __kasan_kmalloc+0x9/0x10 [ 1685.603992][ T1470] ? __get_vm_area_node+0x13a/0x380 [ 1685.609025][ T1470] __get_vm_area_node+0x17b/0x380 [ 1685.613891][ T1470] __vmalloc_node_range+0xda/0x800 [ 1685.618865][ T1470] ? copy_process+0x579/0x3250 [ 1685.623435][ T1470] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1685.628294][ T1470] ? dup_task_struct+0x53/0xa60 [ 1685.632979][ T1470] dup_task_struct+0x61f/0xa60 [ 1685.637579][ T1470] ? copy_process+0x579/0x3250 [ 1685.642181][ T1470] ? __kasan_check_write+0x14/0x20 [ 1685.647132][ T1470] copy_process+0x579/0x3250 [ 1685.651553][ T1470] ? __kasan_check_write+0x14/0x20 [ 1685.656508][ T1470] ? proc_fail_nth_write+0x213/0x290 [ 1685.661620][ T1470] ? proc_fail_nth_read+0x220/0x220 [ 1685.666829][ T1470] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1685.671776][ T1470] ? vfs_write+0x9af/0x1050 [ 1685.676117][ T1470] ? vmacache_update+0xb7/0x120 [ 1685.680896][ T1470] kernel_clone+0x22d/0x990 [ 1685.685237][ T1470] ? file_end_write+0x1b0/0x1b0 [ 1685.689921][ T1470] ? __kasan_check_write+0x14/0x20 [ 1685.694868][ T1470] ? create_io_thread+0x1e0/0x1e0 [ 1685.699729][ T1470] ? __mutex_lock_slowpath+0x10/0x10 [ 1685.704851][ T1470] __x64_sys_clone+0x289/0x310 [ 1685.709456][ T1470] ? __do_sys_vfork+0x130/0x130 [ 1685.714140][ T1470] ? debug_smp_processor_id+0x17/0x20 [ 1685.719347][ T1470] do_syscall_64+0x44/0xd0 [ 1685.723597][ T1470] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1685.729328][ T1470] RIP: 0033:0x7f03091130d9 [ 1685.733581][ T1470] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1685.753023][ T1470] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 10:14:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:39 executing program 4: syz_clone(0x80100000, 0x0, 0x20200, &(0x7f00000001c0), 0x0, 0x0) 10:14:39 executing program 2: ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x10, 0x8000, 0x98e3, 0x1, {{0x15, 0x4, 0x1, 0x3, 0x54, 0x67, 0x0, 0x47, 0x4, 0x0, @loopback, @multicast1, {[@ssrr={0x89, 0x23, 0x4b, [@multicast1, @broadcast, @rand_addr=0x64010102, @multicast2, @remote, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast]}, @end, @generic={0x88, 0xc, "e3ad79067cec93a3f717"}, @cipso={0x86, 0xf, 0x2, [{0x2, 0x9, "ac1f2cbbe15678"}]}]}}}}}) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x300, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x97}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r0}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffcd4) 10:14:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:39 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) [ 1685.761268][ T1470] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1685.769076][ T1470] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1685.776885][ T1470] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1685.784701][ T1470] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1685.792512][ T1470] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1685.800325][ T1470] [ 1685.827421][ T1473] CPU: 1 PID: 1473 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1685.837599][ T1473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1685.847482][ T1473] Call Trace: [ 1685.850604][ T1473] [ 1685.853382][ T1473] dump_stack_lvl+0x151/0x1b7 [ 1685.857903][ T1473] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1685.863190][ T1473] dump_stack+0x15/0x17 [ 1685.867181][ T1473] should_fail+0x3c0/0x510 [ 1685.871439][ T1473] should_fail_usercopy+0x1a/0x20 10:14:39 executing program 4: syz_clone(0x80100000, 0x0, 0x80000, &(0x7f00000001c0), 0x0, 0x0) [ 1685.876296][ T1473] _copy_to_user+0x20/0x90 [ 1685.880548][ T1473] bpf_verifier_vlog+0x1a1/0x330 [ 1685.885321][ T1473] __btf_verifier_log+0xd1/0x120 [ 1685.890094][ T1473] ? bpf_verifier_vlog+0x1ae/0x330 [ 1685.895040][ T1473] ? btf_check_sec_info+0x500/0x500 [ 1685.900078][ T1473] ? btf_parse_hdr+0x1e9/0x7e0 [ 1685.904676][ T1473] ? memcpy+0x56/0x70 [ 1685.908491][ T1473] btf_parse_hdr+0x450/0x7e0 [ 1685.912918][ T1473] btf_new_fd+0x3e8/0x900 [ 1685.917089][ T1473] bpf_btf_load+0x6f/0x90 [ 1685.921252][ T1473] __sys_bpf+0x514/0x750 [ 1685.925332][ T1473] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1685.930540][ T1473] ? debug_smp_processor_id+0x17/0x20 [ 1685.935747][ T1473] __x64_sys_bpf+0x7c/0x90 [ 1685.940001][ T1473] do_syscall_64+0x44/0xd0 [ 1685.944253][ T1473] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1685.949977][ T1473] RIP: 0033:0x7fb4513de0d9 [ 1685.954243][ T1473] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1685.973674][ T1473] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1685.981918][ T1473] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1685.989733][ T1473] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1685.997541][ T1473] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1686.005351][ T1473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1686.013171][ T1473] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1686.020978][ T1473] [ 1686.032004][ T1494] FAULT_INJECTION: forcing a failure. [ 1686.032004][ T1494] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1686.059279][ T1494] CPU: 1 PID: 1494 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1686.069263][ T1494] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1686.079158][ T1494] Call Trace: [ 1686.082288][ T1494] [ 1686.085055][ T1494] dump_stack_lvl+0x151/0x1b7 [ 1686.089574][ T1494] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1686.094870][ T1494] dump_stack+0x15/0x17 [ 1686.098865][ T1494] should_fail+0x3c0/0x510 [ 1686.103114][ T1494] should_fail_alloc_page+0x58/0x70 [ 1686.108144][ T1494] __alloc_pages+0x1de/0x7c0 [ 1686.112575][ T1494] ? __count_vm_events+0x30/0x30 [ 1686.117345][ T1494] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1686.122562][ T1494] __get_free_pages+0xe/0x30 [ 1686.126985][ T1494] kasan_populate_vmalloc_pte+0x39/0x130 [ 1686.132446][ T1494] ? __apply_to_page_range+0x8a5/0xb90 [ 1686.137760][ T1494] __apply_to_page_range+0x8b8/0xb90 [ 1686.142864][ T1494] ? kasan_populate_vmalloc+0x70/0x70 [ 1686.148075][ T1494] ? kasan_populate_vmalloc+0x70/0x70 [ 1686.153276][ T1494] apply_to_page_range+0x3b/0x50 [ 1686.158051][ T1494] kasan_populate_vmalloc+0x65/0x70 [ 1686.163104][ T1494] alloc_vmap_area+0x1946/0x1a90 [ 1686.167862][ T1494] ? vm_map_ram+0xa80/0xa80 [ 1686.172196][ T1494] ? __kasan_kmalloc+0x9/0x10 [ 1686.176708][ T1494] ? __get_vm_area_node+0x13a/0x380 [ 1686.181742][ T1494] __get_vm_area_node+0x17b/0x380 [ 1686.186607][ T1494] __vmalloc_node_range+0xda/0x800 [ 1686.191552][ T1494] ? copy_process+0x579/0x3250 [ 1686.196152][ T1494] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1686.201011][ T1494] ? dup_task_struct+0x53/0xa60 [ 1686.205700][ T1494] dup_task_struct+0x61f/0xa60 [ 1686.210297][ T1494] ? copy_process+0x579/0x3250 [ 1686.214896][ T1494] ? __kasan_check_write+0x14/0x20 [ 1686.219852][ T1494] copy_process+0x579/0x3250 [ 1686.224277][ T1494] ? __kasan_check_write+0x14/0x20 [ 1686.229219][ T1494] ? proc_fail_nth_write+0x213/0x290 [ 1686.234340][ T1494] ? proc_fail_nth_read+0x220/0x220 [ 1686.239375][ T1494] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1686.244320][ T1494] ? vfs_write+0x9af/0x1050 [ 1686.248660][ T1494] ? vmacache_update+0xb7/0x120 [ 1686.253348][ T1494] kernel_clone+0x22d/0x990 [ 1686.257689][ T1494] ? file_end_write+0x1b0/0x1b0 [ 1686.262372][ T1494] ? __kasan_check_write+0x14/0x20 [ 1686.267321][ T1494] ? create_io_thread+0x1e0/0x1e0 [ 1686.272182][ T1494] ? __mutex_lock_slowpath+0x10/0x10 [ 1686.277312][ T1494] __x64_sys_clone+0x289/0x310 [ 1686.281900][ T1494] ? __do_sys_vfork+0x130/0x130 [ 1686.286588][ T1494] ? debug_smp_processor_id+0x17/0x20 [ 1686.291793][ T1494] do_syscall_64+0x44/0xd0 [ 1686.296048][ T1494] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1686.301773][ T1494] RIP: 0033:0x7f03091130d9 [ 1686.306030][ T1494] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:14:39 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:39 executing program 2: lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)='-\x00', 0x2, 0x3) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 14) 10:14:39 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) [ 1686.325470][ T1494] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1686.333716][ T1494] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1686.341529][ T1494] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1686.349337][ T1494] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1686.357149][ T1494] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1686.364959][ T1494] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1686.372777][ T1494] 10:14:39 executing program 2: lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)='-\x00', 0x2, 0x3) (async, rerun: 64) bpf$PROG_LOAD(0x9, 0x0, 0x2) (rerun: 64) 10:14:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:39 executing program 2: lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.advise\x00', &(0x7f0000000080)='-\x00', 0x2, 0x3) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) [ 1686.408199][ T1504] FAULT_INJECTION: forcing a failure. [ 1686.408199][ T1504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1686.421957][ T1502] FAULT_INJECTION: forcing a failure. [ 1686.421957][ T1502] name failslab, interval 1, probability 0, space 0, times 0 [ 1686.443958][ T1502] CPU: 1 PID: 1502 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 10:14:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:39 executing program 4: syz_clone(0x80100000, 0x0, 0x100000, &(0x7f00000001c0), 0x0, 0x0) 10:14:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1686.453944][ T1502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1686.463839][ T1502] Call Trace: [ 1686.466960][ T1502] [ 1686.469737][ T1502] dump_stack_lvl+0x151/0x1b7 [ 1686.474254][ T1502] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1686.479548][ T1502] dump_stack+0x15/0x17 [ 1686.483550][ T1502] should_fail+0x3c0/0x510 [ 1686.487791][ T1502] ? __vmalloc_node_range+0x2e3/0x800 [ 1686.492996][ T1502] __should_failslab+0x9f/0xe0 [ 1686.497598][ T1502] should_failslab+0x9/0x20 [ 1686.501936][ T1502] __kmalloc+0x6d/0x350 [ 1686.505931][ T1502] __vmalloc_node_range+0x2e3/0x800 [ 1686.510964][ T1502] dup_task_struct+0x61f/0xa60 [ 1686.515564][ T1502] ? copy_process+0x579/0x3250 [ 1686.520163][ T1502] ? __kasan_check_write+0x14/0x20 [ 1686.525112][ T1502] copy_process+0x579/0x3250 [ 1686.529539][ T1502] ? __kasan_check_write+0x14/0x20 [ 1686.534488][ T1502] ? proc_fail_nth_write+0x213/0x290 [ 1686.539607][ T1502] ? proc_fail_nth_read+0x220/0x220 [ 1686.544637][ T1502] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1686.549584][ T1502] ? vfs_write+0x9af/0x1050 [ 1686.553922][ T1502] ? vmacache_update+0xb7/0x120 [ 1686.558609][ T1502] kernel_clone+0x22d/0x990 [ 1686.562953][ T1502] ? file_end_write+0x1b0/0x1b0 [ 1686.567639][ T1502] ? __kasan_check_write+0x14/0x20 [ 1686.572583][ T1502] ? create_io_thread+0x1e0/0x1e0 [ 1686.577444][ T1502] ? __mutex_lock_slowpath+0x10/0x10 [ 1686.582563][ T1502] __x64_sys_clone+0x289/0x310 [ 1686.587171][ T1502] ? __do_sys_vfork+0x130/0x130 [ 1686.591860][ T1502] ? debug_smp_processor_id+0x17/0x20 [ 1686.597061][ T1502] do_syscall_64+0x44/0xd0 [ 1686.601311][ T1502] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1686.607041][ T1502] RIP: 0033:0x7f03091130d9 [ 1686.611430][ T1502] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1686.630872][ T1502] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1686.639117][ T1502] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1686.646926][ T1502] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1686.654737][ T1502] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1686.662546][ T1502] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1686.670359][ T1502] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1686.678178][ T1502] [ 1686.681163][ T1504] CPU: 0 PID: 1504 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1686.691136][ T1504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1686.701111][ T1504] Call Trace: [ 1686.704230][ T1504] [ 1686.707006][ T1504] dump_stack_lvl+0x151/0x1b7 [ 1686.711521][ T1504] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1686.716819][ T1504] dump_stack+0x15/0x17 [ 1686.720809][ T1504] should_fail+0x3c0/0x510 [ 1686.725087][ T1504] should_fail_usercopy+0x1a/0x20 [ 1686.729925][ T1504] _copy_to_user+0x20/0x90 [ 1686.734174][ T1504] bpf_verifier_vlog+0x1a1/0x330 [ 1686.738950][ T1504] __btf_verifier_log+0xd1/0x120 [ 1686.743723][ T1504] ? bpf_verifier_vlog+0x1ae/0x330 [ 1686.748668][ T1504] ? btf_check_sec_info+0x500/0x500 [ 1686.753703][ T1504] ? btf_parse_hdr+0x1e9/0x7e0 [ 1686.758303][ T1504] ? memcpy+0x56/0x70 [ 1686.762123][ T1504] btf_parse_hdr+0x464/0x7e0 [ 1686.766554][ T1504] btf_new_fd+0x3e8/0x900 [ 1686.770714][ T1504] bpf_btf_load+0x6f/0x90 [ 1686.774878][ T1504] __sys_bpf+0x514/0x750 [ 1686.778959][ T1504] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1686.784167][ T1504] ? debug_smp_processor_id+0x17/0x20 [ 1686.789374][ T1504] __x64_sys_bpf+0x7c/0x90 [ 1686.793626][ T1504] do_syscall_64+0x44/0xd0 [ 1686.797879][ T1504] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1686.803607][ T1504] RIP: 0033:0x7fb4513de0d9 [ 1686.807861][ T1504] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1686.827306][ T1504] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1686.835550][ T1504] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1686.843360][ T1504] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1686.851170][ T1504] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1686.858979][ T1504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1686.866791][ T1504] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1686.874604][ T1504] 10:14:40 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, 0x0, &(0x7f0000000140)) 10:14:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:40 executing program 4: syz_clone(0x80100000, 0x0, 0xf0ff1f, &(0x7f00000001c0), 0x0, 0x0) 10:14:40 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 10:14:40 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)="358d992dd5f78e460963000090e25c6620ca2a01fe", &(0x7f0000000040)=@tcp=r0, 0x4}, 0x20) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x3) 10:14:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) (fail_nth: 15) 10:14:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300beda941da90b72ba8a0000ffffffff0100000000000098fc4be600000000000600000d00000000030000000200000005000000010000000e00000000000000050000000200000006000000030000000600000004000000000000000700000d000000000700000003000000060000000200000010000000000000000d00000003000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:40 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x2) (async) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)="358d992dd5f78e460963000090e25c6620ca2a01fe", &(0x7f0000000040)=@tcp=r0, 0x4}, 0x20) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) (async) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x3) [ 1686.929823][ T1532] FAULT_INJECTION: forcing a failure. [ 1686.929823][ T1532] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1686.930677][ T1533] FAULT_INJECTION: forcing a failure. [ 1686.930677][ T1533] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1686.966973][ T1533] CPU: 0 PID: 1533 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1686.976961][ T1533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1686.986940][ T1533] Call Trace: [ 1686.990067][ T1533] [ 1686.992848][ T1533] dump_stack_lvl+0x151/0x1b7 [ 1686.997356][ T1533] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1687.002651][ T1533] dump_stack+0x15/0x17 [ 1687.006640][ T1533] should_fail+0x3c0/0x510 [ 1687.010897][ T1533] should_fail_alloc_page+0x58/0x70 [ 1687.015928][ T1533] __alloc_pages+0x1de/0x7c0 [ 1687.020356][ T1533] ? __count_vm_events+0x30/0x30 [ 1687.025128][ T1533] ? __kasan_kmalloc+0x9/0x10 [ 1687.029641][ T1533] ? __kmalloc+0x203/0x350 [ 1687.033899][ T1533] ? __vmalloc_node_range+0x2e3/0x800 [ 1687.039102][ T1533] __vmalloc_node_range+0x48f/0x800 [ 1687.044142][ T1533] dup_task_struct+0x61f/0xa60 [ 1687.048736][ T1533] ? copy_process+0x579/0x3250 [ 1687.053337][ T1533] ? __kasan_check_write+0x14/0x20 [ 1687.058282][ T1533] copy_process+0x579/0x3250 [ 1687.062708][ T1533] ? __kasan_check_write+0x14/0x20 [ 1687.067655][ T1533] ? proc_fail_nth_write+0x213/0x290 [ 1687.072776][ T1533] ? proc_fail_nth_read+0x220/0x220 [ 1687.077813][ T1533] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1687.082758][ T1533] ? vfs_write+0x9af/0x1050 [ 1687.087096][ T1533] ? vmacache_update+0xb7/0x120 [ 1687.091785][ T1533] kernel_clone+0x22d/0x990 [ 1687.096125][ T1533] ? file_end_write+0x1b0/0x1b0 [ 1687.100809][ T1533] ? __kasan_check_write+0x14/0x20 [ 1687.105759][ T1533] ? create_io_thread+0x1e0/0x1e0 [ 1687.110616][ T1533] ? __mutex_lock_slowpath+0x10/0x10 [ 1687.115738][ T1533] __x64_sys_clone+0x289/0x310 [ 1687.120337][ T1533] ? __do_sys_vfork+0x130/0x130 [ 1687.125024][ T1533] ? debug_smp_processor_id+0x17/0x20 [ 1687.130230][ T1533] do_syscall_64+0x44/0xd0 [ 1687.134484][ T1533] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1687.140213][ T1533] RIP: 0033:0x7f03091130d9 [ 1687.144464][ T1533] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1687.163993][ T1533] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1687.172245][ T1533] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 10:14:40 executing program 4: syz_clone(0x80100000, 0x0, 0x1000000, &(0x7f00000001c0), 0x0, 0x0) [ 1687.180054][ T1533] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1687.187951][ T1533] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.195760][ T1533] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1687.203568][ T1533] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1687.211388][ T1533] [ 1687.215306][ T1532] CPU: 1 PID: 1532 Comm: syz-executor.1 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1687.225284][ T1532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1687.235184][ T1532] Call Trace: [ 1687.238300][ T1532] [ 1687.241109][ T1532] dump_stack_lvl+0x151/0x1b7 [ 1687.245595][ T1532] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1687.250890][ T1532] dump_stack+0x15/0x17 [ 1687.254878][ T1532] should_fail+0x3c0/0x510 [ 1687.259130][ T1532] should_fail_usercopy+0x1a/0x20 [ 1687.263993][ T1532] _copy_to_user+0x20/0x90 [ 1687.268242][ T1532] bpf_verifier_vlog+0x1a1/0x330 [ 1687.273020][ T1532] __btf_verifier_log+0xd1/0x120 [ 1687.277791][ T1532] ? stack_trace_save+0x1f0/0x1f0 [ 1687.282656][ T1532] ? btf_check_sec_info+0x500/0x500 [ 1687.287684][ T1532] ? put_dec+0xd1/0xe0 [ 1687.291594][ T1532] __btf_verifier_log_type+0x4f6/0x7f0 [ 1687.296885][ T1532] ? vsnprintf+0x1fa/0x1ce0 [ 1687.301223][ T1532] ? btf_ref_type_check_meta+0x114/0x570 [ 1687.306689][ T1532] ? sort_r+0x1ef/0x13a0 [ 1687.310768][ T1532] ? btf_int_show+0x2820/0x2820 [ 1687.315459][ T1532] ? vsnprintf+0x1c02/0x1ce0 [ 1687.319884][ T1532] ? btf_sec_info_cmp+0x5c/0x110 [ 1687.324658][ T1532] ? sort_r+0x1387/0x13a0 [ 1687.328823][ T1532] btf_ref_type_check_meta+0x76/0x570 [ 1687.334030][ T1532] btf_check_all_metas+0x398/0xad0 [ 1687.338980][ T1532] btf_parse_type_sec+0x141/0x1c20 [ 1687.343933][ T1532] ? __btf_verifier_log+0x120/0x120 [ 1687.348959][ T1532] ? sort+0x37/0x50 [ 1687.352604][ T1532] ? btf_check_sec_info+0x37d/0x500 [ 1687.357639][ T1532] ? btf_verifier_log+0x2a0/0x2a0 [ 1687.362496][ T1532] ? btf_parse_hdr+0x1e9/0x7e0 [ 1687.367097][ T1532] ? btf_float_log+0x60/0x60 [ 1687.371524][ T1532] ? btf_parse_hdr+0x601/0x7e0 [ 1687.376124][ T1532] ? btf_parse_str_sec+0x224/0x2c0 [ 1687.381075][ T1532] btf_new_fd+0x587/0x900 [ 1687.385235][ T1532] bpf_btf_load+0x6f/0x90 [ 1687.389424][ T1532] __sys_bpf+0x514/0x750 [ 1687.393481][ T1532] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1687.398689][ T1532] ? debug_smp_processor_id+0x17/0x20 [ 1687.403893][ T1532] __x64_sys_bpf+0x7c/0x90 [ 1687.408149][ T1532] do_syscall_64+0x44/0xd0 [ 1687.412401][ T1532] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1687.418126][ T1532] RIP: 0033:0x7fb4513de0d9 [ 1687.422382][ T1532] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1687.441820][ T1532] RSP: 002b:00007fb450151168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1687.450065][ T1532] RAX: ffffffffffffffda RBX: 00007fb4514fdf80 RCX: 00007fb4513de0d9 [ 1687.457876][ T1532] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000012 [ 1687.465687][ T1532] RBP: 00007fb4501511d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.473499][ T1532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 10:14:41 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async, rerun: 32) open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x2) (rerun: 32) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0x1, &(0x7f0000000000)="358d992dd5f78e460963000090e25c6620ca2a01fe", &(0x7f0000000040)=@tcp=r0, 0x4}, 0x20) (async) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140), 0x2, 0x3) 10:14:41 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, 0x0, &(0x7f0000000140)) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = open(&(0x7f0000000000)='./file0\x00', 0x10040, 0xa) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_vs\x00') r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101081, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0xe0, 0x0, &(0x7f0000000480)=[@decrefs={0x40046307, 0x3}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000004"], &(0x7f0000000240)={0x0, 0x18, 0x30}}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000680)=ANY=[@ANYBLOB="00616466000000000a0000000000000041000000000000002c00000000000000852a62770000000002000000000000000000000000000000852a62730100000003000000000000000000000000000000bf76383d1d5613fd9303df9955f20e94d59190e2bbb51b4cfd1fcde9e7bb2eebb112ad4705cfbc4c36392a4f4450b585cb3bed056371840d6d318ce29f63dfaf983bbccc25534dd34c98550e8c"], &(0x7f0000000300)={0x0, 0x20, 0x38}}}, @free_buffer, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x48, 0x18, &(0x7f00000003c0)={@flat=@handle={0x73682a85, 0x111e, 0x2}, @fd={0x66642a85, 0x0, r2}, @fd={0x66642a85, 0x0, r3}}, &(0x7f0000000440)={0x0, 0x18, 0x30}}}], 0xb6, 0x0, &(0x7f0000000580)="ab98ea6f4f41af075a93dc7789aee94f76ff551acbe1aa751443d1f895d63972e2d76b89e77e2adb7a9674cba07e09d0223baa138b1535ab9efef73982f100aaccf02312045d930ae4e2ac9bf5a7e18a8464df6045d1f4c1f48b170f778b1b6470a32137085ff0af6cc48c734610c72673822f51ecc199024717475b0fe798035531d0cc96f3cbb7430f47a2127c285e15b20b3b7bc1fbba00945900fe40f7ea8a8fb82a29e5d21f2f4ddff2ae1e669514a9cf76a9b4"}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x5f8, 0x1ff, 0x3, 0x1000, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2, 0xc}, 0x48) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r4, 0x20, &(0x7f0000000180)={&(0x7f00000000c0)=""/5, 0x5, 0x0, &(0x7f0000000100)=""/69, 0x45}}, 0x10) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f00000002c0), &(0x7f0000000800)=0x4) [ 1687.481310][ T1532] R13: 00007ffd88f2439f R14: 00007fb450151300 R15: 0000000000022000 [ 1687.489124][ T1532] [ 1687.509213][ T1550] FAULT_INJECTION: forcing a failure. [ 1687.509213][ T1550] name failslab, interval 1, probability 0, space 0, times 0 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1687.579670][ T1550] CPU: 1 PID: 1550 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1687.589671][ T1550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1687.599566][ T1550] Call Trace: [ 1687.602686][ T1550] [ 1687.605466][ T1550] dump_stack_lvl+0x151/0x1b7 [ 1687.609979][ T1550] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1687.615275][ T1550] dump_stack+0x15/0x17 [ 1687.619265][ T1550] should_fail+0x3c0/0x510 [ 1687.623521][ T1550] __should_failslab+0x9f/0xe0 [ 1687.628117][ T1550] should_failslab+0x9/0x20 [ 1687.632457][ T1550] kmem_cache_alloc+0x4f/0x2f0 [ 1687.637053][ T1550] ? copy_sighand+0x54/0x250 [ 1687.641481][ T1550] ? _raw_spin_unlock+0x4d/0x70 [ 1687.646166][ T1550] copy_sighand+0x54/0x250 [ 1687.650418][ T1550] copy_process+0x123f/0x3250 [ 1687.654933][ T1550] ? proc_fail_nth_write+0x213/0x290 [ 1687.660052][ T1550] ? proc_fail_nth_read+0x220/0x220 [ 1687.665173][ T1550] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1687.670119][ T1550] ? vfs_write+0x9af/0x1050 [ 1687.674465][ T1550] ? vmacache_update+0xb7/0x120 [ 1687.679147][ T1550] kernel_clone+0x22d/0x990 [ 1687.683488][ T1550] ? file_end_write+0x1b0/0x1b0 [ 1687.688171][ T1550] ? __kasan_check_write+0x14/0x20 [ 1687.693118][ T1550] ? create_io_thread+0x1e0/0x1e0 [ 1687.697980][ T1550] ? __mutex_lock_slowpath+0x10/0x10 [ 1687.703120][ T1550] __x64_sys_clone+0x289/0x310 [ 1687.707715][ T1550] ? __do_sys_vfork+0x130/0x130 [ 1687.712395][ T1550] ? debug_smp_processor_id+0x17/0x20 [ 1687.717600][ T1550] do_syscall_64+0x44/0xd0 [ 1687.721848][ T1550] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1687.727574][ T1550] RIP: 0033:0x7f03091130d9 [ 1687.731831][ T1550] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1687.751268][ T1550] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1687.759514][ T1550] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1687.767326][ T1550] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300beda941da90b72ba8a0000ffffffff0100000000000098fc4be600000000000600000d00000000030000000200000005"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:41 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = open(&(0x7f0000000000)='./file0\x00', 0x10040, 0xa) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_vs\x00') r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101081, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0xe0, 0x0, &(0x7f0000000480)=[@decrefs={0x40046307, 0x3}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000004"], &(0x7f0000000240)={0x0, 0x18, 0x30}}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000680)=ANY=[@ANYBLOB="00616466000000000a0000000000000041000000000000002c00000000000000852a62770000000002000000000000000000000000000000852a62730100000003000000000000000000000000000000bf76383d1d5613fd9303df9955f20e94d59190e2bbb51b4cfd1fcde9e7bb2eebb112ad4705cfbc4c36392a4f4450b585cb3bed056371840d6d318ce29f63dfaf983bbccc25534dd34c98550e8c"], &(0x7f0000000300)={0x0, 0x20, 0x38}}}, @free_buffer, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x48, 0x18, &(0x7f00000003c0)={@flat=@handle={0x73682a85, 0x111e, 0x2}, @fd={0x66642a85, 0x0, r2}, @fd={0x66642a85, 0x0, r3}}, &(0x7f0000000440)={0x0, 0x18, 0x30}}}], 0xb6, 0x0, &(0x7f0000000580)="ab98ea6f4f41af075a93dc7789aee94f76ff551acbe1aa751443d1f895d63972e2d76b89e77e2adb7a9674cba07e09d0223baa138b1535ab9efef73982f100aaccf02312045d930ae4e2ac9bf5a7e18a8464df6045d1f4c1f48b170f778b1b6470a32137085ff0af6cc48c734610c72673822f51ecc199024717475b0fe798035531d0cc96f3cbb7430f47a2127c285e15b20b3b7bc1fbba00945900fe40f7ea8a8fb82a29e5d21f2f4ddff2ae1e669514a9cf76a9b4"}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x5f8, 0x1ff, 0x3, 0x1000, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2, 0xc}, 0x48) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r4, 0x20, &(0x7f0000000180)={&(0x7f00000000c0)=""/5, 0x5, 0x0, &(0x7f0000000100)=""/69, 0x45}}, 0x10) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f00000002c0), &(0x7f0000000800)=0x4) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) open(&(0x7f0000000000)='./file0\x00', 0x10040, 0xa) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) (async) write$binfmt_elf32(r1, 0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_vs\x00') (async) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101081, 0x0) (async) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0xe0, 0x0, &(0x7f0000000480)=[@decrefs={0x40046307, 0x3}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000004"], &(0x7f0000000240)={0x0, 0x18, 0x30}}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000680)=ANY=[@ANYBLOB="00616466000000000a0000000000000041000000000000002c00000000000000852a62770000000002000000000000000000000000000000852a62730100000003000000000000000000000000000000bf76383d1d5613fd9303df9955f20e94d59190e2bbb51b4cfd1fcde9e7bb2eebb112ad4705cfbc4c36392a4f4450b585cb3bed056371840d6d318ce29f63dfaf983bbccc25534dd34c98550e8c"], &(0x7f0000000300)={0x0, 0x20, 0x38}}}, @free_buffer, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x48, 0x18, &(0x7f00000003c0)={@flat=@handle={0x73682a85, 0x111e, 0x2}, @fd={0x66642a85, 0x0, r2}, @fd={0x66642a85, 0x0, r3}}, &(0x7f0000000440)={0x0, 0x18, 0x30}}}], 0xb6, 0x0, &(0x7f0000000580)="ab98ea6f4f41af075a93dc7789aee94f76ff551acbe1aa751443d1f895d63972e2d76b89e77e2adb7a9674cba07e09d0223baa138b1535ab9efef73982f100aaccf02312045d930ae4e2ac9bf5a7e18a8464df6045d1f4c1f48b170f778b1b6470a32137085ff0af6cc48c734610c72673822f51ecc199024717475b0fe798035531d0cc96f3cbb7430f47a2127c285e15b20b3b7bc1fbba00945900fe40f7ea8a8fb82a29e5d21f2f4ddff2ae1e669514a9cf76a9b4"}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x5f8, 0x1ff, 0x3, 0x1000, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2, 0xc}, 0x48) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r4, 0x20, &(0x7f0000000180)={&(0x7f00000000c0)=""/5, 0x5, 0x0, &(0x7f0000000100)=""/69, 0x45}}, 0x10) (async) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) (async) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f00000002c0), &(0x7f0000000800)=0x4) (async) 10:14:41 executing program 4: syz_clone(0x80100000, 0x0, 0x2000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1687.775138][ T1550] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1687.782946][ T1550] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1687.790758][ T1550] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1687.798573][ T1550] 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) r0 = open(&(0x7f0000000000)='./file0\x00', 0x10040, 0xa) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) (async) r2 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip_vs\x00') (async) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000380), 0x101081, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000640)={0xe0, 0x0, &(0x7f0000000480)=[@decrefs={0x40046307, 0x3}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x48, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000004"], &(0x7f0000000240)={0x0, 0x18, 0x30}}}, @transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000680)=ANY=[@ANYBLOB="00616466000000000a0000000000000041000000000000002c00000000000000852a62770000000002000000000000000000000000000000852a62730100000003000000000000000000000000000000bf76383d1d5613fd9303df9955f20e94d59190e2bbb51b4cfd1fcde9e7bb2eebb112ad4705cfbc4c36392a4f4450b585cb3bed056371840d6d318ce29f63dfaf983bbccc25534dd34c98550e8c"], &(0x7f0000000300)={0x0, 0x20, 0x38}}}, @free_buffer, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x48, 0x18, &(0x7f00000003c0)={@flat=@handle={0x73682a85, 0x111e, 0x2}, @fd={0x66642a85, 0x0, r2}, @fd={0x66642a85, 0x0, r3}}, &(0x7f0000000440)={0x0, 0x18, 0x30}}}], 0xb6, 0x0, &(0x7f0000000580)="ab98ea6f4f41af075a93dc7789aee94f76ff551acbe1aa751443d1f895d63972e2d76b89e77e2adb7a9674cba07e09d0223baa138b1535ab9efef73982f100aaccf02312045d930ae4e2ac9bf5a7e18a8464df6045d1f4c1f48b170f778b1b6470a32137085ff0af6cc48c734610c72673822f51ecc199024717475b0fe798035531d0cc96f3cbb7430f47a2127c285e15b20b3b7bc1fbba00945900fe40f7ea8a8fb82a29e5d21f2f4ddff2ae1e669514a9cf76a9b4"}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x5f8, 0x1ff, 0x3, 0x1000, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x0, 0x2, 0xc}, 0x48) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r4, 0x20, &(0x7f0000000180)={&(0x7f00000000c0)=""/5, 0x5, 0x0, &(0x7f0000000100)=""/69, 0x45}}, 0x10) (async) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x65, &(0x7f00000002c0), &(0x7f0000000800)=0x4) 10:14:41 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:41 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, 0x0, &(0x7f0000000140)) 10:14:41 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 10:14:41 executing program 4: syz_clone(0x80100000, 0x0, 0x7000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:41 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x880, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'sit0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x700, 0x80, 0xffffffff, 0x6, {{0x19, 0x4, 0x3, 0x1a, 0x64, 0x66, 0x0, 0x0, 0x2f, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x73, 0x0, 0x1, [0xffffffd5]}, @rr={0x7, 0xb, 0xa7, [@rand_addr=0x64010100, @multicast2]}, @generic={0x83, 0x11, "7a683e0d1e2fba0c77f34845b20255"}, @rr={0x7, 0xb, 0xd6, [@multicast2, @remote]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x1b, 0x21, [@empty, @private=0xa010100, @remote, @rand_addr=0x64010102, @local, @local]}]}}}}}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r1, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xbc}]}, 0x44}, 0x1, 0x0, 0x0, 0xc}, 0x401) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300beda941d"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:41 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x880, 0x0) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'sit0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x700, 0x80, 0xffffffff, 0x6, {{0x19, 0x4, 0x3, 0x1a, 0x64, 0x66, 0x0, 0x0, 0x2f, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x73, 0x0, 0x1, [0xffffffd5]}, @rr={0x7, 0xb, 0xa7, [@rand_addr=0x64010100, @multicast2]}, @generic={0x83, 0x11, "7a683e0d1e2fba0c77f34845b20255"}, @rr={0x7, 0xb, 0xd6, [@multicast2, @remote]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x1b, 0x21, [@empty, @private=0xa010100, @remote, @rand_addr=0x64010102, @local, @local]}]}}}}}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r1, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xbc}]}, 0x44}, 0x1, 0x0, 0x0, 0xc}, 0x401) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x880, 0x0) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'sit0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x700, 0x80, 0xffffffff, 0x6, {{0x19, 0x4, 0x3, 0x1a, 0x64, 0x66, 0x0, 0x0, 0x2f, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x73, 0x0, 0x1, [0xffffffd5]}, @rr={0x7, 0xb, 0xa7, [@rand_addr=0x64010100, @multicast2]}, @generic={0x83, 0x11, "7a683e0d1e2fba0c77f34845b20255"}, @rr={0x7, 0xb, 0xd6, [@multicast2, @remote]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x1b, 0x21, [@empty, @private=0xa010100, @remote, @rand_addr=0x64010102, @local, @local]}]}}}}}) (async) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r1, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xbc}]}, 0x44}, 0x1, 0x0, 0x0, 0xc}, 0x401) (async) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x880, 0x0) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000180)={'sit0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x700, 0x80, 0xffffffff, 0x6, {{0x19, 0x4, 0x3, 0x1a, 0x64, 0x66, 0x0, 0x0, 0x2f, 0x0, @remote, @loopback, {[@timestamp={0x44, 0x8, 0x73, 0x0, 0x1, [0xffffffd5]}, @rr={0x7, 0xb, 0xa7, [@rand_addr=0x64010100, @multicast2]}, @generic={0x83, 0x11, "7a683e0d1e2fba0c77f34845b20255"}, @rr={0x7, 0xb, 0xd6, [@multicast2, @remote]}, @ra={0x94, 0x4}, @lsrr={0x83, 0x1b, 0x21, [@empty, @private=0xa010100, @remote, @rand_addr=0x64010102, @local, @local]}]}}}}}) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x44, r1, 0x2, 0x70bd2d, 0x25dfdbfe, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x9}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0xbc}]}, 0x44}, 0x1, 0x0, 0x0, 0xc}, 0x401) 10:14:41 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1687.974891][ T1603] FAULT_INJECTION: forcing a failure. [ 1687.974891][ T1603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1688.021328][ T1603] CPU: 0 PID: 1603 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1688.031314][ T1603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1688.041209][ T1603] Call Trace: [ 1688.044334][ T1603] [ 1688.047115][ T1603] dump_stack_lvl+0x151/0x1b7 [ 1688.051623][ T1603] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1688.056918][ T1603] dump_stack+0x15/0x17 [ 1688.060910][ T1603] should_fail+0x3c0/0x510 [ 1688.065162][ T1603] should_fail_alloc_page+0x58/0x70 [ 1688.070195][ T1603] __alloc_pages+0x1de/0x7c0 [ 1688.074625][ T1603] ? __count_vm_events+0x30/0x30 [ 1688.079397][ T1603] ? __kasan_kmalloc+0x9/0x10 [ 1688.083909][ T1603] ? __kmalloc+0x203/0x350 [ 1688.088164][ T1603] ? __vmalloc_node_range+0x2e3/0x800 [ 1688.093369][ T1603] __vmalloc_node_range+0x48f/0x800 [ 1688.098408][ T1603] dup_task_struct+0x61f/0xa60 [ 1688.103006][ T1603] ? copy_process+0x579/0x3250 [ 1688.107613][ T1603] ? __kasan_check_write+0x14/0x20 [ 1688.112552][ T1603] copy_process+0x579/0x3250 [ 1688.116978][ T1603] ? __kasan_check_write+0x14/0x20 [ 1688.121924][ T1603] ? proc_fail_nth_write+0x213/0x290 [ 1688.127045][ T1603] ? proc_fail_nth_read+0x220/0x220 [ 1688.132089][ T1603] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1688.137028][ T1603] ? vfs_write+0x9af/0x1050 [ 1688.141364][ T1603] ? vmacache_update+0xb7/0x120 [ 1688.146054][ T1603] kernel_clone+0x22d/0x990 [ 1688.150391][ T1603] ? file_end_write+0x1b0/0x1b0 [ 1688.155078][ T1603] ? __kasan_check_write+0x14/0x20 [ 1688.160025][ T1603] ? create_io_thread+0x1e0/0x1e0 [ 1688.164889][ T1603] ? __mutex_lock_slowpath+0x10/0x10 [ 1688.170009][ T1603] __x64_sys_clone+0x289/0x310 [ 1688.174607][ T1603] ? __do_sys_vfork+0x130/0x130 [ 1688.179296][ T1603] ? debug_smp_processor_id+0x17/0x20 [ 1688.184503][ T1603] do_syscall_64+0x44/0xd0 [ 1688.188755][ T1603] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1688.194482][ T1603] RIP: 0033:0x7f03091130d9 [ 1688.198739][ T1603] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:14:41 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000)="4db426bf01fc793ee935db68689159b2225b1664b9e91360fad462ad1b7caafa79c08e8e3f9622c85908703bb4d4a57cd99d0134a81c9e3f19b1ab260f58662765f19e6a115ec784de546f88990156b21fd1d5e2cf91a94bb42444562e112541ac476e49c5c60add78a30b4085445b3cf334e8639e3c37d9ab9375b1cfff18343d72ca615467ed318b3185670f452c6a4298a4629a538d2cbb4a84ea9ec4c3224755832b8c90d27db6d2d4fb85ce3ea7d5aeac33ae8b354d0853f3ff4ea28e6896f683eea2dff146b118cb", 0xcb, 0x6, 0x0, 0x2}, &(0x7f0000000140)) [ 1688.218177][ T1603] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1688.226423][ T1603] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1688.234231][ T1603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1688.242044][ T1603] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.249858][ T1603] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1688.257666][ T1603] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1688.265484][ T1603] 10:14:41 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 10:14:41 executing program 4: syz_clone(0x80100000, 0x0, 0x8000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:41 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x1) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x4, r1}, 0x10) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f00000000c0)={r2}) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:41 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x1) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x4, r1}, 0x10) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f00000000c0)={r2}) bpf$PROG_LOAD(0x9, 0x0, 0x1) (async) pipe2$watch_queue(&(0x7f0000000000), 0x80) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x4, r1}, 0x10) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) (async) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f00000000c0)={r2}) (async) 10:14:41 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x2}, &(0x7f0000000140)) 10:14:41 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1688.329605][ T1631] FAULT_INJECTION: forcing a failure. [ 1688.329605][ T1631] name failslab, interval 1, probability 0, space 0, times 0 [ 1688.416478][ T1631] CPU: 1 PID: 1631 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1688.426469][ T1631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1688.436375][ T1631] Call Trace: [ 1688.439491][ T1631] [ 1688.442272][ T1631] dump_stack_lvl+0x151/0x1b7 [ 1688.446783][ T1631] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1688.452088][ T1631] dump_stack+0x15/0x17 [ 1688.456070][ T1631] should_fail+0x3c0/0x510 [ 1688.460321][ T1631] __should_failslab+0x9f/0xe0 [ 1688.464921][ T1631] should_failslab+0x9/0x20 [ 1688.469268][ T1631] kmem_cache_alloc+0x4f/0x2f0 [ 1688.473895][ T1631] ? dup_mm+0x29/0x330 [ 1688.477773][ T1631] dup_mm+0x29/0x330 [ 1688.481497][ T1631] copy_mm+0x108/0x1b0 [ 1688.485404][ T1631] copy_process+0x1295/0x3250 [ 1688.489917][ T1631] ? proc_fail_nth_write+0x213/0x290 [ 1688.495039][ T1631] ? proc_fail_nth_read+0x220/0x220 [ 1688.500068][ T1631] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1688.505017][ T1631] ? vfs_write+0x9af/0x1050 [ 1688.509355][ T1631] ? vmacache_update+0xb7/0x120 [ 1688.514043][ T1631] kernel_clone+0x22d/0x990 [ 1688.518384][ T1631] ? file_end_write+0x1b0/0x1b0 [ 1688.523066][ T1631] ? __kasan_check_write+0x14/0x20 [ 1688.528015][ T1631] ? create_io_thread+0x1e0/0x1e0 [ 1688.532880][ T1631] ? __mutex_lock_slowpath+0x10/0x10 [ 1688.537998][ T1631] __x64_sys_clone+0x289/0x310 [ 1688.542595][ T1631] ? __do_sys_vfork+0x130/0x130 [ 1688.547287][ T1631] ? debug_smp_processor_id+0x17/0x20 [ 1688.552491][ T1631] do_syscall_64+0x44/0xd0 [ 1688.556743][ T1631] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1688.562470][ T1631] RIP: 0033:0x7f03091130d9 [ 1688.566724][ T1631] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1688.586169][ T1631] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1688.594412][ T1631] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1688.602228][ T1631] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1688.610039][ T1631] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1688.617843][ T1631] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1688.625659][ T1631] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1688.633473][ T1631] 10:14:42 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) 10:14:42 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x1) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x4, r1}, 0x10) (async) r2 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000080)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f00000000c0)={r2}) 10:14:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 4: syz_clone(0x80100000, 0x0, 0x9000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:42 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000140)) 10:14:42 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f0000000180)) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000000)) bpf$PROG_LOAD(0x9, 0x0, 0x2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000100)={{}, {0x1, 0x8}, [], {0x4, 0x3}, [{0x8, 0x2, 0xffffffffffffffff}], {0x10, 0x1}, {0x20, 0x1}}, 0x2c, 0x2) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@broadcast, 0x0, 0x0, 0x60, 0x0, [{@loopback}, {@empty}, {@multicast1}, {@private}, {}, {}]}}) 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:42 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f0000000180)) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000000)) bpf$PROG_LOAD(0x9, 0x0, 0x2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000100)={{}, {0x1, 0x8}, [], {0x4, 0x3}, [{0x8, 0x2, 0xffffffffffffffff}], {0x10, 0x1}, {0x20, 0x1}}, 0x2c, 0x2) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@broadcast, 0x0, 0x0, 0x60, 0x0, [{@loopback}, {@empty}, {@multicast1}, {@private}, {}, {}]}}) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f0000000180)) (async) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000000)) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) (async) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000100)={{}, {0x1, 0x8}, [], {0x4, 0x3}, [{0x8, 0x2, 0xffffffffffffffff}], {0x10, 0x1}, {0x20, 0x1}}, 0x2c, 0x2) (async) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@broadcast, 0x0, 0x0, 0x60, 0x0, [{@loopback}, {@empty}, {@multicast1}, {@private}, {}, {}]}}) (async) 10:14:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1688.751996][ T1669] FAULT_INJECTION: forcing a failure. [ 1688.751996][ T1669] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1688.775624][ T1669] CPU: 1 PID: 1669 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1688.785613][ T1669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1688.795510][ T1669] Call Trace: [ 1688.798632][ T1669] [ 1688.801410][ T1669] dump_stack_lvl+0x151/0x1b7 [ 1688.805924][ T1669] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1688.811221][ T1669] dump_stack+0x15/0x17 [ 1688.815210][ T1669] should_fail+0x3c0/0x510 [ 1688.819464][ T1669] should_fail_alloc_page+0x58/0x70 [ 1688.824500][ T1669] __alloc_pages+0x1de/0x7c0 [ 1688.828924][ T1669] ? __count_vm_events+0x30/0x30 [ 1688.833697][ T1669] ? __kasan_kmalloc+0x9/0x10 [ 1688.838207][ T1669] ? __kmalloc+0x203/0x350 [ 1688.842460][ T1669] ? __vmalloc_node_range+0x2e3/0x800 [ 1688.847669][ T1669] __vmalloc_node_range+0x48f/0x800 [ 1688.852705][ T1669] dup_task_struct+0x61f/0xa60 [ 1688.857301][ T1669] ? copy_process+0x579/0x3250 [ 1688.861903][ T1669] ? __kasan_check_write+0x14/0x20 [ 1688.866860][ T1669] copy_process+0x579/0x3250 [ 1688.871274][ T1669] ? __kasan_check_write+0x14/0x20 [ 1688.876225][ T1669] ? proc_fail_nth_write+0x213/0x290 [ 1688.881344][ T1669] ? proc_fail_nth_read+0x220/0x220 [ 1688.886384][ T1669] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1688.891322][ T1669] ? vfs_write+0x9af/0x1050 [ 1688.895664][ T1669] ? vmacache_update+0xb7/0x120 [ 1688.900356][ T1669] kernel_clone+0x22d/0x990 [ 1688.904689][ T1669] ? file_end_write+0x1b0/0x1b0 [ 1688.909381][ T1669] ? __kasan_check_write+0x14/0x20 [ 1688.914331][ T1669] ? create_io_thread+0x1e0/0x1e0 [ 1688.919183][ T1669] ? __mutex_lock_slowpath+0x10/0x10 [ 1688.924304][ T1669] __x64_sys_clone+0x289/0x310 [ 1688.928913][ T1669] ? __do_sys_vfork+0x130/0x130 [ 1688.933595][ T1669] ? debug_smp_processor_id+0x17/0x20 [ 1688.938799][ T1669] do_syscall_64+0x44/0xd0 [ 1688.943051][ T1669] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1688.948782][ T1669] RIP: 0033:0x7f03091130d9 [ 1688.953032][ T1669] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1688.972476][ T1669] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1688.980723][ T1669] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1688.988533][ T1669] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:14:42 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13) 10:14:42 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f0000000180)) (async) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000000)) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$system_posix_acl(r1, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000100)={{}, {0x1, 0x8}, [], {0x4, 0x3}, [{0x8, 0x2, 0xffffffffffffffff}], {0x10, 0x1}, {0x20, 0x1}}, 0x2c, 0x2) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={@broadcast, 0x0, 0x0, 0x60, 0x0, [{@loopback}, {@empty}, {@multicast1}, {@private}, {}, {}]}}) 10:14:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200000003"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 4: syz_clone(0x80100000, 0x0, 0x10000200, &(0x7f00000001c0), 0x0, 0x0) [ 1688.996343][ T1669] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1689.004153][ T1669] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1689.011967][ T1669] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1689.019782][ T1669] [ 1689.043168][ T1694] FAULT_INJECTION: forcing a failure. 