0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xd, 0x4}, {0x80000001, 0x1}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x65, 0xc3, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x10000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x232}, 0x48) 00:43:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000, 0x0, 0x448, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xa) 00:43:58 executing program 5: write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000040)='FROZEN\x00', 0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x61, 0x61, 0x61]}}, &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6c00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000, 0x0, 0x448, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xa) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000, 0x0, 0x448, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xa) (async) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x234}, 0x48) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x11000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000025000000030000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7400}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x12000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x236}, 0x48) 00:43:58 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x40000000, 0x0, 0x448, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0xa) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000025000000030000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000025000000030000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7a00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x18000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc400}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000025000000030000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x25000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x238}, 0x48) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000000)=0x1) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'syzkaller1\x00', 0x600}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x207) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000000)=0x1) (async) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'syzkaller1\x00', 0x600}) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x207) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x23a}, 0x48) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x40000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x36000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}}, &(0x7f00000001c0)=""/207, 0x26, 0xcf, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xfffff}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x43000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) ioctl$TUNGETVNETBE(r0, 0x800454df, &(0x7f0000000000)=0x1) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'syzkaller1\x00', 0x600}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x207) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x23c}, 0x48) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}}, &(0x7f00000001c0)=""/207, 0x26, 0xcf, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}}, &(0x7f00000001c0)=""/207, 0x26, 0xcf, 0x1}, 0x20) (async) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x101) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}}, &(0x7f00000001c0)=""/207, 0x26, 0xcf, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x23e}, 0x48) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x101) (async) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x2000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x48000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xd, 0x4}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x5d, 0xc3, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x240}, 0x48) 00:43:58 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000001c0)="c09ed7f28841f4918517572b1eefe7152e13", &(0x7f0000000600)=""/4096}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000030000000000000c090000000000006100fc6ac053e875c1887d8fb9bed2b8bfcb21fa02bb0144f8a9f3af0962fe22f42b0f590be041bbab6cc5a7843efa2bab0abdc2b9394d71945f39f8fed102d86eade7d6347311d7d287dc9f342ad56ca8c9ad"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000240), 0x6e, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/125, 0x7d}, {&(0x7f0000000400)=""/114, 0x72}], 0x3, &(0x7f0000000480)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x0) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x101) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000040)) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x4c000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x3000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x4, 0x3}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x55, 0xc3, 0x1}, 0x20) 00:43:58 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000001c0)="c09ed7f28841f4918517572b1eefe7152e13", &(0x7f0000000600)=""/4096}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000030000000000000c090000000000006100fc6ac053e875c1887d8fb9bed2b8bfcb21fa02bb0144f8a9f3af0962fe22f42b0f590be041bbab6cc5a7843efa2bab0abdc2b9394d71945f39f8fed102d86eade7d6347311d7d287dc9f342ad56ca8c9ad"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000240), 0x6e, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/125, 0x7d}, {&(0x7f0000000400)=""/114, 0x72}], 0x3, &(0x7f0000000480)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000001c0)="c09ed7f28841f4918517572b1eefe7152e13", &(0x7f0000000600)=""/4096}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000030000000000000c090000000000006100fc6ac053e875c1887d8fb9bed2b8bfcb21fa02bb0144f8a9f3af0962fe22f42b0f590be041bbab6cc5a7843efa2bab0abdc2b9394d71945f39f8fed102d86eade7d6347311d7d287dc9f342ad56ca8c9ad"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000240), 0x6e, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/125, 0x7d}, {&(0x7f0000000400)=""/114, 0x72}], 0x3, &(0x7f0000000480)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x0) (async) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x58082, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\']![-^--%\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x20, &(0x7f0000000180)={&(0x7f0000000100)=""/94, 0x5e, 0x0, &(0x7f0000000040)}}, 0x10) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x242}, 0x48) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x68000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={0xffffffffffffffff, &(0x7f00000001c0)="c09ed7f28841f4918517572b1eefe7152e13", &(0x7f0000000600)=""/4096}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000030000000000000c090000000000006100fc6ac053e875c1887d8fb9bed2b8bfcb21fa02bb0144f8a9f3af0962fe22f42b0f590be041bbab6cc5a7843efa2bab0abdc2b9394d71945f39f8fed102d86eade7d6347311d7d287dc9f342ad56ca8c9ad"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000240), 0x6e, &(0x7f0000000040)=[{&(0x7f00000002c0)=""/140, 0x8c}, {&(0x7f0000000380)=""/125, 0x7d}, {&(0x7f0000000400)=""/114, 0x72}], 0x3, &(0x7f0000000480)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}, 0x0) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x244}, 0x48) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x6c000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x58082, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\']![-^--%\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x20, &(0x7f0000000180)={&(0x7f0000000100)=""/94, 0x5e, 0x0, &(0x7f0000000040)}}, 0x10) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x58082, 0x0) (async) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\']![-^--%\x00') (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x20, &(0x7f0000000180)={&(0x7f0000000100)=""/94, 0x5e, 0x0, &(0x7f0000000040)}}, 0x10) (async) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x33, 0x33, 0x5, [@datasec={0x9, 0x3, 0x0, 0xf, 0x3, [{0x4, 0x5, 0x101}, {0x20005, 0x0, 0x1}, {0x4, 0x101, 0x7f}], "f49b8c"}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x51, 0xc5, 0x1}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00'}, 0x10) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x5000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x74000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x246}, 0x48) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x58082, 0x0) ioctl$TUNDETACHFILTER(r2, 0x401054d6, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\']![-^--%\x00') (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x20, &(0x7f0000000180)={&(0x7f0000000100)=""/94, 0x5e, 0x0, &(0x7f0000000040)}}, 0x10) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x33, 0x33, 0x5, [@datasec={0x9, 0x3, 0x0, 0xf, 0x3, [{0x4, 0x5, 0x101}, {0x20005, 0x0, 0x1}, {0x4, 0x101, 0x7f}], "f49b8c"}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x51, 0xc5, 0x1}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00'}, 0x10) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0x7a000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x248}, 0x48) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x24a}, 0x48) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0xc4000000}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x33, 0x33, 0x5, [@datasec={0x9, 0x3, 0x0, 0xf, 0x3, [{0x4, 0x5, 0x101}, {0x20005, 0x0, 0x1}, {0x4, 0x101, 0x7f}], "f49b8c"}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x51, 0xc5, 0x1}, 0x20) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00'}, 0x10) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x24c}, 0x48) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x8000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x0, 0xffff0f00}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x2) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) openat$cgroup_devices(r0, &(0x7f0000000000)='devices.deny\x00', 0x2, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x24e}, 0x48) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x9000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) (async) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x2) (async) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x250}, 0x48) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000100)=""/150) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) write$cgroup_int(r2, &(0x7f0000000280)=0x9, 0x12) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'wg1\x00', @broadcast}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$TUNSETDEBUG(r3, 0x400454c9, &(0x7f0000000040)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3016, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000001c0)=0x1) mkdirat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x1ff) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x2}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xa000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x252}, 0x48) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xb000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x2) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) openat$cgroup_ro(r0, &(0x7f0000000000)='memory.swap.events\x00', 0x0, 0x0) (async) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000040)=0x2) (async) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000100)=""/150) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (rerun: 32) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) write$cgroup_int(r2, &(0x7f0000000280)=0x9, 0x12) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'wg1\x00', @broadcast}) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) ioctl$TUNSETDEBUG(r3, 0x400454c9, &(0x7f0000000040)) (async, rerun: 64) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3016, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000001c0)=0x1) mkdirat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x1ff) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x3}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x254}, 0x48) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0xb, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x5f, 0x30]}}, &(0x7f00000001c0)=""/197, 0x2a, 0xc5, 0x1000001}, 0x20) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000100)=""/150) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) (async) write$cgroup_int(r2, &(0x7f0000000280)=0x9, 0x12) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000240)={'wg1\x00', @broadcast}) (async, rerun: 64) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (rerun: 64) ioctl$TUNSETDEBUG(r3, 0x400454c9, &(0x7f0000000040)) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3016, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x1}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f00000001c0)=0x1) (async, rerun: 64) mkdirat$cgroup(r2, &(0x7f00000002c0)='syz0\x00', 0x1ff) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x256}, 0x48) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) close(r0) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0xb, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x5f, 0x30]}}, &(0x7f00000001c0)=""/197, 0x2a, 0xc5, 0x1000001}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xd000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x258}, 0x48) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x35, 0xc3, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x6, [@func={0xb, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x5f, 0x30]}}, &(0x7f00000001c0)=""/197, 0x2a, 0xc5, 0x1000001}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x5}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xe000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x25a}, 0x48) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) close(r0) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x10000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x35, 0xc3, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 00:43:58 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) close(r0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, 0xffffffffffffffff) (async) close(r0) (async) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x25c}, 0x48) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x11000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x35, 0xc3, 0x1}, 0x20) 00:43:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f00000001c0)="33471aaa537e7e7f996be6c6da5d6fdcce2080409e3b723abdc6c748391ebb60ab2ebec6d233a42a0c613ae4cd7abf5057bd8d7b2dbabb898f36116428ff466c2e3edf5e199147a6e609ef8188f4eefa6903a2f29cd8b20ebf66af89be8437a336afc4d0d44513d0901bbaf95eafe0f94ad58a3e2ee62f85928d49801987a89ed067f1fb6ea02514b53287866e676d628908b24f38515d02d02b46c5fa55d24b0cefc96ae071d2045a47b6938c7926a109cf876b8f071006c6950595259ddbc70a79e4e53ccb7f4b7a54932773f7d84051d5f496"}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000090100000000006100"/41], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x12000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x8}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)=""/3) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x25e}, 0x48) 00:43:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f00000001c0)="33471aaa537e7e7f996be6c6da5d6fdcce2080409e3b723abdc6c748391ebb60ab2ebec6d233a42a0c613ae4cd7abf5057bd8d7b2dbabb898f36116428ff466c2e3edf5e199147a6e609ef8188f4eefa6903a2f29cd8b20ebf66af89be8437a336afc4d0d44513d0901bbaf95eafe0f94ad58a3e2ee62f85928d49801987a89ed067f1fb6ea02514b53287866e676d628908b24f38515d02d02b46c5fa55d24b0cefc96ae071d2045a47b6938c7926a109cf876b8f071006c6950595259ddbc70a79e4e53ccb7f4b7a54932773f7d84051d5f496"}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000090100000000006100"/41], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)=""/3) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x18000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x9}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x260}, 0x48) 00:43:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x4, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:58 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.events\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r0, &(0x7f00000001c0)="33471aaa537e7e7f996be6c6da5d6fdcce2080409e3b723abdc6c748391ebb60ab2ebec6d233a42a0c613ae4cd7abf5057bd8d7b2dbabb898f36116428ff466c2e3edf5e199147a6e609ef8188f4eefa6903a2f29cd8b20ebf66af89be8437a336afc4d0d44513d0901bbaf95eafe0f94ad58a3e2ee62f85928d49801987a89ed067f1fb6ea02514b53287866e676d628908b24f38515d02d02b46c5fa55d24b0cefc96ae071d2045a47b6938c7926a109cf876b8f071006c6950595259ddbc70a79e4e53ccb7f4b7a54932773f7d84051d5f496"}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000090100000000006100"/41], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x262}, 0x48) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000030000000000000c0900000000000061004d528f7fe5dacb6ca44f4c296fcb30a5a220397cc9f49867e7aa3e7d2b2b69c96263b7fbae2f190f4555b4347f22d09bd01693202c47c9cfdf1698e131657f21e6092ba68ba77190dbaf70157cd4173cb99b9bbda2e59a66fe4effe9a9d4abb593e39c3ba1974687b7d5c4469689f648c9a3020fea894eb807093398a9929087149438491d3763495394c2b2a1d785a10e4009d42e71d2dcab0088452566428a3c476adccb053512952986235edd565bedd36ec56357076b97ad02744b542f1b573de6db8e68b76119322885d63abdc7f5b042f385e0cfa9b46c18f033dd320c1adf691aafa90eda270f7a2aae51e41920af8202f631da2d57c131c0d199f5e66f278a7bb3fd05575ca0c1fd0fbcb3b87d3733cf3b2d832cf99725d8d561f0c95c32b7e1041c7667fb0ab9bfba85938fe3bc958e36e0922805f904c9a018b2290a28625c3f47c1f71bb4b1bd8a39722dd8485fdbb8aa8503ef94fc6e82237f76f82c7eb4bbe63fec3a5ce391727fdc1cbaf6014275457da7f8ebc1955782ad707ccf3ae10c458236ed543322c69879bd378f8a66a229b1ae54fa47be8e9090c8fec228dad67e9d9c61f83325a939c5"], &(0x7f0000000000)=""/211, 0x29, 0xd3, 0x5}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x25000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xa}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)=""/3) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)=""/3) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x36000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x264}, 0x48) 00:43:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xb}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000030000000000000c0900000000000061004d528f7fe5dacb6ca44f4c296fcb30a5a220397cc9f49867e7aa3e7d2b2b69c96263b7fbae2f190f4555b4347f22d09bd01693202c47c9cfdf1698e131657f21e6092ba68ba77190dbaf70157cd4173cb99b9bbda2e59a66fe4effe9a9d4abb593e39c3ba1974687b7d5c4469689f648c9a3020fea894eb807093398a9929087149438491d3763495394c2b2a1d785a10e4009d42e71d2dcab0088452566428a3c476adccb053512952986235edd565bedd36ec56357076b97ad02744b542f1b573de6db8e68b76119322885d63abdc7f5b042f385e0cfa9b46c18f033dd320c1adf691aafa90eda270f7a2aae51e41920af8202f631da2d57c131c0d199f5e66f278a7bb3fd05575ca0c1fd0fbcb3b87d3733cf3b2d832cf99725d8d561f0c95c32b7e1041c7667fb0ab9bfba85938fe3bc958e36e0922805f904c9a018b2290a28625c3f47c1f71bb4b1bd8a39722dd8485fdbb8aa8503ef94fc6e82237f76f82c7eb4bbe63fec3a5ce391727fdc1cbaf6014275457da7f8ebc1955782ad707ccf3ae10c458236ed543322c69879bd378f8a66a229b1ae54fa47be8e9090c8fec228dad67e9d9c61f83325a939c5"], &(0x7f0000000000)=""/211, 0x29, 0xd3, 0x5}, 0x20) 00:43:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x43000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x4, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8db7}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @alu={0x4, 0x0, 0x3, 0x8, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff9}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0xb0, &(0x7f0000000140)=""/176, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xd, 0x8001, 0xfffffffd}, 0x10, 0x238ed, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, r1, 0x1]}, 0x80) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4035, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x9) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=""/211, 0x29, 0xd3, 0x5}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x48000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x266}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4c000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x268}, 0x48) 00:43:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8db7}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @alu={0x4, 0x0, 0x3, 0x8, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff9}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0xb0, &(0x7f0000000140)=""/176, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xd, 0x8001, 0xfffffffd}, 0x10, 0x238ed, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, r1, 0x1]}, 0x80) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4035, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8db7}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @alu={0x4, 0x0, 0x3, 0x8, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff9}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0xb0, &(0x7f0000000140)=""/176, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xd, 0x8001, 0xfffffffd}, 0x10, 0x238ed, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, r1, 0x1]}, 0x80) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4035, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x9) (async) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xd}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x68000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000050000000c0000000c00000005100000030000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x4, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6c000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8db7}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @alu={0x4, 0x0, 0x3, 0x8, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff9}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0xb0, &(0x7f0000000140)=""/176, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xd, 0x8001, 0xfffffffd}, 0x10, 0x238ed, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, r1, 0x1]}, 0x80) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4035, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x9) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00', r0}, 0x10) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_ext={0x1c, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7ff}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8db7}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x3}, @alu={0x4, 0x0, 0x3, 0x8, 0xa, 0xffffffffffffffff, 0xfffffffffffffff0}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffff9}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}]}, &(0x7f0000000100)='GPL\x00', 0x5, 0xb0, &(0x7f0000000140)=""/176, 0x41000, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x0, 0xd, 0x8001, 0xfffffffd}, 0x10, 0x238ed, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, 0xffffffffffffffff, r1, 0x1]}, 0x80) (async) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4035, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x9) (async) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x26a}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xe}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xd, 0x4}, {0x80000001, 0x1}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x65, 0xc3, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x74000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000050000000c0000000c00000005100000030000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x26c}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x10}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x26e}, 0x48) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000050000000c0000000c00000005100000030000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x0, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7a000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x11}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc4000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xd, 0x4}, {0x80000001, 0x1}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x65, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) recvmsg$unix(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/139, 0x8b}, {&(0x7f0000000300)=""/157, 0xfdc7}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="201f00000000000001000000010000eb74203affa02c78cf98a0a83220e7884a8553912b8679882df7cda9a3bfe62d3e66900adcc9f212b214cc7f08f6af72bac4a110a35dfc3f", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xa3}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xffff0f00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x12}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xd, 0x4}, {0x80000001, 0x1}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x65, 0xc3, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x270}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) recvmsg$unix(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/139, 0x8b}, {&(0x7f0000000300)=""/157, 0xfdc7}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="201f00000000000001000000010000eb74203affa02c78cf98a0a83220e7884a8553912b8679882df7cda9a3bfe62d3e66900adcc9f212b214cc7f08f6af72bac4a110a35dfc3f", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xa3}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) (async) recvmsg$unix(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/139, 0x8b}, {&(0x7f0000000300)=""/157, 0xfdc7}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="201f00000000000001000000010000eb74203affa02c78cf98a0a83220e7884a8553912b8679882df7cda9a3bfe62d3e66900adcc9f212b214cc7f08f6af72bac4a110a35dfc3f", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xa3}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x0, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x18}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x272}, 0x48) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x2}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x274}, 0x48) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x0, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x25}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) recvmsg$unix(r0, &(0x7f0000000440)={&(0x7f00000001c0)=@abs, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/139, 0x8b}, {&(0x7f0000000300)=""/157, 0xfdc7}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="201f00000000000001000000010000eb74203affa02c78cf98a0a83220e7884a8553912b8679882df7cda9a3bfe62d3e66900adcc9f212b214cc7f08f6af72bac4a110a35dfc3f", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0xa3}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x276}, 0x48) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x3}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f00000003c0)=0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x604800, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000280)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0x1, &(0x7f00000002c0)="bde4587a375d18a55426bc6e8a0853edaab5a54a1d40d1879f05ce172cdc763387bd27f423bddf1e3c6bff9125307447e3e622494658e03e4776467ce63f5a9ef04d4fcd5866dff1c1423b9bb6b9cc0360bd21b0575f56f8ebf1182db5a5a2cebaa6a9101849d4b83f457ad4740ee013", &(0x7f0000000340)=""/15}, 0x20) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) r2 = getpid() syz_open_procfs$namespace(r2, 0x0) write$cgroup_pid(r1, &(0x7f0000000200)=r2, 0x12) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x36}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/195, 0x0, 0xc3, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x278}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) (async, rerun: 64) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f00000003c0)=0x3) (async, rerun: 64) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x604800, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000280)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0x1, &(0x7f00000002c0)="bde4587a375d18a55426bc6e8a0853edaab5a54a1d40d1879f05ce172cdc763387bd27f423bddf1e3c6bff9125307447e3e622494658e03e4776467ce63f5a9ef04d4fcd5866dff1c1423b9bb6b9cc0360bd21b0575f56f8ebf1182db5a5a2cebaa6a9101849d4b83f457ad4740ee013", &(0x7f0000000340)=""/15}, 0x20) (async, rerun: 64) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) (async, rerun: 64) r2 = getpid() syz_open_procfs$namespace(r2, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000200)=r2, 0x12) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}, {0x0, [0x30, 0x0]}}, &(0x7f0000000080)=""/195, 0x4c, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x43}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x27a}, 0x48) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/195, 0x0, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f00000003c0)=0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x604800, 0x0) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000280)) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0x1, &(0x7f00000002c0)="bde4587a375d18a55426bc6e8a0853edaab5a54a1d40d1879f05ce172cdc763387bd27f423bddf1e3c6bff9125307447e3e622494658e03e4776467ce63f5a9ef04d4fcd5866dff1c1423b9bb6b9cc0360bd21b0575f56f8ebf1182db5a5a2cebaa6a9101849d4b83f457ad4740ee013", &(0x7f0000000340)=""/15}, 0x20) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) r2 = getpid() syz_open_procfs$namespace(r2, 0x0) write$cgroup_pid(r1, &(0x7f0000000200)=r2, 0x12) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000040)) (async) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f00000003c0)=0x3) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x604800, 0x0) (async) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000280)) (async) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000380)={0x1, &(0x7f00000002c0)="bde4587a375d18a55426bc6e8a0853edaab5a54a1d40d1879f05ce172cdc763387bd27f423bddf1e3c6bff9125307447e3e622494658e03e4776467ce63f5a9ef04d4fcd5866dff1c1423b9bb6b9cc0360bd21b0575f56f8ebf1182db5a5a2cebaa6a9101849d4b83f457ad4740ee013", &(0x7f0000000340)=""/15}, 0x20) (async) openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.threads\x00', 0x2, 0x0) (async) getpid() (async) syz_open_procfs$namespace(r2, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000200)=r2, 0x12) (async) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x5}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x48}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/195, 0x0, 0xc3, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x27c}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4c}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000031000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/100, 0x64}], 0x1, &(0x7f0000000240)=""/113, 0x71}, 0x40010100) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}, {0x0, [0x30]}}, &(0x7f0000000080)=""/195, 0x4b, 0xc3, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x27e}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000031000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/100, 0x64}], 0x1, &(0x7f0000000240)=""/113, 0x71}, 0x40010100) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x280}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x68}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x8}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000031000000000000c090000000000006100"], &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/100, 0x64}], 0x1, &(0x7f0000000240)=""/113, 0x71}, 0x40010100) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, &(0x7f0000000080)=""/195, 0x4a, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6c}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x282}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x9}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0xbc, 0x18}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x9, 0xc, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x7}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x15}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @exit, @exit, @map_idx={0x18, 0x6, 0x5, 0x0, 0x6}, @jmp={0x5, 0x1, 0x7, 0xa, 0x4, 0xfffffffffffffff4, 0x10}], &(0x7f0000000240)='GPL\x00', 0x2, 0xd3, &(0x7f0000000280)=""/211, 0x41100, 0x5, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x9, 0x8001, 0x80}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r2, 0xffffffffffffffff]}, 0x80) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x74}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xa}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x284}, 0x48) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) (async) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0xbc, 0x18}, 0xc) (async) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x9, 0xc, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x7}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x15}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @exit, @exit, @map_idx={0x18, 0x6, 0x5, 0x0, 0x6}, @jmp={0x5, 0x1, 0x7, 0xa, 0x4, 0xfffffffffffffff4, 0x10}], &(0x7f0000000240)='GPL\x00', 0x2, 0xd3, &(0x7f0000000280)=""/211, 0x41100, 0x5, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x9, 0x8001, 0x80}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r2, 0xffffffffffffffff]}, 0x80) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7a}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, 0x0, 0x4a, 0x0, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0xbc, 0x18}, 0xc) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x8}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000480)={0x9, 0xc, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x7}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x15}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @exit, @exit, @map_idx={0x18, 0x6, 0x5, 0x0, 0x6}, @jmp={0x5, 0x1, 0x7, 0xa, 0x4, 0xfffffffffffffff4, 0x10}], &(0x7f0000000240)='GPL\x00', 0x2, 0xd3, &(0x7f0000000280)=""/211, 0x41100, 0x5, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000380)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x9, 0x8001, 0x80}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000440)=[r2, 0xffffffffffffffff]}, 0x80) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4, 0x3}, {0xd, 0x4}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x5d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xb}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x286}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc4}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, 0x0, 0x4a, 0x0, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01596374fed0c4eabfa686cd2735b49a0c2c0700000014842e6d59"], &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x288}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x4, 0x3}]}]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x55, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x300}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01596374fed0c4eabfa686cd2735b49a0c2c0700000014842e6d59"], &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01596374fed0c4eabfa686cd2735b49a0c2c0700000014842e6d59"], &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) (async) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xd}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x28a}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x500}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xe}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union={0x0, 0x0, 0x0, 0x5, 0x0, 0x7fffffff}, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, 0x0, 0x4a, 0x0, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01596374fed0c4eabfa686cd2735b49a0c2c0700000014842e6d59"], &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x28c}, 0x48) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x5, [@datasec={0x8, 0x4, 0x0, 0xf, 0x1, [{0x1, 0x8, 0x8}, {0x4, 0x602, 0x8}, {0x2, 0x1, 0x1}, {0x2, 0x6, 0x9b}], "14"}]}, {0x0, [0x0, 0x2e, 0x61]}}, &(0x7f0000000080)=""/197, 0x5d, 0xc5, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x6, 0x40, 0x3, 0x702, 0x1, 0x3, '\x00', 0x0, r0, 0x1, 0x2, 0xb8d, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd40, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x4, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x1, 0x6, 0x2, 0xfffffffffffffff0, 0x10}, @alu={0x7, 0x1, 0x1, 0x7, 0x8, 0x8, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0xa1}]}, &(0x7f0000000240)='GPL\x00', 0x5, 0x31, &(0x7f0000000280)=""/49, 0x41000, 0x1a, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000002c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xc, 0x7, 0x4}, 0x10}, 0x80) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x600}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x28e}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x10}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, &(0x7f0000000080)=""/195, 0x4a, 0xc3}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x290}, 0x48) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x5, [@datasec={0x8, 0x4, 0x0, 0xf, 0x1, [{0x1, 0x8, 0x8}, {0x4, 0x602, 0x8}, {0x2, 0x1, 0x1}, {0x2, 0x6, 0x9b}], "14"}]}, {0x0, [0x0, 0x2e, 0x61]}}, &(0x7f0000000080)=""/197, 0x5d, 0xc5, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x6, 0x40, 0x3, 0x702, 0x1, 0x3, '\x00', 0x0, r0, 0x1, 0x2, 0xb8d, 0xe}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd40, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x4, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x1, 0x6, 0x2, 0xfffffffffffffff0, 0x10}, @alu={0x7, 0x1, 0x1, 0x7, 0x8, 0x8, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0xa1}]}, &(0x7f0000000240)='GPL\x00', 0x5, 0x31, &(0x7f0000000280)=""/49, 0x41000, 0x1a, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000002c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xc, 0x7, 0x4}, 0x10}, 0x80) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, &(0x7f0000000080)=""/195, 0x4a, 0xc3}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x11}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x41, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x700}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, &(0x7f0000000080)=""/195, 0x4a, 0xc3}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x12}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x292}, 0x48) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3d, 0x3d, 0x5, [@datasec={0x8, 0x4, 0x0, 0xf, 0x1, [{0x1, 0x8, 0x8}, {0x4, 0x602, 0x8}, {0x2, 0x1, 0x1}, {0x2, 0x6, 0x9b}], "14"}]}, {0x0, [0x0, 0x2e, 0x61]}}, &(0x7f0000000080)=""/197, 0x5d, 0xc5, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x6, 0x40, 0x3, 0x702, 0x1, 0x3, '\x00', 0x0, r0, 0x1, 0x2, 0xb8d, 0xe}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xd40, 0x0, 0x0, 0x0, 0x5}, [@jmp={0x5, 0x1, 0x0, 0xb, 0x4, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, @alu={0x7, 0x1, 0x1, 0x6, 0x2, 0xfffffffffffffff0, 0x10}, @alu={0x7, 0x1, 0x1, 0x7, 0x8, 0x8, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @call={0x85, 0x0, 0x0, 0xa1}]}, &(0x7f0000000240)='GPL\x00', 0x5, 0x31, &(0x7f0000000280)=""/49, 0x41000, 0x1a, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f00000002c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0xc, 0x7, 0x4}, 0x10}, 0x80) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x900}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {0x43}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x35, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xa00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x294}, 0x48) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@ptr={0x7}]}, {0x0, [0x0, 0x2e, 0x0]}}, &(0x7f0000000500)=""/201, 0x29, 0xc9, 0x3}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x20, &(0x7f0000000240)={&(0x7f00000001c0)=""/103, 0x67, 0x0, &(0x7f0000000040)=""/53, 0x35}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0xa, [@ptr={0x2, 0x0, 0x0, 0x2, 0x2}, @union={0xd, 0x4, 0x0, 0x5, 0x1, 0x4, [{0x3, 0x0, 0x47}, {0x3, 0x3, 0x10001}, {0x1, 0x4, 0x40}, {0x5, 0x5, 0xffff1fa4}]}, @struct={0x9, 0xa, 0x0, 0x4, 0x1, 0x5, [{0x2, 0x5, 0x10001}, {0x10, 0x3, 0x1}, {0x5, 0x4, 0x2}, {0x1, 0x5, 0x4}, {0x7, 0x2, 0x3324ed6d}, {0x10, 0x5}, {0xd, 0x5, 0x400}, {0xb, 0x0, 0x1}, {0xe, 0x0, 0x23d9}, {0xe, 0x4}]}, @typedef={0x2, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x30, 0x0, 0x5f, 0x2e, 0x5f, 0x0, 0x0, 0x61]}}, &(0x7f00000003c0)=""/202, 0xfa, 0xca}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8, 0x3600}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x296}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x18}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x35, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xb00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x25}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8, 0x12}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@ptr={0x7}]}, {0x0, [0x0, 0x2e, 0x0]}}, &(0x7f0000000500)=""/201, 0x29, 0xc9, 0x3}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x20, &(0x7f0000000240)={&(0x7f00000001c0)=""/103, 0x67, 0x0, &(0x7f0000000040)=""/53, 0x35}}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0xa, [@ptr={0x2, 0x0, 0x0, 0x2, 0x2}, @union={0xd, 0x4, 0x0, 0x5, 0x1, 0x4, [{0x3, 0x0, 0x47}, {0x3, 0x3, 0x10001}, {0x1, 0x4, 0x40}, {0x5, 0x5, 0xffff1fa4}]}, @struct={0x9, 0xa, 0x0, 0x4, 0x1, 0x5, [{0x2, 0x5, 0x10001}, {0x10, 0x3, 0x1}, {0x5, 0x4, 0x2}, {0x1, 0x5, 0x4}, {0x7, 0x2, 0x3324ed6d}, {0x10, 0x5}, {0xd, 0x5, 0x400}, {0xb, 0x0, 0x1}, {0xe, 0x0, 0x23d9}, {0xe, 0x4}]}, @typedef={0x2, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x30, 0x0, 0x5f, 0x2e, 0x5f, 0x0, 0x0, 0x61]}}, &(0x7f00000003c0)=""/202, 0xfa, 0xca}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x298}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x36}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x35, 0xc3, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x1000000, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@ptr={0x7}]}, {0x0, [0x0, 0x2e, 0x0]}}, &(0x7f0000000500)=""/201, 0x29, 0xc9, 0x3}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x20, &(0x7f0000000240)={&(0x7f00000001c0)=""/103, 0x67, 0x0, &(0x7f0000000040)=""/53, 0x35}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0xa, [@ptr={0x2, 0x0, 0x0, 0x2, 0x2}, @union={0xd, 0x4, 0x0, 0x5, 0x1, 0x4, [{0x3, 0x0, 0x47}, {0x3, 0x3, 0x10001}, {0x1, 0x4, 0x40}, {0x5, 0x5, 0xffff1fa4}]}, @struct={0x9, 0xa, 0x0, 0x4, 0x1, 0x5, [{0x2, 0x5, 0x10001}, {0x10, 0x3, 0x1}, {0x5, 0x4, 0x2}, {0x1, 0x5, 0x4}, {0x7, 0x2, 0x3324ed6d}, {0x10, 0x5}, {0xd, 0x5, 0x400}, {0xb, 0x0, 0x1}, {0xe, 0x0, 0x23d9}, {0xe, 0x4}]}, @typedef={0x2, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x30, 0x0, 0x5f, 0x2e, 0x5f, 0x0, 0x0, 0x61]}}, &(0x7f00000003c0)=""/202, 0xfa, 0xca}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x29a}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xd00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x43}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x4, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb, 0x700}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x48}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xe00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x29c}, 0x48) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x4, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) close(r2) 00:43:59 executing program 0: write$cgroup_devices(0xffffffffffffffff, &(0x7f00000001c0)={'b', ' *:* ', 'rwm\x00'}, 0xa) r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x3b, 0x101, 0x6, 0x80, 0x1300, 0x1, 0xa7, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x2}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r0, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000600)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000640)=[0x0], &(0x7f0000000680)=[0x0], 0x0, 0x8, &(0x7f00000006c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000700), &(0x7f0000000740), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c00)={0x18, 0x4, &(0x7f0000001000)=ANY=[@ANYBLOB="85000000a700000018270000", @ANYRES32=r1, @ANYBLOB="000000000000000095000000000000003f3a0d497386451da916166e461152dafb9a5797585391dc133f19828f93e339095860db0acd34ba56"], &(0x7f0000000b40)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x1e, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x6, 0x4}, 0x8, 0x10, &(0x7f0000000bc0)={0x3, 0xe, 0x40, 0xbc1e}, 0x10}, 0x80) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r3, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000f00)={0x0, 0xa7, 0x18}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f80)={0x11, 0x6, &(0x7f00000004c0)=@raw=[@call={0x85, 0x0, 0x0, 0x40}, @map_idx_val={0x18, 0x12, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x4}, @generic={0x55, 0x0, 0x0, 0x3ff, 0x8}], &(0x7f0000000e00)='GPL\x00', 0x4eb, 0x14, &(0x7f0000000e40)=""/20, 0x40f00, 0x12, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000e80)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000ec0)={0x1, 0x6, 0x9}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000f40)=[r5]}, 0x80) write$cgroup_pid(r4, &(0x7f0000000740), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x6, 0x3, &(0x7f0000000c80)=ANY=[@ANYBLOB="5d597bf7c43dd6ee794f0eb856bb70edb64d931e17a49f4390a719eaa416c06f07865b75635ef51cd0fd5ff94dc8f0a7841e59aeaeb9ae6cd7eb5c05b1eea4b49c7650e00ef89e33ca8726ed8839462b62ca7dba7b077914e3779d2d607e6975774d90e74d5eba80aa263167e080dd4dc43d5e5a6bfbf4d48acc99446189cddae0795fde1193706aa59baa0b7dcc439a630b4ef07f354a3241c0721505bef386d7b5e683e5532becdca233cad1a20ee1fe627f5da13c083efd7e3ba634ab5d47e717fa3befc28608b29a2d8f3d022cb966ce94fce24316319a9d49dfde3b93cb76de7051fc59675897212f0e43174b9bcffbbdd39835a3e751538213e0930b5b4b3dedac3e3d0d89a7198d4432672b189f5b64beff8221aeb171b9c5186c60113f597874eefe5d92faa0d8352d73657e1aaa051436078a1af431c7f7c5ebfe901dcad530f3c8824e2f6cb3966bf33eacb33cd06c0cbc044413", @ANYRES32=r1, @ANYBLOB="00000000000000008510000002000000"], &(0x7f0000000500)='GPL\x00', 0x8, 0x93, &(0x7f0000000540)=""/147, 0x41100, 0x8, '\x00', r2, 0x8, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000940)={0x3, 0xe, 0x1ff, 0x80}, 0x10, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000980)=[0x1, 0x1, r4]}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r0}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', 0x1}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000200)={0x0, 0x7fffffff, 0x10}, 0xc) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r7, &(0x7f0000000740), 0x12) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000b00)={r7, &(0x7f0000000a40)="444041f97f26260db60edc472a8774c4f9a62f4d00634762b37d7ee1e7e9cc4dcbc695a3e8a8b98157ec64eff81b637929c93c9ea30c8d4f4895dea406cfd9a08136c0106f8906d9deaef2a431d47aba5feb06206533bba6a52fa49b551a29b455064fa4081eb237f36a329236bf82eaad2d8a69f7ccc9", &(0x7f0000000ac0)}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000ac0)=r3, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000400)={r6, &(0x7f0000000240)="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", &(0x7f0000000340)=""/142, 0x4}, 0x20) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4c}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x0, 0x4, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x1100}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x29e}, 0x48) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) close(r2) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x68}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x1200}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x0, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) close(r2) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2a0}, 0x48) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2a2}, 0x48) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x1800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x0, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2401, 0x0) close(r2) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2a4}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6c}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x0, 0x7}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2a6}, 0x48) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x2500}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x3600}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x74}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x5, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}, {0x0, [0x30, 0x0, 0x61]}}, &(0x7f0000000080)=""/195, 0x4d, 0xc3, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7a}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2a8}, 0x48) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}, {0x0, [0x30, 0x0]}}, &(0x7f0000000080)=""/195, 0x4c, 0xc3, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4300}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2aa}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc4}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2401, 0x0) close(0xffffffffffffffff) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}, {0x0, [0x30]}}, &(0x7f0000000080)=""/195, 0x4b, 0xc3, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x300}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2401, 0x0) close(0xffffffffffffffff) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2ac}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4c00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2401, 0x0) close(0xffffffffffffffff) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, &(0x7f0000000080)=""/195, 0x4a, 0xc3, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, 0x0, 0x4a, 0x0, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2ae}, 0x48) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x500}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2401, 0x0) close(r2) 00:43:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6c00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2b0}, 0x48) 00:43:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x600}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:43:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, 0x0, 0x4a, 0x0, 0x1}, 0x20) 00:43:59 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2401, 0x0) close(r2) 00:43:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7400}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2b2}, 0x48) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x700}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2b4}, 0x48) 00:44:00 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2401, 0x0) close(r2) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, 0x0, 0x4a, 0x0, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x900}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7a00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2b6}, 0x48) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, &(0x7f0000000080)=""/195, 0x4a, 0xc3}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xa00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2401, 0x0) close(r1) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc400}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2b8}, 0x48) 00:44:00 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2401, 0x0) close(r1) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xb00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x40000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2ba}, 0x48) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, &(0x7f0000000080)=""/195, 0x4a, 0xc3}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x46, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2bc}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xfffff}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: getpid() r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(r0) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xd00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}, @union, @func_proto]}}, &(0x7f0000000080)=""/195, 0x4a, 0xc3}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}, {}]}]}}, &(0x7f0000000080)=""/197, 0x3e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2be}, 0x48) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(r0) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xe00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2c0}, 0x48) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x2000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x1100}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(r0) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x3000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x1200}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2c2}, 0x48) 00:44:00 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(r0) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2c4}, 0x48) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x1800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(r0) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) close(0xffffffffffffffff) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x5000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x2500}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2c6}, 0x48) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(r0) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x3600}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) close(0xffffffffffffffff) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(r0) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4300}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2c8}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2ca}, 0x48) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) close(0xffffffffffffffff) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(r0) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2cc}, 0x48) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2401, 0x0) close(r0) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x8000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x9000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4c00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2ce}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xa000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2401, 0x0) close(r0) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2401, 0x0) close(r0) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2d0}, 0x48) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xb000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2d2}, 0x48) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6c00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(0xffffffffffffffff) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2d4}, 0x48) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7400}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xd000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xe000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(0xffffffffffffffff) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2d6}, 0x48) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7a00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2d8}, 0x48) 00:44:00 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) close(0xffffffffffffffff) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 00:44:00 executing program 4: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x10000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc400}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: getpid() r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:44:00 executing program 5: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$TUNSETLINK(r1, 0x400454cd, 0x302) close(0xffffffffffffffff) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2da}, 0x48) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x40000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x11000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:44:00 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2dc}, 0x48) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x12000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xfffff}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2de}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x18000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x25000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e0}, 0x48) 00:44:00 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x2000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:44:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xde020000}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x36000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e2}, 0x48) 00:44:00 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x43000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e4}, 0x48) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x3000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x48000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e6}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x4c000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x5000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x68000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e8}, 0x48) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xd4010000}, 0x48) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2ea}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x6c000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2ec}, 0x48) 00:44:00 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x8000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x74000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2ee}, 0x48) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x9000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x7a000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0x88, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x0, 0x4, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xc4000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xa000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2f0}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xffff0f00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xb000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0x88, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2f2}, 0x48) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0x88, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2f4}, 0x48) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1000000}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xd000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x2}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2f6}, 0x48) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x3}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xe000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1000000}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x10000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x1000000}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2f8}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x11000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2fa}, 0x48) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x12000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x5}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x18000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2fc}, 0x48) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2fe}, 0x48) 00:44:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x25000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x300}, 0x48) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x302}, 0x48) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x8}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x36000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x9}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x43000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x304}, 0x48) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x48000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4c000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xa}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x306}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0x88, 0x0, [{0xb}, {0x8}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x46, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x0, 0x43, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x68000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xb}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x308}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0x88, 0x0, [{0xb}, {0x8}, {}]}]}}, &(0x7f0000000080)=""/197, 0x3e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6c000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x0, 0x43, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x74000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x30a}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, 0x0, 0x36, 0x0, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x0, 0x43, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0x88, 0x0, [{0xb}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xd}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7a000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xe}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x30c}, 0x48) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x88, 0x0, [{0xb}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc4000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x36, 0xc5}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x10}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xffff0f00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x30e}, 0x48) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x11}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x12}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x310}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x18}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x25}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x316}, 0x48) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x2}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x88, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x36}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x3}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x318}, 0x48) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x88, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x31e}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x43}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x48}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x320}, 0x48) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x88, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x5}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x326}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4c}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x88, 0x0, [{}]}]}}, 0x0, 0x2e, 0x0, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x68}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x328}, 0x48) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6c}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x32e}, 0x48) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x88, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x330}, 0x48) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x74}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x88, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7a}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x336}, 0x48) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x9}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc4}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x338}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x300}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x88, 0x0, [{}]}]}}, &(0x7f0000000080)=""/197, 0x2e, 0xc5}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x33c}, 0x48) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xa}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xb}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x33e}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000080)=""/197, 0x1a, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x500}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x340}, 0x48) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x600}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xd}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x344}, 0x48) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xe}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x700}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x346}, 0x48) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x43}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x10}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x900}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x348}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x10000000, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xa00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x34c}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x11}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x3, 0x0, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xb00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xbe010000}, 0x48) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x12}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x34e}, 0x48) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xbc020000}, 0x48) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x350}, 0x48) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x18}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x354}, 0x48) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xd00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x25}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='udp_fail_queue_rcv_skb\x00'}, 0x10) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x20080fffe) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x356}, 0x48) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000080)=""/197, 0x0, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xe00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x40042409, 0x80ffff) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x36}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x358}, 0x48) 00:44:01 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x193) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80ffff) r2 = syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x3, 0x0, 0x80, 0x4, 0x0, 0x4, 0x100, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040)}, 0x2, 0x5, 0x4, 0x3, 0x3, 0x7, 0x5, 0x0, 0x1, 0x0, 0x9}, r2, 0x6, r1, 0x1) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x1100}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x35c}, 0x48) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x43}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x35e}, 0x48) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x1d, 0xc5, 0x1}, 0x20) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x1200}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x48}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x193) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80ffff) r2 = syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x3, 0x0, 0x80, 0x4, 0x0, 0x4, 0x100, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040)}, 0x2, 0x5, 0x4, 0x3, 0x3, 0x7, 0x5, 0x0, 0x1, 0x0, 0x9}, r2, 0x6, r1, 0x1) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x360}, 0x48) 00:44:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 1) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4c}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x0, 0x2, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x1800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x68}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:01 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x364}, 0x48) 00:44:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x0, 0x2, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x2500}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2664.374801][ T6612] FAULT_INJECTION: forcing a failure. [ 2664.374801][ T6612] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2664.401596][ T6612] CPU: 1 PID: 6612 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2664.411588][ T6612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2664.421482][ T6612] Call Trace: [ 2664.424604][ T6612] [ 2664.427384][ T6612] dump_stack_lvl+0x151/0x1b7 [ 2664.431895][ T6612] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2664.437192][ T6612] dump_stack+0x15/0x17 [ 2664.441195][ T6612] should_fail+0x3c0/0x510 [ 2664.445436][ T6612] should_fail_usercopy+0x1a/0x20 [ 2664.450296][ T6612] _copy_from_user+0x20/0xd0 [ 2664.454722][ T6612] __sys_bpf+0x1f6/0x750 [ 2664.458801][ T6612] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2664.464009][ T6612] ? debug_smp_processor_id+0x17/0x20 [ 2664.469215][ T6612] __x64_sys_bpf+0x7c/0x90 [ 2664.473468][ T6612] do_syscall_64+0x44/0xd0 [ 2664.477723][ T6612] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2664.483450][ T6612] RIP: 0033:0x7f70119b30c9 [ 2664.487703][ T6612] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2664.507147][ T6612] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2664.515392][ T6612] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x366}, 0x48) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6c}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x193) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80ffff) r2 = syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x3, 0x0, 0x80, 0x4, 0x0, 0x4, 0x100, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000040)}, 0x2, 0x5, 0x4, 0x3, 0x3, 0x7, 0x5, 0x0, 0x1, 0x0, 0x9}, r2, 0x6, r1, 0x1) 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x368}, 0x48) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x0, 0x2, 0x0, 0xc, 0x9}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 2) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x3600}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x74}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2664.523199][ T6612] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2664.531012][ T6612] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2664.538823][ T6612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2664.546634][ T6612] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2664.554453][ T6612] 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4300}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x36c}, 0x48) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) [ 2664.609753][ T6642] FAULT_INJECTION: forcing a failure. [ 2664.609753][ T6642] name failslab, interval 1, probability 0, space 0, times 0 [ 2664.636304][ T6642] CPU: 0 PID: 6642 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2664.646296][ T6642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2664.656185][ T6642] Call Trace: [ 2664.659312][ T6642] [ 2664.662110][ T6642] dump_stack_lvl+0x151/0x1b7 [ 2664.666599][ T6642] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2664.671892][ T6642] ? cred_has_capability+0x2ca/0x420 [ 2664.677027][ T6642] dump_stack+0x15/0x17 [ 2664.681006][ T6642] should_fail+0x3c0/0x510 [ 2664.685259][ T6642] ? btf_new_fd+0x11b/0x900 [ 2664.689597][ T6642] __should_failslab+0x9f/0xe0 [ 2664.694199][ T6642] should_failslab+0x9/0x20 [ 2664.698540][ T6642] kmem_cache_alloc_trace+0x4a/0x310 [ 2664.703662][ T6642] btf_new_fd+0x11b/0x900 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x36e}, 0x48) 00:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x193) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80ffff) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") [ 2664.707825][ T6642] bpf_btf_load+0x6f/0x90 [ 2664.711990][ T6642] __sys_bpf+0x514/0x750 [ 2664.716069][ T6642] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2664.721281][ T6642] ? debug_smp_processor_id+0x17/0x20 [ 2664.726485][ T6642] __x64_sys_bpf+0x7c/0x90 [ 2664.730735][ T6642] do_syscall_64+0x44/0xd0 [ 2664.734993][ T6642] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2664.740718][ T6642] RIP: 0033:0x7f70119b30c9 [ 2664.744974][ T6642] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2664.764418][ T6642] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2664.772658][ T6642] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2664.780474][ T6642] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2664.788282][ T6642] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2664.796092][ T6642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7a}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 3) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4c00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc4}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x370}, 0x48) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) [ 2664.803903][ T6642] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2664.811719][ T6642] 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6800}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x300}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2664.862597][ T6679] FAULT_INJECTION: forcing a failure. [ 2664.862597][ T6679] name failslab, interval 1, probability 0, space 0, times 0 [ 2664.889112][ T6679] CPU: 1 PID: 6679 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2664.899099][ T6679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2664.908997][ T6679] Call Trace: [ 2664.912118][ T6679] [ 2664.914899][ T6679] dump_stack_lvl+0x151/0x1b7 [ 2664.919408][ T6679] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2664.924705][ T6679] dump_stack+0x15/0x17 [ 2664.928691][ T6679] should_fail+0x3c0/0x510 [ 2664.932947][ T6679] ? btf_new_fd+0x28f/0x900 [ 2664.937294][ T6679] __should_failslab+0x9f/0xe0 [ 2664.941886][ T6679] should_failslab+0x9/0x20 [ 2664.946227][ T6679] kmem_cache_alloc_trace+0x4a/0x310 [ 2664.951348][ T6679] ? btf_new_fd+0x11b/0x900 [ 2664.955687][ T6679] btf_new_fd+0x28f/0x900 [ 2664.959853][ T6679] bpf_btf_load+0x6f/0x90 [ 2664.964020][ T6679] __sys_bpf+0x514/0x750 [ 2664.968098][ T6679] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2664.973307][ T6679] ? debug_smp_processor_id+0x17/0x20 [ 2664.978513][ T6679] __x64_sys_bpf+0x7c/0x90 [ 2664.982765][ T6679] do_syscall_64+0x44/0xd0 [ 2664.987018][ T6679] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2664.992745][ T6679] RIP: 0033:0x7f70119b30c9 [ 2664.997002][ T6679] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2665.016443][ T6679] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2665.024687][ T6679] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2665.032499][ T6679] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2665.040308][ T6679] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2665.048121][ T6679] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 00:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x193) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80ffff) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x374}, 0x48) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x500}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6c00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2665.055929][ T6679] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2665.063747][ T6679] 00:44:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 4) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x376}, 0x48) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x600}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7400}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x193) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x378}, 0x48) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5, 0x1}, 0x20) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7a00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc400}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x700}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x37c}, 0x48) [ 2665.146336][ T6703] FAULT_INJECTION: forcing a failure. [ 2665.146336][ T6703] name failslab, interval 1, probability 0, space 0, times 0 [ 2665.213784][ T6703] CPU: 1 PID: 6703 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2665.223774][ T6703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2665.233670][ T6703] Call Trace: [ 2665.236792][ T6703] [ 2665.239567][ T6703] dump_stack_lvl+0x151/0x1b7 [ 2665.244083][ T6703] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2665.249385][ T6703] dump_stack+0x15/0x17 [ 2665.253369][ T6703] should_fail+0x3c0/0x510 [ 2665.257623][ T6703] ? kvmalloc_node+0x82/0x130 [ 2665.262135][ T6703] __should_failslab+0x9f/0xe0 [ 2665.266736][ T6703] should_failslab+0x9/0x20 [ 2665.271073][ T6703] __kmalloc+0x6d/0x350 [ 2665.275069][ T6703] ? __kasan_kmalloc+0x9/0x10 [ 2665.279579][ T6703] kvmalloc_node+0x82/0x130 [ 2665.283920][ T6703] btf_new_fd+0x2cb/0x900 [ 2665.288089][ T6703] bpf_btf_load+0x6f/0x90 [ 2665.292253][ T6703] __sys_bpf+0x514/0x750 [ 2665.296332][ T6703] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2665.301562][ T6703] ? debug_smp_processor_id+0x17/0x20 [ 2665.306744][ T6703] __x64_sys_bpf+0x7c/0x90 [ 2665.311000][ T6703] do_syscall_64+0x44/0xd0 [ 2665.315250][ T6703] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2665.320978][ T6703] RIP: 0033:0x7f70119b30c9 [ 2665.325230][ T6703] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2665.344678][ T6703] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2665.352922][ T6703] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2665.360738][ T6703] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2665.368540][ T6703] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2665.376352][ T6703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2665.384166][ T6703] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2665.391978][ T6703] 00:44:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 5) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x900}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x40000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x37e}, 0x48) 00:44:02 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:02 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x380}, 0x48) 00:44:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xa00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xfffff}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x1000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xb00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2665.497473][ T6731] FAULT_INJECTION: forcing a failure. [ 2665.497473][ T6731] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2665.538011][ T6731] CPU: 0 PID: 6731 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2665.548006][ T6731] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2665.557901][ T6731] Call Trace: [ 2665.561022][ T6731] [ 2665.563806][ T6731] dump_stack_lvl+0x151/0x1b7 [ 2665.568314][ T6731] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2665.573615][ T6731] dump_stack+0x15/0x17 [ 2665.577600][ T6731] should_fail+0x3c0/0x510 [ 2665.581854][ T6731] should_fail_usercopy+0x1a/0x20 [ 2665.586713][ T6731] _copy_from_user+0x20/0xd0 [ 2665.591141][ T6731] btf_new_fd+0x35b/0x900 [ 2665.595306][ T6731] bpf_btf_load+0x6f/0x90 [ 2665.599471][ T6731] __sys_bpf+0x514/0x750 [ 2665.603549][ T6731] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2665.608758][ T6731] ? debug_smp_processor_id+0x17/0x20 [ 2665.613963][ T6731] __x64_sys_bpf+0x7c/0x90 [ 2665.618216][ T6731] do_syscall_64+0x44/0xd0 [ 2665.622468][ T6731] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2665.628195][ T6731] RIP: 0033:0x7f70119b30c9 [ 2665.632449][ T6731] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2665.651891][ T6731] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2665.660134][ T6731] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2665.667945][ T6731] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2665.675755][ T6731] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 00:44:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 6) 00:44:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x384}, 0x48) 00:44:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x2000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xd00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x3000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) [ 2665.683567][ T6731] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2665.691379][ T6731] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2665.699193][ T6731] 00:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x386}, 0x48) 00:44:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xe00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) [ 2665.743570][ T6756] FAULT_INJECTION: forcing a failure. [ 2665.743570][ T6756] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2665.765732][ T6756] CPU: 0 PID: 6756 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2665.775735][ T6756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2665.785624][ T6756] Call Trace: [ 2665.788746][ T6756] [ 2665.791522][ T6756] dump_stack_lvl+0x151/0x1b7 [ 2665.796036][ T6756] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2665.801328][ T6756] dump_stack+0x15/0x17 [ 2665.805316][ T6756] should_fail+0x3c0/0x510 [ 2665.809578][ T6756] should_fail_usercopy+0x1a/0x20 [ 2665.814430][ T6756] _copy_to_user+0x20/0x90 [ 2665.818685][ T6756] bpf_verifier_vlog+0x1a1/0x330 [ 2665.823457][ T6756] __btf_verifier_log+0xd1/0x120 [ 2665.828231][ T6756] ? btf_parse_hdr+0x2c7/0x7e0 [ 2665.832833][ T6756] ? btf_check_sec_info+0x500/0x500 [ 2665.837866][ T6756] ? btf_parse_hdr+0x1e9/0x7e0 [ 2665.842464][ T6756] ? memcpy+0x56/0x70 [ 2665.846282][ T6756] btf_parse_hdr+0x31d/0x7e0 [ 2665.850711][ T6756] btf_new_fd+0x3e8/0x900 [ 2665.854878][ T6756] bpf_btf_load+0x6f/0x90 [ 2665.859041][ T6756] __sys_bpf+0x514/0x750 [ 2665.863122][ T6756] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2665.868332][ T6756] ? debug_smp_processor_id+0x17/0x20 [ 2665.873537][ T6756] __x64_sys_bpf+0x7c/0x90 [ 2665.877792][ T6756] do_syscall_64+0x44/0xd0 [ 2665.882041][ T6756] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2665.887770][ T6756] RIP: 0033:0x7f70119b30c9 [ 2665.892024][ T6756] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2665.911465][ T6756] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2665.919710][ T6756] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2665.927520][ T6756] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2665.935331][ T6756] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 00:44:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 7) 00:44:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x388}, 0x48) 00:44:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x28, 0xc5, 0x1}, 0x20) 00:44:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x1100}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2665.943141][ T6756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2665.950953][ T6756] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2665.958769][ T6756] 00:44:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x5000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x1200}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x38c}, 0x48) [ 2666.018595][ T6779] FAULT_INJECTION: forcing a failure. [ 2666.018595][ T6779] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2666.042962][ T6779] CPU: 1 PID: 6779 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2666.052944][ T6779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2666.062851][ T6779] Call Trace: [ 2666.065962][ T6779] [ 2666.068749][ T6779] dump_stack_lvl+0x151/0x1b7 [ 2666.073254][ T6779] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2666.078549][ T6779] dump_stack+0x15/0x17 [ 2666.082538][ T6779] should_fail+0x3c0/0x510 [ 2666.086795][ T6779] should_fail_usercopy+0x1a/0x20 [ 2666.091653][ T6779] _copy_to_user+0x20/0x90 [ 2666.095904][ T6779] bpf_verifier_vlog+0x1a1/0x330 [ 2666.100684][ T6779] __btf_verifier_log+0xd1/0x120 [ 2666.105453][ T6779] ? bpf_verifier_vlog+0x1ae/0x330 [ 2666.110408][ T6779] ? btf_check_sec_info+0x500/0x500 [ 2666.115431][ T6779] ? btf_parse_hdr+0x1e9/0x7e0 [ 2666.120032][ T6779] ? memcpy+0x56/0x70 [ 2666.123853][ T6779] btf_parse_hdr+0x349/0x7e0 [ 2666.128278][ T6779] btf_new_fd+0x3e8/0x900 [ 2666.132444][ T6779] bpf_btf_load+0x6f/0x90 [ 2666.136607][ T6779] __sys_bpf+0x514/0x750 [ 2666.140689][ T6779] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2666.145902][ T6779] ? debug_smp_processor_id+0x17/0x20 [ 2666.151106][ T6779] __x64_sys_bpf+0x7c/0x90 [ 2666.155359][ T6779] do_syscall_64+0x44/0xd0 [ 2666.159612][ T6779] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2666.165337][ T6779] RIP: 0033:0x7f70119b30c9 [ 2666.169590][ T6779] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2666.189033][ T6779] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2666.197277][ T6779] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2666.205089][ T6779] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 00:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x38e}, 0x48) 00:44:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:44:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 8) 00:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x390}, 0x48) 00:44:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 00:44:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x1800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 4: syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") [ 2666.212906][ T6779] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2666.220710][ T6779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2666.228529][ T6779] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2666.236335][ T6779] 00:44:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x394}, 0x48) 00:44:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x2500}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:03 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x396}, 0x48) [ 2666.262947][ T6801] FAULT_INJECTION: forcing a failure. [ 2666.262947][ T6801] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2666.291804][ T6801] CPU: 1 PID: 6801 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2666.301794][ T6801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2666.311688][ T6801] Call Trace: [ 2666.314811][ T6801] [ 2666.317601][ T6801] dump_stack_lvl+0x151/0x1b7 [ 2666.322104][ T6801] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2666.327397][ T6801] dump_stack+0x15/0x17 [ 2666.331389][ T6801] should_fail+0x3c0/0x510 [ 2666.335647][ T6801] should_fail_usercopy+0x1a/0x20 [ 2666.340499][ T6801] _copy_to_user+0x20/0x90 [ 2666.344751][ T6801] bpf_verifier_vlog+0x1a1/0x330 [ 2666.349527][ T6801] __btf_verifier_log+0xd1/0x120 [ 2666.354299][ T6801] ? bpf_verifier_vlog+0x1ae/0x330 [ 2666.359249][ T6801] ? btf_check_sec_info+0x500/0x500 [ 2666.364282][ T6801] ? btf_parse_hdr+0x1e9/0x7e0 [ 2666.368891][ T6801] ? memcpy+0x56/0x70 [ 2666.372698][ T6801] btf_parse_hdr+0x375/0x7e0 [ 2666.377127][ T6801] btf_new_fd+0x3e8/0x900 [ 2666.381293][ T6801] bpf_btf_load+0x6f/0x90 [ 2666.385474][ T6801] __sys_bpf+0x514/0x750 [ 2666.389624][ T6801] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2666.394840][ T6801] ? debug_smp_processor_id+0x17/0x20 [ 2666.400041][ T6801] __x64_sys_bpf+0x7c/0x90 [ 2666.404295][ T6801] do_syscall_64+0x44/0xd0 [ 2666.408547][ T6801] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2666.414270][ T6801] RIP: 0033:0x7f70119b30c9 [ 2666.418526][ T6801] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2666.437968][ T6801] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2666.446215][ T6801] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2666.454026][ T6801] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 00:44:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5}, 0x20) 00:44:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x8000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 9) 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x3600}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x398}, 0x48) 00:44:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5}, 0x20) 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x9000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2666.461837][ T6801] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2666.469648][ T6801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2666.477457][ T6801] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2666.485276][ T6801] [ 2666.534490][ T6823] FAULT_INJECTION: forcing a failure. [ 2666.534490][ T6823] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2666.555844][ T6823] CPU: 1 PID: 6823 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2666.565837][ T6823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2666.575740][ T6823] Call Trace: [ 2666.578857][ T6823] [ 2666.581633][ T6823] dump_stack_lvl+0x151/0x1b7 [ 2666.586150][ T6823] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2666.591531][ T6823] dump_stack+0x15/0x17 [ 2666.595522][ T6823] should_fail+0x3c0/0x510 [ 2666.599784][ T6823] should_fail_usercopy+0x1a/0x20 [ 2666.604634][ T6823] _copy_to_user+0x20/0x90 [ 2666.608888][ T6823] bpf_verifier_vlog+0x1a1/0x330 [ 2666.613661][ T6823] __btf_verifier_log+0xd1/0x120 [ 2666.618435][ T6823] ? bpf_verifier_vlog+0x1ae/0x330 [ 2666.623378][ T6823] ? btf_check_sec_info+0x500/0x500 [ 2666.628416][ T6823] ? btf_parse_hdr+0x1e9/0x7e0 [ 2666.633015][ T6823] ? memcpy+0x56/0x70 [ 2666.636830][ T6823] btf_parse_hdr+0x3a4/0x7e0 [ 2666.641260][ T6823] btf_new_fd+0x3e8/0x900 [ 2666.645426][ T6823] bpf_btf_load+0x6f/0x90 [ 2666.649589][ T6823] __sys_bpf+0x514/0x750 [ 2666.653672][ T6823] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2666.658881][ T6823] ? debug_smp_processor_id+0x17/0x20 [ 2666.664087][ T6823] __x64_sys_bpf+0x7c/0x90 [ 2666.668336][ T6823] do_syscall_64+0x44/0xd0 [ 2666.672589][ T6823] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2666.678321][ T6823] RIP: 0033:0x7f70119b30c9 [ 2666.682577][ T6823] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2666.702015][ T6823] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2666.710257][ T6823] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2666.718069][ T6823] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2666.725883][ T6823] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 00:44:04 executing program 4: syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xa000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x39c}, 0x48) 00:44:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x3, 0x2}]}, {0x0, [0x0, 0x0, 0x61]}}, &(0x7f0000000080)=""/197, 0x29, 0xc5}, 0x20) 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4300}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xb000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 10) 00:44:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x39e}, 0x48) 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2666.733720][ T6823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2666.741504][ T6823] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2666.749318][ T6823] 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3a0}, 0x48) [ 2666.808376][ T6852] FAULT_INJECTION: forcing a failure. [ 2666.808376][ T6852] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2666.851507][ T6852] CPU: 1 PID: 6852 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2666.861501][ T6852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2666.871396][ T6852] Call Trace: [ 2666.874518][ T6852] [ 2666.877293][ T6852] dump_stack_lvl+0x151/0x1b7 [ 2666.881811][ T6852] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2666.887104][ T6852] dump_stack+0x15/0x17 [ 2666.891091][ T6852] should_fail+0x3c0/0x510 [ 2666.895346][ T6852] should_fail_usercopy+0x1a/0x20 [ 2666.900208][ T6852] _copy_to_user+0x20/0x90 [ 2666.904459][ T6852] bpf_verifier_vlog+0x1a1/0x330 [ 2666.909231][ T6852] __btf_verifier_log+0xd1/0x120 [ 2666.914007][ T6852] ? bpf_verifier_vlog+0x1ae/0x330 [ 2666.918953][ T6852] ? btf_check_sec_info+0x500/0x500 [ 2666.923987][ T6852] ? btf_parse_hdr+0x1e9/0x7e0 [ 2666.928584][ T6852] ? memcpy+0x56/0x70 [ 2666.932403][ T6852] btf_parse_hdr+0x3cf/0x7e0 [ 2666.936838][ T6852] btf_new_fd+0x3e8/0x900 [ 2666.940998][ T6852] bpf_btf_load+0x6f/0x90 [ 2666.945170][ T6852] __sys_bpf+0x514/0x750 [ 2666.949243][ T6852] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2666.954460][ T6852] ? debug_smp_processor_id+0x17/0x20 [ 2666.959671][ T6852] __x64_sys_bpf+0x7c/0x90 [ 2666.963911][ T6852] do_syscall_64+0x44/0xd0 [ 2666.968164][ T6852] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2666.973892][ T6852] RIP: 0033:0x7f70119b30c9 [ 2666.978146][ T6852] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:04 executing program 4: syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4c00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xd000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3a4}, 0x48) 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xe000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2666.997588][ T6852] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2667.005832][ T6852] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2667.013644][ T6852] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2667.021456][ T6852] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2667.029263][ T6852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2667.037074][ T6852] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2667.044893][ T6852] 00:44:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 11) 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3a6}, 0x48) 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6c00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x10000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7400}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3a8}, 0x48) 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x11000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2667.129813][ T6880] FAULT_INJECTION: forcing a failure. [ 2667.129813][ T6880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2667.151773][ T6880] CPU: 1 PID: 6880 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2667.161764][ T6880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2667.171664][ T6880] Call Trace: [ 2667.174778][ T6880] 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7a00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc400}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2667.177558][ T6880] dump_stack_lvl+0x151/0x1b7 [ 2667.182071][ T6880] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2667.187366][ T6880] dump_stack+0x15/0x17 [ 2667.191357][ T6880] should_fail+0x3c0/0x510 [ 2667.195611][ T6880] should_fail_usercopy+0x1a/0x20 [ 2667.200468][ T6880] _copy_to_user+0x20/0x90 [ 2667.204723][ T6880] bpf_verifier_vlog+0x1a1/0x330 [ 2667.209497][ T6880] __btf_verifier_log+0xd1/0x120 [ 2667.214269][ T6880] ? bpf_verifier_vlog+0x1ae/0x330 [ 2667.219217][ T6880] ? btf_check_sec_info+0x500/0x500 [ 2667.224250][ T6880] ? btf_parse_hdr+0x1e9/0x7e0 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x40000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2667.228852][ T6880] ? memcpy+0x56/0x70 [ 2667.232673][ T6880] btf_parse_hdr+0x3fa/0x7e0 [ 2667.237115][ T6880] btf_new_fd+0x3e8/0x900 [ 2667.241261][ T6880] bpf_btf_load+0x6f/0x90 [ 2667.245427][ T6880] __sys_bpf+0x514/0x750 [ 2667.249509][ T6880] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2667.254718][ T6880] ? debug_smp_processor_id+0x17/0x20 [ 2667.259921][ T6880] __x64_sys_bpf+0x7c/0x90 [ 2667.264175][ T6880] do_syscall_64+0x44/0xd0 [ 2667.268426][ T6880] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2667.274156][ T6880] RIP: 0033:0x7f70119b30c9 [ 2667.278409][ T6880] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2667.297854][ T6880] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2667.306094][ T6880] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2667.313909][ T6880] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2667.321718][ T6880] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2667.329528][ T6880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2667.337380][ T6880] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2667.345157][ T6880] 00:44:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 12) 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xfffff}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x12000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3ac}, 0x48) 00:44:04 executing program 0: syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:04 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3ae}, 0x48) 00:44:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x18000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x1000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x2000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x25000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3b0}, 0x48) [ 2667.495104][ T6911] FAULT_INJECTION: forcing a failure. [ 2667.495104][ T6911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2667.554784][ T6911] CPU: 1 PID: 6911 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2667.564780][ T6911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2667.574677][ T6911] Call Trace: [ 2667.577796][ T6911] [ 2667.580585][ T6911] dump_stack_lvl+0x151/0x1b7 [ 2667.585087][ T6911] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2667.590380][ T6911] dump_stack+0x15/0x17 [ 2667.594375][ T6911] should_fail+0x3c0/0x510 [ 2667.598632][ T6911] should_fail_usercopy+0x1a/0x20 [ 2667.603484][ T6911] _copy_to_user+0x20/0x90 [ 2667.607739][ T6911] bpf_verifier_vlog+0x1a1/0x330 [ 2667.612515][ T6911] __btf_verifier_log+0xd1/0x120 [ 2667.617285][ T6911] ? bpf_verifier_vlog+0x1ae/0x330 [ 2667.622236][ T6911] ? btf_check_sec_info+0x500/0x500 [ 2667.627265][ T6911] ? btf_parse_hdr+0x1e9/0x7e0 [ 2667.631867][ T6911] ? memcpy+0x56/0x70 [ 2667.635684][ T6911] btf_parse_hdr+0x425/0x7e0 [ 2667.640110][ T6911] btf_new_fd+0x3e8/0x900 [ 2667.644286][ T6911] bpf_btf_load+0x6f/0x90 [ 2667.648443][ T6911] __sys_bpf+0x514/0x750 [ 2667.652523][ T6911] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2667.657734][ T6911] ? debug_smp_processor_id+0x17/0x20 [ 2667.662936][ T6911] __x64_sys_bpf+0x7c/0x90 [ 2667.667192][ T6911] do_syscall_64+0x44/0xd0 [ 2667.671444][ T6911] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2667.677169][ T6911] RIP: 0033:0x7f70119b30c9 [ 2667.681431][ T6911] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2667.700869][ T6911] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2667.709112][ T6911] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2667.716920][ T6911] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2667.724733][ T6911] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2667.732543][ T6911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2667.740355][ T6911] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2667.748172][ T6911] 00:44:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 13) 00:44:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x3000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3b4}, 0x48) 00:44:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x36000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 0: syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:05 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x43000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3b6}, 0x48) 00:44:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x48000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x5000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x4c000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2668.050466][ T6941] FAULT_INJECTION: forcing a failure. [ 2668.050466][ T6941] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2668.101020][ T6941] CPU: 0 PID: 6941 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2668.111005][ T6941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2668.120902][ T6941] Call Trace: [ 2668.124024][ T6941] [ 2668.126801][ T6941] dump_stack_lvl+0x151/0x1b7 [ 2668.131315][ T6941] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2668.136703][ T6941] dump_stack+0x15/0x17 [ 2668.140686][ T6941] should_fail+0x3c0/0x510 [ 2668.144941][ T6941] should_fail_usercopy+0x1a/0x20 [ 2668.149800][ T6941] _copy_to_user+0x20/0x90 [ 2668.154054][ T6941] bpf_verifier_vlog+0x1a1/0x330 [ 2668.158828][ T6941] __btf_verifier_log+0xd1/0x120 [ 2668.163600][ T6941] ? bpf_verifier_vlog+0x1ae/0x330 [ 2668.168552][ T6941] ? btf_check_sec_info+0x500/0x500 [ 2668.173583][ T6941] ? btf_parse_hdr+0x1e9/0x7e0 [ 2668.178182][ T6941] ? memcpy+0x56/0x70 [ 2668.182000][ T6941] btf_parse_hdr+0x450/0x7e0 [ 2668.186427][ T6941] btf_new_fd+0x3e8/0x900 [ 2668.190595][ T6941] bpf_btf_load+0x6f/0x90 [ 2668.194758][ T6941] __sys_bpf+0x514/0x750 [ 2668.198839][ T6941] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2668.204056][ T6941] ? debug_smp_processor_id+0x17/0x20 [ 2668.209254][ T6941] __x64_sys_bpf+0x7c/0x90 [ 2668.213505][ T6941] do_syscall_64+0x44/0xd0 [ 2668.217760][ T6941] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2668.223486][ T6941] RIP: 0033:0x7f70119b30c9 [ 2668.227742][ T6941] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2668.247183][ T6941] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2668.255425][ T6941] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2668.263238][ T6941] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2668.271049][ T6941] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2668.278861][ T6941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2668.286671][ T6941] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2668.294493][ T6941] 00:44:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 14) 00:44:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x68000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 0: syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3b8}, 0x48) 00:44:05 executing program 4: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x6c000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3bc}, 0x48) 00:44:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3be}, 0x48) 00:44:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x74000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x8000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2668.418129][ T6971] FAULT_INJECTION: forcing a failure. [ 2668.418129][ T6971] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2668.454843][ T6971] CPU: 0 PID: 6971 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2668.464837][ T6971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2668.474728][ T6971] Call Trace: [ 2668.477852][ T6971] [ 2668.480628][ T6971] dump_stack_lvl+0x151/0x1b7 [ 2668.485144][ T6971] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2668.490462][ T6971] dump_stack+0x15/0x17 [ 2668.494432][ T6971] should_fail+0x3c0/0x510 [ 2668.498806][ T6971] should_fail_usercopy+0x1a/0x20 [ 2668.503664][ T6971] _copy_to_user+0x20/0x90 [ 2668.507915][ T6971] bpf_verifier_vlog+0x1a1/0x330 [ 2668.512692][ T6971] __btf_verifier_log+0xd1/0x120 [ 2668.517464][ T6971] ? bpf_verifier_vlog+0x1ae/0x330 [ 2668.522409][ T6971] ? btf_check_sec_info+0x500/0x500 [ 2668.527444][ T6971] ? btf_parse_hdr+0x1e9/0x7e0 [ 2668.532044][ T6971] ? memcpy+0x56/0x70 [ 2668.535864][ T6971] btf_parse_hdr+0x464/0x7e0 [ 2668.540289][ T6971] btf_new_fd+0x3e8/0x900 [ 2668.544458][ T6971] bpf_btf_load+0x6f/0x90 [ 2668.548620][ T6971] __sys_bpf+0x514/0x750 [ 2668.552700][ T6971] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2668.557911][ T6971] ? debug_smp_processor_id+0x17/0x20 [ 2668.563116][ T6971] __x64_sys_bpf+0x7c/0x90 [ 2668.567367][ T6971] do_syscall_64+0x44/0xd0 [ 2668.571620][ T6971] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2668.577347][ T6971] RIP: 0033:0x7f70119b30c9 [ 2668.581707][ T6971] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2668.601147][ T6971] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2668.609391][ T6971] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 00:44:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") [ 2668.617278][ T6971] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2668.625016][ T6971] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2668.632824][ T6971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2668.640641][ T6971] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2668.648457][ T6971] 00:44:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 15) 00:44:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3c0}, 0x48) 00:44:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0x7a000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x9000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xc4000000}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3c4}, 0x48) 00:44:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xa000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xb000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3c6}, 0x48) 00:44:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0x0, 0xffff0f00}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2668.913228][ T7007] FAULT_INJECTION: forcing a failure. [ 2668.913228][ T7007] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2668.963054][ T7007] CPU: 1 PID: 7007 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2668.973047][ T7007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2668.982939][ T7007] Call Trace: [ 2668.986062][ T7007] [ 2668.988840][ T7007] dump_stack_lvl+0x151/0x1b7 [ 2668.993354][ T7007] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2668.998647][ T7007] dump_stack+0x15/0x17 [ 2669.002637][ T7007] should_fail+0x3c0/0x510 [ 2669.006893][ T7007] should_fail_usercopy+0x1a/0x20 [ 2669.011753][ T7007] _copy_to_user+0x20/0x90 [ 2669.016005][ T7007] bpf_verifier_vlog+0x1a1/0x330 [ 2669.020779][ T7007] __btf_verifier_log+0xd1/0x120 [ 2669.025559][ T7007] ? stack_trace_save+0x1f0/0x1f0 [ 2669.030442][ T7007] ? btf_check_sec_info+0x500/0x500 [ 2669.035446][ T7007] ? put_dec+0xd1/0xe0 [ 2669.039357][ T7007] __btf_verifier_log_type+0x4f6/0x7f0 [ 2669.044649][ T7007] ? vsnprintf+0x1fa/0x1ce0 [ 2669.048985][ T7007] ? btf_ref_type_check_meta+0x91/0x570 [ 2669.054366][ T7007] ? sort_r+0x1ef/0x13a0 [ 2669.058447][ T7007] ? btf_int_show+0x2820/0x2820 [ 2669.063132][ T7007] ? vsnprintf+0x1c02/0x1ce0 [ 2669.067562][ T7007] ? btf_sec_info_cmp+0x5c/0x110 [ 2669.072335][ T7007] ? sort_r+0x1387/0x13a0 [ 2669.076500][ T7007] btf_ref_type_check_meta+0x76/0x570 [ 2669.081711][ T7007] btf_check_all_metas+0x398/0xad0 [ 2669.086742][ T7007] btf_parse_type_sec+0x141/0x1c20 [ 2669.091687][ T7007] ? __btf_verifier_log+0x120/0x120 [ 2669.096722][ T7007] ? sort+0x37/0x50 [ 2669.100366][ T7007] ? btf_check_sec_info+0x37d/0x500 [ 2669.105408][ T7007] ? btf_verifier_log+0x2a0/0x2a0 [ 2669.110273][ T7007] ? btf_parse_hdr+0x1e9/0x7e0 [ 2669.114860][ T7007] ? btf_float_log+0x60/0x60 [ 2669.119287][ T7007] ? btf_parse_hdr+0x601/0x7e0 [ 2669.123886][ T7007] ? btf_parse_str_sec+0x224/0x2c0 [ 2669.128833][ T7007] btf_new_fd+0x587/0x900 [ 2669.133001][ T7007] bpf_btf_load+0x6f/0x90 [ 2669.137169][ T7007] __sys_bpf+0x514/0x750 [ 2669.141246][ T7007] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2669.146458][ T7007] ? debug_smp_processor_id+0x17/0x20 [ 2669.151659][ T7007] __x64_sys_bpf+0x7c/0x90 [ 2669.155911][ T7007] do_syscall_64+0x44/0xd0 [ 2669.160162][ T7007] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2669.165895][ T7007] RIP: 0033:0x7f70119b30c9 [ 2669.170144][ T7007] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2669.189590][ T7007] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2669.197833][ T7007] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2669.205680][ T7007] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2669.213460][ T7007] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2669.221264][ T7007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2669.229081][ T7007] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2669.236894][ T7007] 00:44:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 16) 00:44:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:06 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3c8}, 0x48) 00:44:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:06 executing program 4: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3cc}, 0x48) 00:44:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xd000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x2}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2669.520520][ T7016] FAULT_INJECTION: forcing a failure. [ 2669.520520][ T7016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2669.555807][ T7016] CPU: 0 PID: 7016 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2669.565804][ T7016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2669.575699][ T7016] Call Trace: [ 2669.578822][ T7016] [ 2669.581600][ T7016] dump_stack_lvl+0x151/0x1b7 [ 2669.586115][ T7016] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2669.591410][ T7016] dump_stack+0x15/0x17 [ 2669.595398][ T7016] should_fail+0x3c0/0x510 [ 2669.599656][ T7016] should_fail_usercopy+0x1a/0x20 [ 2669.604511][ T7016] _copy_to_user+0x20/0x90 [ 2669.608765][ T7016] bpf_verifier_vlog+0x1a1/0x330 [ 2669.613539][ T7016] btf_verifier_log+0x1f6/0x2a0 00:44:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3ce}, 0x48) 00:44:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xe000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x3}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2669.618226][ T7016] ? __btf_verifier_log+0xd1/0x120 [ 2669.623171][ T7016] ? __btf_verifier_log_type+0x52a/0x7f0 [ 2669.628642][ T7016] ? bpf_btf_find_by_name_kind+0x8f0/0x8f0 [ 2669.634285][ T7016] btf_ref_type_log+0x41/0x60 [ 2669.638797][ T7016] __btf_verifier_log_type+0x583/0x7f0 [ 2669.644090][ T7016] ? vsnprintf+0x1fa/0x1ce0 [ 2669.648429][ T7016] ? btf_ref_type_check_meta+0x91/0x570 [ 2669.653808][ T7016] ? sort_r+0x1ef/0x13a0 [ 2669.657888][ T7016] ? btf_int_show+0x2820/0x2820 [ 2669.662576][ T7016] ? vsnprintf+0x1c02/0x1ce0 [ 2669.667002][ T7016] ? btf_sec_info_cmp+0x5c/0x110 [ 2669.671777][ T7016] ? sort_r+0x1387/0x13a0 [ 2669.675942][ T7016] btf_ref_type_check_meta+0x76/0x570 [ 2669.681153][ T7016] btf_check_all_metas+0x398/0xad0 [ 2669.686097][ T7016] btf_parse_type_sec+0x141/0x1c20 [ 2669.691044][ T7016] ? __btf_verifier_log+0x120/0x120 [ 2669.696078][ T7016] ? sort+0x37/0x50 [ 2669.699721][ T7016] ? btf_check_sec_info+0x37d/0x500 [ 2669.704757][ T7016] ? btf_verifier_log+0x2a0/0x2a0 [ 2669.709618][ T7016] ? btf_parse_hdr+0x1e9/0x7e0 [ 2669.714217][ T7016] ? btf_float_log+0x60/0x60 [ 2669.718644][ T7016] ? btf_parse_hdr+0x601/0x7e0 [ 2669.723244][ T7016] ? btf_parse_str_sec+0x224/0x2c0 [ 2669.728194][ T7016] btf_new_fd+0x587/0x900 [ 2669.732357][ T7016] bpf_btf_load+0x6f/0x90 [ 2669.736522][ T7016] __sys_bpf+0x514/0x750 [ 2669.740604][ T7016] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2669.745810][ T7016] ? debug_smp_processor_id+0x17/0x20 [ 2669.751018][ T7016] __x64_sys_bpf+0x7c/0x90 [ 2669.755267][ T7016] do_syscall_64+0x44/0xd0 [ 2669.759524][ T7016] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2669.765251][ T7016] RIP: 0033:0x7f70119b30c9 [ 2669.769503][ T7016] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2669.788944][ T7016] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2669.797190][ T7016] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2669.805004][ T7016] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2669.812812][ T7016] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2669.820622][ T7016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2669.828434][ T7016] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2669.836247][ T7016] 00:44:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 17) 00:44:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x10000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3d0}, 0x48) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x5}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3d4}, 0x48) 00:44:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x11000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3d6}, 0x48) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2669.964109][ T7043] FAULT_INJECTION: forcing a failure. [ 2669.964109][ T7043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2670.027761][ T7043] CPU: 1 PID: 7043 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2670.037744][ T7043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2670.047643][ T7043] Call Trace: [ 2670.050764][ T7043] [ 2670.053542][ T7043] dump_stack_lvl+0x151/0x1b7 [ 2670.058054][ T7043] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2670.063350][ T7043] dump_stack+0x15/0x17 [ 2670.067342][ T7043] should_fail+0x3c0/0x510 [ 2670.071595][ T7043] should_fail_usercopy+0x1a/0x20 [ 2670.076456][ T7043] _copy_to_user+0x20/0x90 [ 2670.080707][ T7043] bpf_verifier_vlog+0x1a1/0x330 [ 2670.085485][ T7043] __btf_verifier_log+0xd1/0x120 [ 2670.090254][ T7043] ? __btf_verifier_log_type+0x52a/0x7f0 [ 2670.095723][ T7043] ? __btf_verifier_log_type+0x5ad/0x7f0 [ 2670.101189][ T7043] ? btf_check_sec_info+0x500/0x500 [ 2670.106225][ T7043] __btf_verifier_log_type+0x5c7/0x7f0 [ 2670.111522][ T7043] ? vsnprintf+0x1fa/0x1ce0 [ 2670.115856][ T7043] ? btf_ref_type_check_meta+0x91/0x570 [ 2670.121238][ T7043] ? sort_r+0x1ef/0x13a0 [ 2670.125319][ T7043] ? btf_int_show+0x2820/0x2820 [ 2670.130007][ T7043] ? vsnprintf+0x1c02/0x1ce0 [ 2670.134431][ T7043] ? btf_sec_info_cmp+0x5c/0x110 [ 2670.139205][ T7043] ? sort_r+0x1387/0x13a0 [ 2670.143371][ T7043] btf_ref_type_check_meta+0x76/0x570 [ 2670.148580][ T7043] btf_check_all_metas+0x398/0xad0 [ 2670.153527][ T7043] btf_parse_type_sec+0x141/0x1c20 [ 2670.158473][ T7043] ? __btf_verifier_log+0x120/0x120 [ 2670.163507][ T7043] ? sort+0x37/0x50 [ 2670.167151][ T7043] ? btf_check_sec_info+0x37d/0x500 [ 2670.172187][ T7043] ? btf_verifier_log+0x2a0/0x2a0 [ 2670.177045][ T7043] ? btf_parse_hdr+0x1e9/0x7e0 [ 2670.181648][ T7043] ? btf_float_log+0x60/0x60 [ 2670.186074][ T7043] ? btf_parse_hdr+0x601/0x7e0 [ 2670.190676][ T7043] ? btf_parse_str_sec+0x224/0x2c0 [ 2670.195621][ T7043] btf_new_fd+0x587/0x900 [ 2670.199786][ T7043] bpf_btf_load+0x6f/0x90 [ 2670.203950][ T7043] __sys_bpf+0x514/0x750 [ 2670.208030][ T7043] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2670.213238][ T7043] ? debug_smp_processor_id+0x17/0x20 [ 2670.218447][ T7043] __x64_sys_bpf+0x7c/0x90 [ 2670.222698][ T7043] do_syscall_64+0x44/0xd0 [ 2670.226950][ T7043] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2670.232677][ T7043] RIP: 0033:0x7f70119b30c9 [ 2670.236931][ T7043] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2670.256371][ T7043] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2670.264617][ T7043] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2670.272431][ T7043] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2670.280240][ T7043] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2670.288056][ T7043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2670.295865][ T7043] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2670.303677][ T7043] 00:44:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 18) 00:44:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x12000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x8}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3d8}, 0x48) 00:44:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x18000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3dc}, 0x48) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x9}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xa}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x25000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xb}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2670.455583][ T7077] FAULT_INJECTION: forcing a failure. [ 2670.455583][ T7077] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2670.481739][ T7077] CPU: 0 PID: 7077 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2670.491732][ T7077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2670.501627][ T7077] Call Trace: [ 2670.504748][ T7077] [ 2670.507523][ T7077] dump_stack_lvl+0x151/0x1b7 [ 2670.512037][ T7077] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2670.517336][ T7077] dump_stack+0x15/0x17 [ 2670.521328][ T7077] should_fail+0x3c0/0x510 [ 2670.525580][ T7077] should_fail_usercopy+0x1a/0x20 [ 2670.530435][ T7077] _copy_to_user+0x20/0x90 [ 2670.534689][ T7077] bpf_verifier_vlog+0x1a1/0x330 [ 2670.539462][ T7077] __btf_verifier_log_type+0x5f8/0x7f0 [ 2670.544761][ T7077] ? vsnprintf+0x1fa/0x1ce0 [ 2670.549096][ T7077] ? btf_ref_type_check_meta+0x91/0x570 [ 2670.554477][ T7077] ? sort_r+0x1ef/0x13a0 [ 2670.558556][ T7077] ? btf_int_show+0x2820/0x2820 [ 2670.563243][ T7077] ? vsnprintf+0x1c02/0x1ce0 [ 2670.567668][ T7077] ? btf_sec_info_cmp+0x5c/0x110 [ 2670.572442][ T7077] ? sort_r+0x1387/0x13a0 [ 2670.576608][ T7077] btf_ref_type_check_meta+0x76/0x570 [ 2670.581821][ T7077] btf_check_all_metas+0x398/0xad0 [ 2670.586765][ T7077] btf_parse_type_sec+0x141/0x1c20 [ 2670.591711][ T7077] ? __btf_verifier_log+0x120/0x120 [ 2670.596745][ T7077] ? sort+0x37/0x50 [ 2670.600392][ T7077] ? btf_check_sec_info+0x37d/0x500 [ 2670.605426][ T7077] ? btf_verifier_log+0x2a0/0x2a0 [ 2670.610291][ T7077] ? btf_parse_hdr+0x1e9/0x7e0 [ 2670.614896][ T7077] ? btf_float_log+0x60/0x60 [ 2670.619315][ T7077] ? btf_parse_hdr+0x601/0x7e0 [ 2670.623914][ T7077] ? btf_parse_str_sec+0x224/0x2c0 [ 2670.628857][ T7077] btf_new_fd+0x587/0x900 [ 2670.633028][ T7077] bpf_btf_load+0x6f/0x90 [ 2670.637195][ T7077] __sys_bpf+0x514/0x750 [ 2670.641273][ T7077] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2670.646483][ T7077] ? debug_smp_processor_id+0x17/0x20 [ 2670.651685][ T7077] __x64_sys_bpf+0x7c/0x90 [ 2670.655936][ T7077] do_syscall_64+0x44/0xd0 [ 2670.660189][ T7077] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2670.665915][ T7077] RIP: 0033:0x7f70119b30c9 [ 2670.670170][ T7077] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2670.689615][ T7077] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2670.697858][ T7077] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 00:44:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 19) 00:44:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x36000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 0: perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3de}, 0x48) 00:44:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x43000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2670.705670][ T7077] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2670.713482][ T7077] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2670.721292][ T7077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2670.729101][ T7077] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2670.736916][ T7077] 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xd}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xe}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3e0}, 0x48) [ 2670.767181][ T7098] FAULT_INJECTION: forcing a failure. [ 2670.767181][ T7098] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2670.799550][ T7098] CPU: 0 PID: 7098 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x10}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x11}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2670.809544][ T7098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2670.819434][ T7098] Call Trace: [ 2670.822557][ T7098] [ 2670.825333][ T7098] dump_stack_lvl+0x151/0x1b7 [ 2670.829843][ T7098] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2670.835137][ T7098] dump_stack+0x15/0x17 [ 2670.839130][ T7098] should_fail+0x3c0/0x510 [ 2670.843385][ T7098] should_fail_usercopy+0x1a/0x20 [ 2670.848245][ T7098] _copy_to_user+0x20/0x90 [ 2670.852516][ T7098] bpf_verifier_vlog+0x1a1/0x330 [ 2670.857273][ T7098] __btf_verifier_log+0xd1/0x120 [ 2670.862045][ T7098] ? __btf_verifier_log_type+0x52a/0x7f0 [ 2670.867512][ T7098] ? bpf_verifier_vlog+0x1ae/0x330 [ 2670.872458][ T7098] ? btf_check_sec_info+0x500/0x500 [ 2670.877493][ T7098] ? bpf_verifier_vlog+0x1e6/0x330 [ 2670.882440][ T7098] __btf_verifier_log_type+0x621/0x7f0 [ 2670.887736][ T7098] ? vsnprintf+0x1fa/0x1ce0 [ 2670.892072][ T7098] ? btf_ref_type_check_meta+0x91/0x570 [ 2670.897450][ T7098] ? sort_r+0x1ef/0x13a0 [ 2670.901532][ T7098] ? btf_int_show+0x2820/0x2820 [ 2670.906219][ T7098] ? vsnprintf+0x1c02/0x1ce0 [ 2670.910643][ T7098] ? btf_sec_info_cmp+0x5c/0x110 [ 2670.915418][ T7098] ? sort_r+0x1387/0x13a0 [ 2670.919582][ T7098] btf_ref_type_check_meta+0x76/0x570 [ 2670.924791][ T7098] btf_check_all_metas+0x398/0xad0 [ 2670.929739][ T7098] btf_parse_type_sec+0x141/0x1c20 [ 2670.934684][ T7098] ? __btf_verifier_log+0x120/0x120 [ 2670.939718][ T7098] ? sort+0x37/0x50 [ 2670.943364][ T7098] ? btf_check_sec_info+0x37d/0x500 [ 2670.948401][ T7098] ? btf_verifier_log+0x2a0/0x2a0 [ 2670.953260][ T7098] ? btf_parse_hdr+0x1e9/0x7e0 [ 2670.957858][ T7098] ? btf_float_log+0x60/0x60 [ 2670.962288][ T7098] ? btf_parse_hdr+0x601/0x7e0 [ 2670.966884][ T7098] ? btf_parse_str_sec+0x224/0x2c0 [ 2670.971831][ T7098] btf_new_fd+0x587/0x900 [ 2670.975997][ T7098] bpf_btf_load+0x6f/0x90 [ 2670.980163][ T7098] __sys_bpf+0x514/0x750 [ 2670.984244][ T7098] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 2670.989455][ T7098] ? debug_smp_processor_id+0x17/0x20 [ 2670.994657][ T7098] __x64_sys_bpf+0x7c/0x90 [ 2670.998910][ T7098] do_syscall_64+0x44/0xd0 [ 2671.003164][ T7098] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2671.008895][ T7098] RIP: 0033:0x7f70119b30c9 [ 2671.013145][ T7098] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2671.032585][ T7098] RSP: 002b:00007f7010726168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2671.040832][ T7098] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f70119b30c9 [ 2671.048643][ T7098] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000012 [ 2671.056456][ T7098] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2671.064267][ T7098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2671.072075][ T7098] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2671.079888][ T7098] 00:44:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (fail_nth: 20) 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x12}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x48000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3e4}, 0x48) 00:44:08 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:08 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4c000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x18}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3e6}, 0x48) 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x25}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x68000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x36}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2671.473696][ T7143] FAULT_INJECTION: forcing a failure. [ 2671.473696][ T7143] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2671.501762][ T7143] CPU: 0 PID: 7143 Comm: syz-executor.5 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2671.511751][ T7143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2671.521648][ T7143] Call Trace: [ 2671.524777][ T7143] [ 2671.527546][ T7143] dump_stack_lvl+0x151/0x1b7 [ 2671.532060][ T7143] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2671.537355][ T7143] dump_stack+0x15/0x17 [ 2671.541347][ T7143] should_fail+0x3c0/0x510 [ 2671.545610][ T7143] should_fail_usercopy+0x1a/0x20 [ 2671.550457][ T7143] _copy_to_user+0x20/0x90 [ 2671.554710][ T7143] simple_read_from_buffer+0xdd/0x160 [ 2671.559921][ T7143] proc_fail_nth_read+0x1af/0x220 [ 2671.564779][ T7143] ? proc_fault_inject_write+0x3a0/0x3a0 [ 2671.570247][ T7143] ? security_file_permission+0x497/0x5f0 [ 2671.575802][ T7143] ? proc_fault_inject_write+0x3a0/0x3a0 [ 2671.581271][ T7143] vfs_read+0x299/0xd80 [ 2671.585266][ T7143] ? kfree+0xc8/0x210 [ 2671.589078][ T7143] ? kernel_read+0x1f0/0x1f0 [ 2671.593506][ T7143] ? __kasan_check_write+0x14/0x20 [ 2671.598451][ T7143] ? mutex_lock+0xb6/0x130 [ 2671.602706][ T7143] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2671.609132][ T7143] ? __fdget_pos+0x26d/0x310 [ 2671.613552][ T7143] ? ksys_read+0x77/0x2c0 [ 2671.617721][ T7143] ksys_read+0x198/0x2c0 [ 2671.621802][ T7143] ? vfs_write+0x1050/0x1050 [ 2671.626226][ T7143] ? debug_smp_processor_id+0x17/0x20 [ 2671.631434][ T7143] __x64_sys_read+0x7b/0x90 [ 2671.635771][ T7143] do_syscall_64+0x44/0xd0 [ 2671.640027][ T7143] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2671.645754][ T7143] RIP: 0033:0x7f7011964eec [ 2671.650006][ T7143] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2671.669449][ T7143] RSP: 002b:00007f7010726160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2671.677692][ T7143] RAX: ffffffffffffffda RBX: 00007f7011ad2f80 RCX: 00007f7011964eec [ 2671.685516][ T7143] RDX: 000000000000000f RSI: 00007f70107261e0 RDI: 0000000000000003 [ 2671.693315][ T7143] RBP: 00007f70107261d0 R08: 0000000000000000 R09: 0000000000000000 [ 2671.701127][ T7143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2671.708937][ T7143] R13: 00007ffc66711e3f R14: 00007f7010726300 R15: 0000000000022000 [ 2671.716753][ T7143] 00:44:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6c000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3e8}, 0x48) 00:44:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x43}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:09 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x74000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3ec}, 0x48) 00:44:09 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3ee}, 0x48) 00:44:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x48}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4c}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7a000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 4: r0 = perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2401, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.kill\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000100)="5e7b47383e216d3227fa63d13fe90d23c694b61f18ac7961291dfc1cff3845172ab9dfff8fab01c251bf54300302a0ade782097287daf57730f8f6922ba2ee2a1a15c2d90874388be5743df2", 0x4c, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:09 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f0}, 0x48) 00:44:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc4000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)="0e90df89eb6f2a957986737492286b3d1685559ec4590ed7293ff202717bdadbfe249ab83b58c62e2a9416f4fefa0d") 00:44:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xffff0f00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x68}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f4}, 0x48) 00:44:09 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 00:44:09 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f6}, 0x48) 00:44:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6c}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f8}, 0x48) 00:44:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x74}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3fc}, 0x48) 00:44:09 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x2}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7a}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2672.040720][ T7196] FAULT_INJECTION: forcing a failure. [ 2672.040720][ T7196] name failslab, interval 1, probability 0, space 0, times 0 [ 2672.141726][ T7196] CPU: 1 PID: 7196 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2672.151713][ T7196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2672.161611][ T7196] Call Trace: [ 2672.164731][ T7196] [ 2672.167512][ T7196] dump_stack_lvl+0x151/0x1b7 [ 2672.172024][ T7196] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2672.177317][ T7196] ? do_handle_mm_fault+0x142f/0x2370 [ 2672.182528][ T7196] dump_stack+0x15/0x17 [ 2672.186693][ T7196] should_fail+0x3c0/0x510 [ 2672.190945][ T7196] __should_failslab+0x9f/0xe0 [ 2672.195545][ T7196] should_failslab+0x9/0x20 [ 2672.199882][ T7196] kmem_cache_alloc+0x4f/0x2f0 [ 2672.204481][ T7196] ? dup_task_struct+0x53/0xa60 [ 2672.209168][ T7196] ? __kasan_check_write+0x14/0x20 [ 2672.214119][ T7196] dup_task_struct+0x53/0xa60 [ 2672.218628][ T7196] ? __kasan_check_write+0x14/0x20 [ 2672.223577][ T7196] copy_process+0x579/0x3250 [ 2672.228010][ T7196] ? __kasan_check_write+0x14/0x20 [ 2672.232951][ T7196] ? proc_fail_nth_write+0x213/0x290 [ 2672.238081][ T7196] ? proc_fail_nth_read+0x220/0x220 [ 2672.243108][ T7196] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2672.248051][ T7196] ? vfs_write+0x9af/0x1050 [ 2672.252392][ T7196] ? vmacache_update+0xb7/0x120 [ 2672.257096][ T7196] kernel_clone+0x22d/0x990 [ 2672.261423][ T7196] ? file_end_write+0x1b0/0x1b0 [ 2672.266114][ T7196] ? __kasan_check_write+0x14/0x20 [ 2672.271062][ T7196] ? create_io_thread+0x1e0/0x1e0 [ 2672.275912][ T7196] ? __mutex_lock_slowpath+0x10/0x10 [ 2672.281034][ T7196] __x64_sys_clone+0x289/0x310 [ 2672.285633][ T7196] ? __do_sys_vfork+0x130/0x130 [ 2672.290326][ T7196] ? debug_smp_processor_id+0x17/0x20 [ 2672.295529][ T7196] do_syscall_64+0x44/0xd0 [ 2672.299782][ T7196] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2672.305511][ T7196] RIP: 0033:0x7ffbc66bf0c9 [ 2672.309760][ T7196] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2672.329206][ T7196] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2672.337450][ T7196] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2672.345261][ T7196] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2672.353071][ T7196] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2672.360882][ T7196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2672.368692][ T7196] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2672.376507][ T7196] 00:44:10 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 00:44:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x402}, 0x48) 00:44:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x3}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:10 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc4}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:10 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x300}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:10 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x403}, 0x48) 00:44:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x5}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x41c}, 0x48) [ 2672.787123][ T7231] FAULT_INJECTION: forcing a failure. [ 2672.787123][ T7231] name failslab, interval 1, probability 0, space 0, times 0 [ 2672.850035][ T7231] CPU: 1 PID: 7231 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2672.860025][ T7231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2672.869920][ T7231] Call Trace: [ 2672.873043][ T7231] [ 2672.875819][ T7231] dump_stack_lvl+0x151/0x1b7 [ 2672.880333][ T7231] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2672.885627][ T7231] ? __kasan_slab_alloc+0xc4/0xe0 [ 2672.890486][ T7231] ? kmem_cache_alloc+0x189/0x2f0 [ 2672.895349][ T7231] dump_stack+0x15/0x17 [ 2672.899340][ T7231] should_fail+0x3c0/0x510 [ 2672.903596][ T7231] ? __get_vm_area_node+0x13a/0x380 [ 2672.908625][ T7231] __should_failslab+0x9f/0xe0 [ 2672.913225][ T7231] should_failslab+0x9/0x20 [ 2672.917566][ T7231] kmem_cache_alloc_trace+0x4a/0x310 [ 2672.922693][ T7231] __get_vm_area_node+0x13a/0x380 [ 2672.927546][ T7231] __vmalloc_node_range+0xda/0x800 [ 2672.932492][ T7231] ? copy_process+0x579/0x3250 [ 2672.937091][ T7231] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2672.941949][ T7231] ? dup_task_struct+0x53/0xa60 [ 2672.946637][ T7231] dup_task_struct+0x61f/0xa60 [ 2672.951235][ T7231] ? copy_process+0x579/0x3250 [ 2672.955840][ T7231] ? __kasan_check_write+0x14/0x20 [ 2672.960781][ T7231] copy_process+0x579/0x3250 [ 2672.965209][ T7231] ? __kasan_check_write+0x14/0x20 [ 2672.970156][ T7231] ? proc_fail_nth_write+0x213/0x290 [ 2672.975277][ T7231] ? proc_fail_nth_read+0x220/0x220 [ 2672.980313][ T7231] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2672.985258][ T7231] ? vfs_write+0x9af/0x1050 [ 2672.989596][ T7231] ? vmacache_update+0xb7/0x120 [ 2672.994284][ T7231] kernel_clone+0x22d/0x990 [ 2672.998624][ T7231] ? file_end_write+0x1b0/0x1b0 [ 2673.003311][ T7231] ? __kasan_check_write+0x14/0x20 [ 2673.008259][ T7231] ? create_io_thread+0x1e0/0x1e0 [ 2673.013122][ T7231] ? __mutex_lock_slowpath+0x10/0x10 [ 2673.018242][ T7231] __x64_sys_clone+0x289/0x310 [ 2673.022840][ T7231] ? __do_sys_vfork+0x130/0x130 [ 2673.027531][ T7231] ? debug_smp_processor_id+0x17/0x20 [ 2673.032734][ T7231] do_syscall_64+0x44/0xd0 [ 2673.036987][ T7231] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2673.042716][ T7231] RIP: 0033:0x7ffbc66bf0c9 [ 2673.046967][ T7231] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2673.066408][ T7231] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2673.074652][ T7231] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2673.082463][ T7231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2673.090278][ T7231] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2673.098091][ T7231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2673.105902][ T7231] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2673.113715][ T7231] [ 2673.120207][ T7231] syz-executor.4: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 2673.135870][ T7231] CPU: 1 PID: 7231 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2673.145833][ T7231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2673.155730][ T7231] Call Trace: [ 2673.158852][ T7231] [ 2673.161630][ T7231] dump_stack_lvl+0x151/0x1b7 [ 2673.166143][ T7231] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2673.171436][ T7231] ? pr_cont_kernfs_name+0xe6/0x100 [ 2673.176474][ T7231] dump_stack+0x15/0x17 [ 2673.180462][ T7231] warn_alloc+0x242/0x3d0 [ 2673.184631][ T7231] ? zone_watermark_ok_safe+0x280/0x280 [ 2673.190013][ T7231] ? __get_vm_area_node+0x36a/0x380 [ 2673.195047][ T7231] __vmalloc_node_range+0x2be/0x800 [ 2673.200080][ T7231] ? dup_task_struct+0x53/0xa60 [ 2673.204766][ T7231] dup_task_struct+0x61f/0xa60 [ 2673.209365][ T7231] ? copy_process+0x579/0x3250 [ 2673.213966][ T7231] ? __kasan_check_write+0x14/0x20 [ 2673.218912][ T7231] copy_process+0x579/0x3250 [ 2673.223340][ T7231] ? __kasan_check_write+0x14/0x20 [ 2673.228287][ T7231] ? proc_fail_nth_write+0x213/0x290 [ 2673.233405][ T7231] ? proc_fail_nth_read+0x220/0x220 [ 2673.238443][ T7231] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2673.243389][ T7231] ? vfs_write+0x9af/0x1050 [ 2673.247877][ T7231] ? vmacache_update+0xb7/0x120 [ 2673.252501][ T7231] kernel_clone+0x22d/0x990 [ 2673.256839][ T7231] ? file_end_write+0x1b0/0x1b0 [ 2673.261557][ T7231] ? __kasan_check_write+0x14/0x20 [ 2673.266470][ T7231] ? create_io_thread+0x1e0/0x1e0 [ 2673.271329][ T7231] ? __mutex_lock_slowpath+0x10/0x10 [ 2673.276452][ T7231] __x64_sys_clone+0x289/0x310 [ 2673.281087][ T7231] ? __do_sys_vfork+0x130/0x130 [ 2673.285739][ T7231] ? debug_smp_processor_id+0x17/0x20 [ 2673.290946][ T7231] do_syscall_64+0x44/0xd0 [ 2673.295196][ T7231] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2673.300924][ T7231] RIP: 0033:0x7ffbc66bf0c9 [ 2673.305178][ T7231] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2673.324792][ T7231] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2673.333039][ T7231] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2673.340855][ T7231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2673.348659][ T7231] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2673.356471][ T7231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2673.364283][ T7231] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2673.372184][ T7231] [ 2673.376668][ T7231] Mem-Info: [ 2673.379679][ T7231] active_anon:15488 inactive_anon:13796 isolated_anon:0 [ 2673.379679][ T7231] active_file:7314 inactive_file:14912 isolated_file:0 [ 2673.379679][ T7231] unevictable:0 dirty:63 writeback:4190 [ 2673.379679][ T7231] slab_reclaimable:31306 slab_unreclaimable:66482 [ 2673.379679][ T7231] mapped:28611 shmem:15547 pagetables:524 bounce:0 [ 2673.379679][ T7231] kernel_misc_reclaimable:0 [ 2673.379679][ T7231] free:1511628 free_pcp:27532 free_cma:0 [ 2673.422413][ T7231] Node 0 active_anon:61952kB inactive_anon:55184kB active_file:29256kB inactive_file:49148kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114444kB dirty:252kB writeback:60kB shmem:62188kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4292kB pagetables:2096kB all_unreclaimable? no [ 2673.453242][ T7231] DMA32 free:2940340kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982424kB mlocked:0kB bounce:0kB free_pcp:30752kB local_pcp:26456kB free_cma:0kB [ 2673.480431][ T7231] lowmem_reserve[]: 0 3941 3941 [ 2673.485197][ T7231] Normal free:3106172kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:61952kB inactive_anon:55184kB active_file:29256kB inactive_file:35448kB unevictable:0kB writepending:232kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:104172kB local_pcp:52724kB free_cma:0kB [ 2673.514453][ T7231] lowmem_reserve[]: 0 0 0 [ 2673.519020][ T7231] DMA32: 119*4kB (UM) 93*8kB (UM) 81*16kB (UM) 79*32kB (UM) 76*64kB (UM) 66*128kB (UM) 60*256kB (UM) 47*512kB (UM) 27*1024kB (UM) 18*2048kB (UM) 688*4096kB (UM) = 2940340kB 00:44:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x500}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x500}, 0x48) 00:44:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x600}, 0x48) 00:44:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x600}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 00:44:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x601}, 0x48) 00:44:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2673.536335][ T7231] Normal: 15325*4kB (UME) 7581*8kB (UME) 3814*16kB (UME) 3542*32kB (UME) 2272*64kB (UME) 2056*128kB (UME) 1264*256kB (UME) 788*512kB (UME) 389*1024kB (UME) 173*2048kB (UM) 225*4096kB (UE) = 3106172kB [ 2673.555784][ T7231] 31723 total pagecache pages [ 2673.560244][ T7231] 0 pages in swap cache [ 2673.564269][ T7231] Swap cache stats: add 0, delete 0, find 0/0 [ 2673.570138][ T7231] Free swap = 0kB [ 2673.573741][ T7231] Total swap = 0kB [ 2673.577248][ T7231] 2097051 pages RAM [ 2673.580891][ T7231] 0 pages HighMem/MovableOnly [ 2673.585460][ T7231] 342483 pages reserved [ 2673.589399][ T7231] 0 pages cma reserved [ 2673.628012][ T7259] FAULT_INJECTION: forcing a failure. [ 2673.628012][ T7259] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.645331][ T7259] CPU: 1 PID: 7259 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2673.654287][ T7269] FAULT_INJECTION: forcing a failure. [ 2673.654287][ T7269] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.655305][ T7259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2673.677618][ T7259] Call Trace: [ 2673.680748][ T7259] [ 2673.683514][ T7259] dump_stack_lvl+0x151/0x1b7 [ 2673.688027][ T7259] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2673.693325][ T7259] ? __get_vm_area_node+0x13a/0x380 [ 2673.698354][ T7259] ? ____kasan_kmalloc+0xee/0x110 [ 2673.703213][ T7259] ? ____kasan_kmalloc+0xdc/0x110 [ 2673.708076][ T7259] dump_stack+0x15/0x17 [ 2673.712069][ T7259] should_fail+0x3c0/0x510 [ 2673.716321][ T7259] __should_failslab+0x9f/0xe0 [ 2673.720921][ T7259] should_failslab+0x9/0x20 [ 2673.725261][ T7259] kmem_cache_alloc+0x4f/0x2f0 [ 2673.729861][ T7259] ? alloc_vmap_area+0x19a/0x1a90 [ 2673.734722][ T7259] alloc_vmap_area+0x19a/0x1a90 [ 2673.739413][ T7259] ? vm_map_ram+0xa80/0xa80 [ 2673.743750][ T7259] ? __kasan_kmalloc+0x9/0x10 [ 2673.748262][ T7259] ? __get_vm_area_node+0x13a/0x380 [ 2673.753296][ T7259] __get_vm_area_node+0x17b/0x380 [ 2673.758158][ T7259] __vmalloc_node_range+0xda/0x800 [ 2673.763104][ T7259] ? copy_process+0x579/0x3250 [ 2673.767706][ T7259] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2673.772564][ T7259] ? dup_task_struct+0x53/0xa60 [ 2673.777249][ T7259] dup_task_struct+0x61f/0xa60 [ 2673.781847][ T7259] ? copy_process+0x579/0x3250 [ 2673.786451][ T7259] ? __kasan_check_write+0x14/0x20 [ 2673.791396][ T7259] copy_process+0x579/0x3250 [ 2673.795823][ T7259] ? __kasan_check_write+0x14/0x20 [ 2673.800771][ T7259] ? proc_fail_nth_write+0x213/0x290 [ 2673.805890][ T7259] ? proc_fail_nth_read+0x220/0x220 [ 2673.810926][ T7259] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2673.815871][ T7259] ? vfs_write+0x9af/0x1050 [ 2673.820210][ T7259] ? vmacache_update+0xb7/0x120 [ 2673.824900][ T7259] kernel_clone+0x22d/0x990 [ 2673.829236][ T7259] ? file_end_write+0x1b0/0x1b0 [ 2673.833926][ T7259] ? __kasan_check_write+0x14/0x20 [ 2673.838873][ T7259] ? create_io_thread+0x1e0/0x1e0 [ 2673.843736][ T7259] ? __mutex_lock_slowpath+0x10/0x10 [ 2673.848851][ T7259] __x64_sys_clone+0x289/0x310 [ 2673.853453][ T7259] ? __do_sys_vfork+0x130/0x130 [ 2673.858141][ T7259] ? debug_smp_processor_id+0x17/0x20 [ 2673.863346][ T7259] do_syscall_64+0x44/0xd0 [ 2673.867601][ T7259] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2673.873326][ T7259] RIP: 0033:0x7ffbc66bf0c9 [ 2673.877585][ T7259] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2673.897022][ T7259] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2673.905267][ T7259] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2673.913078][ T7259] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2673.920890][ T7259] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 00:44:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x8}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x700}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x602}, 0x48) [ 2673.928700][ T7259] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2673.936510][ T7259] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2673.944324][ T7259] [ 2673.947190][ T7269] CPU: 0 PID: 7269 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2673.957171][ T7269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2673.967069][ T7269] Call Trace: [ 2673.967466][ T7273] FAULT_INJECTION: forcing a failure. [ 2673.967466][ T7273] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.970186][ T7269] [ 2673.970195][ T7269] dump_stack_lvl+0x151/0x1b7 [ 2673.989892][ T7269] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2673.995191][ T7269] ? do_handle_mm_fault+0x142f/0x2370 [ 2674.000389][ T7269] dump_stack+0x15/0x17 [ 2674.004381][ T7269] should_fail+0x3c0/0x510 [ 2674.008634][ T7269] __should_failslab+0x9f/0xe0 [ 2674.013235][ T7269] should_failslab+0x9/0x20 [ 2674.017573][ T7269] kmem_cache_alloc+0x4f/0x2f0 [ 2674.022173][ T7269] ? dup_task_struct+0x53/0xa60 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2674.026865][ T7269] ? __kasan_check_write+0x14/0x20 [ 2674.031812][ T7269] dup_task_struct+0x53/0xa60 [ 2674.036320][ T7269] ? __kasan_check_write+0x14/0x20 [ 2674.041268][ T7269] copy_process+0x579/0x3250 [ 2674.045698][ T7269] ? __kasan_check_write+0x14/0x20 [ 2674.050644][ T7269] ? proc_fail_nth_write+0x213/0x290 [ 2674.055766][ T7269] ? proc_fail_nth_read+0x220/0x220 [ 2674.060799][ T7269] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2674.065746][ T7269] ? vfs_write+0x9af/0x1050 [ 2674.070086][ T7269] ? vmacache_update+0xb7/0x120 [ 2674.074775][ T7269] kernel_clone+0x22d/0x990 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2674.079113][ T7269] ? file_end_write+0x1b0/0x1b0 [ 2674.083798][ T7269] ? __kasan_check_write+0x14/0x20 [ 2674.088746][ T7269] ? create_io_thread+0x1e0/0x1e0 [ 2674.093605][ T7269] ? __mutex_lock_slowpath+0x10/0x10 [ 2674.098730][ T7269] __x64_sys_clone+0x289/0x310 [ 2674.103327][ T7269] ? __do_sys_vfork+0x130/0x130 [ 2674.108017][ T7269] ? debug_smp_processor_id+0x17/0x20 [ 2674.113230][ T7269] do_syscall_64+0x44/0xd0 [ 2674.117477][ T7269] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2674.123204][ T7269] RIP: 0033:0x7fc683db00c9 [ 2674.127455][ T7269] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2674.146896][ T7269] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2674.155138][ T7269] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2674.162952][ T7269] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2674.170760][ T7269] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2674.178572][ T7269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2674.186383][ T7269] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2674.194200][ T7269] [ 2674.197061][ T7273] CPU: 1 PID: 7273 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2674.207053][ T7273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2674.216935][ T7273] Call Trace: [ 2674.220060][ T7273] [ 2674.222835][ T7273] dump_stack_lvl+0x151/0x1b7 [ 2674.227353][ T7273] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2674.232645][ T7273] dump_stack+0x15/0x17 [ 2674.236637][ T7273] should_fail+0x3c0/0x510 [ 2674.240889][ T7273] __should_failslab+0x9f/0xe0 [ 2674.245488][ T7273] should_failslab+0x9/0x20 [ 2674.249828][ T7273] kmem_cache_alloc+0x4f/0x2f0 [ 2674.254428][ T7273] ? alloc_vmap_area+0x6c3/0x1a90 [ 2674.259288][ T7273] alloc_vmap_area+0x6c3/0x1a90 [ 2674.263976][ T7273] ? vm_map_ram+0xa80/0xa80 [ 2674.268314][ T7273] ? __kasan_kmalloc+0x9/0x10 [ 2674.272827][ T7273] ? __get_vm_area_node+0x13a/0x380 [ 2674.277862][ T7273] __get_vm_area_node+0x17b/0x380 [ 2674.282722][ T7273] __vmalloc_node_range+0xda/0x800 [ 2674.287668][ T7273] ? copy_process+0x579/0x3250 [ 2674.292269][ T7273] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2674.297130][ T7273] ? dup_task_struct+0x53/0xa60 [ 2674.301819][ T7273] dup_task_struct+0x61f/0xa60 [ 2674.306416][ T7273] ? copy_process+0x579/0x3250 [ 2674.311020][ T7273] ? __kasan_check_write+0x14/0x20 [ 2674.315965][ T7273] copy_process+0x579/0x3250 [ 2674.320399][ T7273] ? __kasan_check_write+0x14/0x20 [ 2674.325341][ T7273] ? proc_fail_nth_write+0x213/0x290 [ 2674.330459][ T7273] ? proc_fail_nth_read+0x220/0x220 [ 2674.335491][ T7273] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2674.340437][ T7273] ? vfs_write+0x9af/0x1050 [ 2674.344776][ T7273] ? vmacache_update+0xb7/0x120 [ 2674.349466][ T7273] kernel_clone+0x22d/0x990 [ 2674.353804][ T7273] ? file_end_write+0x1b0/0x1b0 [ 2674.358492][ T7273] ? __kasan_check_write+0x14/0x20 [ 2674.363439][ T7273] ? create_io_thread+0x1e0/0x1e0 [ 2674.368300][ T7273] ? __mutex_lock_slowpath+0x10/0x10 [ 2674.373420][ T7273] __x64_sys_clone+0x289/0x310 [ 2674.378022][ T7273] ? __do_sys_vfork+0x130/0x130 [ 2674.382708][ T7273] ? debug_smp_processor_id+0x17/0x20 [ 2674.387913][ T7273] do_syscall_64+0x44/0xd0 [ 2674.392174][ T7273] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2674.397894][ T7273] RIP: 0033:0x7ffbc66bf0c9 [ 2674.402270][ T7273] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2674.421707][ T7273] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:44:11 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 00:44:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x603}, 0x48) 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:11 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 00:44:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x9}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2674.429947][ T7273] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2674.437759][ T7273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2674.445569][ T7273] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2674.453382][ T7273] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2674.461191][ T7273] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2674.469009][ T7273] 00:44:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x900}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x700}, 0x48) 00:44:11 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xa}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:12 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xb}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2674.494279][ T7295] FAULT_INJECTION: forcing a failure. [ 2674.494279][ T7295] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2674.509528][ T7299] FAULT_INJECTION: forcing a failure. [ 2674.509528][ T7299] name failslab, interval 1, probability 0, space 0, times 0 [ 2674.523311][ T7299] CPU: 0 PID: 7299 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2674.533286][ T7299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 00:44:12 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2674.543186][ T7299] Call Trace: [ 2674.546303][ T7299] [ 2674.549087][ T7299] dump_stack_lvl+0x151/0x1b7 [ 2674.553594][ T7299] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2674.558889][ T7299] ? __kasan_slab_alloc+0xc4/0xe0 [ 2674.563749][ T7299] ? kmem_cache_alloc+0x189/0x2f0 [ 2674.568607][ T7299] dump_stack+0x15/0x17 [ 2674.572598][ T7299] should_fail+0x3c0/0x510 [ 2674.576853][ T7299] ? __get_vm_area_node+0x13a/0x380 [ 2674.581887][ T7299] __should_failslab+0x9f/0xe0 [ 2674.586487][ T7299] should_failslab+0x9/0x20 [ 2674.590823][ T7299] kmem_cache_alloc_trace+0x4a/0x310 [ 2674.595951][ T7299] __get_vm_area_node+0x13a/0x380 [ 2674.600811][ T7299] __vmalloc_node_range+0xda/0x800 [ 2674.605754][ T7299] ? copy_process+0x579/0x3250 [ 2674.610378][ T7299] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2674.615215][ T7299] ? dup_task_struct+0x53/0xa60 [ 2674.619902][ T7299] dup_task_struct+0x61f/0xa60 [ 2674.624503][ T7299] ? copy_process+0x579/0x3250 [ 2674.629104][ T7299] ? __kasan_check_write+0x14/0x20 [ 2674.634047][ T7299] copy_process+0x579/0x3250 [ 2674.638476][ T7299] ? __kasan_check_write+0x14/0x20 [ 2674.643421][ T7299] ? proc_fail_nth_write+0x213/0x290 [ 2674.648540][ T7299] ? proc_fail_nth_read+0x220/0x220 [ 2674.653574][ T7299] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2674.658525][ T7299] ? vfs_write+0x9af/0x1050 [ 2674.662863][ T7299] ? vmacache_update+0xb7/0x120 [ 2674.667548][ T7299] kernel_clone+0x22d/0x990 [ 2674.671888][ T7299] ? file_end_write+0x1b0/0x1b0 [ 2674.676573][ T7299] ? __kasan_check_write+0x14/0x20 [ 2674.681523][ T7299] ? create_io_thread+0x1e0/0x1e0 [ 2674.686382][ T7299] ? __mutex_lock_slowpath+0x10/0x10 [ 2674.691502][ T7299] __x64_sys_clone+0x289/0x310 [ 2674.696102][ T7299] ? __do_sys_vfork+0x130/0x130 [ 2674.700794][ T7299] ? debug_smp_processor_id+0x17/0x20 [ 2674.706005][ T7299] do_syscall_64+0x44/0xd0 [ 2674.710252][ T7299] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2674.715985][ T7299] RIP: 0033:0x7fc683db00c9 [ 2674.720236][ T7299] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2674.739763][ T7299] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2674.748003][ T7299] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2674.755815][ T7299] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2674.763627][ T7299] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2674.771439][ T7299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2674.779247][ T7299] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2674.787065][ T7299] [ 2674.789925][ T7295] CPU: 1 PID: 7295 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2674.799906][ T7295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2674.809800][ T7295] Call Trace: [ 2674.812923][ T7295] [ 2674.815698][ T7295] dump_stack_lvl+0x151/0x1b7 [ 2674.820211][ T7295] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2674.825509][ T7295] dump_stack+0x15/0x17 [ 2674.829499][ T7295] should_fail+0x3c0/0x510 [ 2674.833752][ T7295] should_fail_alloc_page+0x58/0x70 [ 2674.838784][ T7295] __alloc_pages+0x1de/0x7c0 [ 2674.843220][ T7295] ? __count_vm_events+0x30/0x30 [ 2674.847985][ T7295] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2674.853193][ T7295] __get_free_pages+0xe/0x30 [ 2674.857619][ T7295] kasan_populate_vmalloc_pte+0x39/0x130 [ 2674.863087][ T7295] ? __apply_to_page_range+0x8a5/0xb90 [ 2674.868387][ T7295] __apply_to_page_range+0x8b8/0xb90 [ 2674.873504][ T7295] ? kasan_populate_vmalloc+0x70/0x70 [ 2674.878711][ T7295] ? kasan_populate_vmalloc+0x70/0x70 [ 2674.883919][ T7295] apply_to_page_range+0x3b/0x50 [ 2674.888691][ T7295] kasan_populate_vmalloc+0x65/0x70 [ 2674.893724][ T7295] alloc_vmap_area+0x1946/0x1a90 [ 2674.898499][ T7295] ? vm_map_ram+0xa80/0xa80 [ 2674.902837][ T7295] ? __kasan_kmalloc+0x9/0x10 [ 2674.907354][ T7295] ? __get_vm_area_node+0x13a/0x380 [ 2674.912393][ T7295] __get_vm_area_node+0x17b/0x380 [ 2674.917247][ T7295] __vmalloc_node_range+0xda/0x800 [ 2674.922192][ T7295] ? copy_process+0x579/0x3250 [ 2674.926794][ T7295] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2674.931652][ T7295] ? dup_task_struct+0x53/0xa60 [ 2674.936339][ T7295] dup_task_struct+0x61f/0xa60 [ 2674.940938][ T7295] ? copy_process+0x579/0x3250 [ 2674.945541][ T7295] ? __kasan_check_write+0x14/0x20 [ 2674.950485][ T7295] copy_process+0x579/0x3250 [ 2674.954914][ T7295] ? __kasan_check_write+0x14/0x20 [ 2674.959859][ T7295] ? proc_fail_nth_write+0x213/0x290 [ 2674.964981][ T7295] ? proc_fail_nth_read+0x220/0x220 [ 2674.970019][ T7295] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2674.974963][ T7295] ? vfs_write+0x9af/0x1050 [ 2674.979329][ T7295] ? vmacache_update+0xb7/0x120 [ 2674.983989][ T7295] kernel_clone+0x22d/0x990 [ 2674.988328][ T7295] ? file_end_write+0x1b0/0x1b0 [ 2674.993014][ T7295] ? __kasan_check_write+0x14/0x20 [ 2674.997961][ T7295] ? create_io_thread+0x1e0/0x1e0 [ 2675.002820][ T7295] ? __mutex_lock_slowpath+0x10/0x10 [ 2675.007944][ T7295] __x64_sys_clone+0x289/0x310 [ 2675.012544][ T7295] ? __do_sys_vfork+0x130/0x130 [ 2675.017230][ T7295] ? debug_smp_processor_id+0x17/0x20 [ 2675.022441][ T7295] do_syscall_64+0x44/0xd0 [ 2675.026691][ T7295] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2675.032416][ T7295] RIP: 0033:0x7ffbc66bf0c9 [ 2675.036672][ T7295] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2675.056112][ T7295] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2675.064358][ T7295] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2675.072168][ T7295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2675.079979][ T7295] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2675.087791][ T7295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 00:44:12 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 00:44:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:12 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 00:44:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xa00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x801}, 0x48) 00:44:12 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xd}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xb00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2675.095602][ T7295] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2675.103416][ T7295] [ 2675.121214][ T7319] FAULT_INJECTION: forcing a failure. [ 2675.121214][ T7319] name failslab, interval 1, probability 0, space 0, times 0 [ 2675.135455][ T7319] CPU: 0 PID: 7319 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 00:44:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x802}, 0x48) 00:44:12 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:12 executing program 5: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x803}, 0x48) [ 2675.145428][ T7319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2675.155324][ T7319] Call Trace: [ 2675.158447][ T7319] [ 2675.161221][ T7319] dump_stack_lvl+0x151/0x1b7 [ 2675.165737][ T7319] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2675.171032][ T7319] dump_stack+0x15/0x17 [ 2675.175024][ T7319] should_fail+0x3c0/0x510 [ 2675.179280][ T7319] ? security_prepare_creds+0x50/0x160 [ 2675.184571][ T7319] __should_failslab+0x9f/0xe0 [ 2675.189173][ T7319] should_failslab+0x9/0x20 [ 2675.193510][ T7319] __kmalloc+0x6d/0x350 [ 2675.195590][ T7339] FAULT_INJECTION: forcing a failure. [ 2675.195590][ T7339] name failslab, interval 1, probability 0, space 0, times 0 [ 2675.197502][ T7319] security_prepare_creds+0x50/0x160 [ 2675.197530][ T7319] prepare_creds+0x471/0x690 [ 2675.219460][ T7319] copy_creds+0xde/0x640 [ 2675.223540][ T7319] copy_process+0x775/0x3250 [ 2675.227966][ T7319] ? __kasan_check_write+0x14/0x20 [ 2675.232909][ T7319] ? proc_fail_nth_write+0x213/0x290 [ 2675.238031][ T7319] ? proc_fail_nth_read+0x220/0x220 [ 2675.243064][ T7319] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2675.248010][ T7319] ? vfs_write+0x9af/0x1050 [ 2675.252354][ T7319] ? vmacache_update+0xb7/0x120 [ 2675.257038][ T7319] kernel_clone+0x22d/0x990 [ 2675.261380][ T7319] ? file_end_write+0x1b0/0x1b0 [ 2675.266065][ T7319] ? __kasan_check_write+0x14/0x20 [ 2675.271012][ T7319] ? create_io_thread+0x1e0/0x1e0 [ 2675.275874][ T7319] ? __mutex_lock_slowpath+0x10/0x10 [ 2675.281081][ T7319] __x64_sys_clone+0x289/0x310 [ 2675.285777][ T7319] ? __do_sys_vfork+0x130/0x130 [ 2675.290466][ T7319] ? debug_smp_processor_id+0x17/0x20 [ 2675.295668][ T7319] do_syscall_64+0x44/0xd0 [ 2675.299922][ T7319] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2675.305651][ T7319] RIP: 0033:0x7fc683db00c9 [ 2675.309902][ T7319] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2675.329346][ T7319] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2675.337590][ T7319] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2675.345400][ T7319] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2675.353210][ T7319] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2675.361021][ T7319] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2675.368849][ T7319] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2675.376649][ T7319] [ 2675.379510][ T7339] CPU: 1 PID: 7339 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2675.389496][ T7339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2675.393742][ T7341] FAULT_INJECTION: forcing a failure. [ 2675.393742][ T7341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2675.399385][ T7339] Call Trace: [ 2675.399397][ T7339] [ 2675.399403][ T7339] dump_stack_lvl+0x151/0x1b7 [ 2675.422820][ T7339] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2675.428114][ T7339] dump_stack+0x15/0x17 [ 2675.432107][ T7339] should_fail+0x3c0/0x510 [ 2675.436358][ T7339] ? kvmalloc_node+0x82/0x130 [ 2675.440871][ T7339] __should_failslab+0x9f/0xe0 [ 2675.445471][ T7339] should_failslab+0x9/0x20 [ 2675.449913][ T7339] __kmalloc+0x6d/0x350 [ 2675.453896][ T7339] ? __kasan_kmalloc+0x9/0x10 [ 2675.458409][ T7339] kvmalloc_node+0x82/0x130 [ 2675.462749][ T7339] alloc_fdtable+0xea/0x2b0 [ 2675.467089][ T7339] dup_fd+0x781/0xa40 [ 2675.470908][ T7339] ? avc_has_perm+0x16d/0x260 [ 2675.475422][ T7339] copy_files+0xe6/0x200 [ 2675.479673][ T7339] ? perf_event_attrs+0x30/0x30 [ 2675.484361][ T7339] ? dup_task_struct+0xa60/0xa60 [ 2675.489138][ T7339] ? security_task_alloc+0x132/0x150 [ 2675.494258][ T7339] copy_process+0x11e9/0x3250 [ 2675.498771][ T7339] ? proc_fail_nth_write+0x213/0x290 [ 2675.503889][ T7339] ? proc_fail_nth_read+0x220/0x220 [ 2675.508923][ T7339] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2675.513871][ T7339] ? vfs_write+0x9af/0x1050 [ 2675.518220][ T7339] ? vmacache_update+0xb7/0x120 [ 2675.522898][ T7339] kernel_clone+0x22d/0x990 [ 2675.527235][ T7339] ? file_end_write+0x1b0/0x1b0 [ 2675.531923][ T7339] ? __kasan_check_write+0x14/0x20 [ 2675.536872][ T7339] ? create_io_thread+0x1e0/0x1e0 [ 2675.541732][ T7339] ? __mutex_lock_slowpath+0x10/0x10 [ 2675.546855][ T7339] __x64_sys_clone+0x289/0x310 [ 2675.551453][ T7339] ? __do_sys_vfork+0x130/0x130 [ 2675.556283][ T7339] ? debug_smp_processor_id+0x17/0x20 [ 2675.561491][ T7339] do_syscall_64+0x44/0xd0 [ 2675.565740][ T7339] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2675.571464][ T7339] RIP: 0033:0x7ffbc66bf0c9 [ 2675.575721][ T7339] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:12 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 00:44:12 executing program 5: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2675.595159][ T7339] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2675.603403][ T7339] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2675.611215][ T7339] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2675.619027][ T7339] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2675.626836][ T7339] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2675.634649][ T7339] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2675.642464][ T7339] 00:44:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 00:44:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x900}, 0x48) 00:44:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xe}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:13 executing program 5: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2675.645327][ T7341] CPU: 0 PID: 7341 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2675.655312][ T7341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2675.665204][ T7341] Call Trace: [ 2675.668325][ T7341] [ 2675.671103][ T7341] dump_stack_lvl+0x151/0x1b7 [ 2675.675619][ T7341] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2675.680914][ T7341] ? stack_trace_save+0x12d/0x1f0 [ 2675.685210][ T7352] FAULT_INJECTION: forcing a failure. [ 2675.685210][ T7352] name failslab, interval 1, probability 0, space 0, times 0 00:44:13 executing program 5: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:13 executing program 5: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:13 executing program 5: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x10}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2675.685769][ T7341] ? is_bpf_text_address+0x1a2/0x1c0 [ 2675.685795][ T7341] dump_stack+0x15/0x17 [ 2675.707295][ T7341] should_fail+0x3c0/0x510 [ 2675.711549][ T7341] should_fail_alloc_page+0x58/0x70 [ 2675.716588][ T7341] __alloc_pages+0x1de/0x7c0 [ 2675.721010][ T7341] ? kmem_cache_alloc+0x189/0x2f0 [ 2675.725875][ T7341] ? __x64_sys_clone+0x289/0x310 [ 2675.730641][ T7341] ? __count_vm_events+0x30/0x30 [ 2675.735417][ T7341] __get_free_pages+0xe/0x30 [ 2675.739842][ T7341] kasan_populate_vmalloc_pte+0x39/0x130 00:44:13 executing program 5: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2675.745312][ T7341] ? __apply_to_page_range+0x8a5/0xb90 [ 2675.750606][ T7341] __apply_to_page_range+0x8b8/0xb90 [ 2675.755723][ T7341] ? kasan_populate_vmalloc+0x70/0x70 [ 2675.760936][ T7341] ? kasan_populate_vmalloc+0x70/0x70 [ 2675.766140][ T7341] apply_to_page_range+0x3b/0x50 [ 2675.770914][ T7341] kasan_populate_vmalloc+0x65/0x70 [ 2675.775947][ T7341] alloc_vmap_area+0x1946/0x1a90 [ 2675.780721][ T7341] ? vm_map_ram+0xa80/0xa80 [ 2675.785063][ T7341] ? __kasan_kmalloc+0x9/0x10 [ 2675.789581][ T7341] ? __get_vm_area_node+0x13a/0x380 [ 2675.794611][ T7341] __get_vm_area_node+0x17b/0x380 [ 2675.799471][ T7341] __vmalloc_node_range+0xda/0x800 [ 2675.804413][ T7341] ? copy_process+0x579/0x3250 [ 2675.809015][ T7341] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2675.813875][ T7341] ? dup_task_struct+0x53/0xa60 [ 2675.818562][ T7341] dup_task_struct+0x61f/0xa60 [ 2675.823161][ T7341] ? copy_process+0x579/0x3250 [ 2675.827761][ T7341] ? __kasan_check_write+0x14/0x20 [ 2675.832709][ T7341] copy_process+0x579/0x3250 [ 2675.837134][ T7341] ? __kasan_check_write+0x14/0x20 [ 2675.842080][ T7341] ? proc_fail_nth_write+0x213/0x290 [ 2675.847204][ T7341] ? proc_fail_nth_read+0x220/0x220 [ 2675.852239][ T7341] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2675.857184][ T7341] ? vfs_write+0x9af/0x1050 [ 2675.861522][ T7341] ? vmacache_update+0xb7/0x120 [ 2675.866211][ T7341] kernel_clone+0x22d/0x990 [ 2675.870549][ T7341] ? file_end_write+0x1b0/0x1b0 [ 2675.875234][ T7341] ? __kasan_check_write+0x14/0x20 [ 2675.880184][ T7341] ? create_io_thread+0x1e0/0x1e0 [ 2675.885046][ T7341] ? __mutex_lock_slowpath+0x10/0x10 [ 2675.890163][ T7341] __x64_sys_clone+0x289/0x310 [ 2675.894766][ T7341] ? __do_sys_vfork+0x130/0x130 [ 2675.899453][ T7341] ? debug_smp_processor_id+0x17/0x20 [ 2675.904660][ T7341] do_syscall_64+0x44/0xd0 [ 2675.908911][ T7341] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2675.914640][ T7341] RIP: 0033:0x7fc683db00c9 [ 2675.918896][ T7341] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2675.938334][ T7341] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2675.946581][ T7341] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2675.954391][ T7341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2675.962199][ T7341] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2675.970014][ T7341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2675.977821][ T7341] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2675.985639][ T7341] [ 2675.988498][ T7352] CPU: 1 PID: 7352 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2675.998481][ T7352] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2676.008378][ T7352] Call Trace: [ 2676.011498][ T7352] [ 2676.014274][ T7352] dump_stack_lvl+0x151/0x1b7 [ 2676.018788][ T7352] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2676.024086][ T7352] dump_stack+0x15/0x17 [ 2676.028075][ T7352] should_fail+0x3c0/0x510 [ 2676.032328][ T7352] ? __vmalloc_node_range+0x2e3/0x800 [ 2676.037537][ T7352] __should_failslab+0x9f/0xe0 [ 2676.042136][ T7352] should_failslab+0x9/0x20 [ 2676.046473][ T7352] __kmalloc+0x6d/0x350 [ 2676.050466][ T7352] __vmalloc_node_range+0x2e3/0x800 [ 2676.055501][ T7352] dup_task_struct+0x61f/0xa60 [ 2676.060102][ T7352] ? copy_process+0x579/0x3250 [ 2676.064702][ T7352] ? __kasan_check_write+0x14/0x20 [ 2676.069647][ T7352] copy_process+0x579/0x3250 [ 2676.074076][ T7352] ? __kasan_check_write+0x14/0x20 [ 2676.079022][ T7352] ? proc_fail_nth_write+0x213/0x290 [ 2676.084141][ T7352] ? proc_fail_nth_read+0x220/0x220 [ 2676.089177][ T7352] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2676.094123][ T7352] ? vfs_write+0x9af/0x1050 [ 2676.098463][ T7352] ? vmacache_update+0xb7/0x120 [ 2676.103156][ T7352] kernel_clone+0x22d/0x990 [ 2676.107488][ T7352] ? file_end_write+0x1b0/0x1b0 [ 2676.112177][ T7352] ? __kasan_check_write+0x14/0x20 [ 2676.117124][ T7352] ? create_io_thread+0x1e0/0x1e0 [ 2676.121985][ T7352] ? __mutex_lock_slowpath+0x10/0x10 [ 2676.127105][ T7352] __x64_sys_clone+0x289/0x310 [ 2676.131705][ T7352] ? __do_sys_vfork+0x130/0x130 [ 2676.136394][ T7352] ? debug_smp_processor_id+0x17/0x20 [ 2676.141598][ T7352] do_syscall_64+0x44/0xd0 [ 2676.145851][ T7352] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2676.151579][ T7352] RIP: 0033:0x7ffbc66bf0c9 [ 2676.155833][ T7352] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2676.175383][ T7352] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2676.183629][ T7352] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2676.191439][ T7352] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 00:44:13 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 00:44:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa00}, 0x48) 00:44:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x11}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xd00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:13 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2676.199249][ T7352] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.207062][ T7352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2676.214874][ T7352] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2676.222686][ T7352] [ 2676.233442][ T7368] FAULT_INJECTION: forcing a failure. [ 2676.233442][ T7368] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2676.248759][ T7368] CPU: 1 PID: 7368 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2676.258735][ T7368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2676.268629][ T7368] Call Trace: [ 2676.271750][ T7368] [ 2676.274525][ T7368] dump_stack_lvl+0x151/0x1b7 [ 2676.279042][ T7368] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2676.284335][ T7368] ? stack_trace_save+0x12d/0x1f0 [ 2676.289197][ T7368] ? is_bpf_text_address+0x1a2/0x1c0 [ 2676.294316][ T7368] dump_stack+0x15/0x17 [ 2676.298306][ T7368] should_fail+0x3c0/0x510 00:44:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x12}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa01}, 0x48) 00:44:13 executing program 5: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x18}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa02}, 0x48) [ 2676.302562][ T7368] should_fail_alloc_page+0x58/0x70 [ 2676.307596][ T7368] __alloc_pages+0x1de/0x7c0 [ 2676.312021][ T7368] ? kmem_cache_alloc+0x189/0x2f0 [ 2676.316883][ T7368] ? __x64_sys_clone+0x289/0x310 [ 2676.320468][ T7388] FAULT_INJECTION: forcing a failure. [ 2676.320468][ T7388] name failslab, interval 1, probability 0, space 0, times 0 [ 2676.321651][ T7368] ? __count_vm_events+0x30/0x30 [ 2676.321678][ T7368] __get_free_pages+0xe/0x30 [ 2676.343264][ T7368] kasan_populate_vmalloc_pte+0x39/0x130 [ 2676.348731][ T7368] ? __apply_to_page_range+0x8a5/0xb90 [ 2676.354033][ T7368] __apply_to_page_range+0x8b8/0xb90 [ 2676.359146][ T7368] ? kasan_populate_vmalloc+0x70/0x70 [ 2676.364353][ T7368] ? kasan_populate_vmalloc+0x70/0x70 [ 2676.369560][ T7368] apply_to_page_range+0x3b/0x50 [ 2676.374339][ T7368] kasan_populate_vmalloc+0x65/0x70 [ 2676.379369][ T7368] alloc_vmap_area+0x1946/0x1a90 [ 2676.384143][ T7368] ? vm_map_ram+0xa80/0xa80 [ 2676.388481][ T7368] ? __kasan_kmalloc+0x9/0x10 [ 2676.392996][ T7368] ? __get_vm_area_node+0x13a/0x380 [ 2676.398029][ T7368] __get_vm_area_node+0x17b/0x380 [ 2676.402891][ T7368] __vmalloc_node_range+0xda/0x800 [ 2676.407835][ T7368] ? copy_process+0x579/0x3250 [ 2676.412436][ T7368] ? kmem_cache_alloc+0x1c1/0x2f0 [ 2676.417296][ T7368] ? dup_task_struct+0x53/0xa60 [ 2676.421984][ T7368] dup_task_struct+0x61f/0xa60 [ 2676.426584][ T7368] ? copy_process+0x579/0x3250 [ 2676.431184][ T7368] ? __kasan_check_write+0x14/0x20 [ 2676.436129][ T7368] copy_process+0x579/0x3250 [ 2676.440557][ T7368] ? __kasan_check_write+0x14/0x20 [ 2676.445508][ T7368] ? proc_fail_nth_write+0x213/0x290 [ 2676.450626][ T7368] ? proc_fail_nth_read+0x220/0x220 [ 2676.455659][ T7368] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2676.460603][ T7368] ? vfs_write+0x9af/0x1050 [ 2676.464945][ T7368] ? vmacache_update+0xb7/0x120 [ 2676.469633][ T7368] kernel_clone+0x22d/0x990 [ 2676.473970][ T7368] ? file_end_write+0x1b0/0x1b0 [ 2676.478657][ T7368] ? __kasan_check_write+0x14/0x20 [ 2676.483607][ T7368] ? create_io_thread+0x1e0/0x1e0 [ 2676.488467][ T7368] ? __mutex_lock_slowpath+0x10/0x10 [ 2676.493588][ T7368] __x64_sys_clone+0x289/0x310 [ 2676.498197][ T7368] ? __do_sys_vfork+0x130/0x130 [ 2676.502878][ T7368] ? debug_smp_processor_id+0x17/0x20 [ 2676.508081][ T7368] do_syscall_64+0x44/0xd0 [ 2676.512340][ T7368] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2676.518098][ T7368] RIP: 0033:0x7fc683db00c9 [ 2676.522319][ T7368] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2676.541759][ T7368] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2676.550004][ T7368] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2676.557811][ T7368] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2676.565624][ T7368] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.573436][ T7368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2676.581425][ T7368] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2676.589232][ T7368] [ 2676.592095][ T7388] CPU: 0 PID: 7388 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 00:44:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 00:44:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2676.602078][ T7388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2676.611974][ T7388] Call Trace: [ 2676.615098][ T7388] [ 2676.617875][ T7388] dump_stack_lvl+0x151/0x1b7 [ 2676.619237][ T7393] FAULT_INJECTION: forcing a failure. [ 2676.619237][ T7393] name failslab, interval 1, probability 0, space 0, times 0 [ 2676.622387][ T7388] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2676.622412][ T7388] ? _raw_spin_lock+0xa3/0x1b0 [ 2676.622430][ T7388] ? dup_fd+0x51f/0xa40 [ 2676.648771][ T7388] dump_stack+0x15/0x17 [ 2676.652761][ T7388] should_fail+0x3c0/0x510 [ 2676.657015][ T7388] __should_failslab+0x9f/0xe0 [ 2676.661614][ T7388] should_failslab+0x9/0x20 [ 2676.665955][ T7388] kmem_cache_alloc+0x4f/0x2f0 [ 2676.670553][ T7388] ? copy_fs_struct+0x4e/0x230 [ 2676.675157][ T7388] copy_fs_struct+0x4e/0x230 [ 2676.679579][ T7388] copy_fs+0x72/0x140 [ 2676.683398][ T7388] copy_process+0x1214/0x3250 [ 2676.687913][ T7388] ? proc_fail_nth_write+0x213/0x290 [ 2676.693034][ T7388] ? proc_fail_nth_read+0x220/0x220 [ 2676.698066][ T7388] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2676.703015][ T7388] ? vfs_write+0x9af/0x1050 [ 2676.707354][ T7388] ? vmacache_update+0xb7/0x120 [ 2676.712044][ T7388] kernel_clone+0x22d/0x990 [ 2676.716381][ T7388] ? file_end_write+0x1b0/0x1b0 [ 2676.721074][ T7388] ? __kasan_check_write+0x14/0x20 [ 2676.726016][ T7388] ? create_io_thread+0x1e0/0x1e0 [ 2676.730874][ T7388] ? __mutex_lock_slowpath+0x10/0x10 [ 2676.735993][ T7388] __x64_sys_clone+0x289/0x310 [ 2676.740593][ T7388] ? __do_sys_vfork+0x130/0x130 [ 2676.745285][ T7388] ? debug_smp_processor_id+0x17/0x20 [ 2676.750488][ T7388] do_syscall_64+0x44/0xd0 [ 2676.754741][ T7388] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2676.760467][ T7388] RIP: 0033:0x7ffbc66bf0c9 [ 2676.764725][ T7388] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2676.784161][ T7388] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2676.792406][ T7388] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2676.800217][ T7388] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2676.808029][ T7388] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2676.816708][ T7388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2676.824520][ T7388] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2676.832335][ T7388] [ 2676.836209][ T7393] CPU: 0 PID: 7393 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2676.846176][ T7393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2676.856071][ T7393] Call Trace: [ 2676.859194][ T7393] [ 2676.861973][ T7393] dump_stack_lvl+0x151/0x1b7 [ 2676.866485][ T7393] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2676.871781][ T7393] dump_stack+0x15/0x17 [ 2676.875775][ T7393] should_fail+0x3c0/0x510 [ 2676.880025][ T7393] ? __vmalloc_node_range+0x2e3/0x800 [ 2676.885231][ T7393] __should_failslab+0x9f/0xe0 [ 2676.889831][ T7393] should_failslab+0x9/0x20 [ 2676.894170][ T7393] __kmalloc+0x6d/0x350 [ 2676.898165][ T7393] __vmalloc_node_range+0x2e3/0x800 [ 2676.903200][ T7393] dup_task_struct+0x61f/0xa60 [ 2676.907797][ T7393] ? copy_process+0x579/0x3250 [ 2676.912396][ T7393] ? __kasan_check_write+0x14/0x20 [ 2676.917344][ T7393] copy_process+0x579/0x3250 [ 2676.921774][ T7393] ? __kasan_check_write+0x14/0x20 [ 2676.926717][ T7393] ? proc_fail_nth_write+0x213/0x290 [ 2676.931840][ T7393] ? proc_fail_nth_read+0x220/0x220 [ 2676.936875][ T7393] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2676.941820][ T7393] ? vfs_write+0x9af/0x1050 [ 2676.946160][ T7393] ? vmacache_update+0xb7/0x120 [ 2676.950849][ T7393] kernel_clone+0x22d/0x990 [ 2676.955186][ T7393] ? file_end_write+0x1b0/0x1b0 [ 2676.959873][ T7393] ? __kasan_check_write+0x14/0x20 [ 2676.964821][ T7393] ? create_io_thread+0x1e0/0x1e0 [ 2676.969682][ T7393] ? __mutex_lock_slowpath+0x10/0x10 [ 2676.974801][ T7393] __x64_sys_clone+0x289/0x310 [ 2676.979401][ T7393] ? __do_sys_vfork+0x130/0x130 [ 2676.984088][ T7393] ? debug_smp_processor_id+0x17/0x20 [ 2676.989296][ T7393] do_syscall_64+0x44/0xd0 [ 2676.993550][ T7393] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2676.999276][ T7393] RIP: 0033:0x7fc683db00c9 [ 2677.003530][ T7393] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2677.022972][ T7393] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2677.031215][ T7393] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2677.039028][ T7393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2677.046837][ T7393] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) 00:44:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x25}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa03}, 0x48) 00:44:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xe00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xb00}, 0x48) 00:44:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x36}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 00:44:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x1100}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2677.054650][ T7393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2677.062461][ T7393] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2677.070273][ T7393] [ 2677.088963][ T7401] FAULT_INJECTION: forcing a failure. [ 2677.088963][ T7401] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:44:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x43}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc00}, 0x48) [ 2677.117494][ T7408] FAULT_INJECTION: forcing a failure. [ 2677.117494][ T7408] name failslab, interval 1, probability 0, space 0, times 0 [ 2677.117631][ T7401] CPU: 0 PID: 7401 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2677.139899][ T7401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2677.149795][ T7401] Call Trace: [ 2677.152919][ T7401] [ 2677.155695][ T7401] dump_stack_lvl+0x151/0x1b7 [ 2677.160208][ T7401] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2677.165502][ T7401] dump_stack+0x15/0x17 [ 2677.169493][ T7401] should_fail+0x3c0/0x510 [ 2677.173747][ T7401] should_fail_alloc_page+0x58/0x70 [ 2677.178779][ T7401] __alloc_pages+0x1de/0x7c0 [ 2677.183206][ T7401] ? __count_vm_events+0x30/0x30 [ 2677.187978][ T7401] ? __kasan_kmalloc+0x9/0x10 [ 2677.192492][ T7401] ? __kmalloc+0x203/0x350 [ 2677.196743][ T7401] ? __vmalloc_node_range+0x2e3/0x800 [ 2677.201953][ T7401] __vmalloc_node_range+0x48f/0x800 [ 2677.206989][ T7401] dup_task_struct+0x61f/0xa60 [ 2677.211586][ T7401] ? copy_process+0x579/0x3250 [ 2677.216186][ T7401] ? __kasan_check_write+0x14/0x20 [ 2677.221135][ T7401] copy_process+0x579/0x3250 [ 2677.225560][ T7401] ? __kasan_check_write+0x14/0x20 [ 2677.230508][ T7401] ? proc_fail_nth_write+0x213/0x290 [ 2677.235627][ T7401] ? proc_fail_nth_read+0x220/0x220 [ 2677.240669][ T7401] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2677.245608][ T7401] ? vfs_write+0x9af/0x1050 [ 2677.249947][ T7401] ? vmacache_update+0xb7/0x120 [ 2677.254642][ T7401] kernel_clone+0x22d/0x990 [ 2677.258973][ T7401] ? file_end_write+0x1b0/0x1b0 [ 2677.263660][ T7401] ? __kasan_check_write+0x14/0x20 [ 2677.268609][ T7401] ? create_io_thread+0x1e0/0x1e0 [ 2677.273468][ T7401] ? __mutex_lock_slowpath+0x10/0x10 [ 2677.278588][ T7401] __x64_sys_clone+0x289/0x310 [ 2677.283191][ T7401] ? __do_sys_vfork+0x130/0x130 [ 2677.287880][ T7401] ? debug_smp_processor_id+0x17/0x20 [ 2677.293085][ T7401] do_syscall_64+0x44/0xd0 [ 2677.297337][ T7401] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2677.303153][ T7401] RIP: 0033:0x7ffbc66bf0c9 [ 2677.307405][ T7401] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2677.326844][ T7401] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2677.335090][ T7401] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2677.342901][ T7401] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2677.350712][ T7401] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2677.358532][ T7401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2677.366337][ T7401] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2677.374151][ T7401] [ 2677.377012][ T7408] CPU: 1 PID: 7408 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2677.386993][ T7408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2677.395730][ T7420] FAULT_INJECTION: forcing a failure. [ 2677.395730][ T7420] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2677.396888][ T7408] Call Trace: [ 2677.396896][ T7408] [ 2677.396903][ T7408] dump_stack_lvl+0x151/0x1b7 [ 2677.420323][ T7408] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2677.425617][ T7408] dump_stack+0x15/0x17 [ 2677.429608][ T7408] should_fail+0x3c0/0x510 [ 2677.433862][ T7408] ? kvmalloc_node+0x82/0x130 [ 2677.438373][ T7408] __should_failslab+0x9f/0xe0 [ 2677.442973][ T7408] should_failslab+0x9/0x20 [ 2677.447312][ T7408] __kmalloc+0x6d/0x350 [ 2677.451305][ T7408] ? kvmalloc_node+0x82/0x130 [ 2677.455817][ T7408] kvmalloc_node+0x82/0x130 [ 2677.460160][ T7408] alloc_fdtable+0x173/0x2b0 [ 2677.464583][ T7408] dup_fd+0x781/0xa40 [ 2677.468402][ T7408] ? avc_has_perm+0x16d/0x260 [ 2677.472919][ T7408] copy_files+0xe6/0x200 [ 2677.476995][ T7408] ? perf_event_attrs+0x30/0x30 [ 2677.481681][ T7408] ? dup_task_struct+0xa60/0xa60 [ 2677.486454][ T7408] ? security_task_alloc+0x132/0x150 [ 2677.491578][ T7408] copy_process+0x11e9/0x3250 [ 2677.496125][ T7408] ? proc_fail_nth_write+0x213/0x290 [ 2677.501211][ T7408] ? proc_fail_nth_read+0x220/0x220 [ 2677.506242][ T7408] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2677.511190][ T7408] ? vfs_write+0x9af/0x1050 [ 2677.515531][ T7408] ? vmacache_update+0xb7/0x120 [ 2677.520216][ T7408] kernel_clone+0x22d/0x990 [ 2677.524556][ T7408] ? file_end_write+0x1b0/0x1b0 [ 2677.529243][ T7408] ? __kasan_check_write+0x14/0x20 [ 2677.534189][ T7408] ? create_io_thread+0x1e0/0x1e0 [ 2677.539057][ T7408] ? __mutex_lock_slowpath+0x10/0x10 [ 2677.544182][ T7408] __x64_sys_clone+0x289/0x310 [ 2677.548773][ T7408] ? __do_sys_vfork+0x130/0x130 [ 2677.553460][ T7408] ? debug_smp_processor_id+0x17/0x20 [ 2677.558666][ T7408] do_syscall_64+0x44/0xd0 [ 2677.562920][ T7408] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2677.568657][ T7408] RIP: 0033:0x7fc683db00c9 [ 2677.572900][ T7408] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2677.592341][ T7408] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2677.600589][ T7408] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2677.608412][ T7408] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:14 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 00:44:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc01}, 0x48) 00:44:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x48}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x1200}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2677.616208][ T7408] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2677.624021][ T7408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2677.631829][ T7408] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2677.639645][ T7408] [ 2677.642508][ T7420] CPU: 0 PID: 7420 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2677.652487][ T7420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2677.662381][ T7420] Call Trace: [ 2677.665504][ T7420] [ 2677.668282][ T7420] dump_stack_lvl+0x151/0x1b7 [ 2677.672794][ T7420] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2677.678092][ T7420] dump_stack+0x15/0x17 [ 2677.682080][ T7420] should_fail+0x3c0/0x510 [ 2677.686421][ T7420] should_fail_alloc_page+0x58/0x70 [ 2677.691457][ T7420] __alloc_pages+0x1de/0x7c0 [ 2677.695885][ T7420] ? __count_vm_events+0x30/0x30 [ 2677.700656][ T7420] ? __kasan_kmalloc+0x9/0x10 [ 2677.705168][ T7420] ? __kmalloc+0x203/0x350 [ 2677.709420][ T7420] ? __vmalloc_node_range+0x2e3/0x800 [ 2677.714630][ T7420] __vmalloc_node_range+0x48f/0x800 [ 2677.719663][ T7420] dup_task_struct+0x61f/0xa60 [ 2677.724264][ T7420] ? copy_process+0x579/0x3250 [ 2677.728867][ T7420] ? __kasan_check_write+0x14/0x20 [ 2677.733809][ T7420] copy_process+0x579/0x3250 [ 2677.738236][ T7420] ? __kasan_check_write+0x14/0x20 [ 2677.743183][ T7420] ? proc_fail_nth_write+0x213/0x290 [ 2677.748303][ T7420] ? proc_fail_nth_read+0x220/0x220 [ 2677.753339][ T7420] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2677.758286][ T7420] ? vfs_write+0x9af/0x1050 [ 2677.762624][ T7420] ? vmacache_update+0xb7/0x120 [ 2677.767311][ T7420] kernel_clone+0x22d/0x990 [ 2677.771652][ T7420] ? file_end_write+0x1b0/0x1b0 [ 2677.776337][ T7420] ? __kasan_check_write+0x14/0x20 [ 2677.781285][ T7420] ? create_io_thread+0x1e0/0x1e0 [ 2677.786145][ T7420] ? __mutex_lock_slowpath+0x10/0x10 [ 2677.791264][ T7420] __x64_sys_clone+0x289/0x310 [ 2677.795865][ T7420] ? __do_sys_vfork+0x130/0x130 [ 2677.800555][ T7420] ? debug_smp_processor_id+0x17/0x20 [ 2677.805759][ T7420] do_syscall_64+0x44/0xd0 [ 2677.810012][ T7420] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2677.815739][ T7420] RIP: 0033:0x7ffbc66bf0c9 [ 2677.819996][ T7420] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2677.839435][ T7420] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2677.847678][ T7420] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2677.855495][ T7420] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2677.863301][ T7420] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 00:44:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 00:44:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4c}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:15 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 00:44:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x18, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x1800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc02}, 0x48) 00:44:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc03}, 0x48) 00:44:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x68}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2677.871117][ T7420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2677.878927][ T7420] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2677.886740][ T7420] 00:44:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6c}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd00}, 0x48) 00:44:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe00}, 0x48) 00:44:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x74}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2677.935397][ T7442] FAULT_INJECTION: forcing a failure. [ 2677.935397][ T7442] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2677.948764][ T7439] FAULT_INJECTION: forcing a failure. [ 2677.948764][ T7439] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2677.966348][ T7442] CPU: 0 PID: 7442 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2677.976325][ T7442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2677.986219][ T7442] Call Trace: [ 2677.989349][ T7442] [ 2677.992120][ T7442] dump_stack_lvl+0x151/0x1b7 [ 2677.996633][ T7442] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2678.001930][ T7442] dump_stack+0x15/0x17 [ 2678.005918][ T7442] should_fail+0x3c0/0x510 [ 2678.010175][ T7442] should_fail_alloc_page+0x58/0x70 [ 2678.015207][ T7442] __alloc_pages+0x1de/0x7c0 [ 2678.019633][ T7442] ? __count_vm_events+0x30/0x30 [ 2678.024407][ T7442] ? __kasan_kmalloc+0x9/0x10 [ 2678.028917][ T7442] ? __kmalloc+0x203/0x350 [ 2678.033172][ T7442] ? __vmalloc_node_range+0x2e3/0x800 [ 2678.038382][ T7442] __vmalloc_node_range+0x48f/0x800 [ 2678.043418][ T7442] dup_task_struct+0x61f/0xa60 [ 2678.048019][ T7442] ? copy_process+0x579/0x3250 [ 2678.052616][ T7442] ? __kasan_check_write+0x14/0x20 [ 2678.057564][ T7442] copy_process+0x579/0x3250 [ 2678.061989][ T7442] ? __kasan_check_write+0x14/0x20 [ 2678.066935][ T7442] ? proc_fail_nth_write+0x213/0x290 [ 2678.072055][ T7442] ? proc_fail_nth_read+0x220/0x220 [ 2678.077091][ T7442] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2678.082035][ T7442] ? vfs_write+0x9af/0x1050 [ 2678.086376][ T7442] ? vmacache_update+0xb7/0x120 [ 2678.091062][ T7442] kernel_clone+0x22d/0x990 [ 2678.095402][ T7442] ? file_end_write+0x1b0/0x1b0 [ 2678.100090][ T7442] ? __kasan_check_write+0x14/0x20 [ 2678.105076][ T7442] ? create_io_thread+0x1e0/0x1e0 [ 2678.109899][ T7442] ? __mutex_lock_slowpath+0x10/0x10 [ 2678.115018][ T7442] __x64_sys_clone+0x289/0x310 [ 2678.119620][ T7442] ? __do_sys_vfork+0x130/0x130 [ 2678.124311][ T7442] ? debug_smp_processor_id+0x17/0x20 [ 2678.129522][ T7442] do_syscall_64+0x44/0xd0 [ 2678.133767][ T7442] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2678.139493][ T7442] RIP: 0033:0x7ffbc66bf0c9 [ 2678.143746][ T7442] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2678.163187][ T7442] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2678.171432][ T7442] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2678.179241][ T7442] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2678.187056][ T7442] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.194864][ T7442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2678.202678][ T7442] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2678.210491][ T7442] [ 2678.213351][ T7439] CPU: 1 PID: 7439 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2678.223338][ T7439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2678.232444][ T7456] FAULT_INJECTION: forcing a failure. [ 2678.232444][ T7456] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2678.233227][ T7439] Call Trace: [ 2678.233235][ T7439] [ 2678.233241][ T7439] dump_stack_lvl+0x151/0x1b7 [ 2678.256664][ T7439] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2678.261958][ T7439] dump_stack+0x15/0x17 [ 2678.265950][ T7439] should_fail+0x3c0/0x510 [ 2678.270202][ T7439] should_fail_alloc_page+0x58/0x70 [ 2678.275241][ T7439] __alloc_pages+0x1de/0x7c0 [ 2678.279664][ T7439] ? __count_vm_events+0x30/0x30 [ 2678.284437][ T7439] ? __kasan_kmalloc+0x9/0x10 [ 2678.288948][ T7439] ? __kmalloc+0x203/0x350 [ 2678.293201][ T7439] ? __vmalloc_node_range+0x2e3/0x800 [ 2678.298582][ T7439] __vmalloc_node_range+0x48f/0x800 [ 2678.303624][ T7439] dup_task_struct+0x61f/0xa60 [ 2678.308214][ T7439] ? copy_process+0x579/0x3250 [ 2678.312815][ T7439] ? __kasan_check_write+0x14/0x20 [ 2678.317763][ T7439] copy_process+0x579/0x3250 [ 2678.322189][ T7439] ? __kasan_check_write+0x14/0x20 [ 2678.327135][ T7439] ? proc_fail_nth_write+0x213/0x290 [ 2678.332256][ T7439] ? proc_fail_nth_read+0x220/0x220 [ 2678.337290][ T7439] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2678.342235][ T7439] ? vfs_write+0x9af/0x1050 [ 2678.346578][ T7439] ? vmacache_update+0xb7/0x120 [ 2678.351266][ T7439] kernel_clone+0x22d/0x990 [ 2678.355602][ T7439] ? file_end_write+0x1b0/0x1b0 [ 2678.360288][ T7439] ? __kasan_check_write+0x14/0x20 [ 2678.365237][ T7439] ? create_io_thread+0x1e0/0x1e0 [ 2678.370125][ T7439] ? __mutex_lock_slowpath+0x10/0x10 [ 2678.375221][ T7439] __x64_sys_clone+0x289/0x310 [ 2678.379818][ T7439] ? __do_sys_vfork+0x130/0x130 [ 2678.384506][ T7439] ? debug_smp_processor_id+0x17/0x20 [ 2678.389715][ T7439] do_syscall_64+0x44/0xd0 [ 2678.393966][ T7439] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2678.399692][ T7439] RIP: 0033:0x7fc683db00c9 [ 2678.403948][ T7439] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2678.423385][ T7439] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:44:15 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) 00:44:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1a, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2678.431631][ T7439] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2678.439448][ T7439] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2678.447256][ T7439] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.455073][ T7439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2678.462880][ T7439] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2678.470695][ T7439] [ 2678.473558][ T7456] CPU: 0 PID: 7456 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2678.483539][ T7456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2678.493427][ T7456] Call Trace: [ 2678.496551][ T7456] [ 2678.499329][ T7456] dump_stack_lvl+0x151/0x1b7 [ 2678.503841][ T7456] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2678.509138][ T7456] dump_stack+0x15/0x17 [ 2678.513130][ T7456] should_fail+0x3c0/0x510 [ 2678.517382][ T7456] should_fail_alloc_page+0x58/0x70 [ 2678.522423][ T7456] __alloc_pages+0x1de/0x7c0 [ 2678.526850][ T7456] ? __count_vm_events+0x30/0x30 [ 2678.531623][ T7456] ? __kasan_kmalloc+0x9/0x10 [ 2678.536132][ T7456] ? __kmalloc+0x203/0x350 [ 2678.540380][ T7456] ? __vmalloc_node_range+0x2e3/0x800 [ 2678.545589][ T7456] __vmalloc_node_range+0x48f/0x800 [ 2678.550628][ T7456] dup_task_struct+0x61f/0xa60 [ 2678.555232][ T7456] ? copy_process+0x579/0x3250 [ 2678.559828][ T7456] ? __kasan_check_write+0x14/0x20 [ 2678.564775][ T7456] copy_process+0x579/0x3250 [ 2678.569200][ T7456] ? __kasan_check_write+0x14/0x20 [ 2678.574147][ T7456] ? proc_fail_nth_write+0x213/0x290 [ 2678.579269][ T7456] ? proc_fail_nth_read+0x220/0x220 [ 2678.584300][ T7456] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2678.589249][ T7456] ? vfs_write+0x9af/0x1050 [ 2678.593586][ T7456] ? vmacache_update+0xb7/0x120 [ 2678.598279][ T7456] kernel_clone+0x22d/0x990 [ 2678.602613][ T7456] ? file_end_write+0x1b0/0x1b0 [ 2678.607298][ T7456] ? __kasan_check_write+0x14/0x20 [ 2678.612246][ T7456] ? create_io_thread+0x1e0/0x1e0 [ 2678.617108][ T7456] ? __mutex_lock_slowpath+0x10/0x10 [ 2678.622225][ T7456] __x64_sys_clone+0x289/0x310 [ 2678.626825][ T7456] ? __do_sys_vfork+0x130/0x130 [ 2678.631516][ T7456] ? debug_smp_processor_id+0x17/0x20 [ 2678.636720][ T7456] do_syscall_64+0x44/0xd0 [ 2678.640971][ T7456] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2678.646706][ T7456] RIP: 0033:0x7ffbc66bf0c9 [ 2678.650955][ T7456] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2678.670394][ T7456] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2678.678643][ T7456] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 00:44:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) 00:44:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x2500}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe01}, 0x48) 00:44:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7a}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x35, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc4}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13) 00:44:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x3600}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe02}, 0x48) [ 2678.686459][ T7456] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2678.694264][ T7456] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.702074][ T7456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2678.709890][ T7456] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2678.717705][ T7456] 00:44:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x300}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xe03}, 0x48) [ 2678.751118][ T7466] FAULT_INJECTION: forcing a failure. [ 2678.751118][ T7466] name failslab, interval 1, probability 0, space 0, times 0 [ 2678.755925][ T7473] FAULT_INJECTION: forcing a failure. [ 2678.755925][ T7473] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2678.779141][ T7473] CPU: 0 PID: 7473 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2678.789115][ T7473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2678.799009][ T7473] Call Trace: [ 2678.802132][ T7473] [ 2678.804908][ T7473] dump_stack_lvl+0x151/0x1b7 [ 2678.809428][ T7473] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2678.814717][ T7473] ? pcpu_block_update_hint_alloc+0x972/0xd00 [ 2678.820621][ T7473] dump_stack+0x15/0x17 [ 2678.824613][ T7473] should_fail+0x3c0/0x510 [ 2678.828867][ T7473] should_fail_alloc_page+0x58/0x70 [ 2678.833899][ T7473] __alloc_pages+0x1de/0x7c0 [ 2678.838325][ T7473] ? __count_vm_events+0x30/0x30 [ 2678.843098][ T7473] __get_free_pages+0xe/0x30 [ 2678.847523][ T7473] pgd_alloc+0x22/0x2c0 [ 2678.851515][ T7473] mm_init+0x5bf/0x960 [ 2678.855420][ T7473] dup_mm+0x7d/0x330 [ 2678.859154][ T7473] copy_mm+0x108/0x1b0 [ 2678.863058][ T7473] copy_process+0x1295/0x3250 [ 2678.867575][ T7473] ? proc_fail_nth_write+0x213/0x290 [ 2678.872691][ T7473] ? proc_fail_nth_read+0x220/0x220 [ 2678.877735][ T7473] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2678.882674][ T7473] ? vfs_write+0x9af/0x1050 [ 2678.887017][ T7473] ? vmacache_update+0xb7/0x120 [ 2678.891705][ T7473] kernel_clone+0x22d/0x990 [ 2678.896044][ T7473] ? file_end_write+0x1b0/0x1b0 [ 2678.900727][ T7473] ? __kasan_check_write+0x14/0x20 [ 2678.905675][ T7473] ? create_io_thread+0x1e0/0x1e0 [ 2678.910535][ T7473] ? __mutex_lock_slowpath+0x10/0x10 [ 2678.915658][ T7473] __x64_sys_clone+0x289/0x310 [ 2678.920261][ T7473] ? __do_sys_vfork+0x130/0x130 [ 2678.924944][ T7473] ? debug_smp_processor_id+0x17/0x20 [ 2678.930150][ T7473] do_syscall_64+0x44/0xd0 [ 2678.934446][ T7473] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2678.940132][ T7473] RIP: 0033:0x7ffbc66bf0c9 [ 2678.944386][ T7473] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2678.963824][ T7473] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2678.972069][ T7473] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2678.979878][ T7473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2678.987691][ T7473] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2678.995503][ T7473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2679.003313][ T7473] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2679.011128][ T7473] [ 2679.013991][ T7466] CPU: 1 PID: 7466 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2679.023973][ T7466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2679.033865][ T7466] Call Trace: [ 2679.036988][ T7466] [ 2679.039763][ T7466] dump_stack_lvl+0x151/0x1b7 [ 2679.044277][ T7466] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2679.049571][ T7466] dump_stack+0x15/0x17 [ 2679.053563][ T7466] should_fail+0x3c0/0x510 [ 2679.057819][ T7466] __should_failslab+0x9f/0xe0 [ 2679.062417][ T7466] should_failslab+0x9/0x20 [ 2679.066756][ T7466] kmem_cache_alloc+0x4f/0x2f0 [ 2679.071356][ T7466] ? copy_sighand+0x54/0x250 [ 2679.075782][ T7466] ? _raw_spin_unlock+0x4d/0x70 [ 2679.080471][ T7466] copy_sighand+0x54/0x250 [ 2679.084722][ T7466] copy_process+0x123f/0x3250 [ 2679.089240][ T7466] ? proc_fail_nth_write+0x213/0x290 [ 2679.094357][ T7466] ? proc_fail_nth_read+0x220/0x220 [ 2679.099392][ T7466] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2679.104336][ T7466] ? vfs_write+0x9af/0x1050 [ 2679.108676][ T7466] ? vmacache_update+0xb7/0x120 [ 2679.113363][ T7466] kernel_clone+0x22d/0x990 [ 2679.117704][ T7466] ? file_end_write+0x1b0/0x1b0 [ 2679.122389][ T7466] ? __kasan_check_write+0x14/0x20 [ 2679.127339][ T7466] ? create_io_thread+0x1e0/0x1e0 [ 2679.132198][ T7466] ? __mutex_lock_slowpath+0x10/0x10 [ 2679.137319][ T7466] __x64_sys_clone+0x289/0x310 [ 2679.141919][ T7466] ? __do_sys_vfork+0x130/0x130 [ 2679.146606][ T7466] ? debug_smp_processor_id+0x17/0x20 [ 2679.151812][ T7466] do_syscall_64+0x44/0xd0 [ 2679.156064][ T7466] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2679.161795][ T7466] RIP: 0033:0x7fc683db00c9 [ 2679.166053][ T7466] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2679.185490][ T7466] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2679.193733][ T7466] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 00:44:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x500}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf00}, 0x48) 00:44:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4300}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:16 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14) 00:44:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1001}, 0x48) 00:44:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x600}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2679.201543][ T7466] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2679.209355][ T7466] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.217168][ T7466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2679.224978][ T7466] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2679.232790][ T7466] 00:44:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1002}, 0x48) [ 2679.262091][ T7491] FAULT_INJECTION: forcing a failure. [ 2679.262091][ T7491] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.279154][ T7491] CPU: 1 PID: 7491 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2679.289135][ T7491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2679.299032][ T7491] Call Trace: [ 2679.302152][ T7491] [ 2679.304930][ T7491] dump_stack_lvl+0x151/0x1b7 [ 2679.305018][ T7505] FAULT_INJECTION: forcing a failure. [ 2679.305018][ T7505] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.309441][ T7491] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2679.309470][ T7491] dump_stack+0x15/0x17 [ 2679.331141][ T7491] should_fail+0x3c0/0x510 [ 2679.335393][ T7491] __should_failslab+0x9f/0xe0 [ 2679.339991][ T7491] should_failslab+0x9/0x20 [ 2679.344331][ T7491] kmem_cache_alloc+0x4f/0x2f0 [ 2679.348933][ T7491] ? vm_area_dup+0x26/0x1d0 [ 2679.353272][ T7491] vm_area_dup+0x26/0x1d0 [ 2679.357438][ T7491] dup_mmap+0x6b8/0xea0 [ 2679.361431][ T7491] ? __delayed_free_task+0x20/0x20 [ 2679.366377][ T7491] ? mm_init+0x807/0x960 [ 2679.370457][ T7491] dup_mm+0x91/0x330 [ 2679.374190][ T7491] copy_mm+0x108/0x1b0 [ 2679.378099][ T7491] copy_process+0x1295/0x3250 [ 2679.382606][ T7491] ? proc_fail_nth_write+0x213/0x290 [ 2679.387726][ T7491] ? proc_fail_nth_read+0x220/0x220 [ 2679.392763][ T7491] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2679.397714][ T7491] ? vfs_write+0x9af/0x1050 [ 2679.402047][ T7491] ? vmacache_update+0xb7/0x120 [ 2679.406737][ T7491] kernel_clone+0x22d/0x990 [ 2679.411074][ T7491] ? file_end_write+0x1b0/0x1b0 [ 2679.415762][ T7491] ? __kasan_check_write+0x14/0x20 [ 2679.420707][ T7491] ? create_io_thread+0x1e0/0x1e0 [ 2679.425569][ T7491] ? __mutex_lock_slowpath+0x10/0x10 [ 2679.430691][ T7491] __x64_sys_clone+0x289/0x310 [ 2679.435290][ T7491] ? __do_sys_vfork+0x130/0x130 [ 2679.439977][ T7491] ? debug_smp_processor_id+0x17/0x20 [ 2679.445182][ T7491] do_syscall_64+0x44/0xd0 [ 2679.449443][ T7491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2679.455163][ T7491] RIP: 0033:0x7ffbc66bf0c9 [ 2679.459418][ T7491] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2679.478859][ T7491] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2679.487103][ T7491] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2679.494914][ T7491] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2679.502724][ T7491] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.510535][ T7491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2679.518346][ T7491] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2679.526164][ T7491] [ 2679.529026][ T7505] CPU: 0 PID: 7505 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2679.539045][ T7505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2679.548899][ T7505] Call Trace: [ 2679.552025][ T7505] [ 2679.554798][ T7505] dump_stack_lvl+0x151/0x1b7 [ 2679.559310][ T7505] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2679.564606][ T7505] dump_stack+0x15/0x17 [ 2679.568597][ T7505] should_fail+0x3c0/0x510 [ 2679.572852][ T7505] __should_failslab+0x9f/0xe0 [ 2679.577463][ T7505] should_failslab+0x9/0x20 [ 2679.581790][ T7505] kmem_cache_alloc+0x4f/0x2f0 [ 2679.586406][ T7505] ? copy_signal+0x55/0x610 [ 2679.590737][ T7505] copy_signal+0x55/0x610 [ 2679.594896][ T7505] copy_process+0x126a/0x3250 [ 2679.599415][ T7505] ? proc_fail_nth_write+0x213/0x290 [ 2679.604536][ T7505] ? proc_fail_nth_read+0x220/0x220 [ 2679.609569][ T7505] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2679.614510][ T7505] ? vfs_write+0x9af/0x1050 [ 2679.618850][ T7505] ? vmacache_update+0xb7/0x120 [ 2679.623538][ T7505] kernel_clone+0x22d/0x990 [ 2679.627875][ T7505] ? file_end_write+0x1b0/0x1b0 [ 2679.632563][ T7505] ? __kasan_check_write+0x14/0x20 [ 2679.637510][ T7505] ? create_io_thread+0x1e0/0x1e0 [ 2679.642379][ T7505] ? __mutex_lock_slowpath+0x10/0x10 [ 2679.647493][ T7505] __x64_sys_clone+0x289/0x310 [ 2679.652094][ T7505] ? __do_sys_vfork+0x130/0x130 [ 2679.656780][ T7505] ? debug_smp_processor_id+0x17/0x20 [ 2679.661987][ T7505] do_syscall_64+0x44/0xd0 [ 2679.666238][ T7505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2679.671966][ T7505] RIP: 0033:0x7fc683db00c9 [ 2679.676221][ T7505] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2679.695663][ T7505] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2679.703905][ T7505] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:17 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 00:44:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4c00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x700}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1003}, 0x48) 00:44:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15) 00:44:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2679.711717][ T7505] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2679.719529][ T7505] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2679.727338][ T7505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2679.735151][ T7505] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2679.742964][ T7505] 00:44:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x900}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1100}, 0x48) 00:44:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xa00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1200}, 0x48) [ 2679.767505][ T7515] FAULT_INJECTION: forcing a failure. [ 2679.767505][ T7515] name failslab, interval 1, probability 0, space 0, times 0 [ 2679.782136][ T7519] FAULT_INJECTION: forcing a failure. [ 2679.782136][ T7519] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2679.807579][ T7515] CPU: 1 PID: 7515 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2679.817656][ T7515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2679.827550][ T7515] Call Trace: [ 2679.830671][ T7515] [ 2679.833445][ T7515] dump_stack_lvl+0x151/0x1b7 [ 2679.837960][ T7515] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2679.843259][ T7515] dump_stack+0x15/0x17 [ 2679.847248][ T7515] should_fail+0x3c0/0x510 [ 2679.851499][ T7515] __should_failslab+0x9f/0xe0 [ 2679.856101][ T7515] should_failslab+0x9/0x20 [ 2679.860439][ T7515] kmem_cache_alloc+0x4f/0x2f0 [ 2679.865041][ T7515] ? vm_area_dup+0x26/0x1d0 [ 2679.869376][ T7515] ? __kasan_check_read+0x11/0x20 [ 2679.874239][ T7515] vm_area_dup+0x26/0x1d0 [ 2679.878403][ T7515] dup_mmap+0x6b8/0xea0 [ 2679.882399][ T7515] ? __delayed_free_task+0x20/0x20 [ 2679.887346][ T7515] ? mm_init+0x807/0x960 [ 2679.891424][ T7515] dup_mm+0x91/0x330 [ 2679.895154][ T7515] copy_mm+0x108/0x1b0 [ 2679.899060][ T7515] copy_process+0x1295/0x3250 [ 2679.903574][ T7515] ? proc_fail_nth_write+0x213/0x290 [ 2679.908696][ T7515] ? proc_fail_nth_read+0x220/0x220 [ 2679.913728][ T7515] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2679.918674][ T7515] ? vfs_write+0x9af/0x1050 [ 2679.923016][ T7515] ? vmacache_update+0xb7/0x120 [ 2679.927701][ T7515] kernel_clone+0x22d/0x990 [ 2679.932041][ T7515] ? file_end_write+0x1b0/0x1b0 [ 2679.936735][ T7515] ? __kasan_check_write+0x14/0x20 [ 2679.941675][ T7515] ? create_io_thread+0x1e0/0x1e0 [ 2679.946538][ T7515] ? __mutex_lock_slowpath+0x10/0x10 [ 2679.951655][ T7515] __x64_sys_clone+0x289/0x310 [ 2679.956259][ T7515] ? __do_sys_vfork+0x130/0x130 [ 2679.960946][ T7515] ? debug_smp_processor_id+0x17/0x20 [ 2679.966152][ T7515] do_syscall_64+0x44/0xd0 [ 2679.970403][ T7515] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2679.976132][ T7515] RIP: 0033:0x7ffbc66bf0c9 [ 2679.980384][ T7515] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2679.999844][ T7515] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2680.008722][ T7515] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2680.016531][ T7515] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2680.024340][ T7515] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.032152][ T7515] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2680.039963][ T7515] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2680.047781][ T7515] [ 2680.050641][ T7519] CPU: 0 PID: 7519 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2680.060624][ T7519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2680.070529][ T7519] Call Trace: [ 2680.073638][ T7519] [ 2680.076415][ T7519] dump_stack_lvl+0x151/0x1b7 [ 2680.080930][ T7519] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2680.086224][ T7519] dump_stack+0x15/0x17 [ 2680.090214][ T7519] should_fail+0x3c0/0x510 [ 2680.094466][ T7519] should_fail_alloc_page+0x58/0x70 [ 2680.099506][ T7519] __alloc_pages+0x1de/0x7c0 [ 2680.103928][ T7519] ? __count_vm_events+0x30/0x30 [ 2680.108701][ T7519] ? __kasan_kmalloc+0x9/0x10 [ 2680.113214][ T7519] ? __kmalloc+0x203/0x350 [ 2680.117468][ T7519] ? __vmalloc_node_range+0x2e3/0x800 [ 2680.122675][ T7519] __vmalloc_node_range+0x48f/0x800 [ 2680.127708][ T7519] dup_task_struct+0x61f/0xa60 [ 2680.132307][ T7519] ? copy_process+0x579/0x3250 [ 2680.136907][ T7519] ? __kasan_check_write+0x14/0x20 [ 2680.141853][ T7519] copy_process+0x579/0x3250 [ 2680.146282][ T7519] ? __kasan_check_write+0x14/0x20 [ 2680.151229][ T7519] ? proc_fail_nth_write+0x213/0x290 [ 2680.156351][ T7519] ? proc_fail_nth_read+0x220/0x220 [ 2680.161385][ T7519] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2680.166331][ T7519] ? vfs_write+0x9af/0x1050 [ 2680.170669][ T7519] ? vmacache_update+0xb7/0x120 [ 2680.175357][ T7519] kernel_clone+0x22d/0x990 [ 2680.179695][ T7519] ? file_end_write+0x1b0/0x1b0 [ 2680.184382][ T7519] ? __kasan_check_write+0x14/0x20 [ 2680.189331][ T7519] ? create_io_thread+0x1e0/0x1e0 [ 2680.194191][ T7519] ? __mutex_lock_slowpath+0x10/0x10 [ 2680.199313][ T7519] __x64_sys_clone+0x289/0x310 [ 2680.203911][ T7519] ? __do_sys_vfork+0x130/0x130 [ 2680.208597][ T7519] ? debug_smp_processor_id+0x17/0x20 [ 2680.213806][ T7519] do_syscall_64+0x44/0xd0 [ 2680.218058][ T7519] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2680.223786][ T7519] RIP: 0033:0x7fc683db00c9 [ 2680.228039][ T7519] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2680.247480][ T7519] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2680.255725][ T7519] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:17 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) 00:44:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xb00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6c00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1201}, 0x48) 00:44:17 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) 00:44:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7400}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2680.263537][ T7519] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2680.271347][ T7519] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.279163][ T7519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2680.286970][ T7519] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2680.294786][ T7519] 00:44:17 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1202}, 0x48) 00:44:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7a00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2680.317652][ T7535] FAULT_INJECTION: forcing a failure. [ 2680.317652][ T7535] name failslab, interval 1, probability 0, space 0, times 0 [ 2680.329781][ T7544] FAULT_INJECTION: forcing a failure. [ 2680.329781][ T7544] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2680.355657][ T7544] CPU: 0 PID: 7544 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2680.365644][ T7544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2680.375535][ T7544] Call Trace: [ 2680.378656][ T7544] [ 2680.381435][ T7544] dump_stack_lvl+0x151/0x1b7 [ 2680.385947][ T7544] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2680.391245][ T7544] dump_stack+0x15/0x17 [ 2680.395236][ T7544] should_fail+0x3c0/0x510 [ 2680.399491][ T7544] should_fail_alloc_page+0x58/0x70 [ 2680.404521][ T7544] __alloc_pages+0x1de/0x7c0 [ 2680.408949][ T7544] ? __count_vm_events+0x30/0x30 [ 2680.413723][ T7544] ? __kasan_kmalloc+0x9/0x10 [ 2680.418234][ T7544] ? __kmalloc+0x203/0x350 [ 2680.422489][ T7544] ? __vmalloc_node_range+0x2e3/0x800 [ 2680.427696][ T7544] __vmalloc_node_range+0x48f/0x800 [ 2680.432732][ T7544] dup_task_struct+0x61f/0xa60 [ 2680.437328][ T7544] ? copy_process+0x579/0x3250 [ 2680.441933][ T7544] ? __kasan_check_write+0x14/0x20 [ 2680.446876][ T7544] copy_process+0x579/0x3250 [ 2680.451304][ T7544] ? __kasan_check_write+0x14/0x20 [ 2680.456246][ T7544] ? proc_fail_nth_write+0x213/0x290 [ 2680.461368][ T7544] ? proc_fail_nth_read+0x220/0x220 [ 2680.466404][ T7544] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2680.471352][ T7544] ? vfs_write+0x9af/0x1050 [ 2680.475691][ T7544] ? vmacache_update+0xb7/0x120 [ 2680.480378][ T7544] kernel_clone+0x22d/0x990 [ 2680.484717][ T7544] ? file_end_write+0x1b0/0x1b0 [ 2680.489404][ T7544] ? __kasan_check_write+0x14/0x20 [ 2680.494352][ T7544] ? create_io_thread+0x1e0/0x1e0 [ 2680.499215][ T7544] ? __mutex_lock_slowpath+0x10/0x10 [ 2680.504331][ T7544] __x64_sys_clone+0x289/0x310 [ 2680.508932][ T7544] ? __do_sys_vfork+0x130/0x130 [ 2680.513621][ T7544] ? debug_smp_processor_id+0x17/0x20 [ 2680.518827][ T7544] do_syscall_64+0x44/0xd0 [ 2680.523078][ T7544] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2680.528805][ T7544] RIP: 0033:0x7fc683db00c9 [ 2680.533060][ T7544] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2680.552505][ T7544] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2680.560747][ T7544] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2680.568559][ T7544] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2680.576371][ T7544] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.584182][ T7544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2680.591991][ T7544] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2680.599808][ T7544] [ 2680.602668][ T7535] CPU: 1 PID: 7535 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2680.612653][ T7535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2680.622548][ T7535] Call Trace: [ 2680.625371][ T7558] FAULT_INJECTION: forcing a failure. [ 2680.625371][ T7558] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2680.625673][ T7535] [ 2680.625682][ T7535] dump_stack_lvl+0x151/0x1b7 [ 2680.645980][ T7535] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2680.651273][ T7535] ? do_syscall_64+0x44/0xd0 [ 2680.655696][ T7535] dump_stack+0x15/0x17 [ 2680.659691][ T7535] should_fail+0x3c0/0x510 [ 2680.663941][ T7535] __should_failslab+0x9f/0xe0 00:44:18 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13) 00:44:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xd00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1300}, 0x48) 00:44:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc400}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2680.668540][ T7535] should_failslab+0x9/0x20 [ 2680.672880][ T7535] kmem_cache_alloc+0x4f/0x2f0 [ 2680.677484][ T7535] ? anon_vma_clone+0xa1/0x4f0 [ 2680.682081][ T7535] anon_vma_clone+0xa1/0x4f0 [ 2680.686510][ T7535] anon_vma_fork+0x91/0x4f0 [ 2680.690846][ T7535] ? anon_vma_name+0x4c/0x70 [ 2680.695276][ T7535] dup_mmap+0x750/0xea0 [ 2680.699267][ T7535] ? __delayed_free_task+0x20/0x20 [ 2680.704212][ T7535] ? mm_init+0x807/0x960 [ 2680.708291][ T7535] dup_mm+0x91/0x330 [ 2680.712026][ T7535] copy_mm+0x108/0x1b0 [ 2680.715929][ T7535] copy_process+0x1295/0x3250 [ 2680.720443][ T7535] ? proc_fail_nth_write+0x213/0x290 [ 2680.725562][ T7535] ? proc_fail_nth_read+0x220/0x220 [ 2680.730598][ T7535] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2680.735545][ T7535] ? vfs_write+0x9af/0x1050 [ 2680.739884][ T7535] ? vmacache_update+0xb7/0x120 [ 2680.744573][ T7535] kernel_clone+0x22d/0x990 [ 2680.748913][ T7535] ? file_end_write+0x1b0/0x1b0 [ 2680.753598][ T7535] ? __kasan_check_write+0x14/0x20 [ 2680.758544][ T7535] ? create_io_thread+0x1e0/0x1e0 [ 2680.763405][ T7535] ? __mutex_lock_slowpath+0x10/0x10 [ 2680.768531][ T7535] __x64_sys_clone+0x289/0x310 [ 2680.773138][ T7535] ? __do_sys_vfork+0x130/0x130 [ 2680.777816][ T7535] ? debug_smp_processor_id+0x17/0x20 [ 2680.783022][ T7535] do_syscall_64+0x44/0xd0 [ 2680.787272][ T7535] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2680.792998][ T7535] RIP: 0033:0x7ffbc66bf0c9 [ 2680.797255][ T7535] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x40000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2680.816695][ T7535] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2680.824937][ T7535] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2680.832747][ T7535] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2680.840650][ T7535] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2680.848468][ T7535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2680.856270][ T7535] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2680.864084][ T7535] [ 2680.876148][ T7558] CPU: 1 PID: 7558 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2680.886123][ T7558] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2680.896011][ T7558] Call Trace: [ 2680.899138][ T7558] [ 2680.901917][ T7558] dump_stack_lvl+0x151/0x1b7 [ 2680.906427][ T7558] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2680.911722][ T7558] dump_stack+0x15/0x17 [ 2680.915713][ T7558] should_fail+0x3c0/0x510 [ 2680.919968][ T7558] should_fail_alloc_page+0x58/0x70 [ 2680.924999][ T7558] __alloc_pages+0x1de/0x7c0 [ 2680.929429][ T7558] ? __count_vm_events+0x30/0x30 [ 2680.934201][ T7558] ? __kasan_kmalloc+0x9/0x10 [ 2680.938713][ T7558] ? __kmalloc+0x203/0x350 [ 2680.942969][ T7558] ? __vmalloc_node_range+0x2e3/0x800 [ 2680.948175][ T7558] __vmalloc_node_range+0x48f/0x800 [ 2680.953211][ T7558] dup_task_struct+0x61f/0xa60 [ 2680.957808][ T7558] ? copy_process+0x579/0x3250 [ 2680.962409][ T7558] ? __kasan_check_write+0x14/0x20 [ 2680.967358][ T7558] copy_process+0x579/0x3250 [ 2680.971782][ T7558] ? __kasan_check_write+0x14/0x20 [ 2680.976730][ T7558] ? proc_fail_nth_write+0x213/0x290 [ 2680.981850][ T7558] ? proc_fail_nth_read+0x220/0x220 [ 2680.986883][ T7558] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2680.991829][ T7558] ? vfs_write+0x9af/0x1050 [ 2680.996168][ T7558] ? vmacache_update+0xb7/0x120 [ 2681.000858][ T7558] kernel_clone+0x22d/0x990 [ 2681.005195][ T7558] ? file_end_write+0x1b0/0x1b0 [ 2681.009882][ T7558] ? __kasan_check_write+0x14/0x20 [ 2681.014829][ T7558] ? create_io_thread+0x1e0/0x1e0 [ 2681.019690][ T7558] ? __mutex_lock_slowpath+0x10/0x10 [ 2681.024814][ T7558] __x64_sys_clone+0x289/0x310 [ 2681.029412][ T7558] ? __do_sys_vfork+0x130/0x130 [ 2681.034099][ T7558] ? debug_smp_processor_id+0x17/0x20 [ 2681.039307][ T7558] do_syscall_64+0x44/0xd0 [ 2681.043559][ T7558] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2681.049289][ T7558] RIP: 0033:0x7fc683db00c9 [ 2681.053540][ T7558] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:18 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 00:44:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xfffff}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1400}, 0x48) 00:44:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xe00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:18 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14) [ 2681.072980][ T7558] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2681.081228][ T7558] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2681.089037][ T7558] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2681.096846][ T7558] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2681.104660][ T7558] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2681.112470][ T7558] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2681.120286][ T7558] 00:44:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x1000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2681.153596][ T7577] FAULT_INJECTION: forcing a failure. [ 2681.153596][ T7577] name failslab, interval 1, probability 0, space 0, times 0 [ 2681.166312][ T7572] FAULT_INJECTION: forcing a failure. [ 2681.166312][ T7572] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2681.170475][ T7577] CPU: 0 PID: 7577 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2681.189300][ T7577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2681.199192][ T7577] Call Trace: [ 2681.202315][ T7577] [ 2681.205094][ T7577] dump_stack_lvl+0x151/0x1b7 [ 2681.209607][ T7577] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2681.214900][ T7577] dump_stack+0x15/0x17 [ 2681.218891][ T7577] should_fail+0x3c0/0x510 [ 2681.223145][ T7577] ? security_prepare_creds+0x50/0x160 [ 2681.228440][ T7577] __should_failslab+0x9f/0xe0 [ 2681.233038][ T7577] should_failslab+0x9/0x20 [ 2681.237378][ T7577] __kmalloc+0x6d/0x350 [ 2681.241372][ T7577] security_prepare_creds+0x50/0x160 [ 2681.246492][ T7577] prepare_creds+0x471/0x690 [ 2681.250918][ T7577] copy_creds+0xde/0x640 [ 2681.254997][ T7577] copy_process+0x775/0x3250 [ 2681.259423][ T7577] ? __kasan_check_write+0x14/0x20 [ 2681.264371][ T7577] ? proc_fail_nth_write+0x213/0x290 [ 2681.269490][ T7577] ? proc_fail_nth_read+0x220/0x220 [ 2681.274527][ T7577] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2681.279472][ T7577] ? vfs_write+0x9af/0x1050 [ 2681.283811][ T7577] ? vmacache_update+0xb7/0x120 [ 2681.288501][ T7577] kernel_clone+0x22d/0x990 [ 2681.292839][ T7577] ? file_end_write+0x1b0/0x1b0 [ 2681.297525][ T7577] ? __kasan_check_write+0x14/0x20 [ 2681.302472][ T7577] ? create_io_thread+0x1e0/0x1e0 [ 2681.307333][ T7577] ? __mutex_lock_slowpath+0x10/0x10 [ 2681.312453][ T7577] __x64_sys_clone+0x289/0x310 [ 2681.317055][ T7577] ? __do_sys_vfork+0x130/0x130 [ 2681.321740][ T7577] ? debug_smp_processor_id+0x17/0x20 [ 2681.326948][ T7577] do_syscall_64+0x44/0xd0 [ 2681.331201][ T7577] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2681.336928][ T7577] RIP: 0033:0x7ffbc66bf0c9 [ 2681.341181][ T7577] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2681.360620][ T7577] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2681.368868][ T7577] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2681.376679][ T7577] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2681.384489][ T7577] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2681.392299][ T7577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x1100}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1401}, 0x48) 00:44:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x2000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2681.400111][ T7577] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2681.407929][ T7577] [ 2681.410790][ T7572] CPU: 1 PID: 7572 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2681.420772][ T7572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2681.430668][ T7572] Call Trace: [ 2681.433790][ T7572] [ 2681.436570][ T7572] dump_stack_lvl+0x151/0x1b7 [ 2681.441085][ T7572] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2681.446377][ T7572] dump_stack+0x15/0x17 [ 2681.450368][ T7572] should_fail+0x3c0/0x510 [ 2681.454622][ T7572] should_fail_alloc_page+0x58/0x70 [ 2681.459650][ T7572] __alloc_pages+0x1de/0x7c0 [ 2681.464076][ T7572] ? __count_vm_events+0x30/0x30 [ 2681.468851][ T7572] ? __kasan_kmalloc+0x9/0x10 [ 2681.473368][ T7572] ? __kmalloc+0x203/0x350 [ 2681.477616][ T7572] ? __vmalloc_node_range+0x2e3/0x800 [ 2681.482824][ T7572] __vmalloc_node_range+0x48f/0x800 [ 2681.487859][ T7572] dup_task_struct+0x61f/0xa60 [ 2681.492456][ T7572] ? copy_process+0x579/0x3250 [ 2681.497058][ T7572] ? __kasan_check_write+0x14/0x20 [ 2681.502003][ T7572] copy_process+0x579/0x3250 [ 2681.506432][ T7572] ? __kasan_check_write+0x14/0x20 [ 2681.511376][ T7572] ? proc_fail_nth_write+0x213/0x290 [ 2681.516499][ T7572] ? proc_fail_nth_read+0x220/0x220 [ 2681.521534][ T7572] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2681.526479][ T7572] ? vfs_write+0x9af/0x1050 [ 2681.530820][ T7572] ? vmacache_update+0xb7/0x120 [ 2681.535506][ T7572] kernel_clone+0x22d/0x990 [ 2681.539845][ T7572] ? file_end_write+0x1b0/0x1b0 [ 2681.544532][ T7572] ? __kasan_check_write+0x14/0x20 [ 2681.549482][ T7572] ? create_io_thread+0x1e0/0x1e0 [ 2681.554339][ T7572] ? __mutex_lock_slowpath+0x10/0x10 [ 2681.559459][ T7572] __x64_sys_clone+0x289/0x310 [ 2681.564062][ T7572] ? __do_sys_vfork+0x130/0x130 [ 2681.568836][ T7572] ? debug_smp_processor_id+0x17/0x20 [ 2681.573960][ T7572] do_syscall_64+0x44/0xd0 [ 2681.578211][ T7572] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2681.583937][ T7572] RIP: 0033:0x7fc683db00c9 [ 2681.588190][ T7572] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2681.607631][ T7572] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2681.615878][ T7572] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2681.623689][ T7572] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2681.631496][ T7572] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2681.639318][ T7572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2681.647120][ T7572] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 00:44:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 00:44:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1402}, 0x48) 00:44:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x3000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x1200}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:19 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15) 00:44:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1500}, 0x48) 00:44:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x1800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2681.654934][ T7572] [ 2681.673489][ T7597] FAULT_INJECTION: forcing a failure. [ 2681.673489][ T7597] name failslab, interval 1, probability 0, space 0, times 0 [ 2681.697801][ T7603] FAULT_INJECTION: forcing a failure. [ 2681.697801][ T7603] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2681.705656][ T7597] CPU: 1 PID: 7597 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2681.720798][ T7597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2681.730694][ T7597] Call Trace: [ 2681.733816][ T7597] [ 2681.736600][ T7597] dump_stack_lvl+0x151/0x1b7 [ 2681.741108][ T7597] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2681.746403][ T7597] dump_stack+0x15/0x17 [ 2681.750392][ T7597] should_fail+0x3c0/0x510 [ 2681.754647][ T7597] __should_failslab+0x9f/0xe0 [ 2681.759247][ T7597] should_failslab+0x9/0x20 [ 2681.763584][ T7597] kmem_cache_alloc+0x4f/0x2f0 [ 2681.768188][ T7597] ? anon_vma_fork+0x1b9/0x4f0 [ 2681.772790][ T7597] anon_vma_fork+0x1b9/0x4f0 [ 2681.777214][ T7597] dup_mmap+0x750/0xea0 [ 2681.781205][ T7597] ? __delayed_free_task+0x20/0x20 [ 2681.786153][ T7597] ? mm_init+0x807/0x960 [ 2681.790233][ T7597] dup_mm+0x91/0x330 [ 2681.793964][ T7597] copy_mm+0x108/0x1b0 [ 2681.797868][ T7597] copy_process+0x1295/0x3250 00:44:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1600}, 0x48) [ 2681.802383][ T7597] ? proc_fail_nth_write+0x213/0x290 [ 2681.807500][ T7597] ? proc_fail_nth_read+0x220/0x220 [ 2681.812534][ T7597] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2681.817480][ T7597] ? vfs_write+0x9af/0x1050 [ 2681.821828][ T7597] ? vmacache_update+0xb7/0x120 [ 2681.826512][ T7597] kernel_clone+0x22d/0x990 [ 2681.830849][ T7597] ? file_end_write+0x1b0/0x1b0 [ 2681.835536][ T7597] ? __kasan_check_write+0x14/0x20 [ 2681.840484][ T7597] ? create_io_thread+0x1e0/0x1e0 [ 2681.845342][ T7597] ? __mutex_lock_slowpath+0x10/0x10 [ 2681.850465][ T7597] __x64_sys_clone+0x289/0x310 00:44:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x2500}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2681.855065][ T7597] ? __do_sys_vfork+0x130/0x130 [ 2681.859752][ T7597] ? debug_smp_processor_id+0x17/0x20 [ 2681.864959][ T7597] do_syscall_64+0x44/0xd0 [ 2681.869211][ T7597] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2681.874939][ T7597] RIP: 0033:0x7ffbc66bf0c9 [ 2681.879198][ T7597] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2681.898636][ T7597] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2681.906881][ T7597] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2681.914688][ T7597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2681.922498][ T7597] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2681.930312][ T7597] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2681.938121][ T7597] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2681.945938][ T7597] [ 2681.948798][ T7603] CPU: 0 PID: 7603 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2681.959304][ T7603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2681.969192][ T7603] Call Trace: [ 2681.972315][ T7603] [ 2681.975092][ T7603] dump_stack_lvl+0x151/0x1b7 [ 2681.979605][ T7603] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2681.984901][ T7603] dump_stack+0x15/0x17 [ 2681.988892][ T7603] should_fail+0x3c0/0x510 [ 2681.993152][ T7603] should_fail_alloc_page+0x58/0x70 [ 2681.998179][ T7603] __alloc_pages+0x1de/0x7c0 [ 2682.002606][ T7603] ? __count_vm_events+0x30/0x30 [ 2682.007379][ T7603] ? __kasan_kmalloc+0x9/0x10 [ 2682.011893][ T7603] ? __kmalloc+0x203/0x350 [ 2682.016150][ T7603] ? __vmalloc_node_range+0x2e3/0x800 [ 2682.021354][ T7603] __vmalloc_node_range+0x48f/0x800 [ 2682.026389][ T7603] dup_task_struct+0x61f/0xa60 [ 2682.030988][ T7603] ? copy_process+0x579/0x3250 [ 2682.035586][ T7603] ? __kasan_check_write+0x14/0x20 [ 2682.040533][ T7603] copy_process+0x579/0x3250 [ 2682.044959][ T7603] ? __kasan_check_write+0x14/0x20 [ 2682.049907][ T7603] ? proc_fail_nth_write+0x213/0x290 [ 2682.055028][ T7603] ? proc_fail_nth_read+0x220/0x220 [ 2682.060063][ T7603] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2682.065009][ T7603] ? vfs_write+0x9af/0x1050 [ 2682.069351][ T7603] ? vmacache_update+0xb7/0x120 [ 2682.074036][ T7603] kernel_clone+0x22d/0x990 [ 2682.078377][ T7603] ? file_end_write+0x1b0/0x1b0 [ 2682.083060][ T7603] ? __kasan_check_write+0x14/0x20 [ 2682.088008][ T7603] ? create_io_thread+0x1e0/0x1e0 [ 2682.092871][ T7603] ? __mutex_lock_slowpath+0x10/0x10 [ 2682.097992][ T7603] __x64_sys_clone+0x289/0x310 [ 2682.102591][ T7603] ? __do_sys_vfork+0x130/0x130 [ 2682.107276][ T7603] ? debug_smp_processor_id+0x17/0x20 [ 2682.112484][ T7603] do_syscall_64+0x44/0xd0 [ 2682.116737][ T7603] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2682.122465][ T7603] RIP: 0033:0x7fc683db00c9 [ 2682.126719][ T7603] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2682.146161][ T7603] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:44:19 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) 00:44:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x5000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x3600}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1601}, 0x48) [ 2682.154405][ T7603] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2682.162214][ T7603] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2682.170026][ T7603] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.177837][ T7603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2682.185650][ T7603] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2682.193466][ T7603] 00:44:19 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) 00:44:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4300}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:19 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1602}, 0x48) 00:44:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2682.222285][ T7620] FAULT_INJECTION: forcing a failure. [ 2682.222285][ T7620] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2682.243620][ T7635] FAULT_INJECTION: forcing a failure. [ 2682.243620][ T7635] name failslab, interval 1, probability 0, space 0, times 0 [ 2682.250413][ T7620] CPU: 0 PID: 7620 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2682.266022][ T7620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2682.275917][ T7620] Call Trace: [ 2682.279040][ T7620] [ 2682.281816][ T7620] dump_stack_lvl+0x151/0x1b7 [ 2682.286327][ T7620] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2682.291624][ T7620] ? stack_trace_save+0x1f0/0x1f0 [ 2682.296483][ T7620] ? __kernel_text_address+0x9a/0x110 [ 2682.301694][ T7620] dump_stack+0x15/0x17 [ 2682.305683][ T7620] should_fail+0x3c0/0x510 [ 2682.309935][ T7620] should_fail_alloc_page+0x58/0x70 [ 2682.314970][ T7620] __alloc_pages+0x1de/0x7c0 [ 2682.319396][ T7620] ? stack_trace_save+0x12d/0x1f0 [ 2682.324257][ T7620] ? stack_trace_snprint+0x100/0x100 [ 2682.329376][ T7620] ? __count_vm_events+0x30/0x30 [ 2682.334151][ T7620] ? __kasan_slab_alloc+0xc4/0xe0 [ 2682.339011][ T7620] ? __kasan_slab_alloc+0xb2/0xe0 [ 2682.343870][ T7620] ? kmem_cache_alloc+0x189/0x2f0 [ 2682.348732][ T7620] ? anon_vma_fork+0x1b9/0x4f0 [ 2682.353340][ T7620] get_zeroed_page+0x19/0x40 [ 2682.357760][ T7620] __pud_alloc+0x8b/0x260 [ 2682.361925][ T7620] ? do_handle_mm_fault+0x2370/0x2370 [ 2682.367134][ T7620] copy_page_range+0xd9e/0x1090 [ 2682.371822][ T7620] ? pfn_valid+0x1e0/0x1e0 [ 2682.376074][ T7620] dup_mmap+0x99f/0xea0 [ 2682.380064][ T7620] ? __delayed_free_task+0x20/0x20 [ 2682.385014][ T7620] ? mm_init+0x807/0x960 [ 2682.389111][ T7620] dup_mm+0x91/0x330 [ 2682.392823][ T7620] copy_mm+0x108/0x1b0 [ 2682.396726][ T7620] copy_process+0x1295/0x3250 [ 2682.401250][ T7620] ? proc_fail_nth_write+0x213/0x290 [ 2682.406363][ T7620] ? proc_fail_nth_read+0x220/0x220 [ 2682.411397][ T7620] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2682.416342][ T7620] ? vfs_write+0x9af/0x1050 [ 2682.420681][ T7620] ? vmacache_update+0xb7/0x120 [ 2682.425369][ T7620] kernel_clone+0x22d/0x990 [ 2682.429709][ T7620] ? file_end_write+0x1b0/0x1b0 [ 2682.434395][ T7620] ? __kasan_check_write+0x14/0x20 [ 2682.439342][ T7620] ? create_io_thread+0x1e0/0x1e0 [ 2682.444208][ T7620] ? __mutex_lock_slowpath+0x10/0x10 [ 2682.449322][ T7620] __x64_sys_clone+0x289/0x310 [ 2682.453926][ T7620] ? __do_sys_vfork+0x130/0x130 [ 2682.458613][ T7620] ? debug_smp_processor_id+0x17/0x20 [ 2682.463817][ T7620] do_syscall_64+0x44/0xd0 [ 2682.468071][ T7620] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2682.473803][ T7620] RIP: 0033:0x7ffbc66bf0c9 [ 2682.478051][ T7620] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2682.497493][ T7620] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2682.505737][ T7620] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2682.513546][ T7620] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2682.521361][ T7620] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2682.529174][ T7620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2682.536982][ T7620] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2682.544800][ T7620] [ 2682.547658][ T7635] CPU: 1 PID: 7635 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2682.557639][ T7635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2682.567538][ T7635] Call Trace: [ 2682.570664][ T7635] [ 2682.573439][ T7635] dump_stack_lvl+0x151/0x1b7 [ 2682.577948][ T7635] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2682.583241][ T7635] ? __this_cpu_preempt_check+0x13/0x20 [ 2682.588621][ T7635] dump_stack+0x15/0x17 [ 2682.592614][ T7635] should_fail+0x3c0/0x510 [ 2682.596873][ T7635] __should_failslab+0x9f/0xe0 [ 2682.601470][ T7635] should_failslab+0x9/0x20 [ 2682.605809][ T7635] kmem_cache_alloc+0x4f/0x2f0 [ 2682.610414][ T7635] ? __kasan_check_write+0x14/0x20 [ 2682.615354][ T7635] ? prepare_creds+0x30/0x690 [ 2682.619866][ T7635] ? _raw_spin_lock_irqsave+0xf8/0x210 [ 2682.625163][ T7635] prepare_creds+0x30/0x690 [ 2682.629502][ T7635] copy_creds+0xde/0x640 [ 2682.633579][ T7635] copy_process+0x775/0x3250 [ 2682.638008][ T7635] ? __kasan_check_write+0x14/0x20 [ 2682.642954][ T7635] ? proc_fail_nth_write+0x213/0x290 [ 2682.648075][ T7635] ? proc_fail_nth_read+0x220/0x220 [ 2682.653109][ T7635] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2682.658055][ T7635] ? vfs_write+0x9af/0x1050 [ 2682.662394][ T7635] ? vmacache_update+0xb7/0x120 [ 2682.667083][ T7635] kernel_clone+0x22d/0x990 [ 2682.671420][ T7635] ? file_end_write+0x1b0/0x1b0 [ 2682.676108][ T7635] ? __kasan_check_write+0x14/0x20 [ 2682.681054][ T7635] ? create_io_thread+0x1e0/0x1e0 [ 2682.685915][ T7635] ? __mutex_lock_slowpath+0x10/0x10 [ 2682.691034][ T7635] __x64_sys_clone+0x289/0x310 [ 2682.695635][ T7635] ? __do_sys_vfork+0x130/0x130 [ 2682.700321][ T7635] ? debug_smp_processor_id+0x17/0x20 [ 2682.705529][ T7635] do_syscall_64+0x44/0xd0 [ 2682.709782][ T7635] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2682.715508][ T7635] RIP: 0033:0x7fc683db00c9 [ 2682.719766][ T7635] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2682.739205][ T7635] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2682.747450][ T7635] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2682.755262][ T7635] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2682.763076][ T7635] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) 00:44:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4c00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x8000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1603}, 0x48) 00:44:20 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 00:44:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1700}, 0x48) 00:44:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2682.770885][ T7635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2682.778697][ T7635] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2682.786508][ T7635] [ 2682.805397][ T7649] FAULT_INJECTION: forcing a failure. [ 2682.805397][ T7649] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2682.828736][ T7649] CPU: 0 PID: 7649 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2682.838723][ T7649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2682.841164][ T7659] FAULT_INJECTION: forcing a failure. [ 2682.841164][ T7659] name failslab, interval 1, probability 0, space 0, times 0 [ 2682.848614][ T7649] Call Trace: [ 2682.848625][ T7649] [ 2682.848632][ T7649] dump_stack_lvl+0x151/0x1b7 [ 2682.848658][ T7649] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2682.876739][ T7649] ? __kasan_check_write+0x14/0x20 [ 2682.881682][ T7649] ? __set_page_owner+0x2ee/0x310 [ 2682.886541][ T7649] dump_stack+0x15/0x17 [ 2682.890533][ T7649] should_fail+0x3c0/0x510 [ 2682.894788][ T7649] should_fail_alloc_page+0x58/0x70 [ 2682.899819][ T7649] __alloc_pages+0x1de/0x7c0 [ 2682.904250][ T7649] ? __count_vm_events+0x30/0x30 [ 2682.909020][ T7649] ? __count_vm_events+0x30/0x30 [ 2682.913793][ T7649] ? __kasan_check_write+0x14/0x20 [ 2682.918739][ T7649] ? _raw_spin_lock+0xa3/0x1b0 [ 2682.923340][ T7649] __pmd_alloc+0xb1/0x550 [ 2682.927594][ T7649] ? kmem_cache_alloc+0x189/0x2f0 [ 2682.932454][ T7649] ? anon_vma_fork+0x1b9/0x4f0 [ 2682.937053][ T7649] ? __pud_alloc+0x260/0x260 [ 2682.941480][ T7649] ? __pud_alloc+0x218/0x260 [ 2682.945909][ T7649] ? do_handle_mm_fault+0x2370/0x2370 [ 2682.951114][ T7649] copy_page_range+0xd04/0x1090 [ 2682.955803][ T7649] ? pfn_valid+0x1e0/0x1e0 [ 2682.960055][ T7649] dup_mmap+0x99f/0xea0 [ 2682.964049][ T7649] ? __delayed_free_task+0x20/0x20 [ 2682.968994][ T7649] ? mm_init+0x807/0x960 [ 2682.973073][ T7649] dup_mm+0x91/0x330 00:44:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x9000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1800}, 0x48) [ 2682.976807][ T7649] copy_mm+0x108/0x1b0 [ 2682.980710][ T7649] copy_process+0x1295/0x3250 [ 2682.985224][ T7649] ? proc_fail_nth_write+0x213/0x290 [ 2682.990343][ T7649] ? proc_fail_nth_read+0x220/0x220 [ 2682.995381][ T7649] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2683.000331][ T7649] ? vfs_write+0x9af/0x1050 [ 2683.004663][ T7649] ? vmacache_update+0xb7/0x120 [ 2683.009353][ T7649] kernel_clone+0x22d/0x990 [ 2683.013692][ T7649] ? file_end_write+0x1b0/0x1b0 [ 2683.018377][ T7649] ? __kasan_check_write+0x14/0x20 [ 2683.023325][ T7649] ? create_io_thread+0x1e0/0x1e0 [ 2683.028184][ T7649] ? __mutex_lock_slowpath+0x10/0x10 [ 2683.033305][ T7649] __x64_sys_clone+0x289/0x310 [ 2683.037906][ T7649] ? __do_sys_vfork+0x130/0x130 [ 2683.042594][ T7649] ? debug_smp_processor_id+0x17/0x20 [ 2683.047801][ T7649] do_syscall_64+0x44/0xd0 [ 2683.052486][ T7649] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2683.058214][ T7649] RIP: 0033:0x7ffbc66bf0c9 [ 2683.062470][ T7649] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2683.081910][ T7649] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2683.090153][ T7649] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2683.097967][ T7649] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2683.105775][ T7649] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2683.113586][ T7649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2683.121400][ T7649] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2683.129216][ T7649] [ 2683.132077][ T7659] CPU: 1 PID: 7659 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2683.142061][ T7659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2683.151951][ T7659] Call Trace: [ 2683.155072][ T7659] [ 2683.157848][ T7659] dump_stack_lvl+0x151/0x1b7 [ 2683.162364][ T7659] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2683.167658][ T7659] dump_stack+0x15/0x17 [ 2683.171650][ T7659] should_fail+0x3c0/0x510 [ 2683.175902][ T7659] ? security_prepare_creds+0x50/0x160 [ 2683.181197][ T7659] __should_failslab+0x9f/0xe0 [ 2683.185795][ T7659] should_failslab+0x9/0x20 [ 2683.190136][ T7659] __kmalloc+0x6d/0x350 [ 2683.194136][ T7659] security_prepare_creds+0x50/0x160 [ 2683.199249][ T7659] prepare_creds+0x471/0x690 [ 2683.203677][ T7659] copy_creds+0xde/0x640 [ 2683.207757][ T7659] copy_process+0x775/0x3250 [ 2683.212182][ T7659] ? __kasan_check_write+0x14/0x20 [ 2683.217132][ T7659] ? proc_fail_nth_write+0x213/0x290 [ 2683.222250][ T7659] ? proc_fail_nth_read+0x220/0x220 [ 2683.227282][ T7659] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2683.232229][ T7659] ? vfs_write+0x9af/0x1050 [ 2683.236569][ T7659] ? vmacache_update+0xb7/0x120 [ 2683.241255][ T7659] kernel_clone+0x22d/0x990 [ 2683.245595][ T7659] ? file_end_write+0x1b0/0x1b0 [ 2683.250283][ T7659] ? __kasan_check_write+0x14/0x20 [ 2683.255230][ T7659] ? create_io_thread+0x1e0/0x1e0 [ 2683.260093][ T7659] ? __mutex_lock_slowpath+0x10/0x10 [ 2683.265211][ T7659] __x64_sys_clone+0x289/0x310 [ 2683.269810][ T7659] ? __do_sys_vfork+0x130/0x130 [ 2683.274500][ T7659] ? debug_smp_processor_id+0x17/0x20 [ 2683.279712][ T7659] do_syscall_64+0x44/0xd0 [ 2683.283957][ T7659] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2683.289686][ T7659] RIP: 0033:0x7fc683db00c9 [ 2683.293940][ T7659] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2683.313381][ T7659] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2683.321630][ T7659] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:20 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) 00:44:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xa000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1801}, 0x48) 00:44:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6c00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2683.329439][ T7659] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2683.337248][ T7659] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2683.345058][ T7659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2683.352875][ T7659] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2683.360682][ T7659] [ 2683.371913][ T7667] FAULT_INJECTION: forcing a failure. 00:44:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2683.371913][ T7667] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.391916][ T7667] CPU: 1 PID: 7667 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2683.401899][ T7667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2683.411794][ T7667] Call Trace: [ 2683.414917][ T7667] [ 2683.417694][ T7667] dump_stack_lvl+0x151/0x1b7 [ 2683.422208][ T7667] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2683.427502][ T7667] ? _raw_spin_lock+0xa3/0x1b0 [ 2683.428904][ T7684] FAULT_INJECTION: forcing a failure. [ 2683.428904][ T7684] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.432098][ T7667] ? dup_fd+0x51f/0xa40 [ 2683.432127][ T7667] dump_stack+0x15/0x17 [ 2683.432147][ T7667] should_fail+0x3c0/0x510 [ 2683.456752][ T7667] __should_failslab+0x9f/0xe0 [ 2683.461351][ T7667] should_failslab+0x9/0x20 [ 2683.465687][ T7667] kmem_cache_alloc+0x4f/0x2f0 [ 2683.470289][ T7667] ? copy_fs_struct+0x4e/0x230 [ 2683.474890][ T7667] copy_fs_struct+0x4e/0x230 [ 2683.479316][ T7667] copy_fs+0x72/0x140 [ 2683.483132][ T7667] copy_process+0x1214/0x3250 [ 2683.487646][ T7667] ? proc_fail_nth_write+0x213/0x290 [ 2683.492766][ T7667] ? proc_fail_nth_read+0x220/0x220 [ 2683.497800][ T7667] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2683.502747][ T7667] ? vfs_write+0x9af/0x1050 [ 2683.507087][ T7667] ? vmacache_update+0xb7/0x120 [ 2683.511774][ T7667] kernel_clone+0x22d/0x990 [ 2683.516115][ T7667] ? file_end_write+0x1b0/0x1b0 [ 2683.520799][ T7667] ? __kasan_check_write+0x14/0x20 [ 2683.525755][ T7667] ? create_io_thread+0x1e0/0x1e0 [ 2683.530610][ T7667] ? __mutex_lock_slowpath+0x10/0x10 [ 2683.535728][ T7667] __x64_sys_clone+0x289/0x310 [ 2683.540327][ T7667] ? __do_sys_vfork+0x130/0x130 [ 2683.545015][ T7667] ? debug_smp_processor_id+0x17/0x20 [ 2683.550223][ T7667] do_syscall_64+0x44/0xd0 [ 2683.554480][ T7667] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2683.560205][ T7667] RIP: 0033:0x7ffbc66bf0c9 [ 2683.564460][ T7667] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2683.583895][ T7667] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2683.592142][ T7667] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2683.599954][ T7667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2683.607766][ T7667] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2683.615578][ T7667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2683.623386][ T7667] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 00:44:20 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 00:44:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xb000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1802}, 0x48) 00:44:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7400}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7a00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:20 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1803}, 0x48) 00:44:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) 00:44:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc400}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1900}, 0x48) [ 2683.631203][ T7667] [ 2683.634066][ T7684] CPU: 0 PID: 7684 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2683.644050][ T7684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2683.648165][ T7690] FAULT_INJECTION: forcing a failure. [ 2683.648165][ T7690] name failslab, interval 1, probability 0, space 0, times 0 [ 2683.653939][ T7684] Call Trace: [ 2683.653948][ T7684] [ 2683.653955][ T7684] dump_stack_lvl+0x151/0x1b7 [ 2683.653978][ T7684] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2683.682061][ T7684] dump_stack+0x15/0x17 [ 2683.686056][ T7684] should_fail+0x3c0/0x510 [ 2683.690306][ T7684] __should_failslab+0x9f/0xe0 [ 2683.694905][ T7684] should_failslab+0x9/0x20 [ 2683.699245][ T7684] kmem_cache_alloc+0x4f/0x2f0 [ 2683.703843][ T7684] ? anon_vma_fork+0x1b9/0x4f0 [ 2683.708443][ T7684] anon_vma_fork+0x1b9/0x4f0 [ 2683.712873][ T7684] dup_mmap+0x750/0xea0 [ 2683.716863][ T7684] ? __delayed_free_task+0x20/0x20 [ 2683.721810][ T7684] ? mm_init+0x807/0x960 [ 2683.725887][ T7684] dup_mm+0x91/0x330 [ 2683.729619][ T7684] copy_mm+0x108/0x1b0 [ 2683.733526][ T7684] copy_process+0x1295/0x3250 [ 2683.738041][ T7684] ? proc_fail_nth_write+0x213/0x290 [ 2683.743160][ T7684] ? proc_fail_nth_read+0x220/0x220 [ 2683.748194][ T7684] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2683.753142][ T7684] ? vfs_write+0x9af/0x1050 [ 2683.757480][ T7684] ? vmacache_update+0xb7/0x120 [ 2683.762170][ T7684] kernel_clone+0x22d/0x990 [ 2683.766509][ T7684] ? file_end_write+0x1b0/0x1b0 [ 2683.771192][ T7684] ? __kasan_check_write+0x14/0x20 [ 2683.776142][ T7684] ? create_io_thread+0x1e0/0x1e0 [ 2683.781002][ T7684] ? __mutex_lock_slowpath+0x10/0x10 [ 2683.786123][ T7684] __x64_sys_clone+0x289/0x310 [ 2683.790724][ T7684] ? __do_sys_vfork+0x130/0x130 [ 2683.795437][ T7684] ? debug_smp_processor_id+0x17/0x20 [ 2683.800615][ T7684] do_syscall_64+0x44/0xd0 [ 2683.804878][ T7684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2683.810598][ T7684] RIP: 0033:0x7fc683db00c9 [ 2683.814850][ T7684] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2683.834293][ T7684] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2683.842536][ T7684] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2683.850348][ T7684] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2683.858159][ T7684] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2683.865970][ T7684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2683.873779][ T7684] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2683.881593][ T7684] [ 2683.886323][ T7690] CPU: 1 PID: 7690 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2683.896297][ T7690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2683.906191][ T7690] Call Trace: [ 2683.909314][ T7690] [ 2683.912091][ T7690] dump_stack_lvl+0x151/0x1b7 [ 2683.916605][ T7690] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2683.921900][ T7690] dump_stack+0x15/0x17 [ 2683.925891][ T7690] should_fail+0x3c0/0x510 [ 2683.930145][ T7690] __should_failslab+0x9f/0xe0 [ 2683.934742][ T7690] should_failslab+0x9/0x20 [ 2683.939083][ T7690] kmem_cache_alloc+0x4f/0x2f0 [ 2683.943685][ T7690] ? copy_sighand+0x54/0x250 [ 2683.948117][ T7690] ? _raw_spin_unlock+0x4d/0x70 [ 2683.953057][ T7690] copy_sighand+0x54/0x250 [ 2683.957311][ T7690] copy_process+0x123f/0x3250 [ 2683.961826][ T7690] ? proc_fail_nth_write+0x213/0x290 [ 2683.966946][ T7690] ? proc_fail_nth_read+0x220/0x220 [ 2683.971982][ T7690] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2683.976925][ T7690] ? vfs_write+0x9af/0x1050 [ 2683.981264][ T7690] ? vmacache_update+0xb7/0x120 [ 2683.985953][ T7690] kernel_clone+0x22d/0x990 [ 2683.990289][ T7690] ? file_end_write+0x1b0/0x1b0 [ 2683.994980][ T7690] ? __kasan_check_write+0x14/0x20 [ 2683.999926][ T7690] ? create_io_thread+0x1e0/0x1e0 [ 2684.004786][ T7690] ? __mutex_lock_slowpath+0x10/0x10 [ 2684.009907][ T7690] __x64_sys_clone+0x289/0x310 [ 2684.014507][ T7690] ? __do_sys_vfork+0x130/0x130 [ 2684.019193][ T7690] ? debug_smp_processor_id+0x17/0x20 [ 2684.024402][ T7690] do_syscall_64+0x44/0xd0 [ 2684.028652][ T7690] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2684.034381][ T7690] RIP: 0033:0x7ffbc66bf0c9 [ 2684.038634][ T7690] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2684.058075][ T7690] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2684.066319][ T7690] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2684.074129][ T7690] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:21 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) 00:44:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1a00}, 0x48) 00:44:21 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) 00:44:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xd000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2684.081946][ T7690] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2684.089755][ T7690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2684.097566][ T7690] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2684.105377][ T7690] 00:44:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x40000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xfffff}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1a01}, 0x48) 00:44:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:21 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1a02}, 0x48) 00:44:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xe000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x1000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2684.138342][ T7704] FAULT_INJECTION: forcing a failure. [ 2684.138342][ T7704] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.154917][ T7703] FAULT_INJECTION: forcing a failure. [ 2684.154917][ T7703] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.174541][ T7703] CPU: 0 PID: 7703 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2684.184521][ T7703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2684.194414][ T7703] Call Trace: [ 2684.197535][ T7703] [ 2684.200314][ T7703] dump_stack_lvl+0x151/0x1b7 [ 2684.204831][ T7703] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2684.210126][ T7703] dump_stack+0x15/0x17 [ 2684.214117][ T7703] should_fail+0x3c0/0x510 [ 2684.218370][ T7703] __should_failslab+0x9f/0xe0 [ 2684.222969][ T7703] should_failslab+0x9/0x20 [ 2684.227311][ T7703] kmem_cache_alloc+0x4f/0x2f0 [ 2684.231905][ T7703] ? copy_sighand+0x54/0x250 [ 2684.236330][ T7703] ? _raw_spin_unlock+0x4d/0x70 [ 2684.241017][ T7703] copy_sighand+0x54/0x250 [ 2684.245273][ T7703] copy_process+0x123f/0x3250 [ 2684.249787][ T7703] ? proc_fail_nth_write+0x213/0x290 [ 2684.254905][ T7703] ? proc_fail_nth_read+0x220/0x220 [ 2684.259941][ T7703] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2684.264885][ T7703] ? vfs_write+0x9af/0x1050 [ 2684.269225][ T7703] ? vmacache_update+0xb7/0x120 [ 2684.273915][ T7703] kernel_clone+0x22d/0x990 [ 2684.278253][ T7703] ? file_end_write+0x1b0/0x1b0 [ 2684.282940][ T7703] ? __kasan_check_write+0x14/0x20 [ 2684.287887][ T7703] ? create_io_thread+0x1e0/0x1e0 [ 2684.292748][ T7703] ? __mutex_lock_slowpath+0x10/0x10 [ 2684.297867][ T7703] __x64_sys_clone+0x289/0x310 [ 2684.302467][ T7703] ? __do_sys_vfork+0x130/0x130 [ 2684.307155][ T7703] ? debug_smp_processor_id+0x17/0x20 [ 2684.312361][ T7703] do_syscall_64+0x44/0xd0 [ 2684.316616][ T7703] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2684.322341][ T7703] RIP: 0033:0x7ffbc66bf0c9 [ 2684.326595][ T7703] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2684.346050][ T7703] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2684.354282][ T7703] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2684.362090][ T7703] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2684.369902][ T7703] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2684.377717][ T7703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2684.385563][ T7703] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2684.393345][ T7703] [ 2684.396204][ T7704] CPU: 1 PID: 7704 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2684.406185][ T7704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2684.416080][ T7704] Call Trace: [ 2684.419199][ T7704] [ 2684.421980][ T7704] dump_stack_lvl+0x151/0x1b7 [ 2684.426489][ T7704] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2684.431784][ T7704] dump_stack+0x15/0x17 [ 2684.435776][ T7704] should_fail+0x3c0/0x510 [ 2684.440029][ T7704] ? alloc_fdtable+0xaf/0x2b0 [ 2684.444543][ T7704] __should_failslab+0x9f/0xe0 [ 2684.449141][ T7704] should_failslab+0x9/0x20 [ 2684.453482][ T7704] kmem_cache_alloc_trace+0x4a/0x310 [ 2684.458603][ T7704] ? __kasan_check_write+0x14/0x20 [ 2684.463550][ T7704] ? _raw_spin_lock+0xa3/0x1b0 [ 2684.468151][ T7704] alloc_fdtable+0xaf/0x2b0 [ 2684.472495][ T7704] dup_fd+0x781/0xa40 [ 2684.476308][ T7704] ? avc_has_perm+0x16d/0x260 [ 2684.480823][ T7704] copy_files+0xe6/0x200 [ 2684.484904][ T7704] ? perf_event_attrs+0x30/0x30 [ 2684.489587][ T7704] ? dup_task_struct+0xa60/0xa60 [ 2684.494361][ T7704] ? security_task_alloc+0x132/0x150 [ 2684.499482][ T7704] copy_process+0x11e9/0x3250 [ 2684.504006][ T7704] ? proc_fail_nth_write+0x213/0x290 [ 2684.509116][ T7704] ? proc_fail_nth_read+0x220/0x220 [ 2684.514168][ T7704] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2684.519113][ T7704] ? vfs_write+0x9af/0x1050 [ 2684.523439][ T7704] ? vmacache_update+0xb7/0x120 [ 2684.528125][ T7704] kernel_clone+0x22d/0x990 [ 2684.532471][ T7704] ? file_end_write+0x1b0/0x1b0 [ 2684.537150][ T7704] ? __kasan_check_write+0x14/0x20 [ 2684.542098][ T7704] ? create_io_thread+0x1e0/0x1e0 [ 2684.546958][ T7704] ? __mutex_lock_slowpath+0x10/0x10 [ 2684.552078][ T7704] __x64_sys_clone+0x289/0x310 [ 2684.556678][ T7704] ? __do_sys_vfork+0x130/0x130 [ 2684.561364][ T7704] ? debug_smp_processor_id+0x17/0x20 [ 2684.566571][ T7704] do_syscall_64+0x44/0xd0 [ 2684.570825][ T7704] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2684.576553][ T7704] RIP: 0033:0x7fc683db00c9 [ 2684.580980][ T7704] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2684.600424][ T7704] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2684.608665][ T7704] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2684.616476][ T7704] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2684.624288][ T7704] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2684.632098][ T7704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:22 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) 00:44:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1b00}, 0x48) 00:44:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x10000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 00:44:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x2000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc4, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x11000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1c00}, 0x48) [ 2684.639910][ T7704] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2684.647724][ T7704] 00:44:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x3000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1c01}, 0x48) [ 2684.684493][ T7739] FAULT_INJECTION: forcing a failure. [ 2684.684493][ T7739] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.697334][ T7739] CPU: 1 PID: 7739 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2684.710960][ T7739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2684.713201][ T7736] FAULT_INJECTION: forcing a failure. [ 2684.713201][ T7736] name failslab, interval 1, probability 0, space 0, times 0 [ 2684.720851][ T7739] Call Trace: [ 2684.720862][ T7739] [ 2684.720870][ T7739] dump_stack_lvl+0x151/0x1b7 [ 2684.743680][ T7739] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2684.748973][ T7739] dump_stack+0x15/0x17 [ 2684.752960][ T7739] should_fail+0x3c0/0x510 [ 2684.757219][ T7739] __should_failslab+0x9f/0xe0 [ 2684.761814][ T7739] should_failslab+0x9/0x20 [ 2684.766153][ T7739] kmem_cache_alloc+0x4f/0x2f0 [ 2684.770757][ T7739] ? copy_signal+0x55/0x610 [ 2684.775093][ T7739] copy_signal+0x55/0x610 [ 2684.779261][ T7739] copy_process+0x126a/0x3250 [ 2684.783774][ T7739] ? proc_fail_nth_write+0x213/0x290 [ 2684.788896][ T7739] ? proc_fail_nth_read+0x220/0x220 [ 2684.793928][ T7739] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2684.798875][ T7739] ? vfs_write+0x9af/0x1050 [ 2684.803219][ T7739] ? vmacache_update+0xb7/0x120 [ 2684.807900][ T7739] kernel_clone+0x22d/0x990 [ 2684.812242][ T7739] ? file_end_write+0x1b0/0x1b0 [ 2684.816951][ T7739] ? __kasan_check_write+0x14/0x20 [ 2684.821884][ T7739] ? create_io_thread+0x1e0/0x1e0 [ 2684.826734][ T7739] ? __mutex_lock_slowpath+0x10/0x10 [ 2684.831859][ T7739] __x64_sys_clone+0x289/0x310 [ 2684.836455][ T7739] ? __do_sys_vfork+0x130/0x130 [ 2684.841145][ T7739] ? debug_smp_processor_id+0x17/0x20 [ 2684.846361][ T7739] do_syscall_64+0x44/0xd0 [ 2684.850609][ T7739] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2684.856331][ T7739] RIP: 0033:0x7ffbc66bf0c9 [ 2684.860587][ T7739] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2684.880044][ T7739] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2684.888269][ T7739] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2684.896083][ T7739] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2684.903903][ T7739] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2684.911703][ T7739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2684.919517][ T7739] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2684.927329][ T7739] [ 2684.930192][ T7736] CPU: 0 PID: 7736 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2684.940174][ T7736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2684.950070][ T7736] Call Trace: [ 2684.953192][ T7736] [ 2684.955967][ T7736] dump_stack_lvl+0x151/0x1b7 [ 2684.960482][ T7736] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2684.965776][ T7736] dump_stack+0x15/0x17 [ 2684.969773][ T7736] should_fail+0x3c0/0x510 [ 2684.974019][ T7736] ? kvmalloc_node+0x82/0x130 [ 2684.978533][ T7736] __should_failslab+0x9f/0xe0 [ 2684.983132][ T7736] should_failslab+0x9/0x20 [ 2684.987472][ T7736] __kmalloc+0x6d/0x350 [ 2684.991461][ T7736] ? __kasan_kmalloc+0x9/0x10 [ 2684.995976][ T7736] kvmalloc_node+0x82/0x130 [ 2685.000316][ T7736] alloc_fdtable+0xea/0x2b0 [ 2685.004655][ T7736] dup_fd+0x781/0xa40 [ 2685.008477][ T7736] ? avc_has_perm+0x16d/0x260 [ 2685.012989][ T7736] copy_files+0xe6/0x200 [ 2685.017065][ T7736] ? perf_event_attrs+0x30/0x30 [ 2685.021753][ T7736] ? dup_task_struct+0xa60/0xa60 [ 2685.026528][ T7736] ? security_task_alloc+0x132/0x150 [ 2685.031647][ T7736] copy_process+0x11e9/0x3250 [ 2685.036163][ T7736] ? proc_fail_nth_write+0x213/0x290 [ 2685.041281][ T7736] ? proc_fail_nth_read+0x220/0x220 [ 2685.046318][ T7736] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2685.051262][ T7736] ? vfs_write+0x9af/0x1050 [ 2685.055600][ T7736] ? vmacache_update+0xb7/0x120 [ 2685.060290][ T7736] kernel_clone+0x22d/0x990 [ 2685.064629][ T7736] ? file_end_write+0x1b0/0x1b0 [ 2685.069317][ T7736] ? __kasan_check_write+0x14/0x20 [ 2685.074263][ T7736] ? create_io_thread+0x1e0/0x1e0 [ 2685.079122][ T7736] ? __mutex_lock_slowpath+0x10/0x10 [ 2685.084242][ T7736] __x64_sys_clone+0x289/0x310 [ 2685.088846][ T7736] ? __do_sys_vfork+0x130/0x130 [ 2685.093532][ T7736] ? debug_smp_processor_id+0x17/0x20 [ 2685.098737][ T7736] do_syscall_64+0x44/0xd0 [ 2685.102990][ T7736] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2685.108718][ T7736] RIP: 0033:0x7fc683db00c9 [ 2685.112971][ T7736] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:22 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) 00:44:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x12000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1c02}, 0x48) 00:44:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:22 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 00:44:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x18000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x5000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2685.132412][ T7736] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2685.140659][ T7736] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2685.148470][ T7736] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2685.156281][ T7736] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2685.164095][ T7736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2685.171903][ T7736] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2685.179717][ T7736] 00:44:22 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1c04}, 0x48) 00:44:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2685.215971][ T7759] FAULT_INJECTION: forcing a failure. [ 2685.215971][ T7759] name failslab, interval 1, probability 0, space 0, times 0 [ 2685.229188][ T7759] CPU: 1 PID: 7759 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2685.239164][ T7759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2685.249059][ T7759] Call Trace: [ 2685.252183][ T7759] [ 2685.254959][ T7759] dump_stack_lvl+0x151/0x1b7 [ 2685.255759][ T7760] FAULT_INJECTION: forcing a failure. [ 2685.255759][ T7760] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2685.259470][ T7759] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2685.259497][ T7759] ? do_syscall_64+0x44/0xd0 [ 2685.282223][ T7759] dump_stack+0x15/0x17 [ 2685.286202][ T7759] should_fail+0x3c0/0x510 [ 2685.290453][ T7759] __should_failslab+0x9f/0xe0 [ 2685.295053][ T7759] should_failslab+0x9/0x20 [ 2685.299392][ T7759] kmem_cache_alloc+0x4f/0x2f0 [ 2685.303995][ T7759] ? anon_vma_clone+0xa1/0x4f0 [ 2685.308604][ T7759] anon_vma_clone+0xa1/0x4f0 [ 2685.313018][ T7759] anon_vma_fork+0x91/0x4f0 [ 2685.317358][ T7759] ? anon_vma_name+0x4c/0x70 [ 2685.321784][ T7759] dup_mmap+0x750/0xea0 [ 2685.325779][ T7759] ? __delayed_free_task+0x20/0x20 [ 2685.330725][ T7759] ? mm_init+0x807/0x960 [ 2685.334803][ T7759] dup_mm+0x91/0x330 [ 2685.338534][ T7759] copy_mm+0x108/0x1b0 [ 2685.342443][ T7759] copy_process+0x1295/0x3250 [ 2685.346961][ T7759] ? proc_fail_nth_write+0x213/0x290 [ 2685.352469][ T7759] ? proc_fail_nth_read+0x220/0x220 [ 2685.357503][ T7759] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2685.362458][ T7759] ? vfs_write+0x9af/0x1050 [ 2685.366788][ T7759] ? vmacache_update+0xb7/0x120 [ 2685.371477][ T7759] kernel_clone+0x22d/0x990 [ 2685.375817][ T7759] ? file_end_write+0x1b0/0x1b0 [ 2685.380502][ T7759] ? __kasan_check_write+0x14/0x20 [ 2685.385449][ T7759] ? create_io_thread+0x1e0/0x1e0 [ 2685.390310][ T7759] ? __mutex_lock_slowpath+0x10/0x10 [ 2685.395429][ T7759] __x64_sys_clone+0x289/0x310 [ 2685.400029][ T7759] ? __do_sys_vfork+0x130/0x130 [ 2685.404718][ T7759] ? debug_smp_processor_id+0x17/0x20 [ 2685.409926][ T7759] do_syscall_64+0x44/0xd0 [ 2685.414185][ T7759] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2685.419904][ T7759] RIP: 0033:0x7ffbc66bf0c9 [ 2685.424160][ T7759] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2685.443599][ T7759] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2685.451909][ T7759] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 00:44:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2685.459653][ T7759] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2685.467465][ T7759] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2685.475275][ T7759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2685.483086][ T7759] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2685.490905][ T7759] [ 2685.493766][ T7760] CPU: 0 PID: 7760 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2685.503745][ T7760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2685.513640][ T7760] Call Trace: [ 2685.516761][ T7760] [ 2685.519538][ T7760] dump_stack_lvl+0x151/0x1b7 [ 2685.524050][ T7760] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2685.529347][ T7760] dump_stack+0x15/0x17 [ 2685.533336][ T7760] should_fail+0x3c0/0x510 [ 2685.537590][ T7760] should_fail_alloc_page+0x58/0x70 [ 2685.542625][ T7760] __alloc_pages+0x1de/0x7c0 [ 2685.547052][ T7760] ? __count_vm_events+0x30/0x30 [ 2685.551824][ T7760] ? dup_mm+0x91/0x330 [ 2685.555730][ T7760] ? copy_mm+0x108/0x1b0 [ 2685.559808][ T7760] ? copy_process+0x1295/0x3250 [ 2685.564498][ T7760] ? kernel_clone+0x22d/0x990 [ 2685.569009][ T7760] ? __x64_sys_clone+0x289/0x310 [ 2685.573784][ T7760] pte_alloc_one+0x73/0x1b0 [ 2685.578121][ T7760] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2685.583156][ T7760] ? __kasan_check_write+0x14/0x20 [ 2685.588104][ T7760] ? __set_page_owner+0x2ee/0x310 [ 2685.592979][ T7760] __pte_alloc+0x86/0x350 [ 2685.597128][ T7760] ? post_alloc_hook+0x1ab/0x1b0 [ 2685.601912][ T7760] ? free_pgtables+0x210/0x210 [ 2685.606508][ T7760] ? get_page_from_freelist+0x38b/0x400 [ 2685.611886][ T7760] copy_pte_range+0x1b1f/0x20b0 [ 2685.616575][ T7760] ? __kunmap_atomic+0x80/0x80 [ 2685.621170][ T7760] ? __pud_alloc+0x260/0x260 [ 2685.625597][ T7760] ? __pud_alloc+0x218/0x260 [ 2685.630022][ T7760] ? do_handle_mm_fault+0x2370/0x2370 [ 2685.635232][ T7760] copy_page_range+0xc1e/0x1090 [ 2685.639920][ T7760] ? pfn_valid+0x1e0/0x1e0 [ 2685.644175][ T7760] dup_mmap+0x99f/0xea0 [ 2685.648169][ T7760] ? __delayed_free_task+0x20/0x20 [ 2685.653112][ T7760] ? mm_init+0x807/0x960 [ 2685.657189][ T7760] dup_mm+0x91/0x330 [ 2685.660921][ T7760] copy_mm+0x108/0x1b0 [ 2685.664834][ T7760] copy_process+0x1295/0x3250 [ 2685.669341][ T7760] ? proc_fail_nth_write+0x213/0x290 [ 2685.674476][ T7760] ? proc_fail_nth_read+0x220/0x220 [ 2685.679498][ T7760] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2685.684444][ T7760] ? vfs_write+0x9af/0x1050 [ 2685.688787][ T7760] ? vmacache_update+0xb7/0x120 [ 2685.693470][ T7760] kernel_clone+0x22d/0x990 [ 2685.697809][ T7760] ? file_end_write+0x1b0/0x1b0 [ 2685.702499][ T7760] ? __kasan_check_write+0x14/0x20 [ 2685.707443][ T7760] ? create_io_thread+0x1e0/0x1e0 [ 2685.712304][ T7760] ? __mutex_lock_slowpath+0x10/0x10 [ 2685.717422][ T7760] __x64_sys_clone+0x289/0x310 [ 2685.722023][ T7760] ? __do_sys_vfork+0x130/0x130 [ 2685.726709][ T7760] ? debug_smp_processor_id+0x17/0x20 [ 2685.731927][ T7760] do_syscall_64+0x44/0xd0 [ 2685.736170][ T7760] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2685.741899][ T7760] RIP: 0033:0x7fc683db00c9 [ 2685.746152][ T7760] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:23 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) 00:44:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1d00}, 0x48) 00:44:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x25000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 00:44:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x36000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1e00}, 0x48) 00:44:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2685.765593][ T7760] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2685.773836][ T7760] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2685.781647][ T7760] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2685.789458][ T7760] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2685.797270][ T7760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2685.805086][ T7760] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2685.812900][ T7760] 00:44:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x8000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2685.844633][ T7780] FAULT_INJECTION: forcing a failure. [ 2685.844633][ T7780] name failslab, interval 1, probability 0, space 0, times 0 [ 2685.861803][ T7791] FAULT_INJECTION: forcing a failure. [ 2685.861803][ T7791] name failslab, interval 1, probability 0, space 0, times 0 [ 2685.864365][ T7780] CPU: 1 PID: 7780 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2685.884196][ T7780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2685.894092][ T7780] Call Trace: [ 2685.897212][ T7780] [ 2685.899990][ T7780] dump_stack_lvl+0x151/0x1b7 [ 2685.904503][ T7780] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2685.909984][ T7780] dump_stack+0x15/0x17 [ 2685.913964][ T7780] should_fail+0x3c0/0x510 [ 2685.918216][ T7780] __should_failslab+0x9f/0xe0 [ 2685.922817][ T7780] should_failslab+0x9/0x20 [ 2685.927154][ T7780] kmem_cache_alloc+0x4f/0x2f0 [ 2685.931757][ T7780] ? anon_vma_clone+0xa1/0x4f0 [ 2685.936360][ T7780] anon_vma_clone+0xa1/0x4f0 [ 2685.940784][ T7780] anon_vma_fork+0x91/0x4f0 00:44:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2685.945120][ T7780] ? anon_vma_name+0x4c/0x70 [ 2685.949549][ T7780] dup_mmap+0x750/0xea0 [ 2685.953542][ T7780] ? __delayed_free_task+0x20/0x20 [ 2685.958487][ T7780] ? mm_init+0x807/0x960 [ 2685.962570][ T7780] dup_mm+0x91/0x330 [ 2685.966299][ T7780] copy_mm+0x108/0x1b0 [ 2685.970202][ T7780] copy_process+0x1295/0x3250 [ 2685.974721][ T7780] ? proc_fail_nth_write+0x213/0x290 [ 2685.979837][ T7780] ? proc_fail_nth_read+0x220/0x220 [ 2685.984873][ T7780] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2685.989821][ T7780] ? vfs_write+0x9af/0x1050 [ 2685.994162][ T7780] ? vmacache_update+0xb7/0x120 [ 2685.998846][ T7780] kernel_clone+0x22d/0x990 [ 2686.003185][ T7780] ? file_end_write+0x1b0/0x1b0 [ 2686.007872][ T7780] ? __kasan_check_write+0x14/0x20 [ 2686.012818][ T7780] ? create_io_thread+0x1e0/0x1e0 [ 2686.017678][ T7780] ? __mutex_lock_slowpath+0x10/0x10 [ 2686.022799][ T7780] __x64_sys_clone+0x289/0x310 [ 2686.027406][ T7780] ? __do_sys_vfork+0x130/0x130 [ 2686.032087][ T7780] ? debug_smp_processor_id+0x17/0x20 [ 2686.037293][ T7780] do_syscall_64+0x44/0xd0 [ 2686.041550][ T7780] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2686.047275][ T7780] RIP: 0033:0x7ffbc66bf0c9 [ 2686.051528][ T7780] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2686.070972][ T7780] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2686.079213][ T7780] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2686.087025][ T7780] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2686.094835][ T7780] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2686.102649][ T7780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2686.110459][ T7780] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2686.118276][ T7780] [ 2686.121137][ T7791] CPU: 0 PID: 7791 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2686.131117][ T7791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2686.141008][ T7791] Call Trace: [ 2686.144133][ T7791] [ 2686.146909][ T7791] dump_stack_lvl+0x151/0x1b7 [ 2686.151422][ T7791] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2686.156717][ T7791] dump_stack+0x15/0x17 [ 2686.160709][ T7791] should_fail+0x3c0/0x510 [ 2686.164964][ T7791] __should_failslab+0x9f/0xe0 [ 2686.169561][ T7791] should_failslab+0x9/0x20 [ 2686.173905][ T7791] kmem_cache_alloc+0x4f/0x2f0 [ 2686.178502][ T7791] ? vm_area_dup+0x26/0x1d0 [ 2686.182841][ T7791] vm_area_dup+0x26/0x1d0 [ 2686.187008][ T7791] dup_mmap+0x6b8/0xea0 [ 2686.191001][ T7791] ? __delayed_free_task+0x20/0x20 [ 2686.195948][ T7791] ? mm_init+0x807/0x960 [ 2686.200026][ T7791] dup_mm+0x91/0x330 [ 2686.203761][ T7791] copy_mm+0x108/0x1b0 [ 2686.207663][ T7791] copy_process+0x1295/0x3250 [ 2686.212178][ T7791] ? proc_fail_nth_write+0x213/0x290 [ 2686.217297][ T7791] ? proc_fail_nth_read+0x220/0x220 [ 2686.222332][ T7791] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2686.227278][ T7791] ? vfs_write+0x9af/0x1050 [ 2686.231616][ T7791] ? vmacache_update+0xb7/0x120 [ 2686.236305][ T7791] kernel_clone+0x22d/0x990 [ 2686.240644][ T7791] ? file_end_write+0x1b0/0x1b0 [ 2686.245330][ T7791] ? __kasan_check_write+0x14/0x20 [ 2686.250278][ T7791] ? create_io_thread+0x1e0/0x1e0 [ 2686.255138][ T7791] ? __mutex_lock_slowpath+0x10/0x10 [ 2686.260258][ T7791] __x64_sys_clone+0x289/0x310 [ 2686.264861][ T7791] ? __do_sys_vfork+0x130/0x130 [ 2686.269546][ T7791] ? debug_smp_processor_id+0x17/0x20 [ 2686.274757][ T7791] do_syscall_64+0x44/0xd0 [ 2686.279010][ T7791] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2686.284735][ T7791] RIP: 0033:0x7fc683db00c9 [ 2686.288987][ T7791] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2686.308430][ T7791] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2686.316673][ T7791] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2686.324484][ T7791] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2686.332295][ T7791] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:23 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) 00:44:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x43000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x9000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1e01}, 0x48) 00:44:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 00:44:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xa000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x48000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1e02}, 0x48) 00:44:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2686.340106][ T7791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2686.347918][ T7791] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2686.355732][ T7791] [ 2686.393737][ T7812] FAULT_INJECTION: forcing a failure. [ 2686.393737][ T7812] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.402307][ T7817] FAULT_INJECTION: forcing a failure. [ 2686.402307][ T7817] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.412595][ T7812] CPU: 0 PID: 7812 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2686.431333][ T7812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2686.441225][ T7812] Call Trace: [ 2686.444351][ T7812] [ 2686.447122][ T7812] dump_stack_lvl+0x151/0x1b7 [ 2686.451641][ T7812] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2686.456933][ T7812] dump_stack+0x15/0x17 [ 2686.460925][ T7812] should_fail+0x3c0/0x510 [ 2686.465177][ T7812] __should_failslab+0x9f/0xe0 [ 2686.469776][ T7812] should_failslab+0x9/0x20 [ 2686.474117][ T7812] kmem_cache_alloc+0x4f/0x2f0 [ 2686.478715][ T7812] ? copy_signal+0x55/0x610 [ 2686.483059][ T7812] copy_signal+0x55/0x610 [ 2686.487225][ T7812] copy_process+0x126a/0x3250 [ 2686.491736][ T7812] ? proc_fail_nth_write+0x213/0x290 [ 2686.496863][ T7812] ? proc_fail_nth_read+0x220/0x220 [ 2686.501897][ T7812] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2686.506840][ T7812] ? vfs_write+0x9af/0x1050 [ 2686.511179][ T7812] ? vmacache_update+0xb7/0x120 [ 2686.515864][ T7812] kernel_clone+0x22d/0x990 [ 2686.520205][ T7812] ? file_end_write+0x1b0/0x1b0 [ 2686.524891][ T7812] ? __kasan_check_write+0x14/0x20 [ 2686.529835][ T7812] ? create_io_thread+0x1e0/0x1e0 [ 2686.534700][ T7812] ? __mutex_lock_slowpath+0x10/0x10 [ 2686.539817][ T7812] __x64_sys_clone+0x289/0x310 [ 2686.544419][ T7812] ? __do_sys_vfork+0x130/0x130 [ 2686.549106][ T7812] ? debug_smp_processor_id+0x17/0x20 [ 2686.554319][ T7812] do_syscall_64+0x44/0xd0 [ 2686.558570][ T7812] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2686.564406][ T7812] RIP: 0033:0x7fc683db00c9 [ 2686.568658][ T7812] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2686.588096][ T7812] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:44:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1e03}, 0x48) 00:44:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2686.596342][ T7812] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2686.604151][ T7812] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2686.611964][ T7812] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2686.619776][ T7812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2686.627590][ T7812] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2686.635404][ T7812] [ 2686.638265][ T7817] CPU: 1 PID: 7817 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2686.648249][ T7817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2686.658138][ T7817] Call Trace: [ 2686.661265][ T7817] [ 2686.664042][ T7817] dump_stack_lvl+0x151/0x1b7 [ 2686.668551][ T7817] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2686.673847][ T7817] dump_stack+0x15/0x17 [ 2686.677839][ T7817] should_fail+0x3c0/0x510 [ 2686.682091][ T7817] __should_failslab+0x9f/0xe0 [ 2686.686691][ T7817] should_failslab+0x9/0x20 [ 2686.691031][ T7817] kmem_cache_alloc+0x4f/0x2f0 [ 2686.695630][ T7817] ? anon_vma_clone+0xa1/0x4f0 [ 2686.700231][ T7817] anon_vma_clone+0xa1/0x4f0 [ 2686.704656][ T7817] anon_vma_fork+0x91/0x4f0 [ 2686.708997][ T7817] ? anon_vma_name+0x4c/0x70 [ 2686.713423][ T7817] dup_mmap+0x750/0xea0 [ 2686.717414][ T7817] ? __delayed_free_task+0x20/0x20 [ 2686.722362][ T7817] ? mm_init+0x807/0x960 [ 2686.726440][ T7817] dup_mm+0x91/0x330 [ 2686.730173][ T7817] copy_mm+0x108/0x1b0 [ 2686.734081][ T7817] copy_process+0x1295/0x3250 [ 2686.738591][ T7817] ? proc_fail_nth_write+0x213/0x290 [ 2686.743711][ T7817] ? proc_fail_nth_read+0x220/0x220 [ 2686.748748][ T7817] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2686.753695][ T7817] ? vfs_write+0x9af/0x1050 [ 2686.758035][ T7817] ? vmacache_update+0xb7/0x120 [ 2686.762718][ T7817] kernel_clone+0x22d/0x990 [ 2686.767058][ T7817] ? file_end_write+0x1b0/0x1b0 [ 2686.771745][ T7817] ? __kasan_check_write+0x14/0x20 [ 2686.776694][ T7817] ? create_io_thread+0x1e0/0x1e0 [ 2686.781552][ T7817] ? __mutex_lock_slowpath+0x10/0x10 [ 2686.786674][ T7817] __x64_sys_clone+0x289/0x310 [ 2686.791274][ T7817] ? __do_sys_vfork+0x130/0x130 [ 2686.795960][ T7817] ? debug_smp_processor_id+0x17/0x20 [ 2686.801167][ T7817] do_syscall_64+0x44/0xd0 [ 2686.805419][ T7817] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2686.811148][ T7817] RIP: 0033:0x7ffbc66bf0c9 [ 2686.815403][ T7817] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2686.834844][ T7817] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:44:24 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 00:44:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xb000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x4c000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1f00}, 0x48) [ 2686.843088][ T7817] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2686.850899][ T7817] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2686.858711][ T7817] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2686.866520][ T7817] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2686.874333][ T7817] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2686.882145][ T7817] 00:44:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 00:44:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000}, 0x48) 00:44:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x68000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x6c000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x74000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2686.911349][ T7834] FAULT_INJECTION: forcing a failure. [ 2686.911349][ T7834] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.925607][ T7838] FAULT_INJECTION: forcing a failure. [ 2686.925607][ T7838] name failslab, interval 1, probability 0, space 0, times 0 [ 2686.932756][ T7834] CPU: 1 PID: 7834 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2686.948003][ T7834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2686.957894][ T7834] Call Trace: [ 2686.961019][ T7834] [ 2686.963796][ T7834] dump_stack_lvl+0x151/0x1b7 [ 2686.968309][ T7834] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2686.973604][ T7834] dump_stack+0x15/0x17 [ 2686.977594][ T7834] should_fail+0x3c0/0x510 [ 2686.981844][ T7834] __should_failslab+0x9f/0xe0 [ 2686.986447][ T7834] should_failslab+0x9/0x20 [ 2686.990788][ T7834] kmem_cache_alloc+0x4f/0x2f0 [ 2686.995383][ T7834] ? vm_area_dup+0x26/0x1d0 [ 2686.999729][ T7834] ? __kasan_check_read+0x11/0x20 [ 2687.004587][ T7834] vm_area_dup+0x26/0x1d0 [ 2687.008753][ T7834] dup_mmap+0x6b8/0xea0 [ 2687.012747][ T7834] ? __delayed_free_task+0x20/0x20 [ 2687.017711][ T7834] ? mm_init+0x807/0x960 [ 2687.021771][ T7834] dup_mm+0x91/0x330 [ 2687.025508][ T7834] copy_mm+0x108/0x1b0 [ 2687.029411][ T7834] copy_process+0x1295/0x3250 [ 2687.033948][ T7834] ? proc_fail_nth_write+0x213/0x290 [ 2687.039041][ T7834] ? proc_fail_nth_read+0x220/0x220 [ 2687.044078][ T7834] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2687.049029][ T7834] ? vfs_write+0x9af/0x1050 [ 2687.053361][ T7834] ? vmacache_update+0xb7/0x120 [ 2687.058048][ T7834] kernel_clone+0x22d/0x990 [ 2687.062389][ T7834] ? file_end_write+0x1b0/0x1b0 [ 2687.067073][ T7834] ? __kasan_check_write+0x14/0x20 [ 2687.072022][ T7834] ? create_io_thread+0x1e0/0x1e0 [ 2687.076883][ T7834] ? __mutex_lock_slowpath+0x10/0x10 [ 2687.082002][ T7834] __x64_sys_clone+0x289/0x310 [ 2687.086605][ T7834] ? __do_sys_vfork+0x130/0x130 [ 2687.091291][ T7834] ? debug_smp_processor_id+0x17/0x20 [ 2687.096498][ T7834] do_syscall_64+0x44/0xd0 [ 2687.100749][ T7834] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2687.106477][ T7834] RIP: 0033:0x7fc683db00c9 [ 2687.110733][ T7834] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2687.130172][ T7834] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2687.138420][ T7834] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2687.146229][ T7834] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2687.154037][ T7834] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2687.161852][ T7834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2687.169663][ T7834] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2687.177476][ T7834] [ 2687.180358][ T7838] CPU: 0 PID: 7838 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2687.190320][ T7838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2687.200216][ T7838] Call Trace: [ 2687.203339][ T7838] [ 2687.206118][ T7838] dump_stack_lvl+0x151/0x1b7 [ 2687.210629][ T7838] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2687.211398][ T7854] FAULT_INJECTION: forcing a failure. [ 2687.211398][ T7854] name failslab, interval 1, probability 0, space 0, times 0 [ 2687.215920][ T7838] dump_stack+0x15/0x17 [ 2687.215944][ T7838] should_fail+0x3c0/0x510 [ 2687.236580][ T7838] __should_failslab+0x9f/0xe0 [ 2687.241180][ T7838] should_failslab+0x9/0x20 [ 2687.245520][ T7838] kmem_cache_alloc+0x4f/0x2f0 [ 2687.250121][ T7838] ? vm_area_dup+0x26/0x1d0 [ 2687.254460][ T7838] vm_area_dup+0x26/0x1d0 [ 2687.258622][ T7838] dup_mmap+0x6b8/0xea0 [ 2687.262616][ T7838] ? __delayed_free_task+0x20/0x20 [ 2687.267564][ T7838] ? mm_init+0x807/0x960 [ 2687.271642][ T7838] dup_mm+0x91/0x330 [ 2687.275373][ T7838] copy_mm+0x108/0x1b0 [ 2687.279281][ T7838] copy_process+0x1295/0x3250 [ 2687.283793][ T7838] ? proc_fail_nth_write+0x213/0x290 [ 2687.288915][ T7838] ? proc_fail_nth_read+0x220/0x220 [ 2687.293948][ T7838] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2687.298897][ T7838] ? vfs_write+0x9af/0x1050 [ 2687.303233][ T7838] ? vmacache_update+0xb7/0x120 [ 2687.307925][ T7838] kernel_clone+0x22d/0x990 [ 2687.312263][ T7838] ? file_end_write+0x1b0/0x1b0 [ 2687.316947][ T7838] ? __kasan_check_write+0x14/0x20 [ 2687.321895][ T7838] ? create_io_thread+0x1e0/0x1e0 [ 2687.326757][ T7838] ? __mutex_lock_slowpath+0x10/0x10 [ 2687.331877][ T7838] __x64_sys_clone+0x289/0x310 [ 2687.336479][ T7838] ? __do_sys_vfork+0x130/0x130 [ 2687.341163][ T7838] ? debug_smp_processor_id+0x17/0x20 [ 2687.346374][ T7838] do_syscall_64+0x44/0xd0 [ 2687.350624][ T7838] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2687.356350][ T7838] RIP: 0033:0x7ffbc66bf0c9 [ 2687.360606][ T7838] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2687.380044][ T7838] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2687.388289][ T7838] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2687.396106][ T7838] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2687.403914][ T7838] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 00:44:24 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 00:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x7a000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2001}, 0x48) 00:44:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xd000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2002}, 0x48) 00:44:24 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 00:44:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2003}, 0x48) 00:44:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xc4000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2687.411723][ T7838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2687.419536][ T7838] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2687.427350][ T7838] [ 2687.430211][ T7854] CPU: 1 PID: 7854 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2687.440196][ T7854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2687.450091][ T7854] Call Trace: [ 2687.453213][ T7854] [ 2687.455990][ T7854] dump_stack_lvl+0x151/0x1b7 00:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0xffff0f00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2100}, 0x48) 00:44:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2687.460503][ T7854] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2687.465802][ T7854] ? do_syscall_64+0x44/0xd0 [ 2687.470226][ T7854] dump_stack+0x15/0x17 [ 2687.474217][ T7854] should_fail+0x3c0/0x510 [ 2687.478472][ T7854] __should_failslab+0x9f/0xe0 [ 2687.483070][ T7854] should_failslab+0x9/0x20 [ 2687.487412][ T7854] kmem_cache_alloc+0x4f/0x2f0 [ 2687.492009][ T7854] ? anon_vma_clone+0xa1/0x4f0 [ 2687.496613][ T7854] anon_vma_clone+0xa1/0x4f0 [ 2687.501040][ T7854] anon_vma_fork+0x91/0x4f0 [ 2687.505372][ T7854] ? anon_vma_name+0x4c/0x70 [ 2687.509802][ T7854] dup_mmap+0x750/0xea0 [ 2687.512395][ T7873] FAULT_INJECTION: forcing a failure. [ 2687.512395][ T7873] name failslab, interval 1, probability 0, space 0, times 0 [ 2687.513793][ T7854] ? __delayed_free_task+0x20/0x20 [ 2687.531153][ T7854] ? mm_init+0x807/0x960 [ 2687.535228][ T7854] dup_mm+0x91/0x330 [ 2687.538963][ T7854] copy_mm+0x108/0x1b0 [ 2687.542869][ T7854] copy_process+0x1295/0x3250 [ 2687.547382][ T7854] ? proc_fail_nth_write+0x213/0x290 [ 2687.552499][ T7854] ? proc_fail_nth_read+0x220/0x220 [ 2687.557533][ T7854] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2687.562479][ T7854] ? vfs_write+0x9af/0x1050 [ 2687.566819][ T7854] ? vmacache_update+0xb7/0x120 [ 2687.571507][ T7854] kernel_clone+0x22d/0x990 [ 2687.575845][ T7854] ? file_end_write+0x1b0/0x1b0 [ 2687.580534][ T7854] ? __kasan_check_write+0x14/0x20 [ 2687.585484][ T7854] ? create_io_thread+0x1e0/0x1e0 [ 2687.590344][ T7854] ? __mutex_lock_slowpath+0x10/0x10 [ 2687.595463][ T7854] __x64_sys_clone+0x289/0x310 [ 2687.600065][ T7854] ? __do_sys_vfork+0x130/0x130 [ 2687.604752][ T7854] ? debug_smp_processor_id+0x17/0x20 [ 2687.609957][ T7854] do_syscall_64+0x44/0xd0 [ 2687.614207][ T7854] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2687.619934][ T7854] RIP: 0033:0x7fc683db00c9 [ 2687.624192][ T7854] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2687.643631][ T7854] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2687.651875][ T7854] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2687.659688][ T7854] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2687.667496][ T7854] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2687.675310][ T7854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2687.683121][ T7854] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2687.690937][ T7854] [ 2687.693797][ T7873] CPU: 0 PID: 7873 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2687.703778][ T7873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2687.713673][ T7873] Call Trace: [ 2687.716795][ T7873] [ 2687.719574][ T7873] dump_stack_lvl+0x151/0x1b7 [ 2687.724087][ T7873] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2687.729380][ T7873] dump_stack+0x15/0x17 [ 2687.733371][ T7873] should_fail+0x3c0/0x510 [ 2687.737652][ T7873] __should_failslab+0x9f/0xe0 [ 2687.742228][ T7873] should_failslab+0x9/0x20 [ 2687.746571][ T7873] kmem_cache_alloc+0x4f/0x2f0 [ 2687.751201][ T7873] ? anon_vma_fork+0x1b9/0x4f0 [ 2687.755768][ T7873] anon_vma_fork+0x1b9/0x4f0 [ 2687.760194][ T7873] dup_mmap+0x750/0xea0 [ 2687.764186][ T7873] ? __delayed_free_task+0x20/0x20 [ 2687.769131][ T7873] ? mm_init+0x807/0x960 [ 2687.773211][ T7873] dup_mm+0x91/0x330 [ 2687.776948][ T7873] copy_mm+0x108/0x1b0 [ 2687.780850][ T7873] copy_process+0x1295/0x3250 [ 2687.785361][ T7873] ? proc_fail_nth_write+0x213/0x290 [ 2687.790485][ T7873] ? proc_fail_nth_read+0x220/0x220 [ 2687.795516][ T7873] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2687.800461][ T7873] ? vfs_write+0x9af/0x1050 [ 2687.804803][ T7873] ? vmacache_update+0xb7/0x120 [ 2687.809488][ T7873] kernel_clone+0x22d/0x990 [ 2687.813827][ T7873] ? file_end_write+0x1b0/0x1b0 [ 2687.818516][ T7873] ? __kasan_check_write+0x14/0x20 [ 2687.823463][ T7873] ? create_io_thread+0x1e0/0x1e0 [ 2687.828324][ T7873] ? __mutex_lock_slowpath+0x10/0x10 [ 2687.833444][ T7873] __x64_sys_clone+0x289/0x310 [ 2687.838042][ T7873] ? __do_sys_vfork+0x130/0x130 [ 2687.842730][ T7873] ? debug_smp_processor_id+0x17/0x20 [ 2687.847937][ T7873] do_syscall_64+0x44/0xd0 [ 2687.852189][ T7873] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2687.857919][ T7873] RIP: 0033:0x7ffbc66bf0c9 [ 2687.862171][ T7873] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2687.881611][ T7873] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2687.889855][ T7873] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2687.897672][ T7873] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2687.905479][ T7873] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 00:44:25 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 00:44:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x2}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2200}, 0x48) 00:44:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xe000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 00:44:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x10000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2201}, 0x48) [ 2687.913289][ T7873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2687.921101][ T7873] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2687.928916][ T7873] 00:44:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x3}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x11000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2687.961602][ T7884] FAULT_INJECTION: forcing a failure. [ 2687.961602][ T7884] name failslab, interval 1, probability 0, space 0, times 0 [ 2687.982809][ T7894] FAULT_INJECTION: forcing a failure. [ 2687.982809][ T7894] name failslab, interval 1, probability 0, space 0, times 0 [ 2687.988786][ T7884] CPU: 1 PID: 7884 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2688.005205][ T7884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2688.015102][ T7884] Call Trace: [ 2688.018221][ T7884] [ 2688.021000][ T7884] dump_stack_lvl+0x151/0x1b7 [ 2688.025510][ T7884] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2688.030806][ T7884] ? do_syscall_64+0x44/0xd0 [ 2688.035233][ T7884] dump_stack+0x15/0x17 [ 2688.039225][ T7884] should_fail+0x3c0/0x510 [ 2688.043479][ T7884] __should_failslab+0x9f/0xe0 [ 2688.048077][ T7884] should_failslab+0x9/0x20 [ 2688.052417][ T7884] kmem_cache_alloc+0x4f/0x2f0 [ 2688.057016][ T7884] ? anon_vma_clone+0xa1/0x4f0 [ 2688.061623][ T7884] anon_vma_clone+0xa1/0x4f0 [ 2688.066044][ T7884] anon_vma_fork+0x91/0x4f0 [ 2688.070382][ T7884] ? anon_vma_name+0x4c/0x70 [ 2688.074813][ T7884] dup_mmap+0x750/0xea0 [ 2688.078804][ T7884] ? __delayed_free_task+0x20/0x20 [ 2688.083748][ T7884] ? mm_init+0x807/0x960 [ 2688.087831][ T7884] dup_mm+0x91/0x330 [ 2688.091562][ T7884] copy_mm+0x108/0x1b0 [ 2688.095464][ T7884] copy_process+0x1295/0x3250 [ 2688.099978][ T7884] ? proc_fail_nth_write+0x213/0x290 [ 2688.105100][ T7884] ? proc_fail_nth_read+0x220/0x220 [ 2688.110132][ T7884] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2688.115080][ T7884] ? vfs_write+0x9af/0x1050 [ 2688.119417][ T7884] ? vmacache_update+0xb7/0x120 [ 2688.124109][ T7884] kernel_clone+0x22d/0x990 [ 2688.128445][ T7884] ? file_end_write+0x1b0/0x1b0 [ 2688.133131][ T7884] ? __kasan_check_write+0x14/0x20 [ 2688.138079][ T7884] ? create_io_thread+0x1e0/0x1e0 [ 2688.142942][ T7884] ? __mutex_lock_slowpath+0x10/0x10 [ 2688.148060][ T7884] __x64_sys_clone+0x289/0x310 [ 2688.152663][ T7884] ? __do_sys_vfork+0x130/0x130 [ 2688.157349][ T7884] ? debug_smp_processor_id+0x17/0x20 [ 2688.162555][ T7884] do_syscall_64+0x44/0xd0 [ 2688.166810][ T7884] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2688.172536][ T7884] RIP: 0033:0x7ffbc66bf0c9 [ 2688.176791][ T7884] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2688.196231][ T7884] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2688.204474][ T7884] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2688.212375][ T7884] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2688.220184][ T7884] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2688.227994][ T7884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2688.235805][ T7884] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2688.243620][ T7884] [ 2688.246483][ T7894] CPU: 0 PID: 7894 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2688.256465][ T7894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2688.266361][ T7894] Call Trace: [ 2688.269484][ T7894] [ 2688.272262][ T7894] dump_stack_lvl+0x151/0x1b7 [ 2688.276772][ T7894] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2688.282067][ T7894] dump_stack+0x15/0x17 [ 2688.286059][ T7894] should_fail+0x3c0/0x510 [ 2688.290310][ T7894] __should_failslab+0x9f/0xe0 [ 2688.294912][ T7894] should_failslab+0x9/0x20 [ 2688.299249][ T7894] kmem_cache_alloc+0x4f/0x2f0 [ 2688.303849][ T7894] ? anon_vma_clone+0xa1/0x4f0 [ 2688.308450][ T7894] anon_vma_clone+0xa1/0x4f0 [ 2688.312875][ T7894] anon_vma_fork+0x91/0x4f0 [ 2688.317214][ T7894] ? anon_vma_name+0x4c/0x70 [ 2688.321642][ T7894] dup_mmap+0x750/0xea0 [ 2688.325635][ T7894] ? __delayed_free_task+0x20/0x20 [ 2688.330581][ T7894] ? mm_init+0x807/0x960 [ 2688.334661][ T7894] dup_mm+0x91/0x330 [ 2688.338395][ T7894] copy_mm+0x108/0x1b0 [ 2688.342302][ T7894] copy_process+0x1295/0x3250 [ 2688.346813][ T7894] ? proc_fail_nth_write+0x213/0x290 [ 2688.351931][ T7894] ? proc_fail_nth_read+0x220/0x220 [ 2688.356966][ T7894] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2688.361913][ T7894] ? vfs_write+0x9af/0x1050 [ 2688.366253][ T7894] ? vmacache_update+0xb7/0x120 [ 2688.370943][ T7894] kernel_clone+0x22d/0x990 [ 2688.375280][ T7894] ? file_end_write+0x1b0/0x1b0 [ 2688.379965][ T7894] ? __kasan_check_write+0x14/0x20 [ 2688.384914][ T7894] ? create_io_thread+0x1e0/0x1e0 [ 2688.389772][ T7894] ? __mutex_lock_slowpath+0x10/0x10 [ 2688.394893][ T7894] __x64_sys_clone+0x289/0x310 [ 2688.399494][ T7894] ? __do_sys_vfork+0x130/0x130 [ 2688.404183][ T7894] ? debug_smp_processor_id+0x17/0x20 [ 2688.409390][ T7894] do_syscall_64+0x44/0xd0 [ 2688.413642][ T7894] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2688.419379][ T7894] RIP: 0033:0x7fc683db00c9 [ 2688.423626][ T7894] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2688.443067][ T7894] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2688.451308][ T7894] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:25 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 00:44:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2202}, 0x48) 00:44:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x12000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:25 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) [ 2688.459118][ T7894] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2688.466930][ T7894] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2688.474742][ T7894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2688.482553][ T7894] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2688.490367][ T7894] 00:44:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x18000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x5}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2300}, 0x48) [ 2688.510596][ T7907] FAULT_INJECTION: forcing a failure. [ 2688.510596][ T7907] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2688.533253][ T7907] CPU: 1 PID: 7907 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2688.543237][ T7907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2688.546443][ T7919] FAULT_INJECTION: forcing a failure. [ 2688.546443][ T7919] name failslab, interval 1, probability 0, space 0, times 0 [ 2688.553131][ T7907] Call Trace: [ 2688.553145][ T7907] [ 2688.553152][ T7907] dump_stack_lvl+0x151/0x1b7 [ 2688.553178][ T7907] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2688.553197][ T7907] ? __kasan_check_write+0x14/0x20 [ 2688.553215][ T7907] ? __set_page_owner+0x2ee/0x310 [ 2688.591060][ T7907] dump_stack+0x15/0x17 [ 2688.595047][ T7907] should_fail+0x3c0/0x510 [ 2688.599301][ T7907] should_fail_alloc_page+0x58/0x70 [ 2688.604335][ T7907] __alloc_pages+0x1de/0x7c0 [ 2688.608779][ T7907] ? __count_vm_events+0x30/0x30 [ 2688.613537][ T7907] ? __count_vm_events+0x30/0x30 [ 2688.618308][ T7907] ? __kasan_check_write+0x14/0x20 [ 2688.623255][ T7907] ? _raw_spin_lock+0xa3/0x1b0 [ 2688.627856][ T7907] __pmd_alloc+0xb1/0x550 [ 2688.632021][ T7907] ? kmem_cache_alloc+0x189/0x2f0 [ 2688.636879][ T7907] ? anon_vma_fork+0x1b9/0x4f0 [ 2688.641482][ T7907] ? __pud_alloc+0x260/0x260 [ 2688.645906][ T7907] ? __pud_alloc+0x218/0x260 [ 2688.650335][ T7907] ? do_handle_mm_fault+0x2370/0x2370 [ 2688.655542][ T7907] copy_page_range+0xd04/0x1090 [ 2688.660232][ T7907] ? pfn_valid+0x1e0/0x1e0 [ 2688.664482][ T7907] dup_mmap+0x99f/0xea0 [ 2688.668495][ T7907] ? __delayed_free_task+0x20/0x20 [ 2688.673420][ T7907] ? mm_init+0x807/0x960 [ 2688.677500][ T7907] dup_mm+0x91/0x330 [ 2688.681233][ T7907] copy_mm+0x108/0x1b0 [ 2688.685138][ T7907] copy_process+0x1295/0x3250 [ 2688.689650][ T7907] ? proc_fail_nth_write+0x213/0x290 [ 2688.694775][ T7907] ? proc_fail_nth_read+0x220/0x220 [ 2688.699806][ T7907] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2688.704754][ T7907] ? vfs_write+0x9af/0x1050 [ 2688.709091][ T7907] ? vmacache_update+0xb7/0x120 [ 2688.713778][ T7907] kernel_clone+0x22d/0x990 [ 2688.718117][ T7907] ? file_end_write+0x1b0/0x1b0 [ 2688.722807][ T7907] ? __kasan_check_write+0x14/0x20 [ 2688.727751][ T7907] ? create_io_thread+0x1e0/0x1e0 [ 2688.732613][ T7907] ? __mutex_lock_slowpath+0x10/0x10 [ 2688.737744][ T7907] __x64_sys_clone+0x289/0x310 [ 2688.742335][ T7907] ? __do_sys_vfork+0x130/0x130 [ 2688.747021][ T7907] ? debug_smp_processor_id+0x17/0x20 [ 2688.752227][ T7907] do_syscall_64+0x44/0xd0 [ 2688.756480][ T7907] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2688.762206][ T7907] RIP: 0033:0x7ffbc66bf0c9 [ 2688.766465][ T7907] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2688.785901][ T7907] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2688.794148][ T7907] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2688.801957][ T7907] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2688.809771][ T7907] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2688.817580][ T7907] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2688.825393][ T7907] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2688.833205][ T7907] [ 2688.836071][ T7919] CPU: 0 PID: 7919 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2688.846050][ T7919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2688.855951][ T7919] Call Trace: [ 2688.859069][ T7919] [ 2688.861846][ T7919] dump_stack_lvl+0x151/0x1b7 [ 2688.866356][ T7919] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2688.871651][ T7919] dump_stack+0x15/0x17 [ 2688.875644][ T7919] should_fail+0x3c0/0x510 [ 2688.879907][ T7919] __should_failslab+0x9f/0xe0 [ 2688.884496][ T7919] should_failslab+0x9/0x20 [ 2688.888836][ T7919] kmem_cache_alloc+0x4f/0x2f0 [ 2688.893435][ T7919] ? anon_vma_clone+0xa1/0x4f0 [ 2688.898034][ T7919] anon_vma_clone+0xa1/0x4f0 [ 2688.902461][ T7919] anon_vma_fork+0x91/0x4f0 [ 2688.906800][ T7919] ? anon_vma_name+0x4c/0x70 [ 2688.911228][ T7919] dup_mmap+0x750/0xea0 [ 2688.915221][ T7919] ? __delayed_free_task+0x20/0x20 [ 2688.920165][ T7919] ? mm_init+0x807/0x960 [ 2688.924246][ T7919] dup_mm+0x91/0x330 [ 2688.927979][ T7919] copy_mm+0x108/0x1b0 [ 2688.931883][ T7919] copy_process+0x1295/0x3250 [ 2688.936396][ T7919] ? proc_fail_nth_write+0x213/0x290 [ 2688.941516][ T7919] ? proc_fail_nth_read+0x220/0x220 [ 2688.946554][ T7919] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2688.951498][ T7919] ? vfs_write+0x9af/0x1050 [ 2688.955837][ T7919] ? vmacache_update+0xb7/0x120 [ 2688.960523][ T7919] kernel_clone+0x22d/0x990 [ 2688.964865][ T7919] ? file_end_write+0x1b0/0x1b0 [ 2688.969550][ T7919] ? __kasan_check_write+0x14/0x20 [ 2688.974497][ T7919] ? create_io_thread+0x1e0/0x1e0 [ 2688.979360][ T7919] ? __mutex_lock_slowpath+0x10/0x10 [ 2688.984481][ T7919] __x64_sys_clone+0x289/0x310 [ 2688.989081][ T7919] ? __do_sys_vfork+0x130/0x130 [ 2688.993768][ T7919] ? debug_smp_processor_id+0x17/0x20 [ 2688.998984][ T7919] do_syscall_64+0x44/0xd0 [ 2689.003228][ T7919] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2689.008955][ T7919] RIP: 0033:0x7fc683db00c9 [ 2689.013208][ T7919] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2689.032647][ T7919] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2689.040892][ T7919] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2689.048705][ T7919] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2689.056516][ T7919] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:26 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 00:44:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x25000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2401}, 0x48) 00:44:26 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 00:44:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2402}, 0x48) 00:44:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x36000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x43000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2689.064326][ T7919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2689.072138][ T7919] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2689.079953][ T7919] 00:44:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x8}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x48000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2689.118803][ T7937] FAULT_INJECTION: forcing a failure. [ 2689.118803][ T7937] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2689.143083][ T7948] FAULT_INJECTION: forcing a failure. [ 2689.143083][ T7948] name failslab, interval 1, probability 0, space 0, times 0 [ 2689.146915][ T7937] CPU: 0 PID: 7937 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2689.165473][ T7937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2689.175368][ T7937] Call Trace: [ 2689.178488][ T7937] [ 2689.181265][ T7937] dump_stack_lvl+0x151/0x1b7 [ 2689.185777][ T7937] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2689.191073][ T7937] dump_stack+0x15/0x17 [ 2689.195065][ T7937] should_fail+0x3c0/0x510 [ 2689.199317][ T7937] should_fail_alloc_page+0x58/0x70 [ 2689.204351][ T7937] __alloc_pages+0x1de/0x7c0 [ 2689.208780][ T7937] ? __count_vm_events+0x30/0x30 [ 2689.213553][ T7937] ? dup_mm+0x91/0x330 [ 2689.217456][ T7937] ? copy_mm+0x108/0x1b0 [ 2689.221535][ T7937] ? copy_process+0x1295/0x3250 [ 2689.226222][ T7937] ? kernel_clone+0x22d/0x990 [ 2689.230737][ T7937] ? __x64_sys_clone+0x289/0x310 [ 2689.235510][ T7937] pte_alloc_one+0x73/0x1b0 [ 2689.239853][ T7937] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2689.244882][ T7937] ? __kasan_check_write+0x14/0x20 [ 2689.249833][ T7937] ? __set_page_owner+0x2ee/0x310 [ 2689.254692][ T7937] __pte_alloc+0x86/0x350 [ 2689.258855][ T7937] ? post_alloc_hook+0x1ab/0x1b0 [ 2689.263629][ T7937] ? free_pgtables+0x210/0x210 [ 2689.268230][ T7937] ? get_page_from_freelist+0x38b/0x400 [ 2689.273611][ T7937] copy_pte_range+0x1b1f/0x20b0 [ 2689.278305][ T7937] ? __kunmap_atomic+0x80/0x80 [ 2689.282899][ T7937] ? __pud_alloc+0x260/0x260 [ 2689.287322][ T7937] ? __pud_alloc+0x218/0x260 [ 2689.291750][ T7937] ? do_handle_mm_fault+0x2370/0x2370 [ 2689.296960][ T7937] copy_page_range+0xc1e/0x1090 [ 2689.301647][ T7937] ? pfn_valid+0x1e0/0x1e0 [ 2689.305898][ T7937] dup_mmap+0x99f/0xea0 [ 2689.309891][ T7937] ? __delayed_free_task+0x20/0x20 [ 2689.314839][ T7937] ? mm_init+0x807/0x960 [ 2689.318918][ T7937] dup_mm+0x91/0x330 [ 2689.322650][ T7937] copy_mm+0x108/0x1b0 [ 2689.326554][ T7937] copy_process+0x1295/0x3250 [ 2689.331073][ T7937] ? proc_fail_nth_write+0x213/0x290 [ 2689.336190][ T7937] ? proc_fail_nth_read+0x220/0x220 [ 2689.341221][ T7937] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2689.346169][ T7937] ? vfs_write+0x9af/0x1050 [ 2689.350506][ T7937] ? vmacache_update+0xb7/0x120 [ 2689.355198][ T7937] kernel_clone+0x22d/0x990 [ 2689.359536][ T7937] ? file_end_write+0x1b0/0x1b0 [ 2689.364221][ T7937] ? __kasan_check_write+0x14/0x20 [ 2689.369169][ T7937] ? create_io_thread+0x1e0/0x1e0 [ 2689.374031][ T7937] ? __mutex_lock_slowpath+0x10/0x10 [ 2689.379155][ T7937] __x64_sys_clone+0x289/0x310 [ 2689.383755][ T7937] ? __do_sys_vfork+0x130/0x130 [ 2689.388443][ T7937] ? debug_smp_processor_id+0x17/0x20 [ 2689.393647][ T7937] do_syscall_64+0x44/0xd0 [ 2689.397896][ T7937] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2689.403624][ T7937] RIP: 0033:0x7ffbc66bf0c9 [ 2689.407882][ T7937] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2689.427319][ T7937] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2689.435566][ T7937] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2689.443376][ T7937] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2689.451185][ T7937] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.458996][ T7937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2689.466810][ T7937] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2689.474623][ T7937] [ 2689.477487][ T7948] CPU: 1 PID: 7948 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2689.487469][ T7948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2689.497361][ T7948] Call Trace: [ 2689.500484][ T7948] [ 2689.503261][ T7948] dump_stack_lvl+0x151/0x1b7 [ 2689.507775][ T7948] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2689.513070][ T7948] dump_stack+0x15/0x17 [ 2689.517059][ T7948] should_fail+0x3c0/0x510 [ 2689.521312][ T7948] __should_failslab+0x9f/0xe0 [ 2689.525915][ T7948] should_failslab+0x9/0x20 [ 2689.530255][ T7948] kmem_cache_alloc+0x4f/0x2f0 [ 2689.534854][ T7948] ? vm_area_dup+0x26/0x1d0 [ 2689.539193][ T7948] vm_area_dup+0x26/0x1d0 [ 2689.543358][ T7948] dup_mmap+0x6b8/0xea0 [ 2689.547350][ T7948] ? __delayed_free_task+0x20/0x20 [ 2689.552297][ T7948] ? mm_init+0x807/0x960 [ 2689.556377][ T7948] dup_mm+0x91/0x330 [ 2689.560110][ T7948] copy_mm+0x108/0x1b0 [ 2689.564013][ T7948] copy_process+0x1295/0x3250 [ 2689.568664][ T7948] ? proc_fail_nth_write+0x213/0x290 [ 2689.573773][ T7948] ? proc_fail_nth_read+0x220/0x220 [ 2689.578802][ T7948] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2689.583750][ T7948] ? vfs_write+0x9af/0x1050 [ 2689.588088][ T7948] ? vmacache_update+0xb7/0x120 [ 2689.592777][ T7948] kernel_clone+0x22d/0x990 [ 2689.597117][ T7948] ? file_end_write+0x1b0/0x1b0 [ 2689.601801][ T7948] ? __kasan_check_write+0x14/0x20 [ 2689.606750][ T7948] ? create_io_thread+0x1e0/0x1e0 [ 2689.611608][ T7948] ? __mutex_lock_slowpath+0x10/0x10 [ 2689.616731][ T7948] __x64_sys_clone+0x289/0x310 [ 2689.621333][ T7948] ? __do_sys_vfork+0x130/0x130 [ 2689.626016][ T7948] ? debug_smp_processor_id+0x17/0x20 [ 2689.631223][ T7948] do_syscall_64+0x44/0xd0 [ 2689.635476][ T7948] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2689.641204][ T7948] RIP: 0033:0x7fc683db00c9 [ 2689.645462][ T7948] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:27 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 00:44:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2600}, 0x48) 00:44:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4c000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x9}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:27 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) 00:44:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xa}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2601}, 0x48) 00:44:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x68000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2689.665334][ T7948] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2689.673579][ T7948] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2689.681388][ T7948] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2689.689201][ T7948] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.697011][ T7948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2689.704822][ T7948] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2689.712637][ T7948] 00:44:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xb}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6c000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2689.747134][ T7966] FAULT_INJECTION: forcing a failure. [ 2689.747134][ T7966] name failslab, interval 1, probability 0, space 0, times 0 [ 2689.749157][ T7964] FAULT_INJECTION: forcing a failure. [ 2689.749157][ T7964] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2689.766197][ T7966] CPU: 0 PID: 7966 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2689.782550][ T7966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2689.792444][ T7966] Call Trace: [ 2689.795569][ T7966] [ 2689.798344][ T7966] dump_stack_lvl+0x151/0x1b7 [ 2689.802858][ T7966] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2689.808151][ T7966] dump_stack+0x15/0x17 [ 2689.812142][ T7966] should_fail+0x3c0/0x510 [ 2689.816396][ T7966] __should_failslab+0x9f/0xe0 [ 2689.820994][ T7966] should_failslab+0x9/0x20 [ 2689.825335][ T7966] kmem_cache_alloc+0x4f/0x2f0 [ 2689.829935][ T7966] ? vm_area_dup+0x26/0x1d0 [ 2689.834272][ T7966] ? __kasan_check_read+0x11/0x20 [ 2689.839136][ T7966] vm_area_dup+0x26/0x1d0 [ 2689.843302][ T7966] dup_mmap+0x6b8/0xea0 [ 2689.847294][ T7966] ? __delayed_free_task+0x20/0x20 [ 2689.852242][ T7966] ? mm_init+0x807/0x960 [ 2689.856319][ T7966] dup_mm+0x91/0x330 [ 2689.860051][ T7966] copy_mm+0x108/0x1b0 [ 2689.863959][ T7966] copy_process+0x1295/0x3250 [ 2689.868471][ T7966] ? proc_fail_nth_write+0x213/0x290 [ 2689.873590][ T7966] ? proc_fail_nth_read+0x220/0x220 [ 2689.878628][ T7966] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2689.883571][ T7966] ? vfs_write+0x9af/0x1050 [ 2689.887910][ T7966] ? vmacache_update+0xb7/0x120 [ 2689.892601][ T7966] kernel_clone+0x22d/0x990 [ 2689.896939][ T7966] ? file_end_write+0x1b0/0x1b0 [ 2689.901625][ T7966] ? __kasan_check_write+0x14/0x20 [ 2689.906581][ T7966] ? create_io_thread+0x1e0/0x1e0 [ 2689.911431][ T7966] ? __mutex_lock_slowpath+0x10/0x10 [ 2689.916560][ T7966] __x64_sys_clone+0x289/0x310 [ 2689.921152][ T7966] ? __do_sys_vfork+0x130/0x130 [ 2689.925843][ T7966] ? debug_smp_processor_id+0x17/0x20 [ 2689.931047][ T7966] do_syscall_64+0x44/0xd0 [ 2689.935301][ T7966] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2689.941029][ T7966] RIP: 0033:0x7fc683db00c9 [ 2689.945282][ T7966] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2689.964720][ T7966] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2689.972967][ T7966] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2689.980776][ T7966] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2689.988587][ T7966] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2689.996401][ T7966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2690.004214][ T7966] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2690.012025][ T7966] [ 2690.014892][ T7964] CPU: 1 PID: 7964 Comm: syz-executor.4 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2690.024871][ T7964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2690.034768][ T7964] Call Trace: [ 2690.037896][ T7964] [ 2690.040669][ T7964] dump_stack_lvl+0x151/0x1b7 [ 2690.041038][ T7978] FAULT_INJECTION: forcing a failure. [ 2690.041038][ T7978] name failslab, interval 1, probability 0, space 0, times 0 [ 2690.045179][ T7964] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2690.045204][ T7964] ? stack_trace_save+0x1f0/0x1f0 [ 2690.045221][ T7964] ? __kernel_text_address+0x9a/0x110 [ 2690.045242][ T7964] dump_stack+0x15/0x17 [ 2690.076946][ T7964] should_fail+0x3c0/0x510 [ 2690.081197][ T7964] should_fail_alloc_page+0x58/0x70 [ 2690.086233][ T7964] __alloc_pages+0x1de/0x7c0 [ 2690.090656][ T7964] ? stack_trace_save+0x12d/0x1f0 00:44:27 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 00:44:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x74000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2602}, 0x48) [ 2690.095519][ T7964] ? stack_trace_snprint+0x100/0x100 [ 2690.100636][ T7964] ? __count_vm_events+0x30/0x30 [ 2690.105415][ T7964] ? __kasan_slab_alloc+0xc4/0xe0 [ 2690.110272][ T7964] ? __kasan_slab_alloc+0xb2/0xe0 [ 2690.115132][ T7964] ? kmem_cache_alloc+0x189/0x2f0 [ 2690.119991][ T7964] ? anon_vma_fork+0x1b9/0x4f0 [ 2690.124593][ T7964] get_zeroed_page+0x19/0x40 [ 2690.129021][ T7964] __pud_alloc+0x8b/0x260 [ 2690.133188][ T7964] ? do_handle_mm_fault+0x2370/0x2370 [ 2690.138393][ T7964] copy_page_range+0xd9e/0x1090 [ 2690.143082][ T7964] ? pfn_valid+0x1e0/0x1e0 [ 2690.147334][ T7964] dup_mmap+0x99f/0xea0 [ 2690.151326][ T7964] ? __delayed_free_task+0x20/0x20 [ 2690.156271][ T7964] ? mm_init+0x807/0x960 [ 2690.160351][ T7964] dup_mm+0x91/0x330 [ 2690.164082][ T7964] copy_mm+0x108/0x1b0 [ 2690.167988][ T7964] copy_process+0x1295/0x3250 [ 2690.172503][ T7964] ? proc_fail_nth_write+0x213/0x290 [ 2690.177623][ T7964] ? proc_fail_nth_read+0x220/0x220 [ 2690.182659][ T7964] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2690.187612][ T7964] ? vfs_write+0x9af/0x1050 [ 2690.191943][ T7964] ? vmacache_update+0xb7/0x120 [ 2690.196630][ T7964] kernel_clone+0x22d/0x990 [ 2690.200969][ T7964] ? file_end_write+0x1b0/0x1b0 [ 2690.205657][ T7964] ? __kasan_check_write+0x14/0x20 [ 2690.210601][ T7964] ? create_io_thread+0x1e0/0x1e0 [ 2690.215463][ T7964] ? __mutex_lock_slowpath+0x10/0x10 [ 2690.220584][ T7964] __x64_sys_clone+0x289/0x310 [ 2690.225185][ T7964] ? __do_sys_vfork+0x130/0x130 [ 2690.229875][ T7964] ? debug_smp_processor_id+0x17/0x20 [ 2690.235076][ T7964] do_syscall_64+0x44/0xd0 [ 2690.239332][ T7964] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2690.245056][ T7964] RIP: 0033:0x7ffbc66bf0c9 [ 2690.249311][ T7964] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2690.268751][ T7964] RSP: 002b:00007ffbc5432118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2690.276996][ T7964] RAX: ffffffffffffffda RBX: 00007ffbc67def80 RCX: 00007ffbc66bf0c9 [ 2690.284812][ T7964] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2690.292621][ T7964] RBP: 00007ffbc54321d0 R08: 0000000000000000 R09: 0000000000000000 [ 2690.300431][ T7964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2690.308241][ T7964] R13: 00007ffeaec237df R14: 00007ffbc5432300 R15: 0000000000022000 [ 2690.316058][ T7964] [ 2690.333789][ T7978] CPU: 1 PID: 7978 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2690.343774][ T7978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2690.353664][ T7978] Call Trace: [ 2690.356790][ T7978] [ 2690.359568][ T7978] dump_stack_lvl+0x151/0x1b7 [ 2690.364078][ T7978] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2690.369372][ T7978] ? do_syscall_64+0x44/0xd0 [ 2690.373802][ T7978] dump_stack+0x15/0x17 [ 2690.377791][ T7978] should_fail+0x3c0/0x510 [ 2690.382044][ T7978] __should_failslab+0x9f/0xe0 [ 2690.386644][ T7978] should_failslab+0x9/0x20 [ 2690.390990][ T7978] kmem_cache_alloc+0x4f/0x2f0 [ 2690.395583][ T7978] ? anon_vma_clone+0xa1/0x4f0 [ 2690.400194][ T7978] anon_vma_clone+0xa1/0x4f0 [ 2690.404619][ T7978] anon_vma_fork+0x91/0x4f0 [ 2690.408949][ T7978] ? anon_vma_name+0x4c/0x70 [ 2690.413377][ T7978] dup_mmap+0x750/0xea0 [ 2690.417376][ T7978] ? __delayed_free_task+0x20/0x20 [ 2690.422317][ T7978] ? mm_init+0x807/0x960 [ 2690.426399][ T7978] dup_mm+0x91/0x330 [ 2690.430129][ T7978] copy_mm+0x108/0x1b0 [ 2690.434034][ T7978] copy_process+0x1295/0x3250 [ 2690.438549][ T7978] ? proc_fail_nth_write+0x213/0x290 [ 2690.443666][ T7978] ? proc_fail_nth_read+0x220/0x220 [ 2690.448702][ T7978] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2690.453647][ T7978] ? vfs_write+0x9af/0x1050 [ 2690.457988][ T7978] kernel_clone+0x22d/0x990 [ 2690.462327][ T7978] ? file_end_write+0x1b0/0x1b0 [ 2690.467013][ T7978] ? __kasan_check_write+0x14/0x20 [ 2690.471962][ T7978] ? create_io_thread+0x1e0/0x1e0 [ 2690.476821][ T7978] ? __mutex_lock_slowpath+0x10/0x10 [ 2690.481942][ T7978] __x64_sys_clone+0x289/0x310 [ 2690.486542][ T7978] ? __do_sys_vfork+0x130/0x130 [ 2690.491229][ T7978] ? debug_smp_processor_id+0x17/0x20 [ 2690.496439][ T7978] do_syscall_64+0x44/0xd0 [ 2690.500692][ T7978] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2690.506426][ T7978] RIP: 0033:0x7fc683db00c9 [ 2690.510674][ T7978] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2690.530117][ T7978] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2690.538362][ T7978] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2603}, 0x48) 00:44:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7a000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xd}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) [ 2690.546170][ T7978] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2690.553982][ T7978] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2690.561790][ T7978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2690.569602][ T7978] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2690.577415][ T7978] [ 2690.599119][ T7994] FAULT_INJECTION: forcing a failure. [ 2690.599119][ T7994] name failslab, interval 1, probability 0, space 0, times 0 [ 2690.614868][ T7994] CPU: 0 PID: 7994 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2690.624854][ T7994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2690.634749][ T7994] Call Trace: [ 2690.637874][ T7994] [ 2690.640652][ T7994] dump_stack_lvl+0x151/0x1b7 [ 2690.645165][ T7994] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2690.650465][ T7994] dump_stack+0x15/0x17 [ 2690.654450][ T7994] should_fail+0x3c0/0x510 [ 2690.658703][ T7994] __should_failslab+0x9f/0xe0 [ 2690.663301][ T7994] should_failslab+0x9/0x20 [ 2690.667641][ T7994] kmem_cache_alloc+0x4f/0x2f0 [ 2690.672243][ T7994] ? anon_vma_fork+0x1b9/0x4f0 [ 2690.676845][ T7994] anon_vma_fork+0x1b9/0x4f0 [ 2690.681270][ T7994] dup_mmap+0x750/0xea0 [ 2690.685265][ T7994] ? __delayed_free_task+0x20/0x20 [ 2690.690211][ T7994] ? mm_init+0x807/0x960 [ 2690.694287][ T7994] dup_mm+0x91/0x330 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2800}, 0x48) 00:44:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xe}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc4000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x7, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x8, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x9, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2690.698019][ T7994] copy_mm+0x108/0x1b0 [ 2690.701933][ T7994] copy_process+0x1295/0x3250 [ 2690.706441][ T7994] ? proc_fail_nth_write+0x213/0x290 [ 2690.711563][ T7994] ? proc_fail_nth_read+0x220/0x220 [ 2690.716595][ T7994] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2690.721541][ T7994] ? vfs_write+0x9af/0x1050 [ 2690.725880][ T7994] ? vmacache_update+0xb7/0x120 [ 2690.730568][ T7994] kernel_clone+0x22d/0x990 [ 2690.734906][ T7994] ? file_end_write+0x1b0/0x1b0 [ 2690.739593][ T7994] ? __kasan_check_write+0x14/0x20 [ 2690.744536][ T7994] ? create_io_thread+0x1e0/0x1e0 [ 2690.749397][ T7994] ? __mutex_lock_slowpath+0x10/0x10 [ 2690.754516][ T7994] __x64_sys_clone+0x289/0x310 [ 2690.759121][ T7994] ? __do_sys_vfork+0x130/0x130 [ 2690.763804][ T7994] ? debug_smp_processor_id+0x17/0x20 [ 2690.769016][ T7994] do_syscall_64+0x44/0xd0 [ 2690.773264][ T7994] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2690.778994][ T7994] RIP: 0033:0x7fc683db00c9 [ 2690.783245][ T7994] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2690.802690][ T7994] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2690.815618][ T7994] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2690.823431][ T7994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2690.831242][ T7994] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2690.839053][ T7994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:28 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2801}, 0x48) 00:44:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x10}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xffff0f00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2802}, 0x48) [ 2690.846872][ T7994] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2690.854763][ T7994] 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc4, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x11}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x34d, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x12}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2690.879394][ T8034] FAULT_INJECTION: forcing a failure. [ 2690.879394][ T8034] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2690.893852][ T8034] CPU: 0 PID: 8034 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2690.903832][ T8034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2690.913726][ T8034] Call Trace: [ 2690.916850][ T8034] [ 2690.919630][ T8034] dump_stack_lvl+0x151/0x1b7 [ 2690.924141][ T8034] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2690.929437][ T8034] ? stack_trace_save+0x1f0/0x1f0 [ 2690.934295][ T8034] ? __kernel_text_address+0x9a/0x110 [ 2690.939505][ T8034] dump_stack+0x15/0x17 [ 2690.943494][ T8034] should_fail+0x3c0/0x510 [ 2690.947749][ T8034] should_fail_alloc_page+0x58/0x70 [ 2690.952778][ T8034] __alloc_pages+0x1de/0x7c0 [ 2690.957202][ T8034] ? stack_trace_save+0x12d/0x1f0 [ 2690.962064][ T8034] ? stack_trace_snprint+0x100/0x100 [ 2690.967191][ T8034] ? __count_vm_events+0x30/0x30 [ 2690.971959][ T8034] ? __kasan_slab_alloc+0xc4/0xe0 [ 2690.976819][ T8034] ? __kasan_slab_alloc+0xb2/0xe0 [ 2690.981682][ T8034] ? kmem_cache_alloc+0x189/0x2f0 [ 2690.986538][ T8034] ? anon_vma_fork+0x1b9/0x4f0 [ 2690.991138][ T8034] get_zeroed_page+0x19/0x40 [ 2690.995565][ T8034] __pud_alloc+0x8b/0x260 [ 2690.999731][ T8034] ? do_handle_mm_fault+0x2370/0x2370 [ 2691.004938][ T8034] copy_page_range+0xd9e/0x1090 [ 2691.009627][ T8034] ? pfn_valid+0x1e0/0x1e0 [ 2691.013877][ T8034] dup_mmap+0x99f/0xea0 [ 2691.017871][ T8034] ? __delayed_free_task+0x20/0x20 [ 2691.022820][ T8034] ? mm_init+0x807/0x960 [ 2691.026897][ T8034] dup_mm+0x91/0x330 [ 2691.030628][ T8034] copy_mm+0x108/0x1b0 [ 2691.034535][ T8034] copy_process+0x1295/0x3250 [ 2691.039047][ T8034] ? proc_fail_nth_write+0x213/0x290 [ 2691.044167][ T8034] ? proc_fail_nth_read+0x220/0x220 [ 2691.049201][ T8034] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2691.054241][ T8034] ? vfs_write+0x9af/0x1050 [ 2691.058578][ T8034] ? vmacache_update+0xb7/0x120 [ 2691.063267][ T8034] kernel_clone+0x22d/0x990 [ 2691.067602][ T8034] ? file_end_write+0x1b0/0x1b0 [ 2691.072297][ T8034] ? __kasan_check_write+0x14/0x20 [ 2691.077241][ T8034] ? create_io_thread+0x1e0/0x1e0 [ 2691.082100][ T8034] ? __mutex_lock_slowpath+0x10/0x10 [ 2691.087216][ T8034] __x64_sys_clone+0x289/0x310 [ 2691.091819][ T8034] ? __do_sys_vfork+0x130/0x130 [ 2691.096503][ T8034] ? debug_smp_processor_id+0x17/0x20 [ 2691.101712][ T8034] do_syscall_64+0x44/0xd0 [ 2691.105965][ T8034] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2691.111695][ T8034] RIP: 0033:0x7fc683db00c9 [ 2691.115946][ T8034] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2691.135384][ T8034] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2691.143630][ T8034] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2691.151442][ T8034] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2691.159257][ T8034] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2691.167066][ T8034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:28 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x700, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x2}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x18}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2803}, 0x48) 00:44:28 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x900, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x3}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2691.174875][ T8034] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2691.182688][ T8034] 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2a00}, 0x48) 00:44:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x25}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2691.211213][ T8065] FAULT_INJECTION: forcing a failure. [ 2691.211213][ T8065] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2691.228795][ T8065] CPU: 0 PID: 8065 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2691.238771][ T8065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2691.248665][ T8065] Call Trace: [ 2691.251792][ T8065] [ 2691.254565][ T8065] dump_stack_lvl+0x151/0x1b7 [ 2691.259084][ T8065] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2691.264377][ T8065] ? stack_trace_save+0x1f0/0x1f0 [ 2691.269229][ T8065] ? __kernel_text_address+0x9a/0x110 [ 2691.274438][ T8065] dump_stack+0x15/0x17 [ 2691.278431][ T8065] should_fail+0x3c0/0x510 [ 2691.282684][ T8065] should_fail_alloc_page+0x58/0x70 [ 2691.287718][ T8065] __alloc_pages+0x1de/0x7c0 [ 2691.292142][ T8065] ? stack_trace_save+0x12d/0x1f0 [ 2691.297003][ T8065] ? stack_trace_snprint+0x100/0x100 [ 2691.302123][ T8065] ? __count_vm_events+0x30/0x30 [ 2691.306900][ T8065] ? __kasan_slab_alloc+0xc4/0xe0 [ 2691.311759][ T8065] ? __kasan_slab_alloc+0xb2/0xe0 [ 2691.316620][ T8065] ? kmem_cache_alloc+0x189/0x2f0 [ 2691.321478][ T8065] ? anon_vma_fork+0x1b9/0x4f0 [ 2691.326079][ T8065] get_zeroed_page+0x19/0x40 [ 2691.330506][ T8065] __pud_alloc+0x8b/0x260 [ 2691.334670][ T8065] ? do_handle_mm_fault+0x2370/0x2370 [ 2691.339879][ T8065] copy_page_range+0xd9e/0x1090 [ 2691.344569][ T8065] ? pfn_valid+0x1e0/0x1e0 [ 2691.348818][ T8065] dup_mmap+0x99f/0xea0 [ 2691.352814][ T8065] ? __delayed_free_task+0x20/0x20 [ 2691.357757][ T8065] ? mm_init+0x807/0x960 [ 2691.361842][ T8065] dup_mm+0x91/0x330 [ 2691.365577][ T8065] copy_mm+0x108/0x1b0 [ 2691.369474][ T8065] copy_process+0x1295/0x3250 [ 2691.373990][ T8065] ? proc_fail_nth_write+0x213/0x290 [ 2691.379110][ T8065] ? proc_fail_nth_read+0x220/0x220 [ 2691.384143][ T8065] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2691.389091][ T8065] ? vfs_write+0x9af/0x1050 [ 2691.393431][ T8065] ? vmacache_update+0xb7/0x120 [ 2691.398117][ T8065] kernel_clone+0x22d/0x990 [ 2691.402455][ T8065] ? file_end_write+0x1b0/0x1b0 [ 2691.407141][ T8065] ? __kasan_check_write+0x14/0x20 [ 2691.412088][ T8065] ? create_io_thread+0x1e0/0x1e0 [ 2691.416950][ T8065] ? __mutex_lock_slowpath+0x10/0x10 [ 2691.422070][ T8065] __x64_sys_clone+0x289/0x310 [ 2691.426670][ T8065] ? __do_sys_vfork+0x130/0x130 [ 2691.431357][ T8065] ? debug_smp_processor_id+0x17/0x20 [ 2691.436564][ T8065] do_syscall_64+0x44/0xd0 [ 2691.440818][ T8065] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2691.446555][ T8065] RIP: 0033:0x7fc683db00c9 [ 2691.450800][ T8065] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2691.470335][ T8065] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2691.478573][ T8065] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2691.486381][ T8065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2691.494193][ T8065] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2691.502005][ T8065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:29 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) 00:44:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x4}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2a01}, 0x48) 00:44:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x36}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x5}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2a02}, 0x48) 00:44:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x43}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2691.509816][ T8065] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2691.517630][ T8065] [ 2691.540400][ T8083] FAULT_INJECTION: forcing a failure. [ 2691.540400][ T8083] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:44:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x6}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2691.557758][ T8083] CPU: 0 PID: 8083 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2691.567740][ T8083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2691.577635][ T8083] Call Trace: [ 2691.580758][ T8083] [ 2691.583536][ T8083] dump_stack_lvl+0x151/0x1b7 [ 2691.588052][ T8083] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2691.593350][ T8083] dump_stack+0x15/0x17 [ 2691.597345][ T8083] should_fail+0x3c0/0x510 [ 2691.601589][ T8083] should_fail_alloc_page+0x58/0x70 [ 2691.606622][ T8083] __alloc_pages+0x1de/0x7c0 [ 2691.611048][ T8083] ? __count_vm_events+0x30/0x30 [ 2691.615823][ T8083] ? dup_mm+0x91/0x330 [ 2691.619724][ T8083] ? copy_mm+0x108/0x1b0 [ 2691.623802][ T8083] ? copy_process+0x1295/0x3250 [ 2691.628489][ T8083] ? kernel_clone+0x22d/0x990 [ 2691.633000][ T8083] ? __x64_sys_clone+0x289/0x310 [ 2691.637777][ T8083] pte_alloc_one+0x73/0x1b0 [ 2691.642115][ T8083] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2691.647147][ T8083] ? __kasan_check_write+0x14/0x20 [ 2691.652093][ T8083] ? __set_page_owner+0x2ee/0x310 [ 2691.656954][ T8083] __pte_alloc+0x86/0x350 [ 2691.661120][ T8083] ? post_alloc_hook+0x1ab/0x1b0 [ 2691.665894][ T8083] ? free_pgtables+0x210/0x210 [ 2691.670502][ T8083] ? get_page_from_freelist+0x38b/0x400 [ 2691.675882][ T8083] copy_pte_range+0x1b1f/0x20b0 [ 2691.680566][ T8083] ? __kunmap_atomic+0x80/0x80 [ 2691.685161][ T8083] ? __pud_alloc+0x260/0x260 [ 2691.689588][ T8083] ? __pud_alloc+0x218/0x260 [ 2691.694017][ T8083] ? do_handle_mm_fault+0x2370/0x2370 [ 2691.699226][ T8083] copy_page_range+0xc1e/0x1090 [ 2691.703913][ T8083] ? pfn_valid+0x1e0/0x1e0 [ 2691.708162][ T8083] dup_mmap+0x99f/0xea0 [ 2691.712156][ T8083] ? __delayed_free_task+0x20/0x20 [ 2691.717102][ T8083] ? mm_init+0x807/0x960 [ 2691.721182][ T8083] dup_mm+0x91/0x330 [ 2691.724913][ T8083] copy_mm+0x108/0x1b0 [ 2691.728819][ T8083] copy_process+0x1295/0x3250 [ 2691.733331][ T8083] ? proc_fail_nth_write+0x213/0x290 [ 2691.738454][ T8083] ? proc_fail_nth_read+0x220/0x220 [ 2691.743489][ T8083] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2691.748434][ T8083] ? vfs_write+0x9af/0x1050 [ 2691.752774][ T8083] ? vmacache_update+0xb7/0x120 [ 2691.757459][ T8083] kernel_clone+0x22d/0x990 [ 2691.761799][ T8083] ? file_end_write+0x1b0/0x1b0 [ 2691.766493][ T8083] ? __kasan_check_write+0x14/0x20 [ 2691.771441][ T8083] ? create_io_thread+0x1e0/0x1e0 [ 2691.776294][ T8083] ? __mutex_lock_slowpath+0x10/0x10 [ 2691.781416][ T8083] __x64_sys_clone+0x289/0x310 [ 2691.786015][ T8083] ? __do_sys_vfork+0x130/0x130 [ 2691.790703][ T8083] ? debug_smp_processor_id+0x17/0x20 [ 2691.795910][ T8083] do_syscall_64+0x44/0xd0 [ 2691.800161][ T8083] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2691.805889][ T8083] RIP: 0033:0x7fc683db00c9 [ 2691.810145][ T8083] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2691.829586][ T8083] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2691.837828][ T8083] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2691.845638][ T8083] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2691.853450][ T8083] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:29 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) 00:44:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2c01}, 0x48) 00:44:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x48}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x7}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2c02}, 0x48) 00:44:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4c}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x8}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e00}, 0x48) 00:44:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2691.861263][ T8083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2691.869076][ T8083] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2691.876890][ T8083] [ 2691.900889][ T8113] FAULT_INJECTION: forcing a failure. [ 2691.900889][ T8113] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2691.931767][ T8113] CPU: 0 PID: 8113 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2691.941757][ T8113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2691.951645][ T8113] Call Trace: [ 2691.954785][ T8113] [ 2691.957546][ T8113] dump_stack_lvl+0x151/0x1b7 [ 2691.962059][ T8113] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2691.967371][ T8113] dump_stack+0x15/0x17 [ 2691.971344][ T8113] should_fail+0x3c0/0x510 [ 2691.975599][ T8113] should_fail_alloc_page+0x58/0x70 [ 2691.980633][ T8113] __alloc_pages+0x1de/0x7c0 [ 2691.985059][ T8113] ? __count_vm_events+0x30/0x30 [ 2691.989831][ T8113] ? dup_mm+0x91/0x330 [ 2691.993736][ T8113] ? copy_mm+0x108/0x1b0 [ 2691.997816][ T8113] ? copy_process+0x1295/0x3250 [ 2692.002504][ T8113] ? kernel_clone+0x22d/0x990 [ 2692.007015][ T8113] ? __x64_sys_clone+0x289/0x310 [ 2692.011791][ T8113] pte_alloc_one+0x73/0x1b0 [ 2692.016134][ T8113] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2692.021167][ T8113] ? __kasan_check_write+0x14/0x20 [ 2692.026110][ T8113] ? __set_page_owner+0x2ee/0x310 [ 2692.030970][ T8113] __pte_alloc+0x86/0x350 [ 2692.035138][ T8113] ? post_alloc_hook+0x1ab/0x1b0 [ 2692.039912][ T8113] ? free_pgtables+0x210/0x210 [ 2692.044514][ T8113] ? get_page_from_freelist+0x38b/0x400 [ 2692.049895][ T8113] copy_pte_range+0x1b1f/0x20b0 [ 2692.054582][ T8113] ? __kunmap_atomic+0x80/0x80 [ 2692.059181][ T8113] ? __pud_alloc+0x260/0x260 [ 2692.063607][ T8113] ? __pud_alloc+0x218/0x260 [ 2692.068037][ T8113] ? do_handle_mm_fault+0x2370/0x2370 [ 2692.073238][ T8113] copy_page_range+0xc1e/0x1090 [ 2692.077930][ T8113] ? pfn_valid+0x1e0/0x1e0 [ 2692.082181][ T8113] dup_mmap+0x99f/0xea0 [ 2692.086275][ T8113] ? __delayed_free_task+0x20/0x20 [ 2692.091220][ T8113] ? mm_init+0x807/0x960 [ 2692.095299][ T8113] dup_mm+0x91/0x330 [ 2692.099031][ T8113] copy_mm+0x108/0x1b0 [ 2692.102935][ T8113] copy_process+0x1295/0x3250 [ 2692.107446][ T8113] ? proc_fail_nth_write+0x213/0x290 [ 2692.112565][ T8113] ? proc_fail_nth_read+0x220/0x220 [ 2692.117601][ T8113] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2692.122554][ T8113] ? vfs_write+0x9af/0x1050 [ 2692.126886][ T8113] ? vmacache_update+0xb7/0x120 [ 2692.131575][ T8113] kernel_clone+0x22d/0x990 [ 2692.135915][ T8113] ? file_end_write+0x1b0/0x1b0 [ 2692.140601][ T8113] ? __kasan_check_write+0x14/0x20 [ 2692.145551][ T8113] ? create_io_thread+0x1e0/0x1e0 [ 2692.150411][ T8113] ? __mutex_lock_slowpath+0x10/0x10 [ 2692.155529][ T8113] __x64_sys_clone+0x289/0x310 [ 2692.160133][ T8113] ? __do_sys_vfork+0x130/0x130 [ 2692.164819][ T8113] ? debug_smp_processor_id+0x17/0x20 [ 2692.170025][ T8113] do_syscall_64+0x44/0xd0 [ 2692.174275][ T8113] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2692.180003][ T8113] RIP: 0033:0x7fc683db00c9 [ 2692.184256][ T8113] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2692.203700][ T8113] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2692.211942][ T8113] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2692.219753][ T8113] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:29 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 00:44:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x9}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e01}, 0x48) 00:44:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x4d03, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x68}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xa}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e02}, 0x48) 00:44:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6c}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2692.227570][ T8113] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2692.235377][ T8113] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2692.243203][ T8113] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2692.251003][ T8113] 00:44:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xb}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:29 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x10fff, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2692.295704][ T8146] FAULT_INJECTION: forcing a failure. [ 2692.295704][ T8146] name failslab, interval 1, probability 0, space 0, times 0 [ 2692.310550][ T8146] CPU: 1 PID: 8146 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2692.320523][ T8146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2692.330416][ T8146] Call Trace: [ 2692.333540][ T8146] [ 2692.336318][ T8146] dump_stack_lvl+0x151/0x1b7 [ 2692.340830][ T8146] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2692.346128][ T8146] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2692.352375][ T8146] dump_stack+0x15/0x17 [ 2692.356364][ T8146] should_fail+0x3c0/0x510 [ 2692.360619][ T8146] __should_failslab+0x9f/0xe0 [ 2692.365218][ T8146] should_failslab+0x9/0x20 [ 2692.369558][ T8146] kmem_cache_alloc+0x4f/0x2f0 [ 2692.374159][ T8146] ? anon_vma_fork+0xf7/0x4f0 [ 2692.378671][ T8146] anon_vma_fork+0xf7/0x4f0 [ 2692.383011][ T8146] ? anon_vma_name+0x4c/0x70 [ 2692.387438][ T8146] dup_mmap+0x750/0xea0 [ 2692.391431][ T8146] ? __delayed_free_task+0x20/0x20 [ 2692.396380][ T8146] ? mm_init+0x807/0x960 [ 2692.400458][ T8146] dup_mm+0x91/0x330 [ 2692.404191][ T8146] copy_mm+0x108/0x1b0 [ 2692.408095][ T8146] copy_process+0x1295/0x3250 [ 2692.412611][ T8146] ? proc_fail_nth_write+0x213/0x290 [ 2692.417727][ T8146] ? proc_fail_nth_read+0x220/0x220 [ 2692.422762][ T8146] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2692.427709][ T8146] ? vfs_write+0x9af/0x1050 [ 2692.432049][ T8146] ? vmacache_update+0xb7/0x120 [ 2692.436738][ T8146] kernel_clone+0x22d/0x990 [ 2692.441074][ T8146] ? file_end_write+0x1b0/0x1b0 [ 2692.445764][ T8146] ? __kasan_check_write+0x14/0x20 [ 2692.450710][ T8146] ? create_io_thread+0x1e0/0x1e0 [ 2692.455572][ T8146] ? __mutex_lock_slowpath+0x10/0x10 [ 2692.460693][ T8146] __x64_sys_clone+0x289/0x310 [ 2692.465294][ T8146] ? __do_sys_vfork+0x130/0x130 [ 2692.469982][ T8146] ? debug_smp_processor_id+0x17/0x20 [ 2692.475188][ T8146] do_syscall_64+0x44/0xd0 [ 2692.479441][ T8146] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2692.485167][ T8146] RIP: 0033:0x7fc683db00c9 [ 2692.489420][ T8146] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2692.508859][ T8146] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2692.517103][ T8146] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2692.524914][ T8146] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2692.532727][ T8146] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:30 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20010, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2e03}, 0x48) 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xc}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x74}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xd}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2692.540537][ T8146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2692.548349][ T8146] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2692.556163][ T8146] 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7a}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3000}, 0x48) 00:44:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20200, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2692.588949][ T8165] FAULT_INJECTION: forcing a failure. [ 2692.588949][ T8165] name failslab, interval 1, probability 0, space 0, times 0 [ 2692.611153][ T8165] CPU: 0 PID: 8165 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2692.621163][ T8165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2692.631126][ T8165] Call Trace: [ 2692.634250][ T8165] [ 2692.637021][ T8165] dump_stack_lvl+0x151/0x1b7 [ 2692.641535][ T8165] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2692.646829][ T8165] dump_stack+0x15/0x17 [ 2692.650819][ T8165] should_fail+0x3c0/0x510 [ 2692.655074][ T8165] __should_failslab+0x9f/0xe0 [ 2692.659672][ T8165] should_failslab+0x9/0x20 [ 2692.664011][ T8165] kmem_cache_alloc+0x4f/0x2f0 [ 2692.668614][ T8165] ? vm_area_dup+0x26/0x1d0 [ 2692.672950][ T8165] vm_area_dup+0x26/0x1d0 [ 2692.677121][ T8165] dup_mmap+0x6b8/0xea0 [ 2692.681110][ T8165] ? __delayed_free_task+0x20/0x20 [ 2692.686059][ T8165] ? mm_init+0x807/0x960 [ 2692.690140][ T8165] dup_mm+0x91/0x330 [ 2692.693870][ T8165] copy_mm+0x108/0x1b0 [ 2692.697783][ T8165] copy_process+0x1295/0x3250 [ 2692.702287][ T8165] ? proc_fail_nth_write+0x213/0x290 [ 2692.707407][ T8165] ? proc_fail_nth_read+0x220/0x220 [ 2692.712440][ T8165] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2692.717389][ T8165] ? vfs_write+0x9af/0x1050 [ 2692.721729][ T8165] ? vmacache_update+0xb7/0x120 [ 2692.726414][ T8165] kernel_clone+0x22d/0x990 [ 2692.730758][ T8165] ? file_end_write+0x1b0/0x1b0 [ 2692.735440][ T8165] ? __kasan_check_write+0x14/0x20 [ 2692.740387][ T8165] ? create_io_thread+0x1e0/0x1e0 [ 2692.745254][ T8165] ? __mutex_lock_slowpath+0x10/0x10 [ 2692.750373][ T8165] __x64_sys_clone+0x289/0x310 [ 2692.754971][ T8165] ? __do_sys_vfork+0x130/0x130 [ 2692.759657][ T8165] ? debug_smp_processor_id+0x17/0x20 [ 2692.764864][ T8165] do_syscall_64+0x44/0xd0 [ 2692.769120][ T8165] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2692.774843][ T8165] RIP: 0033:0x7fc683db00c9 [ 2692.779099][ T8165] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2692.798541][ T8165] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2692.806783][ T8165] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2692.814594][ T8165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2692.822408][ T8165] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2692.830214][ T8165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xe}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc4}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3001}, 0x48) 00:44:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x57000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:30 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3002}, 0x48) 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x300}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x10}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2692.838028][ T8165] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2692.845844][ T8165] 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x500}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2692.881973][ T8191] FAULT_INJECTION: forcing a failure. [ 2692.881973][ T8191] name failslab, interval 1, probability 0, space 0, times 0 [ 2692.898357][ T8191] CPU: 0 PID: 8191 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2692.908339][ T8191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2692.918234][ T8191] Call Trace: [ 2692.921360][ T8191] [ 2692.924147][ T8191] dump_stack_lvl+0x151/0x1b7 [ 2692.928650][ T8191] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2692.933946][ T8191] dump_stack+0x15/0x17 [ 2692.937934][ T8191] should_fail+0x3c0/0x510 [ 2692.942189][ T8191] __should_failslab+0x9f/0xe0 [ 2692.946789][ T8191] should_failslab+0x9/0x20 [ 2692.951127][ T8191] kmem_cache_alloc+0x4f/0x2f0 [ 2692.955727][ T8191] ? vm_area_dup+0x26/0x1d0 [ 2692.960065][ T8191] ? __kasan_check_read+0x11/0x20 [ 2692.964930][ T8191] vm_area_dup+0x26/0x1d0 [ 2692.969096][ T8191] dup_mmap+0x6b8/0xea0 [ 2692.973087][ T8191] ? __delayed_free_task+0x20/0x20 [ 2692.978033][ T8191] ? mm_init+0x807/0x960 [ 2692.982116][ T8191] dup_mm+0x91/0x330 [ 2692.985845][ T8191] copy_mm+0x108/0x1b0 [ 2692.989751][ T8191] copy_process+0x1295/0x3250 [ 2692.994264][ T8191] ? proc_fail_nth_write+0x213/0x290 [ 2692.999383][ T8191] ? proc_fail_nth_read+0x220/0x220 [ 2693.004417][ T8191] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2693.009365][ T8191] ? vfs_write+0x9af/0x1050 [ 2693.013702][ T8191] ? vmacache_update+0xb7/0x120 [ 2693.018396][ T8191] kernel_clone+0x22d/0x990 [ 2693.022728][ T8191] ? file_end_write+0x1b0/0x1b0 [ 2693.027419][ T8191] ? __kasan_check_write+0x14/0x20 [ 2693.032363][ T8191] ? create_io_thread+0x1e0/0x1e0 [ 2693.037227][ T8191] ? __mutex_lock_slowpath+0x10/0x10 [ 2693.042347][ T8191] __x64_sys_clone+0x289/0x310 [ 2693.046947][ T8191] ? __do_sys_vfork+0x130/0x130 [ 2693.051639][ T8191] ? debug_smp_processor_id+0x17/0x20 [ 2693.056840][ T8191] do_syscall_64+0x44/0xd0 [ 2693.061093][ T8191] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2693.066821][ T8191] RIP: 0033:0x7fc683db00c9 [ 2693.071079][ T8191] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2693.090517][ T8191] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2693.098761][ T8191] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2693.106574][ T8191] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2693.114382][ T8191] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2693.122196][ T8191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:30 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3003}, 0x48) 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x11}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x600}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3200}, 0x48) 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x12}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2693.130005][ T8191] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2693.137818][ T8191] 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x700}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x18}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x101000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2693.178634][ T8211] FAULT_INJECTION: forcing a failure. [ 2693.178634][ T8211] name failslab, interval 1, probability 0, space 0, times 0 [ 2693.211775][ T8211] CPU: 0 PID: 8211 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2693.221753][ T8211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2693.231656][ T8211] Call Trace: [ 2693.234773][ T8211] [ 2693.237548][ T8211] dump_stack_lvl+0x151/0x1b7 [ 2693.242065][ T8211] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2693.247358][ T8211] ? do_syscall_64+0x44/0xd0 [ 2693.251787][ T8211] dump_stack+0x15/0x17 [ 2693.255777][ T8211] should_fail+0x3c0/0x510 [ 2693.260028][ T8211] __should_failslab+0x9f/0xe0 [ 2693.264632][ T8211] should_failslab+0x9/0x20 [ 2693.268974][ T8211] kmem_cache_alloc+0x4f/0x2f0 [ 2693.273567][ T8211] ? anon_vma_clone+0xa1/0x4f0 [ 2693.278169][ T8211] anon_vma_clone+0xa1/0x4f0 [ 2693.282596][ T8211] anon_vma_fork+0x91/0x4f0 [ 2693.286932][ T8211] ? anon_vma_name+0x4c/0x70 [ 2693.291362][ T8211] dup_mmap+0x750/0xea0 [ 2693.295355][ T8211] ? __delayed_free_task+0x20/0x20 [ 2693.300299][ T8211] ? mm_init+0x807/0x960 [ 2693.304380][ T8211] dup_mm+0x91/0x330 [ 2693.308114][ T8211] copy_mm+0x108/0x1b0 [ 2693.312015][ T8211] copy_process+0x1295/0x3250 [ 2693.316528][ T8211] ? proc_fail_nth_write+0x213/0x290 [ 2693.321649][ T8211] ? proc_fail_nth_read+0x220/0x220 [ 2693.326685][ T8211] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2693.331630][ T8211] ? vfs_write+0x9af/0x1050 [ 2693.335969][ T8211] ? vmacache_update+0xb7/0x120 [ 2693.340654][ T8211] kernel_clone+0x22d/0x990 [ 2693.344993][ T8211] ? file_end_write+0x1b0/0x1b0 [ 2693.349678][ T8211] ? __kasan_check_write+0x14/0x20 [ 2693.354629][ T8211] ? create_io_thread+0x1e0/0x1e0 [ 2693.359486][ T8211] ? __mutex_lock_slowpath+0x10/0x10 [ 2693.364607][ T8211] __x64_sys_clone+0x289/0x310 [ 2693.369207][ T8211] ? __do_sys_vfork+0x130/0x130 [ 2693.373895][ T8211] ? debug_smp_processor_id+0x17/0x20 [ 2693.379101][ T8211] do_syscall_64+0x44/0xd0 [ 2693.383356][ T8211] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2693.389081][ T8211] RIP: 0033:0x7fc683db00c9 [ 2693.393336][ T8211] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2693.412778][ T8211] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2693.421024][ T8211] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:30 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x900}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3201}, 0x48) 00:44:30 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x700500, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x25}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2693.428847][ T8211] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2693.436645][ T8211] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2693.444455][ T8211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2693.452268][ T8211] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2693.460081][ T8211] 00:44:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x36}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3202}, 0x48) 00:44:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xa00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xb00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2693.479082][ T8234] FAULT_INJECTION: forcing a failure. [ 2693.479082][ T8234] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2693.495268][ T8234] CPU: 1 PID: 8234 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2693.505246][ T8234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2693.515155][ T8234] Call Trace: [ 2693.518266][ T8234] [ 2693.521042][ T8234] dump_stack_lvl+0x151/0x1b7 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xd00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2693.525557][ T8234] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2693.530847][ T8234] dump_stack+0x15/0x17 [ 2693.534844][ T8234] should_fail+0x3c0/0x510 [ 2693.539100][ T8234] should_fail_alloc_page+0x58/0x70 [ 2693.544130][ T8234] __alloc_pages+0x1de/0x7c0 [ 2693.548558][ T8234] ? __count_vm_events+0x30/0x30 [ 2693.553332][ T8234] ? dup_mm+0x91/0x330 [ 2693.557230][ T8234] ? copy_mm+0x108/0x1b0 [ 2693.561308][ T8234] ? copy_process+0x1295/0x3250 [ 2693.565994][ T8234] ? kernel_clone+0x22d/0x990 [ 2693.570507][ T8234] ? __x64_sys_clone+0x289/0x310 [ 2693.575284][ T8234] pte_alloc_one+0x73/0x1b0 [ 2693.579621][ T8234] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2693.584655][ T8234] ? __kasan_check_write+0x14/0x20 [ 2693.589603][ T8234] ? __set_page_owner+0x2ee/0x310 [ 2693.594462][ T8234] __pte_alloc+0x86/0x350 [ 2693.598636][ T8234] ? post_alloc_hook+0x1ab/0x1b0 [ 2693.603413][ T8234] ? free_pgtables+0x210/0x210 [ 2693.608010][ T8234] ? get_page_from_freelist+0x38b/0x400 [ 2693.613387][ T8234] copy_pte_range+0x1b1f/0x20b0 [ 2693.618083][ T8234] ? __kunmap_atomic+0x80/0x80 [ 2693.622672][ T8234] ? __pud_alloc+0x260/0x260 [ 2693.627098][ T8234] ? __pud_alloc+0x218/0x260 [ 2693.631523][ T8234] ? do_handle_mm_fault+0x2370/0x2370 [ 2693.636731][ T8234] copy_page_range+0xc1e/0x1090 [ 2693.641421][ T8234] ? pfn_valid+0x1e0/0x1e0 [ 2693.645672][ T8234] dup_mmap+0x99f/0xea0 [ 2693.649750][ T8234] ? __delayed_free_task+0x20/0x20 [ 2693.654698][ T8234] ? mm_init+0x807/0x960 [ 2693.658775][ T8234] dup_mm+0x91/0x330 [ 2693.662511][ T8234] copy_mm+0x108/0x1b0 [ 2693.666413][ T8234] copy_process+0x1295/0x3250 [ 2693.670928][ T8234] ? proc_fail_nth_write+0x213/0x290 [ 2693.676047][ T8234] ? proc_fail_nth_read+0x220/0x220 [ 2693.681088][ T8234] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2693.686030][ T8234] ? vfs_write+0x9af/0x1050 [ 2693.690367][ T8234] ? vmacache_update+0xb7/0x120 [ 2693.695060][ T8234] kernel_clone+0x22d/0x990 [ 2693.699399][ T8234] ? file_end_write+0x1b0/0x1b0 [ 2693.704080][ T8234] ? __kasan_check_write+0x14/0x20 [ 2693.709028][ T8234] ? create_io_thread+0x1e0/0x1e0 [ 2693.713897][ T8234] ? __mutex_lock_slowpath+0x10/0x10 [ 2693.719010][ T8234] __x64_sys_clone+0x289/0x310 [ 2693.723610][ T8234] ? __do_sys_vfork+0x130/0x130 [ 2693.728296][ T8234] ? debug_smp_processor_id+0x17/0x20 [ 2693.733503][ T8234] do_syscall_64+0x44/0xd0 [ 2693.737757][ T8234] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2693.743488][ T8234] RIP: 0033:0x7fc683db00c9 [ 2693.747738][ T8234] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2693.767180][ T8234] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:44:31 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xe00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xf0ff1f, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3401}, 0x48) 00:44:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x43}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x1100}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3402}, 0x48) 00:44:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x48}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc400, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2693.775424][ T8234] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2693.783235][ T8234] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2693.791046][ T8234] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2693.798859][ T8234] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2693.806669][ T8234] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2693.814483][ T8234] 00:44:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x4c}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2693.861992][ T8266] FAULT_INJECTION: forcing a failure. [ 2693.861992][ T8266] name failslab, interval 1, probability 0, space 0, times 0 [ 2693.881908][ T8266] CPU: 0 PID: 8266 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2693.891888][ T8266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2693.901782][ T8266] Call Trace: [ 2693.904905][ T8266] [ 2693.907682][ T8266] dump_stack_lvl+0x151/0x1b7 [ 2693.912195][ T8266] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2693.917491][ T8266] dump_stack+0x15/0x17 [ 2693.921483][ T8266] should_fail+0x3c0/0x510 [ 2693.925736][ T8266] __should_failslab+0x9f/0xe0 [ 2693.930334][ T8266] should_failslab+0x9/0x20 [ 2693.934675][ T8266] kmem_cache_alloc+0x4f/0x2f0 [ 2693.939273][ T8266] ? vm_area_dup+0x26/0x1d0 [ 2693.943613][ T8266] vm_area_dup+0x26/0x1d0 [ 2693.947779][ T8266] dup_mmap+0x6b8/0xea0 [ 2693.951772][ T8266] ? __delayed_free_task+0x20/0x20 [ 2693.956718][ T8266] ? mm_init+0x807/0x960 [ 2693.960800][ T8266] dup_mm+0x91/0x330 [ 2693.964530][ T8266] copy_mm+0x108/0x1b0 [ 2693.968437][ T8266] copy_process+0x1295/0x3250 [ 2693.972949][ T8266] ? proc_fail_nth_write+0x213/0x290 [ 2693.978071][ T8266] ? proc_fail_nth_read+0x220/0x220 [ 2693.983105][ T8266] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2693.988053][ T8266] ? vfs_write+0x9af/0x1050 [ 2693.992391][ T8266] ? vmacache_update+0xb7/0x120 [ 2693.997077][ T8266] kernel_clone+0x22d/0x990 [ 2694.001416][ T8266] ? file_end_write+0x1b0/0x1b0 [ 2694.006103][ T8266] ? __kasan_check_write+0x14/0x20 [ 2694.011050][ T8266] ? create_io_thread+0x1e0/0x1e0 [ 2694.015910][ T8266] ? __mutex_lock_slowpath+0x10/0x10 [ 2694.021032][ T8266] __x64_sys_clone+0x289/0x310 [ 2694.025634][ T8266] ? __do_sys_vfork+0x130/0x130 [ 2694.030319][ T8266] ? debug_smp_processor_id+0x17/0x20 [ 2694.035528][ T8266] do_syscall_64+0x44/0xd0 [ 2694.039779][ T8266] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2694.045507][ T8266] RIP: 0033:0x7fc683db00c9 [ 2694.049761][ T8266] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2694.069205][ T8266] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2694.077445][ T8266] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2694.085259][ T8266] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2694.093068][ T8266] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2694.100880][ T8266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:31 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x1200}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3600}, 0x48) 00:44:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:31 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x68}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x1800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:31 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3601}, 0x48) [ 2694.108691][ T8266] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2694.116504][ T8266] [ 2694.152956][ T8295] FAULT_INJECTION: forcing a failure. 