10:14:42 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000140)) 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1689.043168][ T1694] name fail_page_alloc, interval 1, probability 0, space 0, times 0 10:14:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200000003"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1689.073841][ T1694] CPU: 1 PID: 1694 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1689.083832][ T1694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1689.093727][ T1694] Call Trace: [ 1689.096849][ T1694] [ 1689.099624][ T1694] dump_stack_lvl+0x151/0x1b7 [ 1689.104142][ T1694] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1689.109436][ T1694] dump_stack+0x15/0x17 [ 1689.113427][ T1694] should_fail+0x3c0/0x510 [ 1689.117680][ T1694] should_fail_alloc_page+0x58/0x70 [ 1689.122714][ T1694] __alloc_pages+0x1de/0x7c0 [ 1689.127143][ T1694] ? __count_vm_events+0x30/0x30 [ 1689.131913][ T1694] ? __kasan_kmalloc+0x9/0x10 [ 1689.136423][ T1694] ? __kmalloc+0x203/0x350 [ 1689.140676][ T1694] ? __vmalloc_node_range+0x2e3/0x800 [ 1689.145888][ T1694] __vmalloc_node_range+0x48f/0x800 [ 1689.150922][ T1694] dup_task_struct+0x61f/0xa60 [ 1689.155520][ T1694] ? copy_process+0x579/0x3250 [ 1689.160119][ T1694] ? __kasan_check_write+0x14/0x20 [ 1689.165069][ T1694] copy_process+0x579/0x3250 [ 1689.169494][ T1694] ? __kasan_check_write+0x14/0x20 [ 1689.174437][ T1694] ? proc_fail_nth_write+0x213/0x290 [ 1689.179561][ T1694] ? proc_fail_nth_read+0x220/0x220 [ 1689.184595][ T1694] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1689.189541][ T1694] ? vfs_write+0x9af/0x1050 [ 1689.193887][ T1694] ? vmacache_update+0xb7/0x120 [ 1689.198567][ T1694] kernel_clone+0x22d/0x990 [ 1689.202911][ T1694] ? file_end_write+0x1b0/0x1b0 [ 1689.207592][ T1694] ? __kasan_check_write+0x14/0x20 [ 1689.212542][ T1694] ? create_io_thread+0x1e0/0x1e0 [ 1689.217403][ T1694] ? __mutex_lock_slowpath+0x10/0x10 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 4: syz_clone(0x80100000, 0x0, 0x11000000, &(0x7f00000001c0), 0x0, 0x0) [ 1689.222525][ T1694] __x64_sys_clone+0x289/0x310 [ 1689.227122][ T1694] ? __do_sys_vfork+0x130/0x130 [ 1689.231810][ T1694] ? debug_smp_processor_id+0x17/0x20 [ 1689.237015][ T1694] do_syscall_64+0x44/0xd0 [ 1689.241268][ T1694] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1689.246996][ T1694] RIP: 0033:0x7f03091130d9 [ 1689.251257][ T1694] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="67726574617030000000000000220000e44197e50102dfa217db239774cceda9272b18cb268f6e503e567e2908017e596e587e21b82bc235b92f9abd47f47086968f438a3c1ed8fe9b99fad767b16dea8a8fa5290230875ee06f2459ad42b725b2d9ad517aa9de5bd60cc236e3f10217e1207c", @ANYRES32=0x0, @ANYBLOB="000778000000000600007fff4e9500da6257025badcee978e00000010000000001890b437f0000017f00000194040100890f13ac14144100000000ac1414bb8307a6ac1414aa864500000000050eb7912d3fefea6efaed31ac8d03000000020863f8e92d7907070ed0a29828c6e9192412bdbd350607ea964ab1a20506d5448092070a124ccb47288262ea8618ffffffff010862e821a9cff5020a0e4f3f688ecb8fb6891ff5ac14141f7f000001ac1e0101ac1414aa00000000e0000001ac1414bb0000"]}) 10:14:42 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14) 10:14:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200000003"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="67726574617030000000000000220000e44197e50102dfa217db239774cceda9272b18cb268f6e503e567e2908017e596e587e21b82bc235b92f9abd47f47086968f438a3c1ed8fe9b99fad767b16dea8a8fa5290230875ee06f2459ad42b725b2d9ad517aa9de5bd60cc236e3f10217e1207c", @ANYRES32=0x0, @ANYBLOB="000778000000000600007fff4e9500da6257025badcee978e00000010000000001890b437f0000017f00000194040100890f13ac14144100000000ac1414bb8307a6ac1414aa864500000000050eb7912d3fefea6efaed31ac8d03000000020863f8e92d7907070ed0a29828c6e9192412bdbd350607ea964ab1a20506d5448092070a124ccb47288262ea8618ffffffff010862e821a9cff5020a0e4f3f688ecb8fb6891ff5ac14141f7f000001ac1e0101ac1414aa00000000e0000001ac1414bb0000"]}) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="67726574617030000000000000220000e44197e50102dfa217db239774cceda9272b18cb268f6e503e567e2908017e596e587e21b82bc235b92f9abd47f47086968f438a3c1ed8fe9b99fad767b16dea8a8fa5290230875ee06f2459ad42b725b2d9ad517aa9de5bd60cc236e3f10217e1207c", @ANYRES32=0x0, @ANYBLOB="000778000000000600007fff4e9500da6257025badcee978e00000010000000001890b437f0000017f00000194040100890f13ac14144100000000ac1414bb8307a6ac1414aa864500000000050eb7912d3fefea6efaed31ac8d03000000020863f8e92d7907070ed0a29828c6e9192412bdbd350607ea964ab1a20506d5448092070a124ccb47288262ea8618ffffffff010862e821a9cff5020a0e4f3f688ecb8fb6891ff5ac14141f7f000001ac1e0101ac1414aa00000000e0000001ac1414bb0000"]}) (async) [ 1689.270692][ T1694] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1689.278939][ T1694] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1689.286746][ T1694] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1689.294564][ T1694] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1689.302379][ T1694] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1689.310182][ T1694] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1689.317995][ T1694] 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000140)) 10:14:42 executing program 4: syz_clone(0x80100000, 0x0, 0x1f000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300beda"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1689.357688][ T1724] FAULT_INJECTION: forcing a failure. [ 1689.357688][ T1724] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1689.386000][ T1724] CPU: 1 PID: 1724 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1689.395996][ T1724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1689.405896][ T1724] Call Trace: [ 1689.409016][ T1724] [ 1689.411789][ T1724] dump_stack_lvl+0x151/0x1b7 [ 1689.416304][ T1724] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1689.421598][ T1724] dump_stack+0x15/0x17 [ 1689.425590][ T1724] should_fail+0x3c0/0x510 [ 1689.429843][ T1724] should_fail_alloc_page+0x58/0x70 [ 1689.434878][ T1724] __alloc_pages+0x1de/0x7c0 [ 1689.439304][ T1724] ? __count_vm_events+0x30/0x30 [ 1689.444079][ T1724] ? __kasan_kmalloc+0x9/0x10 [ 1689.448586][ T1724] ? __kmalloc+0x203/0x350 [ 1689.452842][ T1724] ? __vmalloc_node_range+0x2e3/0x800 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:42 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1689.458051][ T1724] __vmalloc_node_range+0x48f/0x800 [ 1689.463085][ T1724] dup_task_struct+0x61f/0xa60 [ 1689.467687][ T1724] ? copy_process+0x579/0x3250 [ 1689.472290][ T1724] ? __kasan_check_write+0x14/0x20 [ 1689.477237][ T1724] copy_process+0x579/0x3250 [ 1689.481660][ T1724] ? __kasan_check_write+0x14/0x20 [ 1689.486602][ T1724] ? proc_fail_nth_write+0x213/0x290 [ 1689.491727][ T1724] ? proc_fail_nth_read+0x220/0x220 [ 1689.496758][ T1724] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1689.501964][ T1724] ? vfs_write+0x9af/0x1050 [ 1689.506304][ T1724] ? vmacache_update+0xb7/0x120 [ 1689.511005][ T1724] kernel_clone+0x22d/0x990 [ 1689.515332][ T1724] ? file_end_write+0x1b0/0x1b0 [ 1689.520018][ T1724] ? __kasan_check_write+0x14/0x20 [ 1689.525311][ T1724] ? create_io_thread+0x1e0/0x1e0 [ 1689.530169][ T1724] ? __mutex_lock_slowpath+0x10/0x10 [ 1689.535289][ T1724] __x64_sys_clone+0x289/0x310 [ 1689.539889][ T1724] ? __do_sys_vfork+0x130/0x130 [ 1689.544577][ T1724] ? debug_smp_processor_id+0x17/0x20 [ 1689.549784][ T1724] do_syscall_64+0x44/0xd0 [ 1689.554035][ T1724] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1689.559767][ T1724] RIP: 0033:0x7f03091130d9 [ 1689.564191][ T1724] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1689.583631][ T1724] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1689.591881][ T1724] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1689.599685][ T1724] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1689.607498][ T1724] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1689.615311][ T1724] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1689.623120][ T1724] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1689.630934][ T1724] 10:14:43 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15) 10:14:43 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:43 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="67726574617030000000000000220000e44197e50102dfa217db239774cceda9272b18cb268f6e503e567e2908017e596e587e21b82bc235b92f9abd47f47086968f438a3c1ed8fe9b99fad767b16dea8a8fa5290230875ee06f2459ad42b725b2d9ad517aa9de5bd60cc236e3f10217e1207c", @ANYRES32=0x0, @ANYBLOB="000778000000000600007fff4e9500da6257025badcee978e00000010000000001890b437f0000017f00000194040100890f13ac14144100000000ac1414bb8307a6ac1414aa864500000000050eb7912d3fefea6efaed31ac8d03000000020863f8e92d7907070ed0a29828c6e9192412bdbd350607ea964ab1a20506d5448092070a124ccb47288262ea8618ffffffff010862e821a9cff5020a0e4f3f688ecb8fb6891ff5ac14141f7f000001ac1e0101ac1414aa00000000e0000001ac1414bb0000"]}) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="67726574617030000000000000220000e44197e50102dfa217db239774cceda9272b18cb268f6e503e567e2908017e596e587e21b82bc235b92f9abd47f47086968f438a3c1ed8fe9b99fad767b16dea8a8fa5290230875ee06f2459ad42b725b2d9ad517aa9de5bd60cc236e3f10217e1207c", @ANYRES32=0x0, @ANYBLOB="000778000000000600007fff4e9500da6257025badcee978e00000010000000001890b437f0000017f00000194040100890f13ac14144100000000ac1414bb8307a6ac1414aa864500000000050eb7912d3fefea6efaed31ac8d03000000020863f8e92d7907070ed0a29828c6e9192412bdbd350607ea964ab1a20506d5448092070a124ccb47288262ea8618ffffffff010862e821a9cff5020a0e4f3f688ecb8fb6891ff5ac14141f7f000001ac1e0101ac1414aa00000000e0000001ac1414bb0000"]}) (async) 10:14:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:43 executing program 4: syz_clone(0x80100000, 0x0, 0x1ffff000, &(0x7f00000001c0), 0x0, 0x0) 10:14:43 executing program 3: io_setup(0x3, &(0x7f00000001c0)=0x0) io_cancel(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_cancel(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 10:14:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:43 executing program 1: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:43 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) 10:14:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:43 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async, rerun: 64) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) (rerun: 64) 10:14:43 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x2200, 0x0) (async) [ 1689.881257][ T1767] FAULT_INJECTION: forcing a failure. [ 1689.881257][ T1767] name failslab, interval 1, probability 0, space 0, times 0 [ 1689.943775][ T1767] CPU: 1 PID: 1767 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1689.953778][ T1767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1689.963657][ T1767] Call Trace: [ 1689.966779][ T1767] [ 1689.969557][ T1767] dump_stack_lvl+0x151/0x1b7 [ 1689.974070][ T1767] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1689.979366][ T1767] dump_stack+0x15/0x17 [ 1689.983355][ T1767] should_fail+0x3c0/0x510 [ 1689.987611][ T1767] __should_failslab+0x9f/0xe0 [ 1689.992210][ T1767] should_failslab+0x9/0x20 [ 1689.996720][ T1767] kmem_cache_alloc+0x4f/0x2f0 [ 1690.001322][ T1767] ? vm_area_dup+0x26/0x1d0 [ 1690.005662][ T1767] ? __kasan_check_read+0x11/0x20 [ 1690.010522][ T1767] vm_area_dup+0x26/0x1d0 [ 1690.014689][ T1767] dup_mmap+0x6b8/0xea0 [ 1690.018681][ T1767] ? __delayed_free_task+0x20/0x20 [ 1690.023630][ T1767] ? mm_init+0x807/0x960 [ 1690.027708][ T1767] dup_mm+0x91/0x330 [ 1690.031441][ T1767] copy_mm+0x108/0x1b0 [ 1690.035346][ T1767] copy_process+0x1295/0x3250 [ 1690.039861][ T1767] ? proc_fail_nth_write+0x213/0x290 [ 1690.044981][ T1767] ? proc_fail_nth_read+0x220/0x220 [ 1690.050013][ T1767] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1690.054960][ T1767] ? vfs_write+0x9af/0x1050 [ 1690.059298][ T1767] ? vmacache_update+0xb7/0x120 [ 1690.063988][ T1767] kernel_clone+0x22d/0x990 [ 1690.068324][ T1767] ? file_end_write+0x1b0/0x1b0 [ 1690.073012][ T1767] ? __kasan_check_write+0x14/0x20 [ 1690.077961][ T1767] ? create_io_thread+0x1e0/0x1e0 [ 1690.082820][ T1767] ? __mutex_lock_slowpath+0x10/0x10 [ 1690.087946][ T1767] __x64_sys_clone+0x289/0x310 [ 1690.092539][ T1767] ? __do_sys_vfork+0x130/0x130 [ 1690.097316][ T1767] ? debug_smp_processor_id+0x17/0x20 [ 1690.102522][ T1767] do_syscall_64+0x44/0xd0 [ 1690.106772][ T1767] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1690.112501][ T1767] RIP: 0033:0x7f03091130d9 [ 1690.116756][ T1767] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1690.136195][ T1767] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1690.144441][ T1767] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1690.152246][ T1767] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1690.160059][ T1767] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1690.167873][ T1767] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1690.175685][ T1767] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1690.183503][ T1767] 10:14:43 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) 10:14:43 executing program 1: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:43 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x20000, 0x1, 0x0, 0x1001, 0xffffffffffffffff, 0xffffff81, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x7}, 0x48) 10:14:43 executing program 4: syz_clone(0x80100000, 0x0, 0x20000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:43 executing program 1: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:43 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:43 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x20000, 0x1, 0x0, 0x1001, 0xffffffffffffffff, 0xffffff81, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x7}, 0x48) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg1\x00'}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x20000, 0x1, 0x0, 0x1001, 0xffffffffffffffff, 0xffffff81, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x7}, 0x48) (async) 10:14:43 executing program 1: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1690.408717][ T1788] FAULT_INJECTION: forcing a failure. [ 1690.408717][ T1788] name failslab, interval 1, probability 0, space 0, times 0 [ 1690.481441][ T1788] CPU: 0 PID: 1788 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1690.491436][ T1788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1690.501328][ T1788] Call Trace: [ 1690.504450][ T1788] [ 1690.507227][ T1788] dump_stack_lvl+0x151/0x1b7 [ 1690.511740][ T1788] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1690.517036][ T1788] dump_stack+0x15/0x17 [ 1690.521027][ T1788] should_fail+0x3c0/0x510 [ 1690.525280][ T1788] __should_failslab+0x9f/0xe0 [ 1690.529882][ T1788] should_failslab+0x9/0x20 [ 1690.534221][ T1788] kmem_cache_alloc+0x4f/0x2f0 [ 1690.538910][ T1788] ? vm_area_dup+0x26/0x1d0 [ 1690.543248][ T1788] vm_area_dup+0x26/0x1d0 [ 1690.547413][ T1788] dup_mmap+0x6b8/0xea0 [ 1690.551407][ T1788] ? __delayed_free_task+0x20/0x20 [ 1690.556360][ T1788] ? mm_init+0x807/0x960 [ 1690.560432][ T1788] dup_mm+0x91/0x330 [ 1690.564162][ T1788] copy_mm+0x108/0x1b0 [ 1690.568067][ T1788] copy_process+0x1295/0x3250 [ 1690.572582][ T1788] ? proc_fail_nth_write+0x213/0x290 [ 1690.577702][ T1788] ? proc_fail_nth_read+0x220/0x220 [ 1690.582745][ T1788] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1690.587702][ T1788] ? vfs_write+0x9af/0x1050 [ 1690.592023][ T1788] ? vmacache_update+0xb7/0x120 [ 1690.596719][ T1788] kernel_clone+0x22d/0x990 [ 1690.601050][ T1788] ? file_end_write+0x1b0/0x1b0 [ 1690.605826][ T1788] ? __kasan_check_write+0x14/0x20 [ 1690.610770][ T1788] ? create_io_thread+0x1e0/0x1e0 [ 1690.615631][ T1788] ? __mutex_lock_slowpath+0x10/0x10 [ 1690.620751][ T1788] __x64_sys_clone+0x289/0x310 [ 1690.625351][ T1788] ? __do_sys_vfork+0x130/0x130 [ 1690.630041][ T1788] ? debug_smp_processor_id+0x17/0x20 [ 1690.635247][ T1788] do_syscall_64+0x44/0xd0 [ 1690.639500][ T1788] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1690.645225][ T1788] RIP: 0033:0x7f03091130d9 [ 1690.649479][ T1788] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1690.668931][ T1788] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 10:14:44 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 10:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:44 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wg1\x00', 0x0}) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@bloom_filter={0x1e, 0x20000, 0x1, 0x0, 0x1001, 0xffffffffffffffff, 0xffffff81, '\x00', r0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x7}, 0x48) 10:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:44 executing program 4: syz_clone(0x80100000, 0x0, 0x8a030000, &(0x7f00000001c0), 0x0, 0x0) 10:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], 0x0, 0x144, 0x0, 0x1}, 0x20) 10:14:44 executing program 2: bpf$LINK_DETACH(0x22, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x15, 0x0, 0x0) [ 1690.677165][ T1788] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1690.684981][ T1788] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1690.692789][ T1788] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1690.700599][ T1788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1690.708419][ T1788] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1690.716225][ T1788] 10:14:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], 0x0, 0x144, 0x0, 0x1}, 0x20) 10:14:44 executing program 2: bpf$LINK_DETACH(0x22, &(0x7f0000000000), 0x4) bpf$PROG_LOAD(0x9, 0x0, 0x2) [ 1690.755466][ T1817] FAULT_INJECTION: forcing a failure. [ 1690.755466][ T1817] name failslab, interval 1, probability 0, space 0, times 0 [ 1690.809140][ T1817] CPU: 0 PID: 1817 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1690.819132][ T1817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1690.829025][ T1817] Call Trace: [ 1690.832149][ T1817] [ 1690.834926][ T1817] dump_stack_lvl+0x151/0x1b7 [ 1690.839445][ T1817] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1690.844735][ T1817] ? avc_has_perm_noaudit+0x358/0x450 [ 1690.849943][ T1817] dump_stack+0x15/0x17 [ 1690.853933][ T1817] should_fail+0x3c0/0x510 [ 1690.858186][ T1817] __should_failslab+0x9f/0xe0 [ 1690.862789][ T1817] should_failslab+0x9/0x20 [ 1690.867124][ T1817] kmem_cache_alloc+0x4f/0x2f0 [ 1690.871724][ T1817] ? dup_fd+0x71/0xa40 [ 1690.875633][ T1817] dup_fd+0x71/0xa40 [ 1690.879360][ T1817] ? avc_has_perm+0x16d/0x260 [ 1690.883881][ T1817] ? avc_has_perm_noaudit+0x450/0x450 [ 1690.889085][ T1817] copy_files+0xe6/0x200 [ 1690.893164][ T1817] ? perf_event_attrs+0x30/0x30 [ 1690.897851][ T1817] ? dup_task_struct+0xa60/0xa60 [ 1690.902636][ T1817] ? security_task_alloc+0x132/0x150 [ 1690.907760][ T1817] copy_process+0x11e9/0x3250 [ 1690.912257][ T1817] ? proc_fail_nth_write+0x213/0x290 [ 1690.917381][ T1817] ? proc_fail_nth_read+0x220/0x220 [ 1690.922413][ T1817] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1690.927359][ T1817] ? vfs_write+0x9af/0x1050 [ 1690.931697][ T1817] ? vmacache_update+0xb7/0x120 [ 1690.936391][ T1817] kernel_clone+0x22d/0x990 [ 1690.940724][ T1817] ? file_end_write+0x1b0/0x1b0 [ 1690.945411][ T1817] ? __kasan_check_write+0x14/0x20 [ 1690.950356][ T1817] ? create_io_thread+0x1e0/0x1e0 [ 1690.955219][ T1817] ? __mutex_lock_slowpath+0x10/0x10 [ 1690.960341][ T1817] __x64_sys_clone+0x289/0x310 [ 1690.964939][ T1817] ? __do_sys_vfork+0x130/0x130 [ 1690.969628][ T1817] ? debug_smp_processor_id+0x17/0x20 [ 1690.974834][ T1817] do_syscall_64+0x44/0xd0 [ 1690.979088][ T1817] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1690.984813][ T1817] RIP: 0033:0x7f03091130d9 [ 1690.989067][ T1817] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:14:44 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 10:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x15, 0x0, 0x0) 10:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], 0x0, 0x144, 0x0, 0x1}, 0x20) 10:14:44 executing program 2: bpf$LINK_DETACH(0x22, &(0x7f0000000000), 0x4) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:44 executing program 4: syz_clone(0x80100000, 0x0, 0xf5ffffff, &(0x7f00000001c0), 0x0, 0x0) 10:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x15, 0x0, 0x0) [ 1691.008511][ T1817] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1691.016756][ T1817] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1691.024563][ T1817] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1691.032387][ T1817] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1691.040194][ T1817] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1691.047999][ T1817] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1691.055815][ T1817] 10:14:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc}, 0x20) 10:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:44 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x8800}, 0x80) 10:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1691.080770][ T1842] FAULT_INJECTION: forcing a failure. [ 1691.080770][ T1842] name failslab, interval 1, probability 0, space 0, times 0 [ 1691.120847][ T1842] CPU: 0 PID: 1842 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1691.130838][ T1842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1691.140735][ T1842] Call Trace: [ 1691.143853][ T1842] [ 1691.146633][ T1842] dump_stack_lvl+0x151/0x1b7 [ 1691.151146][ T1842] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1691.156441][ T1842] dump_stack+0x15/0x17 [ 1691.160435][ T1842] should_fail+0x3c0/0x510 [ 1691.164687][ T1842] __should_failslab+0x9f/0xe0 [ 1691.169285][ T1842] should_failslab+0x9/0x20 [ 1691.173626][ T1842] kmem_cache_alloc+0x4f/0x2f0 [ 1691.178223][ T1842] ? vm_area_dup+0x26/0x1d0 [ 1691.182580][ T1842] ? __kasan_check_read+0x11/0x20 [ 1691.187424][ T1842] vm_area_dup+0x26/0x1d0 [ 1691.191592][ T1842] dup_mmap+0x6b8/0xea0 [ 1691.195584][ T1842] ? __delayed_free_task+0x20/0x20 [ 1691.200529][ T1842] ? mm_init+0x807/0x960 [ 1691.204610][ T1842] dup_mm+0x91/0x330 [ 1691.208338][ T1842] copy_mm+0x108/0x1b0 [ 1691.212246][ T1842] copy_process+0x1295/0x3250 [ 1691.216760][ T1842] ? proc_fail_nth_write+0x213/0x290 [ 1691.221883][ T1842] ? proc_fail_nth_read+0x220/0x220 [ 1691.226919][ T1842] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1691.231861][ T1842] ? vfs_write+0x9af/0x1050 [ 1691.236199][ T1842] ? vmacache_update+0xb7/0x120 [ 1691.240885][ T1842] kernel_clone+0x22d/0x990 [ 1691.245227][ T1842] ? file_end_write+0x1b0/0x1b0 [ 1691.249926][ T1842] ? __kasan_check_write+0x14/0x20 [ 1691.254865][ T1842] ? create_io_thread+0x1e0/0x1e0 [ 1691.259719][ T1842] ? __mutex_lock_slowpath+0x10/0x10 [ 1691.264842][ T1842] __x64_sys_clone+0x289/0x310 [ 1691.269442][ T1842] ? __do_sys_vfork+0x130/0x130 [ 1691.274130][ T1842] ? debug_smp_processor_id+0x17/0x20 [ 1691.279336][ T1842] do_syscall_64+0x44/0xd0 [ 1691.283588][ T1842] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1691.289320][ T1842] RIP: 0033:0x7f03091130d9 [ 1691.293574][ T1842] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1691.313015][ T1842] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1691.321257][ T1842] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 10:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:44 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) 10:14:44 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x8800}, 0x80) 10:14:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc}, 0x20) 10:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 10:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1691.329068][ T1842] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1691.336879][ T1842] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1691.344690][ T1842] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1691.352500][ T1842] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1691.360315][ T1842] 10:14:44 executing program 4: syz_clone(0x80100000, 0x0, 0xfbffffff, &(0x7f00000001c0), 0x0, 0x0) 10:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:44 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={0x0, 0x0}, 0x20) 10:14:44 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x8800}, 0x80) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r0, 0x100, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x8800}, 0x80) (async) 10:14:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc}, 0x20) 10:14:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:44 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffc23) [ 1691.408036][ T1865] FAULT_INJECTION: forcing a failure. [ 1691.408036][ T1865] name failslab, interval 1, probability 0, space 0, times 0 [ 1691.463947][ T1865] CPU: 1 PID: 1865 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1691.473939][ T1865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1691.483836][ T1865] Call Trace: [ 1691.486958][ T1865] [ 1691.489731][ T1865] dump_stack_lvl+0x151/0x1b7 [ 1691.494247][ T1865] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1691.499550][ T1865] dump_stack+0x15/0x17 [ 1691.503530][ T1865] should_fail+0x3c0/0x510 [ 1691.507783][ T1865] ? alloc_fdtable+0xaf/0x2b0 [ 1691.512296][ T1865] __should_failslab+0x9f/0xe0 [ 1691.516896][ T1865] should_failslab+0x9/0x20 [ 1691.521233][ T1865] kmem_cache_alloc_trace+0x4a/0x310 [ 1691.526357][ T1865] ? __kasan_check_write+0x14/0x20 [ 1691.531320][ T1865] ? _raw_spin_lock+0xa3/0x1b0 [ 1691.535908][ T1865] alloc_fdtable+0xaf/0x2b0 [ 1691.540245][ T1865] dup_fd+0x781/0xa40 [ 1691.544061][ T1865] ? avc_has_perm+0x16d/0x260 [ 1691.548578][ T1865] copy_files+0xe6/0x200 [ 1691.552655][ T1865] ? perf_event_attrs+0x30/0x30 [ 1691.557342][ T1865] ? dup_task_struct+0xa60/0xa60 [ 1691.562117][ T1865] ? security_task_alloc+0x132/0x150 [ 1691.567236][ T1865] copy_process+0x11e9/0x3250 [ 1691.571753][ T1865] ? proc_fail_nth_write+0x213/0x290 [ 1691.576870][ T1865] ? proc_fail_nth_read+0x220/0x220 [ 1691.581910][ T1865] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1691.586852][ T1865] ? vfs_write+0x9af/0x1050 [ 1691.591191][ T1865] ? vmacache_update+0xb7/0x120 [ 1691.595878][ T1865] kernel_clone+0x22d/0x990 [ 1691.600220][ T1865] ? file_end_write+0x1b0/0x1b0 [ 1691.604906][ T1865] ? __kasan_check_write+0x14/0x20 [ 1691.609852][ T1865] ? create_io_thread+0x1e0/0x1e0 [ 1691.614713][ T1865] ? __mutex_lock_slowpath+0x10/0x10 [ 1691.619832][ T1865] __x64_sys_clone+0x289/0x310 [ 1691.624433][ T1865] ? __do_sys_vfork+0x130/0x130 [ 1691.629118][ T1865] ? debug_smp_processor_id+0x17/0x20 [ 1691.634327][ T1865] do_syscall_64+0x44/0xd0 [ 1691.638580][ T1865] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1691.644309][ T1865] RIP: 0033:0x7f03091130d9 [ 1691.648557][ T1865] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1691.668002][ T1865] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1691.676247][ T1865] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1691.684404][ T1865] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1691.692216][ T1865] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1691.700027][ T1865] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 10:14:45 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) 10:14:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:45 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={0x0, 0x0}, 0x20) 10:14:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:45 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffc23) 10:14:45 executing program 4: syz_clone(0x80100000, 0x0, 0xfffffff5, &(0x7f00000001c0), 0x0, 0x0) 10:14:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:45 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000080)={0x0, 0x0}, 0x20) [ 1691.707839][ T1865] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1691.715655][ T1865] 10:14:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1691.804107][ T1904] FAULT_INJECTION: forcing a failure. [ 1691.804107][ T1904] name failslab, interval 1, probability 0, space 0, times 0 [ 1691.824224][ T1904] CPU: 0 PID: 1904 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1691.834217][ T1904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1691.844109][ T1904] Call Trace: [ 1691.847231][ T1904] [ 1691.850011][ T1904] dump_stack_lvl+0x151/0x1b7 [ 1691.854530][ T1904] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1691.859820][ T1904] dump_stack+0x15/0x17 [ 1691.863810][ T1904] should_fail+0x3c0/0x510 [ 1691.868069][ T1904] ? kvmalloc_node+0x82/0x130 [ 1691.872575][ T1904] __should_failslab+0x9f/0xe0 [ 1691.877179][ T1904] should_failslab+0x9/0x20 [ 1691.881515][ T1904] __kmalloc+0x6d/0x350 [ 1691.885977][ T1904] ? __kasan_kmalloc+0x9/0x10 [ 1691.890454][ T1904] kvmalloc_node+0x82/0x130 [ 1691.894794][ T1904] alloc_fdtable+0xea/0x2b0 [ 1691.899135][ T1904] dup_fd+0x781/0xa40 [ 1691.902950][ T1904] ? avc_has_perm+0x16d/0x260 [ 1691.907465][ T1904] copy_files+0xe6/0x200 [ 1691.911561][ T1904] ? perf_event_attrs+0x30/0x30 [ 1691.916235][ T1904] ? dup_task_struct+0xa60/0xa60 [ 1691.921005][ T1904] ? security_task_alloc+0x132/0x150 [ 1691.926126][ T1904] copy_process+0x11e9/0x3250 [ 1691.930644][ T1904] ? proc_fail_nth_write+0x213/0x290 [ 1691.935759][ T1904] ? proc_fail_nth_read+0x220/0x220 [ 1691.940800][ T1904] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1691.945740][ T1904] ? vfs_write+0x9af/0x1050 [ 1691.950085][ T1904] ? vmacache_update+0xb7/0x120 [ 1691.954773][ T1904] kernel_clone+0x22d/0x990 [ 1691.959106][ T1904] ? file_end_write+0x1b0/0x1b0 [ 1691.963793][ T1904] ? __kasan_check_write+0x14/0x20 [ 1691.968740][ T1904] ? create_io_thread+0x1e0/0x1e0 [ 1691.973599][ T1904] ? __mutex_lock_slowpath+0x10/0x10 [ 1691.978720][ T1904] __x64_sys_clone+0x289/0x310 [ 1691.983323][ T1904] ? __do_sys_vfork+0x130/0x130 [ 1691.988010][ T1904] ? debug_smp_processor_id+0x17/0x20 [ 1691.993219][ T1904] do_syscall_64+0x44/0xd0 [ 1691.997467][ T1904] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1692.003195][ T1904] RIP: 0033:0x7f03091130d9 [ 1692.007457][ T1904] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1692.026894][ T1904] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1692.035138][ T1904] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1692.042949][ T1904] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:14:45 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) 10:14:45 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffc23) 10:14:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:45 executing program 4: syz_clone(0x80100000, 0x0, 0xfffffffb, &(0x7f00000001c0), 0x0, 0x0) 10:14:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:45 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffca1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000ff00000000000000c3f5ffff85100000faffffff180000939fba7500040000000000000005008400372250000800000095000000"], &(0x7f0000000040)='GPL\x00', 0x5, 0x7a, &(0x7f0000000080)=""/122, 0x41100, 0x1c, '\x00', r0, 0xffc8d9b91eac674f, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x1, 0x5}, 0x10, 0xffffffffffffffff}, 0x80) socketpair(0x1a, 0x3, 0xdd, &(0x7f0000000280)={0xffffffffffffffff}) socketpair(0x1a, 0x6, 0xffffff86, &(0x7f0000000380)={0xffffffffffffffff}) bind$pptp(r1, &(0x7f00000002c0)={0x18, 0x2, {0x2, @local}}, 0x1e) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) r3 = dup3(r2, r1, 0x80000) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000300)={'syztnl1\x00', &(0x7f00000003c0)={'tunl0\x00', r0, 0x40, 0x1, 0x1, 0x1f, {{0x4f, 0x4, 0x0, 0x7, 0x13c, 0x64, 0x0, 0xc8, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@noop, @ssrr={0x89, 0x23, 0x1f, [@private=0xa010100, @rand_addr=0x64010101, @rand_addr=0x64010101, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast1, @rand_addr=0x64010102]}, @rr={0x7, 0xf, 0x97, [@initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, @remote]}, @noop, @timestamp_addr={0x44, 0x24, 0x36, 0x1, 0x2, [{@private=0xa010100, 0x80000000}, {@local, 0x4}, {@multicast1, 0x2}, {@loopback, 0x6}]}, @end, @timestamp_addr={0x44, 0x2c, 0xa1, 0x1, 0x3, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80000001}, {@empty, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x401}, {@multicast2, 0x97}, {@private=0xa010102, 0x9}]}, @ssrr={0x89, 0x13, 0xb, [@remote, @private=0xa010102, @rand_addr=0x64010100, @loopback]}, @cipso={0x86, 0x8e, 0x1, [{0x6, 0x11, "b628e94dd1fbeb327cba1cfe212f43"}, {0x5, 0x10, "1434738c1ba09df4bd2755ceb9e0"}, {0x1, 0x10, "e279f6da3fd04898145c6c662cdc"}, {0x6, 0x12, "e03f8e72f27f14276ce70bb8b3a7ef25"}, {0x5, 0x12, "c55421054c95f0a1ec6e823656562d18"}, {0x7, 0xa, "e15868a9fc281b75"}, {0x5, 0xd, "9125dbaf140b4a3e8fe944"}, {0x2, 0xc, "9cac8c45806ac46523e8"}, {0x6, 0x10, "c5cd0af53a5255d141460e051a67"}]}, @noop]}}}}}) ioctl$RFKILL_IOC_MAX_SIZE(r3, 0x2, &(0x7f0000000180)=0x2) 10:14:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x18, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1692.050763][ T1904] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1692.058656][ T1904] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1692.066470][ T1904] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1692.074283][ T1904] 10:14:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:45 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffca1) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000ff00000000000000c3f5ffff85100000faffffff180000939fba7500040000000000000005008400372250000800000095000000"], &(0x7f0000000040)='GPL\x00', 0x5, 0x7a, &(0x7f0000000080)=""/122, 0x41100, 0x1c, '\x00', r0, 0xffc8d9b91eac674f, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x1, 0x5}, 0x10, 0xffffffffffffffff}, 0x80) (async, rerun: 32) socketpair(0x1a, 0x3, 0xdd, &(0x7f0000000280)={0xffffffffffffffff}) (async, rerun: 32) socketpair(0x1a, 0x6, 0xffffff86, &(0x7f0000000380)={0xffffffffffffffff}) bind$pptp(r1, &(0x7f00000002c0)={0x18, 0x2, {0x2, @local}}, 0x1e) (async, rerun: 32) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) (async, rerun: 32) r3 = dup3(r2, r1, 0x80000) (async) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000300)={'syztnl1\x00', &(0x7f00000003c0)={'tunl0\x00', r0, 0x40, 0x1, 0x1, 0x1f, {{0x4f, 0x4, 0x0, 0x7, 0x13c, 0x64, 0x0, 0xc8, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@noop, @ssrr={0x89, 0x23, 0x1f, [@private=0xa010100, @rand_addr=0x64010101, @rand_addr=0x64010101, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast1, @rand_addr=0x64010102]}, @rr={0x7, 0xf, 0x97, [@initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, @remote]}, @noop, @timestamp_addr={0x44, 0x24, 0x36, 0x1, 0x2, [{@private=0xa010100, 0x80000000}, {@local, 0x4}, {@multicast1, 0x2}, {@loopback, 0x6}]}, @end, @timestamp_addr={0x44, 0x2c, 0xa1, 0x1, 0x3, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80000001}, {@empty, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x401}, {@multicast2, 0x97}, {@private=0xa010102, 0x9}]}, @ssrr={0x89, 0x13, 0xb, [@remote, @private=0xa010102, @rand_addr=0x64010100, @loopback]}, @cipso={0x86, 0x8e, 0x1, [{0x6, 0x11, "b628e94dd1fbeb327cba1cfe212f43"}, {0x5, 0x10, "1434738c1ba09df4bd2755ceb9e0"}, {0x1, 0x10, "e279f6da3fd04898145c6c662cdc"}, {0x6, 0x12, "e03f8e72f27f14276ce70bb8b3a7ef25"}, {0x5, 0x12, "c55421054c95f0a1ec6e823656562d18"}, {0x7, 0xa, "e15868a9fc281b75"}, {0x5, 0xd, "9125dbaf140b4a3e8fe944"}, {0x2, 0xc, "9cac8c45806ac46523e8"}, {0x6, 0x10, "c5cd0af53a5255d141460e051a67"}]}, @noop]}}}}}) (async) ioctl$RFKILL_IOC_MAX_SIZE(r3, 0x2, &(0x7f0000000180)=0x2) 10:14:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1692.122852][ T1925] FAULT_INJECTION: forcing a failure. [ 1692.122852][ T1925] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.141295][ T30] audit: type=1400 audit(1671704085.629:158): avc: denied { create } for pid=1920 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1692.189609][ T1925] CPU: 1 PID: 1925 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1692.199602][ T1925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1692.209489][ T1925] Call Trace: [ 1692.212613][ T1925] [ 1692.215389][ T1925] dump_stack_lvl+0x151/0x1b7 [ 1692.219913][ T1925] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1692.225199][ T1925] dump_stack+0x15/0x17 [ 1692.229192][ T1925] should_fail+0x3c0/0x510 [ 1692.233444][ T1925] ? kvmalloc_node+0x82/0x130 [ 1692.237959][ T1925] __should_failslab+0x9f/0xe0 [ 1692.242555][ T1925] should_failslab+0x9/0x20 [ 1692.246902][ T1925] __kmalloc+0x6d/0x350 [ 1692.250887][ T1925] ? kvmalloc_node+0x82/0x130 [ 1692.255405][ T1925] kvmalloc_node+0x82/0x130 [ 1692.259832][ T1925] alloc_fdtable+0x173/0x2b0 [ 1692.264258][ T1925] dup_fd+0x781/0xa40 [ 1692.268074][ T1925] ? avc_has_perm+0x16d/0x260 [ 1692.272593][ T1925] copy_files+0xe6/0x200 [ 1692.276665][ T1925] ? perf_event_attrs+0x30/0x30 [ 1692.281353][ T1925] ? dup_task_struct+0xa60/0xa60 [ 1692.286127][ T1925] ? security_task_alloc+0x132/0x150 [ 1692.291251][ T1925] copy_process+0x11e9/0x3250 [ 1692.295761][ T1925] ? proc_fail_nth_write+0x213/0x290 [ 1692.300883][ T1925] ? proc_fail_nth_read+0x220/0x220 [ 1692.305914][ T1925] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1692.310860][ T1925] ? vfs_write+0x9af/0x1050 [ 1692.315202][ T1925] ? vmacache_update+0xb7/0x120 [ 1692.319888][ T1925] kernel_clone+0x22d/0x990 [ 1692.324228][ T1925] ? file_end_write+0x1b0/0x1b0 [ 1692.328915][ T1925] ? __kasan_check_write+0x14/0x20 [ 1692.333861][ T1925] ? create_io_thread+0x1e0/0x1e0 [ 1692.338722][ T1925] ? __mutex_lock_slowpath+0x10/0x10 [ 1692.343841][ T1925] __x64_sys_clone+0x289/0x310 [ 1692.348442][ T1925] ? __do_sys_vfork+0x130/0x130 [ 1692.353130][ T1925] ? debug_smp_processor_id+0x17/0x20 [ 1692.358337][ T1925] do_syscall_64+0x44/0xd0 [ 1692.362587][ T1925] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1692.368316][ T1925] RIP: 0033:0x7f03091130d9 [ 1692.372574][ T1925] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1692.392014][ T1925] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1692.400257][ T1925] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1692.408155][ T1925] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1692.415968][ T1925] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1692.423772][ T1925] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1692.431586][ T1925] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1692.439405][ T1925] 10:14:45 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) 10:14:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:45 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffca1) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0xb, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000ff00000000000000c3f5ffff85100000faffffff180000939fba7500040000000000000005008400372250000800000095000000"], &(0x7f0000000040)='GPL\x00', 0x5, 0x7a, &(0x7f0000000080)=""/122, 0x41100, 0x1c, '\x00', r0, 0xffc8d9b91eac674f, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x3, 0x1, 0x5}, 0x10, 0xffffffffffffffff}, 0x80) (async) socketpair(0x1a, 0x3, 0xdd, &(0x7f0000000280)={0xffffffffffffffff}) (async) socketpair(0x1a, 0x6, 0xffffff86, &(0x7f0000000380)={0xffffffffffffffff}) bind$pptp(r1, &(0x7f00000002c0)={0x18, 0x2, {0x2, @local}}, 0x1e) (async) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000240)) (async) r3 = dup3(r2, r1, 0x80000) (async) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000300)={'syztnl1\x00', &(0x7f00000003c0)={'tunl0\x00', r0, 0x40, 0x1, 0x1, 0x1f, {{0x4f, 0x4, 0x0, 0x7, 0x13c, 0x64, 0x0, 0xc8, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@noop, @ssrr={0x89, 0x23, 0x1f, [@private=0xa010100, @rand_addr=0x64010101, @rand_addr=0x64010101, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast1, @rand_addr=0x64010102]}, @rr={0x7, 0xf, 0x97, [@initdev={0xac, 0x1e, 0x0, 0x0}, @private=0xa010102, @remote]}, @noop, @timestamp_addr={0x44, 0x24, 0x36, 0x1, 0x2, [{@private=0xa010100, 0x80000000}, {@local, 0x4}, {@multicast1, 0x2}, {@loopback, 0x6}]}, @end, @timestamp_addr={0x44, 0x2c, 0xa1, 0x1, 0x3, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x80000001}, {@empty, 0x1}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x401}, {@multicast2, 0x97}, {@private=0xa010102, 0x9}]}, @ssrr={0x89, 0x13, 0xb, [@remote, @private=0xa010102, @rand_addr=0x64010100, @loopback]}, @cipso={0x86, 0x8e, 0x1, [{0x6, 0x11, "b628e94dd1fbeb327cba1cfe212f43"}, {0x5, 0x10, "1434738c1ba09df4bd2755ceb9e0"}, {0x1, 0x10, "e279f6da3fd04898145c6c662cdc"}, {0x6, 0x12, "e03f8e72f27f14276ce70bb8b3a7ef25"}, {0x5, 0x12, "c55421054c95f0a1ec6e823656562d18"}, {0x7, 0xa, "e15868a9fc281b75"}, {0x5, 0xd, "9125dbaf140b4a3e8fe944"}, {0x2, 0xc, "9cac8c45806ac46523e8"}, {0x6, 0x10, "c5cd0af53a5255d141460e051a67"}]}, @noop]}}}}}) (async) ioctl$RFKILL_IOC_MAX_SIZE(r3, 0x2, &(0x7f0000000180)=0x2) 10:14:45 executing program 4: syz_clone(0x80100000, 0x0, 0x1b0d01f000, &(0x7f00000001c0), 0x0, 0x0) 10:14:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:46 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4652, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x23f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={@multicast1, 0x1, 0x0, 0x30, 0x0, [{}, {@multicast2}, {@initdev}]}}) 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1692.514938][ T1960] FAULT_INJECTION: forcing a failure. [ 1692.514938][ T1960] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.574045][ T1960] CPU: 1 PID: 1960 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1692.584037][ T1960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1692.593929][ T1960] Call Trace: [ 1692.597050][ T1960] [ 1692.599832][ T1960] dump_stack_lvl+0x151/0x1b7 [ 1692.604345][ T1960] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1692.609636][ T1960] ? _raw_spin_lock+0xa3/0x1b0 [ 1692.614238][ T1960] ? dup_fd+0x51f/0xa40 [ 1692.618228][ T1960] dump_stack+0x15/0x17 [ 1692.622222][ T1960] should_fail+0x3c0/0x510 [ 1692.626479][ T1960] __should_failslab+0x9f/0xe0 [ 1692.631074][ T1960] should_failslab+0x9/0x20 [ 1692.635414][ T1960] kmem_cache_alloc+0x4f/0x2f0 [ 1692.640015][ T1960] ? copy_fs_struct+0x4e/0x230 [ 1692.644613][ T1960] copy_fs_struct+0x4e/0x230 [ 1692.649042][ T1960] copy_fs+0x72/0x140 [ 1692.652861][ T1960] copy_process+0x1214/0x3250 [ 1692.657382][ T1960] ? proc_fail_nth_write+0x213/0x290 [ 1692.662494][ T1960] ? proc_fail_nth_read+0x220/0x220 [ 1692.667525][ T1960] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1692.672474][ T1960] ? vfs_write+0x9af/0x1050 [ 1692.676812][ T1960] ? vmacache_update+0xb7/0x120 [ 1692.681503][ T1960] kernel_clone+0x22d/0x990 [ 1692.685847][ T1960] ? file_end_write+0x1b0/0x1b0 [ 1692.690528][ T1960] ? __kasan_check_write+0x14/0x20 [ 1692.695474][ T1960] ? create_io_thread+0x1e0/0x1e0 [ 1692.700334][ T1960] ? __mutex_lock_slowpath+0x10/0x10 [ 1692.705457][ T1960] __x64_sys_clone+0x289/0x310 [ 1692.710055][ T1960] ? __do_sys_vfork+0x130/0x130 [ 1692.714742][ T1960] ? debug_smp_processor_id+0x17/0x20 [ 1692.719949][ T1960] do_syscall_64+0x44/0xd0 [ 1692.724201][ T1960] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1692.729929][ T1960] RIP: 0033:0x7f03091130d9 [ 1692.734182][ T1960] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1692.753627][ T1960] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1692.761870][ T1960] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 10:14:46 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) 10:14:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={0x0, &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:46 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4652, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x23f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={@multicast1, 0x1, 0x0, 0x30, 0x0, [{}, {@multicast2}, {@initdev}]}}) 10:14:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:46 executing program 4: syz_clone(0x80100000, 0x0, 0x2a373e35c000, &(0x7f00000001c0), 0x0, 0x0) [ 1692.769685][ T1960] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1692.777493][ T1960] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1692.785305][ T1960] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1692.793112][ T1960] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1692.800929][ T1960] 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:46 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4652, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x23f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={@multicast1, 0x1, 0x0, 0x30, 0x0, [{}, {@multicast2}, {@initdev}]}}) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4652, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x3, 0x23f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000040)={'sit0\x00', &(0x7f0000000000)={@multicast1, 0x1, 0x0, 0x30, 0x0, [{}, {@multicast2}, {@initdev}]}}) (async) 10:14:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:46 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080), 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r0, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r2, 0x0, 0x0) getpeername(r2, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) [ 1692.824628][ T1984] FAULT_INJECTION: forcing a failure. [ 1692.824628][ T1984] name failslab, interval 1, probability 0, space 0, times 0 [ 1692.873843][ T1984] CPU: 1 PID: 1984 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1692.883831][ T1984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1692.893729][ T1984] Call Trace: [ 1692.896859][ T1984] [ 1692.899628][ T1984] dump_stack_lvl+0x151/0x1b7 [ 1692.904139][ T1984] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1692.909438][ T1984] dump_stack+0x15/0x17 [ 1692.913440][ T1984] should_fail+0x3c0/0x510 [ 1692.917681][ T1984] __should_failslab+0x9f/0xe0 [ 1692.922279][ T1984] should_failslab+0x9/0x20 [ 1692.926619][ T1984] kmem_cache_alloc+0x4f/0x2f0 [ 1692.931219][ T1984] ? anon_vma_fork+0x1b9/0x4f0 [ 1692.935817][ T1984] anon_vma_fork+0x1b9/0x4f0 [ 1692.940252][ T1984] dup_mmap+0x750/0xea0 [ 1692.944239][ T1984] ? __delayed_free_task+0x20/0x20 [ 1692.949185][ T1984] ? mm_init+0x807/0x960 [ 1692.953264][ T1984] dup_mm+0x91/0x330 [ 1692.957005][ T1984] copy_mm+0x108/0x1b0 [ 1692.960902][ T1984] copy_process+0x1295/0x3250 [ 1692.965419][ T1984] ? proc_fail_nth_write+0x213/0x290 [ 1692.970535][ T1984] ? proc_fail_nth_read+0x220/0x220 [ 1692.975572][ T1984] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1692.980518][ T1984] ? vfs_write+0x9af/0x1050 [ 1692.984856][ T1984] ? vmacache_update+0xb7/0x120 [ 1692.989545][ T1984] kernel_clone+0x22d/0x990 [ 1692.993881][ T1984] ? file_end_write+0x1b0/0x1b0 [ 1692.998568][ T1984] ? __kasan_check_write+0x14/0x20 [ 1693.003518][ T1984] ? create_io_thread+0x1e0/0x1e0 [ 1693.008375][ T1984] ? __mutex_lock_slowpath+0x10/0x10 [ 1693.013497][ T1984] __x64_sys_clone+0x289/0x310 [ 1693.018097][ T1984] ? __do_sys_vfork+0x130/0x130 [ 1693.022787][ T1984] ? debug_smp_processor_id+0x17/0x20 [ 1693.027995][ T1984] do_syscall_64+0x44/0xd0 [ 1693.032247][ T1984] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1693.038056][ T1984] RIP: 0033:0x7f03091130d9 [ 1693.042312][ T1984] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1693.061755][ T1984] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 10:14:46 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 10:14:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:46 executing program 4: syz_clone(0x80100000, 0x0, 0x553a27a6d000, &(0x7f00000001c0), 0x0, 0x0) 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:46 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080), 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r0, 0x6) (async) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r2, 0x0, 0x0) getpeername(r2, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1693.070036][ T1984] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1693.077808][ T1984] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1693.085620][ T1984] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.093432][ T1984] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1693.101250][ T1984] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1693.109058][ T1984] 10:14:46 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r1, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080), 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r0, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r2, 0x0, 0x0) getpeername(r2, &(0x7f0000000300)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x80) 10:14:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:46 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) openat$incfs(r2, &(0x7f0000000000)='.log\x00', 0x88602, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x3, 0x2]) 10:14:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1693.180093][ T2019] FAULT_INJECTION: forcing a failure. [ 1693.180093][ T2019] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.215937][ T2019] CPU: 0 PID: 2019 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1693.225928][ T2019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1693.235820][ T2019] Call Trace: [ 1693.238942][ T2019] [ 1693.241726][ T2019] dump_stack_lvl+0x151/0x1b7 [ 1693.246235][ T2019] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1693.251530][ T2019] dump_stack+0x15/0x17 [ 1693.255521][ T2019] should_fail+0x3c0/0x510 [ 1693.259773][ T2019] __should_failslab+0x9f/0xe0 [ 1693.264372][ T2019] should_failslab+0x9/0x20 [ 1693.268710][ T2019] kmem_cache_alloc+0x4f/0x2f0 [ 1693.273314][ T2019] ? copy_signal+0x55/0x610 [ 1693.277652][ T2019] copy_signal+0x55/0x610 [ 1693.281817][ T2019] copy_process+0x126a/0x3250 [ 1693.286330][ T2019] ? proc_fail_nth_write+0x213/0x290 [ 1693.291453][ T2019] ? proc_fail_nth_read+0x220/0x220 [ 1693.296487][ T2019] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1693.301432][ T2019] ? vfs_write+0x9af/0x1050 [ 1693.305771][ T2019] ? vmacache_update+0xb7/0x120 [ 1693.310458][ T2019] kernel_clone+0x22d/0x990 [ 1693.314801][ T2019] ? file_end_write+0x1b0/0x1b0 [ 1693.319486][ T2019] ? __kasan_check_write+0x14/0x20 [ 1693.324434][ T2019] ? create_io_thread+0x1e0/0x1e0 [ 1693.329294][ T2019] ? __mutex_lock_slowpath+0x10/0x10 [ 1693.334414][ T2019] __x64_sys_clone+0x289/0x310 [ 1693.339016][ T2019] ? __do_sys_vfork+0x130/0x130 [ 1693.343703][ T2019] ? debug_smp_processor_id+0x17/0x20 [ 1693.348909][ T2019] do_syscall_64+0x44/0xd0 [ 1693.353158][ T2019] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1693.358889][ T2019] RIP: 0033:0x7f03091130d9 [ 1693.363140][ T2019] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1693.382582][ T2019] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1693.390830][ T2019] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1693.398644][ T2019] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1693.406453][ T2019] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.414263][ T2019] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1693.422074][ T2019] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 10:14:46 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 10:14:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) [ 1693.429889][ T2019] 10:14:46 executing program 4: syz_clone(0x80100000, 0x0, 0x2001000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:46 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) (async) r2 = dup3(r1, r0, 0x0) openat$incfs(r2, &(0x7f0000000000)='.log\x00', 0x88602, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x3, 0x2]) 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 10:14:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:14:47 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) openat$incfs(r2, &(0x7f0000000000)='.log\x00', 0x88602, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x3, 0x2]) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) (async) write$binfmt_elf32(r1, 0x0, 0x0) (async) dup3(r1, r0, 0x0) (async) openat$incfs(r2, &(0x7f0000000000)='.log\x00', 0x88602, 0x0) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x3, 0x2]) (async) 10:14:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1693.457120][ T2032] FAULT_INJECTION: forcing a failure. [ 1693.457120][ T2032] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1693.539749][ T2032] CPU: 0 PID: 2032 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1693.549736][ T2032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1693.559719][ T2032] Call Trace: [ 1693.562838][ T2032] [ 1693.565618][ T2032] dump_stack_lvl+0x151/0x1b7 [ 1693.570130][ T2032] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1693.575424][ T2032] ? __kasan_check_write+0x14/0x20 [ 1693.580372][ T2032] ? __set_page_owner+0x2ee/0x310 [ 1693.585232][ T2032] dump_stack+0x15/0x17 [ 1693.589226][ T2032] should_fail+0x3c0/0x510 [ 1693.593482][ T2032] should_fail_alloc_page+0x58/0x70 [ 1693.598514][ T2032] __alloc_pages+0x1de/0x7c0 [ 1693.602937][ T2032] ? __count_vm_events+0x30/0x30 [ 1693.607710][ T2032] ? __count_vm_events+0x30/0x30 [ 1693.612485][ T2032] ? __kasan_check_write+0x14/0x20 [ 1693.617435][ T2032] ? _raw_spin_lock+0xa3/0x1b0 [ 1693.622030][ T2032] __pmd_alloc+0xb1/0x550 [ 1693.626197][ T2032] ? kmem_cache_alloc+0x189/0x2f0 [ 1693.631054][ T2032] ? anon_vma_fork+0x1b9/0x4f0 [ 1693.635659][ T2032] ? __pud_alloc+0x260/0x260 [ 1693.640086][ T2032] ? __pud_alloc+0x218/0x260 [ 1693.644509][ T2032] ? do_handle_mm_fault+0x2370/0x2370 [ 1693.649722][ T2032] copy_page_range+0xd04/0x1090 [ 1693.654408][ T2032] ? pfn_valid+0x1e0/0x1e0 [ 1693.658657][ T2032] dup_mmap+0x99f/0xea0 [ 1693.662652][ T2032] ? __delayed_free_task+0x20/0x20 [ 1693.667597][ T2032] ? mm_init+0x807/0x960 [ 1693.671677][ T2032] dup_mm+0x91/0x330 [ 1693.675407][ T2032] copy_mm+0x108/0x1b0 [ 1693.679314][ T2032] copy_process+0x1295/0x3250 [ 1693.683827][ T2032] ? proc_fail_nth_write+0x213/0x290 [ 1693.688947][ T2032] ? proc_fail_nth_read+0x220/0x220 [ 1693.693981][ T2032] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1693.698926][ T2032] ? vfs_write+0x9af/0x1050 [ 1693.703267][ T2032] ? vmacache_update+0xb7/0x120 [ 1693.707954][ T2032] kernel_clone+0x22d/0x990 [ 1693.712290][ T2032] ? file_end_write+0x1b0/0x1b0 [ 1693.716977][ T2032] ? __kasan_check_write+0x14/0x20 [ 1693.721923][ T2032] ? create_io_thread+0x1e0/0x1e0 [ 1693.726786][ T2032] ? __mutex_lock_slowpath+0x10/0x10 [ 1693.731908][ T2032] __x64_sys_clone+0x289/0x310 [ 1693.736509][ T2032] ? __do_sys_vfork+0x130/0x130 [ 1693.741197][ T2032] ? debug_smp_processor_id+0x17/0x20 [ 1693.746406][ T2032] do_syscall_64+0x44/0xd0 [ 1693.750660][ T2032] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1693.756383][ T2032] RIP: 0033:0x7f03091130d9 [ 1693.760638][ T2032] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1693.780082][ T2032] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1693.788327][ T2032] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1693.796133][ T2032] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1693.803943][ T2032] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1693.811757][ T2032] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1693.819566][ T2032] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1693.827405][ T2032] 10:14:47 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 10:14:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:14:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:47 executing program 4: syz_clone(0x80100000, 0x0, 0x2020000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x6844a000) bpf$PROG_LOAD(0x9, 0x0, 0x2) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20044804}, 0x0) 10:14:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb0100180000000000000028010000280100000400"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x6844a000) bpf$PROG_LOAD(0x9, 0x0, 0x2) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20044804}, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) (async) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x6844a000) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20044804}, 0x0) (async) 10:14:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:14:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb0100180000000000000028010000280100000400"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb0100180000000000000028010000280100000400"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1693.949614][ T2077] FAULT_INJECTION: forcing a failure. [ 1693.949614][ T2077] name failslab, interval 1, probability 0, space 0, times 0 [ 1693.991332][ T2077] CPU: 0 PID: 2077 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1694.001318][ T2077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1694.011217][ T2077] Call Trace: [ 1694.014337][ T2077] [ 1694.017115][ T2077] dump_stack_lvl+0x151/0x1b7 [ 1694.021637][ T2077] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1694.026924][ T2077] dump_stack+0x15/0x17 [ 1694.030913][ T2077] should_fail+0x3c0/0x510 [ 1694.035167][ T2077] ? mm_init+0x392/0x960 [ 1694.039245][ T2077] __should_failslab+0x9f/0xe0 [ 1694.043843][ T2077] should_failslab+0x9/0x20 [ 1694.048183][ T2077] kmem_cache_alloc_trace+0x4a/0x310 [ 1694.053304][ T2077] mm_init+0x392/0x960 [ 1694.057212][ T2077] dup_mm+0x7d/0x330 [ 1694.060947][ T2077] copy_mm+0x108/0x1b0 [ 1694.064847][ T2077] copy_process+0x1295/0x3250 [ 1694.069361][ T2077] ? proc_fail_nth_write+0x213/0x290 [ 1694.074482][ T2077] ? proc_fail_nth_read+0x220/0x220 [ 1694.079517][ T2077] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1694.084462][ T2077] ? vfs_write+0x9af/0x1050 [ 1694.088804][ T2077] ? vmacache_update+0xb7/0x120 [ 1694.093493][ T2077] kernel_clone+0x22d/0x990 [ 1694.097827][ T2077] ? file_end_write+0x1b0/0x1b0 [ 1694.102518][ T2077] ? __kasan_check_write+0x14/0x20 [ 1694.107469][ T2077] ? create_io_thread+0x1e0/0x1e0 [ 1694.112339][ T2077] ? __mutex_lock_slowpath+0x10/0x10 [ 1694.117444][ T2077] __x64_sys_clone+0x289/0x310 [ 1694.122046][ T2077] ? __do_sys_vfork+0x130/0x130 [ 1694.126732][ T2077] ? debug_smp_processor_id+0x17/0x20 [ 1694.131938][ T2077] do_syscall_64+0x44/0xd0 [ 1694.136191][ T2077] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1694.141919][ T2077] RIP: 0033:0x7f03091130d9 [ 1694.146172][ T2077] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1694.165613][ T2077] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1694.173858][ T2077] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1694.181669][ T2077] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1694.189480][ T2077] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.197293][ T2077] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1694.205102][ T2077] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1694.212922][ T2077] 10:14:47 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 10:14:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:14:47 executing program 2: r0 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={0xffffffffffffffff}, 0x4) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x10, r0, 0x6844a000) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x100, 0x70bd28, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20044804}, 0x0) 10:14:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:47 executing program 4: syz_clone(0x80100000, 0x0, 0x8000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:14:47 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x8c) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x60e, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x820}, 0x40) 10:14:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:47 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x8c) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x60e, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x820}, 0x40) bpf$PROG_LOAD(0x9, 0x0, 0x8c) (async) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x60e, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x820}, 0x40) (async) 10:14:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) [ 1694.320481][ T2110] FAULT_INJECTION: forcing a failure. [ 1694.320481][ T2110] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.353212][ T2110] CPU: 1 PID: 2110 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1694.363200][ T2110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1694.373097][ T2110] Call Trace: [ 1694.376221][ T2110] [ 1694.378995][ T2110] dump_stack_lvl+0x151/0x1b7 [ 1694.383516][ T2110] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1694.388806][ T2110] dump_stack+0x15/0x17 [ 1694.392797][ T2110] should_fail+0x3c0/0x510 [ 1694.397048][ T2110] __should_failslab+0x9f/0xe0 [ 1694.401651][ T2110] should_failslab+0x9/0x20 [ 1694.405988][ T2110] kmem_cache_alloc+0x4f/0x2f0 [ 1694.410590][ T2110] ? vm_area_dup+0x26/0x1d0 [ 1694.414926][ T2110] vm_area_dup+0x26/0x1d0 [ 1694.419096][ T2110] dup_mmap+0x6b8/0xea0 [ 1694.423092][ T2110] ? __delayed_free_task+0x20/0x20 [ 1694.428036][ T2110] ? mm_init+0x807/0x960 [ 1694.432117][ T2110] dup_mm+0x91/0x330 [ 1694.435851][ T2110] copy_mm+0x108/0x1b0 [ 1694.439750][ T2110] copy_process+0x1295/0x3250 [ 1694.444283][ T2110] ? proc_fail_nth_write+0x213/0x290 [ 1694.449384][ T2110] ? proc_fail_nth_read+0x220/0x220 [ 1694.454419][ T2110] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1694.459365][ T2110] ? vfs_write+0x9af/0x1050 [ 1694.463706][ T2110] ? vmacache_update+0xb7/0x120 [ 1694.468394][ T2110] kernel_clone+0x22d/0x990 [ 1694.472730][ T2110] ? file_end_write+0x1b0/0x1b0 [ 1694.477419][ T2110] ? __kasan_check_write+0x14/0x20 [ 1694.482364][ T2110] ? create_io_thread+0x1e0/0x1e0 [ 1694.487232][ T2110] ? __mutex_lock_slowpath+0x10/0x10 [ 1694.492344][ T2110] __x64_sys_clone+0x289/0x310 [ 1694.496946][ T2110] ? __do_sys_vfork+0x130/0x130 [ 1694.501633][ T2110] ? debug_smp_processor_id+0x17/0x20 [ 1694.506842][ T2110] do_syscall_64+0x44/0xd0 [ 1694.511093][ T2110] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1694.516819][ T2110] RIP: 0033:0x7f03091130d9 [ 1694.521073][ T2110] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1694.540515][ T2110] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1694.548758][ T2110] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1694.556569][ T2110] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:14:48 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 10:14:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:48 executing program 3: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) r2 = dup3(r1, r0, 0x0) openat$incfs(r2, &(0x7f0000000000)='.log\x00', 0x88602, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$EVIOCSREP(r3, 0x40084503, &(0x7f0000000040)=[0x3, 0x2]) 10:14:48 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x8c) (async) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x60e, 0x70bd26, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x820}, 0x40) 10:14:48 executing program 4: syz_clone(0x80100000, 0x0, 0x10000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1694.564383][ T2110] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.572191][ T2110] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1694.580004][ T2110] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1694.587818][ T2110] 10:14:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) [ 1694.628418][ T2130] FAULT_INJECTION: forcing a failure. [ 1694.628418][ T2130] name failslab, interval 1, probability 0, space 0, times 0 [ 1694.643496][ T2130] CPU: 0 PID: 2130 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1694.653481][ T2130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1694.663373][ T2130] Call Trace: [ 1694.666495][ T2130] [ 1694.669271][ T2130] dump_stack_lvl+0x151/0x1b7 [ 1694.673790][ T2130] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1694.679084][ T2130] dump_stack+0x15/0x17 [ 1694.683082][ T2130] should_fail+0x3c0/0x510 [ 1694.687327][ T2130] __should_failslab+0x9f/0xe0 [ 1694.691932][ T2130] should_failslab+0x9/0x20 [ 1694.696265][ T2130] kmem_cache_alloc+0x4f/0x2f0 [ 1694.700863][ T2130] ? vm_area_dup+0x26/0x1d0 [ 1694.705212][ T2130] vm_area_dup+0x26/0x1d0 [ 1694.709369][ T2130] dup_mmap+0x6b8/0xea0 [ 1694.713364][ T2130] ? __delayed_free_task+0x20/0x20 [ 1694.718310][ T2130] ? mm_init+0x807/0x960 [ 1694.722389][ T2130] dup_mm+0x91/0x330 [ 1694.726122][ T2130] copy_mm+0x108/0x1b0 [ 1694.730030][ T2130] copy_process+0x1295/0x3250 [ 1694.734542][ T2130] ? proc_fail_nth_write+0x213/0x290 [ 1694.739659][ T2130] ? proc_fail_nth_read+0x220/0x220 [ 1694.744696][ T2130] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1694.749642][ T2130] ? vfs_write+0x9af/0x1050 [ 1694.753979][ T2130] ? vmacache_update+0xb7/0x120 [ 1694.758672][ T2130] kernel_clone+0x22d/0x990 [ 1694.763006][ T2130] ? file_end_write+0x1b0/0x1b0 [ 1694.767696][ T2130] ? __kasan_check_write+0x14/0x20 [ 1694.772729][ T2130] ? create_io_thread+0x1e0/0x1e0 [ 1694.777587][ T2130] ? __mutex_lock_slowpath+0x10/0x10 [ 1694.782713][ T2130] __x64_sys_clone+0x289/0x310 [ 1694.787313][ T2130] ? __do_sys_vfork+0x130/0x130 [ 1694.791998][ T2130] ? debug_smp_processor_id+0x17/0x20 [ 1694.797202][ T2130] do_syscall_64+0x44/0xd0 [ 1694.801457][ T2130] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1694.807182][ T2130] RIP: 0033:0x7f03091130d9 [ 1694.811444][ T2130] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1694.830879][ T2130] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1694.839125][ T2130] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1694.846934][ T2130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1694.854745][ T2130] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1694.862556][ T2130] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1694.870368][ T2130] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 10:14:48 executing program 3: syz_clone(0x80100000, 0x0, 0x8000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:48 executing program 4: syz_clone(0x80100000, 0x0, 0xc0353e372a0000, &(0x7f00000001c0), 0x0, 0x0) [ 1694.878184][ T2130] 10:14:48 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 10:14:48 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200000003"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:48 executing program 3: syz_clone(0x80100000, 0x0, 0x1b0d01f000, &(0x7f00000001c0), 0x0, 0x0) 10:14:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200000003"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:48 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:48 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x1) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) 10:14:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000002801000028010000040000000000000000000003000000000200000003"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:48 executing program 4: syz_clone(0x80100000, 0x0, 0xd0a6273a550000, &(0x7f00000001c0), 0x0, 0x0) [ 1695.255355][ T2174] FAULT_INJECTION: forcing a failure. [ 1695.255355][ T2174] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.293856][ T2174] CPU: 0 PID: 2174 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1695.303849][ T2174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1695.313747][ T2174] Call Trace: [ 1695.316864][ T2174] [ 1695.319645][ T2174] dump_stack_lvl+0x151/0x1b7 [ 1695.324157][ T2174] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1695.329453][ T2174] ? do_syscall_64+0x44/0xd0 [ 1695.333883][ T2174] dump_stack+0x15/0x17 [ 1695.337868][ T2174] should_fail+0x3c0/0x510 [ 1695.342121][ T2174] __should_failslab+0x9f/0xe0 [ 1695.346723][ T2174] should_failslab+0x9/0x20 [ 1695.351061][ T2174] kmem_cache_alloc+0x4f/0x2f0 [ 1695.355663][ T2174] ? anon_vma_clone+0xa1/0x4f0 [ 1695.360266][ T2174] anon_vma_clone+0xa1/0x4f0 [ 1695.364694][ T2174] anon_vma_fork+0x91/0x4f0 [ 1695.369028][ T2174] ? anon_vma_name+0x4c/0x70 [ 1695.373455][ T2174] dup_mmap+0x750/0xea0 [ 1695.377451][ T2174] ? __delayed_free_task+0x20/0x20 [ 1695.382413][ T2174] ? mm_init+0x807/0x960 [ 1695.386475][ T2174] dup_mm+0x91/0x330 [ 1695.390206][ T2174] copy_mm+0x108/0x1b0 [ 1695.394113][ T2174] copy_process+0x1295/0x3250 [ 1695.398624][ T2174] ? proc_fail_nth_write+0x213/0x290 [ 1695.403748][ T2174] ? proc_fail_nth_read+0x220/0x220 [ 1695.408783][ T2174] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1695.413732][ T2174] ? vfs_write+0x9af/0x1050 [ 1695.418065][ T2174] ? vmacache_update+0xb7/0x120 [ 1695.422754][ T2174] kernel_clone+0x22d/0x990 [ 1695.427090][ T2174] ? file_end_write+0x1b0/0x1b0 [ 1695.431780][ T2174] ? __kasan_check_write+0x14/0x20 [ 1695.436724][ T2174] ? create_io_thread+0x1e0/0x1e0 [ 1695.441586][ T2174] ? __mutex_lock_slowpath+0x10/0x10 [ 1695.446707][ T2174] __x64_sys_clone+0x289/0x310 [ 1695.451305][ T2174] ? __do_sys_vfork+0x130/0x130 [ 1695.455997][ T2174] ? debug_smp_processor_id+0x17/0x20 [ 1695.461246][ T2174] do_syscall_64+0x44/0xd0 [ 1695.465450][ T2174] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1695.471180][ T2174] RIP: 0033:0x7f03091130d9 [ 1695.475433][ T2174] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1695.494877][ T2174] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1695.503121][ T2174] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1695.510930][ T2174] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1695.518743][ T2174] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1695.526554][ T2174] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1695.534365][ T2174] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1695.542178][ T2174] 10:14:49 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 10:14:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:49 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffe40) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/155, 0x9b) 10:14:49 executing program 4: syz_clone(0x80100000, 0x0, 0xf0010d1b000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:49 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffe40) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/155, 0x9b) bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffe40) (async) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/155, 0x9b) (async) 10:14:49 executing program 4: syz_clone(0x80100000, 0x0, 0xf0ff1f00000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:49 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffe40) read$watch_queue(0xffffffffffffffff, &(0x7f0000000000)=""/155, 0x9b) 10:14:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1695.761823][ T2190] FAULT_INJECTION: forcing a failure. [ 1695.761823][ T2190] name failslab, interval 1, probability 0, space 0, times 0 [ 1695.806804][ T2190] CPU: 0 PID: 2190 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1695.816792][ T2190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1695.826688][ T2190] Call Trace: [ 1695.829823][ T2190] [ 1695.832593][ T2190] dump_stack_lvl+0x151/0x1b7 [ 1695.837102][ T2190] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1695.842396][ T2190] dump_stack+0x15/0x17 [ 1695.846388][ T2190] should_fail+0x3c0/0x510 [ 1695.850645][ T2190] __should_failslab+0x9f/0xe0 [ 1695.855243][ T2190] should_failslab+0x9/0x20 [ 1695.859581][ T2190] kmem_cache_alloc+0x4f/0x2f0 [ 1695.864180][ T2190] ? vm_area_dup+0x26/0x1d0 [ 1695.868523][ T2190] vm_area_dup+0x26/0x1d0 [ 1695.872696][ T2190] dup_mmap+0x6b8/0xea0 [ 1695.876681][ T2190] ? __delayed_free_task+0x20/0x20 [ 1695.881626][ T2190] ? mm_init+0x807/0x960 [ 1695.885705][ T2190] dup_mm+0x91/0x330 [ 1695.889523][ T2190] copy_mm+0x108/0x1b0 [ 1695.893521][ T2190] copy_process+0x1295/0x3250 [ 1695.898032][ T2190] ? proc_fail_nth_write+0x213/0x290 [ 1695.903150][ T2190] ? proc_fail_nth_read+0x220/0x220 [ 1695.908182][ T2190] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1695.913137][ T2190] ? vfs_write+0x9af/0x1050 [ 1695.917469][ T2190] ? vmacache_update+0xb7/0x120 [ 1695.922157][ T2190] kernel_clone+0x22d/0x990 [ 1695.926493][ T2190] ? file_end_write+0x1b0/0x1b0 [ 1695.931183][ T2190] ? __kasan_check_write+0x14/0x20 [ 1695.936135][ T2190] ? create_io_thread+0x1e0/0x1e0 [ 1695.940990][ T2190] ? __mutex_lock_slowpath+0x10/0x10 [ 1695.946115][ T2190] __x64_sys_clone+0x289/0x310 [ 1695.950714][ T2190] ? __do_sys_vfork+0x130/0x130 [ 1695.955399][ T2190] ? debug_smp_processor_id+0x17/0x20 [ 1695.960605][ T2190] do_syscall_64+0x44/0xd0 [ 1695.964856][ T2190] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1695.970585][ T2190] RIP: 0033:0x7f03091130d9 [ 1695.974840][ T2190] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1695.994281][ T2190] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1696.002529][ T2190] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1696.010338][ T2190] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1696.018154][ T2190] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1696.025960][ T2190] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1696.033770][ T2190] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1696.041586][ T2190] 10:14:49 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) 10:14:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300"], &(0x7f0000000480)=""/188, 0x144, 0xbc, 0x1}, 0x20) 10:14:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:49 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r1}) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x2, @empty}}, 0x1e) 10:14:49 executing program 4: syz_clone(0x80100000, 0x0, 0x100000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:49 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async, rerun: 32) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) (rerun: 32) write$binfmt_elf32(r0, 0x0, 0x0) (async) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) (async, rerun: 64) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r1}) (async, rerun: 64) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x2, @empty}}, 0x1e) 10:14:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], 0x0, 0x144, 0x0, 0x1}, 0x20) 10:14:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], 0x0, 0x144, 0x0, 0x1}, 0x20) [ 1696.234232][ T2218] FAULT_INJECTION: forcing a failure. [ 1696.234232][ T2218] name failslab, interval 1, probability 0, space 0, times 0 [ 1696.278023][ T2218] CPU: 0 PID: 2218 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1696.288013][ T2218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1696.297909][ T2218] Call Trace: [ 1696.301027][ T2218] [ 1696.303805][ T2218] dump_stack_lvl+0x151/0x1b7 [ 1696.308325][ T2218] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1696.313618][ T2218] dump_stack+0x15/0x17 [ 1696.317621][ T2218] should_fail+0x3c0/0x510 [ 1696.321863][ T2218] __should_failslab+0x9f/0xe0 [ 1696.326460][ T2218] should_failslab+0x9/0x20 [ 1696.330797][ T2218] kmem_cache_alloc+0x4f/0x2f0 [ 1696.335398][ T2218] ? vm_area_dup+0x26/0x1d0 [ 1696.339738][ T2218] vm_area_dup+0x26/0x1d0 [ 1696.343905][ T2218] dup_mmap+0x6b8/0xea0 [ 1696.347900][ T2218] ? __delayed_free_task+0x20/0x20 [ 1696.352845][ T2218] ? mm_init+0x807/0x960 [ 1696.356925][ T2218] dup_mm+0x91/0x330 [ 1696.360658][ T2218] copy_mm+0x108/0x1b0 [ 1696.364563][ T2218] copy_process+0x1295/0x3250 [ 1696.369077][ T2218] ? proc_fail_nth_write+0x213/0x290 [ 1696.374198][ T2218] ? proc_fail_nth_read+0x220/0x220 [ 1696.379230][ T2218] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1696.384177][ T2218] ? vfs_write+0x9af/0x1050 [ 1696.388514][ T2218] ? vmacache_update+0xb7/0x120 [ 1696.393202][ T2218] kernel_clone+0x22d/0x990 [ 1696.397545][ T2218] ? file_end_write+0x1b0/0x1b0 [ 1696.402229][ T2218] ? __kasan_check_write+0x14/0x20 [ 1696.407176][ T2218] ? create_io_thread+0x1e0/0x1e0 [ 1696.412035][ T2218] ? __mutex_lock_slowpath+0x10/0x10 [ 1696.417157][ T2218] __x64_sys_clone+0x289/0x310 [ 1696.421756][ T2218] ? __do_sys_vfork+0x130/0x130 [ 1696.426449][ T2218] ? debug_smp_processor_id+0x17/0x20 [ 1696.431652][ T2218] do_syscall_64+0x44/0xd0 [ 1696.435907][ T2218] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1696.441633][ T2218] RIP: 0033:0x7f03091130d9 [ 1696.445885][ T2218] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1696.465330][ T2218] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1696.473573][ T2218] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1696.481384][ T2218] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1696.489197][ T2218] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1696.497004][ T2218] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1696.504818][ T2218] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1696.512634][ T2218] 10:14:50 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 10:14:50 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) (async) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000000)={r1}) (async) bind$pptp(0xffffffffffffffff, &(0x7f0000000040)={0x18, 0x2, {0x2, @empty}}, 0x1e) 10:14:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], 0x0, 0x144, 0x0, 0x1}, 0x20) 10:14:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:50 executing program 4: syz_clone(0x80100000, 0x0, 0x200000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc}, 0x20) 10:14:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc}, 0x20) 10:14:50 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0xe1e50b739c4054eb, 0x0, 0x3f, 0x8001, {{0x6, 0x4, 0x3, 0x1, 0x18, 0x67, 0x0, 0x6, 0x29, 0x0, @loopback, @multicast2, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000080)={'tunl0\x00', r0, 0x700, 0x1, 0x0, 0x1, {{0x26, 0x4, 0x1, 0x0, 0x98, 0x68, 0x0, 0x4, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x1}, @empty, {[@ssrr={0x89, 0xf, 0x80, [@remote, @multicast2, @multicast1]}, @timestamp_addr={0x44, 0xc, 0x62, 0x1, 0xd, [{@loopback, 0x5}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc1, 0x3, 0xa, [{@multicast1, 0x5}]}, @rr={0x7, 0xb, 0x26, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @noop, @timestamp_prespec={0x44, 0x4c, 0x1b, 0x3, 0x1, [{@empty, 0x7fff}, {@empty, 0x7fff}, {@loopback, 0x2}, {@multicast1, 0x8}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x200}, {@loopback, 0x6}, {@private=0xa010101, 0x78be}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@loopback, 0x3}]}]}}}}}) 10:14:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000540)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb01001800000000000000280100002801000004000000000000000000000300000000020000000300be"], &(0x7f0000000480)=""/188, 0x144, 0xbc}, 0x20) [ 1696.765532][ T2258] FAULT_INJECTION: forcing a failure. [ 1696.765532][ T2258] name failslab, interval 1, probability 0, space 0, times 0 [ 1696.783788][ T2258] CPU: 1 PID: 2258 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1696.793775][ T2258] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1696.803673][ T2258] Call Trace: [ 1696.806798][ T2258] [ 1696.809573][ T2258] dump_stack_lvl+0x151/0x1b7 [ 1696.814086][ T2258] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1696.819382][ T2258] dump_stack+0x15/0x17 [ 1696.823371][ T2258] should_fail+0x3c0/0x510 [ 1696.827627][ T2258] __should_failslab+0x9f/0xe0 [ 1696.832223][ T2258] should_failslab+0x9/0x20 [ 1696.836566][ T2258] kmem_cache_alloc+0x4f/0x2f0 [ 1696.841167][ T2258] ? vm_area_dup+0x26/0x1d0 [ 1696.845504][ T2258] ? __kasan_check_read+0x11/0x20 [ 1696.850364][ T2258] vm_area_dup+0x26/0x1d0 [ 1696.854531][ T2258] dup_mmap+0x6b8/0xea0 [ 1696.858532][ T2258] ? __delayed_free_task+0x20/0x20 [ 1696.863471][ T2258] ? mm_init+0x807/0x960 [ 1696.867550][ T2258] dup_mm+0x91/0x330 [ 1696.871281][ T2258] copy_mm+0x108/0x1b0 [ 1696.875187][ T2258] copy_process+0x1295/0x3250 [ 1696.879699][ T2258] ? proc_fail_nth_write+0x213/0x290 [ 1696.884821][ T2258] ? proc_fail_nth_read+0x220/0x220 [ 1696.889854][ T2258] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1696.894801][ T2258] ? vfs_write+0x9af/0x1050 [ 1696.899140][ T2258] ? vmacache_update+0xb7/0x120 [ 1696.903827][ T2258] kernel_clone+0x22d/0x990 [ 1696.908167][ T2258] ? file_end_write+0x1b0/0x1b0 [ 1696.912858][ T2258] ? __kasan_check_write+0x14/0x20 [ 1696.917800][ T2258] ? create_io_thread+0x1e0/0x1e0 [ 1696.922661][ T2258] ? __mutex_lock_slowpath+0x10/0x10 [ 1696.927782][ T2258] __x64_sys_clone+0x289/0x310 [ 1696.932384][ T2258] ? __do_sys_vfork+0x130/0x130 [ 1696.937075][ T2258] ? debug_smp_processor_id+0x17/0x20 [ 1696.942279][ T2258] do_syscall_64+0x44/0xd0 [ 1696.946538][ T2258] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1696.952257][ T2258] RIP: 0033:0x7f03091130d9 [ 1696.956512][ T2258] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1696.976041][ T2258] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1696.984289][ T2258] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1696.992093][ T2258] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1696.999905][ T2258] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.007716][ T2258] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 10:14:50 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) 10:14:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:50 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0xe1e50b739c4054eb, 0x0, 0x3f, 0x8001, {{0x6, 0x4, 0x3, 0x1, 0x18, 0x67, 0x0, 0x6, 0x29, 0x0, @loopback, @multicast2, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000080)={'tunl0\x00', r0, 0x700, 0x1, 0x0, 0x1, {{0x26, 0x4, 0x1, 0x0, 0x98, 0x68, 0x0, 0x4, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x1}, @empty, {[@ssrr={0x89, 0xf, 0x80, [@remote, @multicast2, @multicast1]}, @timestamp_addr={0x44, 0xc, 0x62, 0x1, 0xd, [{@loopback, 0x5}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc1, 0x3, 0xa, [{@multicast1, 0x5}]}, @rr={0x7, 0xb, 0x26, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @noop, @timestamp_prespec={0x44, 0x4c, 0x1b, 0x3, 0x1, [{@empty, 0x7fff}, {@empty, 0x7fff}, {@loopback, 0x2}, {@multicast1, 0x8}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x200}, {@loopback, 0x6}, {@private=0xa010101, 0x78be}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@loopback, 0x3}]}]}}}}}) 10:14:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:50 executing program 4: syz_clone(0x80100000, 0x0, 0x700000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1697.015529][ T2258] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1697.023343][ T2258] [ 1697.055138][ T2269] FAULT_INJECTION: forcing a failure. 10:14:50 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0xe1e50b739c4054eb, 0x0, 0x3f, 0x8001, {{0x6, 0x4, 0x3, 0x1, 0x18, 0x67, 0x0, 0x6, 0x29, 0x0, @loopback, @multicast2, {[@noop]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000080)={'tunl0\x00', r0, 0x700, 0x1, 0x0, 0x1, {{0x26, 0x4, 0x1, 0x0, 0x98, 0x68, 0x0, 0x4, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x1}, @empty, {[@ssrr={0x89, 0xf, 0x80, [@remote, @multicast2, @multicast1]}, @timestamp_addr={0x44, 0xc, 0x62, 0x1, 0xd, [{@loopback, 0x5}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc1, 0x3, 0xa, [{@multicast1, 0x5}]}, @rr={0x7, 0xb, 0x26, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @noop, @timestamp_prespec={0x44, 0x4c, 0x1b, 0x3, 0x1, [{@empty, 0x7fff}, {@empty, 0x7fff}, {@loopback, 0x2}, {@multicast1, 0x8}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x200}, {@loopback, 0x6}, {@private=0xa010101, 0x78be}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@loopback, 0x3}]}]}}}}}) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000040)={'syztnl0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0xe1e50b739c4054eb, 0x0, 0x3f, 0x8001, {{0x6, 0x4, 0x3, 0x1, 0x18, 0x67, 0x0, 0x6, 0x29, 0x0, @loopback, @multicast2, {[@noop]}}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'gre0\x00', &(0x7f0000000080)={'tunl0\x00', r0, 0x700, 0x1, 0x0, 0x1, {{0x26, 0x4, 0x1, 0x0, 0x98, 0x68, 0x0, 0x4, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x1}, @empty, {[@ssrr={0x89, 0xf, 0x80, [@remote, @multicast2, @multicast1]}, @timestamp_addr={0x44, 0xc, 0x62, 0x1, 0xd, [{@loopback, 0x5}]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0xc, 0xc1, 0x3, 0xa, [{@multicast1, 0x5}]}, @rr={0x7, 0xb, 0x26, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local]}, @noop, @timestamp_prespec={0x44, 0x4c, 0x1b, 0x3, 0x1, [{@empty, 0x7fff}, {@empty, 0x7fff}, {@loopback, 0x2}, {@multicast1, 0x8}, {@dev={0xac, 0x14, 0x14, 0x35}, 0x200}, {@loopback, 0x6}, {@private=0xa010101, 0x78be}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x1}, {@loopback, 0x3}]}]}}}}}) (async) 10:14:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:50 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x81, 0x2, {{0x6, 0x4, 0x1, 0x0, 0x18, 0x67, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010100, @multicast1, {[@lsrr={0x83, 0x3, 0xc4}]}}}}}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="080027bd7000fddbdf2504000000080002000800000030000180140004002001000000000000000000000000000208000700", @ANYRES32=r2, @ANYBLOB="060001000200000005000200400000001400018008000700", @ANYRES32=r3, @ANYBLOB="060001001300000008000000"], 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4008000) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24000081) [ 1697.055138][ T2269] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1697.143838][ T2269] CPU: 0 PID: 2269 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1697.153830][ T2269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1697.163724][ T2269] Call Trace: [ 1697.166848][ T2269] [ 1697.169624][ T2269] dump_stack_lvl+0x151/0x1b7 [ 1697.174143][ T2269] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1697.179435][ T2269] ? __kasan_check_write+0x14/0x20 [ 1697.184381][ T2269] ? __set_page_owner+0x2ee/0x310 [ 1697.189242][ T2269] dump_stack+0x15/0x17 [ 1697.193233][ T2269] should_fail+0x3c0/0x510 [ 1697.197485][ T2269] should_fail_alloc_page+0x58/0x70 [ 1697.202517][ T2269] __alloc_pages+0x1de/0x7c0 [ 1697.206947][ T2269] ? __count_vm_events+0x30/0x30 [ 1697.211716][ T2269] ? __count_vm_events+0x30/0x30 [ 1697.216491][ T2269] ? __kasan_check_write+0x14/0x20 [ 1697.221440][ T2269] ? _raw_spin_lock+0xa3/0x1b0 [ 1697.226037][ T2269] __pmd_alloc+0xb1/0x550 [ 1697.230205][ T2269] ? kmem_cache_alloc+0x189/0x2f0 [ 1697.235064][ T2269] ? anon_vma_fork+0x1b9/0x4f0 [ 1697.239663][ T2269] ? __pud_alloc+0x260/0x260 [ 1697.244088][ T2269] ? __pud_alloc+0x218/0x260 [ 1697.248518][ T2269] ? do_handle_mm_fault+0x2370/0x2370 [ 1697.253728][ T2269] copy_page_range+0xd04/0x1090 [ 1697.258415][ T2269] ? pfn_valid+0x1e0/0x1e0 [ 1697.262667][ T2269] dup_mmap+0x99f/0xea0 [ 1697.266657][ T2269] ? __delayed_free_task+0x20/0x20 [ 1697.271603][ T2269] ? mm_init+0x807/0x960 [ 1697.275680][ T2269] dup_mm+0x91/0x330 [ 1697.279412][ T2269] copy_mm+0x108/0x1b0 [ 1697.283319][ T2269] copy_process+0x1295/0x3250 [ 1697.287836][ T2269] ? proc_fail_nth_write+0x213/0x290 [ 1697.292956][ T2269] ? proc_fail_nth_read+0x220/0x220 [ 1697.297989][ T2269] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1697.302936][ T2269] ? vfs_write+0x9af/0x1050 [ 1697.307274][ T2269] ? vmacache_update+0xb7/0x120 [ 1697.311964][ T2269] kernel_clone+0x22d/0x990 [ 1697.316304][ T2269] ? file_end_write+0x1b0/0x1b0 [ 1697.320986][ T2269] ? __kasan_check_write+0x14/0x20 [ 1697.325936][ T2269] ? create_io_thread+0x1e0/0x1e0 [ 1697.330797][ T2269] ? __mutex_lock_slowpath+0x10/0x10 [ 1697.335916][ T2269] __x64_sys_clone+0x289/0x310 [ 1697.340515][ T2269] ? __do_sys_vfork+0x130/0x130 [ 1697.345204][ T2269] ? debug_smp_processor_id+0x17/0x20 [ 1697.350414][ T2269] do_syscall_64+0x44/0xd0 [ 1697.354663][ T2269] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1697.360391][ T2269] RIP: 0033:0x7f03091130d9 [ 1697.364641][ T2269] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1697.384086][ T2269] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1697.392335][ T2269] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1697.400146][ T2269] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1697.407957][ T2269] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.415762][ T2269] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1697.423578][ T2269] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1697.431392][ T2269] 10:14:51 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) 10:14:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:51 executing program 4: syz_clone(0x80100000, 0x0, 0x800000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:51 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) (async) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) (async, rerun: 32) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) (async, rerun: 32) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x81, 0x2, {{0x6, 0x4, 0x1, 0x0, 0x18, 0x67, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010100, @multicast1, {[@lsrr={0x83, 0x3, 0xc4}]}}}}}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="080027bd7000fddbdf2504000000080002000800000030000180140004002001000000000000000000000000000208000700", @ANYRES32=r2, @ANYBLOB="060001000200000005000200400000001400018008000700", @ANYRES32=r3, @ANYBLOB="060001001300000008000000"], 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4008000) (async) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24000081) 10:14:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:51 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x81, 0x2, {{0x6, 0x4, 0x1, 0x0, 0x18, 0x67, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010100, @multicast1, {[@lsrr={0x83, 0x3, 0xc4}]}}}}}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="080027bd7000fddbdf2504000000080002000800000030000180140004002001000000000000000000000000000208000700", @ANYRES32=r2, @ANYBLOB="060001000200000005000200400000001400018008000700", @ANYRES32=r3, @ANYBLOB="060001001300000008000000"], 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4008000) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24000081) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'vcan0\x00'}) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.threads\x00', 0x2, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'ip_vti0\x00', &(0x7f00000000c0)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x81, 0x2, {{0x6, 0x4, 0x1, 0x0, 0x18, 0x67, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010100, @multicast1, {[@lsrr={0x83, 0x3, 0xc4}]}}}}}) (async) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="080027bd7000fddbdf2504000000080002000800000030000180140004002001000000000000000000000000000208000700", @ANYRES32=r2, @ANYBLOB="060001000200000005000200400000001400018008000700", @ANYRES32=r3, @ANYBLOB="060001001300000008000000"], 0x70}, 0x1, 0x0, 0x0, 0x40}, 0x4008000) (async) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x20, r1, 0x400, 0x70bd29, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x3}, @MPTCP_PM_ATTR_ADDR={0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x24000081) (async) 10:14:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1697.564110][ T2296] FAULT_INJECTION: forcing a failure. [ 1697.564110][ T2296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1697.594690][ T2296] CPU: 0 PID: 2296 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1697.604682][ T2296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1697.614577][ T2296] Call Trace: [ 1697.617699][ T2296] [ 1697.620480][ T2296] dump_stack_lvl+0x151/0x1b7 [ 1697.624997][ T2296] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1697.630288][ T2296] dump_stack+0x15/0x17 [ 1697.634280][ T2296] should_fail+0x3c0/0x510 [ 1697.638534][ T2296] should_fail_alloc_page+0x58/0x70 [ 1697.643568][ T2296] __alloc_pages+0x1de/0x7c0 [ 1697.647993][ T2296] ? __count_vm_events+0x30/0x30 [ 1697.652764][ T2296] ? dup_mm+0x91/0x330 [ 1697.656755][ T2296] ? copy_mm+0x108/0x1b0 [ 1697.660833][ T2296] ? copy_process+0x1295/0x3250 [ 1697.665521][ T2296] ? kernel_clone+0x22d/0x990 [ 1697.670033][ T2296] ? __x64_sys_clone+0x289/0x310 [ 1697.674814][ T2296] pte_alloc_one+0x73/0x1b0 [ 1697.679150][ T2296] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1697.684183][ T2296] ? __kasan_check_write+0x14/0x20 [ 1697.689128][ T2296] ? __set_page_owner+0x2ee/0x310 [ 1697.693990][ T2296] __pte_alloc+0x86/0x350 [ 1697.698155][ T2296] ? post_alloc_hook+0x1ab/0x1b0 [ 1697.702930][ T2296] ? free_pgtables+0x210/0x210 [ 1697.707526][ T2296] ? get_page_from_freelist+0x38b/0x400 [ 1697.712916][ T2296] copy_pte_range+0x1b1f/0x20b0 [ 1697.717601][ T2296] ? __kunmap_atomic+0x80/0x80 [ 1697.722197][ T2296] ? __pud_alloc+0x260/0x260 [ 1697.726621][ T2296] ? __pud_alloc+0x218/0x260 [ 1697.731049][ T2296] ? do_handle_mm_fault+0x2370/0x2370 [ 1697.736260][ T2296] copy_page_range+0xc1e/0x1090 [ 1697.740946][ T2296] ? pfn_valid+0x1e0/0x1e0 [ 1697.745204][ T2296] dup_mmap+0x99f/0xea0 [ 1697.749188][ T2296] ? __delayed_free_task+0x20/0x20 [ 1697.754137][ T2296] ? mm_init+0x807/0x960 [ 1697.758213][ T2296] dup_mm+0x91/0x330 [ 1697.761948][ T2296] copy_mm+0x108/0x1b0 [ 1697.765853][ T2296] copy_process+0x1295/0x3250 [ 1697.770367][ T2296] ? proc_fail_nth_write+0x213/0x290 [ 1697.775494][ T2296] ? proc_fail_nth_read+0x220/0x220 [ 1697.780519][ T2296] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1697.785467][ T2296] ? vfs_write+0x9af/0x1050 [ 1697.789807][ T2296] ? vmacache_update+0xb7/0x120 [ 1697.794495][ T2296] kernel_clone+0x22d/0x990 [ 1697.798835][ T2296] ? file_end_write+0x1b0/0x1b0 [ 1697.803519][ T2296] ? __kasan_check_write+0x14/0x20 [ 1697.808475][ T2296] ? create_io_thread+0x1e0/0x1e0 [ 1697.813326][ T2296] ? __mutex_lock_slowpath+0x10/0x10 [ 1697.818448][ T2296] __x64_sys_clone+0x289/0x310 [ 1697.823055][ T2296] ? __do_sys_vfork+0x130/0x130 [ 1697.827738][ T2296] ? debug_smp_processor_id+0x17/0x20 [ 1697.832944][ T2296] do_syscall_64+0x44/0xd0 [ 1697.837195][ T2296] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1697.842924][ T2296] RIP: 0033:0x7f03091130d9 [ 1697.847173][ T2296] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1697.866620][ T2296] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1697.874862][ T2296] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1697.882673][ T2296] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1697.890486][ T2296] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1697.898294][ T2296] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1697.906107][ T2296] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 10:14:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:51 executing program 4: syz_clone(0x80100000, 0x0, 0x900000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:51 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffeaa) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40844}, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc041}, 0x850) 10:14:51 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) [ 1697.913924][ T2296] 10:14:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 10:14:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:51 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffeaa) (async) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40844}, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc041}, 0x850) [ 1697.990293][ T2334] FAULT_INJECTION: forcing a failure. [ 1697.990293][ T2334] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.014248][ T2334] CPU: 1 PID: 2334 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1698.024237][ T2334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1698.034134][ T2334] Call Trace: [ 1698.037256][ T2334] [ 1698.040032][ T2334] dump_stack_lvl+0x151/0x1b7 [ 1698.044552][ T2334] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1698.049842][ T2334] dump_stack+0x15/0x17 [ 1698.053835][ T2334] should_fail+0x3c0/0x510 [ 1698.058083][ T2334] __should_failslab+0x9f/0xe0 [ 1698.063029][ T2334] should_failslab+0x9/0x20 [ 1698.067371][ T2334] kmem_cache_alloc+0x4f/0x2f0 [ 1698.071973][ T2334] ? vm_area_dup+0x26/0x1d0 [ 1698.076314][ T2334] vm_area_dup+0x26/0x1d0 [ 1698.080481][ T2334] dup_mmap+0x6b8/0xea0 [ 1698.084471][ T2334] ? __delayed_free_task+0x20/0x20 [ 1698.089418][ T2334] ? mm_init+0x807/0x960 [ 1698.093495][ T2334] dup_mm+0x91/0x330 [ 1698.097226][ T2334] copy_mm+0x108/0x1b0 [ 1698.101141][ T2334] copy_process+0x1295/0x3250 [ 1698.105649][ T2334] ? proc_fail_nth_write+0x213/0x290 [ 1698.110769][ T2334] ? proc_fail_nth_read+0x220/0x220 [ 1698.115801][ T2334] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1698.120747][ T2334] ? vfs_write+0x9af/0x1050 [ 1698.125088][ T2334] ? vmacache_update+0xb7/0x120 [ 1698.129776][ T2334] kernel_clone+0x22d/0x990 [ 1698.134114][ T2334] ? file_end_write+0x1b0/0x1b0 10:14:51 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffeaa) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40844}, 0x10) r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc041}, 0x850) bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffeaa) (async) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40844}, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc041}, 0x850) (async) 10:14:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1698.138800][ T2334] ? __kasan_check_write+0x14/0x20 [ 1698.143746][ T2334] ? create_io_thread+0x1e0/0x1e0 [ 1698.148608][ T2334] ? __mutex_lock_slowpath+0x10/0x10 [ 1698.153730][ T2334] __x64_sys_clone+0x289/0x310 [ 1698.158330][ T2334] ? __do_sys_vfork+0x130/0x130 [ 1698.163019][ T2334] ? debug_smp_processor_id+0x17/0x20 [ 1698.168224][ T2334] do_syscall_64+0x44/0xd0 [ 1698.172475][ T2334] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1698.178201][ T2334] RIP: 0033:0x7f03091130d9 [ 1698.182457][ T2334] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1698.201899][ T2334] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1698.210143][ T2334] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1698.217955][ T2334] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1698.225768][ T2334] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1698.233573][ T2334] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 10:14:51 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 10:14:51 executing program 4: syz_clone(0x80100000, 0x0, 0x1100000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 10:14:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:51 executing program 4: syz_clone(0x80100000, 0x0, 0x1f00000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:51 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xffffffffffffff13) [ 1698.241388][ T2334] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1698.249207][ T2334] 10:14:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:14:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:14:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1698.312530][ T2360] FAULT_INJECTION: forcing a failure. [ 1698.312530][ T2360] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1698.349851][ T2360] CPU: 0 PID: 2360 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1698.359845][ T2360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1698.369738][ T2360] Call Trace: [ 1698.372861][ T2360] [ 1698.375639][ T2360] dump_stack_lvl+0x151/0x1b7 [ 1698.380151][ T2360] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1698.385450][ T2360] dump_stack+0x15/0x17 [ 1698.389443][ T2360] should_fail+0x3c0/0x510 [ 1698.393692][ T2360] should_fail_alloc_page+0x58/0x70 [ 1698.398725][ T2360] __alloc_pages+0x1de/0x7c0 [ 1698.403153][ T2360] ? __count_vm_events+0x30/0x30 [ 1698.407924][ T2360] ? __this_cpu_preempt_check+0x13/0x20 [ 1698.413305][ T2360] ? __mod_node_page_state+0xac/0xf0 [ 1698.418428][ T2360] pte_alloc_one+0x73/0x1b0 [ 1698.422765][ T2360] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1698.427798][ T2360] __pte_alloc+0x86/0x350 [ 1698.431968][ T2360] ? free_pgtables+0x210/0x210 [ 1698.436564][ T2360] ? _raw_spin_lock+0xa3/0x1b0 [ 1698.441164][ T2360] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1698.446375][ T2360] ? __kernel_text_address+0x9a/0x110 [ 1698.451584][ T2360] copy_pte_range+0x1b1f/0x20b0 [ 1698.456275][ T2360] ? __kunmap_atomic+0x80/0x80 [ 1698.460875][ T2360] ? __kasan_slab_alloc+0xc4/0xe0 [ 1698.465725][ T2360] ? __kasan_slab_alloc+0xb2/0xe0 [ 1698.470585][ T2360] ? kmem_cache_alloc+0x189/0x2f0 [ 1698.475452][ T2360] ? vm_area_dup+0x26/0x1d0 [ 1698.479956][ T2360] ? dup_mmap+0x6b8/0xea0 [ 1698.484122][ T2360] ? dup_mm+0x91/0x330 [ 1698.488029][ T2360] ? copy_mm+0x108/0x1b0 [ 1698.492109][ T2360] ? copy_process+0x1295/0x3250 [ 1698.496794][ T2360] ? kernel_clone+0x22d/0x990 [ 1698.501307][ T2360] ? __x64_sys_clone+0x289/0x310 [ 1698.506081][ T2360] ? do_syscall_64+0x44/0xd0 [ 1698.510506][ T2360] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1698.516412][ T2360] copy_page_range+0xc1e/0x1090 [ 1698.521104][ T2360] ? pfn_valid+0x1e0/0x1e0 [ 1698.525349][ T2360] dup_mmap+0x99f/0xea0 [ 1698.529340][ T2360] ? __delayed_free_task+0x20/0x20 [ 1698.534290][ T2360] ? mm_init+0x807/0x960 [ 1698.538366][ T2360] dup_mm+0x91/0x330 [ 1698.542101][ T2360] copy_mm+0x108/0x1b0 [ 1698.546004][ T2360] copy_process+0x1295/0x3250 [ 1698.550518][ T2360] ? proc_fail_nth_write+0x213/0x290 [ 1698.555636][ T2360] ? proc_fail_nth_read+0x220/0x220 [ 1698.560672][ T2360] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1698.565619][ T2360] ? vfs_write+0x9af/0x1050 [ 1698.569965][ T2360] ? vmacache_update+0xb7/0x120 [ 1698.574644][ T2360] kernel_clone+0x22d/0x990 [ 1698.578992][ T2360] ? file_end_write+0x1b0/0x1b0 [ 1698.583678][ T2360] ? __kasan_check_write+0x14/0x20 [ 1698.588620][ T2360] ? create_io_thread+0x1e0/0x1e0 [ 1698.593480][ T2360] ? __mutex_lock_slowpath+0x10/0x10 [ 1698.598602][ T2360] __x64_sys_clone+0x289/0x310 [ 1698.603202][ T2360] ? __do_sys_vfork+0x130/0x130 [ 1698.607888][ T2360] ? debug_smp_processor_id+0x17/0x20 [ 1698.613100][ T2360] do_syscall_64+0x44/0xd0 [ 1698.617347][ T2360] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1698.623074][ T2360] RIP: 0033:0x7f03091130d9 [ 1698.627328][ T2360] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1698.646770][ T2360] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1698.655013][ T2360] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 10:14:52 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) 10:14:52 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xffffffffffffff13) 10:14:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:52 executing program 4: syz_clone(0x80100000, 0x0, 0x2000000000000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:14:52 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xffffffffffffff13) 10:14:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 10:14:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:14:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 10:14:52 executing program 4: syz_clone(0x80100000, 0x0, 0x8a03000000000000, &(0x7f00000001c0), 0x0, 0x0) [ 1698.662824][ T2360] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1698.670636][ T2360] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1698.678446][ T2360] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1698.686257][ T2360] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1698.694071][ T2360] [ 1698.744265][ T2396] FAULT_INJECTION: forcing a failure. [ 1698.744265][ T2396] name failslab, interval 1, probability 0, space 0, times 0 [ 1698.777016][ T2396] CPU: 0 PID: 2396 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1698.787014][ T2396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1698.796914][ T2396] Call Trace: [ 1698.800034][ T2396] [ 1698.802857][ T2396] dump_stack_lvl+0x151/0x1b7 [ 1698.807323][ T2396] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1698.812622][ T2396] dump_stack+0x15/0x17 [ 1698.816614][ T2396] should_fail+0x3c0/0x510 [ 1698.820862][ T2396] __should_failslab+0x9f/0xe0 [ 1698.825461][ T2396] should_failslab+0x9/0x20 [ 1698.829801][ T2396] kmem_cache_alloc+0x4f/0x2f0 [ 1698.834404][ T2396] ? vm_area_dup+0x26/0x1d0 [ 1698.838742][ T2396] vm_area_dup+0x26/0x1d0 [ 1698.842908][ T2396] dup_mmap+0x6b8/0xea0 [ 1698.846911][ T2396] ? __delayed_free_task+0x20/0x20 [ 1698.851847][ T2396] ? mm_init+0x807/0x960 [ 1698.855926][ T2396] dup_mm+0x91/0x330 [ 1698.859660][ T2396] copy_mm+0x108/0x1b0 [ 1698.863562][ T2396] copy_process+0x1295/0x3250 [ 1698.868080][ T2396] ? proc_fail_nth_write+0x213/0x290 [ 1698.873198][ T2396] ? proc_fail_nth_read+0x220/0x220 [ 1698.878232][ T2396] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1698.883179][ T2396] ? vfs_write+0x9af/0x1050 [ 1698.887516][ T2396] ? vmacache_update+0xb7/0x120 [ 1698.892206][ T2396] kernel_clone+0x22d/0x990 [ 1698.896544][ T2396] ? file_end_write+0x1b0/0x1b0 [ 1698.901229][ T2396] ? __kasan_check_write+0x14/0x20 [ 1698.906179][ T2396] ? create_io_thread+0x1e0/0x1e0 [ 1698.911039][ T2396] ? __mutex_lock_slowpath+0x10/0x10 [ 1698.916159][ T2396] __x64_sys_clone+0x289/0x310 [ 1698.920767][ T2396] ? __do_sys_vfork+0x130/0x130 [ 1698.925448][ T2396] ? debug_smp_processor_id+0x17/0x20 [ 1698.930664][ T2396] do_syscall_64+0x44/0xd0 [ 1698.934906][ T2396] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1698.940632][ T2396] RIP: 0033:0x7f03091130d9 [ 1698.944888][ T2396] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1698.964328][ T2396] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1698.972574][ T2396] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1698.980384][ T2396] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:14:52 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) 10:14:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:14:52 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x1) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x412a7e15}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x5, 0xfffffffffffffff8, 0xffffffffffffffff}, @generic={0x8, 0x4, 0x3, 0xff70, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x66, &(0x7f0000000080)=""/102, 0x41000, 0x5, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xf, 0x80000001, 0x1}, 0x10, 0x0, r0}, 0x80) ioctl$PTP_PIN_SETFUNC2(r1, 0x40603d10, &(0x7f0000000880)={'\x00', 0xcf40, 0x3}) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) getpeername$tipc(r2, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000600)={'gre0\x00', &(0x7f0000000540)={'sit0\x00', 0x0, 0x7810, 0x80, 0x6, 0x40, {{0x22, 0x4, 0x0, 0x9, 0x88, 0x65, 0x0, 0x1, 0x2f, 0x0, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0x27, 0xf1, [@broadcast, @remote, @broadcast, @dev={0xac, 0x14, 0x14, 0x27}, @private=0xa010101, @broadcast, @multicast1, @multicast1, @dev={0xac, 0x14, 0x14, 0xb}]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x3c, 0xaa, 0x1, 0x3, [{@dev={0xac, 0x14, 0x14, 0x1d}, 0x4}, {@loopback, 0x97d7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xc9}, {@remote}, {@private=0xa010102, 0xabc8}, {@loopback, 0x5}, {@empty, 0x8}]}, @timestamp={0x44, 0xc, 0x9, 0x0, 0x6, [0xc, 0x1]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xc, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7d0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x3c}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='syzkaller\x00', 0x1f, 0x71, &(0x7f00000004c0)=""/113, 0x41100, 0x1, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000640)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0xc, 0xfffffffc, 0x1f}, 0x10, 0xffffffffffffffff, r0}, 0x80) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x5, 0x1, {{0x22, 0x4, 0x1, 0x17, 0x88, 0x66, 0x0, 0x1, 0x29, 0x0, @multicast1, @empty, {[@ra={0x94, 0x4, 0x1}, @noop, @noop, @generic={0x94, 0xc, "b2115264d5f0e5d03ec2"}, @timestamp={0x44, 0x8, 0x18, 0x0, 0x3, [0x20]}, @noop, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x54, 0x0, [{0x1, 0xb, "b7eb137b67d7cdfc43"}, {0x6, 0xc, "e3166e94189619f6212d"}, {0x1, 0x12, "cf87705c353964e92ebe06652e5ee9b0"}, {0x5, 0xe, "b1e6141f29c7da666d97c8dc"}, {0x7, 0xf, "8ca943f452f938029b81105fb9"}, {0x7, 0x8, "9352c08dfba4"}]}]}}}}}) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000bc0)={'batadv_slave_0\x00', 0x0}) r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r7}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0xe, 0x7, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6513}]}, &(0x7f0000000ac0)='GPL\x00', 0xa0, 0xa6, &(0x7f0000000b00)=""/166, 0x40f00, 0xf, '\x00', r6, 0x26, r2, 0x8, &(0x7f0000000c00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x5, 0xa, 0xd7f, 0xf7f1}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000c80)=[r1, r5, 0xffffffffffffffff]}, 0x80) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x24, r8, 0x200, 0x401, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000011}, 0x40008c1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}]}, 0x2c}}, 0x40080) 10:14:52 executing program 4: syz_clone(0x80100000, 0x0, 0xf5ffffff00000000, &(0x7f00000001c0), 0x0, 0x0) 10:14:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:14:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) [ 1698.988195][ T2396] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1698.996006][ T2396] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1699.003819][ T2396] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1699.011632][ T2396] 10:14:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:14:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) [ 1699.061603][ T2415] FAULT_INJECTION: forcing a failure. [ 1699.061603][ T2415] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1699.112017][ T2415] CPU: 1 PID: 2415 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1699.122002][ T2415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1699.131899][ T2415] Call Trace: [ 1699.135023][ T2415] [ 1699.137802][ T2415] dump_stack_lvl+0x151/0x1b7 [ 1699.142313][ T2415] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1699.147607][ T2415] ? stack_trace_save+0x1f0/0x1f0 [ 1699.152467][ T2415] ? __kernel_text_address+0x9a/0x110 [ 1699.157678][ T2415] dump_stack+0x15/0x17 [ 1699.161669][ T2415] should_fail+0x3c0/0x510 [ 1699.165925][ T2415] should_fail_alloc_page+0x58/0x70 [ 1699.170953][ T2415] __alloc_pages+0x1de/0x7c0 [ 1699.175378][ T2415] ? stack_trace_save+0x12d/0x1f0 [ 1699.180241][ T2415] ? stack_trace_snprint+0x100/0x100 [ 1699.185361][ T2415] ? __count_vm_events+0x30/0x30 [ 1699.190134][ T2415] ? __kasan_slab_alloc+0xc4/0xe0 [ 1699.194993][ T2415] ? __kasan_slab_alloc+0xb2/0xe0 [ 1699.199853][ T2415] ? kmem_cache_alloc+0x189/0x2f0 [ 1699.204721][ T2415] ? anon_vma_fork+0x1b9/0x4f0 [ 1699.209317][ T2415] get_zeroed_page+0x19/0x40 [ 1699.213742][ T2415] __pud_alloc+0x8b/0x260 [ 1699.217912][ T2415] ? do_handle_mm_fault+0x2370/0x2370 [ 1699.223131][ T2415] copy_page_range+0xd9e/0x1090 [ 1699.227810][ T2415] ? pfn_valid+0x1e0/0x1e0 [ 1699.232056][ T2415] dup_mmap+0x99f/0xea0 [ 1699.236048][ T2415] ? __delayed_free_task+0x20/0x20 [ 1699.241002][ T2415] ? mm_init+0x807/0x960 [ 1699.245076][ T2415] dup_mm+0x91/0x330 [ 1699.248846][ T2415] copy_mm+0x108/0x1b0 [ 1699.252717][ T2415] copy_process+0x1295/0x3250 [ 1699.257225][ T2415] ? proc_fail_nth_write+0x213/0x290 [ 1699.262345][ T2415] ? proc_fail_nth_read+0x220/0x220 [ 1699.267378][ T2415] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1699.272323][ T2415] ? vfs_write+0x9af/0x1050 [ 1699.276664][ T2415] ? vmacache_update+0xb7/0x120 [ 1699.281360][ T2415] kernel_clone+0x22d/0x990 [ 1699.285695][ T2415] ? file_end_write+0x1b0/0x1b0 [ 1699.290377][ T2415] ? __kasan_check_write+0x14/0x20 [ 1699.295333][ T2415] ? create_io_thread+0x1e0/0x1e0 [ 1699.300187][ T2415] ? __mutex_lock_slowpath+0x10/0x10 [ 1699.305307][ T2415] __x64_sys_clone+0x289/0x310 [ 1699.309910][ T2415] ? __do_sys_vfork+0x130/0x130 [ 1699.314594][ T2415] ? debug_smp_processor_id+0x17/0x20 [ 1699.319801][ T2415] do_syscall_64+0x44/0xd0 [ 1699.324054][ T2415] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1699.329784][ T2415] RIP: 0033:0x7f03091130d9 [ 1699.334038][ T2415] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1699.353478][ T2415] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 10:14:52 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) 10:14:52 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x1) (async) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x412a7e15}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x5, 0xfffffffffffffff8, 0xffffffffffffffff}, @generic={0x8, 0x4, 0x3, 0xff70, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x66, &(0x7f0000000080)=""/102, 0x41000, 0x5, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xf, 0x80000001, 0x1}, 0x10, 0x0, r0}, 0x80) (async, rerun: 64) ioctl$PTP_PIN_SETFUNC2(r1, 0x40603d10, &(0x7f0000000880)={'\x00', 0xcf40, 0x3}) (async) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) getpeername$tipc(r2, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000600)={'gre0\x00', &(0x7f0000000540)={'sit0\x00', 0x0, 0x7810, 0x80, 0x6, 0x40, {{0x22, 0x4, 0x0, 0x9, 0x88, 0x65, 0x0, 0x1, 0x2f, 0x0, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0x27, 0xf1, [@broadcast, @remote, @broadcast, @dev={0xac, 0x14, 0x14, 0x27}, @private=0xa010101, @broadcast, @multicast1, @multicast1, @dev={0xac, 0x14, 0x14, 0xb}]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x3c, 0xaa, 0x1, 0x3, [{@dev={0xac, 0x14, 0x14, 0x1d}, 0x4}, {@loopback, 0x97d7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xc9}, {@remote}, {@private=0xa010102, 0xabc8}, {@loopback, 0x5}, {@empty, 0x8}]}, @timestamp={0x44, 0xc, 0x9, 0x0, 0x6, [0xc, 0x1]}]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xc, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7d0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x3c}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='syzkaller\x00', 0x1f, 0x71, &(0x7f00000004c0)=""/113, 0x41100, 0x1, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000640)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0xc, 0xfffffffc, 0x1f}, 0x10, 0xffffffffffffffff, r0}, 0x80) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x5, 0x1, {{0x22, 0x4, 0x1, 0x17, 0x88, 0x66, 0x0, 0x1, 0x29, 0x0, @multicast1, @empty, {[@ra={0x94, 0x4, 0x1}, @noop, @noop, @generic={0x94, 0xc, "b2115264d5f0e5d03ec2"}, @timestamp={0x44, 0x8, 0x18, 0x0, 0x3, [0x20]}, @noop, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x54, 0x0, [{0x1, 0xb, "b7eb137b67d7cdfc43"}, {0x6, 0xc, "e3166e94189619f6212d"}, {0x1, 0x12, "cf87705c353964e92ebe06652e5ee9b0"}, {0x5, 0xe, "b1e6141f29c7da666d97c8dc"}, {0x7, 0xf, "8ca943f452f938029b81105fb9"}, {0x7, 0x8, "9352c08dfba4"}]}]}}}}}) (async) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000bc0)={'batadv_slave_0\x00', 0x0}) r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r7}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0xe, 0x7, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6513}]}, &(0x7f0000000ac0)='GPL\x00', 0xa0, 0xa6, &(0x7f0000000b00)=""/166, 0x40f00, 0xf, '\x00', r6, 0x26, r2, 0x8, &(0x7f0000000c00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x5, 0xa, 0xd7f, 0xf7f1}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000c80)=[r1, r5, 0xffffffffffffffff]}, 0x80) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) (async) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x24, r8, 0x200, 0x401, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000011}, 0x40008c1) (async) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}]}, 0x2c}}, 0x40080) 10:14:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:14:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 4: syz_clone(0x80100000, 0x0, 0xfbffffff00000000, &(0x7f00000001c0), 0x0, 0x0) [ 1699.361737][ T2415] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1699.369533][ T2415] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1699.377346][ T2415] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1699.385158][ T2415] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1699.392963][ T2415] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1699.400869][ T2415] 10:14:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) [ 1699.438833][ T2432] FAULT_INJECTION: forcing a failure. [ 1699.438833][ T2432] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1699.474469][ T2432] CPU: 1 PID: 2432 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 10:14:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) [ 1699.484461][ T2432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1699.494356][ T2432] Call Trace: [ 1699.497482][ T2432] [ 1699.500258][ T2432] dump_stack_lvl+0x151/0x1b7 [ 1699.504772][ T2432] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1699.510067][ T2432] dump_stack+0x15/0x17 [ 1699.514060][ T2432] should_fail+0x3c0/0x510 [ 1699.518312][ T2432] should_fail_alloc_page+0x58/0x70 [ 1699.523346][ T2432] __alloc_pages+0x1de/0x7c0 [ 1699.527775][ T2432] ? __count_vm_events+0x30/0x30 [ 1699.532545][ T2432] ? dup_mm+0x91/0x330 10:14:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1699.536458][ T2432] ? copy_mm+0x108/0x1b0 [ 1699.540527][ T2432] ? copy_process+0x1295/0x3250 [ 1699.545212][ T2432] ? kernel_clone+0x22d/0x990 [ 1699.549728][ T2432] ? __x64_sys_clone+0x289/0x310 [ 1699.554507][ T2432] pte_alloc_one+0x73/0x1b0 [ 1699.558848][ T2432] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1699.563874][ T2432] ? __kasan_check_write+0x14/0x20 [ 1699.568826][ T2432] ? __set_page_owner+0x2ee/0x310 [ 1699.573690][ T2432] __pte_alloc+0x86/0x350 [ 1699.577856][ T2432] ? post_alloc_hook+0x1ab/0x1b0 [ 1699.582623][ T2432] ? free_pgtables+0x210/0x210 [ 1699.587220][ T2432] ? get_page_from_freelist+0x38b/0x400 [ 1699.592603][ T2432] copy_pte_range+0x1b1f/0x20b0 [ 1699.597294][ T2432] ? __kunmap_atomic+0x80/0x80 [ 1699.601895][ T2432] ? __pud_alloc+0x260/0x260 [ 1699.606321][ T2432] ? __pud_alloc+0x218/0x260 [ 1699.610756][ T2432] ? do_handle_mm_fault+0x2370/0x2370 [ 1699.615955][ T2432] copy_page_range+0xc1e/0x1090 [ 1699.620641][ T2432] ? pfn_valid+0x1e0/0x1e0 [ 1699.624900][ T2432] dup_mmap+0x99f/0xea0 [ 1699.628882][ T2432] ? __delayed_free_task+0x20/0x20 [ 1699.633833][ T2432] ? mm_init+0x807/0x960 10:14:53 executing program 4: syz_clone(0x80100000, 0x0, 0xffffffff00000000, &(0x7f00000001c0), 0x0, 0x0) [ 1699.637909][ T2432] dup_mm+0x91/0x330 [ 1699.641642][ T2432] copy_mm+0x108/0x1b0 [ 1699.645545][ T2432] copy_process+0x1295/0x3250 [ 1699.650059][ T2432] ? proc_fail_nth_write+0x213/0x290 [ 1699.655182][ T2432] ? proc_fail_nth_read+0x220/0x220 [ 1699.660216][ T2432] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1699.665216][ T2432] ? vfs_write+0x9af/0x1050 [ 1699.669505][ T2432] ? vmacache_update+0xb7/0x120 [ 1699.674191][ T2432] kernel_clone+0x22d/0x990 [ 1699.678526][ T2432] ? file_end_write+0x1b0/0x1b0 [ 1699.683212][ T2432] ? __kasan_check_write+0x14/0x20 [ 1699.688160][ T2432] ? create_io_thread+0x1e0/0x1e0 [ 1699.693018][ T2432] ? __mutex_lock_slowpath+0x10/0x10 [ 1699.698140][ T2432] __x64_sys_clone+0x289/0x310 [ 1699.702743][ T2432] ? __do_sys_vfork+0x130/0x130 [ 1699.707425][ T2432] ? debug_smp_processor_id+0x17/0x20 [ 1699.712629][ T2432] do_syscall_64+0x44/0xd0 [ 1699.716884][ T2432] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1699.722611][ T2432] RIP: 0033:0x7f03091130d9 [ 1699.726864][ T2432] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1699.746317][ T2432] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1699.754552][ T2432] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1699.762363][ T2432] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1699.770174][ T2432] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1699.777987][ T2432] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1699.785800][ T2432] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1699.793620][ T2432] 10:14:53 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) 10:14:53 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x1) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x7, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x412a7e15}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x5, 0xfffffffffffffff8, 0xffffffffffffffff}, @generic={0x8, 0x4, 0x3, 0xff70, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x6}]}, &(0x7f0000000040)='GPL\x00', 0x1, 0x66, &(0x7f0000000080)=""/102, 0x41000, 0x5, '\x00', 0x0, 0x1d, r1, 0x8, &(0x7f0000000100)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0xf, 0x80000001, 0x1}, 0x10, 0x0, r0}, 0x80) (async) ioctl$PTP_PIN_SETFUNC2(r1, 0x40603d10, &(0x7f0000000880)={'\x00', 0xcf40, 0x3}) (async, rerun: 32) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (rerun: 32) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) getpeername$tipc(r2, &(0x7f0000000a00), &(0x7f0000000a40)=0x10) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000600)={'gre0\x00', &(0x7f0000000540)={'sit0\x00', 0x0, 0x7810, 0x80, 0x6, 0x40, {{0x22, 0x4, 0x0, 0x9, 0x88, 0x65, 0x0, 0x1, 0x2f, 0x0, @rand_addr=0x64010101, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@rr={0x7, 0x27, 0xf1, [@broadcast, @remote, @broadcast, @dev={0xac, 0x14, 0x14, 0x27}, @private=0xa010101, @broadcast, @multicast1, @multicast1, @dev={0xac, 0x14, 0x14, 0xb}]}, @ra={0x94, 0x4}, @timestamp_addr={0x44, 0x3c, 0xaa, 0x1, 0x3, [{@dev={0xac, 0x14, 0x14, 0x1d}, 0x4}, {@loopback, 0x97d7}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0xc9}, {@remote}, {@private=0xa010102, 0xabc8}, {@loopback, 0x5}, {@empty, 0x8}]}, @timestamp={0x44, 0xc, 0x9, 0x0, 0x6, [0xc, 0x1]}]}}}}}) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x17, 0xc, &(0x7f0000000400)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7}, [@map_val={0x18, 0x8, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7d0}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, @call={0x85, 0x0, 0x0, 0x3c}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8}]}, &(0x7f0000000480)='syzkaller\x00', 0x1f, 0x71, &(0x7f00000004c0)=""/113, 0x41100, 0x1, '\x00', r3, 0x0, r1, 0x8, &(0x7f0000000640)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000680)={0x4, 0xc, 0xfffffffc, 0x1f}, 0x10, 0xffffffffffffffff, r0}, 0x80) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000300)={'sit0\x00', &(0x7f0000000240)={'gretap0\x00', 0x0, 0x40, 0x8000, 0x5, 0x1, {{0x22, 0x4, 0x1, 0x17, 0x88, 0x66, 0x0, 0x1, 0x29, 0x0, @multicast1, @empty, {[@ra={0x94, 0x4, 0x1}, @noop, @noop, @generic={0x94, 0xc, "b2115264d5f0e5d03ec2"}, @timestamp={0x44, 0x8, 0x18, 0x0, 0x3, [0x20]}, @noop, @ra={0x94, 0x4, 0x1}, @cipso={0x86, 0x54, 0x0, [{0x1, 0xb, "b7eb137b67d7cdfc43"}, {0x6, 0xc, "e3166e94189619f6212d"}, {0x1, 0x12, "cf87705c353964e92ebe06652e5ee9b0"}, {0x5, 0xe, "b1e6141f29c7da666d97c8dc"}, {0x7, 0xf, "8ca943f452f938029b81105fb9"}, {0x7, 0x8, "9352c08dfba4"}]}]}}}}}) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000bc0)={'batadv_slave_0\x00', 0x0}) (async) r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r7}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0xe, 0x7, &(0x7f0000000a80)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, [@map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x7}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6513}]}, &(0x7f0000000ac0)='GPL\x00', 0xa0, 0xa6, &(0x7f0000000b00)=""/166, 0x40f00, 0xf, '\x00', r6, 0x26, r2, 0x8, &(0x7f0000000c00)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000c40)={0x5, 0xa, 0xd7f, 0xf7f1}, 0x10, 0xffffffffffffffff, r7, 0x0, &(0x7f0000000c80)=[r1, r5, 0xffffffffffffffff]}, 0x80) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async, rerun: 64) ioctl$BLKTRACESTART(r5, 0x1274, 0x0) (rerun: 64) r8 = syz_genetlink_get_family_id$batadv(&(0x7f0000000900), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000980)={&(0x7f0000000940)={0x24, r8, 0x200, 0x401, 0x25dfdbff, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000011}, 0x40008c1) (async) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x2c, 0x0, 0x10, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r4}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x5}]}, 0x2c}}, 0x40080) 10:14:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:53 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) capset(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)={0x7fff, 0x5, 0x3, 0xd2, 0x7, 0x3}) 10:14:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1700.015694][ T2490] FAULT_INJECTION: forcing a failure. [ 1700.015694][ T2490] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1700.047490][ T2490] CPU: 1 PID: 2490 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 10:14:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1700.057485][ T2490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1700.067383][ T2490] Call Trace: [ 1700.070504][ T2490] [ 1700.073283][ T2490] dump_stack_lvl+0x151/0x1b7 [ 1700.077793][ T2490] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1700.083087][ T2490] dump_stack+0x15/0x17 [ 1700.087089][ T2490] should_fail+0x3c0/0x510 [ 1700.091344][ T2490] should_fail_alloc_page+0x58/0x70 [ 1700.096369][ T2490] __alloc_pages+0x1de/0x7c0 [ 1700.100801][ T2490] ? __count_vm_events+0x30/0x30 [ 1700.105569][ T2490] ? dup_mm+0x91/0x330 [ 1700.109474][ T2490] ? copy_mm+0x108/0x1b0 [ 1700.113552][ T2490] ? copy_process+0x1295/0x3250 [ 1700.118234][ T2490] ? kernel_clone+0x22d/0x990 [ 1700.122749][ T2490] ? __x64_sys_clone+0x289/0x310 [ 1700.127531][ T2490] pte_alloc_one+0x73/0x1b0 [ 1700.131874][ T2490] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1700.136899][ T2490] ? __kasan_check_write+0x14/0x20 [ 1700.141854][ T2490] ? __set_page_owner+0x2ee/0x310 [ 1700.146714][ T2490] __pte_alloc+0x86/0x350 [ 1700.150870][ T2490] ? post_alloc_hook+0x1ab/0x1b0 [ 1700.155648][ T2490] ? free_pgtables+0x210/0x210 [ 1700.160244][ T2490] ? get_page_from_freelist+0x38b/0x400 10:14:53 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) capset(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)={0x7fff, 0x5, 0x3, 0xd2, 0x7, 0x3}) [ 1700.165632][ T2490] copy_pte_range+0x1b1f/0x20b0 [ 1700.170324][ T2490] ? __kunmap_atomic+0x80/0x80 [ 1700.174915][ T2490] ? __pud_alloc+0x260/0x260 [ 1700.179347][ T2490] ? __pud_alloc+0x218/0x260 [ 1700.183785][ T2490] ? do_handle_mm_fault+0x2370/0x2370 [ 1700.188985][ T2490] copy_page_range+0xc1e/0x1090 [ 1700.193674][ T2490] ? pfn_valid+0x1e0/0x1e0 [ 1700.197920][ T2490] dup_mmap+0x99f/0xea0 [ 1700.201915][ T2490] ? __delayed_free_task+0x20/0x20 [ 1700.206858][ T2490] ? mm_init+0x807/0x960 [ 1700.210941][ T2490] dup_mm+0x91/0x330 [ 1700.214662][ T2490] copy_mm+0x108/0x1b0 [ 1700.218574][ T2490] copy_process+0x1295/0x3250 [ 1700.223084][ T2490] ? proc_fail_nth_write+0x213/0x290 [ 1700.228212][ T2490] ? proc_fail_nth_read+0x220/0x220 [ 1700.233241][ T2490] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1700.238187][ T2490] ? vfs_write+0x9af/0x1050 [ 1700.242527][ T2490] ? vmacache_update+0xb7/0x120 [ 1700.247213][ T2490] kernel_clone+0x22d/0x990 [ 1700.251558][ T2490] ? file_end_write+0x1b0/0x1b0 [ 1700.256240][ T2490] ? __kasan_check_write+0x14/0x20 [ 1700.261185][ T2490] ? create_io_thread+0x1e0/0x1e0 [ 1700.266049][ T2490] ? __mutex_lock_slowpath+0x10/0x10 [ 1700.271257][ T2490] __x64_sys_clone+0x289/0x310 [ 1700.275862][ T2490] ? __do_sys_vfork+0x130/0x130 [ 1700.280543][ T2490] ? debug_smp_processor_id+0x17/0x20 [ 1700.285747][ T2490] do_syscall_64+0x44/0xd0 [ 1700.290001][ T2490] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1700.295725][ T2490] RIP: 0033:0x7f03091130d9 [ 1700.299979][ T2490] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1700.319421][ T2490] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1700.327668][ T2490] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1700.335478][ T2490] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1700.343289][ T2490] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.351101][ T2490] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1700.358913][ T2490] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 10:14:53 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) 10:14:53 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) capset(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)={0x7fff, 0x5, 0x3, 0xd2, 0x7, 0x3}) 10:14:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:53 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000300)={0x24, &(0x7f0000000180)={0x0, 0x2, 0xee, {0xee, 0x2, "b1e5d52bed6ad85e33b3be9b2c7d08bb5d3d4733e537667d38b63daa2bf3f4ce44ee6d4edc17fabd5769a294566b14b9c22ff05d1016df1ae386e289e46f8365380d9b74dc239dbc4a7230ad2af4423213e96adf75f1588c22e3b705ffeebf1aaa8dabae7b5b863c58be7cc31c85c18c2b65bf4c18b014ec0f480456defe539191ce03dbebb5cf3bc8678d24e5313a52e175ef19a478392c43b7cd25667b07cc8e50cd6a6d6fcb172870b04eec343086ede4303e13d95dd519c1f29a7876366f1a1c79997d77497507c5c72168b68853e6d86ab5ff5b5dddf8ddf1966bf22fbd56fca67ae78fd2d3ab9d078a"}}, &(0x7f0000000000)={0x0, 0x3, 0x55, @string={0x55, 0x3, "428dccb49425e55dad5900a82d05fe483729a1d625c0993ad29e412b12f52792883b3779c68fad59101cba8db01647263fd79183358000854b48eef7382c2a0210f077741b95c4dc6967b247ba1de673f0770b"}}, &(0x7f0000000280)={0x0, 0x22, 0x1a, {[@global=@item_4={0x3, 0x1, 0x8babe7d347ef78dc, "7d8cd958"}, @main=@item_012={0x0, 0x0, 0x8}, @main=@item_012={0x2, 0x0, 0xa, "24a9"}, @main=@item_012={0x1, 0x0, 0xb, "18"}, @global=@item_4={0x3, 0x1, 0x5, "b85e315c"}, @main=@item_4={0x3, 0x0, 0x9, "d745e265"}, @local=@item_4={0x3, 0x2, 0x8, "20d05718"}]}}, &(0x7f00000002c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x9, 0x1, {0x22, 0x2de}}}}, &(0x7f0000000580)={0x2c, &(0x7f0000000340)={0x40, 0x30, 0x84, "71d4a46b986ee23f0d00800796863465f538bc07b3462504f37c6d83397f5c79c9e39b6a9d3663ab9e68325c20d524729bb214080ff98e8b6428cd4916c6feff6ee15d7584ef49f8e271b776ca6c31b824e6256e736cfa50e99ed194d8ee67642ce79146c4479824379d761ee363e53d7b88c9fa569f5a93adff8ae1c0cc8c5346870148"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000480)={0x20, 0x1, 0x90, "bd2a9fd33a2f806caee3618b8ab3c0e0b996b836a918e32f72af83fb9d3045847a11f608b5d01e7cef175c9fcb8b26701ee2fd473dd606a806cb89fed488425a6a0e4db49d71eca0efb1ac5e0acffabbccc5eea10315a9c950044033446e14625c746bceeaa7e22b339cce415dec8b791d6364ec758bcfb4acbc5ab177128dca92212eb5f4a4cb39664054ae36495105"}, &(0x7f0000000540)={0x20, 0x3, 0x1, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0400000000000100008000000400000028bd9446fe691d064142e8dfde76476b6e73405536103207f82071f910f21a208418de0e89cae7e8bf8ebb94b9c887df65038fc0401012f9a7bb98d24ba1c5c68e0626f80cf1a956000000000000000000", @ANYRES32=0x0, @ANYBLOB="0080002100000001ffffffff4ee60038006700007f2f90780a0101026401ff0744044e2000831f1be00000020a010102ac14140dac141414e000000200000000e0000001"]}) [ 1700.366725][ T2490] 10:14:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1700.397197][ T2520] FAULT_INJECTION: forcing a failure. [ 1700.397197][ T2520] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.414930][ T2520] CPU: 1 PID: 2520 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1700.424931][ T2520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1700.434827][ T2520] Call Trace: [ 1700.437949][ T2520] [ 1700.440724][ T2520] dump_stack_lvl+0x151/0x1b7 10:14:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1700.445237][ T2520] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1700.450533][ T2520] dump_stack+0x15/0x17 [ 1700.454525][ T2520] should_fail+0x3c0/0x510 [ 1700.458780][ T2520] __should_failslab+0x9f/0xe0 [ 1700.463377][ T2520] should_failslab+0x9/0x20 [ 1700.467718][ T2520] kmem_cache_alloc+0x4f/0x2f0 [ 1700.472316][ T2520] ? vm_area_dup+0x26/0x1d0 [ 1700.476658][ T2520] vm_area_dup+0x26/0x1d0 [ 1700.480821][ T2520] dup_mmap+0x6b8/0xea0 [ 1700.484815][ T2520] ? __delayed_free_task+0x20/0x20 [ 1700.489765][ T2520] ? mm_init+0x807/0x960 [ 1700.493841][ T2520] dup_mm+0x91/0x330 10:14:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1700.497572][ T2520] copy_mm+0x108/0x1b0 [ 1700.501478][ T2520] copy_process+0x1295/0x3250 [ 1700.505997][ T2520] ? proc_fail_nth_write+0x213/0x290 [ 1700.511113][ T2520] ? proc_fail_nth_read+0x220/0x220 [ 1700.516146][ T2520] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1700.521094][ T2520] ? vfs_write+0x9af/0x1050 [ 1700.525431][ T2520] ? vmacache_update+0xb7/0x120 [ 1700.530121][ T2520] kernel_clone+0x22d/0x990 [ 1700.534457][ T2520] ? file_end_write+0x1b0/0x1b0 [ 1700.539144][ T2520] ? __kasan_check_write+0x14/0x20 10:14:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1700.544092][ T2520] ? create_io_thread+0x1e0/0x1e0 [ 1700.548953][ T2520] ? __mutex_lock_slowpath+0x10/0x10 [ 1700.554077][ T2520] __x64_sys_clone+0x289/0x310 [ 1700.558673][ T2520] ? __do_sys_vfork+0x130/0x130 [ 1700.563363][ T2520] ? debug_smp_processor_id+0x17/0x20 [ 1700.568570][ T2520] do_syscall_64+0x44/0xd0 [ 1700.572822][ T2520] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1700.578547][ T2520] RIP: 0033:0x7f03091130d9 [ 1700.582801][ T2520] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1700.602244][ T2520] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1700.610494][ T2520] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1700.618299][ T2520] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1700.626120][ T2520] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.633928][ T2520] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 10:14:54 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) 10:14:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:54 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200c0}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000520010002cbd7000ffdbdf251c0800010020a243360f8e67ea6ed64e20c4ddcc7ef74c141330a282acbdbc9fdd35783bdb88011b1dedcfa242fb86c53aca850f6c6fd058b5b3dc535c752b5df2963fad70b0c072dab24759466e379fed2504d89f8964510708ba668e5a29abc8f7e0cecd3bc957ade5027193f7ad75f35d49e11a4b3068f716b69189fb8c", @ANYRES32=0x0, @ANYBLOB="08000600000000800800060007000000080006000000000008000100", @ANYRES32=r2, @ANYBLOB="0800060081000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x1) r3 = getpgid(r0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={'\x00', 0xdac, 0x0, 0x2bdf, 0x10000, 0x1, r3}) 10:14:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) [ 1700.641734][ T2520] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1700.649546][ T2520] [ 1700.685624][ T2541] FAULT_INJECTION: forcing a failure. [ 1700.685624][ T2541] name failslab, interval 1, probability 0, space 0, times 0 [ 1700.704595][ T2541] CPU: 1 PID: 2541 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1700.714582][ T2541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1700.724476][ T2541] Call Trace: [ 1700.727601][ T2541] [ 1700.730379][ T2541] dump_stack_lvl+0x151/0x1b7 [ 1700.734891][ T2541] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1700.740297][ T2541] dump_stack+0x15/0x17 [ 1700.744279][ T2541] should_fail+0x3c0/0x510 [ 1700.748535][ T2541] __should_failslab+0x9f/0xe0 [ 1700.753136][ T2541] should_failslab+0x9/0x20 [ 1700.757475][ T2541] kmem_cache_alloc+0x4f/0x2f0 [ 1700.762073][ T2541] ? vm_area_dup+0x26/0x1d0 [ 1700.766413][ T2541] vm_area_dup+0x26/0x1d0 [ 1700.770579][ T2541] dup_mmap+0x6b8/0xea0 [ 1700.774574][ T2541] ? __delayed_free_task+0x20/0x20 [ 1700.779520][ T2541] ? mm_init+0x807/0x960 [ 1700.783596][ T2541] dup_mm+0x91/0x330 [ 1700.787329][ T2541] copy_mm+0x108/0x1b0 [ 1700.791236][ T2541] copy_process+0x1295/0x3250 [ 1700.795752][ T2541] ? proc_fail_nth_write+0x213/0x290 [ 1700.800867][ T2541] ? proc_fail_nth_read+0x220/0x220 [ 1700.805903][ T2541] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1700.810847][ T2541] ? vfs_write+0x9af/0x1050 [ 1700.815190][ T2541] ? vmacache_update+0xb7/0x120 [ 1700.819878][ T2541] kernel_clone+0x22d/0x990 [ 1700.824214][ T2541] ? file_end_write+0x1b0/0x1b0 [ 1700.828906][ T2541] ? __kasan_check_write+0x14/0x20 [ 1700.833848][ T2541] ? create_io_thread+0x1e0/0x1e0 [ 1700.838711][ T2541] ? __mutex_lock_slowpath+0x10/0x10 [ 1700.843833][ T2541] __x64_sys_clone+0x289/0x310 [ 1700.848430][ T2541] ? __do_sys_vfork+0x130/0x130 [ 1700.853117][ T2541] ? debug_smp_processor_id+0x17/0x20 [ 1700.858328][ T2541] do_syscall_64+0x44/0xd0 [ 1700.862586][ T2541] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1700.868304][ T2541] RIP: 0033:0x7f03091130d9 [ 1700.872555][ T2541] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1700.891995][ T2541] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1700.900239][ T2541] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1700.908223][ T2541] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1700.916035][ T2541] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1700.923847][ T2541] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1700.931657][ T2541] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1700.939472][ T2541] 10:14:54 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000300)={0x24, &(0x7f0000000180)={0x0, 0x2, 0xee, {0xee, 0x2, "b1e5d52bed6ad85e33b3be9b2c7d08bb5d3d4733e537667d38b63daa2bf3f4ce44ee6d4edc17fabd5769a294566b14b9c22ff05d1016df1ae386e289e46f8365380d9b74dc239dbc4a7230ad2af4423213e96adf75f1588c22e3b705ffeebf1aaa8dabae7b5b863c58be7cc31c85c18c2b65bf4c18b014ec0f480456defe539191ce03dbebb5cf3bc8678d24e5313a52e175ef19a478392c43b7cd25667b07cc8e50cd6a6d6fcb172870b04eec343086ede4303e13d95dd519c1f29a7876366f1a1c79997d77497507c5c72168b68853e6d86ab5ff5b5dddf8ddf1966bf22fbd56fca67ae78fd2d3ab9d078a"}}, &(0x7f0000000000)={0x0, 0x3, 0x55, @string={0x55, 0x3, "428dccb49425e55dad5900a82d05fe483729a1d625c0993ad29e412b12f52792883b3779c68fad59101cba8db01647263fd79183358000854b48eef7382c2a0210f077741b95c4dc6967b247ba1de673f0770b"}}, &(0x7f0000000280)={0x0, 0x22, 0x1a, {[@global=@item_4={0x3, 0x1, 0x8babe7d347ef78dc, "7d8cd958"}, @main=@item_012={0x0, 0x0, 0x8}, @main=@item_012={0x2, 0x0, 0xa, "24a9"}, @main=@item_012={0x1, 0x0, 0xb, "18"}, @global=@item_4={0x3, 0x1, 0x5, "b85e315c"}, @main=@item_4={0x3, 0x0, 0x9, "d745e265"}, @local=@item_4={0x3, 0x2, 0x8, "20d05718"}]}}, &(0x7f00000002c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x9, 0x1, {0x22, 0x2de}}}}, &(0x7f0000000580)={0x2c, &(0x7f0000000340)={0x40, 0x30, 0x84, "71d4a46b986ee23f0d00800796863465f538bc07b3462504f37c6d83397f5c79c9e39b6a9d3663ab9e68325c20d524729bb214080ff98e8b6428cd4916c6feff6ee15d7584ef49f8e271b776ca6c31b824e6256e736cfa50e99ed194d8ee67642ce79146c4479824379d761ee363e53d7b88c9fa569f5a93adff8ae1c0cc8c5346870148"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000480)={0x20, 0x1, 0x90, "bd2a9fd33a2f806caee3618b8ab3c0e0b996b836a918e32f72af83fb9d3045847a11f608b5d01e7cef175c9fcb8b26701ee2fd473dd606a806cb89fed488425a6a0e4db49d71eca0efb1ac5e0acffabbccc5eea10315a9c950044033446e14625c746bceeaa7e22b339cce415dec8b791d6364ec758bcfb4acbc5ab177128dca92212eb5f4a4cb39664054ae36495105"}, &(0x7f0000000540)={0x20, 0x3, 0x1, 0x2}}) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0400000000000100008000000400000028bd9446fe691d064142e8dfde76476b6e73405536103207f82071f910f21a208418de0e89cae7e8bf8ebb94b9c887df65038fc0401012f9a7bb98d24ba1c5c68e0626f80cf1a956000000000000000000", @ANYRES32=0x0, @ANYBLOB="0080002100000001ffffffff4ee60038006700007f2f90780a0101026401ff0744044e2000831f1be00000020a010102ac14140dac141414e000000200000000e0000001"]}) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000300)={0x24, &(0x7f0000000180)={0x0, 0x2, 0xee, {0xee, 0x2, "b1e5d52bed6ad85e33b3be9b2c7d08bb5d3d4733e537667d38b63daa2bf3f4ce44ee6d4edc17fabd5769a294566b14b9c22ff05d1016df1ae386e289e46f8365380d9b74dc239dbc4a7230ad2af4423213e96adf75f1588c22e3b705ffeebf1aaa8dabae7b5b863c58be7cc31c85c18c2b65bf4c18b014ec0f480456defe539191ce03dbebb5cf3bc8678d24e5313a52e175ef19a478392c43b7cd25667b07cc8e50cd6a6d6fcb172870b04eec343086ede4303e13d95dd519c1f29a7876366f1a1c79997d77497507c5c72168b68853e6d86ab5ff5b5dddf8ddf1966bf22fbd56fca67ae78fd2d3ab9d078a"}}, &(0x7f0000000000)={0x0, 0x3, 0x55, @string={0x55, 0x3, "428dccb49425e55dad5900a82d05fe483729a1d625c0993ad29e412b12f52792883b3779c68fad59101cba8db01647263fd79183358000854b48eef7382c2a0210f077741b95c4dc6967b247ba1de673f0770b"}}, &(0x7f0000000280)={0x0, 0x22, 0x1a, {[@global=@item_4={0x3, 0x1, 0x8babe7d347ef78dc, "7d8cd958"}, @main=@item_012={0x0, 0x0, 0x8}, @main=@item_012={0x2, 0x0, 0xa, "24a9"}, @main=@item_012={0x1, 0x0, 0xb, "18"}, @global=@item_4={0x3, 0x1, 0x5, "b85e315c"}, @main=@item_4={0x3, 0x0, 0x9, "d745e265"}, @local=@item_4={0x3, 0x2, 0x8, "20d05718"}]}}, &(0x7f00000002c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x9, 0x1, {0x22, 0x2de}}}}, &(0x7f0000000580)={0x2c, &(0x7f0000000340)={0x40, 0x30, 0x84, "71d4a46b986ee23f0d00800796863465f538bc07b3462504f37c6d83397f5c79c9e39b6a9d3663ab9e68325c20d524729bb214080ff98e8b6428cd4916c6feff6ee15d7584ef49f8e271b776ca6c31b824e6256e736cfa50e99ed194d8ee67642ce79146c4479824379d761ee363e53d7b88c9fa569f5a93adff8ae1c0cc8c5346870148"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000480)={0x20, 0x1, 0x90, "bd2a9fd33a2f806caee3618b8ab3c0e0b996b836a918e32f72af83fb9d3045847a11f608b5d01e7cef175c9fcb8b26701ee2fd473dd606a806cb89fed488425a6a0e4db49d71eca0efb1ac5e0acffabbccc5eea10315a9c950044033446e14625c746bceeaa7e22b339cce415dec8b791d6364ec758bcfb4acbc5ab177128dca92212eb5f4a4cb39664054ae36495105"}, &(0x7f0000000540)={0x20, 0x3, 0x1, 0x2}}) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0400000000000100008000000400000028bd9446fe691d064142e8dfde76476b6e73405536103207f82071f910f21a208418de0e89cae7e8bf8ebb94b9c887df65038fc0401012f9a7bb98d24ba1c5c68e0626f80cf1a956000000000000000000", @ANYRES32=0x0, @ANYBLOB="0080002100000001ffffffff4ee60038006700007f2f90780a0101026401ff0744044e2000831f1be00000020a010102ac14140dac141414e000000200000000e0000001"]}) (async) 10:14:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:54 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) (async, rerun: 64) r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (async, rerun: 64) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200c0}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000520010002cbd7000ffdbdf251c0800010020a243360f8e67ea6ed64e20c4ddcc7ef74c141330a282acbdbc9fdd35783bdb88011b1dedcfa242fb86c53aca850f6c6fd058b5b3dc535c752b5df2963fad70b0c072dab24759466e379fed2504d89f8964510708ba668e5a29abc8f7e0cecd3bc957ade5027193f7ad75f35d49e11a4b3068f716b69189fb8c", @ANYRES32=0x0, @ANYBLOB="08000600000000800800060007000000080006000000000008000100", @ANYRES32=r2, @ANYBLOB="0800060081000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x1) (async) r3 = getpgid(r0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={'\x00', 0xdac, 0x0, 0x2bdf, 0x10000, 0x1, r3}) 10:14:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:54 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) 10:14:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1701.253240][ T2555] FAULT_INJECTION: forcing a failure. [ 1701.253240][ T2555] name failslab, interval 1, probability 0, space 0, times 0 [ 1701.270913][ T2555] CPU: 1 PID: 2555 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1701.280900][ T2555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1701.290798][ T2555] Call Trace: [ 1701.293918][ T2555] [ 1701.296695][ T2555] dump_stack_lvl+0x151/0x1b7 10:14:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x5, [@const]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x4, [@const]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) [ 1701.301210][ T2555] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1701.306501][ T2555] ? do_syscall_64+0x44/0xd0 [ 1701.310930][ T2555] dump_stack+0x15/0x17 [ 1701.314924][ T2555] should_fail+0x3c0/0x510 [ 1701.319180][ T2555] __should_failslab+0x9f/0xe0 [ 1701.323775][ T2555] should_failslab+0x9/0x20 [ 1701.328118][ T2555] kmem_cache_alloc+0x4f/0x2f0 [ 1701.332716][ T2555] ? anon_vma_clone+0xa1/0x4f0 [ 1701.337316][ T2555] anon_vma_clone+0xa1/0x4f0 [ 1701.341740][ T2555] anon_vma_fork+0x91/0x4f0 [ 1701.346076][ T2555] ? anon_vma_name+0x4c/0x70 [ 1701.350509][ T2555] dup_mmap+0x750/0xea0 [ 1701.354502][ T2555] ? __delayed_free_task+0x20/0x20 [ 1701.359446][ T2555] ? mm_init+0x807/0x960 [ 1701.363527][ T2555] dup_mm+0x91/0x330 [ 1701.367258][ T2555] copy_mm+0x108/0x1b0 [ 1701.371163][ T2555] copy_process+0x1295/0x3250 [ 1701.375677][ T2555] ? proc_fail_nth_write+0x213/0x290 [ 1701.380798][ T2555] ? proc_fail_nth_read+0x220/0x220 [ 1701.385831][ T2555] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1701.386609][ T2560] cgroup: fork rejected by pids controller in [ 1701.390774][ T2555] ? vfs_write+0x9af/0x1050 [ 1701.390800][ T2555] ? vmacache_update+0xb7/0x120 [ 1701.397058][ T2560] /syz4 [ 1701.401102][ T2555] kernel_clone+0x22d/0x990 [ 1701.407346][ T2560] [ 1701.408395][ T2555] ? file_end_write+0x1b0/0x1b0 [ 1701.408423][ T2555] ? __kasan_check_write+0x14/0x20 [ 1701.424539][ T2555] ? create_io_thread+0x1e0/0x1e0 [ 1701.429398][ T2555] ? __mutex_lock_slowpath+0x10/0x10 [ 1701.434521][ T2555] __x64_sys_clone+0x289/0x310 [ 1701.439122][ T2555] ? __do_sys_vfork+0x130/0x130 [ 1701.443808][ T2555] ? debug_smp_processor_id+0x17/0x20 [ 1701.449018][ T2555] do_syscall_64+0x44/0xd0 [ 1701.453272][ T2555] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1701.458993][ T2555] RIP: 0033:0x7f03091130d9 [ 1701.463248][ T2555] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1701.482692][ T2555] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1701.490936][ T2555] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1701.498746][ T2555] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1701.506556][ T2555] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1701.514367][ T2555] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1701.522178][ T2555] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1701.529994][ T2555] 10:14:55 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async, rerun: 64) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000300)={0x24, &(0x7f0000000180)={0x0, 0x2, 0xee, {0xee, 0x2, "b1e5d52bed6ad85e33b3be9b2c7d08bb5d3d4733e537667d38b63daa2bf3f4ce44ee6d4edc17fabd5769a294566b14b9c22ff05d1016df1ae386e289e46f8365380d9b74dc239dbc4a7230ad2af4423213e96adf75f1588c22e3b705ffeebf1aaa8dabae7b5b863c58be7cc31c85c18c2b65bf4c18b014ec0f480456defe539191ce03dbebb5cf3bc8678d24e5313a52e175ef19a478392c43b7cd25667b07cc8e50cd6a6d6fcb172870b04eec343086ede4303e13d95dd519c1f29a7876366f1a1c79997d77497507c5c72168b68853e6d86ab5ff5b5dddf8ddf1966bf22fbd56fca67ae78fd2d3ab9d078a"}}, &(0x7f0000000000)={0x0, 0x3, 0x55, @string={0x55, 0x3, "428dccb49425e55dad5900a82d05fe483729a1d625c0993ad29e412b12f52792883b3779c68fad59101cba8db01647263fd79183358000854b48eef7382c2a0210f077741b95c4dc6967b247ba1de673f0770b"}}, &(0x7f0000000280)={0x0, 0x22, 0x1a, {[@global=@item_4={0x3, 0x1, 0x8babe7d347ef78dc, "7d8cd958"}, @main=@item_012={0x0, 0x0, 0x8}, @main=@item_012={0x2, 0x0, 0xa, "24a9"}, @main=@item_012={0x1, 0x0, 0xb, "18"}, @global=@item_4={0x3, 0x1, 0x5, "b85e315c"}, @main=@item_4={0x3, 0x0, 0x9, "d745e265"}, @local=@item_4={0x3, 0x2, 0x8, "20d05718"}]}}, &(0x7f00000002c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x2, 0x9, 0x1, {0x22, 0x2de}}}}, &(0x7f0000000580)={0x2c, &(0x7f0000000340)={0x40, 0x30, 0x84, "71d4a46b986ee23f0d00800796863465f538bc07b3462504f37c6d83397f5c79c9e39b6a9d3663ab9e68325c20d524729bb214080ff98e8b6428cd4916c6feff6ee15d7584ef49f8e271b776ca6c31b824e6256e736cfa50e99ed194d8ee67642ce79146c4479824379d761ee363e53d7b88c9fa569f5a93adff8ae1c0cc8c5346870148"}, &(0x7f0000000400)={0x0, 0xa, 0x1, 0x8}, &(0x7f0000000440)={0x0, 0x8, 0x1, 0x1}, &(0x7f0000000480)={0x20, 0x1, 0x90, "bd2a9fd33a2f806caee3618b8ab3c0e0b996b836a918e32f72af83fb9d3045847a11f608b5d01e7cef175c9fcb8b26701ee2fd473dd606a806cb89fed488425a6a0e4db49d71eca0efb1ac5e0acffabbccc5eea10315a9c950044033446e14625c746bceeaa7e22b339cce415dec8b791d6364ec758bcfb4acbc5ab177128dca92212eb5f4a4cb39664054ae36495105"}, &(0x7f0000000540)={0x20, 0x3, 0x1, 0x2}}) (rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000080)={'sit0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="0400000000000100008000000400000028bd9446fe691d064142e8dfde76476b6e73405536103207f82071f910f21a208418de0e89cae7e8bf8ebb94b9c887df65038fc0401012f9a7bb98d24ba1c5c68e0626f80cf1a956000000000000000000", @ANYRES32=0x0, @ANYBLOB="0080002100000001ffffffff4ee60038006700007f2f90780a0101026401ff0744044e2000831f1be00000020a010102ac14140dac141414e000000200000000e0000001"]}) 10:14:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x3, [@const]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/4096, 0x27, 0x1000, 0x1}, 0x20) 10:14:55 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) 10:14:55 executing program 4: ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200c0}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000520010002cbd7000ffdbdf251c0800010020a243360f8e67ea6ed64e20c4ddcc7ef74c141330a282acbdbc9fdd35783bdb88011b1dedcfa242fb86c53aca850f6c6fd058b5b3dc535c752b5df2963fad70b0c072dab24759466e379fed2504d89f8964510708ba668e5a29abc8f7e0cecd3bc957ade5027193f7ad75f35d49e11a4b3068f716b69189fb8c", @ANYRES32=0x0, @ANYBLOB="08000600000000800800060007000000080006000000000008000100", @ANYRES32=r2, @ANYBLOB="0800060081000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x1) r3 = getpgid(r0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={'\x00', 0xdac, 0x0, 0x2bdf, 0x10000, 0x1, r3}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'batadv_slave_0\x00'}) (async) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000040)={'wg0\x00'}) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2200c0}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000520010002cbd7000ffdbdf251c0800010020a243360f8e67ea6ed64e20c4ddcc7ef74c141330a282acbdbc9fdd35783bdb88011b1dedcfa242fb86c53aca850f6c6fd058b5b3dc535c752b5df2963fad70b0c072dab24759466e379fed2504d89f8964510708ba668e5a29abc8f7e0cecd3bc957ade5027193f7ad75f35d49e11a4b3068f716b69189fb8c", @ANYRES32=0x0, @ANYBLOB="08000600000000800800060007000000080006000000000008000100", @ANYRES32=r2, @ANYBLOB="0800060081000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x1) (async) getpgid(r0) (async) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000200)={'\x00', 0xdac, 0x0, 0x2bdf, 0x10000, 0x1, r3}) (async) 10:14:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 10:14:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x5, [@const]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1702.041632][ T2647] FAULT_INJECTION: forcing a failure. [ 1702.041632][ T2647] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.057914][ T2647] CPU: 1 PID: 2647 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1702.068015][ T2647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1702.077908][ T2647] Call Trace: [ 1702.081032][ T2647] [ 1702.083809][ T2647] dump_stack_lvl+0x151/0x1b7 10:14:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x4, [@const]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x28, 0x1000, 0x1}, 0x20) [ 1702.088322][ T2647] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1702.093615][ T2647] dump_stack+0x15/0x17 [ 1702.097606][ T2647] should_fail+0x3c0/0x510 [ 1702.101862][ T2647] __should_failslab+0x9f/0xe0 [ 1702.106461][ T2647] should_failslab+0x9/0x20 [ 1702.110800][ T2647] kmem_cache_alloc+0x4f/0x2f0 [ 1702.115398][ T2647] ? anon_vma_fork+0x1b9/0x4f0 [ 1702.120001][ T2647] anon_vma_fork+0x1b9/0x4f0 [ 1702.124426][ T2647] dup_mmap+0x750/0xea0 [ 1702.128421][ T2647] ? __delayed_free_task+0x20/0x20 [ 1702.133365][ T2647] ? mm_init+0x807/0x960 [ 1702.137445][ T2647] dup_mm+0x91/0x330 [ 1702.141181][ T2647] copy_mm+0x108/0x1b0 [ 1702.145082][ T2647] copy_process+0x1295/0x3250 [ 1702.149598][ T2647] ? proc_fail_nth_write+0x213/0x290 [ 1702.154717][ T2647] ? proc_fail_nth_read+0x220/0x220 [ 1702.159752][ T2647] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1702.164696][ T2647] ? vfs_write+0x9af/0x1050 [ 1702.169048][ T2647] ? vmacache_update+0xb7/0x120 [ 1702.173722][ T2647] kernel_clone+0x22d/0x990 [ 1702.178062][ T2647] ? file_end_write+0x1b0/0x1b0 [ 1702.182752][ T2647] ? __kasan_check_write+0x14/0x20 [ 1702.187698][ T2647] ? create_io_thread+0x1e0/0x1e0 [ 1702.192553][ T2647] ? __mutex_lock_slowpath+0x10/0x10 [ 1702.197672][ T2647] __x64_sys_clone+0x289/0x310 [ 1702.202303][ T2647] ? __do_sys_vfork+0x130/0x130 [ 1702.206960][ T2647] ? debug_smp_processor_id+0x17/0x20 [ 1702.212167][ T2647] do_syscall_64+0x44/0xd0 [ 1702.216420][ T2647] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1702.222147][ T2647] RIP: 0033:0x7f03091130d9 [ 1702.226402][ T2647] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1702.245842][ T2647] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1702.254086][ T2647] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1702.261899][ T2647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1702.269708][ T2647] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.277523][ T2647] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1702.285423][ T2647] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1702.293238][ T2647] 10:14:56 executing program 2: fcntl$setsig(0xffffffffffffffff, 0xa, 0x8) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x3, [@const]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/4096, 0x27, 0x1000, 0x1}, 0x20) 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:56 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) 10:14:56 executing program 4: r0 = syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/wireless\x00') 10:14:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) [ 1702.599240][ T2792] FAULT_INJECTION: forcing a failure. [ 1702.599240][ T2792] name failslab, interval 1, probability 0, space 0, times 0 [ 1702.613026][ T2792] CPU: 1 PID: 2792 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1702.623003][ T2792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1702.632898][ T2792] Call Trace: [ 1702.636029][ T2792] [ 1702.638799][ T2792] dump_stack_lvl+0x151/0x1b7 [ 1702.643313][ T2792] ? bfq_pos_tree_add_move+0x43e/0x43e 10:14:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:56 executing program 2: fcntl$setsig(0xffffffffffffffff, 0xa, 0x8) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@const]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) [ 1702.648610][ T2792] dump_stack+0x15/0x17 [ 1702.652600][ T2792] should_fail+0x3c0/0x510 [ 1702.656853][ T2792] __should_failslab+0x9f/0xe0 [ 1702.661452][ T2792] should_failslab+0x9/0x20 [ 1702.665792][ T2792] kmem_cache_alloc+0x4f/0x2f0 [ 1702.670389][ T2792] ? vm_area_dup+0x26/0x1d0 [ 1702.674733][ T2792] vm_area_dup+0x26/0x1d0 [ 1702.678908][ T2792] dup_mmap+0x6b8/0xea0 [ 1702.682893][ T2792] ? __delayed_free_task+0x20/0x20 [ 1702.687846][ T2792] ? mm_init+0x807/0x960 [ 1702.691917][ T2792] dup_mm+0x91/0x330 [ 1702.695649][ T2792] copy_mm+0x108/0x1b0 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) [ 1702.699554][ T2792] copy_process+0x1295/0x3250 [ 1702.704069][ T2792] ? proc_fail_nth_write+0x213/0x290 [ 1702.709185][ T2792] ? proc_fail_nth_read+0x220/0x220 [ 1702.714222][ T2792] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1702.719167][ T2792] ? vfs_write+0x9af/0x1050 [ 1702.723514][ T2792] ? vmacache_update+0xb7/0x120 [ 1702.728199][ T2792] kernel_clone+0x22d/0x990 [ 1702.732532][ T2792] ? file_end_write+0x1b0/0x1b0 [ 1702.737219][ T2792] ? __kasan_check_write+0x14/0x20 [ 1702.742166][ T2792] ? create_io_thread+0x1e0/0x1e0 [ 1702.747031][ T2792] ? __mutex_lock_slowpath+0x10/0x10 [ 1702.752155][ T2792] __x64_sys_clone+0x289/0x310 [ 1702.756746][ T2792] ? __do_sys_vfork+0x130/0x130 [ 1702.761431][ T2792] ? debug_smp_processor_id+0x17/0x20 [ 1702.767071][ T2792] do_syscall_64+0x44/0xd0 [ 1702.771324][ T2792] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1702.777052][ T2792] RIP: 0033:0x7f03091130d9 [ 1702.781306][ T2792] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1702.800833][ T2792] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1702.809079][ T2792] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1702.816900][ T2792] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1702.824702][ T2792] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1702.832520][ T2792] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1702.840323][ T2792] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 10:14:56 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:56 executing program 2: fcntl$setsig(0xffffffffffffffff, 0xa, 0x8) (async) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) 10:14:56 executing program 4: r0 = syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/wireless\x00') [ 1702.848137][ T2792] 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@const]}}, &(0x7f0000000280)=""/4096, 0x26, 0x1000}, 0x20) 10:14:56 executing program 3: r0 = syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/wireless\x00') [ 1702.873599][ T2826] FAULT_INJECTION: forcing a failure. [ 1702.873599][ T2826] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1702.888038][ T2826] CPU: 1 PID: 2826 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1702.898017][ T2826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1702.907911][ T2826] Call Trace: [ 1702.911037][ T2826] [ 1702.913812][ T2826] dump_stack_lvl+0x151/0x1b7 [ 1702.918330][ T2826] ? bfq_pos_tree_add_move+0x43e/0x43e 10:14:56 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1702.923620][ T2826] ? __switch_to+0x617/0x1170 [ 1702.928132][ T2826] ? native_set_ldt+0x360/0x360 [ 1702.932819][ T2826] dump_stack+0x15/0x17 [ 1702.936817][ T2826] should_fail+0x3c0/0x510 [ 1702.941069][ T2826] should_fail_alloc_page+0x58/0x70 [ 1702.946106][ T2826] __alloc_pages+0x1de/0x7c0 [ 1702.950537][ T2826] ? __count_vm_events+0x30/0x30 [ 1702.955310][ T2826] ? __this_cpu_preempt_check+0x13/0x20 [ 1702.960684][ T2826] pte_alloc_one+0x73/0x1b0 [ 1702.965021][ T2826] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1702.970053][ T2826] ? preempt_schedule+0xd9/0xe0 [ 1702.974743][ T2826] ? preempt_schedule_common+0xcb/0x100 [ 1702.980123][ T2826] __pte_alloc+0x86/0x350 [ 1702.984292][ T2826] ? free_pgtables+0x210/0x210 [ 1702.988884][ T2826] ? _raw_spin_lock+0xa3/0x1b0 [ 1702.993484][ T2826] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1702.998694][ T2826] ? preempt_schedule_thunk+0x16/0x18 [ 1703.003899][ T2826] copy_pte_range+0x1b1f/0x20b0 [ 1703.008588][ T2826] ? __kunmap_atomic+0x80/0x80 [ 1703.013187][ T2826] ? __kasan_slab_alloc+0xc4/0xe0 [ 1703.018044][ T2826] ? __kasan_slab_alloc+0xb2/0xe0 [ 1703.022915][ T2826] ? kmem_cache_alloc+0x189/0x2f0 [ 1703.027764][ T2826] ? vm_area_dup+0x26/0x1d0 [ 1703.032103][ T2826] ? dup_mmap+0x6b8/0xea0 [ 1703.036271][ T2826] ? dup_mm+0x91/0x330 [ 1703.040176][ T2826] ? copy_mm+0x108/0x1b0 [ 1703.044256][ T2826] ? copy_process+0x1295/0x3250 [ 1703.048943][ T2826] ? kernel_clone+0x22d/0x990 [ 1703.053456][ T2826] ? __x64_sys_clone+0x289/0x310 [ 1703.058229][ T2826] ? do_syscall_64+0x44/0xd0 [ 1703.062658][ T2826] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1703.068560][ T2826] copy_page_range+0xc1e/0x1090 [ 1703.073247][ T2826] ? pfn_valid+0x1e0/0x1e0 [ 1703.077498][ T2826] dup_mmap+0x99f/0xea0 [ 1703.081495][ T2826] ? __delayed_free_task+0x20/0x20 [ 1703.086438][ T2826] ? mm_init+0x807/0x960 [ 1703.090519][ T2826] dup_mm+0x91/0x330 [ 1703.094256][ T2826] copy_mm+0x108/0x1b0 [ 1703.098155][ T2826] copy_process+0x1295/0x3250 [ 1703.102669][ T2826] ? proc_fail_nth_write+0x213/0x290 [ 1703.107788][ T2826] ? proc_fail_nth_read+0x220/0x220 [ 1703.112824][ T2826] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1703.117769][ T2826] ? vfs_write+0x9af/0x1050 [ 1703.122110][ T2826] ? vmacache_update+0xb7/0x120 [ 1703.126796][ T2826] kernel_clone+0x22d/0x990 [ 1703.131134][ T2826] ? file_end_write+0x1b0/0x1b0 [ 1703.135824][ T2826] ? __kasan_check_write+0x14/0x20 [ 1703.140771][ T2826] ? create_io_thread+0x1e0/0x1e0 [ 1703.145630][ T2826] ? __mutex_lock_slowpath+0x10/0x10 [ 1703.150750][ T2826] __x64_sys_clone+0x289/0x310 [ 1703.155349][ T2826] ? __do_sys_vfork+0x130/0x130 [ 1703.160038][ T2826] ? debug_smp_processor_id+0x17/0x20 [ 1703.165245][ T2826] do_syscall_64+0x44/0xd0 [ 1703.169496][ T2826] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1703.175225][ T2826] RIP: 0033:0x7f03091130d9 [ 1703.179477][ T2826] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1703.198918][ T2826] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1703.207162][ T2826] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1703.214979][ T2826] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:14:56 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x5, [@const]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) (async) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 4: r0 = syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/wireless\x00') syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) (async) syz_open_procfs(r0, &(0x7f0000000000)='net/wireless\x00') (async) 10:14:56 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) bpf$PROG_LOAD(0x9, 0x0, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) (async) write$binfmt_elf32(r0, 0x0, 0x0) (async) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000000), &(0x7f0000000040), 0x2, 0x3) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:56 executing program 3: r0 = syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/wireless\x00') [ 1703.222788][ T2826] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.230595][ T2826] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1703.238407][ T2826] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1703.246223][ T2826] 10:14:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:56 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000001300)={{'\x00', 0x2}, {0x8}, 0x84, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="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", 0x1a7, 0x0, &(0x7f0000000280)={0x2, 0x74, {0x0, 0xc, 0x17, "f8db3bacd7c3347020d8a666f833aa36aa708903a2eded", 0x50, "293d2ad4a88273c72ed2e2ba336806b62690c82d016af27a24becfb67a07a0afc2c10e1cbface51cb2cdf42ea41ef90664f42490a836ac62579fc66b9ebdda944a33c124037e3b9ba9230469a214b6db"}, 0x1000, "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"}, 0x1080}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) bpf$PROG_LOAD(0x9, 0x0, 0x2) [ 1703.296722][ T2858] FAULT_INJECTION: forcing a failure. [ 1703.296722][ T2858] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1703.326114][ T2858] CPU: 1 PID: 2858 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1703.336107][ T2858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1703.345997][ T2858] Call Trace: [ 1703.349124][ T2858] [ 1703.351899][ T2858] dump_stack_lvl+0x151/0x1b7 [ 1703.356412][ T2858] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1703.361756][ T2858] ? __kasan_check_write+0x14/0x20 [ 1703.366826][ T2858] ? __set_page_owner+0x2ee/0x310 [ 1703.371684][ T2858] dump_stack+0x15/0x17 [ 1703.375684][ T2858] should_fail+0x3c0/0x510 [ 1703.379934][ T2858] should_fail_alloc_page+0x58/0x70 [ 1703.384964][ T2858] __alloc_pages+0x1de/0x7c0 [ 1703.389392][ T2858] ? __count_vm_events+0x30/0x30 [ 1703.394169][ T2858] ? __count_vm_events+0x30/0x30 [ 1703.398945][ T2858] ? __kasan_check_write+0x14/0x20 [ 1703.403901][ T2858] ? _raw_spin_lock+0xa3/0x1b0 [ 1703.408483][ T2858] __pmd_alloc+0xb1/0x550 [ 1703.412649][ T2858] ? kmem_cache_alloc+0x189/0x2f0 [ 1703.417562][ T2858] ? anon_vma_fork+0x1b9/0x4f0 [ 1703.422111][ T2858] ? __pud_alloc+0x260/0x260 [ 1703.426542][ T2858] ? __pud_alloc+0x218/0x260 [ 1703.430963][ T2858] ? do_handle_mm_fault+0x2370/0x2370 [ 1703.436173][ T2858] copy_page_range+0xd04/0x1090 [ 1703.440863][ T2858] ? pfn_valid+0x1e0/0x1e0 [ 1703.445124][ T2858] dup_mmap+0x99f/0xea0 [ 1703.449110][ T2858] ? __delayed_free_task+0x20/0x20 [ 1703.454058][ T2858] ? mm_init+0x807/0x960 [ 1703.458132][ T2858] dup_mm+0x91/0x330 [ 1703.461862][ T2858] copy_mm+0x108/0x1b0 [ 1703.465768][ T2858] copy_process+0x1295/0x3250 [ 1703.470281][ T2858] ? proc_fail_nth_write+0x213/0x290 [ 1703.475405][ T2858] ? proc_fail_nth_read+0x220/0x220 [ 1703.480433][ T2858] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1703.485381][ T2858] ? vfs_write+0x9af/0x1050 [ 1703.489720][ T2858] ? vmacache_update+0xb7/0x120 [ 1703.494411][ T2858] kernel_clone+0x22d/0x990 [ 1703.498749][ T2858] ? file_end_write+0x1b0/0x1b0 [ 1703.503433][ T2858] ? __kasan_check_write+0x14/0x20 [ 1703.508378][ T2858] ? create_io_thread+0x1e0/0x1e0 [ 1703.513249][ T2858] ? __mutex_lock_slowpath+0x10/0x10 [ 1703.518362][ T2858] __x64_sys_clone+0x289/0x310 [ 1703.522964][ T2858] ? __do_sys_vfork+0x130/0x130 [ 1703.527651][ T2858] ? debug_smp_processor_id+0x17/0x20 [ 1703.532857][ T2858] do_syscall_64+0x44/0xd0 [ 1703.537109][ T2858] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1703.543010][ T2858] RIP: 0033:0x7f03091130d9 [ 1703.547265][ T2858] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1703.566708][ T2858] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1703.574948][ T2858] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1703.582758][ T2858] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:14:57 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) 10:14:57 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000001300)={{'\x00', 0x2}, {0x8}, 0x84, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="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", 0x1a7, 0x0, &(0x7f0000000280)={0x2, 0x74, {0x0, 0xc, 0x17, "f8db3bacd7c3347020d8a666f833aa36aa708903a2eded", 0x50, "293d2ad4a88273c72ed2e2ba336806b62690c82d016af27a24becfb67a07a0afc2c10e1cbface51cb2cdf42ea41ef90664f42490a836ac62579fc66b9ebdda944a33c124037e3b9ba9230469a214b6db"}, 0x1000, "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"}, 0x1080}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) bpf$PROG_LOAD(0x9, 0x0, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) (async) write$binfmt_elf32(r0, 0x0, 0x0) (async) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000001300)={{'\x00', 0x2}, {0x8}, 0x84, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="25cb120efd61417c96a0a4b2f8d9df03cbc33113431539a6a66677f5bc3aa1d1cfea1e3a84d209302ac9658165df3b24b10b75d00e49094a726d13ab8bfa0a34f5f25db60f4870d7387e43ddf68cb9674fcd2755a124a87e7913c5ff90ef4f4c20eaa4bca33fe15b8e3951cf5371e9a1cd228ab13144faed8f504344463240b5a0d87018ccac7365d0a1b440fc2c2176ccf800e9e3a8035876107271057b3b62b2873c029ff5008f0f077480a3630f4bda5c9fe5b69617e59db839d60c64cb7ac8f7e95041807db3f55cfe00354be96ab838a49c304a66775e8a5805aff7fb8bca6de55e109563e3776188115d0a69f0417eb52abeb02bb6d90a13a542e4addd149659bd7bbc03ffe3712b37510ad210285bfffe2ad7a32add86b2aa1e4ff71705081a2b524606d821ac356dda8fe343e16b0dda204e20c24470abca094a6bf76a3fba3a9323178940ce106d3b389c9b37b1d7848d0f6e6f037ca5b2686e34d49069c8aaea4461fb97d3ee77f29471c86ca528545791c5d47feb058493e3b8c1a3a711bc75e420cbe9aeaada4015c6669acffb91893261247f3905a35e52fa0e095b3a9fba1f58", 0x1a7, 0x0, &(0x7f0000000280)={0x2, 0x74, {0x0, 0xc, 0x17, "f8db3bacd7c3347020d8a666f833aa36aa708903a2eded", 0x50, "293d2ad4a88273c72ed2e2ba336806b62690c82d016af27a24becfb67a07a0afc2c10e1cbface51cb2cdf42ea41ef90664f42490a836ac62579fc66b9ebdda944a33c124037e3b9ba9230469a214b6db"}, 0x1000, "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"}, 0x1080}) (async) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) 10:14:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:14:57 executing program 3: r0 = syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/wireless\x00') [ 1703.590579][ T2858] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.598393][ T2858] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1703.606192][ T2858] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1703.614008][ T2858] [ 1703.631134][ T2882] FAULT_INJECTION: forcing a failure. [ 1703.631134][ T2882] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.644588][ T2882] CPU: 0 PID: 2882 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1703.654565][ T2882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1703.664462][ T2882] Call Trace: [ 1703.667584][ T2882] [ 1703.670360][ T2882] dump_stack_lvl+0x151/0x1b7 [ 1703.674875][ T2882] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1703.680169][ T2882] dump_stack+0x15/0x17 [ 1703.684163][ T2882] should_fail+0x3c0/0x510 [ 1703.688415][ T2882] __should_failslab+0x9f/0xe0 [ 1703.693014][ T2882] should_failslab+0x9/0x20 [ 1703.697454][ T2882] kmem_cache_alloc+0x4f/0x2f0 [ 1703.702061][ T2882] ? vm_area_dup+0x26/0x1d0 [ 1703.706397][ T2882] vm_area_dup+0x26/0x1d0 [ 1703.710563][ T2882] dup_mmap+0x6b8/0xea0 [ 1703.714555][ T2882] ? __delayed_free_task+0x20/0x20 [ 1703.719503][ T2882] ? mm_init+0x807/0x960 [ 1703.723582][ T2882] dup_mm+0x91/0x330 [ 1703.727314][ T2882] copy_mm+0x108/0x1b0 [ 1703.731219][ T2882] copy_process+0x1295/0x3250 [ 1703.735753][ T2882] ? proc_fail_nth_write+0x213/0x290 [ 1703.740854][ T2882] ? proc_fail_nth_read+0x220/0x220 [ 1703.745887][ T2882] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1703.750832][ T2882] ? vfs_write+0x9af/0x1050 [ 1703.755171][ T2882] ? vmacache_update+0xb7/0x120 [ 1703.759860][ T2882] kernel_clone+0x22d/0x990 [ 1703.764304][ T2882] ? file_end_write+0x1b0/0x1b0 [ 1703.768988][ T2882] ? __kasan_check_write+0x14/0x20 [ 1703.773943][ T2882] ? create_io_thread+0x1e0/0x1e0 [ 1703.778971][ T2882] ? __mutex_lock_slowpath+0x10/0x10 [ 1703.784089][ T2882] __x64_sys_clone+0x289/0x310 [ 1703.788690][ T2882] ? __do_sys_vfork+0x130/0x130 [ 1703.793376][ T2882] ? debug_smp_processor_id+0x17/0x20 [ 1703.798583][ T2882] do_syscall_64+0x44/0xd0 [ 1703.802838][ T2882] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1703.808564][ T2882] RIP: 0033:0x7f03091130d9 [ 1703.812817][ T2882] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1703.832261][ T2882] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1703.840503][ T2882] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 10:14:57 executing program 4: r0 = syz_clone(0x1149400, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) getpgrp(r0) 10:14:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:57 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000001300)={{'\x00', 0x2}, {0x8}, 0x84, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="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", 0x1a7, 0x0, &(0x7f0000000280)={0x2, 0x74, {0x0, 0xc, 0x17, "f8db3bacd7c3347020d8a666f833aa36aa708903a2eded", 0x50, "293d2ad4a88273c72ed2e2ba336806b62690c82d016af27a24becfb67a07a0afc2c10e1cbface51cb2cdf42ea41ef90664f42490a836ac62579fc66b9ebdda944a33c124037e3b9ba9230469a214b6db"}, 0x1000, "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"}, 0x1080}) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) bpf$PROG_LOAD(0x9, 0x0, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) (async) write$binfmt_elf32(r0, 0x0, 0x0) (async) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000001300)={{'\x00', 0x2}, {0x8}, 0x84, 0x0, 0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)="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", 0x1a7, 0x0, &(0x7f0000000280)={0x2, 0x74, {0x0, 0xc, 0x17, "f8db3bacd7c3347020d8a666f833aa36aa708903a2eded", 0x50, "293d2ad4a88273c72ed2e2ba336806b62690c82d016af27a24becfb67a07a0afc2c10e1cbface51cb2cdf42ea41ef90664f42490a836ac62579fc66b9ebdda944a33c124037e3b9ba9230469a214b6db"}, 0x1000, "6c317042009e4e9a44e9c294566846233e765283411e9a04eb02d5acfbd41b3cb5da8a90a14fcd36de69ad7957af26a6231875a74afdd0ff09469e1986922f1d0e32b5aa73ecc16649c0d5e6ce8c040fa82f9d8c48720098c17c0cbf23eb07620fc8abb2946541b38adfad2760c2f09ee56d6a64cf0769cc18771f067e2f9338fc5a36d44b49bb58f7850adafa0a99a3c216fc3018ba49dc31b1dcc3639ed13f1faf44df6b6319c5df697b0215cbaf11f8364ba593d7779213b5d331e864df7a816e1bdac328670642fa87e0db6b87c844092a2e8c68471cbfb89a230bf825d33480213ae847ce3909f7cd991f88156b69a4340b46f73db33fab2234d5c031026d9731674ab663a10c55ab229169d07a026d67bc2b6b56873ee1190cfbcec6d07b4325497fcde808ea4a136a10df4b7cc4c73895fa92904ceb09275ea50d8931bac95b595427126659c6c15a1d8575a1484683c07d84141d6548eaac8af9698bc2524ded835f7708b3eccf52c6fc0db4977da33b95d747acc06400fc4823076149af77b5cfc672a987520a431d0770614969956e71e6816d307b121948690d1648757f6b65ec4ab2a4db9b20245f35a52e96a2d85134cfbeee34c00dc8ea4b9a167cc92e5e547b1ea4d02ab751b34e8e245caf30a129c33601d484b94200eac1cee8677c289a72a2565e73ba7b3752d587249b3833c3837b11cc2b3ebaf72f7c639d4f6ab6b78141562c999a85fefd5bd7151aa52e7888465c40bdb1d9b8fa99a804d759365029253eb9e9b9bbbd8fd4ec3bef0a66319add378e690c7174d4700d6dfee4f8513257b889c602f2ef414a56bd4896f5fe4a17cffbdb78353a89e2d3b988835ecb1f590628dc4114d01ca70115d58f0b1e63630b8899cb26e138c28f220d458a630e26166ede57ab6fca2b79bf57c1b3a0c67bef256c90d54d257f93fe14095b334cca2e0561e1a54d79b645e601c7dd65850b2fb09bbf0b2cc1446dda48363e92e75a9d9c5b21cfb989310881e09836c7209496c4d7a9e6e4ec4be85a31fb7a5d82babc0cae7ec3dba3add7ca197f377277a3543222d6584d777184cb04079c4d8963e48dcf4109690927b2af42e2422e4a94f7295d81ff64797fcaf2f0dece957ecb40e320981d61803fa2d23263c27d6ce8ddd9ddf4b1e190c3540e76d752356ba4d50528889487e03d15417944dc36057102dbbe9cc223f2aee28725924c589f576c7a1e6de106b58b4f3a75b4eeb4535d3a1f34d70fdba098ea275e545cf4274dae1ef3a9aa725efd89c7b707d71bb0f92f3dcc846435a084f4d518abe9c5062042b17f89164aee6ec517be918d6f51b21218b1ecdb0fd93c0893d38526556d39f8ff0261bb18e159c11115dd0e853fa8bf9d98a344d71ad2e07f36b05fa871a7e6a007f4b0574635b57dc9a2e1fbcbb236cf26f7e8d1f2ec2356367e6c81251c7fef5347358ef2a60727a4553b6c0b7897a59a982c550420a37bdea036be4dee6521e1af354df39ddc7922910891cb809fc59d629908224f270a4f5bfe3520c3475093592c03b618e8f047a99bd5b07d710143e380c30344da64ac2ffc5d775c9d9b75439bc07ec9c4fd2c530ad49ffb97292cf726dc9f5d8f2694ac0518d9921723d9f0959eb08dd3da31c486f7d15edc172a641d7fe26b6b87acaf5909726982f63fbe73a67ff6413d6b0eaa34ddd61b1d29b5c49f2dc1274e9b1d5dacc958daef59c6bcf7b6da51de22dfa38ab979c191ca2942f4db707bcf56a0411cac55169ef544120e0294923841ea50262461cc5331dd41d6d6da33c98724d62ec6f9b798b0cc44618737d2241e14e4f28c55cd1aaf5f74f7d260804f5de3e822c7a914f3c66a51b5860da2841414685752e3b23ccac8932198dbf80d749cee8a4b888c4e44613e3db5fa19408a86ce75d974f66a27eca6a3743be3ecf7e3f72538950a40424d4d8aeab6f31d46ef5e46f26f85fa1d74a8143f48bbb4dbfae989a0dfdfb7c24958a71b422fc28a572a7101b76cf5188bd12562049b49b283f9f19ba66404a0beebfebcf8ade4cc88e55f7b7544419202e16554627e66d0b866498b4951398b0bbc792a7cfb9d028ad1b10a03780fc668a25d90a101af337ed3cad86797b43a759ca1f2653833d62ebbf116db92e2225a79b393f769abe32baf574666124cdd47282f449bf1f25b149427e0d91168848cdb1d9e90caa6aa446a512b8554d07c6a7855509471962d6b6927ca8747ac970b416c88678cd83573bddaff3984ba317b1fda564d58c2b05698b93c8157b3452c323029d85050bff607f392586449b15d7a99497c6288413350039dd03ba4d96fa352aa8e31d1be7dadab35579067aa52c19bb11cc2dd45e38cb5093fa57c1a5c527bf6434d7e1e888d4a354907ff4e448e883d4af5e3f34d59aa6e0da8a7e72182ef42975c5914c8e55dbb1811b9842dc2602e185fabbada8d054523737d31b1e75cd7baa3904a07a2ab44222751005c0752ea637b3374b975a529b47fc11958f47e0c5dede4e230382e5a98d1d2a09600f9a9d434d5b98e5f8c2e62843c01a2e755f16be98d0fb8c15d80bbc86b2f408392f8ef6eed864ecf23caec161ef9be5f53c6cb64c8366e88157ce1253df1a91a44011a9fcdc28699e13bcb8cb6977351f5b58a17e0e686845eb2f31a077f8a8eba68fcfd6f64a3e994485f7313a826544df9cacbbf6b295517acb1c3010f2a252a5f4c1346e627d4ff8ee8945b2f3e735a76aa29377a336dd73d968ee9dd599907751083d705ecfe66bf2bb32eecf4e703c32136edc7ea729140794eeaf535ab6da535b5a349720fd7cc41132e2d2d4202a9eacd3aa6a4632de525db36c78958029e077d2de87479a462b0183fdcd1816a5786ad2eb76eaa114c8db820800556b176ba41b96cc88fb3a39fda64d482fc545b283b048d20d8ebd67f9b0f47bd1c12d2ed09eb17e16acc60f8cb8fd3d19d1333fa9fa16b5a19a78b62a15194955f51b8fefe3bf6f2609ef00fc348976a5cad3b6ac583f872dee0484e186afdc0a39590a67d72f57bae6437c45c9e945ba82c4a32a3a8b4cef514199d2fef7e207ca4e26b60f92bd551209ff45e5a0d5097ad92eb2549b9a301d33913a2c5d64f18caa7cf6cd98d12eda9599449d4161089c3e0c66043ce0ce090bf2374658b668d318025aa782017ee10627b1e275a988756fbd7077320f61d442f5da8bd81efc8f31e6bc7121e32596d6d8ba2f59219054e45eb869bb675beafed6ab066836b59bfb44c69a17b1019191ef435a04103f49949d313558252264accb4585f9297e22b6dbbd3f6df1b251d0e49fdcdc02f19f3cc757d53f3b98caeef8849cbebdb248877af2e145ae1ff425b0a24baa988146cafa6e2e16b2f20bb37c2e264df9764068270407e1158ff0c42cc8b190ce515940179338d2ab6d82e20ff2f8bde17eda01cb92029f683f1c00130bc29aede74426f46339767b3eace01c4314f04279498c831b8e8cf53843d9fc6c93a382744cd54beaf536012719f9c749cc95ea4caf1bfde35c4e6b7a129ef33371d8bdfb387fc4be516a2762f9ac2257d2d517fc3e6a30f1ded9bf5f6ac2cc4b8d8fcf4493f9e47a342468b0a9603fc747f4e2b217a5ec9c28b88b4dc7ddaa1989c5b6b6f1ce1eb39308ceea259936cdf2bd6ed709acffe765dc7922af38bdfe2868cd49a8b153af6799a43480b43ea80c5571931b8fa4aa366c76d5eef5f07c7269d6d457b0e25dde58305f34cd0142aa5c000398b26f15f4ea9fae2c35a1127b7e6dbecc02ebe75ce9ee944d58bdedcd2d728f7e7810b654a6e94833927eb8f025d7c2b209bbb5b8b830f2a7d22a28150bf0e302d416e812a89c852dbddc50dc8ba61d4d0028eb5b15bad33cc8cb730c7fadcbdd574d131a4ce0f76a864f812302407d115246386e993dccbbac61f23b63e088496f25c4410ebf396ce8f20808a7ee82c55d1c958d7909dc930bfcf898e2814bef10e0b2130553335632b4dd08a90d8ef0240be0d909868459ba14f062403e99def428b6459487aff05d4b19439c45d446c71d6729753e5d75950349d637654c8b8f7dd4d14abf4b0b696e5df12df5c6777a480e55adb861d4b590f6d4a91f62cfac878c658f69c1f124105b56ca8b499825f3a47e2a1d044ae77b370b94ec9065a7b02b454e9c407531f88ab9d01f11bc35dff5e5904fb4372c170b67ade8104a3cfc9d0b56d83518687465d2bd8d47bdfd32350ec59a983899ec029ed601f685640430cc7095ab9759917d13dac1070be4fa85f5c5ba73d97a89384f04812a8edce448c7d6d859ccdea8248d194b24af4dc26f4acc4d5c29893c17084b11381f5878ab2272a15db69f68909c2b66de213b0be5e8142c6d3d1d7c7162f2f5ac9afe07683f348399134cfd96d9204b670993b27a106cf7715c12a52dee6b98744e77b8ec40d8d4a91031d080d9958c09466009a1f93a0b58bb4b20b652e3e00d6c541670c6e0fb704f8ecf2acc8b501130ee501a9534799f5b27f20318b59194e6981d6970f75cbc3d08e5a3afd8ee8541b94717b4f9832d04b3d9f4e02b633a9160e016526c762eba279889653e723fc13c9acaf53bb61d0229ab2eb1d2c125fa1d13372f9e73b6ddd9bc57710c84cdf9715b511abb14e30455475eaa865a3f8f2c9b5f3cdf1dee164823796e16d733343a929d0108c9702be6f6cd307e0c4e08b625e507d7517b19f5ea18a2be685e384833c3c0dd55ee267212750049e734257e5e1632d91b96e37caeaf83b36006fee12676017cf13f45853f28fab9a884d63f680388dfa6646a4e2abdc5dcfe6dc16b1d46655ab577a51d2a79735ae17b1a27222cb75c7d519b6018296f5062d0217844ef8a4d65453a548f316afb252f056994a5bf1cd479eca63135af5e99d85c03ff36eebf44c2413052cbeb05156a14cf9e286274349e967301db22d5e1dab4d97f45c41ade4ae44b2e6d3284a141ec48b9005a5efdb731128501e94d2c695bfdc181613ca2beae5910b7fc6d9cfa65a99ca0afb70b9a150ceff12ec99816755f2280ff8c93450a3d539b274637117020c79df3e94de1e8a05cd97acdb5ba4b3afb24ba927f8a04f60888eea4a4edc24c7900446688fd47b7ff264fd140f3292ff443dbfd5ce5017ca4edb404ddeee3d339fe4cd9c6ce1dfdb9cc4235ee57d2989ea2cfd63bcffda6552308d7050db63a063fc906b86c071dadc6a4da2912b6261d1a40e3b9ba6f17d18b1c64fd0dce38e074240de6889227eb5851a6622ec2b7e3b502b69e208c91d42f9137c2d85014f0401fb36864f421b12c61770e6bda2e6187626dccefd9b73954bf02e35e3edb5a4626bf8b1dc9b365eaf88295e2204c634e34d3ee58ef23159db77ad212f169574278bde8dfc7840cb080daf2eea3bcc1419a22e4004deef1c01c82043987557574fd65bb4d6ca2b6c8d9a986084e0afbbcc9b9f6400b93cf1ebc3be3bfd75e622ac32e594d63b14d798563729e5f1dad93bb59499d428f0699bc9a10c02fb47f3122f9db633d34f603048b48021976703af71659e2a514baea3a4e83e71df88d968a214145c5e7bf07e161354d45ea0dd70d1ef4deee1982be009c1e5e81044c5ff35c7aad270db7654e8c7bfbfee4bee1e1254d3c1dd150e6120a3b386e2abb7c84a92af87ea74f99fc8f9584336d6b55aac52b1d722eab348742e228930c4b18e3efbf685ff1e098a521e314d673bad4839bf4c57248e4d0d61db1ab4bc4e2226b194dcb0f2068c4ec51433e26f0a03"}, 0x1080}) (async) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000000)=0x5, 0x4) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) 10:14:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:57 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) 10:14:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:57 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_getaddr={0x58, 0x16, 0x400, 0x70bd27, 0x25dfdbff, {0x2, 0x80, 0x2d}, [@IFA_BROADCAST={0x8, 0x4, @multicast1}, @IFA_BROADCAST={0x8, 0x4, @empty}, @IFA_LABEL={0x14, 0x3, 'vlan1\x00'}, @IFA_RT_PRIORITY={0x8, 0x9, 0x401}, @IFA_CACHEINFO={0x14, 0x6, {0x800, 0x2, 0x8, 0x4}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4040004}, 0x44000) 10:14:57 executing program 3: syz_clone(0x104000, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 10:14:57 executing program 4: r0 = syz_clone(0x1149400, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) getpgrp(r0) syz_clone(0x1149400, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) (async) getpgrp(r0) (async) 10:14:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1703.848314][ T2882] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1703.856124][ T2882] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1703.863944][ T2882] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1703.871749][ T2882] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1703.879560][ T2882] 10:14:57 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_getaddr={0x58, 0x16, 0x400, 0x70bd27, 0x25dfdbff, {0x2, 0x80, 0x2d}, [@IFA_BROADCAST={0x8, 0x4, @multicast1}, @IFA_BROADCAST={0x8, 0x4, @empty}, @IFA_LABEL={0x14, 0x3, 'vlan1\x00'}, @IFA_RT_PRIORITY={0x8, 0x9, 0x401}, @IFA_CACHEINFO={0x14, 0x6, {0x800, 0x2, 0x8, 0x4}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4040004}, 0x44000) 10:14:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:57 executing program 4: r0 = syz_clone(0x1149400, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) getpgrp(r0) syz_clone(0x1149400, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) (async) getpgrp(r0) (async) 10:14:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1703.933061][ T2915] FAULT_INJECTION: forcing a failure. [ 1703.933061][ T2915] name failslab, interval 1, probability 0, space 0, times 0 [ 1703.964432][ T2915] CPU: 1 PID: 2915 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1703.974431][ T2915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1703.984314][ T2915] Call Trace: [ 1703.987438][ T2915] [ 1703.990211][ T2915] dump_stack_lvl+0x151/0x1b7 [ 1703.994728][ T2915] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1704.000031][ T2915] dump_stack+0x15/0x17 [ 1704.004013][ T2915] should_fail+0x3c0/0x510 [ 1704.008269][ T2915] __should_failslab+0x9f/0xe0 [ 1704.012866][ T2915] should_failslab+0x9/0x20 [ 1704.017205][ T2915] kmem_cache_alloc+0x4f/0x2f0 [ 1704.021807][ T2915] ? vm_area_dup+0x26/0x1d0 [ 1704.026143][ T2915] vm_area_dup+0x26/0x1d0 [ 1704.030308][ T2915] dup_mmap+0x6b8/0xea0 [ 1704.034300][ T2915] ? __delayed_free_task+0x20/0x20 [ 1704.039247][ T2915] ? mm_init+0x807/0x960 [ 1704.043328][ T2915] dup_mm+0x91/0x330 [ 1704.047059][ T2915] copy_mm+0x108/0x1b0 [ 1704.050966][ T2915] copy_process+0x1295/0x3250 [ 1704.055476][ T2915] ? proc_fail_nth_write+0x213/0x290 [ 1704.060597][ T2915] ? proc_fail_nth_read+0x220/0x220 [ 1704.065630][ T2915] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1704.070582][ T2915] ? vfs_write+0x9af/0x1050 [ 1704.074918][ T2915] ? vmacache_update+0xb7/0x120 [ 1704.079604][ T2915] kernel_clone+0x22d/0x990 [ 1704.084033][ T2915] ? file_end_write+0x1b0/0x1b0 [ 1704.088718][ T2915] ? __kasan_check_write+0x14/0x20 [ 1704.093668][ T2915] ? create_io_thread+0x1e0/0x1e0 [ 1704.098531][ T2915] ? __mutex_lock_slowpath+0x10/0x10 [ 1704.103649][ T2915] __x64_sys_clone+0x289/0x310 [ 1704.108246][ T2915] ? __do_sys_vfork+0x130/0x130 [ 1704.112933][ T2915] ? debug_smp_processor_id+0x17/0x20 [ 1704.118142][ T2915] do_syscall_64+0x44/0xd0 [ 1704.122466][ T2915] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1704.128122][ T2915] RIP: 0033:0x7f03091130d9 [ 1704.132374][ T2915] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1704.151814][ T2915] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1704.160063][ T2915] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1704.167870][ T2915] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1704.175683][ T2915] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 10:14:57 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) 10:14:57 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv4_getaddr={0x58, 0x16, 0x400, 0x70bd27, 0x25dfdbff, {0x2, 0x80, 0x2d}, [@IFA_BROADCAST={0x8, 0x4, @multicast1}, @IFA_BROADCAST={0x8, 0x4, @empty}, @IFA_LABEL={0x14, 0x3, 'vlan1\x00'}, @IFA_RT_PRIORITY={0x8, 0x9, 0x401}, @IFA_CACHEINFO={0x14, 0x6, {0x800, 0x2, 0x8, 0x4}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4040004}, 0x44000) 10:14:57 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') 10:14:57 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 10:14:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:57 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = dup3(r0, r0, 0x80000) r2 = getpgid(0x0) r3 = syz_open_procfs(r2, 0x0) getpgrp(r2) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x9, 0x0, "38e48df0d18fd2d03a14a9b57b48917d9d8ff711459dd5c6f1bd2a00abee4403ba6c53243e29389f8b70a294abe814fd7785698b5205f7cbd5764068124dd9d5", "601a7012bb33b61daf8c3f6a2ca7316558e213af9fc53ae32707398b3ff82c5e5f1233f0c206f866924500c44ed3e40d46b828a7a077bb2e0d52389e578aa00f", "29e647f6b8ef320b674623238cb112f85193dc8ea53aa0b81f796c1066461b86", [0x8000000000000001, 0x200]}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x1fffffc5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x5, 0x8, 0xfffffffffffffff4, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xdd}, @generic={0x8, 0xc, 0x2, 0x101, 0x100}], &(0x7f0000000040)='syzkaller\x00', 0xf7, 0x14, &(0x7f0000000080)=""/20, 0x41000, 0x10, '\x00', 0x0, 0x1e, r1, 0x8, &(0x7f00000000c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xf, 0x3ff, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000140)=[0xffffffffffffffff]}, 0x80) 10:14:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1704.183580][ T2915] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1704.191389][ T2915] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1704.199206][ T2915] 10:14:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:57 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') (async) 10:14:57 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = dup3(r0, r0, 0x80000) r2 = getpgid(0x0) r3 = syz_open_procfs(r2, 0x0) getpgrp(r2) (async) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x9, 0x0, "38e48df0d18fd2d03a14a9b57b48917d9d8ff711459dd5c6f1bd2a00abee4403ba6c53243e29389f8b70a294abe814fd7785698b5205f7cbd5764068124dd9d5", "601a7012bb33b61daf8c3f6a2ca7316558e213af9fc53ae32707398b3ff82c5e5f1233f0c206f866924500c44ed3e40d46b828a7a077bb2e0d52389e578aa00f", "29e647f6b8ef320b674623238cb112f85193dc8ea53aa0b81f796c1066461b86", [0x8000000000000001, 0x200]}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x1fffffc5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x5, 0x8, 0xfffffffffffffff4, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xdd}, @generic={0x8, 0xc, 0x2, 0x101, 0x100}], &(0x7f0000000040)='syzkaller\x00', 0xf7, 0x14, &(0x7f0000000080)=""/20, 0x41000, 0x10, '\x00', 0x0, 0x1e, r1, 0x8, &(0x7f00000000c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xf, 0x3ff, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000140)=[0xffffffffffffffff]}, 0x80) 10:14:57 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) [ 1704.234744][ T2948] FAULT_INJECTION: forcing a failure. [ 1704.234744][ T2948] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1704.265059][ T2948] CPU: 1 PID: 2948 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1704.275043][ T2948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1704.284938][ T2948] Call Trace: [ 1704.288148][ T2948] [ 1704.290925][ T2948] dump_stack_lvl+0x151/0x1b7 [ 1704.295440][ T2948] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1704.300734][ T2948] dump_stack+0x15/0x17 [ 1704.304724][ T2948] should_fail+0x3c0/0x510 [ 1704.308975][ T2948] should_fail_alloc_page+0x58/0x70 [ 1704.314010][ T2948] __alloc_pages+0x1de/0x7c0 [ 1704.318439][ T2948] ? __count_vm_events+0x30/0x30 [ 1704.323205][ T2948] ? __this_cpu_preempt_check+0x13/0x20 [ 1704.328589][ T2948] ? __mod_node_page_state+0xac/0xf0 [ 1704.333706][ T2948] pte_alloc_one+0x73/0x1b0 [ 1704.338054][ T2948] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1704.343082][ T2948] __pte_alloc+0x86/0x350 [ 1704.347246][ T2948] ? free_pgtables+0x210/0x210 [ 1704.351845][ T2948] ? _raw_spin_lock+0xa3/0x1b0 [ 1704.356451][ T2948] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1704.361654][ T2948] ? __kernel_text_address+0x9a/0x110 [ 1704.366861][ T2948] copy_pte_range+0x1b1f/0x20b0 [ 1704.371552][ T2948] ? __kunmap_atomic+0x80/0x80 [ 1704.376149][ T2948] ? __kasan_slab_alloc+0xc4/0xe0 [ 1704.381009][ T2948] ? __kasan_slab_alloc+0xb2/0xe0 [ 1704.385867][ T2948] ? kmem_cache_alloc+0x189/0x2f0 [ 1704.390727][ T2948] ? vm_area_dup+0x26/0x1d0 [ 1704.395068][ T2948] ? dup_mmap+0x6b8/0xea0 [ 1704.399236][ T2948] ? dup_mm+0x91/0x330 [ 1704.403138][ T2948] ? copy_mm+0x108/0x1b0 [ 1704.407219][ T2948] ? copy_process+0x1295/0x3250 [ 1704.411907][ T2948] ? kernel_clone+0x22d/0x990 [ 1704.416419][ T2948] ? __x64_sys_clone+0x289/0x310 [ 1704.421204][ T2948] ? do_syscall_64+0x44/0xd0 [ 1704.425619][ T2948] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1704.431524][ T2948] copy_page_range+0xc1e/0x1090 [ 1704.436218][ T2948] ? pfn_valid+0x1e0/0x1e0 [ 1704.440462][ T2948] dup_mmap+0x99f/0xea0 [ 1704.444454][ T2948] ? __delayed_free_task+0x20/0x20 [ 1704.449400][ T2948] ? mm_init+0x807/0x960 [ 1704.453481][ T2948] dup_mm+0x91/0x330 [ 1704.457211][ T2948] copy_mm+0x108/0x1b0 [ 1704.461120][ T2948] copy_process+0x1295/0x3250 [ 1704.465635][ T2948] ? proc_fail_nth_write+0x213/0x290 [ 1704.470752][ T2948] ? proc_fail_nth_read+0x220/0x220 [ 1704.475784][ T2948] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1704.480740][ T2948] ? vfs_write+0x9af/0x1050 [ 1704.485072][ T2948] ? vmacache_update+0xb7/0x120 [ 1704.489757][ T2948] kernel_clone+0x22d/0x990 [ 1704.494710][ T2948] ? file_end_write+0x1b0/0x1b0 [ 1704.499391][ T2948] ? __kasan_check_write+0x14/0x20 [ 1704.504339][ T2948] ? create_io_thread+0x1e0/0x1e0 [ 1704.509198][ T2948] ? __mutex_lock_slowpath+0x10/0x10 [ 1704.514320][ T2948] __x64_sys_clone+0x289/0x310 [ 1704.518919][ T2948] ? __do_sys_vfork+0x130/0x130 [ 1704.523606][ T2948] ? debug_smp_processor_id+0x17/0x20 [ 1704.528814][ T2948] do_syscall_64+0x44/0xd0 [ 1704.533067][ T2948] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1704.538795][ T2948] RIP: 0033:0x7f03091130d9 [ 1704.543049][ T2948] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1704.562489][ T2948] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1704.570733][ T2948] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1704.578543][ T2948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:14:58 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:14:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:58 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) 10:14:58 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (async) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid\x00') (async) 10:14:58 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = dup3(r0, r0, 0x80000) r2 = getpgid(0x0) r3 = syz_open_procfs(r2, 0x0) getpgrp(r2) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x9, 0x0, "38e48df0d18fd2d03a14a9b57b48917d9d8ff711459dd5c6f1bd2a00abee4403ba6c53243e29389f8b70a294abe814fd7785698b5205f7cbd5764068124dd9d5", "601a7012bb33b61daf8c3f6a2ca7316558e213af9fc53ae32707398b3ff82c5e5f1233f0c206f866924500c44ed3e40d46b828a7a077bb2e0d52389e578aa00f", "29e647f6b8ef320b674623238cb112f85193dc8ea53aa0b81f796c1066461b86", [0x8000000000000001, 0x200]}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x1fffffc5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x5, 0x8, 0xfffffffffffffff4, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xdd}, @generic={0x8, 0xc, 0x2, 0x101, 0x100}], &(0x7f0000000040)='syzkaller\x00', 0xf7, 0x14, &(0x7f0000000080)=""/20, 0x41000, 0x10, '\x00', 0x0, 0x1e, r1, 0x8, &(0x7f00000000c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xf, 0x3ff, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000140)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) dup3(r0, r0, 0x80000) (async) getpgid(0x0) (async) syz_open_procfs(r2, 0x0) (async) getpgrp(r2) (async) ioctl$LOOP_SET_STATUS64(r3, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x9, 0x0, "38e48df0d18fd2d03a14a9b57b48917d9d8ff711459dd5c6f1bd2a00abee4403ba6c53243e29389f8b70a294abe814fd7785698b5205f7cbd5764068124dd9d5", "601a7012bb33b61daf8c3f6a2ca7316558e213af9fc53ae32707398b3ff82c5e5f1233f0c206f866924500c44ed3e40d46b828a7a077bb2e0d52389e578aa00f", "29e647f6b8ef320b674623238cb112f85193dc8ea53aa0b81f796c1066461b86", [0x8000000000000001, 0x200]}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1a, 0x1fffffc5, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0xd, 0x5, 0x8, 0xfffffffffffffff4, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xdd}, @generic={0x8, 0xc, 0x2, 0x101, 0x100}], &(0x7f0000000040)='syzkaller\x00', 0xf7, 0x14, &(0x7f0000000080)=""/20, 0x41000, 0x10, '\x00', 0x0, 0x1e, r1, 0x8, &(0x7f00000000c0)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0xf, 0x3ff, 0x5}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000140)=[0xffffffffffffffff]}, 0x80) (async) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xff0f, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:58 executing program 4: syz_clone(0x800, 0x0, 0x35, &(0x7f0000000000), 0x0, 0x0) [ 1704.586355][ T2948] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1704.594168][ T2948] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1704.601977][ T2948] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1704.609793][ T2948] 10:14:58 executing program 3: syz_clone(0x104000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:58 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x58, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x40808) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000300)={'tunl0\x00', r0, 0x7800, 0x20, 0x6b, 0x6, {{0x45, 0x4, 0x3, 0x37, 0x114, 0x67, 0x0, 0x20, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, {[@generic={0x83, 0xb, "24c3594c2274d8fcaa"}, @timestamp={0x44, 0xc, 0x58, 0x0, 0x0, [0x3, 0x6]}, @timestamp_addr={0x44, 0x24, 0x35, 0x1, 0x4, [{@multicast2, 0x3}, {@broadcast, 0x4}, {@local, 0x4}, {@local, 0x8}]}, @ssrr={0x89, 0x23, 0x5f, [@local, @loopback, @broadcast, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x3f}, @rand_addr=0x64010102]}, @timestamp_prespec={0x44, 0x1c, 0xbd, 0x3, 0x7, [{@broadcast, 0x8ae1}, {@broadcast, 0x6}, {@loopback}]}, @ssrr={0x89, 0xb, 0x1c, [@dev={0xac, 0x14, 0x14, 0x2f}, @private=0xa010102]}, @lsrr={0x83, 0x1b, 0xd7, [@remote, @empty, @broadcast, @multicast2, @remote, @empty]}, @timestamp_addr={0x44, 0x4c, 0x55, 0x1, 0x6, [{@loopback, 0x978}, {@multicast2, 0x5414}, {@broadcast, 0x80}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@multicast2, 0x3ff}, {@multicast2, 0x4}, {@rand_addr=0x64010102, 0x8}, {@loopback}, {@remote, 0x480000}]}, @rr={0x7, 0x13, 0x12, [@private=0xa010101, @dev={0xac, 0x14, 0x14, 0x2c}, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}]}}}}}) bpf$PROG_LOAD(0x9, 0x0, 0x2) [ 1704.654597][ T2982] FAULT_INJECTION: forcing a failure. [ 1704.654597][ T2982] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1704.683500][ T2982] CPU: 1 PID: 2982 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1704.693491][ T2982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 10:14:58 executing program 4: syz_clone(0x800, 0x0, 0x35, &(0x7f0000000000), 0x0, 0x0) syz_clone(0x800, 0x0, 0x35, &(0x7f0000000000), 0x0, 0x0) (async) [ 1704.703387][ T2982] Call Trace: [ 1704.706509][ T2982] [ 1704.709288][ T2982] dump_stack_lvl+0x151/0x1b7 [ 1704.713801][ T2982] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1704.720579][ T2982] dump_stack+0x15/0x17 [ 1704.724567][ T2982] should_fail+0x3c0/0x510 [ 1704.728814][ T2982] should_fail_alloc_page+0x58/0x70 [ 1704.733848][ T2982] __alloc_pages+0x1de/0x7c0 [ 1704.738271][ T2982] ? vm_area_dup+0x26/0x1d0 [ 1704.742608][ T2982] ? copy_mm+0x108/0x1b0 [ 1704.746688][ T2982] ? __count_vm_events+0x30/0x30 [ 1704.751463][ T2982] ? copy_page_range+0xe48/0x1090 [ 1704.756329][ T2982] allocate_slab+0x62/0x580 [ 1704.760661][ T2982] ___slab_alloc+0x2e2/0x6f0 [ 1704.765093][ T2982] ? vm_area_dup+0x26/0x1d0 [ 1704.769427][ T2982] ? vm_area_dup+0x26/0x1d0 [ 1704.773769][ T2982] __slab_alloc+0x4a/0x90 [ 1704.777933][ T2982] kmem_cache_alloc+0x205/0x2f0 [ 1704.782619][ T2982] ? vm_area_dup+0x26/0x1d0 [ 1704.786957][ T2982] vm_area_dup+0x26/0x1d0 [ 1704.791125][ T2982] dup_mmap+0x6b8/0xea0 [ 1704.795120][ T2982] ? __delayed_free_task+0x20/0x20 [ 1704.800071][ T2982] ? mm_init+0x807/0x960 [ 1704.804143][ T2982] dup_mm+0x91/0x330 [ 1704.807885][ T2982] copy_mm+0x108/0x1b0 [ 1704.811869][ T2982] copy_process+0x1295/0x3250 [ 1704.816381][ T2982] ? proc_fail_nth_write+0x213/0x290 [ 1704.821500][ T2982] ? proc_fail_nth_read+0x220/0x220 [ 1704.826536][ T2982] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1704.831481][ T2982] ? vfs_write+0x9af/0x1050 [ 1704.835824][ T2982] ? vmacache_update+0xb7/0x120 [ 1704.840511][ T2982] kernel_clone+0x22d/0x990 [ 1704.844848][ T2982] ? file_end_write+0x1b0/0x1b0 [ 1704.849535][ T2982] ? __kasan_check_write+0x14/0x20 [ 1704.854513][ T2982] ? create_io_thread+0x1e0/0x1e0 [ 1704.859342][ T2982] ? __mutex_lock_slowpath+0x10/0x10 [ 1704.864463][ T2982] __x64_sys_clone+0x289/0x310 [ 1704.869062][ T2982] ? __do_sys_vfork+0x130/0x130 [ 1704.873869][ T2982] ? debug_smp_processor_id+0x17/0x20 [ 1704.879043][ T2982] do_syscall_64+0x44/0xd0 [ 1704.883295][ T2982] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1704.889022][ T2982] RIP: 0033:0x7f03091130d9 [ 1704.893285][ T2982] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1704.912720][ T2982] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1704.920967][ T2982] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1704.928775][ T2982] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1704.936587][ T2982] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1704.944397][ T2982] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 10:14:58 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:58 executing program 4: syz_clone(0x800, 0x0, 0x35, &(0x7f0000000000), 0x0, 0x0) 10:14:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:58 executing program 3: syz_clone(0x104000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:58 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x58, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x40808) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000300)={'tunl0\x00', r0, 0x7800, 0x20, 0x6b, 0x6, {{0x45, 0x4, 0x3, 0x37, 0x114, 0x67, 0x0, 0x20, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, {[@generic={0x83, 0xb, "24c3594c2274d8fcaa"}, @timestamp={0x44, 0xc, 0x58, 0x0, 0x0, [0x3, 0x6]}, @timestamp_addr={0x44, 0x24, 0x35, 0x1, 0x4, [{@multicast2, 0x3}, {@broadcast, 0x4}, {@local, 0x4}, {@local, 0x8}]}, @ssrr={0x89, 0x23, 0x5f, [@local, @loopback, @broadcast, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x3f}, @rand_addr=0x64010102]}, @timestamp_prespec={0x44, 0x1c, 0xbd, 0x3, 0x7, [{@broadcast, 0x8ae1}, {@broadcast, 0x6}, {@loopback}]}, @ssrr={0x89, 0xb, 0x1c, [@dev={0xac, 0x14, 0x14, 0x2f}, @private=0xa010102]}, @lsrr={0x83, 0x1b, 0xd7, [@remote, @empty, @broadcast, @multicast2, @remote, @empty]}, @timestamp_addr={0x44, 0x4c, 0x55, 0x1, 0x6, [{@loopback, 0x978}, {@multicast2, 0x5414}, {@broadcast, 0x80}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@multicast2, 0x3ff}, {@multicast2, 0x4}, {@rand_addr=0x64010102, 0x8}, {@loopback}, {@remote, 0x480000}]}, @rr={0x7, 0x13, 0x12, [@private=0xa010101, @dev={0xac, 0x14, 0x14, 0x2c}, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}]}}}}}) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:58 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd1d8286578e389f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getmulticast={0x14, 0x3a, 0x300, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004800}, 0x5) [ 1704.952294][ T2982] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1704.960109][ T2982] [ 1704.990837][ T3013] FAULT_INJECTION: forcing a failure. [ 1704.990837][ T3013] name failslab, interval 1, probability 0, space 0, times 0 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:58 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x58, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x40808) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000300)={'tunl0\x00', r0, 0x7800, 0x20, 0x6b, 0x6, {{0x45, 0x4, 0x3, 0x37, 0x114, 0x67, 0x0, 0x20, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, {[@generic={0x83, 0xb, "24c3594c2274d8fcaa"}, @timestamp={0x44, 0xc, 0x58, 0x0, 0x0, [0x3, 0x6]}, @timestamp_addr={0x44, 0x24, 0x35, 0x1, 0x4, [{@multicast2, 0x3}, {@broadcast, 0x4}, {@local, 0x4}, {@local, 0x8}]}, @ssrr={0x89, 0x23, 0x5f, [@local, @loopback, @broadcast, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x3f}, @rand_addr=0x64010102]}, @timestamp_prespec={0x44, 0x1c, 0xbd, 0x3, 0x7, [{@broadcast, 0x8ae1}, {@broadcast, 0x6}, {@loopback}]}, @ssrr={0x89, 0xb, 0x1c, [@dev={0xac, 0x14, 0x14, 0x2f}, @private=0xa010102]}, @lsrr={0x83, 0x1b, 0xd7, [@remote, @empty, @broadcast, @multicast2, @remote, @empty]}, @timestamp_addr={0x44, 0x4c, 0x55, 0x1, 0x6, [{@loopback, 0x978}, {@multicast2, 0x5414}, {@broadcast, 0x80}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@multicast2, 0x3ff}, {@multicast2, 0x4}, {@rand_addr=0x64010102, 0x8}, {@loopback}, {@remote, 0x480000}]}, @rr={0x7, 0x13, 0x12, [@private=0xa010101, @dev={0xac, 0x14, 0x14, 0x2c}, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}]}}}}}) bpf$PROG_LOAD(0x9, 0x0, 0x2) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000000)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0x8, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000100), &(0x7f0000000140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000180)}}, 0x10) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r1, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x58, 0x0, 0x20, 0x70bd2c, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR={0x24, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e22}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010100}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000000}, 0x40808) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000440)={'gre0\x00', &(0x7f0000000300)={'tunl0\x00', r0, 0x7800, 0x20, 0x6b, 0x6, {{0x45, 0x4, 0x3, 0x37, 0x114, 0x67, 0x0, 0x20, 0x29, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x64010100, {[@generic={0x83, 0xb, "24c3594c2274d8fcaa"}, @timestamp={0x44, 0xc, 0x58, 0x0, 0x0, [0x3, 0x6]}, @timestamp_addr={0x44, 0x24, 0x35, 0x1, 0x4, [{@multicast2, 0x3}, {@broadcast, 0x4}, {@local, 0x4}, {@local, 0x8}]}, @ssrr={0x89, 0x23, 0x5f, [@local, @loopback, @broadcast, @loopback, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x3f}, @rand_addr=0x64010102]}, @timestamp_prespec={0x44, 0x1c, 0xbd, 0x3, 0x7, [{@broadcast, 0x8ae1}, {@broadcast, 0x6}, {@loopback}]}, @ssrr={0x89, 0xb, 0x1c, [@dev={0xac, 0x14, 0x14, 0x2f}, @private=0xa010102]}, @lsrr={0x83, 0x1b, 0xd7, [@remote, @empty, @broadcast, @multicast2, @remote, @empty]}, @timestamp_addr={0x44, 0x4c, 0x55, 0x1, 0x6, [{@loopback, 0x978}, {@multicast2, 0x5414}, {@broadcast, 0x80}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@multicast2, 0x3ff}, {@multicast2, 0x4}, {@rand_addr=0x64010102, 0x8}, {@loopback}, {@remote, 0x480000}]}, @rr={0x7, 0x13, 0x12, [@private=0xa010101, @dev={0xac, 0x14, 0x14, 0x2c}, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}]}}}}}) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) [ 1705.004197][ T3013] CPU: 0 PID: 3013 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1705.014191][ T3013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1705.024075][ T3013] Call Trace: [ 1705.027196][ T3013] [ 1705.029974][ T3013] dump_stack_lvl+0x151/0x1b7 [ 1705.034486][ T3013] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1705.039783][ T3013] dump_stack+0x15/0x17 [ 1705.043775][ T3013] should_fail+0x3c0/0x510 [ 1705.048025][ T3013] __should_failslab+0x9f/0xe0 [ 1705.052628][ T3013] should_failslab+0x9/0x20 [ 1705.056966][ T3013] kmem_cache_alloc+0x4f/0x2f0 [ 1705.061567][ T3013] ? vm_area_dup+0x26/0x1d0 [ 1705.065905][ T3013] vm_area_dup+0x26/0x1d0 [ 1705.070070][ T3013] dup_mmap+0x6b8/0xea0 [ 1705.074063][ T3013] ? __delayed_free_task+0x20/0x20 [ 1705.079014][ T3013] ? mm_init+0x807/0x960 [ 1705.083089][ T3013] dup_mm+0x91/0x330 [ 1705.086816][ T3013] copy_mm+0x108/0x1b0 [ 1705.090721][ T3013] copy_process+0x1295/0x3250 [ 1705.095236][ T3013] ? proc_fail_nth_write+0x213/0x290 [ 1705.100355][ T3013] ? proc_fail_nth_read+0x220/0x220 [ 1705.105389][ T3013] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1705.110341][ T3013] ? vfs_write+0x9af/0x1050 [ 1705.114676][ T3013] ? vmacache_update+0xb7/0x120 [ 1705.120579][ T3013] kernel_clone+0x22d/0x990 [ 1705.124924][ T3013] ? file_end_write+0x1b0/0x1b0 [ 1705.129606][ T3013] ? __kasan_check_write+0x14/0x20 [ 1705.134555][ T3013] ? create_io_thread+0x1e0/0x1e0 [ 1705.139413][ T3013] ? __mutex_lock_slowpath+0x10/0x10 [ 1705.144534][ T3013] __x64_sys_clone+0x289/0x310 [ 1705.149134][ T3013] ? __do_sys_vfork+0x130/0x130 [ 1705.153818][ T3013] ? debug_smp_processor_id+0x17/0x20 [ 1705.159028][ T3013] do_syscall_64+0x44/0xd0 [ 1705.163280][ T3013] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1705.169009][ T3013] RIP: 0033:0x7f03091130d9 [ 1705.173264][ T3013] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1705.192707][ T3013] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 10:14:58 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:58 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd1d8286578e389f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getmulticast={0x14, 0x3a, 0x300, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004800}, 0x5) 10:14:58 executing program 2: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x11, 0x2a, &(0x7f0000000000)="2d2d4821daed6cd245af0abc81fbb348c2db1cb13005bb56de15b3a6c5b04c42f7b74088c689014a0dc2"}) bpf$PROG_LOAD(0x9, 0x0, 0x35caa2f05f1f89ed) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') 10:14:58 executing program 3: syz_clone(0x104000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:14:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:58 executing program 2: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x11, 0x2a, &(0x7f0000000000)="2d2d4821daed6cd245af0abc81fbb348c2db1cb13005bb56de15b3a6c5b04c42f7b74088c689014a0dc2"}) (async) bpf$PROG_LOAD(0x9, 0x0, 0x35caa2f05f1f89ed) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') 10:14:58 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xd1d8286578e389f9}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@ipv6_getmulticast={0x14, 0x3a, 0x300, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004800}, 0x5) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1705.200948][ T3013] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1705.208861][ T3013] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1705.216662][ T3013] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1705.224476][ T3013] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1705.232288][ T3013] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1705.240099][ T3013] 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:14:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) [ 1705.283015][ T3049] FAULT_INJECTION: forcing a failure. [ 1705.283015][ T3049] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1705.296813][ T3049] CPU: 0 PID: 3049 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1705.306796][ T3049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1705.316687][ T3049] Call Trace: [ 1705.319816][ T3049] [ 1705.322588][ T3049] dump_stack_lvl+0x151/0x1b7 [ 1705.327133][ T3049] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1705.332400][ T3049] ? stack_trace_save+0x12d/0x1f0 [ 1705.337252][ T3049] ? stack_trace_snprint+0x100/0x100 [ 1705.342373][ T3049] dump_stack+0x15/0x17 [ 1705.346365][ T3049] should_fail+0x3c0/0x510 [ 1705.350620][ T3049] should_fail_alloc_page+0x58/0x70 [ 1705.355654][ T3049] __alloc_pages+0x1de/0x7c0 [ 1705.360083][ T3049] ? vm_area_dup+0x26/0x1d0 [ 1705.364421][ T3049] ? copy_mm+0x108/0x1b0 [ 1705.368501][ T3049] ? __count_vm_events+0x30/0x30 [ 1705.373274][ T3049] ? memset+0x35/0x40 [ 1705.377093][ T3049] ? copy_page_range+0xed3/0x1090 [ 1705.381950][ T3049] allocate_slab+0x62/0x580 [ 1705.386297][ T3049] ___slab_alloc+0x2e2/0x6f0 [ 1705.390722][ T3049] ? vm_area_dup+0x26/0x1d0 [ 1705.395058][ T3049] ? vm_area_dup+0x26/0x1d0 [ 1705.399400][ T3049] __slab_alloc+0x4a/0x90 [ 1705.403669][ T3049] kmem_cache_alloc+0x205/0x2f0 [ 1705.408366][ T3049] ? vm_area_dup+0x26/0x1d0 [ 1705.412695][ T3049] vm_area_dup+0x26/0x1d0 [ 1705.416861][ T3049] dup_mmap+0x6b8/0xea0 [ 1705.420852][ T3049] ? __delayed_free_task+0x20/0x20 [ 1705.425799][ T3049] ? mm_init+0x807/0x960 [ 1705.429878][ T3049] dup_mm+0x91/0x330 [ 1705.433612][ T3049] copy_mm+0x108/0x1b0 [ 1705.437515][ T3049] copy_process+0x1295/0x3250 [ 1705.442031][ T3049] ? proc_fail_nth_write+0x213/0x290 [ 1705.447150][ T3049] ? proc_fail_nth_read+0x220/0x220 [ 1705.452183][ T3049] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1705.457129][ T3049] ? vfs_write+0x9af/0x1050 [ 1705.461469][ T3049] ? vmacache_update+0xb7/0x120 [ 1705.466161][ T3049] kernel_clone+0x22d/0x990 [ 1705.470495][ T3049] ? file_end_write+0x1b0/0x1b0 [ 1705.475188][ T3049] ? __kasan_check_write+0x14/0x20 [ 1705.480143][ T3049] ? create_io_thread+0x1e0/0x1e0 [ 1705.484990][ T3049] ? __mutex_lock_slowpath+0x10/0x10 [ 1705.490116][ T3049] __x64_sys_clone+0x289/0x310 [ 1705.494713][ T3049] ? __do_sys_vfork+0x130/0x130 [ 1705.499403][ T3049] ? debug_smp_processor_id+0x17/0x20 [ 1705.504607][ T3049] do_syscall_64+0x44/0xd0 [ 1705.508892][ T3049] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1705.514586][ T3049] RIP: 0033:0x7f03091130d9 [ 1705.518840][ T3049] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1705.538414][ T3049] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1705.546653][ T3049] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1705.554464][ T3049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1705.562272][ T3049] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1705.570082][ T3049] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 10:14:59 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 10:14:59 executing program 2: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x11, 0x2a, &(0x7f0000000000)="2d2d4821daed6cd245af0abc81fbb348c2db1cb13005bb56de15b3a6c5b04c42f7b74088c689014a0dc2"}) (async) bpf$PROG_LOAD(0x9, 0x0, 0x35caa2f05f1f89ed) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') 10:14:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1705.577896][ T3049] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1705.585714][ T3049] 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x1d, 0x0, 0x1}, 0x20) 10:14:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:59 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xc5, 0x4, 0x6, 0x8, 0x401, 0x2, 0x3e, 0x1, 0x38, 0x38, 0x256, 0x80000001, 0x7f, 0x20, 0x2, 0x6, 0x5, 0x7}, [{0x6, 0x8, 0x4, 0x2f2, 0x6, 0x9, 0xfffffff9, 0xfe4}], "7eaee66fd1d95f9812d860e87752ffd41386ff7f2db5430a7a8bcfe9dde4273d3f5419fa58f481d9d196957237551d4f49def2b2fa037af87bdb0a62d4c650e761f321e1ce21ef3890969c5a8d932c40de38e91702807a95e3f86ee7a50cc42ddebb28a2bd81d37468f250479672c86c261f7be38c36a55fcba98b1ef9764d5a32a0fc7b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6dc) r1 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000000)='attr/prev\x00') 10:14:59 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = dup3(r0, r0, 0x80000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)="1bfc55a37f496d193c47dc65a62d49f8df9bb26c3e8cb1139368e0983f28656ce6e97b11f331002dd72d8e47bc66f3c86dcae8d504d9076de2c6d2741fb8865928498f3cc152643a27982f53f9e7348333078d396865fe7b86cfa26b0b1d2cfd48acc46b05ba84218611de8ea63c0f7fcb3cfd78f8a6afd390ca941f5204846564479abdc6568600edb88d01be37da7fe8cabbd5c88b66843b532f0e671488bf699212c270c28761d16fb553691fa3a92e", &(0x7f00000000c0)=@buf="9d93fbe00a4f9e43d798c5a895e63b083e30ce2b3286689ed7673ec26091066599199418aeb803c7f11613b82e334e281d0aa9ef9c049061975f8d2b09de6cb0621e3610e892eadb0869fe7cb929154af4cdacbd6ee6bc5ab9450d431a7be9ac91a17df8b3a7f12403ed47738636fca6c13cf3de8ab63e0513b5d041770bbfb0569235e102f0b9d7933e867112dc3f4637676f7e4b34dcfa6a7d1e7479e34a6dddd773b92161ba1ecd0376ea7cd141eed16f4fec71d774218ed1c66e21d2cf1c0c7777c9c9cdcba11bd41a21c8134e", 0x2}, 0x20) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x109000, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r2, 0x5761, &(0x7f0000000240)={0x6, 0x0, [{0x8000, 0x4, 0x53, [0x24, 0x10001, 0xfffffffb, 0x9, 0x1, 0x7fffffff, 0x6, 0x1000]}, {0x80000001, 0xc8, 0x5, [0x5, 0x1ff, 0xfffffff7, 0xe5, 0x7, 0xdcc, 0x53fb, 0x5]}, {0xdc, 0x7, 0x32, [0x919, 0x6, 0x6, 0x10001, 0x80000000, 0x80000001, 0x1800, 0x2]}, {0x6, 0x0, 0x9, [0x1, 0x7fff, 0x6, 0xf3, 0x9cad, 0x5, 0x97, 0x1000]}, {0x80, 0x200, 0x5, [0x3, 0x401, 0x1, 0x2, 0x2, 0x1, 0x1000, 0x9]}, {0x0, 0x80, 0x7, [0xfffffffd, 0x1, 0x80000000, 0x7d, 0x8, 0x8, 0x300000, 0xab]}]}) 10:14:59 executing program 3: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x11, 0x2a, &(0x7f0000000000)="2d2d4821daed6cd245af0abc81fbb348c2db1cb13005bb56de15b3a6c5b04c42f7b74088c689014a0dc2"}) bpf$PROG_LOAD(0x9, 0x0, 0x35caa2f05f1f89ed) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') 10:14:59 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xc5, 0x4, 0x6, 0x8, 0x401, 0x2, 0x3e, 0x1, 0x38, 0x38, 0x256, 0x80000001, 0x7f, 0x20, 0x2, 0x6, 0x5, 0x7}, [{0x6, 0x8, 0x4, 0x2f2, 0x6, 0x9, 0xfffffff9, 0xfe4}], "7eaee66fd1d95f9812d860e87752ffd41386ff7f2db5430a7a8bcfe9dde4273d3f5419fa58f481d9d196957237551d4f49def2b2fa037af87bdb0a62d4c650e761f321e1ce21ef3890969c5a8d932c40de38e91702807a95e3f86ee7a50cc42ddebb28a2bd81d37468f250479672c86c261f7be38c36a55fcba98b1ef9764d5a32a0fc7b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6dc) (async) r1 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000000)='attr/prev\x00') [ 1705.625442][ T3073] FAULT_INJECTION: forcing a failure. [ 1705.625442][ T3073] name failslab, interval 1, probability 0, space 0, times 0 [ 1705.649821][ T3073] CPU: 1 PID: 3073 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1705.659811][ T3073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1705.669708][ T3073] Call Trace: [ 1705.672828][ T3073] 10:14:59 executing program 3: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x11, 0x2a, &(0x7f0000000000)="2d2d4821daed6cd245af0abc81fbb348c2db1cb13005bb56de15b3a6c5b04c42f7b74088c689014a0dc2"}) bpf$PROG_LOAD(0x9, 0x0, 0x35caa2f05f1f89ed) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000}, 0x20) [ 1705.675606][ T3073] dump_stack_lvl+0x151/0x1b7 [ 1705.680125][ T3073] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1705.685418][ T3073] dump_stack+0x15/0x17 [ 1705.689407][ T3073] should_fail+0x3c0/0x510 [ 1705.693657][ T3073] __should_failslab+0x9f/0xe0 [ 1705.698259][ T3073] should_failslab+0x9/0x20 [ 1705.702597][ T3073] kmem_cache_alloc+0x4f/0x2f0 [ 1705.707198][ T3073] ? vm_area_dup+0x26/0x1d0 [ 1705.711538][ T3073] ? __kasan_check_read+0x11/0x20 [ 1705.716398][ T3073] vm_area_dup+0x26/0x1d0 [ 1705.720569][ T3073] dup_mmap+0x6b8/0xea0 [ 1705.724560][ T3073] ? __delayed_free_task+0x20/0x20 [ 1705.729501][ T3073] ? mm_init+0x807/0x960 [ 1705.733583][ T3073] dup_mm+0x91/0x330 [ 1705.737313][ T3073] copy_mm+0x108/0x1b0 [ 1705.741221][ T3073] copy_process+0x1295/0x3250 [ 1705.745735][ T3073] ? proc_fail_nth_write+0x213/0x290 [ 1705.750854][ T3073] ? proc_fail_nth_read+0x220/0x220 [ 1705.755885][ T3073] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1705.760830][ T3073] ? vfs_write+0x9af/0x1050 [ 1705.765171][ T3073] ? vmacache_update+0xb7/0x120 [ 1705.769861][ T3073] kernel_clone+0x22d/0x990 [ 1705.774197][ T3073] ? file_end_write+0x1b0/0x1b0 [ 1705.778884][ T3073] ? __kasan_check_write+0x14/0x20 [ 1705.783839][ T3073] ? create_io_thread+0x1e0/0x1e0 [ 1705.788690][ T3073] ? __mutex_lock_slowpath+0x10/0x10 [ 1705.793813][ T3073] __x64_sys_clone+0x289/0x310 [ 1705.798411][ T3073] ? __do_sys_vfork+0x130/0x130 [ 1705.803098][ T3073] ? debug_smp_processor_id+0x17/0x20 [ 1705.808304][ T3073] do_syscall_64+0x44/0xd0 [ 1705.812557][ T3073] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1705.818285][ T3073] RIP: 0033:0x7f03091130d9 [ 1705.822540][ T3073] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1705.841982][ T3073] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1705.850225][ T3073] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1705.858036][ T3073] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1705.865853][ T3073] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 10:14:59 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) 10:14:59 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xc5, 0x4, 0x6, 0x8, 0x401, 0x2, 0x3e, 0x1, 0x38, 0x38, 0x256, 0x80000001, 0x7f, 0x20, 0x2, 0x6, 0x5, 0x7}, [{0x6, 0x8, 0x4, 0x2f2, 0x6, 0x9, 0xfffffff9, 0xfe4}], "7eaee66fd1d95f9812d860e87752ffd41386ff7f2db5430a7a8bcfe9dde4273d3f5419fa58f481d9d196957237551d4f49def2b2fa037af87bdb0a62d4c650e761f321e1ce21ef3890969c5a8d932c40de38e91702807a95e3f86ee7a50cc42ddebb28a2bd81d37468f250479672c86c261f7be38c36a55fcba98b1ef9764d5a32a0fc7b", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6dc) (async) r1 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000000)='attr/prev\x00') 10:14:59 executing program 3: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x11, 0x2a, &(0x7f0000000000)="2d2d4821daed6cd245af0abc81fbb348c2db1cb13005bb56de15b3a6c5b04c42f7b74088c689014a0dc2"}) bpf$PROG_LOAD(0x9, 0x0, 0x35caa2f05f1f89ed) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000}, 0x20) 10:14:59 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = dup3(r0, r0, 0x80000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)="1bfc55a37f496d193c47dc65a62d49f8df9bb26c3e8cb1139368e0983f28656ce6e97b11f331002dd72d8e47bc66f3c86dcae8d504d9076de2c6d2741fb8865928498f3cc152643a27982f53f9e7348333078d396865fe7b86cfa26b0b1d2cfd48acc46b05ba84218611de8ea63c0f7fcb3cfd78f8a6afd390ca941f5204846564479abdc6568600edb88d01be37da7fe8cabbd5c88b66843b532f0e671488bf699212c270c28761d16fb553691fa3a92e", &(0x7f00000000c0)=@buf="9d93fbe00a4f9e43d798c5a895e63b083e30ce2b3286689ed7673ec26091066599199418aeb803c7f11613b82e334e281d0aa9ef9c049061975f8d2b09de6cb0621e3610e892eadb0869fe7cb929154af4cdacbd6ee6bc5ab9450d431a7be9ac91a17df8b3a7f12403ed47738636fca6c13cf3de8ab63e0513b5d041770bbfb0569235e102f0b9d7933e867112dc3f4637676f7e4b34dcfa6a7d1e7479e34a6dddd773b92161ba1ecd0376ea7cd141eed16f4fec71d774218ed1c66e21d2cf1c0c7777c9c9cdcba11bd41a21c8134e", 0x2}, 0x20) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x109000, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r2, 0x5761, &(0x7f0000000240)={0x6, 0x0, [{0x8000, 0x4, 0x53, [0x24, 0x10001, 0xfffffffb, 0x9, 0x1, 0x7fffffff, 0x6, 0x1000]}, {0x80000001, 0xc8, 0x5, [0x5, 0x1ff, 0xfffffff7, 0xe5, 0x7, 0xdcc, 0x53fb, 0x5]}, {0xdc, 0x7, 0x32, [0x919, 0x6, 0x6, 0x10001, 0x80000000, 0x80000001, 0x1800, 0x2]}, {0x6, 0x0, 0x9, [0x1, 0x7fff, 0x6, 0xf3, 0x9cad, 0x5, 0x97, 0x1000]}, {0x80, 0x200, 0x5, [0x3, 0x401, 0x1, 0x2, 0x2, 0x1, 0x1000, 0x9]}, {0x0, 0x80, 0x7, [0xfffffffd, 0x1, 0x80000000, 0x7d, 0x8, 0x8, 0x300000, 0xab]}]}) 10:14:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1705.873658][ T3073] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1705.881471][ T3073] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1705.889400][ T3073] [ 1705.910252][ T3095] FAULT_INJECTION: forcing a failure. [ 1705.910252][ T3095] name fail_page_alloc, interval 1, probability 0, space 0, times 0 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000}, 0x20) 10:14:59 executing program 3: ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000040)={0x11, 0x2a, &(0x7f0000000000)="2d2d4821daed6cd245af0abc81fbb348c2db1cb13005bb56de15b3a6c5b04c42f7b74088c689014a0dc2"}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1705.926497][ T3095] CPU: 1 PID: 3095 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1705.936479][ T3095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1705.946378][ T3095] Call Trace: [ 1705.949499][ T3095] [ 1705.952277][ T3095] dump_stack_lvl+0x151/0x1b7 [ 1705.956788][ T3095] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1705.962087][ T3095] dump_stack+0x15/0x17 [ 1705.966078][ T3095] should_fail+0x3c0/0x510 [ 1705.970340][ T3095] should_fail_alloc_page+0x58/0x70 [ 1705.975358][ T3095] __alloc_pages+0x1de/0x7c0 [ 1705.979808][ T3095] ? __count_vm_events+0x30/0x30 [ 1705.984560][ T3095] ? __this_cpu_preempt_check+0x13/0x20 [ 1705.989940][ T3095] ? __mod_node_page_state+0xac/0xf0 [ 1705.995070][ T3095] pte_alloc_one+0x73/0x1b0 [ 1705.999402][ T3095] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1706.004436][ T3095] __pte_alloc+0x86/0x350 [ 1706.008602][ T3095] ? free_pgtables+0x210/0x210 [ 1706.013200][ T3095] ? _raw_spin_lock+0xa3/0x1b0 [ 1706.017803][ T3095] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1706.023006][ T3095] ? __kernel_text_address+0x9a/0x110 [ 1706.028213][ T3095] copy_pte_range+0x1b1f/0x20b0 [ 1706.032899][ T3095] ? __kunmap_atomic+0x80/0x80 [ 1706.037498][ T3095] ? __kasan_slab_alloc+0xc4/0xe0 [ 1706.042357][ T3095] ? __kasan_slab_alloc+0xb2/0xe0 [ 1706.047218][ T3095] ? kmem_cache_alloc+0x189/0x2f0 [ 1706.052083][ T3095] ? vm_area_dup+0x26/0x1d0 [ 1706.056419][ T3095] ? dup_mmap+0x6b8/0xea0 [ 1706.060585][ T3095] ? dup_mm+0x91/0x330 [ 1706.064500][ T3095] ? copy_mm+0x108/0x1b0 [ 1706.068569][ T3095] ? copy_process+0x1295/0x3250 [ 1706.073262][ T3095] ? kernel_clone+0x22d/0x990 [ 1706.077767][ T3095] ? __x64_sys_clone+0x289/0x310 [ 1706.082542][ T3095] ? do_syscall_64+0x44/0xd0 [ 1706.086968][ T3095] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1706.092873][ T3095] copy_page_range+0xc1e/0x1090 [ 1706.097559][ T3095] ? pfn_valid+0x1e0/0x1e0 [ 1706.101811][ T3095] dup_mmap+0x99f/0xea0 [ 1706.105807][ T3095] ? __delayed_free_task+0x20/0x20 [ 1706.110751][ T3095] ? mm_init+0x807/0x960 [ 1706.114830][ T3095] dup_mm+0x91/0x330 [ 1706.118562][ T3095] copy_mm+0x108/0x1b0 [ 1706.122466][ T3095] copy_process+0x1295/0x3250 [ 1706.126983][ T3095] ? proc_fail_nth_write+0x213/0x290 [ 1706.132100][ T3095] ? proc_fail_nth_read+0x220/0x220 [ 1706.137138][ T3095] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1706.142083][ T3095] ? vfs_write+0x9af/0x1050 [ 1706.146421][ T3095] ? vmacache_update+0xb7/0x120 [ 1706.151108][ T3095] kernel_clone+0x22d/0x990 [ 1706.155447][ T3095] ? file_end_write+0x1b0/0x1b0 [ 1706.160133][ T3095] ? __kasan_check_write+0x14/0x20 [ 1706.165080][ T3095] ? create_io_thread+0x1e0/0x1e0 [ 1706.169946][ T3095] ? __mutex_lock_slowpath+0x10/0x10 [ 1706.175064][ T3095] __x64_sys_clone+0x289/0x310 [ 1706.179664][ T3095] ? __do_sys_vfork+0x130/0x130 [ 1706.184350][ T3095] ? debug_smp_processor_id+0x17/0x20 [ 1706.189556][ T3095] do_syscall_64+0x44/0xd0 [ 1706.193807][ T3095] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1706.199535][ T3095] RIP: 0033:0x7f03091130d9 [ 1706.203793][ T3095] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:14:59 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:14:59 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0x2) r1 = dup3(r0, r0, 0x80000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000000)="1bfc55a37f496d193c47dc65a62d49f8df9bb26c3e8cb1139368e0983f28656ce6e97b11f331002dd72d8e47bc66f3c86dcae8d504d9076de2c6d2741fb8865928498f3cc152643a27982f53f9e7348333078d396865fe7b86cfa26b0b1d2cfd48acc46b05ba84218611de8ea63c0f7fcb3cfd78f8a6afd390ca941f5204846564479abdc6568600edb88d01be37da7fe8cabbd5c88b66843b532f0e671488bf699212c270c28761d16fb553691fa3a92e", &(0x7f00000000c0)=@buf="9d93fbe00a4f9e43d798c5a895e63b083e30ce2b3286689ed7673ec26091066599199418aeb803c7f11613b82e334e281d0aa9ef9c049061975f8d2b09de6cb0621e3610e892eadb0869fe7cb929154af4cdacbd6ee6bc5ab9450d431a7be9ac91a17df8b3a7f12403ed47738636fca6c13cf3de8ab63e0513b5d041770bbfb0569235e102f0b9d7933e867112dc3f4637676f7e4b34dcfa6a7d1e7479e34a6dddd773b92161ba1ecd0376ea7cd141eed16f4fec71d774218ed1c66e21d2cf1c0c7777c9c9cdcba11bd41a21c8134e", 0x2}, 0x20) (async) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000200), 0x109000, 0x0) ioctl$IOC_WATCH_QUEUE_SET_FILTER(r2, 0x5761, &(0x7f0000000240)={0x6, 0x0, [{0x8000, 0x4, 0x53, [0x24, 0x10001, 0xfffffffb, 0x9, 0x1, 0x7fffffff, 0x6, 0x1000]}, {0x80000001, 0xc8, 0x5, [0x5, 0x1ff, 0xfffffff7, 0xe5, 0x7, 0xdcc, 0x53fb, 0x5]}, {0xdc, 0x7, 0x32, [0x919, 0x6, 0x6, 0x10001, 0x80000000, 0x80000001, 0x1800, 0x2]}, {0x6, 0x0, 0x9, [0x1, 0x7fff, 0x6, 0xf3, 0x9cad, 0x5, 0x97, 0x1000]}, {0x80, 0x200, 0x5, [0x3, 0x401, 0x1, 0x2, 0x2, 0x1, 0x1000, 0x9]}, {0x0, 0x80, 0x7, [0xfffffffd, 0x1, 0x80000000, 0x7d, 0x8, 0x8, 0x300000, 0xab]}]}) 10:14:59 executing program 4: ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/42) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x101000, 0x4) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x4, 0x4, 0x1, "496a070c57bbfdc1169b4d3b48cf74d5a6d994960bf22abf189936affe0fb361f6a2438a949ace7456a9263caa2037baf20867ae0d187cee2626ce6518dd8ee0db3d2a0ee6d6fc9161b284ce03545f3330491e4d32e695c270266b24c920d785531d3caea68385bad808709dfadba9b2890ea0489bcf160ba02265e0863067a7317b0b7c1dee0f00b379e55cec593c296f54d0feaab72b54b50d5f6bce1f44909c7db2c62bea0bd2d3a34b42a4fdb65b1b71de7bac9d6129bab863d89761d39ea9f24d1303df86f51b83235260729678afb772908603add28a04c417daaed94878f38e"}, 0xf3) 10:14:59 executing program 3: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='uid_map\x00') [ 1706.223230][ T3095] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1706.231476][ T3095] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1706.239287][ T3095] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1706.247101][ T3095] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1706.254910][ T3095] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1706.262723][ T3095] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1706.270540][ T3095] 10:14:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:14:59 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) 10:14:59 executing program 4: ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/42) (async) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x101000, 0x4) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x4, 0x4, 0x1, "496a070c57bbfdc1169b4d3b48cf74d5a6d994960bf22abf189936affe0fb361f6a2438a949ace7456a9263caa2037baf20867ae0d187cee2626ce6518dd8ee0db3d2a0ee6d6fc9161b284ce03545f3330491e4d32e695c270266b24c920d785531d3caea68385bad808709dfadba9b2890ea0489bcf160ba02265e0863067a7317b0b7c1dee0f00b379e55cec593c296f54d0feaab72b54b50d5f6bce1f44909c7db2c62bea0bd2d3a34b42a4fdb65b1b71de7bac9d6129bab863d89761d39ea9f24d1303df86f51b83235260729678afb772908603add28a04c417daaed94878f38e"}, 0xf3) [ 1706.287661][ T3126] FAULT_INJECTION: forcing a failure. [ 1706.287661][ T3126] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1706.305449][ T3126] CPU: 1 PID: 3126 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1706.315435][ T3126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1706.325327][ T3126] Call Trace: [ 1706.328451][ T3126] [ 1706.331228][ T3126] dump_stack_lvl+0x151/0x1b7 10:14:59 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) 10:14:59 executing program 4: ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/42) (async) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x101000, 0x4) write$nbd(r0, &(0x7f0000000040)={0x67446698, 0x0, 0x4, 0x4, 0x1, "496a070c57bbfdc1169b4d3b48cf74d5a6d994960bf22abf189936affe0fb361f6a2438a949ace7456a9263caa2037baf20867ae0d187cee2626ce6518dd8ee0db3d2a0ee6d6fc9161b284ce03545f3330491e4d32e695c270266b24c920d785531d3caea68385bad808709dfadba9b2890ea0489bcf160ba02265e0863067a7317b0b7c1dee0f00b379e55cec593c296f54d0feaab72b54b50d5f6bce1f44909c7db2c62bea0bd2d3a34b42a4fdb65b1b71de7bac9d6129bab863d89761d39ea9f24d1303df86f51b83235260729678afb772908603add28a04c417daaed94878f38e"}, 0xf3) 10:14:59 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) syz_io_uring_setup(0x20de, &(0x7f0000000700)={0x0, 0x0, 0x20, 0x0, 0x23f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000200)=""/4096) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 1706.335743][ T3126] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1706.341038][ T3126] dump_stack+0x15/0x17 [ 1706.345029][ T3126] should_fail+0x3c0/0x510 [ 1706.349284][ T3126] should_fail_alloc_page+0x58/0x70 [ 1706.354325][ T3126] __alloc_pages+0x1de/0x7c0 [ 1706.358741][ T3126] ? __count_vm_events+0x30/0x30 [ 1706.363513][ T3126] ? __this_cpu_preempt_check+0x13/0x20 [ 1706.368899][ T3126] ? __mod_node_page_state+0xac/0xf0 [ 1706.374019][ T3126] pte_alloc_one+0x73/0x1b0 [ 1706.378359][ T3126] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1706.383394][ T3126] __pte_alloc+0x86/0x350 [ 1706.387555][ T3126] ? free_pgtables+0x210/0x210 [ 1706.392157][ T3126] ? _raw_spin_lock+0xa3/0x1b0 [ 1706.396756][ T3126] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1706.401963][ T3126] ? __kernel_text_address+0x9a/0x110 [ 1706.407179][ T3126] copy_pte_range+0x1b1f/0x20b0 [ 1706.411863][ T3126] ? __kunmap_atomic+0x80/0x80 [ 1706.416470][ T3126] ? __kasan_slab_alloc+0xc4/0xe0 [ 1706.421316][ T3126] ? __kasan_slab_alloc+0xb2/0xe0 [ 1706.426178][ T3126] ? kmem_cache_alloc+0x189/0x2f0 [ 1706.431040][ T3126] ? vm_area_dup+0x26/0x1d0 [ 1706.435378][ T3126] ? dup_mmap+0x6b8/0xea0 [ 1706.439543][ T3126] ? dup_mm+0x91/0x330 [ 1706.443450][ T3126] ? copy_mm+0x108/0x1b0 [ 1706.447527][ T3126] ? copy_process+0x1295/0x3250 [ 1706.452219][ T3126] ? kernel_clone+0x22d/0x990 [ 1706.456726][ T3126] ? __x64_sys_clone+0x289/0x310 [ 1706.461495][ T3126] ? do_syscall_64+0x44/0xd0 [ 1706.465923][ T3126] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1706.471830][ T3126] copy_page_range+0xc1e/0x1090 [ 1706.476516][ T3126] ? pfn_valid+0x1e0/0x1e0 [ 1706.480771][ T3126] dup_mmap+0x99f/0xea0 [ 1706.484764][ T3126] ? __delayed_free_task+0x20/0x20 [ 1706.489707][ T3126] ? mm_init+0x807/0x960 [ 1706.493794][ T3126] dup_mm+0x91/0x330 [ 1706.497514][ T3126] copy_mm+0x108/0x1b0 [ 1706.501425][ T3126] copy_process+0x1295/0x3250 [ 1706.505933][ T3126] ? proc_fail_nth_write+0x213/0x290 [ 1706.511054][ T3126] ? proc_fail_nth_read+0x220/0x220 [ 1706.516096][ T3126] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1706.521037][ T3126] ? vfs_write+0x9af/0x1050 [ 1706.525374][ T3126] ? vmacache_update+0xb7/0x120 [ 1706.530063][ T3126] kernel_clone+0x22d/0x990 [ 1706.534402][ T3126] ? file_end_write+0x1b0/0x1b0 [ 1706.539088][ T3126] ? __kasan_check_write+0x14/0x20 [ 1706.544034][ T3126] ? create_io_thread+0x1e0/0x1e0 [ 1706.548901][ T3126] ? __mutex_lock_slowpath+0x10/0x10 [ 1706.554016][ T3126] __x64_sys_clone+0x289/0x310 [ 1706.558615][ T3126] ? __do_sys_vfork+0x130/0x130 [ 1706.563306][ T3126] ? debug_smp_processor_id+0x17/0x20 [ 1706.568513][ T3126] do_syscall_64+0x44/0xd0 [ 1706.572764][ T3126] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1706.578490][ T3126] RIP: 0033:0x7f03091130d9 [ 1706.582746][ T3126] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1706.602184][ T3126] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1706.610429][ T3126] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1706.618239][ T3126] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1706.626051][ T3126] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 10:15:00 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:00 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) syz_io_uring_setup(0x20de, &(0x7f0000000700)={0x0, 0x0, 0x20, 0x0, 0x23f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000200)=""/4096) (async) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:15:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$rfkill(r0, &(0x7f0000000040)={0x4, 0x2, 0x2, 0x1}, 0x8) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:15:00 executing program 3: syz_open_procfs(0xffffffffffffffff, 0x0) 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1706.633862][ T3126] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1706.641678][ T3126] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1706.649489][ T3126] [ 1706.665307][ T3157] FAULT_INJECTION: forcing a failure. [ 1706.665307][ T3157] name failslab, interval 1, probability 0, space 0, times 0 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:15:00 executing program 3: syz_clone(0x104000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1706.681514][ T3157] CPU: 1 PID: 3157 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1706.691495][ T3157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1706.701408][ T3157] Call Trace: [ 1706.704518][ T3157] [ 1706.707289][ T3157] dump_stack_lvl+0x151/0x1b7 [ 1706.711804][ T3157] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1706.717101][ T3157] dump_stack+0x15/0x17 [ 1706.721089][ T3157] should_fail+0x3c0/0x510 [ 1706.725343][ T3157] __should_failslab+0x9f/0xe0 [ 1706.730031][ T3157] should_failslab+0x9/0x20 [ 1706.734370][ T3157] kmem_cache_alloc+0x4f/0x2f0 10:15:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$rfkill(r0, &(0x7f0000000040)={0x4, 0x2, 0x2, 0x1}, 0x8) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) [ 1706.738972][ T3157] ? vm_area_dup+0x26/0x1d0 [ 1706.743316][ T3157] vm_area_dup+0x26/0x1d0 [ 1706.747472][ T3157] dup_mmap+0x6b8/0xea0 [ 1706.751468][ T3157] ? __delayed_free_task+0x20/0x20 [ 1706.756417][ T3157] ? mm_init+0x807/0x960 [ 1706.760493][ T3157] dup_mm+0x91/0x330 [ 1706.764225][ T3157] copy_mm+0x108/0x1b0 [ 1706.768134][ T3157] copy_process+0x1295/0x3250 [ 1706.772643][ T3157] ? proc_fail_nth_write+0x213/0x290 [ 1706.777761][ T3157] ? proc_fail_nth_read+0x220/0x220 [ 1706.782798][ T3157] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1706.787745][ T3157] ? vfs_write+0x9af/0x1050 [ 1706.792084][ T3157] ? vmacache_update+0xb7/0x120 [ 1706.796771][ T3157] kernel_clone+0x22d/0x990 [ 1706.801111][ T3157] ? file_end_write+0x1b0/0x1b0 [ 1706.805881][ T3157] ? __kasan_check_write+0x14/0x20 [ 1706.810825][ T3157] ? create_io_thread+0x1e0/0x1e0 [ 1706.815688][ T3157] ? __mutex_lock_slowpath+0x10/0x10 [ 1706.820806][ T3157] __x64_sys_clone+0x289/0x310 [ 1706.825408][ T3157] ? __do_sys_vfork+0x130/0x130 [ 1706.830094][ T3157] ? debug_smp_processor_id+0x17/0x20 [ 1706.835308][ T3157] do_syscall_64+0x44/0xd0 [ 1706.839554][ T3157] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1706.845282][ T3157] RIP: 0033:0x7f03091130d9 [ 1706.849534][ T3157] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1706.868989][ T3157] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1706.877222][ T3157] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 10:15:00 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:00 executing program 2: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) write$rfkill(r0, &(0x7f0000000040)={0x4, 0x2, 0x2, 0x1}, 0x8) bpf$PROG_LOAD(0x9, 0x0, 0x2) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) write$rfkill(r0, &(0x7f0000000040)={0x4, 0x2, 0x2, 0x1}, 0x8) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) 10:15:00 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async, rerun: 32) syz_io_uring_setup(0x20de, &(0x7f0000000700)={0x0, 0x0, 0x20, 0x0, 0x23f}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async, rerun: 32) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000200)=""/4096) (async) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:15:00 executing program 3: syz_clone(0x104000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) [ 1706.885032][ T3157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1706.892847][ T3157] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1706.900653][ T3157] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1706.908464][ T3157] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1706.916278][ T3157] 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:00 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x7800, 0x7800, 0x1, 0x2, {{0x24, 0x4, 0x3, 0x8, 0x90, 0x65, 0x0, 0x80, 0x29, 0x0, @private=0xa010100, @rand_addr=0x64010100, {[@cipso={0x86, 0x2a, 0x1, [{0x1, 0x12, "9511e71d701a5553c149e3508e6d07d7"}, {0x6, 0x12, "c1ba5141d696505383079e8881ac183f"}]}, @rr={0x7, 0xb, 0xd1, [@rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x24}]}, @noop, @lsrr={0x83, 0x1b, 0x7c, [@local, @local, @local, @remote, @multicast1, @broadcast]}, @timestamp_prespec={0x44, 0x1c, 0x9, 0x3, 0x1, [{@remote, 0x1}, {@remote, 0xe000}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x1}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0xc0, 0x0, 0xf, [0x756d]}]}}}}}) 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1706.952506][ T3199] FAULT_INJECTION: forcing a failure. [ 1706.952506][ T3199] name failslab, interval 1, probability 0, space 0, times 0 [ 1706.974718][ T3199] CPU: 1 PID: 3199 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1706.984707][ T3199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1706.994603][ T3199] Call Trace: [ 1706.997726][ T3199] [ 1707.000508][ T3199] dump_stack_lvl+0x151/0x1b7 [ 1707.005020][ T3199] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1707.010323][ T3199] dump_stack+0x15/0x17 [ 1707.014313][ T3199] should_fail+0x3c0/0x510 [ 1707.018560][ T3199] __should_failslab+0x9f/0xe0 [ 1707.023167][ T3199] should_failslab+0x9/0x20 [ 1707.027495][ T3199] kmem_cache_alloc+0x4f/0x2f0 [ 1707.032102][ T3199] ? anon_vma_clone+0xa1/0x4f0 [ 1707.036705][ T3199] anon_vma_clone+0xa1/0x4f0 [ 1707.041135][ T3199] anon_vma_fork+0x91/0x4f0 [ 1707.045463][ T3199] ? anon_vma_name+0x43/0x70 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1707.049898][ T3199] dup_mmap+0x750/0xea0 [ 1707.053880][ T3199] ? __delayed_free_task+0x20/0x20 [ 1707.058830][ T3199] ? mm_init+0x807/0x960 [ 1707.062908][ T3199] dup_mm+0x91/0x330 [ 1707.066641][ T3199] copy_mm+0x108/0x1b0 [ 1707.070549][ T3199] copy_process+0x1295/0x3250 [ 1707.075061][ T3199] ? proc_fail_nth_write+0x213/0x290 [ 1707.080180][ T3199] ? proc_fail_nth_read+0x220/0x220 [ 1707.085217][ T3199] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1707.090158][ T3199] ? vfs_write+0x9af/0x1050 [ 1707.094497][ T3199] ? vmacache_update+0xb7/0x120 [ 1707.099192][ T3199] kernel_clone+0x22d/0x990 [ 1707.103525][ T3199] ? file_end_write+0x1b0/0x1b0 [ 1707.108214][ T3199] ? __kasan_check_write+0x14/0x20 [ 1707.113167][ T3199] ? create_io_thread+0x1e0/0x1e0 [ 1707.118106][ T3199] ? __mutex_lock_slowpath+0x10/0x10 [ 1707.123230][ T3199] __x64_sys_clone+0x289/0x310 [ 1707.127824][ T3199] ? __do_sys_vfork+0x130/0x130 [ 1707.132509][ T3199] ? debug_smp_processor_id+0x17/0x20 [ 1707.137719][ T3199] do_syscall_64+0x44/0xd0 [ 1707.141970][ T3199] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1707.147700][ T3199] RIP: 0033:0x7f03091130d9 [ 1707.151949][ T3199] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1707.171392][ T3199] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1707.179636][ T3199] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1707.187454][ T3199] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1707.195259][ T3199] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 10:15:00 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:00 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x7800, 0x7800, 0x1, 0x2, {{0x24, 0x4, 0x3, 0x8, 0x90, 0x65, 0x0, 0x80, 0x29, 0x0, @private=0xa010100, @rand_addr=0x64010100, {[@cipso={0x86, 0x2a, 0x1, [{0x1, 0x12, "9511e71d701a5553c149e3508e6d07d7"}, {0x6, 0x12, "c1ba5141d696505383079e8881ac183f"}]}, @rr={0x7, 0xb, 0xd1, [@rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x24}]}, @noop, @lsrr={0x83, 0x1b, 0x7c, [@local, @local, @local, @remote, @multicast1, @broadcast]}, @timestamp_prespec={0x44, 0x1c, 0x9, 0x3, 0x1, [{@remote, 0x1}, {@remote, 0xe000}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x1}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0xc0, 0x0, 0xf, [0x756d]}]}}}}}) 10:15:00 executing program 3: syz_clone(0x104000, 0x0, 0x0, 0x0, 0x0, 0x0) 10:15:00 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/ip6_tables_matches\x00') 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:00 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x7800, 0x7800, 0x1, 0x2, {{0x24, 0x4, 0x3, 0x8, 0x90, 0x65, 0x0, 0x80, 0x29, 0x0, @private=0xa010100, @rand_addr=0x64010100, {[@cipso={0x86, 0x2a, 0x1, [{0x1, 0x12, "9511e71d701a5553c149e3508e6d07d7"}, {0x6, 0x12, "c1ba5141d696505383079e8881ac183f"}]}, @rr={0x7, 0xb, 0xd1, [@rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x24}]}, @noop, @lsrr={0x83, 0x1b, 0x7c, [@local, @local, @local, @remote, @multicast1, @broadcast]}, @timestamp_prespec={0x44, 0x1c, 0x9, 0x3, 0x1, [{@remote, 0x1}, {@remote, 0xe000}, {@dev={0xac, 0x14, 0x14, 0x3d}, 0x1}]}, @ra={0x94, 0x4}, @timestamp={0x44, 0x8, 0xc0, 0x0, 0xf, [0x756d]}]}}}}}) (rerun: 64) [ 1707.203069][ T3199] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1707.210969][ T3199] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1707.218787][ T3199] 10:15:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) [ 1707.270170][ T3246] FAULT_INJECTION: forcing a failure. [ 1707.270170][ T3246] name failslab, interval 1, probability 0, space 0, times 0 [ 1707.283385][ T3246] CPU: 0 PID: 3246 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1707.293366][ T3246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1707.303267][ T3246] Call Trace: [ 1707.306387][ T3246] [ 1707.309163][ T3246] dump_stack_lvl+0x151/0x1b7 [ 1707.313677][ T3246] ? bfq_pos_tree_add_move+0x43e/0x43e 10:15:00 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xff2f) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000000)=""/144) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'gre0\x00', 0x0, 0xf, 0x20, 0x7, 0x9, {{0xf, 0x4, 0x0, 0x2c, 0x3c, 0x69, 0x6, 0xd2, 0x4, 0x0, @empty, @broadcast, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x23, 0xd3, [@remote, @local, @multicast1, @local, @remote, @private=0xa010102, @loopback, @private=0xa010102]}]}}}}}) [ 1707.318979][ T3246] dump_stack+0x15/0x17 [ 1707.322961][ T3246] should_fail+0x3c0/0x510 [ 1707.327216][ T3246] __should_failslab+0x9f/0xe0 [ 1707.331816][ T3246] should_failslab+0x9/0x20 [ 1707.336161][ T3246] kmem_cache_alloc+0x4f/0x2f0 [ 1707.340759][ T3246] ? vm_area_dup+0x26/0x1d0 [ 1707.345095][ T3246] vm_area_dup+0x26/0x1d0 [ 1707.349263][ T3246] dup_mmap+0x6b8/0xea0 [ 1707.353254][ T3246] ? __delayed_free_task+0x20/0x20 [ 1707.358195][ T3246] ? mm_init+0x807/0x960 [ 1707.362282][ T3246] dup_mm+0x91/0x330 [ 1707.366009][ T3246] copy_mm+0x108/0x1b0 [ 1707.369913][ T3246] copy_process+0x1295/0x3250 [ 1707.374426][ T3246] ? proc_fail_nth_write+0x213/0x290 [ 1707.379547][ T3246] ? proc_fail_nth_read+0x220/0x220 [ 1707.384580][ T3246] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1707.389536][ T3246] ? vfs_write+0x9af/0x1050 [ 1707.393868][ T3246] ? vmacache_update+0xb7/0x120 [ 1707.398555][ T3246] kernel_clone+0x22d/0x990 [ 1707.402896][ T3246] ? file_end_write+0x1b0/0x1b0 [ 1707.407586][ T3246] ? __kasan_check_write+0x14/0x20 [ 1707.412534][ T3246] ? create_io_thread+0x1e0/0x1e0 [ 1707.417393][ T3246] ? __mutex_lock_slowpath+0x10/0x10 [ 1707.422513][ T3246] __x64_sys_clone+0x289/0x310 [ 1707.427115][ T3246] ? __do_sys_vfork+0x130/0x130 [ 1707.431797][ T3246] ? debug_smp_processor_id+0x17/0x20 [ 1707.437004][ T3246] do_syscall_64+0x44/0xd0 [ 1707.441259][ T3246] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1707.446982][ T3246] RIP: 0033:0x7f03091130d9 [ 1707.451237][ T3246] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:15:01 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) 10:15:01 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/ip6_tables_matches\x00') 10:15:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:15:01 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xff2f) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000000)=""/144) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'gre0\x00', 0x0, 0xf, 0x20, 0x7, 0x9, {{0xf, 0x4, 0x0, 0x2c, 0x3c, 0x69, 0x6, 0xd2, 0x4, 0x0, @empty, @broadcast, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x23, 0xd3, [@remote, @local, @multicast1, @local, @remote, @private=0xa010102, @loopback, @private=0xa010102]}]}}}}}) bpf$PROG_LOAD(0x9, 0x0, 0xff2f) (async) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000000)=""/144) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'gre0\x00', 0x0, 0xf, 0x20, 0x7, 0x9, {{0xf, 0x4, 0x0, 0x2c, 0x3c, 0x69, 0x6, 0xd2, 0x4, 0x0, @empty, @broadcast, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x23, 0xd3, [@remote, @local, @multicast1, @local, @remote, @private=0xa010102, @loopback, @private=0xa010102]}]}}}}}) (async) 10:15:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:01 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1707.470687][ T3246] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1707.478928][ T3246] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1707.486732][ T3246] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1707.494546][ T3246] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.502355][ T3246] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1707.510165][ T3246] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1707.517981][ T3246] 10:15:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:15:01 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='net/ip6_tables_matches\x00') 10:15:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1707.534358][ T3256] FAULT_INJECTION: forcing a failure. [ 1707.534358][ T3256] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1707.548789][ T3256] CPU: 0 PID: 3256 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1707.558764][ T3256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1707.568668][ T3256] Call Trace: [ 1707.571793][ T3256] [ 1707.574561][ T3256] dump_stack_lvl+0x151/0x1b7 [ 1707.579075][ T3256] ? bfq_pos_tree_add_move+0x43e/0x43e 10:15:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:15:01 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) r2 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r2}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:01 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) (async, rerun: 64) r2 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") (rerun: 64) capset(&(0x7f0000000140)={0x20080522, r2}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) [ 1707.584373][ T3256] dump_stack+0x15/0x17 [ 1707.588367][ T3256] should_fail+0x3c0/0x510 [ 1707.592618][ T3256] should_fail_alloc_page+0x58/0x70 [ 1707.597655][ T3256] __alloc_pages+0x1de/0x7c0 [ 1707.602200][ T3256] ? __count_vm_events+0x30/0x30 [ 1707.606970][ T3256] ? __this_cpu_preempt_check+0x13/0x20 [ 1707.612348][ T3256] ? __mod_node_page_state+0xac/0xf0 [ 1707.617471][ T3256] pte_alloc_one+0x73/0x1b0 [ 1707.621810][ T3256] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1707.626846][ T3256] __pte_alloc+0x86/0x350 [ 1707.631009][ T3256] ? free_pgtables+0x210/0x210 [ 1707.635610][ T3256] ? _raw_spin_lock+0xa3/0x1b0 [ 1707.640211][ T3256] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1707.645418][ T3256] ? __kernel_text_address+0x9a/0x110 [ 1707.650627][ T3256] copy_pte_range+0x1b1f/0x20b0 [ 1707.655339][ T3256] ? __kunmap_atomic+0x80/0x80 [ 1707.659909][ T3256] ? __kasan_slab_alloc+0xc4/0xe0 [ 1707.664775][ T3256] ? __kasan_slab_alloc+0xb2/0xe0 [ 1707.669632][ T3256] ? kmem_cache_alloc+0x189/0x2f0 [ 1707.674490][ T3256] ? vm_area_dup+0x26/0x1d0 [ 1707.678920][ T3256] ? dup_mmap+0x6b8/0xea0 [ 1707.683082][ T3256] ? dup_mm+0x91/0x330 [ 1707.686993][ T3256] ? copy_mm+0x108/0x1b0 [ 1707.691065][ T3256] ? copy_process+0x1295/0x3250 [ 1707.695752][ T3256] ? kernel_clone+0x22d/0x990 [ 1707.700269][ T3256] ? __x64_sys_clone+0x289/0x310 [ 1707.705042][ T3256] ? do_syscall_64+0x44/0xd0 [ 1707.709473][ T3256] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1707.715373][ T3256] copy_page_range+0xc1e/0x1090 [ 1707.720060][ T3256] ? pfn_valid+0x1e0/0x1e0 [ 1707.724577][ T3256] dup_mmap+0x99f/0xea0 [ 1707.728563][ T3256] ? __delayed_free_task+0x20/0x20 [ 1707.733509][ T3256] ? mm_init+0x807/0x960 [ 1707.737587][ T3256] dup_mm+0x91/0x330 [ 1707.741315][ T3256] copy_mm+0x108/0x1b0 [ 1707.745223][ T3256] copy_process+0x1295/0x3250 [ 1707.749743][ T3256] ? proc_fail_nth_write+0x213/0x290 [ 1707.754854][ T3256] ? proc_fail_nth_read+0x220/0x220 [ 1707.759915][ T3256] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1707.764834][ T3256] ? vfs_write+0x9af/0x1050 [ 1707.769178][ T3256] ? vmacache_update+0xb7/0x120 [ 1707.773864][ T3256] kernel_clone+0x22d/0x990 [ 1707.778204][ T3256] ? file_end_write+0x1b0/0x1b0 [ 1707.782888][ T3256] ? __kasan_check_write+0x14/0x20 [ 1707.788011][ T3256] ? create_io_thread+0x1e0/0x1e0 [ 1707.792870][ T3256] ? __mutex_lock_slowpath+0x10/0x10 [ 1707.797990][ T3256] __x64_sys_clone+0x289/0x310 [ 1707.802591][ T3256] ? __do_sys_vfork+0x130/0x130 [ 1707.807276][ T3256] ? debug_smp_processor_id+0x17/0x20 [ 1707.812483][ T3256] do_syscall_64+0x44/0xd0 [ 1707.816744][ T3256] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1707.822467][ T3256] RIP: 0033:0x7f03091130d9 [ 1707.826718][ T3256] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1707.846157][ T3256] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1707.854402][ T3256] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1707.862213][ T3256] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1707.870026][ T3256] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1707.877835][ T3256] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 10:15:01 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) 10:15:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:15:01 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0xff2f) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000000)=""/144) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'gre0\x00', 0x0, 0xf, 0x20, 0x7, 0x9, {{0xf, 0x4, 0x0, 0x2c, 0x3c, 0x69, 0x6, 0xd2, 0x4, 0x0, @empty, @broadcast, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x23, 0xd3, [@remote, @local, @multicast1, @local, @remote, @private=0xa010102, @loopback, @private=0xa010102]}]}}}}}) bpf$PROG_LOAD(0x9, 0x0, 0xff2f) (async) ioctl$EVIOCGABS20(0xffffffffffffffff, 0x80184560, &(0x7f0000000000)=""/144) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'gre0\x00', 0x0, 0xf, 0x20, 0x7, 0x9, {{0xf, 0x4, 0x0, 0x2c, 0x3c, 0x69, 0x6, 0xd2, 0x4, 0x0, @empty, @broadcast, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0x23, 0xd3, [@remote, @local, @multicast1, @local, @remote, @private=0xa010102, @loopback, @private=0xa010102]}]}}}}}) (async) 10:15:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x100000, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:15:01 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:15:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:01 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) [ 1707.885647][ T3256] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1707.893461][ T3256] 10:15:01 executing program 0: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) r2 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r2}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:01 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:15:01 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) (async) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) [ 1708.245124][ T3342] FAULT_INJECTION: forcing a failure. [ 1708.245124][ T3342] name failslab, interval 1, probability 0, space 0, times 0 [ 1708.273779][ T3342] CPU: 0 PID: 3342 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1708.283769][ T3342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1708.293675][ T3342] Call Trace: [ 1708.296785][ T3342] [ 1708.299564][ T3342] dump_stack_lvl+0x151/0x1b7 [ 1708.304080][ T3342] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1708.309373][ T3342] dump_stack+0x15/0x17 [ 1708.313364][ T3342] should_fail+0x3c0/0x510 [ 1708.317617][ T3342] __should_failslab+0x9f/0xe0 [ 1708.322215][ T3342] should_failslab+0x9/0x20 [ 1708.326558][ T3342] kmem_cache_alloc+0x4f/0x2f0 [ 1708.331162][ T3342] ? anon_vma_fork+0x1b9/0x4f0 [ 1708.335754][ T3342] anon_vma_fork+0x1b9/0x4f0 [ 1708.340195][ T3342] dup_mmap+0x750/0xea0 [ 1708.344179][ T3342] ? __delayed_free_task+0x20/0x20 [ 1708.349127][ T3342] ? mm_init+0x807/0x960 [ 1708.353200][ T3342] dup_mm+0x91/0x330 [ 1708.356935][ T3342] copy_mm+0x108/0x1b0 [ 1708.360838][ T3342] copy_process+0x1295/0x3250 [ 1708.365352][ T3342] ? proc_fail_nth_write+0x213/0x290 [ 1708.370473][ T3342] ? proc_fail_nth_read+0x220/0x220 [ 1708.375510][ T3342] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1708.380454][ T3342] ? vfs_write+0x9af/0x1050 [ 1708.384793][ T3342] ? vmacache_update+0xb7/0x120 [ 1708.389483][ T3342] kernel_clone+0x22d/0x990 [ 1708.393818][ T3342] ? file_end_write+0x1b0/0x1b0 [ 1708.398506][ T3342] ? __kasan_check_write+0x14/0x20 [ 1708.403459][ T3342] ? create_io_thread+0x1e0/0x1e0 [ 1708.408311][ T3342] ? __mutex_lock_slowpath+0x10/0x10 [ 1708.413434][ T3342] __x64_sys_clone+0x289/0x310 [ 1708.418030][ T3342] ? __do_sys_vfork+0x130/0x130 [ 1708.422720][ T3342] ? debug_smp_processor_id+0x17/0x20 [ 1708.427924][ T3342] do_syscall_64+0x44/0xd0 [ 1708.432187][ T3342] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1708.437915][ T3342] RIP: 0033:0x7f03091130d9 [ 1708.442168][ T3342] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1708.461600][ T3342] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1708.469848][ T3342] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1708.477660][ T3342] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1708.485466][ T3342] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1708.493283][ T3342] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1708.501090][ T3342] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1708.508910][ T3342] 10:15:02 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) r2 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r2}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:02 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 10:15:02 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) (async) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40004}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@WGDEVICE_A_FLAGS={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) (async) 10:15:02 executing program 0: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) r2 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r2}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:02 executing program 3: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 10:15:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) [ 1708.682109][ T3375] FAULT_INJECTION: forcing a failure. [ 1708.682109][ T3375] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1708.725670][ T3375] CPU: 1 PID: 3375 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1708.735663][ T3375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1708.745558][ T3375] Call Trace: [ 1708.748679][ T3375] [ 1708.751458][ T3375] dump_stack_lvl+0x151/0x1b7 [ 1708.755970][ T3375] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1708.761279][ T3375] dump_stack+0x15/0x17 [ 1708.765257][ T3375] should_fail+0x3c0/0x510 [ 1708.769509][ T3375] should_fail_alloc_page+0x58/0x70 [ 1708.774546][ T3375] __alloc_pages+0x1de/0x7c0 [ 1708.778973][ T3375] ? __count_vm_events+0x30/0x30 [ 1708.783744][ T3375] ? __this_cpu_preempt_check+0x13/0x20 [ 1708.789132][ T3375] ? __mod_node_page_state+0xac/0xf0 [ 1708.794247][ T3375] ? __mod_lruvec_page_state+0x15f/0x1c0 [ 1708.799715][ T3375] pte_alloc_one+0x73/0x1b0 [ 1708.804071][ T3375] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1708.809089][ T3375] __pte_alloc+0x86/0x350 [ 1708.813253][ T3375] ? free_pgtables+0x210/0x210 [ 1708.817852][ T3375] ? _raw_spin_lock+0xa3/0x1b0 [ 1708.822460][ T3375] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1708.827663][ T3375] ? unwind_get_return_address+0x4c/0x90 [ 1708.833215][ T3375] copy_pte_range+0x1b1f/0x20b0 [ 1708.837911][ T3375] ? stack_trace_save+0x12d/0x1f0 [ 1708.842766][ T3375] ? anon_vma_clone+0xa1/0x4f0 [ 1708.847361][ T3375] ? __kunmap_atomic+0x80/0x80 [ 1708.851960][ T3375] ? dup_mmap+0x750/0xea0 [ 1708.856129][ T3375] ? copy_mm+0x108/0x1b0 [ 1708.860204][ T3375] ? copy_process+0x1295/0x3250 [ 1708.864890][ T3375] ? kernel_clone+0x22d/0x990 [ 1708.869405][ T3375] ? __x64_sys_clone+0x289/0x310 [ 1708.874176][ T3375] ? do_syscall_64+0x44/0xd0 [ 1708.878606][ T3375] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1708.884596][ T3375] copy_page_range+0xc1e/0x1090 [ 1708.889282][ T3375] ? pfn_valid+0x1e0/0x1e0 [ 1708.893536][ T3375] dup_mmap+0x99f/0xea0 [ 1708.897526][ T3375] ? __delayed_free_task+0x20/0x20 [ 1708.902560][ T3375] ? mm_init+0x807/0x960 [ 1708.906640][ T3375] dup_mm+0x91/0x330 [ 1708.910371][ T3375] copy_mm+0x108/0x1b0 [ 1708.914275][ T3375] copy_process+0x1295/0x3250 [ 1708.918792][ T3375] ? proc_fail_nth_write+0x213/0x290 [ 1708.923912][ T3375] ? proc_fail_nth_read+0x220/0x220 [ 1708.928946][ T3375] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1708.933893][ T3375] ? vfs_write+0x9af/0x1050 [ 1708.938231][ T3375] ? vmacache_update+0xb7/0x120 [ 1708.942920][ T3375] kernel_clone+0x22d/0x990 [ 1708.947255][ T3375] ? file_end_write+0x1b0/0x1b0 [ 1708.951942][ T3375] ? __kasan_check_write+0x14/0x20 [ 1708.956984][ T3375] ? create_io_thread+0x1e0/0x1e0 [ 1708.961839][ T3375] ? __mutex_lock_slowpath+0x10/0x10 [ 1708.966962][ T3375] __x64_sys_clone+0x289/0x310 [ 1708.971561][ T3375] ? __do_sys_vfork+0x130/0x130 [ 1708.976251][ T3375] ? debug_smp_processor_id+0x17/0x20 [ 1708.981511][ T3375] do_syscall_64+0x44/0xd0 [ 1708.985708][ T3375] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1708.991434][ T3375] RIP: 0033:0x7f03091130d9 [ 1708.995685][ T3375] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1709.015307][ T3375] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 10:15:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:15:02 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r1, r2, 0x7}, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x10, 0x8000, 0x3, 0x3, {{0x12, 0x4, 0x3, 0x4, 0x48, 0x68, 0x0, 0x8, 0x29, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xe8, 0x1, 0xd, [{@loopback, 0x9}, {@broadcast, 0x3}]}, @timestamp_addr={0x44, 0x1c, 0x58, 0x1, 0xc, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x80000000}, {@private=0xa010101, 0x1}, {@broadcast, 0x6}]}, @ra={0x94, 0x4, 0x1}]}}}}}) syz_open_dev$vcsu(&(0x7f0000000380), 0x5, 0x301040) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r4, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x854}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xd2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8014}, 0x11) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xc35}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4040000) 10:15:02 executing program 0: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) r2 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r2}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1709.023548][ T3375] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1709.031358][ T3375] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1709.039168][ T3375] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1709.046980][ T3375] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1709.054791][ T3375] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1709.062605][ T3375] 10:15:02 executing program 4: syz_clone(0xc7996300, 0x0, 0xfffffffffffffea1, &(0x7f0000000040), 0x0, 0x0) 10:15:02 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 10:15:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1d, 0x1000, 0x1}, 0x20) 10:15:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:02 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r1, r2, 0x7}, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x10, 0x8000, 0x3, 0x3, {{0x12, 0x4, 0x3, 0x4, 0x48, 0x68, 0x0, 0x8, 0x29, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xe8, 0x1, 0xd, [{@loopback, 0x9}, {@broadcast, 0x3}]}, @timestamp_addr={0x44, 0x1c, 0x58, 0x1, 0xc, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x80000000}, {@private=0xa010101, 0x1}, {@broadcast, 0x6}]}, @ra={0x94, 0x4, 0x1}]}}}}}) syz_open_dev$vcsu(&(0x7f0000000380), 0x5, 0x301040) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r4, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x854}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xd2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8014}, 0x11) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xc35}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4040000) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r1, r2, 0x7}, 0x10) (async) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x10, 0x8000, 0x3, 0x3, {{0x12, 0x4, 0x3, 0x4, 0x48, 0x68, 0x0, 0x8, 0x29, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xe8, 0x1, 0xd, [{@loopback, 0x9}, {@broadcast, 0x3}]}, @timestamp_addr={0x44, 0x1c, 0x58, 0x1, 0xc, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x80000000}, {@private=0xa010101, 0x1}, {@broadcast, 0x6}]}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) syz_open_dev$vcsu(&(0x7f0000000380), 0x5, 0x301040) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r4, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x854}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xd2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8014}, 0x11) (async) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xc35}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4040000) (async) 10:15:02 executing program 0: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:02 executing program 4: syz_clone(0xc7996300, 0x0, 0xfffffffffffffea1, &(0x7f0000000040), 0x0, 0x0) syz_clone(0xc7996300, 0x0, 0xfffffffffffffea1, &(0x7f0000000040), 0x0, 0x0) (async) 10:15:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:15:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xff0f0000, 0xc, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1709.325965][ T3496] FAULT_INJECTION: forcing a failure. [ 1709.325965][ T3496] name failslab, interval 1, probability 0, space 0, times 0 [ 1709.358617][ T3496] CPU: 1 PID: 3496 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1709.368608][ T3496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1709.378502][ T3496] Call Trace: [ 1709.381711][ T3496] [ 1709.384491][ T3496] dump_stack_lvl+0x151/0x1b7 [ 1709.389005][ T3496] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1709.394303][ T3496] dump_stack+0x15/0x17 [ 1709.398287][ T3496] should_fail+0x3c0/0x510 [ 1709.402542][ T3496] __should_failslab+0x9f/0xe0 [ 1709.407139][ T3496] should_failslab+0x9/0x20 [ 1709.411478][ T3496] kmem_cache_alloc+0x4f/0x2f0 [ 1709.416080][ T3496] ? anon_vma_clone+0xa1/0x4f0 [ 1709.420695][ T3496] anon_vma_clone+0xa1/0x4f0 [ 1709.425113][ T3496] anon_vma_fork+0x91/0x4f0 [ 1709.429455][ T3496] ? anon_vma_name+0x43/0x70 [ 1709.433872][ T3496] dup_mmap+0x750/0xea0 [ 1709.437866][ T3496] ? __delayed_free_task+0x20/0x20 [ 1709.442816][ T3496] ? mm_init+0x807/0x960 [ 1709.446892][ T3496] dup_mm+0x91/0x330 [ 1709.450629][ T3496] copy_mm+0x108/0x1b0 [ 1709.454540][ T3496] copy_process+0x1295/0x3250 [ 1709.459054][ T3496] ? proc_fail_nth_write+0x213/0x290 [ 1709.464166][ T3496] ? proc_fail_nth_read+0x220/0x220 [ 1709.469198][ T3496] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1709.474145][ T3496] ? vfs_write+0x9af/0x1050 [ 1709.478482][ T3496] ? vmacache_update+0xb7/0x120 [ 1709.483172][ T3496] kernel_clone+0x22d/0x990 [ 1709.487509][ T3496] ? file_end_write+0x1b0/0x1b0 [ 1709.492197][ T3496] ? __kasan_check_write+0x14/0x20 [ 1709.497141][ T3496] ? create_io_thread+0x1e0/0x1e0 [ 1709.502002][ T3496] ? __mutex_lock_slowpath+0x10/0x10 [ 1709.507124][ T3496] __x64_sys_clone+0x289/0x310 [ 1709.511726][ T3496] ? __do_sys_vfork+0x130/0x130 [ 1709.516415][ T3496] ? debug_smp_processor_id+0x17/0x20 [ 1709.521620][ T3496] do_syscall_64+0x44/0xd0 [ 1709.525880][ T3496] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1709.531599][ T3496] RIP: 0033:0x7f03091130d9 [ 1709.535854][ T3496] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1709.555297][ T3496] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1709.563544][ T3496] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 10:15:03 executing program 0: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:03 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r1, r2, 0x7}, 0x10) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x10, 0x8000, 0x3, 0x3, {{0x12, 0x4, 0x3, 0x4, 0x48, 0x68, 0x0, 0x8, 0x29, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xe8, 0x1, 0xd, [{@loopback, 0x9}, {@broadcast, 0x3}]}, @timestamp_addr={0x44, 0x1c, 0x58, 0x1, 0xc, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x80000000}, {@private=0xa010101, 0x1}, {@broadcast, 0x6}]}, @ra={0x94, 0x4, 0x1}]}}}}}) syz_open_dev$vcsu(&(0x7f0000000380), 0x5, 0x301040) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r4, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x854}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xd2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8014}, 0x11) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xc35}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4040000) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r1, r2, 0x7}, 0x10) (async) sendmsg$BATADV_CMD_SET_HARDIF(r0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x10, 0x8000, 0x3, 0x3, {{0x12, 0x4, 0x3, 0x4, 0x48, 0x68, 0x0, 0x8, 0x29, 0x0, @empty, @rand_addr=0x64010101, {[@timestamp_addr={0x44, 0x14, 0xe8, 0x1, 0xd, [{@loopback, 0x9}, {@broadcast, 0x3}]}, @timestamp_addr={0x44, 0x1c, 0x58, 0x1, 0xc, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x80000000}, {@private=0xa010101, 0x1}, {@broadcast, 0x6}]}, @ra={0x94, 0x4, 0x1}]}}}}}) (async) syz_open_dev$vcsu(&(0x7f0000000380), 0x5, 0x301040) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r4, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x80}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x854}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0xd2}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8014}, 0x11) (async) sendmsg$WG_CMD_GET_DEVICE(r0, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x0, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0xc35}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4040000) (async) 10:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 10:15:03 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 10:15:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1709.571349][ T3496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1709.579163][ T3496] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1709.586982][ T3496] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1709.594788][ T3496] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1709.602605][ T3496] [ 1709.640971][ T3528] FAULT_INJECTION: forcing a failure. [ 1709.640971][ T3528] name failslab, interval 1, probability 0, space 0, times 0 [ 1709.654505][ T3528] CPU: 1 PID: 3528 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1709.664476][ T3528] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1709.674459][ T3528] Call Trace: [ 1709.677585][ T3528] [ 1709.680356][ T3528] dump_stack_lvl+0x151/0x1b7 [ 1709.684868][ T3528] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1709.690166][ T3528] dump_stack+0x15/0x17 [ 1709.694155][ T3528] should_fail+0x3c0/0x510 [ 1709.698408][ T3528] __should_failslab+0x9f/0xe0 [ 1709.703098][ T3528] should_failslab+0x9/0x20 [ 1709.707434][ T3528] kmem_cache_alloc+0x4f/0x2f0 [ 1709.712040][ T3528] ? anon_vma_clone+0xa1/0x4f0 [ 1709.716633][ T3528] anon_vma_clone+0xa1/0x4f0 [ 1709.721062][ T3528] anon_vma_fork+0x91/0x4f0 [ 1709.725402][ T3528] ? anon_vma_name+0x43/0x70 [ 1709.729828][ T3528] dup_mmap+0x750/0xea0 [ 1709.733822][ T3528] ? __delayed_free_task+0x20/0x20 [ 1709.738768][ T3528] ? mm_init+0x807/0x960 [ 1709.742843][ T3528] dup_mm+0x91/0x330 [ 1709.746586][ T3528] copy_mm+0x108/0x1b0 [ 1709.750481][ T3528] copy_process+0x1295/0x3250 [ 1709.754998][ T3528] ? proc_fail_nth_write+0x213/0x290 [ 1709.760116][ T3528] ? proc_fail_nth_read+0x220/0x220 [ 1709.765149][ T3528] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1709.770100][ T3528] ? vfs_write+0x9af/0x1050 [ 1709.774441][ T3528] ? vmacache_update+0xb7/0x120 [ 1709.779135][ T3528] kernel_clone+0x22d/0x990 [ 1709.783463][ T3528] ? file_end_write+0x1b0/0x1b0 [ 1709.788164][ T3528] ? __kasan_check_write+0x14/0x20 [ 1709.793102][ T3528] ? create_io_thread+0x1e0/0x1e0 [ 1709.797961][ T3528] ? __mutex_lock_slowpath+0x10/0x10 [ 1709.803086][ T3528] __x64_sys_clone+0x289/0x310 [ 1709.807683][ T3528] ? __do_sys_vfork+0x130/0x130 [ 1709.812366][ T3528] ? debug_smp_processor_id+0x17/0x20 [ 1709.817576][ T3528] do_syscall_64+0x44/0xd0 [ 1709.821824][ T3528] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1709.827642][ T3528] RIP: 0033:0x7f03091130d9 [ 1709.831895][ T3528] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1709.851509][ T3528] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1709.859754][ T3528] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1709.867565][ T3528] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1709.875385][ T3528] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1709.883184][ T3528] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 10:15:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) r2 = getuid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0200000001000700", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="040000000000000008000100", @ANYRES32=0xee00, @ANYBLOB="10000400000000002000010000000000"], 0x3c, 0x1) write$binfmt_elf32(r0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x450281, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) [ 1709.891007][ T3528] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1709.898810][ T3528] 10:15:03 executing program 4: syz_clone(0xc7996300, 0x0, 0xfffffffffffffea1, &(0x7f0000000040), 0x0, 0x0) 10:15:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:03 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 10:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:15:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) (async) r2 = getuid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0200000001000700", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="040000000000000008000100", @ANYRES32=0xee00, @ANYBLOB="10000400000000002000010000000000"], 0x3c, 0x1) write$binfmt_elf32(r0, 0x0, 0x0) (async) r3 = open(&(0x7f0000000080)='./file0\x00', 0x450281, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) 10:15:03 executing program 0: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r1 = getpgid(r0) getpgrp(r1) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) r2 = getuid() fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0200000001000700", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="040000000000000008000100", @ANYRES32=0xee00, @ANYBLOB="10000400000000002000010000000000"], 0x3c, 0x1) write$binfmt_elf32(r0, 0x0, 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x450281, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) bpf$PROG_LOAD(0x9, 0x0, 0x2) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) (async) openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) (async) write$binfmt_elf32(r1, 0x0, 0x0) (async) getuid() (async) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="0200000001000700", @ANYRES32=r2, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="040000000000000008000100", @ANYRES32=0xee00, @ANYBLOB="10000400000000002000010000000000"], 0x3c, 0x1) (async) write$binfmt_elf32(r0, 0x0, 0x0) (async) open(&(0x7f0000000080)='./file0\x00', 0x450281, 0x0) (async) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0), &(0x7f0000000100)=0x4) (async) ioctl$F2FS_IOC_START_VOLATILE_WRITE(r0, 0xf503, 0x0) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) 10:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) 10:15:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf77, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1710.213432][ T3564] FAULT_INJECTION: forcing a failure. [ 1710.213432][ T3564] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.246871][ T3564] CPU: 0 PID: 3564 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1710.256869][ T3564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1710.266852][ T3564] Call Trace: [ 1710.269974][ T3564] [ 1710.272753][ T3564] dump_stack_lvl+0x151/0x1b7 [ 1710.277261][ T3564] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1710.282558][ T3564] dump_stack+0x15/0x17 [ 1710.286554][ T3564] should_fail+0x3c0/0x510 [ 1710.290804][ T3564] __should_failslab+0x9f/0xe0 [ 1710.295405][ T3564] should_failslab+0x9/0x20 [ 1710.299744][ T3564] kmem_cache_alloc+0x4f/0x2f0 [ 1710.304340][ T3564] ? vm_area_dup+0x26/0x1d0 [ 1710.308682][ T3564] vm_area_dup+0x26/0x1d0 10:15:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, &(0x7f0000000280)=""/4096, 0x0, 0x1000, 0x1}, 0x20) [ 1710.313019][ T3564] dup_mmap+0x6b8/0xea0 [ 1710.317018][ T3564] ? __delayed_free_task+0x20/0x20 [ 1710.322137][ T3564] ? mm_init+0x807/0x960 [ 1710.326997][ T3564] dup_mm+0x91/0x330 [ 1710.330729][ T3564] copy_mm+0x108/0x1b0 [ 1710.334632][ T3564] copy_process+0x1295/0x3250 [ 1710.339152][ T3564] ? proc_fail_nth_write+0x213/0x290 [ 1710.344266][ T3564] ? proc_fail_nth_read+0x220/0x220 [ 1710.349307][ T3564] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1710.354252][ T3564] ? vfs_write+0x9af/0x1050 [ 1710.358592][ T3564] ? vmacache_update+0xb7/0x120 [ 1710.363276][ T3564] kernel_clone+0x22d/0x990 [ 1710.367615][ T3564] ? file_end_write+0x1b0/0x1b0 [ 1710.372300][ T3564] ? __kasan_check_write+0x14/0x20 [ 1710.377247][ T3564] ? create_io_thread+0x1e0/0x1e0 [ 1710.382107][ T3564] ? __mutex_lock_slowpath+0x10/0x10 [ 1710.387228][ T3564] __x64_sys_clone+0x289/0x310 [ 1710.391842][ T3564] ? __do_sys_vfork+0x130/0x130 [ 1710.396513][ T3564] ? debug_smp_processor_id+0x17/0x20 [ 1710.401726][ T3564] do_syscall_64+0x44/0xd0 [ 1710.405976][ T3564] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1710.411704][ T3564] RIP: 0033:0x7f03091130d9 [ 1710.415957][ T3564] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1710.435660][ T3564] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1710.443905][ T3564] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1710.451715][ T3564] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 10:15:03 executing program 4: syz_clone(0xc0a00500, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:15:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfb6, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:03 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffe86) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x1, 0x1, 0xca, 0x8004, {{0x34, 0x4, 0x2, 0x9, 0xd0, 0x68, 0x0, 0x63, 0x4, 0x0, @multicast2, @remote, {[@timestamp_prespec={0x44, 0x34, 0x57, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@private=0xa010101, 0xfff}, {@loopback, 0x1}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x9}, {@empty, 0x200}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x6}]}, @cipso={0x86, 0x6e, 0x2, [{0x0, 0x5, 'H\'5'}, {0x5, 0xe, "7c305d6b8a038d8af0ee97b1"}, {0x0, 0x4, "bc7d"}, {0x5, 0x9, "6bc8d3989c3872"}, {0x6, 0xf, "903022e4409553a4a5d4ecb3de"}, {0x2, 0x9, "2f945298637fa5"}, {0x6, 0x11, "543c4ef0b15fa216b5684049215a22"}, {0x2, 0x8, "aff48b44c6fb"}, {0x7, 0xe, "8be201a14ae5d62141a8d8c2"}, {0x5, 0x9, "8bcce6bf0cdb00"}]}, @generic={0x94, 0xe, "3c20375af6f9ffe7ae06945d"}, @timestamp_addr={0x44, 0xc, 0xe2, 0x1, 0xf, [{@rand_addr=0x64010100, 0x3}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000240)={'erspan0\x00', r2, 0x80, 0x8, 0x6, 0x6, {{0x5, 0x4, 0x1, 0x15, 0x14, 0x67, 0x0, 0x5, 0x29, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 10:15:03 executing program 0: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) getpgid(r0) r1 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r1}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) [ 1710.459526][ T3564] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1710.467338][ T3564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1710.475148][ T3564] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1710.482964][ T3564] 10:15:04 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) 10:15:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x4}, {0x0, [0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x1c, 0x1000, 0x1}, 0x20) 10:15:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfcf, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:04 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffe86) (async) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x1, 0x1, 0xca, 0x8004, {{0x34, 0x4, 0x2, 0x9, 0xd0, 0x68, 0x0, 0x63, 0x4, 0x0, @multicast2, @remote, {[@timestamp_prespec={0x44, 0x34, 0x57, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@private=0xa010101, 0xfff}, {@loopback, 0x1}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x9}, {@empty, 0x200}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x6}]}, @cipso={0x86, 0x6e, 0x2, [{0x0, 0x5, 'H\'5'}, {0x5, 0xe, "7c305d6b8a038d8af0ee97b1"}, {0x0, 0x4, "bc7d"}, {0x5, 0x9, "6bc8d3989c3872"}, {0x6, 0xf, "903022e4409553a4a5d4ecb3de"}, {0x2, 0x9, "2f945298637fa5"}, {0x6, 0x11, "543c4ef0b15fa216b5684049215a22"}, {0x2, 0x8, "aff48b44c6fb"}, {0x7, 0xe, "8be201a14ae5d62141a8d8c2"}, {0x5, 0x9, "8bcce6bf0cdb00"}]}, @generic={0x94, 0xe, "3c20375af6f9ffe7ae06945d"}, @timestamp_addr={0x44, 0xc, 0xe2, 0x1, 0xf, [{@rand_addr=0x64010100, 0x3}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000240)={'erspan0\x00', r2, 0x80, 0x8, 0x6, 0x6, {{0x5, 0x4, 0x1, 0x15, 0x14, 0x67, 0x0, 0x5, 0x29, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 10:15:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x3}, {0x0, [0x0]}}, &(0x7f0000000280)=""/4096, 0x1b, 0x1000, 0x1}, 0x20) 10:15:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) 10:15:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfdb, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:04 executing program 0: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) [ 1710.550457][ T3598] FAULT_INJECTION: forcing a failure. [ 1710.550457][ T3598] name failslab, interval 1, probability 0, space 0, times 0 [ 1710.620211][ T3598] CPU: 0 PID: 3598 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1710.630199][ T3598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1710.640101][ T3598] Call Trace: [ 1710.643216][ T3598] [ 1710.645993][ T3598] dump_stack_lvl+0x151/0x1b7 [ 1710.650505][ T3598] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1710.655800][ T3598] dump_stack+0x15/0x17 [ 1710.659803][ T3598] should_fail+0x3c0/0x510 [ 1710.664045][ T3598] __should_failslab+0x9f/0xe0 [ 1710.668649][ T3598] should_failslab+0x9/0x20 [ 1710.672984][ T3598] kmem_cache_alloc+0x4f/0x2f0 [ 1710.677585][ T3598] ? vm_area_dup+0x26/0x1d0 [ 1710.681925][ T3598] vm_area_dup+0x26/0x1d0 [ 1710.686093][ T3598] dup_mmap+0x6b8/0xea0 [ 1710.690085][ T3598] ? __delayed_free_task+0x20/0x20 [ 1710.695031][ T3598] ? mm_init+0x807/0x960 [ 1710.699106][ T3598] dup_mm+0x91/0x330 [ 1710.702837][ T3598] copy_mm+0x108/0x1b0 [ 1710.706744][ T3598] copy_process+0x1295/0x3250 [ 1710.711259][ T3598] ? proc_fail_nth_write+0x213/0x290 [ 1710.716377][ T3598] ? proc_fail_nth_read+0x220/0x220 [ 1710.721410][ T3598] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1710.726358][ T3598] ? vfs_write+0x9af/0x1050 [ 1710.730697][ T3598] ? vmacache_update+0xb7/0x120 [ 1710.735383][ T3598] kernel_clone+0x22d/0x990 [ 1710.739727][ T3598] ? file_end_write+0x1b0/0x1b0 [ 1710.744415][ T3598] ? __kasan_check_write+0x14/0x20 [ 1710.749358][ T3598] ? create_io_thread+0x1e0/0x1e0 [ 1710.754216][ T3598] ? __mutex_lock_slowpath+0x10/0x10 [ 1710.759346][ T3598] __x64_sys_clone+0x289/0x310 [ 1710.763940][ T3598] ? __do_sys_vfork+0x130/0x130 [ 1710.768628][ T3598] ? debug_smp_processor_id+0x17/0x20 [ 1710.773838][ T3598] do_syscall_64+0x44/0xd0 [ 1710.778083][ T3598] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1710.783825][ T3598] RIP: 0033:0x7f03091130d9 [ 1710.788067][ T3598] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1710.807505][ T3598] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1710.815753][ T3598] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1710.823563][ T3598] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1710.831374][ T3598] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1710.839191][ T3598] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1710.846997][ T3598] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1710.854811][ T3598] 10:15:04 executing program 4: syz_clone(0xc0a00500, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:15:04 executing program 2: r0 = bpf$PROG_LOAD(0x9, 0x0, 0xfffffffffffffe86) (async, rerun: 64) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (rerun: 64) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000280)={'erspan0\x00', 0x0, 0x1, 0x1, 0xca, 0x8004, {{0x34, 0x4, 0x2, 0x9, 0xd0, 0x68, 0x0, 0x63, 0x4, 0x0, @multicast2, @remote, {[@timestamp_prespec={0x44, 0x34, 0x57, 0x3, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x2}, {@private=0xa010101, 0xfff}, {@loopback, 0x1}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x9}, {@empty, 0x200}, {@dev={0xac, 0x14, 0x14, 0x43}, 0x6}]}, @cipso={0x86, 0x6e, 0x2, [{0x0, 0x5, 'H\'5'}, {0x5, 0xe, "7c305d6b8a038d8af0ee97b1"}, {0x0, 0x4, "bc7d"}, {0x5, 0x9, "6bc8d3989c3872"}, {0x6, 0xf, "903022e4409553a4a5d4ecb3de"}, {0x2, 0x9, "2f945298637fa5"}, {0x6, 0x11, "543c4ef0b15fa216b5684049215a22"}, {0x2, 0x8, "aff48b44c6fb"}, {0x7, 0xe, "8be201a14ae5d62141a8d8c2"}, {0x5, 0x9, "8bcce6bf0cdb00"}]}, @generic={0x94, 0xe, "3c20375af6f9ffe7ae06945d"}, @timestamp_addr={0x44, 0xc, 0xe2, 0x1, 0xf, [{@rand_addr=0x64010100, 0x3}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000200)={'erspan0\x00', &(0x7f0000000240)={'erspan0\x00', r2, 0x80, 0x8, 0x6, 0x6, {{0x5, 0x4, 0x1, 0x15, 0x14, 0x67, 0x0, 0x5, 0x29, 0x0, @empty, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 10:15:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:04 executing program 0: r0 = syz_clone(0x1008000, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:15:04 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 10:15:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2000029a, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:15:04 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x100010, r0, 0x10000000) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x44) bpf$PROG_LOAD(0x9, 0x0, 0x2) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score\x00') r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r2}, 0x8) ioctl$RTC_PIE_OFF(r4, 0x7006) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x33f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1d, 0xc, &(0x7f00000003c0)=@raw=[@ldst={0x1, 0x0, 0x0, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x6}, @ldst={0x1, 0x0, 0x3, 0x4, 0x1, 0xfffffffffffffff0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xffff}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000380)='GPL\x00', 0x0, 0x99, &(0x7f0000000100)=""/153, 0x41100, 0x10, '\x00', 0x0, 0x17, r1, 0x8, &(0x7f00000001c0)={0x2, 0x12}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0xffffffff, 0xfffffff9}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[r3, r1]}, 0x80) [ 1711.389306][ T3621] FAULT_INJECTION: forcing a failure. [ 1711.389306][ T3621] name failslab, interval 1, probability 0, space 0, times 0 [ 1711.445359][ T3621] CPU: 1 PID: 3621 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1711.455352][ T3621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1711.465359][ T3621] Call Trace: [ 1711.468479][ T3621] [ 1711.471253][ T3621] dump_stack_lvl+0x151/0x1b7 [ 1711.475769][ T3621] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1711.481062][ T3621] dump_stack+0x15/0x17 [ 1711.485055][ T3621] should_fail+0x3c0/0x510 [ 1711.489307][ T3621] __should_failslab+0x9f/0xe0 [ 1711.493904][ T3621] should_failslab+0x9/0x20 [ 1711.498243][ T3621] kmem_cache_alloc+0x4f/0x2f0 [ 1711.502846][ T3621] ? vm_area_dup+0x26/0x1d0 [ 1711.507185][ T3621] vm_area_dup+0x26/0x1d0 [ 1711.511350][ T3621] dup_mmap+0x6b8/0xea0 [ 1711.515344][ T3621] ? __delayed_free_task+0x20/0x20 [ 1711.520289][ T3621] ? mm_init+0x807/0x960 [ 1711.525414][ T3621] dup_mm+0x91/0x330 [ 1711.529144][ T3621] copy_mm+0x108/0x1b0 [ 1711.533050][ T3621] copy_process+0x1295/0x3250 [ 1711.537658][ T3621] ? proc_fail_nth_write+0x213/0x290 [ 1711.542778][ T3621] ? proc_fail_nth_read+0x220/0x220 [ 1711.547816][ T3621] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1711.552756][ T3621] ? vfs_write+0x9af/0x1050 [ 1711.557099][ T3621] ? vmacache_update+0xb7/0x120 [ 1711.561788][ T3621] kernel_clone+0x22d/0x990 [ 1711.566122][ T3621] ? file_end_write+0x1b0/0x1b0 [ 1711.571855][ T3621] ? __kasan_check_write+0x14/0x20 [ 1711.576801][ T3621] ? create_io_thread+0x1e0/0x1e0 [ 1711.581659][ T3621] ? __mutex_lock_slowpath+0x10/0x10 [ 1711.586786][ T3621] __x64_sys_clone+0x289/0x310 [ 1711.591380][ T3621] ? __do_sys_vfork+0x130/0x130 [ 1711.596069][ T3621] ? debug_smp_processor_id+0x17/0x20 [ 1711.601277][ T3621] do_syscall_64+0x44/0xd0 [ 1711.605705][ T3621] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1711.611432][ T3621] RIP: 0033:0x7f03091130d9 [ 1711.615691][ T3621] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1711.635295][ T3621] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 10:15:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200002a5, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:04 executing program 0: r0 = syz_clone(0x0, &(0x7f0000000000)="34d7966fd4fc2ab86db9502064b312c769cd145cb7f98cd58c765ed0f7c2d001068d013876e8fe8e8dbb3543fa9c0c424038b1679a621b1fb004568d6abebded0a0e2ed028bda1bcf5c3f33fff04d4432ba38d04583b5c999162d75d2b8a454acf3a196b3a3f99e13964f320c0", 0x6d, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:05 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x100010, r0, 0x10000000) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x44) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score\x00') (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r2}, 0x8) ioctl$RTC_PIE_OFF(r4, 0x7006) (async, rerun: 64) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) (async, rerun: 64) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x33f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1d, 0xc, &(0x7f00000003c0)=@raw=[@ldst={0x1, 0x0, 0x0, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x6}, @ldst={0x1, 0x0, 0x3, 0x4, 0x1, 0xfffffffffffffff0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xffff}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000380)='GPL\x00', 0x0, 0x99, &(0x7f0000000100)=""/153, 0x41100, 0x10, '\x00', 0x0, 0x17, r1, 0x8, &(0x7f00000001c0)={0x2, 0x12}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0xffffffff, 0xfffffff9}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[r3, r1]}, 0x80) [ 1711.643541][ T3621] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1711.651355][ T3621] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1711.659163][ T3621] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1711.666977][ T3621] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1711.674787][ T3621] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1711.682692][ T3621] 10:15:05 executing program 4: syz_clone(0xc0a00500, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_clone(0xc0a00500, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (async) 10:15:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200002e1, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x1}, 0x20) 10:15:05 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x100010, r0, 0x10000000) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x44) (async) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) pipe2$watch_queue(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) (async) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000280)='oom_score\x00') r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r2}, 0x8) ioctl$RTC_PIE_OFF(r4, 0x7006) (async) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) (async) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x33f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1d, 0xc, &(0x7f00000003c0)=@raw=[@ldst={0x1, 0x0, 0x0, 0x5, 0xb, 0xfffffffffffffff8, 0x10}, @cb_func={0x18, 0x1, 0x4, 0x0, 0x6}, @ldst={0x1, 0x0, 0x3, 0x4, 0x1, 0xfffffffffffffff0, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @btf_id={0x18, 0x9, 0x3, 0x0, 0x3}, @map_val={0x18, 0x7, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0xffff}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xffffffffffffffff}], &(0x7f0000000380)='GPL\x00', 0x0, 0x99, &(0x7f0000000100)=""/153, 0x41100, 0x10, '\x00', 0x0, 0x17, r1, 0x8, &(0x7f00000001c0)={0x2, 0x12}, 0x8, 0x10, &(0x7f0000000200)={0x5, 0x10, 0xffffffff, 0xfffffff9}, 0x10, 0x0, r2, 0x0, &(0x7f00000002c0)=[r3, r1]}, 0x80) 10:15:05 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:05 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 10:15:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:15:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200002ff, 0xc, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1712.423761][ T3658] FAULT_INJECTION: forcing a failure. [ 1712.423761][ T3658] name failslab, interval 1, probability 0, space 0, times 0 10:15:06 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000000c0)={'tunl0\x00', 0x0, 0x7, 0x80, 0x2, 0x80000000, {{0x3f, 0x4, 0x2, 0x7, 0xfc, 0x67, 0x0, 0xd4, 0x0, 0x0, @rand_addr=0x64010101, @multicast2, {[@timestamp={0x44, 0x14, 0x42, 0x0, 0x8, [0x9, 0x87ff, 0x7, 0x2]}, @cipso={0x86, 0x65, 0x3, [{0x1, 0xd, "f97f2be04f5227272671b8"}, {0x6, 0x8, "42f98b60a436"}, {0x2, 0x12, "64ad42da46a4f242726df95545209659"}, {0x0, 0xe, "722e44d1ea9c0b42d301b9d0"}, {0x1, 0x4, 'Rj'}, {0x7, 0x10, "f48e0c03dffff8848ec49177b26c"}, {0x6, 0x5, "d0f20e"}, {0x6, 0x11, "f0709c4458a5166e5aab256490f312"}]}, @lsrr={0x83, 0x1f, 0x3a, [@rand_addr=0x64010100, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, @multicast1, @broadcast, @empty, @loopback]}, @noop, @end, @timestamp_prespec={0x44, 0x44, 0xe4, 0x3, 0x0, [{@rand_addr=0x64010102, 0x40}, {@broadcast, 0x7}, {@multicast1, 0x40}, {@loopback, 0x20}, {@multicast2, 0xfffffffc}, {@empty, 0x10001}, {@loopback, 0x6}, {@rand_addr=0x64010101, 0xffff}]}, @rr={0x7, 0x7, 0x30, [@multicast2]}, @noop]}}}}}) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r6}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) r8 = syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r7}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r8, 0x40046721, &(0x7f0000000440)={r9}) r10 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r10}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8e}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000000080)=""/47, 0x41000, 0x12, '\x00', r0, 0x19, r1, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x7, 0x1, 0x130d}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000340)=[0x1, r3, r4, 0xffffffffffffffff, r5, r6, r7, r10, 0x1]}, 0x80) 10:15:06 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:15:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1712.630977][ T3658] CPU: 0 PID: 3658 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1712.641144][ T3658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1712.651063][ T3658] Call Trace: [ 1712.654162][ T3658] [ 1712.656937][ T3658] dump_stack_lvl+0x151/0x1b7 [ 1712.661448][ T3658] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1712.666744][ T3658] ? do_syscall_64+0x44/0xd0 [ 1712.671175][ T3658] dump_stack+0x15/0x17 [ 1712.675162][ T3658] should_fail+0x3c0/0x510 [ 1712.679421][ T3658] __should_failslab+0x9f/0xe0 [ 1712.684016][ T3658] should_failslab+0x9/0x20 [ 1712.688443][ T3658] kmem_cache_alloc+0x4f/0x2f0 [ 1712.693047][ T3658] ? anon_vma_clone+0xa1/0x4f0 [ 1712.697642][ T3658] anon_vma_clone+0xa1/0x4f0 [ 1712.702070][ T3658] anon_vma_fork+0x91/0x4f0 [ 1712.706419][ T3658] ? anon_vma_name+0x43/0x70 [ 1712.710835][ T3658] dup_mmap+0x750/0xea0 [ 1712.714826][ T3658] ? __delayed_free_task+0x20/0x20 [ 1712.719779][ T3658] ? mm_init+0x807/0x960 [ 1712.724084][ T3658] dup_mm+0x91/0x330 [ 1712.727811][ T3658] copy_mm+0x108/0x1b0 [ 1712.731722][ T3658] copy_process+0x1295/0x3250 [ 1712.736235][ T3658] ? proc_fail_nth_write+0x213/0x290 [ 1712.741361][ T3658] ? proc_fail_nth_read+0x220/0x220 [ 1712.746385][ T3658] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1712.751336][ T3658] ? vfs_write+0x9af/0x1050 [ 1712.755676][ T3658] ? vmacache_update+0xb7/0x120 [ 1712.760379][ T3658] kernel_clone+0x22d/0x990 [ 1712.764695][ T3658] ? file_end_write+0x1b0/0x1b0 [ 1712.769384][ T3658] ? __kasan_check_write+0x14/0x20 [ 1712.774337][ T3658] ? create_io_thread+0x1e0/0x1e0 [ 1712.779193][ T3658] ? __mutex_lock_slowpath+0x10/0x10 [ 1712.784311][ T3658] __x64_sys_clone+0x289/0x310 [ 1712.788914][ T3658] ? __do_sys_vfork+0x130/0x130 [ 1712.793602][ T3658] ? debug_smp_processor_id+0x17/0x20 [ 1712.798807][ T3658] do_syscall_64+0x44/0xd0 [ 1712.803055][ T3658] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1712.808785][ T3658] RIP: 0033:0x7f03091130d9 [ 1712.813041][ T3658] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1712.832483][ T3658] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1712.840728][ T3658] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1712.848625][ T3658] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1712.856614][ T3658] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1712.864425][ T3658] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1712.872229][ T3658] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1712.880046][ T3658] 10:15:08 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = getpgid(0x0) syz_open_procfs(r0, 0x0) capset(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)={0xdfde, 0x63, 0x10001, 0x60, 0x7fffffff, 0x2}) 10:15:08 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000000c0)={'tunl0\x00', 0x0, 0x7, 0x80, 0x2, 0x80000000, {{0x3f, 0x4, 0x2, 0x7, 0xfc, 0x67, 0x0, 0xd4, 0x0, 0x0, @rand_addr=0x64010101, @multicast2, {[@timestamp={0x44, 0x14, 0x42, 0x0, 0x8, [0x9, 0x87ff, 0x7, 0x2]}, @cipso={0x86, 0x65, 0x3, [{0x1, 0xd, "f97f2be04f5227272671b8"}, {0x6, 0x8, "42f98b60a436"}, {0x2, 0x12, "64ad42da46a4f242726df95545209659"}, {0x0, 0xe, "722e44d1ea9c0b42d301b9d0"}, {0x1, 0x4, 'Rj'}, {0x7, 0x10, "f48e0c03dffff8848ec49177b26c"}, {0x6, 0x5, "d0f20e"}, {0x6, 0x11, "f0709c4458a5166e5aab256490f312"}]}, @lsrr={0x83, 0x1f, 0x3a, [@rand_addr=0x64010100, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, @multicast1, @broadcast, @empty, @loopback]}, @noop, @end, @timestamp_prespec={0x44, 0x44, 0xe4, 0x3, 0x0, [{@rand_addr=0x64010102, 0x40}, {@broadcast, 0x7}, {@multicast1, 0x40}, {@loopback, 0x20}, {@multicast2, 0xfffffffc}, {@empty, 0x10001}, {@loopback, 0x6}, {@rand_addr=0x64010101, 0xffff}]}, @rr={0x7, 0x7, 0x30, [@multicast2]}, @noop]}}}}}) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r6}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) r8 = syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r7}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r8, 0x40046721, &(0x7f0000000440)={r9}) r10 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r10}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8e}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000000080)=""/47, 0x41000, 0x12, '\x00', r0, 0x19, r1, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x7, 0x1, 0x130d}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000340)=[0x1, r3, r4, 0xffffffffffffffff, r5, r6, r7, r10, 0x1]}, 0x80) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000000c0)={'tunl0\x00', 0x0, 0x7, 0x80, 0x2, 0x80000000, {{0x3f, 0x4, 0x2, 0x7, 0xfc, 0x67, 0x0, 0xd4, 0x0, 0x0, @rand_addr=0x64010101, @multicast2, {[@timestamp={0x44, 0x14, 0x42, 0x0, 0x8, [0x9, 0x87ff, 0x7, 0x2]}, @cipso={0x86, 0x65, 0x3, [{0x1, 0xd, "f97f2be04f5227272671b8"}, {0x6, 0x8, "42f98b60a436"}, {0x2, 0x12, "64ad42da46a4f242726df95545209659"}, {0x0, 0xe, "722e44d1ea9c0b42d301b9d0"}, {0x1, 0x4, 'Rj'}, {0x7, 0x10, "f48e0c03dffff8848ec49177b26c"}, {0x6, 0x5, "d0f20e"}, {0x6, 0x11, "f0709c4458a5166e5aab256490f312"}]}, @lsrr={0x83, 0x1f, 0x3a, [@rand_addr=0x64010100, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, @multicast1, @broadcast, @empty, @loopback]}, @noop, @end, @timestamp_prespec={0x44, 0x44, 0xe4, 0x3, 0x0, [{@rand_addr=0x64010102, 0x40}, {@broadcast, 0x7}, {@multicast1, 0x40}, {@loopback, 0x20}, {@multicast2, 0xfffffffc}, {@empty, 0x10001}, {@loopback, 0x6}, {@rand_addr=0x64010101, 0xffff}]}, @rr={0x7, 0x7, 0x30, [@multicast2]}, @noop]}}}}}) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r6}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r7}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) (async) ioctl$INCFS_IOC_PERMIT_FILL(r8, 0x40046721, &(0x7f0000000440)={r9}) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r10}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8e}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000000080)=""/47, 0x41000, 0x12, '\x00', r0, 0x19, r1, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x7, 0x1, 0x130d}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000340)=[0x1, r3, r4, 0xffffffffffffffff, r5, r6, r7, r10, 0x1]}, 0x80) (async) 10:15:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0x0, 0x0, 0x2}}, &(0x7f0000000280)=""/4096, 0x1a, 0x1000}, 0x20) 10:15:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x11, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:08 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)="b2e7644587248d9793480d4a6fe94b61c87615491e71676feb3f0ee3f845fd4317cafa4fa32b8343eaa606d4232e4afb50ee23a37e6fbb8cfceb44dd1ccb34b4") capset(&(0x7f0000000140)={0x20080522, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:08 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 10:15:08 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000140)={0x20080522, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x64, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:08 executing program 3: syz_clone(0xc0a00500, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) [ 1714.575195][ T3688] FAULT_INJECTION: forcing a failure. [ 1714.575195][ T3688] name failslab, interval 1, probability 0, space 0, times 0 10:15:08 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'syztnl0\x00', &(0x7f00000000c0)={'tunl0\x00', 0x0, 0x7, 0x80, 0x2, 0x80000000, {{0x3f, 0x4, 0x2, 0x7, 0xfc, 0x67, 0x0, 0xd4, 0x0, 0x0, @rand_addr=0x64010101, @multicast2, {[@timestamp={0x44, 0x14, 0x42, 0x0, 0x8, [0x9, 0x87ff, 0x7, 0x2]}, @cipso={0x86, 0x65, 0x3, [{0x1, 0xd, "f97f2be04f5227272671b8"}, {0x6, 0x8, "42f98b60a436"}, {0x2, 0x12, "64ad42da46a4f242726df95545209659"}, {0x0, 0xe, "722e44d1ea9c0b42d301b9d0"}, {0x1, 0x4, 'Rj'}, {0x7, 0x10, "f48e0c03dffff8848ec49177b26c"}, {0x6, 0x5, "d0f20e"}, {0x6, 0x11, "f0709c4458a5166e5aab256490f312"}]}, @lsrr={0x83, 0x1f, 0x3a, [@rand_addr=0x64010100, @broadcast, @dev={0xac, 0x14, 0x14, 0x21}, @multicast1, @broadcast, @empty, @loopback]}, @noop, @end, @timestamp_prespec={0x44, 0x44, 0xe4, 0x3, 0x0, [{@rand_addr=0x64010102, 0x40}, {@broadcast, 0x7}, {@multicast1, 0x40}, {@loopback, 0x20}, {@multicast2, 0xfffffffc}, {@empty, 0x10001}, {@loopback, 0x6}, {@rand_addr=0x64010101, 0xffff}]}, @rr={0x7, 0x7, 0x30, [@multicast2]}, @noop]}}}}}) (async) r1 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async, rerun: 32) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) (async, rerun: 32) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) (async) r4 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r4}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) r5 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r5}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r6 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r6}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async, rerun: 64) r7 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (rerun: 64) r8 = syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r7}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) r9 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000400)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) ioctl$INCFS_IOC_PERMIT_FILL(r8, 0x40046721, &(0x7f0000000440)={r9}) (async) r10 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r10}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xb, 0x1, &(0x7f0000000000)=@raw=[@call={0x85, 0x0, 0x0, 0x8e}], &(0x7f0000000040)='syzkaller\x00', 0x6, 0x2f, &(0x7f0000000080)=""/47, 0x41000, 0x12, '\x00', r0, 0x19, r1, 0x8, &(0x7f0000000240)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0x7, 0x1, 0x130d}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000340)=[0x1, r3, r4, 0xffffffffffffffff, r5, r6, r7, r10, 0x1]}, 0x80) (rerun: 64) 10:15:08 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(0x0, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1714.667356][ T3688] CPU: 0 PID: 3688 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1714.677378][ T3688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1714.687261][ T3688] Call Trace: [ 1714.690373][ T3688] [ 1714.693155][ T3688] dump_stack_lvl+0x151/0x1b7 [ 1714.697671][ T3688] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1714.702958][ T3688] dump_stack+0x15/0x17 [ 1714.706955][ T3688] should_fail+0x3c0/0x510 [ 1714.711206][ T3688] __should_failslab+0x9f/0xe0 [ 1714.715804][ T3688] should_failslab+0x9/0x20 [ 1714.720153][ T3688] kmem_cache_alloc+0x4f/0x2f0 [ 1714.724745][ T3688] ? anon_vma_clone+0xa1/0x4f0 [ 1714.729350][ T3688] anon_vma_clone+0xa1/0x4f0 [ 1714.733768][ T3688] anon_vma_fork+0x91/0x4f0 [ 1714.738108][ T3688] ? anon_vma_name+0x43/0x70 [ 1714.742535][ T3688] dup_mmap+0x750/0xea0 [ 1714.746533][ T3688] ? __delayed_free_task+0x20/0x20 [ 1714.751481][ T3688] ? mm_init+0x807/0x960 [ 1714.755560][ T3688] dup_mm+0x91/0x330 [ 1714.759285][ T3688] copy_mm+0x108/0x1b0 [ 1714.763191][ T3688] copy_process+0x1295/0x3250 [ 1714.767716][ T3688] ? proc_fail_nth_write+0x213/0x290 [ 1714.772825][ T3688] ? proc_fail_nth_read+0x220/0x220 [ 1714.777872][ T3688] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1714.782809][ T3688] ? vfs_write+0x9af/0x1050 [ 1714.787142][ T3688] ? vmacache_update+0xb7/0x120 [ 1714.791835][ T3688] kernel_clone+0x22d/0x990 [ 1714.796184][ T3688] ? file_end_write+0x1b0/0x1b0 [ 1714.800869][ T3688] ? __kasan_check_write+0x14/0x20 [ 1714.805814][ T3688] ? create_io_thread+0x1e0/0x1e0 [ 1714.810669][ T3688] ? __mutex_lock_slowpath+0x10/0x10 [ 1714.815786][ T3688] __x64_sys_clone+0x289/0x310 [ 1714.820386][ T3688] ? __do_sys_vfork+0x130/0x130 [ 1714.825078][ T3688] ? debug_smp_processor_id+0x17/0x20 [ 1714.830282][ T3688] do_syscall_64+0x44/0xd0 [ 1714.834541][ T3688] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1714.840261][ T3688] RIP: 0033:0x7f03091130d9 [ 1714.844517][ T3688] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1714.863955][ T3688] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1714.872199][ T3688] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1714.880020][ T3688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1714.887830][ T3688] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1714.895723][ T3688] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1714.903533][ T3688] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1714.911347][ T3688] 10:15:08 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = getpgid(0x0) syz_open_procfs(r0, 0x0) capset(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)={0xdfde, 0x63, 0x10001, 0x60, 0x7fffffff, 0x2}) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (async) getpgid(0x0) (async) syz_open_procfs(r0, 0x0) (async) capset(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)={0xdfde, 0x63, 0x10001, 0x60, 0x7fffffff, 0x2}) (async) 10:15:08 executing program 3: syz_clone(0xc0a00500, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:15:08 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(0x0, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:08 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 10:15:08 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x0) 10:15:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xf77, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:08 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(0x0, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:08 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x0) 10:15:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xfb6, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:08 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x0) [ 1715.355623][ T3746] FAULT_INJECTION: forcing a failure. [ 1715.355623][ T3746] name failslab, interval 1, probability 0, space 0, times 0 10:15:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xfcf, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) [ 1715.433050][ T3746] CPU: 1 PID: 3746 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1715.443046][ T3746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1715.452939][ T3746] Call Trace: [ 1715.456175][ T3746] [ 1715.458933][ T3746] dump_stack_lvl+0x151/0x1b7 [ 1715.463451][ T3746] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1715.468746][ T3746] dump_stack+0x15/0x17 [ 1715.472734][ T3746] should_fail+0x3c0/0x510 [ 1715.476989][ T3746] __should_failslab+0x9f/0xe0 [ 1715.481588][ T3746] should_failslab+0x9/0x20 [ 1715.485929][ T3746] kmem_cache_alloc+0x4f/0x2f0 [ 1715.490525][ T3746] ? anon_vma_clone+0xa1/0x4f0 [ 1715.495127][ T3746] anon_vma_clone+0xa1/0x4f0 [ 1715.499555][ T3746] anon_vma_fork+0x91/0x4f0 [ 1715.503890][ T3746] ? anon_vma_name+0x43/0x70 [ 1715.508321][ T3746] dup_mmap+0x750/0xea0 [ 1715.512320][ T3746] ? __delayed_free_task+0x20/0x20 [ 1715.517260][ T3746] ? mm_init+0x807/0x960 [ 1715.521338][ T3746] dup_mm+0x91/0x330 [ 1715.525069][ T3746] copy_mm+0x108/0x1b0 [ 1715.528975][ T3746] copy_process+0x1295/0x3250 [ 1715.533491][ T3746] ? proc_fail_nth_write+0x213/0x290 [ 1715.538616][ T3746] ? proc_fail_nth_read+0x220/0x220 [ 1715.543644][ T3746] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1715.548592][ T3746] ? vfs_write+0x9af/0x1050 [ 1715.552933][ T3746] ? vmacache_update+0xb7/0x120 [ 1715.557619][ T3746] kernel_clone+0x22d/0x990 [ 1715.561961][ T3746] ? file_end_write+0x1b0/0x1b0 [ 1715.567164][ T3746] ? __kasan_check_write+0x14/0x20 [ 1715.572111][ T3746] ? create_io_thread+0x1e0/0x1e0 [ 1715.576970][ T3746] ? __mutex_lock_slowpath+0x10/0x10 [ 1715.582093][ T3746] __x64_sys_clone+0x289/0x310 [ 1715.586692][ T3746] ? __do_sys_vfork+0x130/0x130 [ 1715.591382][ T3746] ? debug_smp_processor_id+0x17/0x20 [ 1715.596585][ T3746] do_syscall_64+0x44/0xd0 [ 1715.600839][ T3746] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1715.606564][ T3746] RIP: 0033:0x7f03091130d9 [ 1715.610825][ T3746] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 10:15:09 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000140)={0x0, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) [ 1715.630266][ T3746] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1715.638509][ T3746] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1715.646316][ T3746] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1715.654215][ T3746] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1715.662026][ T3746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1715.670360][ T3746] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1715.678178][ T3746] 10:15:09 executing program 4: syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) r0 = getpgid(0x0) syz_open_procfs(r0, 0x0) capset(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)={0xdfde, 0x63, 0x10001, 0x60, 0x7fffffff, 0x2}) syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) (async) getpgid(0x0) (async) syz_open_procfs(r0, 0x0) (async) capset(&(0x7f0000000000)={0x20071026, r0}, &(0x7f0000000040)={0xdfde, 0x63, 0x10001, 0x60, 0x7fffffff, 0x2}) (async) 10:15:09 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000004c0), &(0x7f00000007c0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x8, 0x80, 0x80000000, 0x2, {{0x23, 0x4, 0x0, 0x9, 0x8c, 0x67, 0x0, 0x9, 0x2f, 0x0, @rand_addr=0x64010100, @loopback, {[@timestamp_prespec={0x44, 0x24, 0xb6, 0x3, 0x5, [{@rand_addr=0x64010100, 0x6ad6cab9}, {@private=0xa010101, 0x888}, {@multicast2, 0x9}, {@remote, 0x5}]}, @generic={0x44, 0xe, "d27e49b39685baab61c7ea74"}, @end, @generic={0x58, 0xa, "b1fa4d87bf8e5704"}, @timestamp_addr={0x44, 0x14, 0x37, 0x1, 0x9, [{@multicast2, 0xe5}, {@broadcast, 0x8}]}, @rr={0x7, 0x1f, 0x81, [@multicast1, @empty, @remote, @local, @private=0xa010102, @empty, @remote]}, @timestamp={0x44, 0x8, 0xc9, 0x0, 0xa, [0x4a2e]}]}}}}}) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000005c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000800)={0x2e4, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x3}, @WGDEVICE_A_PEERS={0x27c, 0x8, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @multicast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x65, @mcast1, 0x53}}, @WGPEER_A_ALLOWEDIPS={0x124, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2d}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x38}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x1004000}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "15e659c03fad486eb8b89e86867bbaa71bf4ad29f1ae4fc5284bad6aa8a3a36a"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x5, @local, 0x3}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x20, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @empty}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x40}]}, {0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "c5a69fa26e3387e197ef893ce31bb1d46898a7feb8cb012100935f7ec3deed49"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @multicast2}}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x5}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x81}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x8001}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x1}, 0x20008800) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x40202, 0x0) r5 = syz_open_dev$vcsu(&(0x7f0000000300), 0x1, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x2040, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f0000000440)={'tunl0\x00', r1, 0x80, 0x7, 0x5, 0xffff, {{0x6, 0x4, 0x2, 0x2, 0x18, 0x65, 0x0, 0x4, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@noop, @noop]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1d, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf3c1}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0xc, 0x9, 0x1, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0xc, 0x5, 0x2, 0xfffffffffffffff0, 0x4}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2047cdb4}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x7f, &(0x7f00000000c0)=""/127, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xd, 0x9, 0x8001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0x1, r5, 0x1, 0x1, 0x1, r6]}, 0x80) 10:15:09 executing program 3: syz_clone(0xc0a00500, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:15:09 executing program 5: syz_clone(0x80102000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 10:15:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xfdb, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:09 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000140)={0x0, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:09 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000004c0), &(0x7f00000007c0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x8, 0x80, 0x80000000, 0x2, {{0x23, 0x4, 0x0, 0x9, 0x8c, 0x67, 0x0, 0x9, 0x2f, 0x0, @rand_addr=0x64010100, @loopback, {[@timestamp_prespec={0x44, 0x24, 0xb6, 0x3, 0x5, [{@rand_addr=0x64010100, 0x6ad6cab9}, {@private=0xa010101, 0x888}, {@multicast2, 0x9}, {@remote, 0x5}]}, @generic={0x44, 0xe, "d27e49b39685baab61c7ea74"}, @end, @generic={0x58, 0xa, "b1fa4d87bf8e5704"}, @timestamp_addr={0x44, 0x14, 0x37, 0x1, 0x9, [{@multicast2, 0xe5}, {@broadcast, 0x8}]}, @rr={0x7, 0x1f, 0x81, [@multicast1, @empty, @remote, @local, @private=0xa010102, @empty, @remote]}, @timestamp={0x44, 0x8, 0xc9, 0x0, 0xa, [0x4a2e]}]}}}}}) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000005c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000800)={0x2e4, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x3}, @WGDEVICE_A_PEERS={0x27c, 0x8, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @multicast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x65, @mcast1, 0x53}}, @WGPEER_A_ALLOWEDIPS={0x124, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2d}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x38}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x1004000}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "15e659c03fad486eb8b89e86867bbaa71bf4ad29f1ae4fc5284bad6aa8a3a36a"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x5, @local, 0x3}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x20, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @empty}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x40}]}, {0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "c5a69fa26e3387e197ef893ce31bb1d46898a7feb8cb012100935f7ec3deed49"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @multicast2}}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x5}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x81}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x8001}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x1}, 0x20008800) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x40202, 0x0) r5 = syz_open_dev$vcsu(&(0x7f0000000300), 0x1, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x2040, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f0000000440)={'tunl0\x00', r1, 0x80, 0x7, 0x5, 0xffff, {{0x6, 0x4, 0x2, 0x2, 0x18, 0x65, 0x0, 0x4, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@noop, @noop]}}}}}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1d, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf3c1}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0xc, 0x9, 0x1, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0xc, 0x5, 0x2, 0xfffffffffffffff0, 0x4}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2047cdb4}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x7f, &(0x7f00000000c0)=""/127, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xd, 0x9, 0x8001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0x1, r5, 0x1, 0x1, 0x1, r6]}, 0x80) bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000004c0), &(0x7f00000007c0)) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x8, 0x80, 0x80000000, 0x2, {{0x23, 0x4, 0x0, 0x9, 0x8c, 0x67, 0x0, 0x9, 0x2f, 0x0, @rand_addr=0x64010100, @loopback, {[@timestamp_prespec={0x44, 0x24, 0xb6, 0x3, 0x5, [{@rand_addr=0x64010100, 0x6ad6cab9}, {@private=0xa010101, 0x888}, {@multicast2, 0x9}, {@remote, 0x5}]}, @generic={0x44, 0xe, "d27e49b39685baab61c7ea74"}, @end, @generic={0x58, 0xa, "b1fa4d87bf8e5704"}, @timestamp_addr={0x44, 0x14, 0x37, 0x1, 0x9, [{@multicast2, 0xe5}, {@broadcast, 0x8}]}, @rr={0x7, 0x1f, 0x81, [@multicast1, @empty, @remote, @local, @private=0xa010102, @empty, @remote]}, @timestamp={0x44, 0x8, 0xc9, 0x0, 0xa, [0x4a2e]}]}}}}}) (async) pipe2$watch_queue(&(0x7f0000000500), 0x80) (async) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000005c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000800)={0x2e4, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x3}, @WGDEVICE_A_PEERS={0x27c, 0x8, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @multicast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x65, @mcast1, 0x53}}, @WGPEER_A_ALLOWEDIPS={0x124, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2d}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x38}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x1004000}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "15e659c03fad486eb8b89e86867bbaa71bf4ad29f1ae4fc5284bad6aa8a3a36a"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x5, @local, 0x3}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x20, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @empty}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x40}]}, {0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "c5a69fa26e3387e197ef893ce31bb1d46898a7feb8cb012100935f7ec3deed49"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @multicast2}}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x5}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x81}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x8001}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x1}, 0x20008800) (async) openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) (async) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x40202, 0x0) (async) syz_open_dev$vcsu(&(0x7f0000000300), 0x1, 0x0) (async) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x2040, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f0000000440)={'tunl0\x00', r1, 0x80, 0x7, 0x5, 0xffff, {{0x6, 0x4, 0x2, 0x2, 0x18, 0x65, 0x0, 0x4, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@noop, @noop]}}}}}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1d, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf3c1}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0xc, 0x9, 0x1, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0xc, 0x5, 0x2, 0xfffffffffffffff0, 0x4}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2047cdb4}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x7f, &(0x7f00000000c0)=""/127, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xd, 0x9, 0x8001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0x1, r5, 0x1, 0x1, 0x1, r6]}, 0x80) (async) 10:15:09 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:15:09 executing program 3: syz_clone(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 10:15:09 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000140)={0x0, r0}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) 10:15:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:09 executing program 4: r0 = syz_clone(0x80100000, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001d80), 0x2, 0x0) write$binfmt_elf32(r1, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x280000c, 0x10010, r1, 0x8870d000) 10:15:09 executing program 2: bpf$PROG_LOAD(0x9, 0x0, 0x2) (async) r0 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x2, 0x0, 0x23f, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000004c0), &(0x7f00000007c0)) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000200)={'gre0\x00', &(0x7f0000000140)={'syztnl1\x00', 0x0, 0x8, 0x80, 0x80000000, 0x2, {{0x23, 0x4, 0x0, 0x9, 0x8c, 0x67, 0x0, 0x9, 0x2f, 0x0, @rand_addr=0x64010100, @loopback, {[@timestamp_prespec={0x44, 0x24, 0xb6, 0x3, 0x5, [{@rand_addr=0x64010100, 0x6ad6cab9}, {@private=0xa010101, 0x888}, {@multicast2, 0x9}, {@remote, 0x5}]}, @generic={0x44, 0xe, "d27e49b39685baab61c7ea74"}, @end, @generic={0x58, 0xa, "b1fa4d87bf8e5704"}, @timestamp_addr={0x44, 0x14, 0x37, 0x1, 0x9, [{@multicast2, 0xe5}, {@broadcast, 0x8}]}, @rr={0x7, 0x1f, 0x81, [@multicast1, @empty, @remote, @local, @private=0xa010102, @empty, @remote]}, @timestamp={0x44, 0x8, 0xc9, 0x0, 0xa, [0x4a2e]}]}}}}}) (async) pipe2$watch_queue(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$WG_CMD_GET_DEVICE(r2, &(0x7f00000005c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000800)={0x2e4, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@WGDEVICE_A_FWMARK={0x8, 0x7, 0x3}, @WGDEVICE_A_PEERS={0x27c, 0x8, 0x0, 0x1, [{0x1dc, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @multicast1}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x65, @mcast1, 0x53}}, @WGPEER_A_ALLOWEDIPS={0x124, 0x9, 0x0, 0x1, [{0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2d}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x38}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @empty}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @multicast2}}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x7, @dev={0xfe, 0x80, '\x00', 0x3a}, 0x1004000}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "15e659c03fad486eb8b89e86867bbaa71bf4ad29f1ae4fc5284bad6aa8a3a36a"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e23, 0x5, @local, 0x3}}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x20, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @empty}}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x40}]}, {0x7c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "c5a69fa26e3387e197ef893ce31bb1d46898a7feb8cb012100935f7ec3deed49"}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @multicast2}}]}]}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x5}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x81}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x8001}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r1}]}, 0x2e4}, 0x1, 0x0, 0x0, 0x1}, 0x20008800) (async) r3 = openat$vcsa(0xffffffffffffff9c, 0x0, 0x50b00, 0x0) syz_io_uring_setup(0x4655, &(0x7f0000000700)={0x0, 0x0, 0x4, 0x0, 0x23f, 0x0, r3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000780), &(0x7f00000007c0)) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000002c0), 0x40202, 0x0) (async) r5 = syz_open_dev$vcsu(&(0x7f0000000300), 0x1, 0x0) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x2040, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r5, 0x89f0, &(0x7f0000000480)={'ip_vti0\x00', &(0x7f0000000440)={'tunl0\x00', r1, 0x80, 0x7, 0x5, 0xffff, {{0x6, 0x4, 0x2, 0x2, 0x18, 0x65, 0x0, 0x4, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, {[@noop, @noop]}}}}}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1d, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xf3c1}, [@func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0xc, 0x9, 0x1, 0xfffffffffffffff8, 0x10}, @jmp={0x5, 0x0, 0xc, 0x5, 0x2, 0xfffffffffffffff0, 0x4}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x2047cdb4}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x7f, &(0x7f00000000c0)=""/127, 0x41100, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000280)={0x0, 0xd, 0x9, 0x8001}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[r3, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0x1, r5, 0x1, 0x1, 0x1, r6]}, 0x80) 10:15:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x2000029a, 0x5, [@const={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000280)=""/4096, 0x29, 0x1000, 0x1}, 0x20) 10:15:09 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000000140)={0x20080522}, &(0x7f0000000180)={0x9, 0x7, 0xfffffffc, 0x0, 0x9efd, 0x4}) [ 1716.004293][ T3809] FAULT_INJECTION: forcing a failure. [ 1716.004293][ T3809] name failslab, interval 1, probability 0, space 0, times 0 [ 1716.063279][ T3809] CPU: 1 PID: 3809 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1716.073276][ T3809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1716.083343][ T3809] Call Trace: [ 1716.086467][ T3809] [ 1716.089245][ T3809] dump_stack_lvl+0x151/0x1b7 [ 1716.093758][ T3809] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1716.099053][ T3809] dump_stack+0x15/0x17 [ 1716.103045][ T3809] should_fail+0x3c0/0x510 [ 1716.107296][ T3809] __should_failslab+0x9f/0xe0 [ 1716.111897][ T3809] should_failslab+0x9/0x20 [ 1716.116235][ T3809] kmem_cache_alloc+0x4f/0x2f0 [ 1716.120836][ T3809] ? anon_vma_fork+0x1b9/0x4f0 [ 1716.125440][ T3809] anon_vma_fork+0x1b9/0x4f0 [ 1716.129864][ T3809] dup_mmap+0x750/0xea0 [ 1716.133856][ T3809] ? __delayed_free_task+0x20/0x20 [ 1716.138808][ T3809] ? mm_init+0x807/0x960 [ 1716.142881][ T3809] dup_mm+0x91/0x330 [ 1716.146614][ T3809] copy_mm+0x108/0x1b0 [ 1716.150519][ T3809] copy_process+0x1295/0x3250 [ 1716.155034][ T3809] ? proc_fail_nth_write+0x213/0x290 [ 1716.160153][ T3809] ? proc_fail_nth_read+0x220/0x220 [ 1716.165189][ T3809] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1716.170133][ T3809] ? vfs_write+0x9af/0x1050 [ 1716.174471][ T3809] ? vmacache_update+0xb7/0x120 [ 1716.179167][ T3809] kernel_clone+0x22d/0x990 [ 1716.183501][ T3809] ? file_end_write+0x1b0/0x1b0 [ 1716.188184][ T3809] ? __kasan_check_write+0x14/0x20 [ 1716.193134][ T3809] ? create_io_thread+0x1e0/0x1e0 [ 1716.197992][ T3809] ? __mutex_lock_slowpath+0x10/0x10 [ 1716.203114][ T3809] __x64_sys_clone+0x289/0x310 [ 1716.207713][ T3809] ? __do_sys_vfork+0x130/0x130 [ 1716.212401][ T3809] ? debug_smp_processor_id+0x17/0x20 [ 1716.217770][ T3809] do_syscall_64+0x44/0xd0 [ 1716.222023][ T3809] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1716.227750][ T3809] RIP: 0033:0x7f03091130d9 [ 1716.232007][ T3809] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1716.251445][ T3809] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1716.259692][ T3809] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1716.267502][ T3809] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1716.275318][ T3809] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1716.283122][ T3809] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1716.290935][ T3809] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1716.298748][ T3809] [ 1716.403798][ T3809] ================================================================== [ 1716.411701][ T3809] BUG: KASAN: use-after-free in vm_area_free+0x7e/0x230 [ 1716.418470][ T3809] Write of size 4 at addr ffff88810e5b3ac0 by task syz-executor.5/3809 [ 1716.426547][ T3809] [ 1716.428712][ T3809] CPU: 1 PID: 3809 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1716.438693][ T3809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1716.448592][ T3809] Call Trace: [ 1716.451715][ T3809] [ 1716.454493][ T3809] dump_stack_lvl+0x151/0x1b7 [ 1716.459008][ T3809] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1716.464820][ T3809] ? panic+0x727/0x727 [ 1716.468721][ T3809] ? slab_free_freelist_hook+0xc9/0x1a0 [ 1716.474118][ T3809] print_address_description+0x87/0x3d0 [ 1716.479492][ T3809] kasan_report+0x1a6/0x1f0 [ 1716.483825][ T3809] ? vm_area_free+0x7e/0x230 [ 1716.488253][ T3809] ? vm_area_free+0x7e/0x230 [ 1716.492680][ T3809] kasan_check_range+0x2aa/0x2e0 [ 1716.497453][ T3809] __kasan_check_write+0x14/0x20 [ 1716.502230][ T3809] vm_area_free+0x7e/0x230 [ 1716.506488][ T3809] dup_mmap+0xbcd/0xea0 [ 1716.510471][ T3809] ? __delayed_free_task+0x20/0x20 [ 1716.515416][ T3809] ? mm_init+0x807/0x960 [ 1716.519497][ T3809] dup_mm+0x91/0x330 [ 1716.523315][ T3809] copy_mm+0x108/0x1b0 [ 1716.527220][ T3809] copy_process+0x1295/0x3250 [ 1716.531735][ T3809] ? proc_fail_nth_write+0x213/0x290 [ 1716.536855][ T3809] ? proc_fail_nth_read+0x220/0x220 [ 1716.539422][ T3287] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 1716.541884][ T3809] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1716.553429][ T3287] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 1716.558373][ T3809] ? vfs_write+0x9af/0x1050 [ 1716.566624][ T3287] CPU: 0 PID: 3287 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 1716.570963][ T3809] ? vmacache_update+0xb7/0x120 [ 1716.580943][ T3287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 1716.585629][ T3809] kernel_clone+0x22d/0x990 [ 1716.595520][ T3287] RIP: 0010:__rb_erase_color+0x208/0xb60 [ 1716.599868][ T3809] ? file_end_write+0x1b0/0x1b0 [ 1716.605327][ T3287] Code: 00 00 00 00 fc ff df 41 80 3c 07 00 74 08 48 89 df e8 4c e6 2c ff 4c 8b 33 4d 89 f4 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 f7 e8 29 e6 2c ff 41 f6 06 01 48 89 5d [ 1716.610018][ T3809] ? __kasan_check_write+0x14/0x20 [ 1716.629461][ T3287] RSP: 0018:ffffc9000a7bf608 EFLAGS: 00010246 [ 1716.634408][ T3809] ? create_io_thread+0x1e0/0x1e0 [ 1716.640303][ T3287] RAX: dffffc0000000000 RBX: ffff8881276c4e48 RCX: ffff8881079d13c0 [ 1716.645173][ T3809] ? __mutex_lock_slowpath+0x10/0x10 [ 1716.653065][ T3287] RDX: ffffffff81a72020 RSI: ffff88810996b208 RDI: ffff8881276c4e38 [ 1716.658185][ T3809] __x64_sys_clone+0x289/0x310 [ 1716.666000][ T3287] RBP: ffffc9000a7bf668 R08: ffffffff81a701b9 R09: ffffed102132d645 [ 1716.670596][ T3809] ? __do_sys_vfork+0x130/0x130 [ 1716.678404][ T3287] R10: ffffed102132d645 R11: 1ffff1102132d644 R12: 0000000000000000 [ 1716.683179][ T3809] ? debug_smp_processor_id+0x17/0x20 [ 1716.690992][ T3287] R13: ffff8881276c4e38 R14: 0000000000000000 R15: 1ffff11024ed89c9 [ 1716.696197][ T3809] do_syscall_64+0x44/0xd0 [ 1716.704009][ T3287] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1716.708271][ T3809] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1716.717028][ T3287] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1716.722759][ T3809] RIP: 0033:0x7f03091130d9 [ 1716.729177][ T3287] CR2: 00007f8c95fb1058 CR3: 000000012ad72000 CR4: 00000000003506b0 [ 1716.733485][ T3809] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1716.741243][ T3287] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1716.760768][ T3809] RSP: 002b:00007f0307e86118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1716.768579][ T3287] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1716.768594][ T3287] Call Trace: [ 1716.776828][ T3809] RAX: ffffffffffffffda RBX: 00007f0309232f80 RCX: 00007f03091130d9 [ 1716.784638][ T3287] [ 1716.787763][ T3809] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000080102000 [ 1716.795575][ T3287] ? anon_vma_interval_tree_iter_next+0x3b0/0x3b0 [ 1716.798349][ T3809] RBP: 00007f0307e861d0 R08: 0000000000000000 R09: 0000000000000000 [ 1716.806159][ T3287] ? __kasan_check_write+0x14/0x20 [ 1716.812412][ T3809] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1716.820227][ T3287] ? down_write+0xdd/0x140 [ 1716.825171][ T3809] R13: 00007ffc001a390f R14: 00007f0307e86300 R15: 0000000000022000 [ 1716.832983][ T3287] vma_interval_tree_remove+0xa66/0xa80 [ 1716.837239][ T3809] [ 1716.845045][ T3287] unlink_file_vma+0xd9/0xf0 [ 1716.850426][ T3809] [ 1716.850432][ T3809] Allocated by task 3746: [ 1716.853290][ T3287] free_pgtables+0x13b/0x210 [ 1716.857716][ T3809] __kasan_slab_alloc+0xb2/0xe0 [ 1716.859885][ T3287] exit_mmap+0x466/0x7a0 [ 1716.864051][ T3809] kmem_cache_alloc+0x189/0x2f0 [ 1716.868477][ T3287] ? exit_aio+0x270/0x3b0 [ 1716.873164][ T3809] vm_area_dup+0x26/0x1d0 [ 1716.877243][ T3287] ? vm_brk+0x30/0x30 [ 1716.881928][ T3809] dup_mmap+0x6b8/0xea0 [ 1716.886097][ T3287] ? mutex_unlock+0xa2/0x110 [ 1716.890264][ T3809] dup_mm+0x91/0x330 [ 1716.894082][ T3287] ? uprobe_clear_state+0x2c2/0x320 [ 1716.898073][ T3809] copy_mm+0x108/0x1b0 [ 1716.902502][ T3287] __mmput+0x95/0x300 [ 1716.906233][ T3809] copy_process+0x1295/0x3250 [ 1716.911266][ T3287] mmput+0x50/0x60 [ 1716.915177][ T3809] kernel_clone+0x22d/0x990 [ 1716.918989][ T3287] exit_mm+0x50d/0x760 [ 1716.923502][ T3809] __x64_sys_clone+0x289/0x310 [ 1716.927062][ T3287] ? exit_itimers+0x694/0x6e0 [ 1716.931402][ T3809] do_syscall_64+0x44/0xd0 [ 1716.935310][ T3287] ? do_exit+0x24d0/0x24d0 [ 1716.939912][ T3809] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1716.944421][ T3287] ? taskstats_exit+0x3a0/0xa20 [ 1716.948677][ T3809] [ 1716.948682][ T3809] Freed by task 3786: [ 1716.952928][ T3287] do_exit+0x63c/0x24d0 [ 1716.958656][ T3809] kasan_set_track+0x4c/0x70 [ 1716.963340][ T3287] ? ____kasan_slab_free+0x131/0x160 [ 1716.965512][ T3809] kasan_set_free_info+0x23/0x40 [ 1716.969328][ T3287] ? get_task_struct+0x80/0x80 [ 1716.973319][ T3809] ____kasan_slab_free+0x126/0x160 [ 1716.977756][ T3287] do_group_exit+0x13a/0x300 [ 1716.982866][ T3809] __kasan_slab_free+0x11/0x20 [ 1716.987643][ T3287] get_signal+0x77e/0x1600 [ 1716.992244][ T3809] slab_free_freelist_hook+0xc9/0x1a0 [ 1716.997192][ T3287] arch_do_signal_or_restart+0x9f/0x670 [ 1717.001620][ T3809] kmem_cache_free+0x11a/0x2e0 [ 1717.006215][ T3287] ? get_sigframe_size+0x10/0x10 [ 1717.010469][ T3809] vm_area_free+0x1ae/0x230 [ 1717.015784][ T3287] ? force_sig+0x130/0x200 [ 1717.021177][ T3809] exit_mmap+0x5dd/0x7a0 [ 1717.025763][ T3287] ? send_sig+0x60/0x60 [ 1717.030538][ T3809] __mmput+0x95/0x300 [ 1717.034875][ T3287] exit_to_user_mode_loop+0xd4/0x110 [ 1717.039123][ T3809] mmput+0x50/0x60 [ 1717.043205][ T3287] exit_to_user_mode_prepare+0x3b/0x40 [ 1717.047201][ T3809] exit_mm+0x50d/0x760 [ 1717.051030][ T3287] irqentry_exit_to_user_mode+0x9/0x20 [ 1717.056135][ T3809] do_exit+0x63c/0x24d0 [ 1717.059723][ T3287] irqentry_exit+0x12/0x40 [ 1717.064992][ T3809] __ia32_sys_exit+0x0/0x40 [ 1717.068900][ T3287] exc_general_protection+0x310/0x4a0 [ 1717.074183][ T3809] do_syscall_64+0x44/0xd0 [ 1717.078216][ T3287] ? debug_smp_processor_id+0x17/0x20 [ 1717.082431][ T3809] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1717.086773][ T3287] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1717.091981][ T3809] [ 1717.091991][ T3809] The buggy address belongs to the object at ffff88810e5b3a68 [ 1717.091991][ T3809] which belongs to the cache vm_area_struct of size 232 [ 1717.096235][ T3287] ? irqentry_exit+0x12/0x40 [ 1717.101442][ T3809] The buggy address is located 88 bytes inside of [ 1717.101442][ T3809] 232-byte region [ffff88810e5b3a68, ffff88810e5b3b50) [ 1717.107169][ T3287] ? exc_page_fault+0x75/0x1a0 [ 1717.113070][ T3809] The buggy address belongs to the page: [ 1717.113083][ T3809] page:ffffea0004396cc0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10e5b3 [ 1717.115250][ T3287] asm_exc_general_protection+0x27/0x30 [ 1717.129391][ T3809] flags: 0x4000000000000200(slab|zone=1) [ 1717.133811][ T3287] RIP: 0033:0x7f8c95eb80e1 [ 1717.147024][ T3809] raw: 4000000000000200 0000000000000000 0000000200000001 ffff888100275380 [ 1717.151603][ T3287] Code: Unable to access opcode bytes at RIP 0x7f8c95eb80b7. [ 1717.157087][ T3809] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 1717.167149][ T3287] RSP: 002b:0000000020000060 EFLAGS: 00010217 [ 1717.172522][ T3809] page dumped because: kasan: bad access detected [ 1717.177989][ T3287] [ 1717.177996][ T3287] RAX: 0000000000000000 RBX: 00007f8c95fd8050 RCX: 00007f8c95eb80d9 [ 1717.182245][ T3809] page_owner tracks the page as allocated [ 1717.182254][ T3809] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 3305, ts 509910272413, free_ts 509904356095 [ 1717.190668][ T3287] RDX: 0000000020000080 RSI: 0000000020000060 RDI: 0000000001008000 [ 1717.197864][ T3809] post_alloc_hook+0x1ab/0x1b0 [ 1717.206282][ T3287] RBP: 00007f8c95f13ae9 R08: 0000000020000100 R09: 0000000020000100 [ 1717.212202][ T3809] get_page_from_freelist+0x38b/0x400 [ 1717.218517][ T3287] R10: 00000000200000c0 R11: 0000000000000206 R12: 0000000000000000 [ 1717.220690][ T3809] __alloc_pages+0x3a8/0x7c0 [ 1717.228497][ T3287] R13: 00007ffff186277f R14: 00007f8c94c0a300 R15: 0000000000022000 [ 1717.234054][ T3809] allocate_slab+0x62/0x580 [ 1717.250028][ T3287] [ 1717.257834][ T3809] ___slab_alloc+0x2e2/0x6f0 [ 1717.262435][ T3287] Modules linked in: [ 1717.270244][ T3809] __slab_alloc+0x4a/0x90 [ 1717.315035][ T3809] kmem_cache_alloc+0x205/0x2f0 [ 1717.319722][ T3809] vm_area_dup+0x26/0x1d0 [ 1717.323891][ T3809] dup_mmap+0x6b8/0xea0 [ 1717.327877][ T3809] dup_mm+0x91/0x330 [ 1717.331609][ T3809] copy_mm+0x108/0x1b0 [ 1717.335515][ T3809] copy_process+0x1295/0x3250 [ 1717.340030][ T3809] kernel_clone+0x22d/0x990 [ 1717.344370][ T3809] __x64_sys_clone+0x289/0x310 [ 1717.348972][ T3809] do_syscall_64+0x44/0xd0 [ 1717.353220][ T3809] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1717.358966][ T3809] page last free stack trace: [ 1717.363461][ T3809] free_pcp_prepare+0x448/0x450 [ 1717.368154][ T3809] free_unref_page_list+0x16a/0xad0 [ 1717.373189][ T3809] release_pages+0xf3e/0xf90 [ 1717.377608][ T3809] free_pages_and_swap_cache+0x97/0xb0 [ 1717.382903][ T3809] tlb_flush_mmu+0x860/0xa00 [ 1717.387337][ T3809] tlb_finish_mmu+0xd2/0x1f0 [ 1717.391760][ T3809] exit_mmap+0x46e/0x7a0 [ 1717.395838][ T3809] __mmput+0x95/0x300 [ 1717.399655][ T3809] mmput+0x50/0x60 [ 1717.403214][ T3809] exit_mm+0x50d/0x760 [ 1717.407121][ T3809] do_exit+0x63c/0x24d0 [ 1717.411108][ T3809] do_group_exit+0x13a/0x300 [ 1717.415538][ T3809] get_signal+0x77e/0x1600 [ 1717.419795][ T3809] arch_do_signal_or_restart+0x9f/0x670 [ 1717.425173][ T3809] exit_to_user_mode_loop+0xd4/0x110 [ 1717.430304][ T3809] syscall_exit_to_user_mode+0x79/0xc0 [ 1717.435585][ T3809] [ 1717.437762][ T3809] Memory state around the buggy address: [ 1717.443231][ T3809] ffff88810e5b3980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1717.448514][ T3287] ---[ end trace 2398dabc1f6ff920 ]--- [ 1717.451124][ T3809] ffff88810e5b3a00: fb fb fb fb fb fc fc fc fc fc fc fc fc fa fb fb [ 1717.451142][ T3809] >ffff88810e5b3a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1717.456490][ T3287] RIP: 0010:__rb_erase_color+0x208/0xb60 [ 1717.464315][ T3809] ^ [ 1717.464332][ T3809] ffff88810e5b3b00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 1717.464343][ T3809] ffff88810e5b3b80: fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1717.464351][ T3809] ================================================================== [ 1717.561659][ T3287] Code: 00 00 00 00 fc ff df 41 80 3c 07 00 74 08 48 89 df e8 4c e6 2c ff 4c 8b 33 4d 89 f4 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 f7 e8 29 e6 2c ff 41 f6 06 01 48 89 5d [ 1717.584210][ T3287] RSP: 0018:ffffc9000a7bf608 EFLAGS: 00010246 [ 1717.590210][ T3287] RAX: dffffc0000000000 RBX: ffff8881276c4e48 RCX: ffff8881079d13c0 [ 1717.598287][ T3287] RDX: ffffffff81a72020 RSI: ffff88810996b208 RDI: ffff8881276c4e38 [ 1717.606112][ T3287] RBP: ffffc9000a7bf668 R08: ffffffff81a701b9 R09: ffffed102132d645 [ 1717.613945][ T3287] R10: ffffed102132d645 R11: 1ffff1102132d644 R12: 0000000000000000 [ 1717.621692][ T3287] R13: ffff8881276c4e38 R14: 0000000000000000 R15: 1ffff11024ed89c9 [ 1717.629556][ T3287] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1717.638310][ T3287] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1717.644717][ T3287] CR2: 00007f661fd2c058 CR3: 000000010c602000 CR4: 00000000003506a0 [ 1717.652512][ T3287] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1717.660349][ T3287] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1717.668177][ T3287] Kernel panic - not syncing: Fatal exception [ 1717.674191][ T3287] Kernel Offset: disabled [ 1717.678316][ T3287] Rebooting in 86400 seconds..