00:44:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x6c}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x2500}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2694.152956][ T8295] name failslab, interval 1, probability 0, space 0, times 0 [ 2694.170552][ T8295] CPU: 0 PID: 8295 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2694.180533][ T8295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2694.190425][ T8295] Call Trace: [ 2694.193545][ T8295] [ 2694.196324][ T8295] dump_stack_lvl+0x151/0x1b7 [ 2694.200836][ T8295] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2694.206132][ T8295] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2694.212380][ T8295] dump_stack+0x15/0x17 [ 2694.216372][ T8295] should_fail+0x3c0/0x510 [ 2694.220652][ T8295] __should_failslab+0x9f/0xe0 [ 2694.225225][ T8295] should_failslab+0x9/0x20 [ 2694.229563][ T8295] kmem_cache_alloc+0x4f/0x2f0 [ 2694.234164][ T8295] ? anon_vma_fork+0xf7/0x4f0 [ 2694.238677][ T8295] anon_vma_fork+0xf7/0x4f0 [ 2694.243018][ T8295] ? anon_vma_name+0x4c/0x70 [ 2694.247444][ T8295] dup_mmap+0x750/0xea0 [ 2694.251438][ T8295] ? __delayed_free_task+0x20/0x20 [ 2694.256384][ T8295] ? mm_init+0x807/0x960 [ 2694.260463][ T8295] dup_mm+0x91/0x330 [ 2694.264196][ T8295] copy_mm+0x108/0x1b0 [ 2694.268102][ T8295] copy_process+0x1295/0x3250 [ 2694.272614][ T8295] ? proc_fail_nth_write+0x213/0x290 [ 2694.277734][ T8295] ? proc_fail_nth_read+0x220/0x220 [ 2694.282768][ T8295] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2694.287715][ T8295] ? vfs_write+0x9af/0x1050 [ 2694.292066][ T8295] ? vmacache_update+0xb7/0x120 [ 2694.296752][ T8295] kernel_clone+0x22d/0x990 [ 2694.301081][ T8295] ? file_end_write+0x1b0/0x1b0 [ 2694.305768][ T8295] ? __kasan_check_write+0x14/0x20 [ 2694.310714][ T8295] ? create_io_thread+0x1e0/0x1e0 [ 2694.315575][ T8295] ? __mutex_lock_slowpath+0x10/0x10 [ 2694.320697][ T8295] __x64_sys_clone+0x289/0x310 [ 2694.325297][ T8295] ? __do_sys_vfork+0x130/0x130 [ 2694.329986][ T8295] ? debug_smp_processor_id+0x17/0x20 [ 2694.335194][ T8295] do_syscall_64+0x44/0xd0 [ 2694.339442][ T8295] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2694.345170][ T8295] RIP: 0033:0x7fc683db00c9 [ 2694.349424][ T8295] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2694.368865][ T8295] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2694.377111][ T8295] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2694.384921][ T8295] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2694.392732][ T8295] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2694.400543][ T8295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:31 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) 00:44:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x74}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x3600}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3602}, 0x48) 00:44:31 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3603}, 0x48) 00:44:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x7a}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4300}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xc4}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2694.408356][ T8295] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2694.416169][ T8295] 00:44:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2694.461388][ T8318] FAULT_INJECTION: forcing a failure. [ 2694.461388][ T8318] name failslab, interval 1, probability 0, space 0, times 0 [ 2694.474943][ T8318] CPU: 0 PID: 8318 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2694.484921][ T8318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2694.494815][ T8318] Call Trace: [ 2694.497939][ T8318] [ 2694.500714][ T8318] dump_stack_lvl+0x151/0x1b7 [ 2694.505228][ T8318] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2694.510524][ T8318] dump_stack+0x15/0x17 [ 2694.514517][ T8318] should_fail+0x3c0/0x510 [ 2694.518769][ T8318] __should_failslab+0x9f/0xe0 [ 2694.523366][ T8318] should_failslab+0x9/0x20 [ 2694.527705][ T8318] kmem_cache_alloc+0x4f/0x2f0 [ 2694.532306][ T8318] ? vm_area_dup+0x26/0x1d0 [ 2694.536647][ T8318] vm_area_dup+0x26/0x1d0 [ 2694.540815][ T8318] dup_mmap+0x6b8/0xea0 [ 2694.544805][ T8318] ? __delayed_free_task+0x20/0x20 [ 2694.549753][ T8318] ? mm_init+0x807/0x960 [ 2694.553833][ T8318] dup_mm+0x91/0x330 [ 2694.557564][ T8318] copy_mm+0x108/0x1b0 [ 2694.561479][ T8318] copy_process+0x1295/0x3250 [ 2694.565993][ T8318] ? proc_fail_nth_write+0x213/0x290 [ 2694.571102][ T8318] ? proc_fail_nth_read+0x220/0x220 [ 2694.576138][ T8318] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2694.581084][ T8318] ? vfs_write+0x9af/0x1050 [ 2694.585426][ T8318] ? vmacache_update+0xb7/0x120 [ 2694.590114][ T8318] kernel_clone+0x22d/0x990 [ 2694.594452][ T8318] ? file_end_write+0x1b0/0x1b0 [ 2694.599136][ T8318] ? __kasan_check_write+0x14/0x20 [ 2694.604087][ T8318] ? create_io_thread+0x1e0/0x1e0 [ 2694.608946][ T8318] ? __mutex_lock_slowpath+0x10/0x10 [ 2694.614066][ T8318] __x64_sys_clone+0x289/0x310 [ 2694.618664][ T8318] ? __do_sys_vfork+0x130/0x130 [ 2694.623354][ T8318] ? debug_smp_processor_id+0x17/0x20 [ 2694.628558][ T8318] do_syscall_64+0x44/0xd0 [ 2694.632809][ T8318] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2694.638540][ T8318] RIP: 0033:0x7fc683db00c9 [ 2694.642793][ T8318] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:32 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) 00:44:32 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x9000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3800}, 0x48) 00:44:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2694.662234][ T8318] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2694.670478][ T8318] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2694.678290][ T8318] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2694.686111][ T8318] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2694.693911][ T8318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2694.701722][ T8318] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2694.709538][ T8318] 00:44:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x2}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3801}, 0x48) 00:44:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4c00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:32 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6800}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:32 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2694.773100][ T8346] FAULT_INJECTION: forcing a failure. [ 2694.773100][ T8346] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2694.794351][ T8346] CPU: 1 PID: 8346 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2694.804338][ T8346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2694.814228][ T8346] Call Trace: [ 2694.817353][ T8346] [ 2694.820128][ T8346] dump_stack_lvl+0x151/0x1b7 [ 2694.824642][ T8346] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2694.829938][ T8346] dump_stack+0x15/0x17 [ 2694.833930][ T8346] should_fail+0x3c0/0x510 [ 2694.838181][ T8346] should_fail_alloc_page+0x58/0x70 [ 2694.843216][ T8346] __alloc_pages+0x1de/0x7c0 [ 2694.847641][ T8346] ? __count_vm_events+0x30/0x30 [ 2694.852415][ T8346] ? __this_cpu_preempt_check+0x13/0x20 [ 2694.857796][ T8346] ? __mod_node_page_state+0xac/0xf0 [ 2694.862917][ T8346] pte_alloc_one+0x73/0x1b0 [ 2694.867256][ T8346] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2694.872293][ T8346] __pte_alloc+0x86/0x350 [ 2694.876457][ T8346] ? free_pgtables+0x210/0x210 [ 2694.881057][ T8346] ? _raw_spin_lock+0xa3/0x1b0 [ 2694.885659][ T8346] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2694.890864][ T8346] ? __kernel_text_address+0x9a/0x110 [ 2694.896073][ T8346] copy_pte_range+0x1b1f/0x20b0 [ 2694.900762][ T8346] ? __kunmap_atomic+0x80/0x80 [ 2694.905357][ T8346] ? __kasan_slab_alloc+0xc4/0xe0 [ 2694.910218][ T8346] ? __kasan_slab_alloc+0xb2/0xe0 [ 2694.915077][ T8346] ? kmem_cache_alloc+0x189/0x2f0 [ 2694.919942][ T8346] ? vm_area_dup+0x26/0x1d0 [ 2694.924281][ T8346] ? dup_mmap+0x6b8/0xea0 [ 2694.928446][ T8346] ? dup_mm+0x91/0x330 [ 2694.932351][ T8346] ? copy_mm+0x108/0x1b0 [ 2694.936430][ T8346] ? copy_process+0x1295/0x3250 [ 2694.941116][ T8346] ? kernel_clone+0x22d/0x990 [ 2694.945632][ T8346] ? __x64_sys_clone+0x289/0x310 [ 2694.950402][ T8346] ? do_syscall_64+0x44/0xd0 [ 2694.954827][ T8346] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2694.960742][ T8346] copy_page_range+0xc1e/0x1090 [ 2694.965421][ T8346] ? pfn_valid+0x1e0/0x1e0 [ 2694.969772][ T8346] dup_mmap+0x99f/0xea0 [ 2694.973753][ T8346] ? __delayed_free_task+0x20/0x20 [ 2694.978698][ T8346] ? mm_init+0x807/0x960 [ 2694.982777][ T8346] dup_mm+0x91/0x330 [ 2694.986508][ T8346] copy_mm+0x108/0x1b0 [ 2694.990415][ T8346] copy_process+0x1295/0x3250 [ 2694.994927][ T8346] ? proc_fail_nth_write+0x213/0x290 [ 2695.000049][ T8346] ? proc_fail_nth_read+0x220/0x220 [ 2695.005083][ T8346] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2695.010028][ T8346] ? vfs_write+0x9af/0x1050 [ 2695.014369][ T8346] ? vmacache_update+0xb7/0x120 [ 2695.019056][ T8346] kernel_clone+0x22d/0x990 [ 2695.023394][ T8346] ? file_end_write+0x1b0/0x1b0 [ 2695.028090][ T8346] ? __kasan_check_write+0x14/0x20 [ 2695.033029][ T8346] ? create_io_thread+0x1e0/0x1e0 [ 2695.037891][ T8346] ? __mutex_lock_slowpath+0x10/0x10 [ 2695.043012][ T8346] __x64_sys_clone+0x289/0x310 [ 2695.047609][ T8346] ? __do_sys_vfork+0x130/0x130 [ 2695.052299][ T8346] ? debug_smp_processor_id+0x17/0x20 [ 2695.057504][ T8346] do_syscall_64+0x44/0xd0 [ 2695.061758][ T8346] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2695.067484][ T8346] RIP: 0033:0x7fc683db00c9 [ 2695.071739][ T8346] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2695.091179][ T8346] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2695.099434][ T8346] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2695.107237][ T8346] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2695.115046][ T8346] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:32 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) 00:44:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x3}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:32 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1f000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6c00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3802}, 0x48) 00:44:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7400}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x4}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2695.122858][ T8346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2695.130668][ T8346] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2695.138485][ T8346] 00:44:32 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3803}, 0x48) 00:44:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7a00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x5}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2695.170636][ T8365] FAULT_INJECTION: forcing a failure. [ 2695.170636][ T8365] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2695.196132][ T8365] CPU: 1 PID: 8365 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2695.206113][ T8365] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2695.216007][ T8365] Call Trace: [ 2695.219127][ T8365] [ 2695.221913][ T8365] dump_stack_lvl+0x151/0x1b7 [ 2695.226416][ T8365] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2695.231713][ T8365] dump_stack+0x15/0x17 [ 2695.235704][ T8365] should_fail+0x3c0/0x510 [ 2695.239955][ T8365] should_fail_alloc_page+0x58/0x70 [ 2695.244992][ T8365] __alloc_pages+0x1de/0x7c0 [ 2695.249419][ T8365] ? __count_vm_events+0x30/0x30 [ 2695.254190][ T8365] ? dup_mm+0x91/0x330 [ 2695.258095][ T8365] ? copy_mm+0x108/0x1b0 [ 2695.262173][ T8365] ? copy_process+0x1295/0x3250 [ 2695.266863][ T8365] ? kernel_clone+0x22d/0x990 [ 2695.271376][ T8365] ? __x64_sys_clone+0x289/0x310 [ 2695.276153][ T8365] pte_alloc_one+0x73/0x1b0 [ 2695.280487][ T8365] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2695.285522][ T8365] ? __kasan_check_write+0x14/0x20 [ 2695.290474][ T8365] ? __set_page_owner+0x2ee/0x310 [ 2695.295331][ T8365] __pte_alloc+0x86/0x350 [ 2695.299494][ T8365] ? post_alloc_hook+0x1ab/0x1b0 [ 2695.304269][ T8365] ? free_pgtables+0x210/0x210 [ 2695.308868][ T8365] ? get_page_from_freelist+0x38b/0x400 [ 2695.314249][ T8365] copy_pte_range+0x1b1f/0x20b0 [ 2695.318940][ T8365] ? __kunmap_atomic+0x80/0x80 [ 2695.323539][ T8365] ? __pud_alloc+0x260/0x260 [ 2695.327962][ T8365] ? __pud_alloc+0x218/0x260 [ 2695.332388][ T8365] ? do_handle_mm_fault+0x2370/0x2370 [ 2695.337597][ T8365] copy_page_range+0xc1e/0x1090 [ 2695.342286][ T8365] ? pfn_valid+0x1e0/0x1e0 [ 2695.346537][ T8365] dup_mmap+0x99f/0xea0 [ 2695.350528][ T8365] ? __delayed_free_task+0x20/0x20 [ 2695.355478][ T8365] ? mm_init+0x807/0x960 [ 2695.359556][ T8365] dup_mm+0x91/0x330 [ 2695.363289][ T8365] copy_mm+0x108/0x1b0 [ 2695.367192][ T8365] copy_process+0x1295/0x3250 [ 2695.371706][ T8365] ? proc_fail_nth_write+0x213/0x290 [ 2695.376825][ T8365] ? proc_fail_nth_read+0x220/0x220 [ 2695.381860][ T8365] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2695.386807][ T8365] ? vfs_write+0x9af/0x1050 [ 2695.391148][ T8365] ? vmacache_update+0xb7/0x120 [ 2695.395844][ T8365] kernel_clone+0x22d/0x990 [ 2695.400175][ T8365] ? file_end_write+0x1b0/0x1b0 [ 2695.404864][ T8365] ? __kasan_check_write+0x14/0x20 [ 2695.409810][ T8365] ? create_io_thread+0x1e0/0x1e0 [ 2695.414671][ T8365] ? __mutex_lock_slowpath+0x10/0x10 [ 2695.419790][ T8365] __x64_sys_clone+0x289/0x310 [ 2695.424390][ T8365] ? __do_sys_vfork+0x130/0x130 [ 2695.429075][ T8365] ? debug_smp_processor_id+0x17/0x20 [ 2695.434284][ T8365] do_syscall_64+0x44/0xd0 [ 2695.438534][ T8365] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2695.444262][ T8365] RIP: 0033:0x7fc683db00c9 [ 2695.448518][ T8365] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:33 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) 00:44:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3a00}, 0x48) 00:44:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1ffff000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x6}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc400}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x7}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3a01}, 0x48) [ 2695.467959][ T8365] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2695.476204][ T8365] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2695.484014][ T8365] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2695.491825][ T8365] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2695.499637][ T8365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2695.507449][ T8365] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2695.515260][ T8365] 00:44:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3a02}, 0x48) 00:44:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x40000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2695.540103][ T8387] FAULT_INJECTION: forcing a failure. [ 2695.540103][ T8387] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2695.561639][ T8387] CPU: 1 PID: 8387 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2695.571623][ T8387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2695.581519][ T8387] Call Trace: [ 2695.584647][ T8387] [ 2695.587418][ T8387] dump_stack_lvl+0x151/0x1b7 [ 2695.591935][ T8387] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2695.597228][ T8387] dump_stack+0x15/0x17 [ 2695.601213][ T8387] should_fail+0x3c0/0x510 [ 2695.605471][ T8387] should_fail_alloc_page+0x58/0x70 [ 2695.610499][ T8387] __alloc_pages+0x1de/0x7c0 [ 2695.614928][ T8387] ? __count_vm_events+0x30/0x30 [ 2695.619701][ T8387] ? __this_cpu_preempt_check+0x13/0x20 [ 2695.625083][ T8387] pte_alloc_one+0x73/0x1b0 [ 2695.629420][ T8387] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2695.634455][ T8387] ? preempt_schedule+0xd9/0xe0 [ 2695.639141][ T8387] ? preempt_schedule_common+0xcb/0x100 [ 2695.644521][ T8387] __pte_alloc+0x86/0x350 [ 2695.648688][ T8387] ? free_pgtables+0x210/0x210 [ 2695.653295][ T8387] ? _raw_spin_lock+0xa3/0x1b0 [ 2695.657890][ T8387] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2695.663094][ T8387] ? preempt_schedule_thunk+0x16/0x18 [ 2695.668302][ T8387] copy_pte_range+0x1b1f/0x20b0 [ 2695.672993][ T8387] ? __kunmap_atomic+0x80/0x80 [ 2695.677588][ T8387] ? __kasan_slab_alloc+0xc4/0xe0 [ 2695.682450][ T8387] ? __kasan_slab_alloc+0xb2/0xe0 [ 2695.687308][ T8387] ? kmem_cache_alloc+0x189/0x2f0 [ 2695.692169][ T8387] ? vm_area_dup+0x26/0x1d0 [ 2695.696509][ T8387] ? dup_mmap+0x6b8/0xea0 [ 2695.700676][ T8387] ? dup_mm+0x91/0x330 [ 2695.704581][ T8387] ? copy_mm+0x108/0x1b0 [ 2695.708659][ T8387] ? copy_process+0x1295/0x3250 [ 2695.713346][ T8387] ? kernel_clone+0x22d/0x990 [ 2695.717860][ T8387] ? __x64_sys_clone+0x289/0x310 [ 2695.722635][ T8387] ? do_syscall_64+0x44/0xd0 [ 2695.727060][ T8387] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2695.732965][ T8387] copy_page_range+0xc1e/0x1090 [ 2695.737653][ T8387] ? pfn_valid+0x1e0/0x1e0 [ 2695.741903][ T8387] dup_mmap+0x99f/0xea0 [ 2695.745896][ T8387] ? __delayed_free_task+0x20/0x20 [ 2695.750846][ T8387] ? mm_init+0x807/0x960 [ 2695.754922][ T8387] dup_mm+0x91/0x330 [ 2695.758652][ T8387] copy_mm+0x108/0x1b0 [ 2695.762563][ T8387] copy_process+0x1295/0x3250 [ 2695.767073][ T8387] ? proc_fail_nth_write+0x213/0x290 [ 2695.772192][ T8387] ? proc_fail_nth_read+0x220/0x220 [ 2695.777226][ T8387] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2695.782173][ T8387] ? vfs_write+0x9af/0x1050 [ 2695.786514][ T8387] ? vmacache_update+0xb7/0x120 [ 2695.791201][ T8387] kernel_clone+0x22d/0x990 [ 2695.795542][ T8387] ? file_end_write+0x1b0/0x1b0 [ 2695.800226][ T8387] ? __kasan_check_write+0x14/0x20 [ 2695.805173][ T8387] ? create_io_thread+0x1e0/0x1e0 [ 2695.810034][ T8387] ? __mutex_lock_slowpath+0x10/0x10 [ 2695.815156][ T8387] __x64_sys_clone+0x289/0x310 [ 2695.819758][ T8387] ? __do_sys_vfork+0x130/0x130 [ 2695.824442][ T8387] ? debug_smp_processor_id+0x17/0x20 [ 2695.829650][ T8387] do_syscall_64+0x44/0xd0 [ 2695.833901][ T8387] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2695.839630][ T8387] RIP: 0033:0x7fc683db00c9 [ 2695.843886][ T8387] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2695.863322][ T8387] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2695.871571][ T8387] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2695.879381][ T8387] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:33 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) 00:44:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3c01}, 0x48) 00:44:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x8}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x4d030000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xfffff}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x9}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2695.887190][ T8387] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2695.895003][ T8387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2695.902817][ T8387] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2695.910626][ T8387] 00:44:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3c02}, 0x48) 00:44:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x1000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2695.934178][ T8411] FAULT_INJECTION: forcing a failure. [ 2695.934178][ T8411] name failslab, interval 1, probability 0, space 0, times 0 [ 2695.950655][ T8411] CPU: 1 PID: 8411 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2695.960639][ T8411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2695.970533][ T8411] Call Trace: [ 2695.973655][ T8411] [ 2695.976446][ T8411] dump_stack_lvl+0x151/0x1b7 [ 2695.980944][ T8411] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2695.986243][ T8411] dump_stack+0x15/0x17 [ 2695.990231][ T8411] should_fail+0x3c0/0x510 [ 2695.994484][ T8411] __should_failslab+0x9f/0xe0 [ 2695.999087][ T8411] should_failslab+0x9/0x20 [ 2696.003420][ T8411] kmem_cache_alloc+0x4f/0x2f0 [ 2696.008018][ T8411] ? vm_area_dup+0x26/0x1d0 [ 2696.012358][ T8411] ? __kasan_check_read+0x11/0x20 [ 2696.017218][ T8411] vm_area_dup+0x26/0x1d0 [ 2696.021383][ T8411] dup_mmap+0x6b8/0xea0 [ 2696.025378][ T8411] ? __delayed_free_task+0x20/0x20 [ 2696.030324][ T8411] ? mm_init+0x807/0x960 [ 2696.034404][ T8411] dup_mm+0x91/0x330 [ 2696.038134][ T8411] copy_mm+0x108/0x1b0 [ 2696.042042][ T8411] copy_process+0x1295/0x3250 [ 2696.046554][ T8411] ? proc_fail_nth_write+0x213/0x290 [ 2696.051679][ T8411] ? proc_fail_nth_read+0x220/0x220 [ 2696.056709][ T8411] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2696.061743][ T8411] ? vfs_write+0x9af/0x1050 [ 2696.066080][ T8411] ? vmacache_update+0xb7/0x120 [ 2696.070769][ T8411] kernel_clone+0x22d/0x990 [ 2696.075109][ T8411] ? file_end_write+0x1b0/0x1b0 [ 2696.079794][ T8411] ? __kasan_check_write+0x14/0x20 [ 2696.084742][ T8411] ? create_io_thread+0x1e0/0x1e0 [ 2696.089603][ T8411] ? __mutex_lock_slowpath+0x10/0x10 [ 2696.094726][ T8411] __x64_sys_clone+0x289/0x310 [ 2696.099324][ T8411] ? __do_sys_vfork+0x130/0x130 [ 2696.104015][ T8411] ? debug_smp_processor_id+0x17/0x20 [ 2696.109218][ T8411] do_syscall_64+0x44/0xd0 [ 2696.113472][ T8411] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2696.119198][ T8411] RIP: 0033:0x7fc683db00c9 [ 2696.123453][ T8411] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2696.142894][ T8411] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2696.151138][ T8411] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2696.158948][ T8411] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2696.166765][ T8411] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2696.174572][ T8411] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:33 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) 00:44:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xa}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x2000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:33 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:33 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3c03}, 0x48) 00:44:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xb}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x3000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xc}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2696.182381][ T8411] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2696.190196][ T8411] [ 2696.209663][ T8435] FAULT_INJECTION: forcing a failure. [ 2696.209663][ T8435] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2696.224299][ T8435] CPU: 1 PID: 8435 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 00:44:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xd}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2696.234281][ T8435] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2696.244174][ T8435] Call Trace: [ 2696.247301][ T8435] [ 2696.250076][ T8435] dump_stack_lvl+0x151/0x1b7 [ 2696.254589][ T8435] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2696.259886][ T8435] dump_stack+0x15/0x17 [ 2696.263882][ T8435] should_fail+0x3c0/0x510 [ 2696.268129][ T8435] should_fail_alloc_page+0x58/0x70 [ 2696.273162][ T8435] __alloc_pages+0x1de/0x7c0 [ 2696.277590][ T8435] ? __count_vm_events+0x30/0x30 [ 2696.282364][ T8435] ? __this_cpu_preempt_check+0x13/0x20 [ 2696.287758][ T8435] ? __mod_node_page_state+0xac/0xf0 [ 2696.292861][ T8435] pte_alloc_one+0x73/0x1b0 [ 2696.297199][ T8435] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2696.302234][ T8435] __pte_alloc+0x86/0x350 [ 2696.306404][ T8435] ? free_pgtables+0x210/0x210 [ 2696.310998][ T8435] ? _raw_spin_lock+0xa3/0x1b0 [ 2696.315598][ T8435] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2696.320806][ T8435] ? __kernel_text_address+0x9a/0x110 [ 2696.326014][ T8435] copy_pte_range+0x1b1f/0x20b0 [ 2696.330704][ T8435] ? __kunmap_atomic+0x80/0x80 [ 2696.335306][ T8435] ? __kasan_slab_alloc+0xc4/0xe0 [ 2696.340159][ T8435] ? __kasan_slab_alloc+0xb2/0xe0 [ 2696.345021][ T8435] ? kmem_cache_alloc+0x189/0x2f0 [ 2696.349880][ T8435] ? vm_area_dup+0x26/0x1d0 [ 2696.354238][ T8435] ? dup_mmap+0x6b8/0xea0 [ 2696.358395][ T8435] ? dup_mm+0x91/0x330 [ 2696.362292][ T8435] ? copy_mm+0x108/0x1b0 [ 2696.366370][ T8435] ? copy_process+0x1295/0x3250 [ 2696.371058][ T8435] ? kernel_clone+0x22d/0x990 [ 2696.375574][ T8435] ? __x64_sys_clone+0x289/0x310 [ 2696.380348][ T8435] ? do_syscall_64+0x44/0xd0 [ 2696.384773][ T8435] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2696.390675][ T8435] copy_page_range+0xc1e/0x1090 [ 2696.395372][ T8435] ? pfn_valid+0x1e0/0x1e0 [ 2696.399615][ T8435] dup_mmap+0x99f/0xea0 [ 2696.403607][ T8435] ? __delayed_free_task+0x20/0x20 [ 2696.408553][ T8435] ? mm_init+0x807/0x960 [ 2696.412632][ T8435] dup_mm+0x91/0x330 [ 2696.416373][ T8435] copy_mm+0x108/0x1b0 [ 2696.420272][ T8435] copy_process+0x1295/0x3250 [ 2696.424783][ T8435] ? proc_fail_nth_write+0x213/0x290 [ 2696.429901][ T8435] ? proc_fail_nth_read+0x220/0x220 [ 2696.434936][ T8435] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2696.439884][ T8435] ? vfs_write+0x9af/0x1050 [ 2696.444224][ T8435] ? vmacache_update+0xb7/0x120 [ 2696.448912][ T8435] kernel_clone+0x22d/0x990 [ 2696.453249][ T8435] ? file_end_write+0x1b0/0x1b0 [ 2696.457938][ T8435] ? __kasan_check_write+0x14/0x20 [ 2696.462884][ T8435] ? create_io_thread+0x1e0/0x1e0 [ 2696.467746][ T8435] ? __mutex_lock_slowpath+0x10/0x10 [ 2696.472864][ T8435] __x64_sys_clone+0x289/0x310 [ 2696.477467][ T8435] ? __do_sys_vfork+0x130/0x130 [ 2696.482152][ T8435] ? debug_smp_processor_id+0x17/0x20 [ 2696.487360][ T8435] do_syscall_64+0x44/0xd0 [ 2696.491613][ T8435] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2696.497341][ T8435] RIP: 0033:0x7fc683db00c9 [ 2696.501595][ T8435] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2696.521034][ T8435] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2696.529278][ T8435] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:34 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) 00:44:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xe}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x5000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xfbffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3e00}, 0x48) 00:44:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x10}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3e01}, 0x48) [ 2696.537092][ T8435] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2696.544901][ T8435] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2696.552715][ T8435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2696.560523][ T8435] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2696.568338][ T8435] 00:44:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xff0f0100, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xfffffff5, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2696.596387][ T8463] FAULT_INJECTION: forcing a failure. [ 2696.596387][ T8463] name failslab, interval 1, probability 0, space 0, times 0 [ 2696.610175][ T8463] CPU: 1 PID: 8463 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2696.620150][ T8463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2696.630046][ T8463] Call Trace: [ 2696.633169][ T8463] [ 2696.635944][ T8463] dump_stack_lvl+0x151/0x1b7 [ 2696.640465][ T8463] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2696.645752][ T8463] ? do_syscall_64+0x44/0xd0 [ 2696.650179][ T8463] dump_stack+0x15/0x17 [ 2696.654173][ T8463] should_fail+0x3c0/0x510 [ 2696.658513][ T8463] __should_failslab+0x9f/0xe0 [ 2696.663106][ T8463] should_failslab+0x9/0x20 [ 2696.667445][ T8463] kmem_cache_alloc+0x4f/0x2f0 [ 2696.672047][ T8463] ? anon_vma_clone+0xa1/0x4f0 [ 2696.676649][ T8463] anon_vma_clone+0xa1/0x4f0 [ 2696.681077][ T8463] anon_vma_fork+0x91/0x4f0 [ 2696.685412][ T8463] ? anon_vma_name+0x4c/0x70 [ 2696.689840][ T8463] dup_mmap+0x750/0xea0 [ 2696.693832][ T8463] ? __delayed_free_task+0x20/0x20 [ 2696.698777][ T8463] ? mm_init+0x807/0x960 [ 2696.702857][ T8463] dup_mm+0x91/0x330 [ 2696.706592][ T8463] copy_mm+0x108/0x1b0 [ 2696.710494][ T8463] copy_process+0x1295/0x3250 [ 2696.715008][ T8463] ? proc_fail_nth_write+0x213/0x290 [ 2696.720127][ T8463] ? proc_fail_nth_read+0x220/0x220 [ 2696.725165][ T8463] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2696.730112][ T8463] ? vfs_write+0x9af/0x1050 [ 2696.734447][ T8463] ? vmacache_update+0xb7/0x120 [ 2696.739135][ T8463] kernel_clone+0x22d/0x990 [ 2696.743475][ T8463] ? file_end_write+0x1b0/0x1b0 [ 2696.748160][ T8463] ? __kasan_check_write+0x14/0x20 [ 2696.753107][ T8463] ? create_io_thread+0x1e0/0x1e0 [ 2696.757968][ T8463] ? __mutex_lock_slowpath+0x10/0x10 [ 2696.763094][ T8463] __x64_sys_clone+0x289/0x310 [ 2696.767689][ T8463] ? __do_sys_vfork+0x130/0x130 [ 2696.772380][ T8463] ? debug_smp_processor_id+0x17/0x20 [ 2696.777583][ T8463] do_syscall_64+0x44/0xd0 [ 2696.781839][ T8463] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2696.787565][ T8463] RIP: 0033:0x7fc683db00c9 [ 2696.791884][ T8463] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2696.811262][ T8463] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2696.819505][ T8463] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2696.827314][ T8463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2696.835127][ T8463] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:34 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) 00:44:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3e02}, 0x48) 00:44:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x11}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3e03}, 0x48) 00:44:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x8000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2696.842938][ T8463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2696.850751][ T8463] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2696.858563][ T8463] [ 2696.875515][ T8482] FAULT_INJECTION: forcing a failure. [ 2696.875515][ T8482] name fail_page_alloc, interval 1, probability 0, space 0, times 0 00:44:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x12}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1b0e41f000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2696.893167][ T8482] CPU: 1 PID: 8482 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2696.903144][ T8482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2696.913035][ T8482] Call Trace: [ 2696.916158][ T8482] [ 2696.918937][ T8482] dump_stack_lvl+0x151/0x1b7 [ 2696.923450][ T8482] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2696.928743][ T8482] dump_stack+0x15/0x17 [ 2696.932735][ T8482] should_fail+0x3c0/0x510 [ 2696.936990][ T8482] should_fail_alloc_page+0x58/0x70 [ 2696.942020][ T8482] __alloc_pages+0x1de/0x7c0 [ 2696.946448][ T8482] ? __count_vm_events+0x30/0x30 [ 2696.951219][ T8482] ? __this_cpu_preempt_check+0x13/0x20 [ 2696.956610][ T8482] ? __mod_node_page_state+0xac/0xf0 [ 2696.961723][ T8482] pte_alloc_one+0x73/0x1b0 [ 2696.966062][ T8482] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2696.971096][ T8482] __pte_alloc+0x86/0x350 [ 2696.975265][ T8482] ? free_pgtables+0x210/0x210 [ 2696.979860][ T8482] ? _raw_spin_lock+0xa3/0x1b0 [ 2696.984462][ T8482] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2696.989669][ T8482] ? __kernel_text_address+0x9a/0x110 [ 2696.994885][ T8482] copy_pte_range+0x1b1f/0x20b0 [ 2696.999567][ T8482] ? __kunmap_atomic+0x80/0x80 [ 2697.004170][ T8482] ? __kasan_slab_alloc+0xc4/0xe0 [ 2697.009028][ T8482] ? __kasan_slab_alloc+0xb2/0xe0 [ 2697.013886][ T8482] ? kmem_cache_alloc+0x189/0x2f0 [ 2697.018744][ T8482] ? vm_area_dup+0x26/0x1d0 [ 2697.023088][ T8482] ? dup_mmap+0x6b8/0xea0 [ 2697.027252][ T8482] ? dup_mm+0x91/0x330 [ 2697.031162][ T8482] ? copy_mm+0x108/0x1b0 [ 2697.035235][ T8482] ? copy_process+0x1295/0x3250 [ 2697.039922][ T8482] ? kernel_clone+0x22d/0x990 [ 2697.044440][ T8482] ? __x64_sys_clone+0x289/0x310 [ 2697.049208][ T8482] ? do_syscall_64+0x44/0xd0 [ 2697.053636][ T8482] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2697.059540][ T8482] copy_page_range+0xc1e/0x1090 [ 2697.064226][ T8482] ? pfn_valid+0x1e0/0x1e0 [ 2697.068479][ T8482] dup_mmap+0x99f/0xea0 [ 2697.072472][ T8482] ? __delayed_free_task+0x20/0x20 [ 2697.077419][ T8482] ? mm_init+0x807/0x960 [ 2697.081496][ T8482] dup_mm+0x91/0x330 [ 2697.085228][ T8482] copy_mm+0x108/0x1b0 [ 2697.089135][ T8482] copy_process+0x1295/0x3250 [ 2697.093647][ T8482] ? proc_fail_nth_write+0x213/0x290 [ 2697.098767][ T8482] ? proc_fail_nth_read+0x220/0x220 [ 2697.103810][ T8482] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2697.108750][ T8482] ? vfs_write+0x9af/0x1050 [ 2697.113091][ T8482] ? vmacache_update+0xb7/0x120 [ 2697.117777][ T8482] kernel_clone+0x22d/0x990 [ 2697.122116][ T8482] ? file_end_write+0x1b0/0x1b0 [ 2697.126809][ T8482] ? __kasan_check_write+0x14/0x20 [ 2697.131747][ T8482] ? create_io_thread+0x1e0/0x1e0 [ 2697.136608][ T8482] ? __mutex_lock_slowpath+0x10/0x10 [ 2697.141729][ T8482] __x64_sys_clone+0x289/0x310 [ 2697.146329][ T8482] ? __do_sys_vfork+0x130/0x130 [ 2697.151021][ T8482] ? debug_smp_processor_id+0x17/0x20 [ 2697.156226][ T8482] do_syscall_64+0x44/0xd0 [ 2697.160476][ T8482] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2697.166203][ T8482] RIP: 0033:0x7fc683db00c9 [ 2697.170457][ T8482] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2697.189908][ T8482] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:44:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2aa66eec8000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:34 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) 00:44:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f00}, 0x48) 00:44:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x18}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x9000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2697.198145][ T8482] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2697.205957][ T8482] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2697.213771][ T8482] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2697.221580][ T8482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2697.229392][ T8482] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2697.237203][ T8482] 00:44:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x25}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:34 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4000}, 0x48) 00:44:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xa000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x553a26308000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x36}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2697.292656][ T8512] FAULT_INJECTION: forcing a failure. [ 2697.292656][ T8512] name failslab, interval 1, probability 0, space 0, times 0 [ 2697.316049][ T8512] CPU: 1 PID: 8512 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2697.326040][ T8512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2697.335931][ T8512] Call Trace: [ 2697.339058][ T8512] [ 2697.341833][ T8512] dump_stack_lvl+0x151/0x1b7 [ 2697.346343][ T8512] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2697.351638][ T8512] dump_stack+0x15/0x17 [ 2697.355629][ T8512] should_fail+0x3c0/0x510 [ 2697.359884][ T8512] __should_failslab+0x9f/0xe0 [ 2697.364482][ T8512] should_failslab+0x9/0x20 [ 2697.368825][ T8512] kmem_cache_alloc+0x4f/0x2f0 [ 2697.373421][ T8512] ? vm_area_dup+0x26/0x1d0 [ 2697.377760][ T8512] vm_area_dup+0x26/0x1d0 [ 2697.381933][ T8512] dup_mmap+0x6b8/0xea0 [ 2697.385923][ T8512] ? __delayed_free_task+0x20/0x20 [ 2697.390870][ T8512] ? mm_init+0x807/0x960 [ 2697.394946][ T8512] dup_mm+0x91/0x330 [ 2697.399555][ T8512] copy_mm+0x108/0x1b0 [ 2697.403456][ T8512] copy_process+0x1295/0x3250 [ 2697.407968][ T8512] ? proc_fail_nth_write+0x213/0x290 [ 2697.413089][ T8512] ? proc_fail_nth_read+0x220/0x220 [ 2697.418123][ T8512] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2697.423070][ T8512] ? vfs_write+0x9af/0x1050 [ 2697.427409][ T8512] ? vmacache_update+0xb7/0x120 [ 2697.432097][ T8512] kernel_clone+0x22d/0x990 [ 2697.436444][ T8512] ? file_end_write+0x1b0/0x1b0 [ 2697.441127][ T8512] ? __kasan_check_write+0x14/0x20 [ 2697.446069][ T8512] ? create_io_thread+0x1e0/0x1e0 [ 2697.450932][ T8512] ? __mutex_lock_slowpath+0x10/0x10 [ 2697.456052][ T8512] __x64_sys_clone+0x289/0x310 [ 2697.460652][ T8512] ? __do_sys_vfork+0x130/0x130 [ 2697.465338][ T8512] ? debug_smp_processor_id+0x17/0x20 [ 2697.470553][ T8512] do_syscall_64+0x44/0xd0 [ 2697.474802][ T8512] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2697.480530][ T8512] RIP: 0033:0x7fc683db00c9 [ 2697.484779][ T8512] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2697.504225][ T8512] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2697.512463][ T8512] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2697.520274][ T8512] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2697.528086][ T8512] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2697.535896][ T8512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:35 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) 00:44:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4001}, 0x48) 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xb000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x43}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4002}, 0x48) [ 2697.543718][ T8512] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2697.551523][ T8512] 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xd000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x48}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2001000000000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2697.586107][ T8540] FAULT_INJECTION: forcing a failure. [ 2697.586107][ T8540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2697.615089][ T8540] CPU: 1 PID: 8540 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2697.625074][ T8540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2697.634968][ T8540] Call Trace: [ 2697.638090][ T8540] [ 2697.640867][ T8540] dump_stack_lvl+0x151/0x1b7 [ 2697.645380][ T8540] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2697.650674][ T8540] ? stack_trace_save+0x1f0/0x1f0 [ 2697.655534][ T8540] ? __kernel_text_address+0x9a/0x110 [ 2697.660743][ T8540] dump_stack+0x15/0x17 [ 2697.664734][ T8540] should_fail+0x3c0/0x510 [ 2697.668987][ T8540] should_fail_alloc_page+0x58/0x70 [ 2697.674020][ T8540] __alloc_pages+0x1de/0x7c0 [ 2697.678452][ T8540] ? stack_trace_save+0x12d/0x1f0 [ 2697.683307][ T8540] ? stack_trace_snprint+0x100/0x100 [ 2697.688430][ T8540] ? __count_vm_events+0x30/0x30 [ 2697.693202][ T8540] ? __kasan_slab_alloc+0xc4/0xe0 [ 2697.698062][ T8540] ? __kasan_slab_alloc+0xb2/0xe0 [ 2697.702923][ T8540] ? kmem_cache_alloc+0x189/0x2f0 [ 2697.707785][ T8540] ? anon_vma_fork+0x1b9/0x4f0 [ 2697.712384][ T8540] get_zeroed_page+0x19/0x40 [ 2697.716808][ T8540] __pud_alloc+0x8b/0x260 [ 2697.720976][ T8540] ? do_handle_mm_fault+0x2370/0x2370 [ 2697.726182][ T8540] copy_page_range+0xd9e/0x1090 [ 2697.730872][ T8540] ? pfn_valid+0x1e0/0x1e0 [ 2697.735124][ T8540] dup_mmap+0x99f/0xea0 [ 2697.739115][ T8540] ? __delayed_free_task+0x20/0x20 [ 2697.744064][ T8540] ? mm_init+0x807/0x960 [ 2697.748145][ T8540] dup_mm+0x91/0x330 [ 2697.751872][ T8540] copy_mm+0x108/0x1b0 [ 2697.755781][ T8540] copy_process+0x1295/0x3250 [ 2697.760293][ T8540] ? proc_fail_nth_write+0x213/0x290 [ 2697.765413][ T8540] ? proc_fail_nth_read+0x220/0x220 [ 2697.770446][ T8540] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2697.775395][ T8540] ? vfs_write+0x9af/0x1050 [ 2697.779735][ T8540] ? vmacache_update+0xb7/0x120 [ 2697.784420][ T8540] kernel_clone+0x22d/0x990 [ 2697.788760][ T8540] ? file_end_write+0x1b0/0x1b0 [ 2697.793447][ T8540] ? __kasan_check_write+0x14/0x20 [ 2697.798394][ T8540] ? create_io_thread+0x1e0/0x1e0 [ 2697.803255][ T8540] ? __mutex_lock_slowpath+0x10/0x10 [ 2697.808374][ T8540] __x64_sys_clone+0x289/0x310 [ 2697.812975][ T8540] ? __do_sys_vfork+0x130/0x130 [ 2697.817663][ T8540] ? debug_smp_processor_id+0x17/0x20 [ 2697.822869][ T8540] do_syscall_64+0x44/0xd0 [ 2697.827123][ T8540] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2697.832849][ T8540] RIP: 0033:0x7fc683db00c9 [ 2697.837103][ T8540] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2697.856546][ T8540] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2697.864789][ T8540] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2697.872599][ T8540] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:35 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) 00:44:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc4000000, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x4c}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4003}, 0x48) 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xe000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2020000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x10000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x68}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4200}, 0x48) 00:44:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x11000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2697.880413][ T8540] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2697.888222][ T8540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2697.896033][ T8540] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2697.903846][ T8540] [ 2697.947473][ T8568] FAULT_INJECTION: forcing a failure. [ 2697.947473][ T8568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2697.964768][ T8568] CPU: 0 PID: 8568 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2697.974749][ T8568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2697.984646][ T8568] Call Trace: [ 2697.987766][ T8568] [ 2697.990545][ T8568] dump_stack_lvl+0x151/0x1b7 [ 2697.995059][ T8568] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2698.000354][ T8568] dump_stack+0x15/0x17 [ 2698.004347][ T8568] should_fail+0x3c0/0x510 [ 2698.008597][ T8568] should_fail_alloc_page+0x58/0x70 [ 2698.013630][ T8568] __alloc_pages+0x1de/0x7c0 [ 2698.018059][ T8568] ? __count_vm_events+0x30/0x30 [ 2698.022830][ T8568] ? __this_cpu_preempt_check+0x13/0x20 [ 2698.028217][ T8568] ? __mod_node_page_state+0xac/0xf0 [ 2698.033333][ T8568] pte_alloc_one+0x73/0x1b0 [ 2698.037672][ T8568] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2698.042707][ T8568] __pte_alloc+0x86/0x350 [ 2698.046878][ T8568] ? free_pgtables+0x210/0x210 [ 2698.051473][ T8568] ? _raw_spin_lock+0xa3/0x1b0 [ 2698.056071][ T8568] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2698.061290][ T8568] ? __kernel_text_address+0x9a/0x110 [ 2698.066488][ T8568] copy_pte_range+0x1b1f/0x20b0 [ 2698.071183][ T8568] ? __kunmap_atomic+0x80/0x80 [ 2698.075777][ T8568] ? __kasan_slab_alloc+0xc4/0xe0 [ 2698.080634][ T8568] ? __kasan_slab_alloc+0xb2/0xe0 [ 2698.085497][ T8568] ? kmem_cache_alloc+0x189/0x2f0 [ 2698.090355][ T8568] ? vm_area_dup+0x26/0x1d0 [ 2698.094694][ T8568] ? dup_mmap+0x6b8/0xea0 [ 2698.098861][ T8568] ? dup_mm+0x91/0x330 [ 2698.102766][ T8568] ? copy_mm+0x108/0x1b0 [ 2698.106849][ T8568] ? copy_process+0x1295/0x3250 [ 2698.111536][ T8568] ? kernel_clone+0x22d/0x990 [ 2698.116044][ T8568] ? __x64_sys_clone+0x289/0x310 [ 2698.120819][ T8568] ? do_syscall_64+0x44/0xd0 [ 2698.125247][ T8568] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2698.131150][ T8568] copy_page_range+0xc1e/0x1090 [ 2698.135836][ T8568] ? pfn_valid+0x1e0/0x1e0 [ 2698.140088][ T8568] dup_mmap+0x99f/0xea0 [ 2698.144081][ T8568] ? __delayed_free_task+0x20/0x20 [ 2698.149034][ T8568] ? mm_init+0x807/0x960 [ 2698.153106][ T8568] dup_mm+0x91/0x330 [ 2698.156839][ T8568] copy_mm+0x108/0x1b0 [ 2698.160745][ T8568] copy_process+0x1295/0x3250 [ 2698.165257][ T8568] ? proc_fail_nth_write+0x213/0x290 [ 2698.170376][ T8568] ? proc_fail_nth_read+0x220/0x220 [ 2698.175501][ T8568] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2698.180446][ T8568] ? vfs_write+0x9af/0x1050 [ 2698.184871][ T8568] ? vmacache_update+0xb7/0x120 [ 2698.189558][ T8568] kernel_clone+0x22d/0x990 [ 2698.193898][ T8568] ? file_end_write+0x1b0/0x1b0 [ 2698.198584][ T8568] ? __kasan_check_write+0x14/0x20 [ 2698.203537][ T8568] ? create_io_thread+0x1e0/0x1e0 [ 2698.208394][ T8568] ? __mutex_lock_slowpath+0x10/0x10 [ 2698.213512][ T8568] __x64_sys_clone+0x289/0x310 [ 2698.218113][ T8568] ? __do_sys_vfork+0x130/0x130 [ 2698.222800][ T8568] ? debug_smp_processor_id+0x17/0x20 [ 2698.228006][ T8568] do_syscall_64+0x44/0xd0 [ 2698.232258][ T8568] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2698.237987][ T8568] RIP: 0033:0x7fc683db00c9 [ 2698.242242][ T8568] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2698.261685][ T8568] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2698.269929][ T8568] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2698.277739][ T8568] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2698.285549][ T8568] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:35 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) 00:44:35 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x6c}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4201}, 0x48) 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x12000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:35 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x10100000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4202}, 0x48) 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x18000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x74}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x7b, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2698.293359][ T8568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2698.301172][ T8568] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2698.308986][ T8568] 00:44:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x25000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2698.353985][ T8596] FAULT_INJECTION: forcing a failure. [ 2698.353985][ T8596] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2698.374528][ T8596] CPU: 1 PID: 8596 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2698.384514][ T8596] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2698.394578][ T8596] Call Trace: [ 2698.397700][ T8596] [ 2698.400482][ T8596] dump_stack_lvl+0x151/0x1b7 [ 2698.404990][ T8596] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2698.410289][ T8596] ? __kasan_check_write+0x14/0x20 [ 2698.415318][ T8596] ? __set_page_owner+0x2ee/0x310 [ 2698.420183][ T8596] dump_stack+0x15/0x17 [ 2698.424172][ T8596] should_fail+0x3c0/0x510 [ 2698.428424][ T8596] should_fail_alloc_page+0x58/0x70 [ 2698.433458][ T8596] __alloc_pages+0x1de/0x7c0 [ 2698.437896][ T8596] ? __count_vm_events+0x30/0x30 [ 2698.442662][ T8596] ? __count_vm_events+0x30/0x30 [ 2698.447437][ T8596] ? __kasan_check_write+0x14/0x20 [ 2698.452377][ T8596] ? _raw_spin_lock+0xa3/0x1b0 [ 2698.456977][ T8596] __pmd_alloc+0xb1/0x550 [ 2698.461145][ T8596] ? kmem_cache_alloc+0x189/0x2f0 [ 2698.466005][ T8596] ? anon_vma_fork+0x1b9/0x4f0 [ 2698.470609][ T8596] ? __pud_alloc+0x260/0x260 [ 2698.475040][ T8596] ? __pud_alloc+0x218/0x260 [ 2698.479457][ T8596] ? do_handle_mm_fault+0x2370/0x2370 [ 2698.484665][ T8596] copy_page_range+0xd04/0x1090 [ 2698.489362][ T8596] ? pfn_valid+0x1e0/0x1e0 [ 2698.493609][ T8596] dup_mmap+0x99f/0xea0 [ 2698.497605][ T8596] ? __delayed_free_task+0x20/0x20 [ 2698.502558][ T8596] ? mm_init+0x807/0x960 [ 2698.506626][ T8596] dup_mm+0x91/0x330 [ 2698.510356][ T8596] copy_mm+0x108/0x1b0 [ 2698.514264][ T8596] copy_process+0x1295/0x3250 [ 2698.518781][ T8596] ? proc_fail_nth_write+0x213/0x290 [ 2698.523898][ T8596] ? proc_fail_nth_read+0x220/0x220 [ 2698.528946][ T8596] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2698.533876][ T8596] ? vfs_write+0x9af/0x1050 [ 2698.538217][ T8596] ? vmacache_update+0xb7/0x120 [ 2698.542903][ T8596] kernel_clone+0x22d/0x990 [ 2698.547244][ T8596] ? file_end_write+0x1b0/0x1b0 [ 2698.551932][ T8596] ? __kasan_check_write+0x14/0x20 [ 2698.556876][ T8596] ? create_io_thread+0x1e0/0x1e0 [ 2698.561825][ T8596] ? __mutex_lock_slowpath+0x10/0x10 [ 2698.566945][ T8596] __x64_sys_clone+0x289/0x310 [ 2698.571547][ T8596] ? __do_sys_vfork+0x130/0x130 [ 2698.576233][ T8596] ? debug_smp_processor_id+0x17/0x20 [ 2698.581439][ T8596] do_syscall_64+0x44/0xd0 [ 2698.585692][ T8596] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2698.591418][ T8596] RIP: 0033:0x7fc683db00c9 [ 2698.595674][ T8596] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2698.615478][ T8596] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2698.623724][ T8596] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2698.631530][ T8596] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2698.639341][ T8596] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2698.647240][ T8596] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:36 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) 00:44:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x7a}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4401}, 0x48) 00:44:36 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x70050000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x36000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4402}, 0x48) 00:44:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xc4}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa0, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x43000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x8, 0xc5, 0x1}, 0x20) 00:44:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4403}, 0x48) [ 2698.655048][ T8596] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2698.662868][ T8596] [ 2698.713696][ T8627] FAULT_INJECTION: forcing a failure. [ 2698.713696][ T8627] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2698.727669][ T8627] CPU: 0 PID: 8627 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2698.737652][ T8627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2698.747543][ T8627] Call Trace: [ 2698.750670][ T8627] [ 2698.753447][ T8627] dump_stack_lvl+0x151/0x1b7 [ 2698.757960][ T8627] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2698.763253][ T8627] dump_stack+0x15/0x17 [ 2698.767247][ T8627] should_fail+0x3c0/0x510 [ 2698.771500][ T8627] should_fail_alloc_page+0x58/0x70 [ 2698.776535][ T8627] __alloc_pages+0x1de/0x7c0 [ 2698.780962][ T8627] ? __count_vm_events+0x30/0x30 [ 2698.785732][ T8627] ? __this_cpu_preempt_check+0x13/0x20 [ 2698.791117][ T8627] pte_alloc_one+0x73/0x1b0 [ 2698.795454][ T8627] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2698.800487][ T8627] __pte_alloc+0x86/0x350 [ 2698.804653][ T8627] ? free_pgtables+0x210/0x210 [ 2698.809252][ T8627] ? _raw_spin_lock+0xa3/0x1b0 [ 2698.813852][ T8627] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2698.819069][ T8627] ? __kernel_text_address+0x9a/0x110 [ 2698.824267][ T8627] copy_pte_range+0x1b1f/0x20b0 [ 2698.828957][ T8627] ? __kunmap_atomic+0x80/0x80 [ 2698.833554][ T8627] ? __kasan_slab_alloc+0xc4/0xe0 [ 2698.838415][ T8627] ? __kasan_slab_alloc+0xb2/0xe0 [ 2698.843273][ T8627] ? kmem_cache_alloc+0x189/0x2f0 [ 2698.848136][ T8627] ? vm_area_dup+0x26/0x1d0 [ 2698.852481][ T8627] ? dup_mmap+0x6b8/0xea0 [ 2698.856641][ T8627] ? dup_mm+0x91/0x330 [ 2698.860547][ T8627] ? copy_mm+0x108/0x1b0 [ 2698.864634][ T8627] ? copy_process+0x1295/0x3250 [ 2698.869313][ T8627] ? kernel_clone+0x22d/0x990 [ 2698.873824][ T8627] ? __x64_sys_clone+0x289/0x310 [ 2698.878598][ T8627] ? do_syscall_64+0x44/0xd0 [ 2698.883026][ T8627] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2698.888928][ T8627] copy_page_range+0xc1e/0x1090 [ 2698.893617][ T8627] ? pfn_valid+0x1e0/0x1e0 [ 2698.897869][ T8627] dup_mmap+0x99f/0xea0 [ 2698.901866][ T8627] ? __delayed_free_task+0x20/0x20 [ 2698.906807][ T8627] ? mm_init+0x807/0x960 [ 2698.910886][ T8627] dup_mm+0x91/0x330 [ 2698.914618][ T8627] copy_mm+0x108/0x1b0 [ 2698.918523][ T8627] copy_process+0x1295/0x3250 [ 2698.923037][ T8627] ? proc_fail_nth_write+0x213/0x290 [ 2698.928158][ T8627] ? proc_fail_nth_read+0x220/0x220 [ 2698.933193][ T8627] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2698.938139][ T8627] ? vfs_write+0x9af/0x1050 [ 2698.942477][ T8627] ? vmacache_update+0xb7/0x120 [ 2698.947163][ T8627] kernel_clone+0x22d/0x990 [ 2698.951506][ T8627] ? file_end_write+0x1b0/0x1b0 [ 2698.956191][ T8627] ? __kasan_check_write+0x14/0x20 [ 2698.961143][ T8627] ? create_io_thread+0x1e0/0x1e0 [ 2698.965998][ T8627] ? __mutex_lock_slowpath+0x10/0x10 [ 2698.971125][ T8627] __x64_sys_clone+0x289/0x310 [ 2698.975720][ T8627] ? __do_sys_vfork+0x130/0x130 [ 2698.980413][ T8627] ? debug_smp_processor_id+0x17/0x20 [ 2698.985615][ T8627] do_syscall_64+0x44/0xd0 [ 2698.989869][ T8627] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2698.995596][ T8627] RIP: 0033:0x7fc683db00c9 [ 2698.999850][ T8627] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2699.019289][ T8627] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2699.027533][ T8627] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2699.035343][ T8627] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2699.043156][ T8627] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2699.050967][ T8627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:36 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) 00:44:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4600}, 0x48) 00:44:36 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x8030263a550000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0xa, 0xc5, 0x1}, 0x20) 00:44:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x48000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x18, 0xc5, 0x1}, 0x20) 00:44:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4601}, 0x48) 00:44:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x4c000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x64, 0xc5, 0x1}, 0x20) [ 2699.058778][ T8627] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2699.066596][ T8627] 00:44:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4602}, 0x48) [ 2699.116410][ T8643] FAULT_INJECTION: forcing a failure. [ 2699.116410][ T8643] name failslab, interval 1, probability 0, space 0, times 0 [ 2699.128913][ T8643] CPU: 1 PID: 8643 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2699.138813][ T8643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2699.148707][ T8643] Call Trace: [ 2699.151827][ T8643] [ 2699.154604][ T8643] dump_stack_lvl+0x151/0x1b7 [ 2699.159118][ T8643] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2699.164413][ T8643] dump_stack+0x15/0x17 [ 2699.168405][ T8643] should_fail+0x3c0/0x510 [ 2699.172659][ T8643] __should_failslab+0x9f/0xe0 [ 2699.177258][ T8643] should_failslab+0x9/0x20 [ 2699.181600][ T8643] kmem_cache_alloc+0x4f/0x2f0 [ 2699.186198][ T8643] ? vm_area_dup+0x26/0x1d0 [ 2699.190537][ T8643] vm_area_dup+0x26/0x1d0 [ 2699.194702][ T8643] dup_mmap+0x6b8/0xea0 [ 2699.198696][ T8643] ? __delayed_free_task+0x20/0x20 [ 2699.203643][ T8643] ? mm_init+0x807/0x960 [ 2699.207722][ T8643] dup_mm+0x91/0x330 [ 2699.211454][ T8643] copy_mm+0x108/0x1b0 [ 2699.215358][ T8643] copy_process+0x1295/0x3250 [ 2699.219882][ T8643] ? proc_fail_nth_write+0x213/0x290 [ 2699.224993][ T8643] ? proc_fail_nth_read+0x220/0x220 [ 2699.230030][ T8643] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2699.234977][ T8643] ? vfs_write+0x9af/0x1050 [ 2699.239315][ T8643] ? vmacache_update+0xb7/0x120 [ 2699.244000][ T8643] kernel_clone+0x22d/0x990 [ 2699.248341][ T8643] ? file_end_write+0x1b0/0x1b0 [ 2699.253025][ T8643] ? __kasan_check_write+0x14/0x20 [ 2699.257975][ T8643] ? create_io_thread+0x1e0/0x1e0 [ 2699.262921][ T8643] ? __mutex_lock_slowpath+0x10/0x10 [ 2699.268041][ T8643] __x64_sys_clone+0x289/0x310 [ 2699.272644][ T8643] ? __do_sys_vfork+0x130/0x130 [ 2699.277329][ T8643] ? debug_smp_processor_id+0x17/0x20 [ 2699.282537][ T8643] do_syscall_64+0x44/0xd0 [ 2699.286790][ T8643] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2699.292517][ T8643] RIP: 0033:0x7fc683db00c9 [ 2699.296770][ T8643] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:36 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) 00:44:36 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x80ec6ea62a0000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2000009a, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x1001, 0xc5, 0x1}, 0x20) 00:44:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4603}, 0x48) 00:44:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x68000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200000a5, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2699.316218][ T8643] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2699.324455][ T8643] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2699.332268][ T8643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2699.340077][ T8643] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2699.347890][ T8643] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2699.355724][ T8643] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2699.363515][ T8643] 00:44:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x1000000, 0xc5, 0x1}, 0x20) 00:44:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x6c000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:36 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xf0410e1b000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:36 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4800}, 0x48) 00:44:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200000e1, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2699.395991][ T8657] FAULT_INJECTION: forcing a failure. [ 2699.395991][ T8657] name failslab, interval 1, probability 0, space 0, times 0 [ 2699.424940][ T8657] CPU: 1 PID: 8657 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2699.434931][ T8657] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2699.444839][ T8657] Call Trace: [ 2699.447950][ T8657] [ 2699.450725][ T8657] dump_stack_lvl+0x151/0x1b7 [ 2699.455240][ T8657] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2699.460536][ T8657] dump_stack+0x15/0x17 [ 2699.464529][ T8657] should_fail+0x3c0/0x510 [ 2699.468777][ T8657] __should_failslab+0x9f/0xe0 [ 2699.473378][ T8657] should_failslab+0x9/0x20 [ 2699.477721][ T8657] kmem_cache_alloc+0x4f/0x2f0 [ 2699.482317][ T8657] ? vm_area_dup+0x26/0x1d0 [ 2699.486658][ T8657] vm_area_dup+0x26/0x1d0 [ 2699.490825][ T8657] dup_mmap+0x6b8/0xea0 [ 2699.494817][ T8657] ? __delayed_free_task+0x20/0x20 [ 2699.499764][ T8657] ? mm_init+0x807/0x960 [ 2699.503843][ T8657] dup_mm+0x91/0x330 [ 2699.507574][ T8657] copy_mm+0x108/0x1b0 [ 2699.511478][ T8657] copy_process+0x1295/0x3250 [ 2699.515999][ T8657] ? proc_fail_nth_write+0x213/0x290 [ 2699.521119][ T8657] ? proc_fail_nth_read+0x220/0x220 [ 2699.526146][ T8657] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2699.531095][ T8657] ? vfs_write+0x9af/0x1050 [ 2699.535432][ T8657] ? vmacache_update+0xb7/0x120 [ 2699.540123][ T8657] kernel_clone+0x22d/0x990 [ 2699.544459][ T8657] ? file_end_write+0x1b0/0x1b0 [ 2699.549147][ T8657] ? __kasan_check_write+0x14/0x20 [ 2699.554097][ T8657] ? create_io_thread+0x1e0/0x1e0 [ 2699.558968][ T8657] ? __mutex_lock_slowpath+0x10/0x10 [ 2699.564076][ T8657] __x64_sys_clone+0x289/0x310 [ 2699.568688][ T8657] ? __do_sys_vfork+0x130/0x130 [ 2699.573377][ T8657] ? debug_smp_processor_id+0x17/0x20 [ 2699.578572][ T8657] do_syscall_64+0x44/0xd0 [ 2699.582821][ T8657] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2699.588549][ T8657] RIP: 0033:0x7fc683db00c9 [ 2699.592812][ T8657] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2699.612247][ T8657] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2699.620493][ T8657] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2699.628302][ T8657] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2699.636117][ T8657] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:37 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x74000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4801}, 0x48) 00:44:37 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xf0ff1f00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xe, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2699.643924][ T8657] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2699.651738][ T8657] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2699.659552][ T8657] 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0x7a000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2699.709372][ T8690] FAULT_INJECTION: forcing a failure. [ 2699.709372][ T8690] name failslab, interval 1, probability 0, space 0, times 0 [ 2699.733892][ T8690] CPU: 1 PID: 8690 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2699.743884][ T8690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2699.753785][ T8690] Call Trace: [ 2699.756904][ T8690] [ 2699.759681][ T8690] dump_stack_lvl+0x151/0x1b7 [ 2699.764192][ T8690] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2699.769490][ T8690] dump_stack+0x15/0x17 [ 2699.773477][ T8690] should_fail+0x3c0/0x510 [ 2699.777732][ T8690] __should_failslab+0x9f/0xe0 [ 2699.782329][ T8690] should_failslab+0x9/0x20 [ 2699.786668][ T8690] kmem_cache_alloc+0x4f/0x2f0 [ 2699.791268][ T8690] ? vm_area_dup+0x26/0x1d0 [ 2699.795607][ T8690] vm_area_dup+0x26/0x1d0 [ 2699.799771][ T8690] dup_mmap+0x6b8/0xea0 [ 2699.803768][ T8690] ? __delayed_free_task+0x20/0x20 [ 2699.808721][ T8690] ? mm_init+0x807/0x960 [ 2699.812796][ T8690] dup_mm+0x91/0x330 [ 2699.816527][ T8690] copy_mm+0x108/0x1b0 [ 2699.820431][ T8690] copy_process+0x1295/0x3250 [ 2699.824943][ T8690] ? proc_fail_nth_write+0x213/0x290 [ 2699.830066][ T8690] ? proc_fail_nth_read+0x220/0x220 [ 2699.835100][ T8690] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2699.840045][ T8690] ? vfs_write+0x9af/0x1050 [ 2699.844385][ T8690] ? vmacache_update+0xb7/0x120 [ 2699.849072][ T8690] kernel_clone+0x22d/0x990 [ 2699.853414][ T8690] ? file_end_write+0x1b0/0x1b0 [ 2699.858101][ T8690] ? __kasan_check_write+0x14/0x20 [ 2699.863047][ T8690] ? create_io_thread+0x1e0/0x1e0 [ 2699.867909][ T8690] ? __mutex_lock_slowpath+0x10/0x10 [ 2699.873027][ T8690] __x64_sys_clone+0x289/0x310 [ 2699.877626][ T8690] ? __do_sys_vfork+0x130/0x130 [ 2699.882314][ T8690] ? debug_smp_processor_id+0x17/0x20 [ 2699.887521][ T8690] do_syscall_64+0x44/0xd0 [ 2699.891774][ T8690] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2699.897499][ T8690] RIP: 0033:0x7fc683db00c9 [ 2699.901757][ T8690] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2699.921196][ T8690] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2699.929441][ T8690] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2699.937253][ T8690] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2699.945064][ T8690] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x5f5e0ff, 0xc5, 0x1}, 0x20) 00:44:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4802}, 0x48) 00:44:37 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x64, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xc4000000}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) 00:44:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4803}, 0x48) 00:44:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x7b, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {0x0, 0xffff0f00}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4a00}, 0x48) 00:44:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x94, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2699.952875][ T8690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2699.960684][ T8690] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2699.968498][ T8690] 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x2000004e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x2}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x3}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2700.022273][ T8715] FAULT_INJECTION: forcing a failure. [ 2700.022273][ T8715] name failslab, interval 1, probability 0, space 0, times 0 [ 2700.038431][ T8715] CPU: 1 PID: 8715 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2700.048418][ T8715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2700.058312][ T8715] Call Trace: [ 2700.061440][ T8715] [ 2700.064212][ T8715] dump_stack_lvl+0x151/0x1b7 00:44:37 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2700.068723][ T8715] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2700.074021][ T8715] dump_stack+0x15/0x17 [ 2700.078009][ T8715] should_fail+0x3c0/0x510 [ 2700.082273][ T8715] __should_failslab+0x9f/0xe0 [ 2700.086861][ T8715] should_failslab+0x9/0x20 [ 2700.091203][ T8715] kmem_cache_alloc+0x4f/0x2f0 [ 2700.095805][ T8715] ? vm_area_dup+0x26/0x1d0 [ 2700.100143][ T8715] ? __kasan_check_read+0x11/0x20 [ 2700.105004][ T8715] vm_area_dup+0x26/0x1d0 [ 2700.109170][ T8715] dup_mmap+0x6b8/0xea0 [ 2700.113161][ T8715] ? __delayed_free_task+0x20/0x20 [ 2700.118108][ T8715] ? mm_init+0x807/0x960 [ 2700.122186][ T8715] dup_mm+0x91/0x330 [ 2700.125921][ T8715] copy_mm+0x108/0x1b0 [ 2700.129827][ T8715] copy_process+0x1295/0x3250 [ 2700.134341][ T8715] ? proc_fail_nth_write+0x213/0x290 [ 2700.139461][ T8715] ? proc_fail_nth_read+0x220/0x220 [ 2700.144489][ T8715] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2700.149433][ T8715] ? vfs_write+0x9af/0x1050 [ 2700.153774][ T8715] ? vmacache_update+0xb7/0x120 [ 2700.158462][ T8715] kernel_clone+0x22d/0x990 [ 2700.162801][ T8715] ? file_end_write+0x1b0/0x1b0 [ 2700.167488][ T8715] ? __kasan_check_write+0x14/0x20 [ 2700.172435][ T8715] ? create_io_thread+0x1e0/0x1e0 [ 2700.177295][ T8715] ? __mutex_lock_slowpath+0x10/0x10 [ 2700.182415][ T8715] __x64_sys_clone+0x289/0x310 [ 2700.187020][ T8715] ? __do_sys_vfork+0x130/0x130 [ 2700.191705][ T8715] ? debug_smp_processor_id+0x17/0x20 [ 2700.196908][ T8715] do_syscall_64+0x44/0xd0 [ 2700.201161][ T8715] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2700.206891][ T8715] RIP: 0033:0x7fc683db00c9 [ 2700.211144][ T8715] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2700.230585][ T8715] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2700.238831][ T8715] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2700.246641][ T8715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2700.254454][ T8715] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2700.262792][ T8715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:37 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x4}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa0, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4a01}, 0x48) 00:44:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x2}, 0x20) 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x5}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x8}, 0x20) 00:44:37 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4a02}, 0x48) [ 2700.270596][ T8715] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2700.278414][ T8715] [ 2700.308098][ T8742] FAULT_INJECTION: forcing a failure. [ 2700.308098][ T8742] name failslab, interval 1, probability 0, space 0, times 0 00:44:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x6}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2700.324878][ T8742] CPU: 1 PID: 8742 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2700.334867][ T8742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2700.344758][ T8742] Call Trace: [ 2700.347883][ T8742] [ 2700.350657][ T8742] dump_stack_lvl+0x151/0x1b7 [ 2700.355174][ T8742] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2700.360466][ T8742] ? do_syscall_64+0x44/0xd0 [ 2700.364896][ T8742] dump_stack+0x15/0x17 [ 2700.368885][ T8742] should_fail+0x3c0/0x510 [ 2700.373139][ T8742] __should_failslab+0x9f/0xe0 [ 2700.377739][ T8742] should_failslab+0x9/0x20 [ 2700.382075][ T8742] kmem_cache_alloc+0x4f/0x2f0 [ 2700.386680][ T8742] ? anon_vma_clone+0xa1/0x4f0 [ 2700.391278][ T8742] anon_vma_clone+0xa1/0x4f0 [ 2700.395704][ T8742] anon_vma_fork+0x91/0x4f0 [ 2700.400046][ T8742] ? anon_vma_name+0x43/0x70 [ 2700.404472][ T8742] dup_mmap+0x750/0xea0 [ 2700.408461][ T8742] ? __delayed_free_task+0x20/0x20 [ 2700.413411][ T8742] ? mm_init+0x807/0x960 [ 2700.417490][ T8742] dup_mm+0x91/0x330 [ 2700.421222][ T8742] copy_mm+0x108/0x1b0 [ 2700.425124][ T8742] copy_process+0x1295/0x3250 [ 2700.429640][ T8742] ? proc_fail_nth_write+0x213/0x290 [ 2700.434759][ T8742] ? proc_fail_nth_read+0x220/0x220 [ 2700.439795][ T8742] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2700.444740][ T8742] ? vfs_write+0x9af/0x1050 [ 2700.449076][ T8742] ? vmacache_update+0xb7/0x120 [ 2700.453764][ T8742] kernel_clone+0x22d/0x990 [ 2700.458102][ T8742] ? file_end_write+0x1b0/0x1b0 [ 2700.462789][ T8742] ? __kasan_check_write+0x14/0x20 [ 2700.467736][ T8742] ? create_io_thread+0x1e0/0x1e0 [ 2700.472597][ T8742] ? __mutex_lock_slowpath+0x10/0x10 [ 2700.477718][ T8742] __x64_sys_clone+0x289/0x310 [ 2700.482320][ T8742] ? __do_sys_vfork+0x130/0x130 [ 2700.487003][ T8742] ? debug_smp_processor_id+0x17/0x20 [ 2700.492215][ T8742] do_syscall_64+0x44/0xd0 [ 2700.496470][ T8742] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2700.502190][ T8742] RIP: 0033:0x7fc683db00c9 [ 2700.506449][ T8742] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:38 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) 00:44:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4c01}, 0x48) 00:44:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x2000009a, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0xa}, 0x20) 00:44:38 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2700.525887][ T8742] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2700.534131][ T8742] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2700.541942][ T8742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2700.549753][ T8742] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2700.557566][ T8742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2700.565374][ T8742] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2700.573192][ T8742] 00:44:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x7}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200000a5, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4c02}, 0x48) 00:44:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x18}, 0x20) 00:44:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x8}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4c03}, 0x48) 00:44:38 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2700.589979][ T8764] FAULT_INJECTION: forcing a failure. [ 2700.589979][ T8764] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2700.611285][ T8764] CPU: 1 PID: 8764 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2700.621268][ T8764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2700.631165][ T8764] Call Trace: [ 2700.634287][ T8764] [ 2700.637065][ T8764] dump_stack_lvl+0x151/0x1b7 [ 2700.641579][ T8764] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2700.646876][ T8764] dump_stack+0x15/0x17 [ 2700.650862][ T8764] should_fail+0x3c0/0x510 [ 2700.655119][ T8764] should_fail_alloc_page+0x58/0x70 [ 2700.660151][ T8764] __alloc_pages+0x1de/0x7c0 [ 2700.664580][ T8764] ? __count_vm_events+0x30/0x30 [ 2700.669355][ T8764] ? __this_cpu_preempt_check+0x13/0x20 [ 2700.674729][ T8764] ? __mod_node_page_state+0xac/0xf0 [ 2700.679848][ T8764] pte_alloc_one+0x73/0x1b0 [ 2700.684188][ T8764] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2700.689224][ T8764] __pte_alloc+0x86/0x350 [ 2700.693565][ T8764] ? free_pgtables+0x210/0x210 [ 2700.698159][ T8764] ? _raw_spin_lock+0xa3/0x1b0 [ 2700.702764][ T8764] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2700.707968][ T8764] ? __kernel_text_address+0x9a/0x110 [ 2700.713185][ T8764] copy_pte_range+0x1b1f/0x20b0 [ 2700.717864][ T8764] ? __kunmap_atomic+0x80/0x80 [ 2700.722462][ T8764] ? __kasan_slab_alloc+0xc4/0xe0 [ 2700.727331][ T8764] ? __kasan_slab_alloc+0xb2/0xe0 [ 2700.732185][ T8764] ? kmem_cache_alloc+0x189/0x2f0 [ 2700.737043][ T8764] ? vm_area_dup+0x26/0x1d0 [ 2700.741386][ T8764] ? dup_mmap+0x6b8/0xea0 [ 2700.745549][ T8764] ? dup_mm+0x91/0x330 [ 2700.749454][ T8764] ? copy_mm+0x108/0x1b0 [ 2700.753533][ T8764] ? copy_process+0x1295/0x3250 [ 2700.758221][ T8764] ? kernel_clone+0x22d/0x990 [ 2700.762733][ T8764] ? __x64_sys_clone+0x289/0x310 [ 2700.767507][ T8764] ? do_syscall_64+0x44/0xd0 [ 2700.771933][ T8764] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2700.777841][ T8764] copy_page_range+0xc1e/0x1090 [ 2700.782525][ T8764] ? pfn_valid+0x1e0/0x1e0 [ 2700.786777][ T8764] dup_mmap+0x99f/0xea0 [ 2700.790768][ T8764] ? __delayed_free_task+0x20/0x20 [ 2700.795717][ T8764] ? mm_init+0x807/0x960 [ 2700.799795][ T8764] dup_mm+0x91/0x330 [ 2700.803526][ T8764] copy_mm+0x108/0x1b0 [ 2700.807435][ T8764] copy_process+0x1295/0x3250 [ 2700.811951][ T8764] ? proc_fail_nth_write+0x213/0x290 [ 2700.817068][ T8764] ? proc_fail_nth_read+0x220/0x220 [ 2700.822100][ T8764] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2700.827047][ T8764] ? vfs_write+0x9af/0x1050 [ 2700.831387][ T8764] ? vmacache_update+0xb7/0x120 [ 2700.836076][ T8764] kernel_clone+0x22d/0x990 [ 2700.840412][ T8764] ? file_end_write+0x1b0/0x1b0 [ 2700.845100][ T8764] ? __kasan_check_write+0x14/0x20 [ 2700.850047][ T8764] ? create_io_thread+0x1e0/0x1e0 [ 2700.854907][ T8764] ? __mutex_lock_slowpath+0x10/0x10 [ 2700.860027][ T8764] __x64_sys_clone+0x289/0x310 [ 2700.864628][ T8764] ? __do_sys_vfork+0x130/0x130 [ 2700.869318][ T8764] ? debug_smp_processor_id+0x17/0x20 [ 2700.874523][ T8764] do_syscall_64+0x44/0xd0 [ 2700.878775][ T8764] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2700.884502][ T8764] RIP: 0033:0x7fc683db00c9 [ 2700.888756][ T8764] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2700.908196][ T8764] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2700.916529][ T8764] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2700.924340][ T8764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2700.932151][ T8764] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:38 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 00:44:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4e00}, 0x48) 00:44:38 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3ee}, 0x20) 00:44:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200000e1, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x9}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4e01}, 0x48) [ 2700.939961][ T8764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2700.947774][ T8764] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2700.955593][ T8764] 00:44:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xa}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f2}, 0x20) 00:44:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xb}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x18, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2700.982229][ T8796] FAULT_INJECTION: forcing a failure. [ 2700.982229][ T8796] name failslab, interval 1, probability 0, space 0, times 0 [ 2700.998853][ T8796] CPU: 1 PID: 8796 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2701.008831][ T8796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2701.018727][ T8796] Call Trace: [ 2701.021855][ T8796] [ 2701.024628][ T8796] dump_stack_lvl+0x151/0x1b7 [ 2701.029141][ T8796] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2701.034436][ T8796] dump_stack+0x15/0x17 [ 2701.038428][ T8796] should_fail+0x3c0/0x510 [ 2701.042682][ T8796] __should_failslab+0x9f/0xe0 [ 2701.047277][ T8796] should_failslab+0x9/0x20 [ 2701.051614][ T8796] kmem_cache_alloc+0x4f/0x2f0 [ 2701.056214][ T8796] ? anon_vma_clone+0xa1/0x4f0 [ 2701.060814][ T8796] anon_vma_clone+0xa1/0x4f0 [ 2701.065243][ T8796] anon_vma_fork+0x91/0x4f0 [ 2701.069582][ T8796] ? anon_vma_name+0x43/0x70 [ 2701.074008][ T8796] dup_mmap+0x750/0xea0 [ 2701.078000][ T8796] ? __delayed_free_task+0x20/0x20 [ 2701.082946][ T8796] ? mm_init+0x807/0x960 [ 2701.087026][ T8796] dup_mm+0x91/0x330 [ 2701.090757][ T8796] copy_mm+0x108/0x1b0 [ 2701.094663][ T8796] copy_process+0x1295/0x3250 [ 2701.099181][ T8796] ? proc_fail_nth_write+0x213/0x290 [ 2701.104305][ T8796] ? proc_fail_nth_read+0x220/0x220 [ 2701.109331][ T8796] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2701.114277][ T8796] ? vfs_write+0x9af/0x1050 [ 2701.118623][ T8796] ? vmacache_update+0xb7/0x120 [ 2701.123306][ T8796] kernel_clone+0x22d/0x990 [ 2701.127643][ T8796] ? file_end_write+0x1b0/0x1b0 [ 2701.132329][ T8796] ? __kasan_check_write+0x14/0x20 [ 2701.137280][ T8796] ? create_io_thread+0x1e0/0x1e0 [ 2701.142137][ T8796] ? __mutex_lock_slowpath+0x10/0x10 [ 2701.147259][ T8796] __x64_sys_clone+0x289/0x310 [ 2701.151859][ T8796] ? __do_sys_vfork+0x130/0x130 [ 2701.156546][ T8796] ? debug_smp_processor_id+0x17/0x20 [ 2701.161752][ T8796] do_syscall_64+0x44/0xd0 [ 2701.166016][ T8796] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2701.171738][ T8796] RIP: 0033:0x7fc683db00c9 [ 2701.175992][ T8796] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2701.195560][ T8796] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2701.203793][ T8796] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2701.211603][ T8796] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2701.219417][ T8796] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:38 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 00:44:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4e02}, 0x48) 00:44:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f3}, 0x20) 00:44:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3fe, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xc}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:38 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f4}, 0x20) 00:44:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4e03}, 0x48) 00:44:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xd}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x20000111, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f5}, 0x20) 00:44:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xe}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2701.227225][ T8796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2701.235035][ T8796] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2701.242849][ T8796] [ 2701.269751][ T8815] FAULT_INJECTION: forcing a failure. [ 2701.269751][ T8815] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2701.295318][ T8815] CPU: 0 PID: 8815 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2701.305313][ T8815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2701.315200][ T8815] Call Trace: [ 2701.318321][ T8815] [ 2701.321097][ T8815] dump_stack_lvl+0x151/0x1b7 [ 2701.325614][ T8815] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2701.330908][ T8815] dump_stack+0x15/0x17 [ 2701.334900][ T8815] should_fail+0x3c0/0x510 [ 2701.339151][ T8815] should_fail_alloc_page+0x58/0x70 [ 2701.344186][ T8815] __alloc_pages+0x1de/0x7c0 [ 2701.348613][ T8815] ? __count_vm_events+0x30/0x30 [ 2701.353387][ T8815] ? __this_cpu_preempt_check+0x13/0x20 [ 2701.358766][ T8815] pte_alloc_one+0x73/0x1b0 [ 2701.363112][ T8815] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2701.368225][ T8815] ? preempt_schedule+0xd9/0xe0 [ 2701.372912][ T8815] ? preempt_schedule_common+0xcb/0x100 [ 2701.378303][ T8815] __pte_alloc+0x86/0x350 [ 2701.382461][ T8815] ? free_pgtables+0x210/0x210 [ 2701.387061][ T8815] ? _raw_spin_lock+0xa3/0x1b0 [ 2701.391659][ T8815] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2701.396868][ T8815] ? preempt_schedule_thunk+0x16/0x18 [ 2701.402080][ T8815] copy_pte_range+0x1b1f/0x20b0 [ 2701.406765][ T8815] ? __kunmap_atomic+0x80/0x80 [ 2701.411364][ T8815] ? __kasan_slab_alloc+0xc4/0xe0 [ 2701.416222][ T8815] ? __kasan_slab_alloc+0xb2/0xe0 [ 2701.421081][ T8815] ? kmem_cache_alloc+0x189/0x2f0 [ 2701.425943][ T8815] ? vm_area_dup+0x26/0x1d0 [ 2701.430285][ T8815] ? dup_mmap+0x6b8/0xea0 [ 2701.434453][ T8815] ? dup_mm+0x91/0x330 [ 2701.438353][ T8815] ? copy_mm+0x108/0x1b0 [ 2701.442434][ T8815] ? copy_process+0x1295/0x3250 [ 2701.447125][ T8815] ? kernel_clone+0x22d/0x990 [ 2701.451635][ T8815] ? __x64_sys_clone+0x289/0x310 [ 2701.456407][ T8815] ? do_syscall_64+0x44/0xd0 [ 2701.460833][ T8815] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2701.466736][ T8815] copy_page_range+0xc1e/0x1090 [ 2701.471426][ T8815] ? pfn_valid+0x1e0/0x1e0 [ 2701.475676][ T8815] dup_mmap+0x99f/0xea0 [ 2701.479671][ T8815] ? __delayed_free_task+0x20/0x20 [ 2701.484616][ T8815] ? mm_init+0x807/0x960 [ 2701.488694][ T8815] dup_mm+0x91/0x330 [ 2701.492425][ T8815] copy_mm+0x108/0x1b0 [ 2701.496330][ T8815] copy_process+0x1295/0x3250 [ 2701.500844][ T8815] ? proc_fail_nth_write+0x213/0x290 [ 2701.505965][ T8815] ? proc_fail_nth_read+0x220/0x220 [ 2701.511005][ T8815] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2701.515945][ T8815] ? vfs_write+0x9af/0x1050 [ 2701.520285][ T8815] ? vmacache_update+0xb7/0x120 [ 2701.524973][ T8815] kernel_clone+0x22d/0x990 [ 2701.529313][ T8815] ? file_end_write+0x1b0/0x1b0 [ 2701.533997][ T8815] ? __kasan_check_write+0x14/0x20 [ 2701.539034][ T8815] ? create_io_thread+0x1e0/0x1e0 [ 2701.543893][ T8815] ? __mutex_lock_slowpath+0x10/0x10 [ 2701.549015][ T8815] __x64_sys_clone+0x289/0x310 [ 2701.553613][ T8815] ? __do_sys_vfork+0x130/0x130 [ 2701.558300][ T8815] ? debug_smp_processor_id+0x17/0x20 [ 2701.563507][ T8815] do_syscall_64+0x44/0xd0 [ 2701.567766][ T8815] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2701.573490][ T8815] RIP: 0033:0x7fc683db00c9 [ 2701.577743][ T8815] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2701.597183][ T8815] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2701.605435][ T8815] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2701.613240][ T8815] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2701.621052][ T8815] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2701.628862][ T8815] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2701.636672][ T8815] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 00:44:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5000}, 0x48) 00:44:39 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x4d03000000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f6}, 0x20) 00:44:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x10}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:39 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 00:44:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2000012c, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3fd}, 0x20) 00:44:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x11}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5001}, 0x48) [ 2701.644492][ T8815] 00:44:39 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3fe}, 0x20) 00:44:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x12}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2701.700729][ T8857] FAULT_INJECTION: forcing a failure. [ 2701.700729][ T8857] name failslab, interval 1, probability 0, space 0, times 0 [ 2701.713844][ T8857] CPU: 0 PID: 8857 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2701.723997][ T8857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2701.733889][ T8857] Call Trace: [ 2701.737010][ T8857] [ 2701.739788][ T8857] dump_stack_lvl+0x151/0x1b7 [ 2701.744300][ T8857] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2701.749597][ T8857] dump_stack+0x15/0x17 [ 2701.753591][ T8857] should_fail+0x3c0/0x510 [ 2701.757843][ T8857] __should_failslab+0x9f/0xe0 [ 2701.762450][ T8857] should_failslab+0x9/0x20 [ 2701.766783][ T8857] kmem_cache_alloc+0x4f/0x2f0 [ 2701.771389][ T8857] ? anon_vma_fork+0x1b9/0x4f0 [ 2701.775990][ T8857] anon_vma_fork+0x1b9/0x4f0 [ 2701.780415][ T8857] dup_mmap+0x750/0xea0 [ 2701.784403][ T8857] ? __delayed_free_task+0x20/0x20 [ 2701.789356][ T8857] ? mm_init+0x807/0x960 [ 2701.793427][ T8857] dup_mm+0x91/0x330 [ 2701.797160][ T8857] copy_mm+0x108/0x1b0 [ 2701.801069][ T8857] copy_process+0x1295/0x3250 [ 2701.805580][ T8857] ? proc_fail_nth_write+0x213/0x290 [ 2701.810699][ T8857] ? proc_fail_nth_read+0x220/0x220 [ 2701.815731][ T8857] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2701.820680][ T8857] ? vfs_write+0x9af/0x1050 [ 2701.825017][ T8857] ? vmacache_update+0xb7/0x120 [ 2701.829704][ T8857] kernel_clone+0x22d/0x990 [ 2701.834052][ T8857] ? file_end_write+0x1b0/0x1b0 [ 2701.838743][ T8857] ? __kasan_check_write+0x14/0x20 [ 2701.843689][ T8857] ? create_io_thread+0x1e0/0x1e0 [ 2701.848544][ T8857] ? __mutex_lock_slowpath+0x10/0x10 [ 2701.853663][ T8857] __x64_sys_clone+0x289/0x310 [ 2701.858262][ T8857] ? __do_sys_vfork+0x130/0x130 [ 2701.862950][ T8857] ? debug_smp_processor_id+0x17/0x20 [ 2701.868152][ T8857] do_syscall_64+0x44/0xd0 [ 2701.872409][ T8857] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2701.878137][ T8857] RIP: 0033:0x7fc683db00c9 [ 2701.882388][ T8857] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2701.901837][ T8857] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2701.910167][ T8857] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2701.917980][ T8857] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2701.925791][ T8857] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2701.933602][ T8857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2701.941413][ T8857] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 00:44:39 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 00:44:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x2, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0xffffff}, 0x20) 00:44:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5002}, 0x48) 00:44:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x18}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:39 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xfbffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x3, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5003}, 0x48) 00:44:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x20000145}, 0x20) 00:44:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x25}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2701.949226][ T8857] 00:44:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5200}, 0x48) [ 2702.001900][ T8886] FAULT_INJECTION: forcing a failure. [ 2702.001900][ T8886] name failslab, interval 1, probability 0, space 0, times 0 [ 2702.015877][ T8886] CPU: 1 PID: 8886 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2702.025856][ T8886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2702.035753][ T8886] Call Trace: [ 2702.038879][ T8886] [ 2702.041650][ T8886] dump_stack_lvl+0x151/0x1b7 [ 2702.046164][ T8886] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2702.051476][ T8886] dump_stack+0x15/0x17 [ 2702.055451][ T8886] should_fail+0x3c0/0x510 [ 2702.059704][ T8886] __should_failslab+0x9f/0xe0 [ 2702.064306][ T8886] should_failslab+0x9/0x20 [ 2702.068861][ T8886] kmem_cache_alloc+0x4f/0x2f0 [ 2702.073459][ T8886] ? vm_area_dup+0x26/0x1d0 [ 2702.077796][ T8886] vm_area_dup+0x26/0x1d0 [ 2702.081964][ T8886] dup_mmap+0x6b8/0xea0 [ 2702.085957][ T8886] ? __delayed_free_task+0x20/0x20 [ 2702.090903][ T8886] ? mm_init+0x807/0x960 [ 2702.094982][ T8886] dup_mm+0x91/0x330 [ 2702.098716][ T8886] copy_mm+0x108/0x1b0 [ 2702.102619][ T8886] copy_process+0x1295/0x3250 [ 2702.107134][ T8886] ? proc_fail_nth_write+0x213/0x290 [ 2702.112254][ T8886] ? proc_fail_nth_read+0x220/0x220 [ 2702.117287][ T8886] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2702.122233][ T8886] ? vfs_write+0x9af/0x1050 [ 2702.126575][ T8886] ? vmacache_update+0xb7/0x120 [ 2702.131263][ T8886] kernel_clone+0x22d/0x990 [ 2702.135601][ T8886] ? file_end_write+0x1b0/0x1b0 [ 2702.140289][ T8886] ? __kasan_check_write+0x14/0x20 [ 2702.145239][ T8886] ? create_io_thread+0x1e0/0x1e0 [ 2702.150096][ T8886] ? __mutex_lock_slowpath+0x10/0x10 [ 2702.155217][ T8886] __x64_sys_clone+0x289/0x310 [ 2702.159816][ T8886] ? __do_sys_vfork+0x130/0x130 [ 2702.164509][ T8886] ? debug_smp_processor_id+0x17/0x20 [ 2702.169708][ T8886] do_syscall_64+0x44/0xd0 [ 2702.173961][ T8886] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2702.179689][ T8886] RIP: 0033:0x7fc683db00c9 [ 2702.183944][ T8886] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2702.203385][ T8886] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2702.211721][ T8886] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2702.220051][ T8886] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2702.227867][ T8886] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2702.235671][ T8886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2702.243480][ T8886] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 00:44:39 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) 00:44:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x25) 00:44:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x5, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:39 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xff0f010000000000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5201}, 0x48) 00:44:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x36}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x29) 00:44:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x43}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5202}, 0x48) 00:44:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2702.251296][ T8886] 00:44:39 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 2702.301496][ T8904] FAULT_INJECTION: forcing a failure. [ 2702.301496][ T8904] name failslab, interval 1, probability 0, space 0, times 0 [ 2702.317477][ T8904] CPU: 1 PID: 8904 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2702.327455][ T8904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2702.337361][ T8904] Call Trace: [ 2702.340474][ T8904] [ 2702.343251][ T8904] dump_stack_lvl+0x151/0x1b7 [ 2702.347761][ T8904] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2702.353057][ T8904] dump_stack+0x15/0x17 [ 2702.357049][ T8904] should_fail+0x3c0/0x510 [ 2702.361301][ T8904] __should_failslab+0x9f/0xe0 [ 2702.365908][ T8904] should_failslab+0x9/0x20 [ 2702.370243][ T8904] kmem_cache_alloc+0x4f/0x2f0 [ 2702.375274][ T8904] ? vm_area_dup+0x26/0x1d0 [ 2702.379613][ T8904] ? __kasan_check_read+0x11/0x20 [ 2702.384475][ T8904] vm_area_dup+0x26/0x1d0 [ 2702.388640][ T8904] dup_mmap+0x6b8/0xea0 [ 2702.392633][ T8904] ? __delayed_free_task+0x20/0x20 [ 2702.397580][ T8904] ? mm_init+0x807/0x960 [ 2702.401661][ T8904] dup_mm+0x91/0x330 [ 2702.405391][ T8904] copy_mm+0x108/0x1b0 [ 2702.409297][ T8904] copy_process+0x1295/0x3250 [ 2702.413811][ T8904] ? proc_fail_nth_write+0x213/0x290 [ 2702.418932][ T8904] ? proc_fail_nth_read+0x220/0x220 [ 2702.423974][ T8904] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2702.428998][ T8904] ? vfs_write+0x9af/0x1050 [ 2702.433472][ T8904] ? vmacache_update+0xb7/0x120 [ 2702.438154][ T8904] kernel_clone+0x22d/0x990 [ 2702.442491][ T8904] ? file_end_write+0x1b0/0x1b0 [ 2702.447274][ T8904] ? __kasan_check_write+0x14/0x20 [ 2702.452211][ T8904] ? create_io_thread+0x1e0/0x1e0 [ 2702.457072][ T8904] ? __mutex_lock_slowpath+0x10/0x10 [ 2702.462193][ T8904] __x64_sys_clone+0x289/0x310 [ 2702.466802][ T8904] ? __do_sys_vfork+0x130/0x130 [ 2702.471511][ T8904] ? debug_smp_processor_id+0x17/0x20 [ 2702.476687][ T8904] do_syscall_64+0x44/0xd0 [ 2702.480939][ T8904] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2702.486670][ T8904] RIP: 0033:0x7fc683db00c9 [ 2702.490929][ T8904] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2702.510361][ T8904] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2702.518702][ T8904] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2702.526513][ T8904] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2702.534324][ T8904] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2702.542134][ T8904] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:40 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 00:44:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x200001a0) 00:44:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x48}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x2, 0x0, 0x0, 0x0) 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x8, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5401}, 0x48) 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x9, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5402}, 0x48) 00:44:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x4c}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xfffffffc, 0x1}, {}]}]}}, &(0x7f00000001c0)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xa, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:40 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x7, 0x0, 0x0, 0x0) [ 2702.549947][ T8904] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2702.557761][ T8904] [ 2702.605522][ T8933] FAULT_INJECTION: forcing a failure. [ 2702.605522][ T8933] name failslab, interval 1, probability 0, space 0, times 0 [ 2702.620568][ T8933] CPU: 0 PID: 8933 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2702.630552][ T8933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2702.640445][ T8933] Call Trace: [ 2702.643563][ T8933] [ 2702.646343][ T8933] dump_stack_lvl+0x151/0x1b7 [ 2702.650854][ T8933] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2702.656151][ T8933] dump_stack+0x15/0x17 [ 2702.660142][ T8933] should_fail+0x3c0/0x510 [ 2702.664395][ T8933] __should_failslab+0x9f/0xe0 [ 2702.668992][ T8933] should_failslab+0x9/0x20 [ 2702.673335][ T8933] kmem_cache_alloc+0x4f/0x2f0 [ 2702.677933][ T8933] ? vm_area_dup+0x26/0x1d0 [ 2702.682275][ T8933] vm_area_dup+0x26/0x1d0 [ 2702.686438][ T8933] dup_mmap+0x6b8/0xea0 [ 2702.690430][ T8933] ? __delayed_free_task+0x20/0x20 [ 2702.695378][ T8933] ? mm_init+0x807/0x960 [ 2702.699456][ T8933] dup_mm+0x91/0x330 [ 2702.703193][ T8933] copy_mm+0x108/0x1b0 [ 2702.707095][ T8933] copy_process+0x1295/0x3250 [ 2702.711610][ T8933] ? proc_fail_nth_write+0x213/0x290 [ 2702.716728][ T8933] ? proc_fail_nth_read+0x220/0x220 [ 2702.721762][ T8933] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2702.726709][ T8933] ? vfs_write+0x9af/0x1050 [ 2702.731053][ T8933] ? vmacache_update+0xb7/0x120 [ 2702.735740][ T8933] kernel_clone+0x22d/0x990 [ 2702.740076][ T8933] ? file_end_write+0x1b0/0x1b0 [ 2702.744762][ T8933] ? __kasan_check_write+0x14/0x20 [ 2702.749709][ T8933] ? create_io_thread+0x1e0/0x1e0 [ 2702.754570][ T8933] ? __mutex_lock_slowpath+0x10/0x10 [ 2702.759691][ T8933] __x64_sys_clone+0x289/0x310 [ 2702.764290][ T8933] ? __do_sys_vfork+0x130/0x130 [ 2702.768979][ T8933] ? debug_smp_processor_id+0x17/0x20 [ 2702.774186][ T8933] do_syscall_64+0x44/0xd0 [ 2702.778439][ T8933] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2702.784172][ T8933] RIP: 0033:0x7fc683db00c9 [ 2702.788420][ T8933] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2702.807860][ T8933] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2702.816105][ T8933] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2702.823916][ T8933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2702.831731][ T8933] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2702.839539][ T8933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2702.847352][ T8933] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 00:44:40 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 00:44:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xfffffffc, 0x1}, {}]}]}}, &(0x7f00000001c0)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x68}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5403}, 0x48) 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xb, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:40 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x8, 0x0, 0x0, 0x0) 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2702.855162][ T8933] 00:44:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {0xfffffffc, 0x1}, {}]}]}}, &(0x7f00000001c0)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x6c}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5600}, 0x48) 00:44:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000001c0)) 00:44:40 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x9, 0x0, 0x0, 0x0) [ 2702.882167][ T8954] FAULT_INJECTION: forcing a failure. [ 2702.882167][ T8954] name failslab, interval 1, probability 0, space 0, times 0 [ 2702.909245][ T8954] CPU: 0 PID: 8954 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2702.919240][ T8954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2702.929129][ T8954] Call Trace: [ 2702.932255][ T8954] [ 2702.935031][ T8954] dump_stack_lvl+0x151/0x1b7 [ 2702.939540][ T8954] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2702.944832][ T8954] dump_stack+0x15/0x17 [ 2702.948823][ T8954] should_fail+0x3c0/0x510 [ 2702.953077][ T8954] __should_failslab+0x9f/0xe0 [ 2702.957677][ T8954] should_failslab+0x9/0x20 [ 2702.962014][ T8954] kmem_cache_alloc+0x4f/0x2f0 [ 2702.966615][ T8954] ? anon_vma_clone+0xa1/0x4f0 [ 2702.971228][ T8954] anon_vma_clone+0xa1/0x4f0 [ 2702.975642][ T8954] anon_vma_fork+0x91/0x4f0 [ 2702.979992][ T8954] ? anon_vma_name+0x43/0x70 [ 2702.984409][ T8954] dup_mmap+0x750/0xea0 [ 2702.988401][ T8954] ? __delayed_free_task+0x20/0x20 [ 2702.993347][ T8954] ? mm_init+0x807/0x960 [ 2702.997426][ T8954] dup_mm+0x91/0x330 [ 2703.001160][ T8954] copy_mm+0x108/0x1b0 [ 2703.005063][ T8954] copy_process+0x1295/0x3250 [ 2703.009578][ T8954] ? proc_fail_nth_write+0x213/0x290 [ 2703.014697][ T8954] ? proc_fail_nth_read+0x220/0x220 [ 2703.019828][ T8954] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2703.024772][ T8954] ? vfs_write+0x9af/0x1050 [ 2703.029107][ T8954] ? vmacache_update+0xb7/0x120 [ 2703.033794][ T8954] kernel_clone+0x22d/0x990 [ 2703.038133][ T8954] ? file_end_write+0x1b0/0x1b0 [ 2703.042906][ T8954] ? __kasan_check_write+0x14/0x20 [ 2703.047852][ T8954] ? create_io_thread+0x1e0/0x1e0 [ 2703.052715][ T8954] ? __mutex_lock_slowpath+0x10/0x10 [ 2703.057840][ T8954] __x64_sys_clone+0x289/0x310 [ 2703.062438][ T8954] ? __do_sys_vfork+0x130/0x130 [ 2703.067124][ T8954] ? debug_smp_processor_id+0x17/0x20 [ 2703.072331][ T8954] do_syscall_64+0x44/0xd0 [ 2703.076582][ T8954] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2703.082312][ T8954] RIP: 0033:0x7fc683db00c9 [ 2703.086565][ T8954] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2703.106004][ T8954] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2703.114248][ T8954] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2703.122061][ T8954] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:40 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 00:44:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x74}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5601}, 0x48) 00:44:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000001c0)) 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xd, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:40 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x11, 0x0, 0x0, 0x0) 00:44:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000001c0)) (async) 00:44:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5602}, 0x48) 00:44:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x7a}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x34d, 0x0, 0x0, 0x0) [ 2703.129870][ T8954] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2703.137718][ T8954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2703.145495][ T8954] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2703.153309][ T8954] 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xe, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x10, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2703.186792][ T8985] FAULT_INJECTION: forcing a failure. [ 2703.186792][ T8985] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.208128][ T8985] CPU: 0 PID: 8985 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2703.218110][ T8985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2703.228005][ T8985] Call Trace: [ 2703.231128][ T8985] [ 2703.233907][ T8985] dump_stack_lvl+0x151/0x1b7 [ 2703.238421][ T8985] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2703.243715][ T8985] dump_stack+0x15/0x17 [ 2703.247712][ T8985] should_fail+0x3c0/0x510 [ 2703.251957][ T8985] __should_failslab+0x9f/0xe0 [ 2703.256558][ T8985] should_failslab+0x9/0x20 [ 2703.260897][ T8985] kmem_cache_alloc+0x4f/0x2f0 [ 2703.265497][ T8985] ? anon_vma_clone+0xa1/0x4f0 [ 2703.270100][ T8985] anon_vma_clone+0xa1/0x4f0 [ 2703.274525][ T8985] anon_vma_fork+0x91/0x4f0 [ 2703.278862][ T8985] ? anon_vma_name+0x43/0x70 [ 2703.283292][ T8985] dup_mmap+0x750/0xea0 [ 2703.287285][ T8985] ? __delayed_free_task+0x20/0x20 [ 2703.292230][ T8985] ? mm_init+0x807/0x960 [ 2703.296309][ T8985] dup_mm+0x91/0x330 [ 2703.300043][ T8985] copy_mm+0x108/0x1b0 [ 2703.303949][ T8985] copy_process+0x1295/0x3250 [ 2703.308464][ T8985] ? proc_fail_nth_write+0x213/0x290 [ 2703.313587][ T8985] ? proc_fail_nth_read+0x220/0x220 [ 2703.318615][ T8985] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2703.323561][ T8985] ? vfs_write+0x9af/0x1050 [ 2703.327902][ T8985] ? vmacache_update+0xb7/0x120 [ 2703.332593][ T8985] kernel_clone+0x22d/0x990 [ 2703.336927][ T8985] ? file_end_write+0x1b0/0x1b0 [ 2703.341614][ T8985] ? __kasan_check_write+0x14/0x20 [ 2703.346561][ T8985] ? create_io_thread+0x1e0/0x1e0 [ 2703.351422][ T8985] ? __mutex_lock_slowpath+0x10/0x10 [ 2703.356676][ T8985] __x64_sys_clone+0x289/0x310 [ 2703.361261][ T8985] ? __do_sys_vfork+0x130/0x130 [ 2703.365951][ T8985] ? debug_smp_processor_id+0x17/0x20 [ 2703.371156][ T8985] do_syscall_64+0x44/0xd0 [ 2703.375407][ T8985] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2703.381134][ T8985] RIP: 0033:0x7fc683db00c9 [ 2703.385396][ T8985] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2703.404937][ T8985] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2703.413182][ T8985] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2703.420997][ T8985] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2703.428805][ T8985] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:40 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 00:44:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0xc4}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5603}, 0x48) 00:44:40 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x700, 0x0, 0x0, 0x0) 00:44:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x11, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:40 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) [ 2703.436702][ T8985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2703.444511][ T8985] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2703.452332][ T8985] 00:44:40 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5800}, 0x48) 00:44:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) 00:44:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x12, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x18, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:41 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x900, 0x0, 0x0, 0x0) [ 2703.545302][ T9021] FAULT_INJECTION: forcing a failure. [ 2703.545302][ T9021] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.567102][ T9021] CPU: 0 PID: 9021 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2703.577088][ T9021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2703.586985][ T9021] Call Trace: [ 2703.590107][ T9021] [ 2703.592881][ T9021] dump_stack_lvl+0x151/0x1b7 [ 2703.597394][ T9021] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2703.602690][ T9021] dump_stack+0x15/0x17 [ 2703.606681][ T9021] should_fail+0x3c0/0x510 [ 2703.610935][ T9021] __should_failslab+0x9f/0xe0 [ 2703.615535][ T9021] should_failslab+0x9/0x20 [ 2703.619873][ T9021] kmem_cache_alloc+0x4f/0x2f0 [ 2703.624472][ T9021] ? anon_vma_clone+0xa1/0x4f0 [ 2703.629073][ T9021] anon_vma_clone+0xa1/0x4f0 [ 2703.633501][ T9021] anon_vma_fork+0x91/0x4f0 [ 2703.637839][ T9021] ? anon_vma_name+0x43/0x70 [ 2703.642267][ T9021] dup_mmap+0x750/0xea0 [ 2703.646261][ T9021] ? __delayed_free_task+0x20/0x20 [ 2703.651208][ T9021] ? mm_init+0x807/0x960 [ 2703.655287][ T9021] dup_mm+0x91/0x330 [ 2703.659018][ T9021] copy_mm+0x108/0x1b0 [ 2703.662920][ T9021] copy_process+0x1295/0x3250 [ 2703.667435][ T9021] ? proc_fail_nth_write+0x213/0x290 [ 2703.672554][ T9021] ? proc_fail_nth_read+0x220/0x220 [ 2703.677586][ T9021] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2703.682534][ T9021] ? vfs_write+0x9af/0x1050 [ 2703.686871][ T9021] ? vmacache_update+0xb7/0x120 [ 2703.691559][ T9021] kernel_clone+0x22d/0x990 [ 2703.695899][ T9021] ? file_end_write+0x1b0/0x1b0 [ 2703.700585][ T9021] ? __kasan_check_write+0x14/0x20 [ 2703.705532][ T9021] ? create_io_thread+0x1e0/0x1e0 [ 2703.710394][ T9021] ? __mutex_lock_slowpath+0x10/0x10 [ 2703.715514][ T9021] __x64_sys_clone+0x289/0x310 [ 2703.720113][ T9021] ? __do_sys_vfork+0x130/0x130 [ 2703.724802][ T9021] ? debug_smp_processor_id+0x17/0x20 [ 2703.730008][ T9021] do_syscall_64+0x44/0xd0 [ 2703.734260][ T9021] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2703.739989][ T9021] RIP: 0033:0x7fc683db00c9 [ 2703.744242][ T9021] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2703.763683][ T9021] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2703.771928][ T9021] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2703.779738][ T9021] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2703.787550][ T9021] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:41 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 00:44:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x2}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5801}, 0x48) 00:44:41 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) (async) 00:44:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x25, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:41 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x1100, 0x0, 0x0, 0x0) [ 2703.795361][ T9021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2703.803173][ T9021] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2703.810987][ T9021] 00:44:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x3}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x99, 0x99, 0x7, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1, 0x4}, {0xd, 0x4}, {0xc, 0x3}, {0x4, 0x2}]}, @restrict={0x2, 0x0, 0x0, 0xb, 0x1}, @const={0xe, 0x0, 0x0, 0xa, 0x2}, @typedef={0xf, 0x0, 0x0, 0x8, 0x1}, @datasec={0x6, 0x4, 0x0, 0xf, 0x1, [{0x2, 0x0, 0x1ff}, {0x5, 0x0, 0x2}, {0x2, 0x7, 0x40}, {0x5, 0x1, 0xd03a}], "a5"}, @const={0xe}]}, {0x0, [0x61, 0x0, 0x5f, 0x61, 0x61]}}, &(0x7f0000000280)=""/18, 0xbb, 0x12}, 0x20) 00:44:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5802}, 0x48) 00:44:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x48, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x99, 0x99, 0x7, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1, 0x4}, {0xd, 0x4}, {0xc, 0x3}, {0x4, 0x2}]}, @restrict={0x2, 0x0, 0x0, 0xb, 0x1}, @const={0xe, 0x0, 0x0, 0xa, 0x2}, @typedef={0xf, 0x0, 0x0, 0x8, 0x1}, @datasec={0x6, 0x4, 0x0, 0xf, 0x1, [{0x2, 0x0, 0x1ff}, {0x5, 0x0, 0x2}, {0x2, 0x7, 0x40}, {0x5, 0x1, 0xd03a}], "a5"}, @const={0xe}]}, {0x0, [0x61, 0x0, 0x5f, 0x61, 0x61]}}, &(0x7f0000000280)=""/18, 0xbb, 0x12}, 0x20) 00:44:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5803}, 0x48) [ 2703.879693][ T9039] FAULT_INJECTION: forcing a failure. [ 2703.879693][ T9039] name failslab, interval 1, probability 0, space 0, times 0 [ 2703.908917][ T9039] CPU: 0 PID: 9039 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2703.918907][ T9039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2703.928813][ T9039] Call Trace: [ 2703.931925][ T9039] [ 2703.934705][ T9039] dump_stack_lvl+0x151/0x1b7 [ 2703.939216][ T9039] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2703.944516][ T9039] dump_stack+0x15/0x17 [ 2703.948504][ T9039] should_fail+0x3c0/0x510 [ 2703.952756][ T9039] __should_failslab+0x9f/0xe0 [ 2703.957357][ T9039] should_failslab+0x9/0x20 [ 2703.961696][ T9039] kmem_cache_alloc+0x4f/0x2f0 [ 2703.966301][ T9039] ? vm_area_dup+0x26/0x1d0 [ 2703.970635][ T9039] vm_area_dup+0x26/0x1d0 [ 2703.974802][ T9039] dup_mmap+0x6b8/0xea0 [ 2703.978792][ T9039] ? __delayed_free_task+0x20/0x20 [ 2703.983738][ T9039] ? mm_init+0x807/0x960 [ 2703.987818][ T9039] dup_mm+0x91/0x330 [ 2703.991550][ T9039] copy_mm+0x108/0x1b0 [ 2703.995456][ T9039] copy_process+0x1295/0x3250 [ 2703.999968][ T9039] ? proc_fail_nth_write+0x213/0x290 [ 2704.005092][ T9039] ? proc_fail_nth_read+0x220/0x220 [ 2704.010128][ T9039] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2704.015073][ T9039] ? vfs_write+0x9af/0x1050 [ 2704.019420][ T9039] ? vmacache_update+0xb7/0x120 [ 2704.024098][ T9039] kernel_clone+0x22d/0x990 [ 2704.028440][ T9039] ? file_end_write+0x1b0/0x1b0 [ 2704.033125][ T9039] ? __kasan_check_write+0x14/0x20 [ 2704.038073][ T9039] ? create_io_thread+0x1e0/0x1e0 [ 2704.042931][ T9039] ? __mutex_lock_slowpath+0x10/0x10 [ 2704.048054][ T9039] __x64_sys_clone+0x289/0x310 [ 2704.052654][ T9039] ? __do_sys_vfork+0x130/0x130 [ 2704.057340][ T9039] ? debug_smp_processor_id+0x17/0x20 [ 2704.062548][ T9039] do_syscall_64+0x44/0xd0 [ 2704.066798][ T9039] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2704.072527][ T9039] RIP: 0033:0x7fc683db00c9 [ 2704.076781][ T9039] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2704.096226][ T9039] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2704.104468][ T9039] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2704.112279][ T9039] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2704.120096][ T9039] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:41 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) 00:44:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x4}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4c, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5a00}, 0x48) 00:44:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x99, 0x99, 0x7, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x1, 0x4}, {0xd, 0x4}, {0xc, 0x3}, {0x4, 0x2}]}, @restrict={0x2, 0x0, 0x0, 0xb, 0x1}, @const={0xe, 0x0, 0x0, 0xa, 0x2}, @typedef={0xf, 0x0, 0x0, 0x8, 0x1}, @datasec={0x6, 0x4, 0x0, 0xf, 0x1, [{0x2, 0x0, 0x1ff}, {0x5, 0x0, 0x2}, {0x2, 0x7, 0x40}, {0x5, 0x1, 0xd03a}], "a5"}, @const={0xe}]}, {0x0, [0x61, 0x0, 0x5f, 0x61, 0x61]}}, &(0x7f0000000280)=""/18, 0xbb, 0x12}, 0x20) 00:44:41 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x1f00, 0x0, 0x0, 0x0) 00:44:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000200000000ffffff0400000d000000400b0000000000000008000000000000000000000000000000000000000000000000000000000000000000549ab1d88c484cd1f88d447b7be67c5a22920ea66c79b8a13ea0e3382044fe4364d827f5073e31a2f595ceda1f3e3e5164e6008be31ebc72ff20e45ba40a94fb50"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2704.127902][ T9039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2704.135713][ T9039] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2704.143622][ T9039] 00:44:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x68, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5a01}, 0x48) 00:44:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x5}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6c, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x6}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2704.192877][ T9065] FAULT_INJECTION: forcing a failure. [ 2704.192877][ T9065] name failslab, interval 1, probability 0, space 0, times 0 [ 2704.231741][ T9065] CPU: 0 PID: 9065 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2704.241732][ T9065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2704.251628][ T9065] Call Trace: [ 2704.254749][ T9065] [ 2704.257529][ T9065] dump_stack_lvl+0x151/0x1b7 [ 2704.262040][ T9065] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2704.267336][ T9065] dump_stack+0x15/0x17 [ 2704.271329][ T9065] should_fail+0x3c0/0x510 [ 2704.275581][ T9065] __should_failslab+0x9f/0xe0 [ 2704.280182][ T9065] should_failslab+0x9/0x20 [ 2704.284519][ T9065] kmem_cache_alloc+0x4f/0x2f0 [ 2704.289123][ T9065] ? vm_area_dup+0x26/0x1d0 [ 2704.293457][ T9065] ? __kasan_check_read+0x11/0x20 [ 2704.298326][ T9065] vm_area_dup+0x26/0x1d0 [ 2704.302489][ T9065] dup_mmap+0x6b8/0xea0 [ 2704.306479][ T9065] ? __delayed_free_task+0x20/0x20 [ 2704.311423][ T9065] ? mm_init+0x807/0x960 [ 2704.315507][ T9065] dup_mm+0x91/0x330 [ 2704.319237][ T9065] copy_mm+0x108/0x1b0 [ 2704.323143][ T9065] copy_process+0x1295/0x3250 [ 2704.327662][ T9065] ? proc_fail_nth_write+0x213/0x290 [ 2704.332776][ T9065] ? proc_fail_nth_read+0x220/0x220 [ 2704.337810][ T9065] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2704.342758][ T9065] ? vfs_write+0x9af/0x1050 [ 2704.347097][ T9065] ? vmacache_update+0xb7/0x120 [ 2704.351906][ T9065] kernel_clone+0x22d/0x990 [ 2704.356244][ T9065] ? file_end_write+0x1b0/0x1b0 [ 2704.360929][ T9065] ? __kasan_check_write+0x14/0x20 [ 2704.365976][ T9065] ? create_io_thread+0x1e0/0x1e0 [ 2704.370840][ T9065] ? __mutex_lock_slowpath+0x10/0x10 [ 2704.375959][ T9065] __x64_sys_clone+0x289/0x310 [ 2704.380559][ T9065] ? __do_sys_vfork+0x130/0x130 [ 2704.385244][ T9065] ? debug_smp_processor_id+0x17/0x20 [ 2704.390463][ T9065] do_syscall_64+0x44/0xd0 [ 2704.394705][ T9065] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2704.400432][ T9065] RIP: 0033:0x7fc683db00c9 [ 2704.404686][ T9065] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2704.424127][ T9065] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2704.432372][ T9065] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:41 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 00:44:41 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x2000, 0x0, 0x0, 0x0) 00:44:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000200000000ffffff0400000d000000400b0000000000000008000000000000000000000000000000000000000000000000000000000000000000549ab1d88c484cd1f88d447b7be67c5a22920ea66c79b8a13ea0e3382044fe4364d827f5073e31a2f595ceda1f3e3e5164e6008be31ebc72ff20e45ba40a94fb50"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000200000000ffffff0400000d000000400b0000000000000008000000000000000000000000000000000000000000000000000000000000000000549ab1d88c484cd1f88d447b7be67c5a22920ea66c79b8a13ea0e3382044fe4364d827f5073e31a2f595ceda1f3e3e5164e6008be31ebc72ff20e45ba40a94fb50"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) 00:44:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5a02}, 0x48) 00:44:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x7}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x74, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5c01}, 0x48) 00:44:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000200000000ffffff0400000d000000400b0000000000000008000000000000000000000000000000000000000000000000000000000000000000549ab1d88c484cd1f88d447b7be67c5a22920ea66c79b8a13ea0e3382044fe4364d827f5073e31a2f595ceda1f3e3e5164e6008be31ebc72ff20e45ba40a94fb50"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2704.440187][ T9065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2704.447994][ T9065] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2704.455807][ T9065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2704.463616][ T9065] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2704.471433][ T9065] 00:44:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5c02}, 0x48) 00:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x8}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:42 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x4d03, 0x0, 0x0, 0x0) 00:44:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000200)=""/205, 0x4e, 0xcd, 0x1}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) [ 2704.534307][ T9092] FAULT_INJECTION: forcing a failure. [ 2704.534307][ T9092] name failslab, interval 1, probability 0, space 0, times 0 [ 2704.591950][ T9092] CPU: 1 PID: 9092 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2704.601939][ T9092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2704.611837][ T9092] Call Trace: [ 2704.614956][ T9092] [ 2704.617732][ T9092] dump_stack_lvl+0x151/0x1b7 [ 2704.622249][ T9092] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2704.627541][ T9092] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2704.633874][ T9092] dump_stack+0x15/0x17 [ 2704.637869][ T9092] should_fail+0x3c0/0x510 [ 2704.642123][ T9092] __should_failslab+0x9f/0xe0 [ 2704.646722][ T9092] should_failslab+0x9/0x20 [ 2704.651062][ T9092] kmem_cache_alloc+0x4f/0x2f0 [ 2704.655660][ T9092] ? anon_vma_fork+0xf7/0x4f0 [ 2704.660176][ T9092] anon_vma_fork+0xf7/0x4f0 [ 2704.664520][ T9092] ? anon_vma_name+0x43/0x70 [ 2704.668941][ T9092] dup_mmap+0x750/0xea0 [ 2704.672936][ T9092] ? __delayed_free_task+0x20/0x20 [ 2704.677890][ T9092] ? mm_init+0x807/0x960 [ 2704.681962][ T9092] dup_mm+0x91/0x330 [ 2704.685693][ T9092] copy_mm+0x108/0x1b0 [ 2704.689597][ T9092] copy_process+0x1295/0x3250 [ 2704.694109][ T9092] ? proc_fail_nth_write+0x213/0x290 [ 2704.699230][ T9092] ? proc_fail_nth_read+0x220/0x220 [ 2704.704266][ T9092] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2704.709213][ T9092] ? vfs_write+0x9af/0x1050 [ 2704.713551][ T9092] ? vmacache_update+0xb7/0x120 [ 2704.718240][ T9092] kernel_clone+0x22d/0x990 [ 2704.722578][ T9092] ? file_end_write+0x1b0/0x1b0 [ 2704.727265][ T9092] ? __kasan_check_write+0x14/0x20 [ 2704.732214][ T9092] ? create_io_thread+0x1e0/0x1e0 [ 2704.737070][ T9092] ? __mutex_lock_slowpath+0x10/0x10 [ 2704.742192][ T9092] __x64_sys_clone+0x289/0x310 [ 2704.746791][ T9092] ? __do_sys_vfork+0x130/0x130 [ 2704.751480][ T9092] ? debug_smp_processor_id+0x17/0x20 [ 2704.756686][ T9092] do_syscall_64+0x44/0xd0 [ 2704.760938][ T9092] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2704.766671][ T9092] RIP: 0033:0x7fc683db00c9 [ 2704.770925][ T9092] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:42 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 00:44:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000200)=""/205, 0x4e, 0xcd, 0x1}, 0x20) (async) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) 00:44:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7a, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x9}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5c03}, 0x48) 00:44:42 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x10fff, 0x0, 0x0, 0x0) 00:44:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc4, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2704.790362][ T9092] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2704.798607][ T9092] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2704.806418][ T9092] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2704.814237][ T9092] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2704.822040][ T9092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2704.829854][ T9092] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2704.837664][ T9092] 00:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xa}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5e00}, 0x48) 00:44:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000200)=""/205, 0x4e, 0xcd, 0x1}, 0x20) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) 00:44:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f00000001c0)=0x200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1f, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xc19b}, [@alu={0x4, 0x1, 0x3, 0xb, 0x5, 0x4, 0xffffffffffffffff}, @alu={0x4, 0x1, 0x8, 0x2, 0x6, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0xf7, &(0x7f00000002c0)=""/247, 0x41000, 0x10, '\x00', 0x0, 0x21, r0, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x7, 0xc4, 0x2}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[r0, r0, 0x1, 0x1, r0, r0, r0, r0]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r1}, 0x10) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000540)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000580)) 00:44:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5e01}, 0x48) [ 2704.898922][ T9123] FAULT_INJECTION: forcing a failure. [ 2704.898922][ T9123] name failslab, interval 1, probability 0, space 0, times 0 [ 2704.936334][ T9123] CPU: 0 PID: 9123 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2704.946327][ T9123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2704.956237][ T9123] Call Trace: [ 2704.959344][ T9123] [ 2704.962122][ T9123] dump_stack_lvl+0x151/0x1b7 [ 2704.966636][ T9123] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2704.971936][ T9123] dump_stack+0x15/0x17 [ 2704.975927][ T9123] should_fail+0x3c0/0x510 [ 2704.980203][ T9123] __should_failslab+0x9f/0xe0 [ 2704.984775][ T9123] should_failslab+0x9/0x20 [ 2704.989110][ T9123] kmem_cache_alloc+0x4f/0x2f0 [ 2704.993710][ T9123] ? anon_vma_clone+0xa1/0x4f0 [ 2704.998311][ T9123] anon_vma_clone+0xa1/0x4f0 [ 2705.002737][ T9123] anon_vma_fork+0x91/0x4f0 [ 2705.007080][ T9123] ? anon_vma_name+0x4c/0x70 [ 2705.011502][ T9123] dup_mmap+0x750/0xea0 [ 2705.015496][ T9123] ? __delayed_free_task+0x20/0x20 [ 2705.020442][ T9123] ? mm_init+0x807/0x960 [ 2705.024529][ T9123] dup_mm+0x91/0x330 [ 2705.028255][ T9123] copy_mm+0x108/0x1b0 [ 2705.032161][ T9123] copy_process+0x1295/0x3250 [ 2705.036675][ T9123] ? proc_fail_nth_write+0x213/0x290 [ 2705.041792][ T9123] ? proc_fail_nth_read+0x220/0x220 [ 2705.046829][ T9123] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2705.051773][ T9123] ? vfs_write+0x9af/0x1050 [ 2705.056113][ T9123] ? vmacache_update+0xb7/0x120 [ 2705.060799][ T9123] kernel_clone+0x22d/0x990 [ 2705.065139][ T9123] ? file_end_write+0x1b0/0x1b0 [ 2705.069829][ T9123] ? __kasan_check_write+0x14/0x20 [ 2705.074774][ T9123] ? create_io_thread+0x1e0/0x1e0 [ 2705.079635][ T9123] ? __mutex_lock_slowpath+0x10/0x10 [ 2705.084761][ T9123] __x64_sys_clone+0x289/0x310 [ 2705.089356][ T9123] ? __do_sys_vfork+0x130/0x130 [ 2705.094055][ T9123] ? debug_smp_processor_id+0x17/0x20 [ 2705.099252][ T9123] do_syscall_64+0x44/0xd0 [ 2705.103502][ T9123] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2705.109353][ T9123] RIP: 0033:0x7fc683db00c9 [ 2705.113603][ T9123] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2705.133043][ T9123] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2705.141288][ T9123] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:42 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 00:44:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x300, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xb}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:42 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x20010, 0x0, 0x0, 0x0) 00:44:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f00000001c0)=0x200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1f, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xc19b}, [@alu={0x4, 0x1, 0x3, 0xb, 0x5, 0x4, 0xffffffffffffffff}, @alu={0x4, 0x1, 0x8, 0x2, 0x6, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0xf7, &(0x7f00000002c0)=""/247, 0x41000, 0x10, '\x00', 0x0, 0x21, r0, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x7, 0xc4, 0x2}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[r0, r0, 0x1, 0x1, r0, r0, r0, r0]}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r1}, 0x10) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000540)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000580)) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f00000001c0)=0x200) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1f, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xc19b}, [@alu={0x4, 0x1, 0x3, 0xb, 0x5, 0x4, 0xffffffffffffffff}, @alu={0x4, 0x1, 0x8, 0x2, 0x6, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0xf7, &(0x7f00000002c0)=""/247, 0x41000, 0x10, '\x00', 0x0, 0x21, r0, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x7, 0xc4, 0x2}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[r0, r0, 0x1, 0x1, r0, r0, r0, r0]}, 0x80) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r1}, 0x10) (async) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000540)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) (async) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000580)) (async) 00:44:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5e02}, 0x48) 00:44:42 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) ioctl$TUNSETDEBUG(r0, 0x400454c9, &(0x7f00000001c0)=0x200) (async, rerun: 64) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1f, 0x5, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0xc19b}, [@alu={0x4, 0x1, 0x3, 0xb, 0x5, 0x4, 0xffffffffffffffff}, @alu={0x4, 0x1, 0x8, 0x2, 0x6, 0xffffffffffffffe0, 0xfffffffffffffff0}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0xf7, &(0x7f00000002c0)=""/247, 0x41000, 0x10, '\x00', 0x0, 0x21, r0, 0x8, &(0x7f00000003c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000400)={0x2, 0x7, 0xc4, 0x2}, 0x10, 0xffffffffffffffff, r0, 0x0, &(0x7f0000000440)=[r0, r0, 0x1, 0x1, r0, r0, r0, r0]}, 0x80) (rerun: 64) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000500)={&(0x7f0000000200)='./file0\x00', r1}, 0x10) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000540)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async, rerun: 64) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (rerun: 64) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) (async) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000580)) 00:44:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x500, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5e03}, 0x48) [ 2705.149100][ T9123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2705.156910][ T9123] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2705.164723][ T9123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2705.172532][ T9123] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2705.180347][ T9123] 00:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xc}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xd}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x600, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2705.230658][ T9156] FAULT_INJECTION: forcing a failure. [ 2705.230658][ T9156] name failslab, interval 1, probability 0, space 0, times 0 [ 2705.268202][ T9156] CPU: 1 PID: 9156 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2705.278192][ T9156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2705.288087][ T9156] Call Trace: [ 2705.291205][ T9156] [ 2705.293985][ T9156] dump_stack_lvl+0x151/0x1b7 [ 2705.298507][ T9156] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2705.303792][ T9156] dump_stack+0x15/0x17 [ 2705.307785][ T9156] should_fail+0x3c0/0x510 [ 2705.312039][ T9156] __should_failslab+0x9f/0xe0 [ 2705.316636][ T9156] should_failslab+0x9/0x20 [ 2705.320974][ T9156] kmem_cache_alloc+0x4f/0x2f0 [ 2705.325574][ T9156] ? anon_vma_clone+0xa1/0x4f0 [ 2705.330175][ T9156] anon_vma_clone+0xa1/0x4f0 [ 2705.334603][ T9156] anon_vma_fork+0x91/0x4f0 [ 2705.338940][ T9156] ? anon_vma_name+0x43/0x70 [ 2705.343368][ T9156] dup_mmap+0x750/0xea0 [ 2705.347361][ T9156] ? __delayed_free_task+0x20/0x20 [ 2705.352310][ T9156] ? mm_init+0x807/0x960 [ 2705.356392][ T9156] dup_mm+0x91/0x330 [ 2705.360122][ T9156] copy_mm+0x108/0x1b0 [ 2705.364025][ T9156] copy_process+0x1295/0x3250 [ 2705.368540][ T9156] ? proc_fail_nth_write+0x213/0x290 [ 2705.373658][ T9156] ? proc_fail_nth_read+0x220/0x220 [ 2705.378696][ T9156] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2705.383639][ T9156] ? vfs_write+0x9af/0x1050 [ 2705.387980][ T9156] ? vmacache_update+0xb7/0x120 [ 2705.392667][ T9156] kernel_clone+0x22d/0x990 [ 2705.397004][ T9156] ? file_end_write+0x1b0/0x1b0 [ 2705.401693][ T9156] ? __kasan_check_write+0x14/0x20 [ 2705.406641][ T9156] ? create_io_thread+0x1e0/0x1e0 [ 2705.411501][ T9156] ? __mutex_lock_slowpath+0x10/0x10 [ 2705.416627][ T9156] __x64_sys_clone+0x289/0x310 [ 2705.421220][ T9156] ? __do_sys_vfork+0x130/0x130 [ 2705.425914][ T9156] ? debug_smp_processor_id+0x17/0x20 [ 2705.431114][ T9156] do_syscall_64+0x44/0xd0 [ 2705.435369][ T9156] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2705.441096][ T9156] RIP: 0033:0x7fc683db00c9 [ 2705.445349][ T9156] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2705.464791][ T9156] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2705.473034][ T9156] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2705.480844][ T9156] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2705.488655][ T9156] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2705.496468][ T9156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2705.504303][ T9156] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2705.512181][ T9156] 00:44:43 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 00:44:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6000}, 0x48) 00:44:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xe}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x700, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000500000d000000000b000000000000000800000000000000b8fb482cb99f50fd118ec0cfc27600"/70], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) 00:44:43 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x20200, 0x0, 0x0, 0x0) 00:44:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6001}, 0x48) 00:44:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000500000d000000000b000000000000000800000000000000b8fb482cb99f50fd118ec0cfc27600"/70], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x900, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x10}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:43 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x57000, 0x0, 0x0, 0x0) 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xa00, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2705.702783][ T9182] FAULT_INJECTION: forcing a failure. [ 2705.702783][ T9182] name failslab, interval 1, probability 0, space 0, times 0 [ 2705.729497][ T9182] CPU: 0 PID: 9182 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2705.739491][ T9182] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2705.749389][ T9182] Call Trace: [ 2705.752509][ T9182] [ 2705.755288][ T9182] dump_stack_lvl+0x151/0x1b7 [ 2705.759806][ T9182] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2705.765100][ T9182] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2705.771344][ T9182] dump_stack+0x15/0x17 [ 2705.775341][ T9182] should_fail+0x3c0/0x510 [ 2705.779600][ T9182] __should_failslab+0x9f/0xe0 [ 2705.784188][ T9182] should_failslab+0x9/0x20 [ 2705.788529][ T9182] kmem_cache_alloc+0x4f/0x2f0 [ 2705.793136][ T9182] ? anon_vma_fork+0xf7/0x4f0 [ 2705.797644][ T9182] anon_vma_fork+0xf7/0x4f0 [ 2705.801982][ T9182] ? anon_vma_name+0x4c/0x70 [ 2705.806409][ T9182] dup_mmap+0x750/0xea0 [ 2705.810402][ T9182] ? __delayed_free_task+0x20/0x20 [ 2705.815347][ T9182] ? mm_init+0x807/0x960 [ 2705.819425][ T9182] dup_mm+0x91/0x330 [ 2705.823160][ T9182] copy_mm+0x108/0x1b0 [ 2705.827064][ T9182] copy_process+0x1295/0x3250 [ 2705.831578][ T9182] ? proc_fail_nth_write+0x213/0x290 [ 2705.836704][ T9182] ? proc_fail_nth_read+0x220/0x220 [ 2705.841733][ T9182] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2705.846678][ T9182] ? vfs_write+0x9af/0x1050 [ 2705.851024][ T9182] ? vmacache_update+0xb7/0x120 [ 2705.855705][ T9182] kernel_clone+0x22d/0x990 [ 2705.860047][ T9182] ? file_end_write+0x1b0/0x1b0 [ 2705.864749][ T9182] ? __kasan_check_write+0x14/0x20 [ 2705.869697][ T9182] ? create_io_thread+0x1e0/0x1e0 [ 2705.874544][ T9182] ? __mutex_lock_slowpath+0x10/0x10 [ 2705.879660][ T9182] __x64_sys_clone+0x289/0x310 [ 2705.884266][ T9182] ? __do_sys_vfork+0x130/0x130 [ 2705.888948][ T9182] ? debug_smp_processor_id+0x17/0x20 [ 2705.894157][ T9182] do_syscall_64+0x44/0xd0 [ 2705.898413][ T9182] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2705.904137][ T9182] RIP: 0033:0x7fc683db00c9 [ 2705.908387][ T9182] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2705.927831][ T9182] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2705.936076][ T9182] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2705.943887][ T9182] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:43 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) 00:44:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000500000d000000000b000000000000000800000000000000b8fb482cb99f50fd118ec0cfc27600"/70], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000000034000000340000000500000d000000000b000000000000000800000000000000b8fb482cb99f50fd118ec0cfc27600"/70], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) (async) 00:44:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6002}, 0x48) 00:44:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x11}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:43 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x80000, 0x0, 0x0, 0x0) 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xb00, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc00, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6003}, 0x48) 00:44:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x12}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:43 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x3, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0xfff, 0x4, 0x8, 0x462, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0xffffffff}, 0x48) 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xd00, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2705.951696][ T9182] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2705.959505][ T9182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2705.967322][ T9182] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2705.975129][ T9182] 00:44:43 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x101000, 0x0, 0x0, 0x0) [ 2706.021340][ T9216] FAULT_INJECTION: forcing a failure. [ 2706.021340][ T9216] name failslab, interval 1, probability 0, space 0, times 0 [ 2706.041419][ T9216] CPU: 0 PID: 9216 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2706.051407][ T9216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2706.061306][ T9216] Call Trace: [ 2706.064425][ T9216] [ 2706.067288][ T9216] dump_stack_lvl+0x151/0x1b7 [ 2706.071806][ T9216] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2706.077098][ T9216] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 2706.083347][ T9216] dump_stack+0x15/0x17 [ 2706.087337][ T9216] should_fail+0x3c0/0x510 [ 2706.091591][ T9216] __should_failslab+0x9f/0xe0 [ 2706.096193][ T9216] should_failslab+0x9/0x20 [ 2706.100531][ T9216] kmem_cache_alloc+0x4f/0x2f0 [ 2706.105130][ T9216] ? anon_vma_fork+0xf7/0x4f0 [ 2706.109646][ T9216] anon_vma_fork+0xf7/0x4f0 [ 2706.113989][ T9216] ? anon_vma_name+0x4c/0x70 [ 2706.118412][ T9216] dup_mmap+0x750/0xea0 [ 2706.122405][ T9216] ? __delayed_free_task+0x20/0x20 [ 2706.127350][ T9216] ? mm_init+0x807/0x960 [ 2706.131429][ T9216] dup_mm+0x91/0x330 [ 2706.135163][ T9216] copy_mm+0x108/0x1b0 [ 2706.139065][ T9216] copy_process+0x1295/0x3250 [ 2706.143580][ T9216] ? proc_fail_nth_write+0x213/0x290 [ 2706.148701][ T9216] ? proc_fail_nth_read+0x220/0x220 [ 2706.153735][ T9216] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2706.158684][ T9216] ? vfs_write+0x9af/0x1050 [ 2706.163019][ T9216] ? vmacache_update+0xb7/0x120 [ 2706.167711][ T9216] kernel_clone+0x22d/0x990 [ 2706.172054][ T9216] ? file_end_write+0x1b0/0x1b0 [ 2706.176733][ T9216] ? __kasan_check_write+0x14/0x20 [ 2706.181681][ T9216] ? create_io_thread+0x1e0/0x1e0 [ 2706.186540][ T9216] ? __mutex_lock_slowpath+0x10/0x10 [ 2706.191663][ T9216] __x64_sys_clone+0x289/0x310 [ 2706.196266][ T9216] ? __do_sys_vfork+0x130/0x130 [ 2706.200948][ T9216] ? debug_smp_processor_id+0x17/0x20 [ 2706.206157][ T9216] do_syscall_64+0x44/0xd0 [ 2706.210411][ T9216] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2706.216138][ T9216] RIP: 0033:0x7fc683db00c9 [ 2706.220393][ T9216] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2706.240008][ T9216] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2706.248250][ T9216] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2706.256065][ T9216] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2706.263874][ T9216] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:43 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 00:44:43 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x3, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0xfff, 0x4, 0x8, 0x462, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0xffffffff}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x3, 0x18}, 0xc) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0xfff, 0x4, 0x8, 0x462, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0xffffffff}, 0x48) (async) 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xe00, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x18}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6200}, 0x48) 00:44:43 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x700500, 0x0, 0x0, 0x0) [ 2706.271690][ T9216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2706.279495][ T9216] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2706.287315][ T9216] 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1100, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6201}, 0x48) 00:44:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x25}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:43 executing program 3: bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x3, 0x18}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0xfff, 0x4, 0x8, 0x462, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0xffffffff}, 0x48) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x3, 0x18}, 0xc) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0xfff, 0x4, 0x8, 0x462, r0, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0xffffffff}, 0x48) (async) 00:44:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1200, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x36}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) [ 2706.318096][ T9229] FAULT_INJECTION: forcing a failure. [ 2706.318096][ T9229] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2706.341592][ T9229] CPU: 0 PID: 9229 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2706.351674][ T9229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2706.361572][ T9229] Call Trace: [ 2706.364693][ T9229] [ 2706.367471][ T9229] dump_stack_lvl+0x151/0x1b7 [ 2706.371988][ T9229] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2706.377278][ T9229] dump_stack+0x15/0x17 [ 2706.381272][ T9229] should_fail+0x3c0/0x510 [ 2706.385611][ T9229] should_fail_alloc_page+0x58/0x70 [ 2706.390651][ T9229] __alloc_pages+0x1de/0x7c0 [ 2706.395072][ T9229] ? __count_vm_events+0x30/0x30 [ 2706.399848][ T9229] pte_alloc_one+0x73/0x1b0 [ 2706.404183][ T9229] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2706.409218][ T9229] __pte_alloc+0x86/0x350 [ 2706.413385][ T9229] ? is_module_text_address+0xe1/0x140 [ 2706.418677][ T9229] ? free_pgtables+0x210/0x210 [ 2706.423278][ T9229] ? __kernel_text_address+0x9a/0x110 [ 2706.428488][ T9229] ? unwind_get_return_address+0x4c/0x90 [ 2706.433959][ T9229] copy_pte_range+0x1b1f/0x20b0 [ 2706.438641][ T9229] ? stack_trace_save+0x12d/0x1f0 [ 2706.443500][ T9229] ? anon_vma_clone+0xa1/0x4f0 [ 2706.448114][ T9229] ? __kunmap_atomic+0x80/0x80 [ 2706.452700][ T9229] ? dup_mmap+0x750/0xea0 [ 2706.456868][ T9229] ? dup_mm+0x91/0x330 [ 2706.460769][ T9229] ? copy_mm+0x108/0x1b0 [ 2706.464852][ T9229] ? copy_process+0x1295/0x3250 [ 2706.469537][ T9229] ? kernel_clone+0x22d/0x990 [ 2706.474051][ T9229] ? __x64_sys_clone+0x289/0x310 [ 2706.478823][ T9229] ? do_syscall_64+0x44/0xd0 [ 2706.483254][ T9229] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2706.489156][ T9229] copy_page_range+0xc1e/0x1090 [ 2706.493843][ T9229] ? pfn_valid+0x1e0/0x1e0 [ 2706.498096][ T9229] dup_mmap+0x99f/0xea0 [ 2706.502106][ T9229] ? __delayed_free_task+0x20/0x20 [ 2706.507035][ T9229] ? mm_init+0x807/0x960 [ 2706.511111][ T9229] dup_mm+0x91/0x330 [ 2706.514845][ T9229] copy_mm+0x108/0x1b0 [ 2706.518755][ T9229] copy_process+0x1295/0x3250 [ 2706.523271][ T9229] ? proc_fail_nth_write+0x213/0x290 [ 2706.528388][ T9229] ? proc_fail_nth_read+0x220/0x220 [ 2706.533417][ T9229] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2706.538370][ T9229] ? vfs_write+0x9af/0x1050 [ 2706.542703][ T9229] ? vmacache_update+0xb7/0x120 [ 2706.547392][ T9229] kernel_clone+0x22d/0x990 [ 2706.551738][ T9229] ? file_end_write+0x1b0/0x1b0 [ 2706.556417][ T9229] ? __kasan_check_write+0x14/0x20 [ 2706.561367][ T9229] ? create_io_thread+0x1e0/0x1e0 [ 2706.566224][ T9229] ? __mutex_lock_slowpath+0x10/0x10 [ 2706.571347][ T9229] __x64_sys_clone+0x289/0x310 [ 2706.575943][ T9229] ? __do_sys_vfork+0x130/0x130 [ 2706.580632][ T9229] ? debug_smp_processor_id+0x17/0x20 [ 2706.585840][ T9229] do_syscall_64+0x44/0xd0 [ 2706.590094][ T9229] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2706.595821][ T9229] RIP: 0033:0x7fc683db00c9 [ 2706.600073][ T9229] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2706.619513][ T9229] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2706.627762][ T9229] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2706.635570][ T9229] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2706.643382][ T9229] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2706.651195][ T9229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2706.659005][ T9229] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2706.666821][ T9229] 00:44:44 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) 00:44:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1800, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000000000800"/71], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x43}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:44 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) 00:44:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6202}, 0x48) 00:44:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6401}, 0x48) 00:44:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000000000800"/71], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000000000800"/71], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) 00:44:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x2500, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x48}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6402}, 0x48) 00:44:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4800, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2706.704909][ T9267] FAULT_INJECTION: forcing a failure. [ 2706.704909][ T9267] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2706.719562][ T9267] CPU: 0 PID: 9267 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2706.729541][ T9267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2706.739525][ T9267] Call Trace: [ 2706.742647][ T9267] [ 2706.745424][ T9267] dump_stack_lvl+0x151/0x1b7 [ 2706.749937][ T9267] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2706.755230][ T9267] dump_stack+0x15/0x17 [ 2706.759224][ T9267] should_fail+0x3c0/0x510 [ 2706.763476][ T9267] should_fail_alloc_page+0x58/0x70 [ 2706.768511][ T9267] __alloc_pages+0x1de/0x7c0 [ 2706.772947][ T9267] ? __count_vm_events+0x30/0x30 [ 2706.777715][ T9267] pte_alloc_one+0x73/0x1b0 [ 2706.782051][ T9267] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2706.787085][ T9267] __pte_alloc+0x86/0x350 [ 2706.791252][ T9267] ? free_pgtables+0x210/0x210 [ 2706.795847][ T9267] ? _raw_spin_lock+0xa3/0x1b0 [ 2706.800445][ T9267] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2706.805652][ T9267] ? unwind_get_return_address+0x4c/0x90 [ 2706.811123][ T9267] copy_pte_range+0x1b1f/0x20b0 [ 2706.815809][ T9267] ? stack_trace_save+0x12d/0x1f0 [ 2706.820670][ T9267] ? __kunmap_atomic+0x80/0x80 [ 2706.825266][ T9267] ? dup_mmap+0x750/0xea0 [ 2706.829432][ T9267] ? copy_mm+0x108/0x1b0 [ 2706.833513][ T9267] ? copy_process+0x1295/0x3250 [ 2706.838198][ T9267] ? kernel_clone+0x22d/0x990 [ 2706.842711][ T9267] ? __x64_sys_clone+0x289/0x310 [ 2706.847485][ T9267] ? do_syscall_64+0x44/0xd0 [ 2706.851919][ T9267] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2706.857905][ T9267] copy_page_range+0xc1e/0x1090 [ 2706.862592][ T9267] ? pfn_valid+0x1e0/0x1e0 [ 2706.866844][ T9267] dup_mmap+0x99f/0xea0 [ 2706.870837][ T9267] ? __delayed_free_task+0x20/0x20 [ 2706.875789][ T9267] ? mm_init+0x807/0x960 [ 2706.879862][ T9267] dup_mm+0x91/0x330 [ 2706.883592][ T9267] copy_mm+0x108/0x1b0 [ 2706.887499][ T9267] copy_process+0x1295/0x3250 [ 2706.892010][ T9267] ? proc_fail_nth_write+0x213/0x290 [ 2706.897131][ T9267] ? proc_fail_nth_read+0x220/0x220 [ 2706.902165][ T9267] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2706.907111][ T9267] ? vfs_write+0x9af/0x1050 [ 2706.911452][ T9267] ? vmacache_update+0xb7/0x120 [ 2706.916141][ T9267] kernel_clone+0x22d/0x990 [ 2706.920477][ T9267] ? file_end_write+0x1b0/0x1b0 [ 2706.925163][ T9267] ? __kasan_check_write+0x14/0x20 [ 2706.930114][ T9267] ? create_io_thread+0x1e0/0x1e0 [ 2706.934974][ T9267] ? __mutex_lock_slowpath+0x10/0x10 [ 2706.940096][ T9267] __x64_sys_clone+0x289/0x310 [ 2706.944695][ T9267] ? __do_sys_vfork+0x130/0x130 [ 2706.949380][ T9267] ? debug_smp_processor_id+0x17/0x20 [ 2706.954586][ T9267] do_syscall_64+0x44/0xd0 [ 2706.958840][ T9267] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2706.964567][ T9267] RIP: 0033:0x7fc683db00c9 [ 2706.968823][ T9267] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2706.988348][ T9267] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2706.996595][ T9267] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:44 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 00:44:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6403}, 0x48) 00:44:44 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0) 00:44:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000000000800"/71], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000000000800"/71], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) 00:44:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x4c}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4c00, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6600}, 0x48) 00:44:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b000000000000000800000000000000000000000000000000000000000000000000000000ad8a71005ef9351cef192a27695649a388ef12c4cce961568c24d46870b90000000000"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6800, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2707.004405][ T9267] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2707.012216][ T9267] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.020028][ T9267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2707.027838][ T9267] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2707.035652][ T9267] 00:44:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x68}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6c00, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6601}, 0x48) [ 2707.113968][ T9298] FAULT_INJECTION: forcing a failure. [ 2707.113968][ T9298] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2707.146373][ T9298] CPU: 0 PID: 9298 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2707.156358][ T9298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2707.166254][ T9298] Call Trace: [ 2707.169378][ T9298] [ 2707.172157][ T9298] dump_stack_lvl+0x151/0x1b7 [ 2707.176668][ T9298] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2707.181984][ T9298] dump_stack+0x15/0x17 [ 2707.185953][ T9298] should_fail+0x3c0/0x510 [ 2707.190208][ T9298] should_fail_alloc_page+0x58/0x70 [ 2707.195241][ T9298] __alloc_pages+0x1de/0x7c0 [ 2707.199668][ T9298] ? __count_vm_events+0x30/0x30 [ 2707.204443][ T9298] pte_alloc_one+0x73/0x1b0 [ 2707.208780][ T9298] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2707.213841][ T9298] __pte_alloc+0x86/0x350 [ 2707.217979][ T9298] ? is_module_text_address+0xe1/0x140 [ 2707.223276][ T9298] ? free_pgtables+0x210/0x210 [ 2707.227877][ T9298] ? __kernel_text_address+0x9a/0x110 [ 2707.233083][ T9298] ? unwind_get_return_address+0x4c/0x90 [ 2707.238553][ T9298] copy_pte_range+0x1b1f/0x20b0 [ 2707.243238][ T9298] ? stack_trace_save+0x12d/0x1f0 [ 2707.248099][ T9298] ? anon_vma_clone+0xa1/0x4f0 [ 2707.252704][ T9298] ? __kunmap_atomic+0x80/0x80 [ 2707.257296][ T9298] ? dup_mmap+0x750/0xea0 [ 2707.261460][ T9298] ? dup_mm+0x91/0x330 [ 2707.265368][ T9298] ? copy_mm+0x108/0x1b0 [ 2707.269446][ T9298] ? copy_process+0x1295/0x3250 [ 2707.274131][ T9298] ? kernel_clone+0x22d/0x990 [ 2707.278645][ T9298] ? __x64_sys_clone+0x289/0x310 [ 2707.283426][ T9298] ? do_syscall_64+0x44/0xd0 [ 2707.287846][ T9298] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2707.293750][ T9298] copy_page_range+0xc1e/0x1090 [ 2707.298441][ T9298] ? pfn_valid+0x1e0/0x1e0 [ 2707.302692][ T9298] dup_mmap+0x99f/0xea0 [ 2707.306698][ T9298] ? __delayed_free_task+0x20/0x20 [ 2707.311629][ T9298] ? mm_init+0x807/0x960 [ 2707.315708][ T9298] dup_mm+0x91/0x330 [ 2707.319447][ T9298] copy_mm+0x108/0x1b0 [ 2707.323342][ T9298] copy_process+0x1295/0x3250 [ 2707.327858][ T9298] ? proc_fail_nth_write+0x213/0x290 [ 2707.332978][ T9298] ? proc_fail_nth_read+0x220/0x220 [ 2707.338017][ T9298] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2707.342962][ T9298] ? vfs_write+0x9af/0x1050 [ 2707.347301][ T9298] ? vmacache_update+0xb7/0x120 [ 2707.351985][ T9298] kernel_clone+0x22d/0x990 [ 2707.356324][ T9298] ? file_end_write+0x1b0/0x1b0 [ 2707.361016][ T9298] ? __kasan_check_write+0x14/0x20 [ 2707.365962][ T9298] ? create_io_thread+0x1e0/0x1e0 [ 2707.370823][ T9298] ? __mutex_lock_slowpath+0x10/0x10 [ 2707.375943][ T9298] __x64_sys_clone+0x289/0x310 [ 2707.380543][ T9298] ? __do_sys_vfork+0x130/0x130 [ 2707.385230][ T9298] ? debug_smp_processor_id+0x17/0x20 [ 2707.390438][ T9298] do_syscall_64+0x44/0xd0 [ 2707.394693][ T9298] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2707.400416][ T9298] RIP: 0033:0x7fc683db00c9 [ 2707.404668][ T9298] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2707.424113][ T9298] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2707.432357][ T9298] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2707.440168][ T9298] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2707.447981][ T9298] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.455790][ T9298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:44 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 00:44:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b000000000000000800000000000000000000000000000000000000000000000000000000ad8a71005ef9351cef192a27695649a388ef12c4cce961568c24d46870b90000000000"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7400, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x6c}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:44 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0) 00:44:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6602}, 0x48) 00:44:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7a00, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b000000000000000800000000000000000000000000000000000000000000000000000000ad8a71005ef9351cef192a27695649a388ef12c4cce961568c24d46870b90000000000"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b000000000000000800000000000000000000000000000000000000000000000000000000ad8a71005ef9351cef192a27695649a388ef12c4cce961568c24d46870b90000000000"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) 00:44:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x74}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc400, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2707.463603][ T9298] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2707.471417][ T9298] 00:44:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x1000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6603}, 0x48) [ 2707.528191][ T9317] FAULT_INJECTION: forcing a failure. [ 2707.528191][ T9317] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2707.561807][ T9317] CPU: 1 PID: 9317 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2707.571796][ T9317] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2707.581690][ T9317] Call Trace: [ 2707.584815][ T9317] [ 2707.587592][ T9317] dump_stack_lvl+0x151/0x1b7 [ 2707.592105][ T9317] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2707.597398][ T9317] dump_stack+0x15/0x17 [ 2707.601391][ T9317] should_fail+0x3c0/0x510 [ 2707.605645][ T9317] should_fail_alloc_page+0x58/0x70 [ 2707.610677][ T9317] __alloc_pages+0x1de/0x7c0 [ 2707.615105][ T9317] ? __x64_sys_clone+0x289/0x310 [ 2707.619883][ T9317] ? __count_vm_events+0x30/0x30 [ 2707.624653][ T9317] ? avc_denied+0x1b0/0x1b0 [ 2707.628991][ T9317] allocate_slab+0x62/0x580 [ 2707.633329][ T9317] ___slab_alloc+0x2e2/0x6f0 [ 2707.637757][ T9317] ? vm_area_dup+0x26/0x1d0 [ 2707.642098][ T9317] ? vm_area_dup+0x26/0x1d0 [ 2707.646436][ T9317] __slab_alloc+0x4a/0x90 [ 2707.650604][ T9317] kmem_cache_alloc+0x205/0x2f0 [ 2707.655289][ T9317] ? vm_area_dup+0x26/0x1d0 [ 2707.659630][ T9317] vm_area_dup+0x26/0x1d0 [ 2707.663800][ T9317] dup_mmap+0x6b8/0xea0 [ 2707.667793][ T9317] ? __delayed_free_task+0x20/0x20 [ 2707.672745][ T9317] ? mm_init+0x807/0x960 [ 2707.676813][ T9317] dup_mm+0x91/0x330 [ 2707.680545][ T9317] copy_mm+0x108/0x1b0 [ 2707.684451][ T9317] copy_process+0x1295/0x3250 [ 2707.688966][ T9317] ? proc_fail_nth_write+0x213/0x290 [ 2707.694182][ T9317] ? proc_fail_nth_read+0x220/0x220 [ 2707.699215][ T9317] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2707.704160][ T9317] ? vfs_write+0x9af/0x1050 [ 2707.708501][ T9317] ? vmacache_update+0xb7/0x120 [ 2707.713187][ T9317] kernel_clone+0x22d/0x990 [ 2707.717525][ T9317] ? file_end_write+0x1b0/0x1b0 [ 2707.722219][ T9317] ? __kasan_check_write+0x14/0x20 [ 2707.727160][ T9317] ? create_io_thread+0x1e0/0x1e0 [ 2707.732021][ T9317] ? __mutex_lock_slowpath+0x10/0x10 [ 2707.737143][ T9317] __x64_sys_clone+0x289/0x310 [ 2707.741742][ T9317] ? __do_sys_vfork+0x130/0x130 [ 2707.746430][ T9317] ? debug_smp_processor_id+0x17/0x20 [ 2707.751635][ T9317] do_syscall_64+0x44/0xd0 [ 2707.755890][ T9317] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2707.761716][ T9317] RIP: 0033:0x7fc683db00c9 [ 2707.765975][ T9317] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2707.785413][ T9317] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2707.793658][ T9317] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2707.801466][ T9317] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2707.809277][ T9317] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2707.817088][ T9317] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 00:44:45 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 82) 00:44:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000001c0)) 00:44:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0x7a}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x2000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:45 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0) 00:44:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6800}, 0x48) 00:44:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}, {0x0, [], 0xc4}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000001c0)) 00:44:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x3000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2707.824989][ T9317] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2707.832803][ T9317] 00:44:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6801}, 0x48) 00:44:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000001c0)) [ 2708.086206][ T9363] FAULT_INJECTION: forcing a failure. [ 2708.086206][ T9363] name failslab, interval 1, probability 0, space 0, times 0 [ 2708.098751][ T9363] CPU: 1 PID: 9363 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2708.108723][ T9363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2708.118614][ T9363] Call Trace: [ 2708.121746][ T9363] [ 2708.124517][ T9363] dump_stack_lvl+0x151/0x1b7 [ 2708.129028][ T9363] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2708.134325][ T9363] dump_stack+0x15/0x17 [ 2708.138312][ T9363] should_fail+0x3c0/0x510 [ 2708.142568][ T9363] __should_failslab+0x9f/0xe0 [ 2708.147168][ T9363] should_failslab+0x9/0x20 [ 2708.151509][ T9363] kmem_cache_alloc+0x4f/0x2f0 [ 2708.156106][ T9363] ? anon_vma_fork+0x1b9/0x4f0 [ 2708.160709][ T9363] anon_vma_fork+0x1b9/0x4f0 [ 2708.165135][ T9363] dup_mmap+0x750/0xea0 [ 2708.169126][ T9363] ? __delayed_free_task+0x20/0x20 [ 2708.174076][ T9363] ? mm_init+0x807/0x960 [ 2708.178151][ T9363] dup_mm+0x91/0x330 [ 2708.181883][ T9363] copy_mm+0x108/0x1b0 [ 2708.185790][ T9363] copy_process+0x1295/0x3250 [ 2708.190306][ T9363] ? proc_fail_nth_write+0x213/0x290 [ 2708.195424][ T9363] ? proc_fail_nth_read+0x220/0x220 [ 2708.200458][ T9363] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2708.205405][ T9363] ? vfs_write+0x9af/0x1050 [ 2708.209746][ T9363] ? vmacache_update+0xb7/0x120 [ 2708.214433][ T9363] kernel_clone+0x22d/0x990 [ 2708.218773][ T9363] ? file_end_write+0x1b0/0x1b0 [ 2708.223458][ T9363] ? __kasan_check_write+0x14/0x20 [ 2708.228403][ T9363] ? create_io_thread+0x1e0/0x1e0 [ 2708.233264][ T9363] ? __mutex_lock_slowpath+0x10/0x10 [ 2708.238389][ T9363] __x64_sys_clone+0x289/0x310 [ 2708.242986][ T9363] ? __do_sys_vfork+0x130/0x130 [ 2708.247676][ T9363] ? debug_smp_processor_id+0x17/0x20 [ 2708.252882][ T9363] do_syscall_64+0x44/0xd0 [ 2708.257133][ T9363] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2708.262862][ T9363] RIP: 0033:0x7fc683db00c9 [ 2708.267114][ T9363] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 00:44:45 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 83) 00:44:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6802}, 0x48) 00:44:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x8, 0xc5, 0x1}, 0x20) 00:44:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb001800000000000000340000003400000002000000000000000500000d000000000b000000000000000800000000000000000000000000000000001000"/77], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000200)='THAWED\x00', 0x7) 00:44:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x5000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:45 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0) [ 2708.286560][ T9363] RSP: 002b:00007fc682b02118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2708.294799][ T9363] RAX: ffffffffffffffda RBX: 00007fc683ed0050 RCX: 00007fc683db00c9 [ 2708.302613][ T9363] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2708.310423][ T9363] RBP: 00007fc682b021d0 R08: 0000000000000000 R09: 0000000000000000 [ 2708.318233][ T9363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2708.326045][ T9363] R13: 00007ffe3980939f R14: 00007fc682b02300 R15: 0000000000022000 [ 2708.333860][ T9363] 00:44:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb001800000000000000340000003400000002000000000000000500000d000000000b000000000000000800000000000000000000000000000000001000"/77], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000200)='THAWED\x00', 0x7) 00:44:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6803}, 0x48) 00:44:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0xa, 0xc5, 0x1}, 0x20) 00:44:45 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6a00}, 0x48) [ 2708.407559][ T9381] FAULT_INJECTION: forcing a failure. [ 2708.407559][ T9381] name failslab, interval 1, probability 0, space 0, times 0 [ 2708.425665][ T9381] CPU: 0 PID: 9381 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2708.435650][ T9381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2708.445544][ T9381] Call Trace: [ 2708.448665][ T9381] [ 2708.451442][ T9381] dump_stack_lvl+0x151/0x1b7 [ 2708.455959][ T9381] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2708.461249][ T9381] dump_stack+0x15/0x17 [ 2708.465241][ T9381] should_fail+0x3c0/0x510 [ 2708.469500][ T9381] __should_failslab+0x9f/0xe0 [ 2708.474095][ T9381] should_failslab+0x9/0x20 [ 2708.478434][ T9381] kmem_cache_alloc+0x4f/0x2f0 [ 2708.483039][ T9381] ? anon_vma_clone+0xa1/0x4f0 [ 2708.487637][ T9381] anon_vma_clone+0xa1/0x4f0 [ 2708.492063][ T9381] anon_vma_fork+0x91/0x4f0 [ 2708.496406][ T9381] ? anon_vma_name+0x43/0x70 [ 2708.500826][ T9381] dup_mmap+0x750/0xea0 [ 2708.504819][ T9381] ? __delayed_free_task+0x20/0x20 [ 2708.509768][ T9381] ? mm_init+0x807/0x960 [ 2708.513846][ T9381] dup_mm+0x91/0x330 [ 2708.517675][ T9381] copy_mm+0x108/0x1b0 [ 2708.521585][ T9381] copy_process+0x1295/0x3250 [ 2708.526096][ T9381] ? proc_fail_nth_write+0x213/0x290 [ 2708.531213][ T9381] ? proc_fail_nth_read+0x220/0x220 [ 2708.536251][ T9381] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2708.541198][ T9381] ? vfs_write+0x9af/0x1050 [ 2708.545535][ T9381] ? vmacache_update+0xb7/0x120 [ 2708.550224][ T9381] kernel_clone+0x22d/0x990 [ 2708.554563][ T9381] ? file_end_write+0x1b0/0x1b0 [ 2708.559250][ T9381] ? __kasan_check_write+0x14/0x20 [ 2708.564198][ T9381] ? create_io_thread+0x1e0/0x1e0 [ 2708.569056][ T9381] ? __mutex_lock_slowpath+0x10/0x10 [ 2708.574187][ T9381] __x64_sys_clone+0x289/0x310 [ 2708.578780][ T9381] ? __do_sys_vfork+0x130/0x130 [ 2708.583461][ T9381] ? debug_smp_processor_id+0x17/0x20 [ 2708.588671][ T9381] do_syscall_64+0x44/0xd0 [ 2708.592921][ T9381] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2708.598651][ T9381] RIP: 0033:0x7fc683db00c9 [ 2708.602940][ T9381] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2708.622342][ T9381] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2708.630589][ T9381] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2708.638402][ T9381] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2708.646208][ T9381] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:46 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 84) 00:44:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x8000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb001800000000000000340000003400000002000000000000000500000d000000000b000000000000000800000000000000000000000000000000001000"/77], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) write$cgroup_freezer_state(r0, &(0x7f0000000200)='THAWED\x00', 0x7) 00:44:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6a01}, 0x48) 00:44:46 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x9000000, 0x0, 0x0, 0x0) 00:44:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x18, 0xc5, 0x1}, 0x20) 00:44:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x9000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6a02}, 0x48) 00:44:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000200)=""/60, 0x3c, 0x0, &(0x7f0000000240)=""/88, 0x58}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@map=0x1, 0xffffffffffffffff, 0x16}, 0x10) [ 2708.654020][ T9381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2708.661832][ T9381] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2708.669646][ T9381] 00:44:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6c01}, 0x48) 00:44:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x64, 0xc5, 0x1}, 0x20) 00:44:46 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6c02}, 0x48) [ 2708.713568][ T9400] FAULT_INJECTION: forcing a failure. [ 2708.713568][ T9400] name failslab, interval 1, probability 0, space 0, times 0 [ 2708.768098][ T9400] CPU: 0 PID: 9400 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2708.778096][ T9400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2708.787994][ T9400] Call Trace: [ 2708.791114][ T9400] [ 2708.793892][ T9400] dump_stack_lvl+0x151/0x1b7 [ 2708.798404][ T9400] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2708.803704][ T9400] dump_stack+0x15/0x17 [ 2708.807694][ T9400] should_fail+0x3c0/0x510 [ 2708.811945][ T9400] __should_failslab+0x9f/0xe0 [ 2708.816546][ T9400] should_failslab+0x9/0x20 [ 2708.820886][ T9400] kmem_cache_alloc+0x4f/0x2f0 [ 2708.825482][ T9400] ? anon_vma_fork+0x1b9/0x4f0 [ 2708.830086][ T9400] anon_vma_fork+0x1b9/0x4f0 [ 2708.834512][ T9400] dup_mmap+0x750/0xea0 [ 2708.838505][ T9400] ? __delayed_free_task+0x20/0x20 [ 2708.843453][ T9400] ? mm_init+0x807/0x960 [ 2708.847530][ T9400] dup_mm+0x91/0x330 [ 2708.851263][ T9400] copy_mm+0x108/0x1b0 [ 2708.855170][ T9400] copy_process+0x1295/0x3250 [ 2708.859680][ T9400] ? proc_fail_nth_write+0x213/0x290 [ 2708.864802][ T9400] ? proc_fail_nth_read+0x220/0x220 [ 2708.869837][ T9400] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2708.874782][ T9400] ? vfs_write+0x9af/0x1050 [ 2708.879120][ T9400] ? vmacache_update+0xb7/0x120 [ 2708.883808][ T9400] kernel_clone+0x22d/0x990 [ 2708.888148][ T9400] ? file_end_write+0x1b0/0x1b0 [ 2708.892837][ T9400] ? __kasan_check_write+0x14/0x20 [ 2708.897781][ T9400] ? create_io_thread+0x1e0/0x1e0 [ 2708.902644][ T9400] ? __mutex_lock_slowpath+0x10/0x10 [ 2708.907765][ T9400] __x64_sys_clone+0x289/0x310 [ 2708.912462][ T9400] ? __do_sys_vfork+0x130/0x130 [ 2708.917152][ T9400] ? debug_smp_processor_id+0x17/0x20 [ 2708.922357][ T9400] do_syscall_64+0x44/0xd0 [ 2708.926611][ T9400] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2708.932336][ T9400] RIP: 0033:0x7fc683db00c9 [ 2708.936588][ T9400] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2708.956032][ T9400] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2708.964276][ T9400] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2708.972088][ T9400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2708.979898][ T9400] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2708.987708][ T9400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2708.995520][ T9400] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2709.003336][ T9400] [ 2709.011993][ T9400] ================================================================== [ 2709.019874][ T9400] BUG: KASAN: use-after-free in vm_area_free+0x7e/0x230 [ 2709.026644][ T9400] Write of size 4 at addr ffff888119bd2be8 by task syz-executor.0/9400 [ 2709.034805][ T9400] [ 2709.036975][ T9400] CPU: 0 PID: 9400 Comm: syz-executor.0 Not tainted 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2709.046953][ T9400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2709.056937][ T9400] Call Trace: [ 2709.060060][ T9400] [ 2709.062839][ T9400] dump_stack_lvl+0x151/0x1b7 [ 2709.067350][ T9400] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2709.072645][ T9400] ? panic+0x727/0x727 [ 2709.076547][ T9400] ? slab_free_freelist_hook+0xc9/0x1a0 [ 2709.081931][ T9400] print_address_description+0x87/0x3d0 [ 2709.087312][ T9400] kasan_report+0x1a6/0x1f0 [ 2709.091671][ T9400] ? vm_area_free+0x7e/0x230 [ 2709.096079][ T9400] ? vm_area_free+0x7e/0x230 [ 2709.100505][ T9400] kasan_check_range+0x2aa/0x2e0 [ 2709.105276][ T9400] __kasan_check_write+0x14/0x20 [ 2709.110051][ T9400] vm_area_free+0x7e/0x230 [ 2709.114303][ T9400] dup_mmap+0xbcd/0xea0 [ 2709.118296][ T9400] ? __delayed_free_task+0x20/0x20 [ 2709.123246][ T9400] ? mm_init+0x807/0x960 [ 2709.127325][ T9400] dup_mm+0x91/0x330 [ 2709.131059][ T9400] copy_mm+0x108/0x1b0 [ 2709.134963][ T9400] copy_process+0x1295/0x3250 [ 2709.139479][ T9400] ? proc_fail_nth_write+0x213/0x290 [ 2709.144597][ T9400] ? proc_fail_nth_read+0x220/0x220 [ 2709.149666][ T9400] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2709.154573][ T9400] ? vfs_write+0x9af/0x1050 [ 2709.158911][ T9400] ? vmacache_update+0xb7/0x120 [ 2709.163599][ T9400] kernel_clone+0x22d/0x990 [ 2709.167938][ T9400] ? file_end_write+0x1b0/0x1b0 [ 2709.172624][ T9400] ? __kasan_check_write+0x14/0x20 [ 2709.177572][ T9400] ? create_io_thread+0x1e0/0x1e0 [ 2709.182436][ T9400] ? __mutex_lock_slowpath+0x10/0x10 [ 2709.187550][ T9400] __x64_sys_clone+0x289/0x310 [ 2709.192156][ T9400] ? __do_sys_vfork+0x130/0x130 [ 2709.196840][ T9400] ? debug_smp_processor_id+0x17/0x20 [ 2709.202047][ T9400] do_syscall_64+0x44/0xd0 [ 2709.206300][ T9400] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2709.212028][ T9400] RIP: 0033:0x7fc683db00c9 [ 2709.216368][ T9400] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2709.235810][ T9400] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2709.244054][ T9400] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2709.251863][ T9400] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2709.259675][ T9400] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2709.267489][ T9400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2709.275297][ T9400] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2709.283113][ T9400] [ 2709.285974][ T9400] [ 2709.288142][ T9400] Allocated by task 9381: [ 2709.292310][ T9400] __kasan_slab_alloc+0xb2/0xe0 [ 2709.296995][ T9400] kmem_cache_alloc+0x189/0x2f0 [ 2709.301685][ T9400] vm_area_dup+0x26/0x1d0 [ 2709.305864][ T9400] dup_mmap+0x6b8/0xea0 [ 2709.309843][ T9400] dup_mm+0x91/0x330 [ 2709.313575][ T9400] copy_mm+0x108/0x1b0 [ 2709.317479][ T9400] copy_process+0x1295/0x3250 [ 2709.321990][ T9400] kernel_clone+0x22d/0x990 [ 2709.326342][ T9400] __x64_sys_clone+0x289/0x310 [ 2709.330930][ T9400] do_syscall_64+0x44/0xd0 [ 2709.335183][ T9400] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2709.340911][ T9400] [ 2709.343081][ T9400] Freed by task 9390: [ 2709.346902][ T9400] kasan_set_track+0x4c/0x70 [ 2709.351326][ T9400] kasan_set_free_info+0x23/0x40 [ 2709.356100][ T9400] ____kasan_slab_free+0x126/0x160 [ 2709.361048][ T9400] __kasan_slab_free+0x11/0x20 [ 2709.365647][ T9400] slab_free_freelist_hook+0xc9/0x1a0 [ 2709.370858][ T9400] kmem_cache_free+0x11a/0x2e0 [ 2709.375454][ T9400] vm_area_free+0x1ae/0x230 [ 2709.379796][ T9400] exit_mmap+0x5dd/0x7a0 [ 2709.383873][ T9400] __mmput+0x95/0x300 [ 2709.387692][ T9400] mmput+0x50/0x60 [ 2709.391250][ T9400] exit_mm+0x50d/0x760 [ 2709.395158][ T9400] do_exit+0x63c/0x24d0 [ 2709.399148][ T9400] __ia32_sys_exit+0x0/0x40 [ 2709.403490][ T9400] do_syscall_64+0x44/0xd0 [ 2709.407743][ T9400] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2709.413469][ T9400] [ 2709.415639][ T9400] The buggy address belongs to the object at ffff888119bd2b90 [ 2709.415639][ T9400] which belongs to the cache vm_area_struct of size 232 [ 2709.429787][ T9400] The buggy address is located 88 bytes inside of [ 2709.429787][ T9400] 232-byte region [ffff888119bd2b90, ffff888119bd2c78) [ 2709.442806][ T9400] The buggy address belongs to the page: [ 2709.448276][ T9400] page:ffffea000466f480 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x119bd2 [ 2709.458343][ T9400] flags: 0x4000000000000200(slab|zone=1) [ 2709.463817][ T9400] raw: 4000000000000200 dead000000000100 dead000000000122 ffff888100274180 [ 2709.472235][ T9400] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 2709.480646][ T9400] page dumped because: kasan: bad access detected [ 2709.486897][ T9400] page_owner tracks the page as allocated [ 2709.492452][ T9400] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 30629, ts 2103605184469, free_ts 2103598815916 [ 2709.508682][ T9400] post_alloc_hook+0x1ab/0x1b0 [ 2709.513281][ T9400] get_page_from_freelist+0x38b/0x400 [ 2709.518488][ T9400] __alloc_pages+0x3a8/0x7c0 [ 2709.522916][ T9400] allocate_slab+0x62/0x580 [ 2709.527253][ T9400] ___slab_alloc+0x2e2/0x6f0 [ 2709.531681][ T9400] __slab_alloc+0x4a/0x90 [ 2709.535861][ T9400] kmem_cache_alloc+0x205/0x2f0 [ 2709.540542][ T9400] vm_area_dup+0x26/0x1d0 [ 2709.544698][ T9400] dup_mmap+0x6b8/0xea0 [ 2709.548795][ T9400] dup_mm+0x91/0x330 [ 2709.552520][ T9400] copy_mm+0x108/0x1b0 [ 2709.556427][ T9400] copy_process+0x1295/0x3250 [ 2709.560940][ T9400] kernel_clone+0x22d/0x990 [ 2709.565276][ T9400] __x64_sys_clone+0x289/0x310 [ 2709.569877][ T9400] do_syscall_64+0x44/0xd0 [ 2709.574132][ T9400] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2709.579859][ T9400] page last free stack trace: [ 2709.584371][ T9400] free_pcp_prepare+0x448/0x450 [ 2709.589059][ T9400] free_unref_page_list+0x16a/0xad0 [ 2709.594092][ T9400] release_pages+0xf3e/0xf90 [ 2709.598518][ T9400] free_pages_and_swap_cache+0x97/0xb0 [ 2709.603816][ T9400] tlb_flush_mmu+0x860/0xa00 [ 2709.608243][ T9400] tlb_finish_mmu+0xd2/0x1f0 [ 2709.612668][ T9400] exit_mmap+0x46e/0x7a0 [ 2709.616745][ T9400] __mmput+0x95/0x300 [ 2709.620565][ T9400] mmput+0x50/0x60 [ 2709.624120][ T9400] exit_mm+0x50d/0x760 [ 2709.628028][ T9400] do_exit+0x63c/0x24d0 [ 2709.632022][ T9400] do_group_exit+0x13a/0x300 [ 2709.636444][ T9400] get_signal+0x77e/0x1600 [ 2709.640699][ T9400] arch_do_signal_or_restart+0x9f/0x670 [ 2709.646079][ T9400] exit_to_user_mode_loop+0xd4/0x110 [ 2709.651201][ T9400] syscall_exit_to_user_mode+0x79/0xc0 [ 2709.656496][ T9400] [ 2709.658663][ T9400] Memory state around the buggy address: [ 2709.664137][ T9400] ffff888119bd2a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2709.672034][ T9400] ffff888119bd2b00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc [ 2709.679931][ T9400] >ffff888119bd2b80: fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2709.687825][ T9400] ^ [ 2709.695127][ T9400] ffff888119bd2c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 2709.703021][ T9400] ffff888119bd2c80: fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb [ 2709.710911][ T9400] ================================================================== 00:44:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6c03}, 0x48) 00:44:47 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x10000200, 0x0, 0x0, 0x0) 00:44:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xa000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:47 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 85) 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000200)=""/60, 0x3c, 0x0, &(0x7f0000000240)=""/88, 0x58}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@map=0x1, 0xffffffffffffffff, 0x16}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000200)=""/60, 0x3c, 0x0, &(0x7f0000000240)=""/88, 0x58}}, 0x10) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@map=0x1, 0xffffffffffffffff, 0x16}, 0x10) (async) 00:44:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x1001, 0xc5, 0x1}, 0x20) 00:44:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6e00}, 0x48) 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000200)=""/60, 0x3c, 0x0, &(0x7f0000000240)=""/88, 0x58}}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@map=0x1, 0xffffffffffffffff, 0x16}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000300)={r0, 0x20, &(0x7f00000002c0)={&(0x7f0000000200)=""/60, 0x3c, 0x0, &(0x7f0000000240)=""/88, 0x58}}, 0x10) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0)={@map=0x1, 0xffffffffffffffff, 0x16}, 0x10) (async) [ 2709.718812][ T9400] Disabling lock debugging due to kernel taint 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}, {0x4}]}]}}, &(0x7f0000000080)=""/197, 0x56, 0xc5, 0x1}, 0x20) 00:44:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x1000000, 0xc5, 0x1}, 0x20) 00:44:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xb000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:47 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x11000000, 0x0, 0x0, 0x0) [ 2709.764477][ T9432] FAULT_INJECTION: forcing a failure. [ 2709.764477][ T9432] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2709.789793][ T9432] CPU: 0 PID: 9432 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2709.801172][ T9432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2709.811067][ T9432] Call Trace: [ 2709.814189][ T9432] [ 2709.816966][ T9432] dump_stack_lvl+0x151/0x1b7 [ 2709.821482][ T9432] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2709.826775][ T9432] ? is_bpf_text_address+0x1a2/0x1c0 [ 2709.831896][ T9432] ? is_module_text_address+0xe1/0x140 [ 2709.837190][ T9432] dump_stack+0x15/0x17 [ 2709.841184][ T9432] should_fail+0x3c0/0x510 [ 2709.845434][ T9432] should_fail_alloc_page+0x58/0x70 [ 2709.850467][ T9432] __alloc_pages+0x1de/0x7c0 [ 2709.854897][ T9432] ? __count_vm_events+0x30/0x30 [ 2709.859668][ T9432] ? __stack_depot_save+0x34/0x4b0 [ 2709.864615][ T9432] ? anon_vma_clone+0xa1/0x4f0 [ 2709.869215][ T9432] __pmd_alloc+0xb1/0x550 [ 2709.873380][ T9432] ? __kasan_slab_alloc+0xb2/0xe0 [ 2709.878237][ T9432] ? kmem_cache_alloc+0x189/0x2f0 [ 2709.883099][ T9432] ? anon_vma_fork+0x1b9/0x4f0 [ 2709.887703][ T9432] ? dup_mmap+0x750/0xea0 [ 2709.891866][ T9432] ? dup_mm+0x91/0x330 [ 2709.895773][ T9432] ? copy_mm+0x108/0x1b0 [ 2709.899851][ T9432] ? kernel_clone+0x22d/0x990 [ 2709.904366][ T9432] ? __pud_alloc+0x260/0x260 [ 2709.908793][ T9432] copy_page_range+0xd04/0x1090 [ 2709.913494][ T9432] ? pfn_valid+0x1e0/0x1e0 [ 2709.917733][ T9432] dup_mmap+0x99f/0xea0 [ 2709.921726][ T9432] ? __delayed_free_task+0x20/0x20 [ 2709.926668][ T9432] ? mm_init+0x807/0x960 [ 2709.930782][ T9432] dup_mm+0x91/0x330 [ 2709.934486][ T9432] copy_mm+0x108/0x1b0 [ 2709.938389][ T9432] copy_process+0x1295/0x3250 [ 2709.942901][ T9432] ? proc_fail_nth_write+0x213/0x290 [ 2709.948021][ T9432] ? proc_fail_nth_read+0x220/0x220 [ 2709.953058][ T9432] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2709.958002][ T9432] ? vfs_write+0x9af/0x1050 [ 2709.962342][ T9432] ? vmacache_update+0xb7/0x120 [ 2709.967030][ T9432] kernel_clone+0x22d/0x990 [ 2709.971466][ T9432] ? file_end_write+0x1b0/0x1b0 [ 2709.976150][ T9432] ? __kasan_check_write+0x14/0x20 [ 2709.981099][ T9432] ? create_io_thread+0x1e0/0x1e0 [ 2709.986048][ T9432] ? __mutex_lock_slowpath+0x10/0x10 [ 2709.991168][ T9432] __x64_sys_clone+0x289/0x310 [ 2709.995773][ T9432] ? __do_sys_vfork+0x130/0x130 [ 2710.000456][ T9432] ? debug_smp_processor_id+0x17/0x20 [ 2710.005657][ T9432] do_syscall_64+0x44/0xd0 [ 2710.009913][ T9432] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2710.015644][ T9432] RIP: 0033:0x7fc683db00c9 [ 2710.019895][ T9432] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2710.039340][ T9432] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2710.047588][ T9432] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2710.055394][ T9432] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:47 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 86) 00:44:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6e01}, 0x48) 00:44:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x5f5e0ff, 0xc5, 0x1}, 0x20) 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}, {0x4}]}]}}, &(0x7f0000000080)=""/197, 0x56, 0xc5, 0x1}, 0x20) 00:44:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x2000004e, 0xc5, 0x1}, 0x20) 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x2, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}, {0x4}]}]}}, &(0x7f0000000080)=""/197, 0x56, 0xc5, 0x1}, 0x20) [ 2710.063210][ T9432] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2710.071101][ T9432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2710.078916][ T9432] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2710.086729][ T9432] 00:44:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xd000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6e02}, 0x48) 00:44:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xe000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x7fff}}]}}, &(0x7f0000000080)=""/178, 0x32, 0xb2, 0x1}, 0x20) 00:44:47 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x1f000000, 0x0, 0x0, 0x0) [ 2710.158098][ T9463] FAULT_INJECTION: forcing a failure. [ 2710.158098][ T9463] name failslab, interval 1, probability 0, space 0, times 0 [ 2710.184129][ T9463] CPU: 1 PID: 9463 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2710.195506][ T9463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2710.205398][ T9463] Call Trace: [ 2710.208609][ T9463] [ 2710.211390][ T9463] dump_stack_lvl+0x151/0x1b7 [ 2710.215899][ T9463] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2710.221199][ T9463] ? do_syscall_64+0x44/0xd0 [ 2710.225622][ T9463] dump_stack+0x15/0x17 [ 2710.229611][ T9463] should_fail+0x3c0/0x510 [ 2710.233866][ T9463] __should_failslab+0x9f/0xe0 [ 2710.238466][ T9463] should_failslab+0x9/0x20 [ 2710.242806][ T9463] kmem_cache_alloc+0x4f/0x2f0 [ 2710.247404][ T9463] ? anon_vma_clone+0xa1/0x4f0 [ 2710.252003][ T9463] anon_vma_clone+0xa1/0x4f0 [ 2710.256439][ T9463] anon_vma_fork+0x91/0x4f0 [ 2710.260774][ T9463] ? anon_vma_name+0x4c/0x70 [ 2710.265196][ T9463] dup_mmap+0x750/0xea0 [ 2710.269190][ T9463] ? __delayed_free_task+0x20/0x20 [ 2710.274137][ T9463] ? mm_init+0x807/0x960 [ 2710.278219][ T9463] dup_mm+0x91/0x330 [ 2710.281956][ T9463] copy_mm+0x108/0x1b0 [ 2710.285851][ T9463] copy_process+0x1295/0x3250 [ 2710.290368][ T9463] ? proc_fail_nth_write+0x213/0x290 [ 2710.295488][ T9463] ? proc_fail_nth_read+0x220/0x220 [ 2710.300523][ T9463] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2710.305472][ T9463] ? vfs_write+0x9af/0x1050 [ 2710.309805][ T9463] ? vmacache_update+0xb7/0x120 [ 2710.314496][ T9463] kernel_clone+0x22d/0x990 [ 2710.318835][ T9463] ? file_end_write+0x1b0/0x1b0 [ 2710.323524][ T9463] ? __kasan_check_write+0x14/0x20 [ 2710.328468][ T9463] ? create_io_thread+0x1e0/0x1e0 [ 2710.333329][ T9463] ? __mutex_lock_slowpath+0x10/0x10 [ 2710.338452][ T9463] __x64_sys_clone+0x289/0x310 [ 2710.343052][ T9463] ? __do_sys_vfork+0x130/0x130 [ 2710.347736][ T9463] ? debug_smp_processor_id+0x17/0x20 [ 2710.352951][ T9463] do_syscall_64+0x44/0xd0 [ 2710.357194][ T9463] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2710.362930][ T9463] RIP: 0033:0x7fc683db00c9 [ 2710.367180][ T9463] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2710.386622][ T9463] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2710.394863][ T9463] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 00:44:47 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 87) 00:44:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x6e03}, 0x48) 00:44:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x10000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x2}, 0x20) 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x7fff}}]}}, &(0x7f0000000080)=""/178, 0x32, 0xb2, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x7fff}}]}}, &(0x7f0000000080)=""/178, 0x32, 0xb2, 0x1}, 0x20) (async) 00:44:47 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) 00:44:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7000}, 0x48) 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x5, 0x7fff}}]}}, &(0x7f0000000080)=""/178, 0x32, 0xb2, 0x1}, 0x20) 00:44:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x8}, 0x20) 00:44:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x11000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000200000200c000000000009000000000000"], &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x3f, 0x2, 0x10001, 0x100, r0, 0x8, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0xd}, 0x48) [ 2710.402676][ T9463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2710.410638][ T9463] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2710.418450][ T9463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2710.426261][ T9463] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2710.434076][ T9463] 00:44:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0xa}, 0x20) [ 2710.486026][ T9486] FAULT_INJECTION: forcing a failure. [ 2710.486026][ T9486] name failslab, interval 1, probability 0, space 0, times 0 [ 2710.511725][ T9486] CPU: 1 PID: 9486 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2710.523107][ T9486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2710.533002][ T9486] Call Trace: [ 2710.536120][ T9486] [ 2710.538898][ T9486] dump_stack_lvl+0x151/0x1b7 [ 2710.543501][ T9486] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2710.548795][ T9486] dump_stack+0x15/0x17 [ 2710.552787][ T9486] should_fail+0x3c0/0x510 [ 2710.557040][ T9486] __should_failslab+0x9f/0xe0 [ 2710.561641][ T9486] should_failslab+0x9/0x20 [ 2710.565979][ T9486] kmem_cache_alloc+0x4f/0x2f0 [ 2710.570577][ T9486] ? vm_area_dup+0x26/0x1d0 [ 2710.574919][ T9486] vm_area_dup+0x26/0x1d0 [ 2710.579083][ T9486] dup_mmap+0x6b8/0xea0 [ 2710.583077][ T9486] ? __delayed_free_task+0x20/0x20 [ 2710.588025][ T9486] ? mm_init+0x807/0x960 [ 2710.592103][ T9486] dup_mm+0x91/0x330 [ 2710.595839][ T9486] copy_mm+0x108/0x1b0 [ 2710.599740][ T9486] copy_process+0x1295/0x3250 [ 2710.604255][ T9486] ? proc_fail_nth_write+0x213/0x290 [ 2710.609380][ T9486] ? proc_fail_nth_read+0x220/0x220 [ 2710.614413][ T9486] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2710.619357][ T9486] ? vfs_write+0x9af/0x1050 [ 2710.623693][ T9486] ? vmacache_update+0xb7/0x120 [ 2710.628390][ T9486] kernel_clone+0x22d/0x990 [ 2710.632727][ T9486] ? file_end_write+0x1b0/0x1b0 [ 2710.637413][ T9486] ? __kasan_check_write+0x14/0x20 [ 2710.642353][ T9486] ? create_io_thread+0x1e0/0x1e0 [ 2710.647217][ T9486] ? __mutex_lock_slowpath+0x10/0x10 [ 2710.652338][ T9486] __x64_sys_clone+0x289/0x310 [ 2710.656939][ T9486] ? __do_sys_vfork+0x130/0x130 [ 2710.661630][ T9486] ? debug_smp_processor_id+0x17/0x20 [ 2710.666832][ T9486] do_syscall_64+0x44/0xd0 [ 2710.671085][ T9486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2710.676811][ T9486] RIP: 0033:0x7fc683db00c9 [ 2710.681063][ T9486] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2710.700507][ T9486] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2710.708752][ T9486] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2710.716561][ T9486] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2710.724379][ T9486] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:48 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 88) 00:44:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000200000200c000000000009000000000000"], &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) (async) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x3f, 0x2, 0x10001, 0x100, r0, 0x8, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0xd}, 0x48) 00:44:48 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0) 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7001}, 0x48) 00:44:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x12000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x18}, 0x20) [ 2710.732183][ T9486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2710.739997][ T9486] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2710.747813][ T9486] 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7002}, 0x48) 00:44:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000200000200c000000000009000000000000"], &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x3f, 0x2, 0x10001, 0x100, r0, 0x8, '\x00', r1, 0xffffffffffffffff, 0x5, 0x0, 0x3, 0xd}, 0x48) 00:44:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x18000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3ee}, 0x20) 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7003}, 0x48) 00:44:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000200)) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000280)=0x3) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b0000000000000008000000000000000100"/78], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) r4 = openat$cgroup_ro(r0, &(0x7f0000000500)='memory.swap.events\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000740), 0x12) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000740), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0xa, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @jmp={0x5, 0x1, 0xc, 0x8, 0x5, 0x50, 0xfffffffffffffff0}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @jmp={0x5, 0x1, 0xd, 0x7, 0x0, 0xffffffffffffffc0, 0x10}]}, &(0x7f0000000380)='syzkaller\x00', 0x87, 0x4b, &(0x7f00000003c0)=""/75, 0x40f00, 0xf, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000480)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x1000, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r1, r0, r4, r0, r5, r6, r0, r0]}, 0x80) [ 2710.823086][ T9521] FAULT_INJECTION: forcing a failure. [ 2710.823086][ T9521] name failslab, interval 1, probability 0, space 0, times 0 [ 2710.845097][ T9521] CPU: 0 PID: 9521 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2710.856472][ T9521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2710.866367][ T9521] Call Trace: [ 2710.869490][ T9521] [ 2710.872265][ T9521] dump_stack_lvl+0x151/0x1b7 [ 2710.876783][ T9521] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2710.882077][ T9521] dump_stack+0x15/0x17 [ 2710.886174][ T9521] should_fail+0x3c0/0x510 [ 2710.890409][ T9521] __should_failslab+0x9f/0xe0 [ 2710.895009][ T9521] should_failslab+0x9/0x20 [ 2710.899346][ T9521] kmem_cache_alloc+0x4f/0x2f0 [ 2710.903946][ T9521] ? anon_vma_clone+0xa1/0x4f0 [ 2710.908554][ T9521] anon_vma_clone+0xa1/0x4f0 [ 2710.912973][ T9521] anon_vma_fork+0x91/0x4f0 [ 2710.917311][ T9521] ? anon_vma_name+0x4c/0x70 [ 2710.921739][ T9521] dup_mmap+0x750/0xea0 [ 2710.925735][ T9521] ? __delayed_free_task+0x20/0x20 [ 2710.930679][ T9521] ? mm_init+0x807/0x960 [ 2710.934760][ T9521] dup_mm+0x91/0x330 [ 2710.938490][ T9521] copy_mm+0x108/0x1b0 [ 2710.942417][ T9521] copy_process+0x1295/0x3250 [ 2710.946910][ T9521] ? proc_fail_nth_write+0x213/0x290 [ 2710.952030][ T9521] ? proc_fail_nth_read+0x220/0x220 [ 2710.957062][ T9521] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2710.962012][ T9521] ? vfs_write+0x9af/0x1050 [ 2710.966351][ T9521] ? vmacache_update+0xb7/0x120 [ 2710.971035][ T9521] kernel_clone+0x22d/0x990 [ 2710.975376][ T9521] ? file_end_write+0x1b0/0x1b0 [ 2710.980060][ T9521] ? __kasan_check_write+0x14/0x20 [ 2710.985010][ T9521] ? create_io_thread+0x1e0/0x1e0 [ 2710.989871][ T9521] ? __mutex_lock_slowpath+0x10/0x10 [ 2710.994991][ T9521] __x64_sys_clone+0x289/0x310 [ 2710.999593][ T9521] ? __do_sys_vfork+0x130/0x130 [ 2711.004280][ T9521] ? debug_smp_processor_id+0x17/0x20 [ 2711.009489][ T9521] do_syscall_64+0x44/0xd0 [ 2711.013739][ T9521] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2711.019466][ T9521] RIP: 0033:0x7fc683db00c9 [ 2711.023720][ T9521] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2711.043162][ T9521] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2711.051405][ T9521] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2711.059218][ T9521] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7200}, 0x48) 00:44:48 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x4d030000, 0x0, 0x0, 0x0) 00:44:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f2}, 0x20) 00:44:48 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 89) 00:44:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x25000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000200)) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000280)=0x3) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b0000000000000008000000000000000100"/78], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) (async) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) (async) r4 = openat$cgroup_ro(r0, &(0x7f0000000500)='memory.swap.events\x00', 0x0, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000740), 0x12) (async) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000740), 0x12) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0xa, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @jmp={0x5, 0x1, 0xc, 0x8, 0x5, 0x50, 0xfffffffffffffff0}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @jmp={0x5, 0x1, 0xd, 0x7, 0x0, 0xffffffffffffffc0, 0x10}]}, &(0x7f0000000380)='syzkaller\x00', 0x87, 0x4b, &(0x7f00000003c0)=""/75, 0x40f00, 0xf, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000480)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x1000, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r1, r0, r4, r0, r5, r6, r0, r0]}, 0x80) 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7201}, 0x48) 00:44:48 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TUNGETVNETLE(r0, 0x800454dd, &(0x7f0000000200)) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r0}, 0x8) ioctl$TUNSETDEBUG(r1, 0x400454c9, &(0x7f0000000280)=0x3) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b0000000000000008000000000000000100"/78], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r0}, 0x8) (async) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000440), 0x4) (async) r4 = openat$cgroup_ro(r0, &(0x7f0000000500)='memory.swap.events\x00', 0x0, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r5, &(0x7f0000000740), 0x12) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r6, &(0x7f0000000740), 0x12) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0xa, &(0x7f0000000300)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x7}, [@btf_id={0x18, 0x8, 0x3, 0x0, 0x2}, @jmp={0x5, 0x1, 0xc, 0x8, 0x5, 0x50, 0xfffffffffffffff0}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @jmp={0x5, 0x1, 0xd, 0x7, 0x0, 0xffffffffffffffc0, 0x10}]}, &(0x7f0000000380)='syzkaller\x00', 0x87, 0x4b, &(0x7f00000003c0)=""/75, 0x40f00, 0xf, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000480)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x3, 0x1000, 0x1}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000540)=[r1, r0, r4, r0, r5, r6, r0, r0]}, 0x80) 00:44:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f3}, 0x20) 00:44:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x48000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2711.067027][ T9521] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2711.074841][ T9521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2711.082653][ T9521] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2711.090465][ T9521] 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7202}, 0x48) 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7401}, 0x48) 00:44:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x4c000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) [ 2711.154653][ T9553] FAULT_INJECTION: forcing a failure. [ 2711.154653][ T9553] name failslab, interval 1, probability 0, space 0, times 0 [ 2711.181747][ T9553] CPU: 0 PID: 9553 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2711.193129][ T9553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2711.203020][ T9553] Call Trace: [ 2711.206144][ T9553] [ 2711.208924][ T9553] dump_stack_lvl+0x151/0x1b7 [ 2711.213440][ T9553] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2711.218733][ T9553] ? preempt_count_add+0x90/0x1a0 [ 2711.223600][ T9553] dump_stack+0x15/0x17 [ 2711.227583][ T9553] should_fail+0x3c0/0x510 [ 2711.231837][ T9553] __should_failslab+0x9f/0xe0 [ 2711.236437][ T9553] should_failslab+0x9/0x20 [ 2711.240774][ T9553] kmem_cache_alloc+0x4f/0x2f0 [ 2711.245380][ T9553] ? copy_thread+0x353/0x750 [ 2711.249800][ T9553] ? alloc_pid+0x9c/0xad0 [ 2711.253966][ T9553] alloc_pid+0x9c/0xad0 [ 2711.257963][ T9553] copy_process+0x1658/0x3250 [ 2711.262560][ T9553] ? proc_fail_nth_write+0x213/0x290 [ 2711.267679][ T9553] ? proc_fail_nth_read+0x220/0x220 [ 2711.272713][ T9553] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2711.277659][ T9553] ? vfs_write+0x9af/0x1050 [ 2711.282000][ T9553] ? vmacache_update+0xb7/0x120 [ 2711.286691][ T9553] kernel_clone+0x22d/0x990 [ 2711.291027][ T9553] ? file_end_write+0x1b0/0x1b0 [ 2711.295712][ T9553] ? __kasan_check_write+0x14/0x20 [ 2711.300662][ T9553] ? create_io_thread+0x1e0/0x1e0 [ 2711.305521][ T9553] ? __mutex_lock_slowpath+0x10/0x10 [ 2711.310642][ T9553] __x64_sys_clone+0x289/0x310 [ 2711.315245][ T9553] ? __do_sys_vfork+0x130/0x130 [ 2711.319935][ T9553] ? debug_smp_processor_id+0x17/0x20 [ 2711.325139][ T9553] do_syscall_64+0x44/0xd0 [ 2711.329394][ T9553] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2711.335117][ T9553] RIP: 0033:0x7fc683db00c9 [ 2711.339370][ T9553] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2711.358810][ T9553] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2711.367055][ T9553] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2711.374867][ T9553] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2711.382765][ T9553] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2711.390582][ T9553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2711.398388][ T9553] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2711.406202][ T9553] 00:44:48 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 90) 00:44:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f4}, 0x20) 00:44:48 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:48 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 00:44:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x68000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7402}, 0x48) 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7403}, 0x48) 00:44:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x6c000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:48 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) mkdir(&(0x7f00000001c0)='./file0\x00', 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) 00:44:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f5}, 0x20) 00:44:48 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7600}, 0x48) 00:44:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3f6}, 0x20) [ 2711.529718][ T9592] FAULT_INJECTION: forcing a failure. [ 2711.529718][ T9592] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2711.549012][ T9592] CPU: 1 PID: 9592 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2711.560389][ T9592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2711.570284][ T9592] Call Trace: [ 2711.573404][ T9592] [ 2711.576180][ T9592] dump_stack_lvl+0x151/0x1b7 [ 2711.580699][ T9592] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2711.585992][ T9592] ? is_bpf_text_address+0x1a2/0x1c0 [ 2711.591110][ T9592] ? is_module_text_address+0xe1/0x140 [ 2711.596403][ T9592] dump_stack+0x15/0x17 [ 2711.600398][ T9592] should_fail+0x3c0/0x510 [ 2711.604652][ T9592] should_fail_alloc_page+0x58/0x70 [ 2711.609681][ T9592] __alloc_pages+0x1de/0x7c0 [ 2711.614119][ T9592] ? __count_vm_events+0x30/0x30 [ 2711.618883][ T9592] ? __kernel_text_address+0x9a/0x110 [ 2711.624091][ T9592] wp_page_copy+0x20d/0x1920 [ 2711.628518][ T9592] ? cpumask_next+0x8a/0xb0 [ 2711.632855][ T9592] ? __kasan_check_write+0x14/0x20 [ 2711.637802][ T9592] ? _raw_spin_trylock+0xe2/0x1e0 [ 2711.642663][ T9592] ? insert_page_into_pte_locked+0x3b0/0x3b0 [ 2711.648481][ T9592] ? __pte_map_lock+0x594/0x660 [ 2711.653164][ T9592] ? vm_normal_page+0x97/0x1f0 [ 2711.657765][ T9592] do_wp_page+0x7a4/0xb40 [ 2711.661934][ T9592] handle_pte_fault+0x547/0x11d0 [ 2711.666704][ T9592] ? update_load_avg+0x415/0x8e0 [ 2711.671478][ T9592] ? cgroup_rstat_updated+0xe5/0x380 [ 2711.676597][ T9592] ? fault_around_bytes_set+0xc0/0xc0 [ 2711.681808][ T9592] ? do_handle_mm_fault+0x142f/0x2370 [ 2711.687013][ T9592] ? memcpy+0x56/0x70 [ 2711.690831][ T9592] do_handle_mm_fault+0x2073/0x2370 [ 2711.695869][ T9592] ? numa_migrate_prep+0xe0/0xe0 [ 2711.700644][ T9592] ? activate_task+0x1ad/0x480 [ 2711.705240][ T9592] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 2711.710882][ T9592] ? wake_up_new_task+0x65f/0x9f0 [ 2711.715740][ T9592] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2711.720951][ T9592] ? to_ratio+0x30/0x30 [ 2711.724942][ T9592] ? do_user_addr_fault+0xad2/0x1220 [ 2711.730063][ T9592] ? access_error+0x251/0x270 [ 2711.734577][ T9592] do_user_addr_fault+0xb5d/0x1220 [ 2711.739528][ T9592] ? do_kern_addr_fault+0x80/0x80 [ 2711.744388][ T9592] ? switch_fpu_return+0xe/0x10 [ 2711.749077][ T9592] exc_page_fault+0x68/0x1a0 [ 2711.753582][ T9592] asm_exc_page_fault+0x27/0x30 [ 2711.758282][ T9592] RIP: 0033:0x7fc683d4fa00 [ 2711.762522][ T9592] Code: c0 75 27 69 3d bd 9c ca 00 b8 0b 00 00 e8 68 06 06 00 31 f6 bf 3c 00 00 00 31 c0 e8 ba 06 06 00 eb fe 0f 1f 84 00 00 00 00 00 <64> c7 04 25 b4 ff ff ff 00 00 00 00 48 83 c4 38 c3 66 66 2e 0f 1f [ 2711.781973][ T9592] RSP: 002b:00007fc682b23120 EFLAGS: 00010202 [ 2711.787864][ T9592] RAX: 0000000000004d9b RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2711.795678][ T9592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2711.803486][ T9592] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2711.811305][ T9592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2711.819110][ T9592] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2711.826925][ T9592] 00:44:49 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 91) 00:44:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x74000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:49 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x80) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:49 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 00:44:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7601}, 0x48) 00:44:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3fd}, 0x20) 00:44:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7602}, 0x48) [ 2711.834838][ T9592] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF 00:44:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x3fe}, 0x20) 00:44:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x7a000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f00000001c0)=""/207, 0x4e, 0xcf, 0x1}, 0x20) [ 2711.877227][ T9608] FAULT_INJECTION: forcing a failure. [ 2711.877227][ T9608] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2711.895494][ T9608] CPU: 1 PID: 9608 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2711.906867][ T9608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2711.916761][ T9608] Call Trace: [ 2711.919884][ T9608] [ 2711.922660][ T9608] dump_stack_lvl+0x151/0x1b7 00:44:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f00000001c0)=""/207, 0x4e, 0xcf, 0x1}, 0x20) 00:44:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f00000001c0)=""/207, 0x4e, 0xcf, 0x1}, 0x20) [ 2711.927176][ T9608] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2711.932470][ T9608] dump_stack+0x15/0x17 [ 2711.936462][ T9608] should_fail+0x3c0/0x510 [ 2711.940715][ T9608] should_fail_alloc_page+0x58/0x70 [ 2711.945751][ T9608] __alloc_pages+0x1de/0x7c0 [ 2711.950176][ T9608] ? __count_vm_events+0x30/0x30 [ 2711.954951][ T9608] pte_alloc_one+0x73/0x1b0 [ 2711.959291][ T9608] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2711.964325][ T9608] __pte_alloc+0x86/0x350 [ 2711.968488][ T9608] ? free_pgtables+0x210/0x210 [ 2711.973086][ T9608] ? _raw_spin_lock+0xa3/0x1b0 [ 2711.977690][ T9608] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2711.982896][ T9608] ? unwind_get_return_address+0x4c/0x90 [ 2711.988366][ T9608] copy_pte_range+0x1b1f/0x20b0 [ 2711.993050][ T9608] ? stack_trace_save+0x12d/0x1f0 [ 2711.997916][ T9608] ? anon_vma_clone+0xa1/0x4f0 [ 2712.002520][ T9608] ? __kunmap_atomic+0x80/0x80 [ 2712.007107][ T9608] ? dup_mmap+0x750/0xea0 [ 2712.011273][ T9608] ? copy_mm+0x108/0x1b0 [ 2712.015358][ T9608] ? copy_process+0x1295/0x3250 [ 2712.020040][ T9608] ? kernel_clone+0x22d/0x990 [ 2712.024555][ T9608] ? __x64_sys_clone+0x289/0x310 [ 2712.029326][ T9608] ? do_syscall_64+0x44/0xd0 [ 2712.033756][ T9608] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2712.039658][ T9608] copy_page_range+0xc1e/0x1090 [ 2712.044353][ T9608] ? pfn_valid+0x1e0/0x1e0 [ 2712.048598][ T9608] dup_mmap+0x99f/0xea0 [ 2712.052591][ T9608] ? __delayed_free_task+0x20/0x20 [ 2712.057536][ T9608] ? mm_init+0x807/0x960 [ 2712.061617][ T9608] dup_mm+0x91/0x330 [ 2712.065348][ T9608] copy_mm+0x108/0x1b0 [ 2712.069256][ T9608] copy_process+0x1295/0x3250 [ 2712.073767][ T9608] ? proc_fail_nth_write+0x213/0x290 [ 2712.078884][ T9608] ? proc_fail_nth_read+0x220/0x220 [ 2712.083920][ T9608] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2712.088866][ T9608] ? vfs_write+0x9af/0x1050 [ 2712.093264][ T9608] ? vmacache_update+0xb7/0x120 [ 2712.097896][ T9608] kernel_clone+0x22d/0x990 [ 2712.102577][ T9608] ? file_end_write+0x1b0/0x1b0 [ 2712.107262][ T9608] ? __kasan_check_write+0x14/0x20 [ 2712.112209][ T9608] ? create_io_thread+0x1e0/0x1e0 [ 2712.117069][ T9608] ? __mutex_lock_slowpath+0x10/0x10 [ 2712.122191][ T9608] __x64_sys_clone+0x289/0x310 [ 2712.126791][ T9608] ? __do_sys_vfork+0x130/0x130 [ 2712.131477][ T9608] ? debug_smp_processor_id+0x17/0x20 [ 2712.136683][ T9608] do_syscall_64+0x44/0xd0 [ 2712.140938][ T9608] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2712.146666][ T9608] RIP: 0033:0x7fc683db00c9 [ 2712.150920][ T9608] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2712.170358][ T9608] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 00:44:49 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 92) 00:44:49 executing program 3: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000001c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x7, 0x3}, {}, {0x3}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000200)={'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) 00:44:49 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xff0f0100, 0x0, 0x0, 0x0) 00:44:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0xc4000000, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0xffffff}, 0x20) 00:44:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7603}, 0x48) [ 2712.178605][ T9608] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2712.186416][ T9608] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2712.194236][ T9608] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2712.202037][ T9608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2712.209849][ T9608] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2712.217663][ T9608] 00:44:49 executing program 3: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000001c0)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x7, 0x3}, {}, {0x3}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000200)={'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) 00:44:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x0, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x20000145}, 0x20) 00:44:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7800}, 0x48) 00:44:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x2, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:49 executing program 3: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f00000001c0)) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x7, 0x3}, {}, {0x3}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000200)={'wg1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) [ 2712.271208][ T9632] FAULT_INJECTION: forcing a failure. [ 2712.271208][ T9632] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2712.309821][ T9632] CPU: 1 PID: 9632 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2712.321197][ T9632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2712.331091][ T9632] Call Trace: [ 2712.334217][ T9632] [ 2712.336993][ T9632] dump_stack_lvl+0x151/0x1b7 [ 2712.341504][ T9632] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2712.346801][ T9632] dump_stack+0x15/0x17 [ 2712.350791][ T9632] should_fail+0x3c0/0x510 [ 2712.355044][ T9632] should_fail_alloc_page+0x58/0x70 [ 2712.360079][ T9632] __alloc_pages+0x1de/0x7c0 [ 2712.364507][ T9632] ? __count_vm_events+0x30/0x30 [ 2712.369280][ T9632] pte_alloc_one+0x73/0x1b0 [ 2712.373617][ T9632] ? pfn_modify_allowed+0x2e0/0x2e0 [ 2712.378652][ T9632] __pte_alloc+0x86/0x350 [ 2712.382818][ T9632] ? free_pgtables+0x210/0x210 [ 2712.387416][ T9632] ? _raw_spin_lock+0xa3/0x1b0 [ 2712.392015][ T9632] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 2712.397222][ T9632] ? unwind_get_return_address+0x4c/0x90 [ 2712.402692][ T9632] copy_pte_range+0x1b1f/0x20b0 [ 2712.407380][ T9632] ? stack_trace_save+0x12d/0x1f0 [ 2712.412243][ T9632] ? anon_vma_clone+0xa1/0x4f0 [ 2712.417367][ T9632] ? __kunmap_atomic+0x80/0x80 [ 2712.421964][ T9632] ? dup_mmap+0x750/0xea0 [ 2712.426124][ T9632] ? copy_mm+0x108/0x1b0 [ 2712.430207][ T9632] ? copy_process+0x1295/0x3250 [ 2712.434895][ T9632] ? kernel_clone+0x22d/0x990 [ 2712.439405][ T9632] ? __x64_sys_clone+0x289/0x310 [ 2712.444180][ T9632] ? do_syscall_64+0x44/0xd0 [ 2712.448603][ T9632] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2712.454513][ T9632] copy_page_range+0xc1e/0x1090 [ 2712.459199][ T9632] ? pfn_valid+0x1e0/0x1e0 [ 2712.463450][ T9632] dup_mmap+0x99f/0xea0 [ 2712.467443][ T9632] ? __delayed_free_task+0x20/0x20 [ 2712.472387][ T9632] ? mm_init+0x807/0x960 [ 2712.476466][ T9632] dup_mm+0x91/0x330 [ 2712.480201][ T9632] copy_mm+0x108/0x1b0 [ 2712.484105][ T9632] copy_process+0x1295/0x3250 [ 2712.488619][ T9632] ? proc_fail_nth_write+0x213/0x290 [ 2712.493739][ T9632] ? proc_fail_nth_read+0x220/0x220 [ 2712.498769][ T9632] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2712.503720][ T9632] ? vfs_write+0x9af/0x1050 [ 2712.508056][ T9632] ? vmacache_update+0xb7/0x120 [ 2712.512745][ T9632] kernel_clone+0x22d/0x990 [ 2712.517086][ T9632] ? file_end_write+0x1b0/0x1b0 [ 2712.521774][ T9632] ? __kasan_check_write+0x14/0x20 [ 2712.526720][ T9632] ? create_io_thread+0x1e0/0x1e0 [ 2712.531578][ T9632] ? __mutex_lock_slowpath+0x10/0x10 [ 2712.536700][ T9632] __x64_sys_clone+0x289/0x310 [ 2712.541301][ T9632] ? __do_sys_vfork+0x130/0x130 [ 2712.545993][ T9632] ? debug_smp_processor_id+0x17/0x20 [ 2712.551205][ T9632] do_syscall_64+0x44/0xd0 [ 2712.555444][ T9632] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2712.561177][ T9632] RIP: 0033:0x7fc683db00c9 [ 2712.565430][ T9632] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 2712.584870][ T9632] RSP: 002b:00007fc682b23118 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 2712.593114][ T9632] RAX: ffffffffffffffda RBX: 00007fc683ecff80 RCX: 00007fc683db00c9 [ 2712.600925][ T9632] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 2712.608842][ T9632] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 00:44:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 93) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7801}, 0x48) 00:44:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x25) 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x3, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000080)=""/185, 0x26, 0xb9, 0x1}, 0x20) 00:44:50 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x4, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x29) [ 2712.616649][ T9632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2712.624459][ T9632] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2712.632274][ T9632] 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x5, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x200001a0) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7802}, 0x48) 00:44:50 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000080)=""/185, 0x26, 0xb9, 0x1}, 0x20) [ 2712.681798][ T9661] FAULT_INJECTION: forcing a failure. [ 2712.681798][ T9661] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2712.707476][ T9661] CPU: 0 PID: 9661 Comm: syz-executor.0 Tainted: G B 5.15.78-syzkaller-00911-gc73b4619ad86 #0 [ 2712.718946][ T9661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 2712.728840][ T9661] Call Trace: [ 2712.731961][ T9661] [ 2712.734825][ T9661] dump_stack_lvl+0x151/0x1b7 [ 2712.739340][ T9661] ? bfq_pos_tree_add_move+0x43e/0x43e [ 2712.744631][ T9661] ? vsnprintf+0x1fa/0x1ce0 [ 2712.748972][ T9661] dump_stack+0x15/0x17 [ 2712.752964][ T9661] should_fail+0x3c0/0x510 [ 2712.757218][ T9661] should_fail_usercopy+0x1a/0x20 [ 2712.762077][ T9661] _copy_from_user+0x20/0xd0 [ 2712.766508][ T9661] kstrtouint_from_user+0xd7/0x2b0 [ 2712.771460][ T9661] ? kstrtol_from_user+0x310/0x310 [ 2712.776408][ T9661] ? snprintf+0xd6/0x120 [ 2712.780478][ T9661] ? __kasan_check_read+0x11/0x20 [ 2712.785338][ T9661] ? _copy_to_user+0x78/0x90 [ 2712.789766][ T9661] proc_fail_nth_write+0xa5/0x290 [ 2712.794625][ T9661] ? proc_fail_nth_read+0x220/0x220 [ 2712.799657][ T9661] ? security_file_permission+0xf3/0x5f0 [ 2712.805128][ T9661] ? proc_fail_nth_read+0x220/0x220 [ 2712.810256][ T9661] vfs_write+0x3fd/0x1050 [ 2712.814414][ T9661] ? __kasan_check_read+0x11/0x20 [ 2712.819276][ T9661] ? file_end_write+0x1b0/0x1b0 [ 2712.823960][ T9661] ? __kasan_check_write+0x14/0x20 [ 2712.828906][ T9661] ? mutex_lock+0xb6/0x130 [ 2712.833160][ T9661] ? wait_for_completion_killable_timeout+0x10/0x10 [ 2712.839583][ T9661] ? __fdget_pos+0x26d/0x310 [ 2712.844008][ T9661] ? ksys_write+0x77/0x2c0 [ 2712.848266][ T9661] ksys_write+0x198/0x2c0 [ 2712.852429][ T9661] ? __ia32_sys_read+0x90/0x90 [ 2712.857037][ T9661] ? debug_smp_processor_id+0x17/0x20 [ 2712.862242][ T9661] __x64_sys_write+0x7b/0x90 [ 2712.866666][ T9661] do_syscall_64+0x44/0xd0 [ 2712.870917][ T9661] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2712.876641][ T9661] RIP: 0033:0x7fc683d61e4f [ 2712.880897][ T9661] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 2712.900337][ T9661] RSP: 002b:00007fc682b23160 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 2712.908582][ T9661] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc683d61e4f [ 2712.916393][ T9661] RDX: 0000000000000001 RSI: 00007fc682b231e0 RDI: 0000000000000004 [ 2712.924205][ T9661] RBP: 00007fc682b231d0 R08: 0000000000000000 R09: 0000000000000000 [ 2712.932014][ T9661] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 2712.939826][ T9661] R13: 00007ffe3980939f R14: 00007fc682b23300 R15: 0000000000022000 [ 2712.947640][ T9661] 00:44:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:50 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000080)=""/185, 0x26, 0xb9, 0x1}, 0x20) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', 0x0, 0x10}, 0x10) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000080)=""/185, 0x26, 0xb9, 0x1}, 0x20) (async) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7803}, 0x48) 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x6, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000380)={0x2, 0x4e24, @rand_addr=0x64010101}, 0x10, &(0x7f0000000880)=[{&(0x7f00000003c0)="108b12a14638b676e50593c66c9391be093debb523457baa80e749402711f9200fc9ad5ce077dfd8acac3c25ed4cc3a76a93f4bc17a81ff24c0f22fa57b54bba9138b48434239890ad1e2e749d70a7336ba5ca11bd015f96b5f89c8c5f4b84cdd8a951ebac96959e9741accbdebd1005fd72c83542e3af751aeff604bb8b282eea1361e769403052be9ba31c3f4b11fd98c8552f48f73e7815132ed45f26d55581689a0f8827972498a9785ebc83219587abe614ef47b73b96fc35a79c22d1a0ae7161656a069cd98271de379a13a628", 0xd0}, {&(0x7f00000004c0)="bf4dd930aa99c1767b5024465c68b206b1643a5fffbce8705c7b2627eb59faec651b8a21832dbadf7d50c789e902d8c0bc37653f", 0x34}, {&(0x7f0000000500)}, {&(0x7f0000000540)="5f64db6a726ec28605f77df887d352851ae53de1e07ad9b5969365bfc5cd5201551119b4eb18a308179020ec998043e35f41c6450ea74fbfbcda5ea373ce64cc38662fe509b06901cd559de143a8b25cf0bc17ff919727387db8e4c138287c", 0x5f}, {&(0x7f00000005c0)="22fc3baf808a95cb0cc2886fb8e39a3e9e6c640e33442d4d1deabae612554a84a973670231f16e1a641057ff91b65fb84e725c8e3d4bd9af74e013bfe9d63c4573686087465a4ee881d5fb88f51ad9e03d13ab98b4", 0x55}, {&(0x7f0000000640)="cd77ecab2c7f3090f4ac860f0a471d2985256377b7dfea1520f406d189af5ae5cbae666757065be5775cf6fe408d8e45835d7179a5bd0caffa87359bfabdb4683ca73cc060e2b0c11b6d7901f58ba8592c31710e0413b40f090b3e65998b3af7ce09737d39fe2eb3fb696ba784c6617450b2aa6f878830c2b4f9ac4c5ae956cdae2de81f59a4d455117b11be125d67da04d842b50e1e800877baf7aaf6a2b7443ba375091446eeafc654ea46ba6cb3", 0xaf}, {&(0x7f0000000700)="0a794f8ed7cd65eca9978ff86a6e77b9feae5c04a642a831602026dc631f992c0cb43ec7a00516e228eb375589ffc8833fcc9d015d9324f43d6d4c3fab6f646d7ca01f345a0a1d1dba4b34ddefec80c381c766b22bdeddafdce1da989024cabc6df067b8a75e7b070e6d784a7770e720c87fb603f0e8ade949351981eed2fbdfdc3bc67ddcb166e0f606876725b2de2cd5cf3628dea237a66e4a8a4174f0ff39dce35d82b350708ccedf6cfc2882db9d10a8a817badd4fef3ffeb273bce4919080eece5d448b1cae701d0b", 0xcb}, {&(0x7f0000000800)="30382306ebaeb01c1caee61267e40bd9fb680c666f212dbe58e93ccdf6789ded32b1dbad156e835b73ea29ba31fb99353cc377c78e2f2b2b90a6cfc3fc51ff18e7fe995d7ba49ff08150044da0a7898a5a113a4191bb466c88b7d9afe0e2b6c1", 0x60}], 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0xe8}, 0x810) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffca4, 0x84, 0xc, [@fwd={0x5}, @ptr={0xf, 0x0, 0x0, 0x2, 0x5}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x78, 0x0, 0x5a, 0x6}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xb}, {0x1}, {0xe}, {0xc, 0x2}, {0xb, 0x4}, {0x4, 0x1}, {0xe, 0x5}, {0x7}, {0x7, 0x1}, {0xd, 0x1}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x61, 0x0, 0x0, 0x30, 0x2e, 0x30, 0x28]}}, &(0x7f0000000280)=""/136, 0xa8, 0x88}, 0x20) 00:44:50 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7a00}, 0x48) 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x7, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7a01}, 0x48) 00:44:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000380)={0x2, 0x4e24, @rand_addr=0x64010101}, 0x10, &(0x7f0000000880)=[{&(0x7f00000003c0)="108b12a14638b676e50593c66c9391be093debb523457baa80e749402711f9200fc9ad5ce077dfd8acac3c25ed4cc3a76a93f4bc17a81ff24c0f22fa57b54bba9138b48434239890ad1e2e749d70a7336ba5ca11bd015f96b5f89c8c5f4b84cdd8a951ebac96959e9741accbdebd1005fd72c83542e3af751aeff604bb8b282eea1361e769403052be9ba31c3f4b11fd98c8552f48f73e7815132ed45f26d55581689a0f8827972498a9785ebc83219587abe614ef47b73b96fc35a79c22d1a0ae7161656a069cd98271de379a13a628", 0xd0}, {&(0x7f00000004c0)="bf4dd930aa99c1767b5024465c68b206b1643a5fffbce8705c7b2627eb59faec651b8a21832dbadf7d50c789e902d8c0bc37653f", 0x34}, {&(0x7f0000000500)}, {&(0x7f0000000540)="5f64db6a726ec28605f77df887d352851ae53de1e07ad9b5969365bfc5cd5201551119b4eb18a308179020ec998043e35f41c6450ea74fbfbcda5ea373ce64cc38662fe509b06901cd559de143a8b25cf0bc17ff919727387db8e4c138287c", 0x5f}, {&(0x7f00000005c0)="22fc3baf808a95cb0cc2886fb8e39a3e9e6c640e33442d4d1deabae612554a84a973670231f16e1a641057ff91b65fb84e725c8e3d4bd9af74e013bfe9d63c4573686087465a4ee881d5fb88f51ad9e03d13ab98b4", 0x55}, {&(0x7f0000000640)="cd77ecab2c7f3090f4ac860f0a471d2985256377b7dfea1520f406d189af5ae5cbae666757065be5775cf6fe408d8e45835d7179a5bd0caffa87359bfabdb4683ca73cc060e2b0c11b6d7901f58ba8592c31710e0413b40f090b3e65998b3af7ce09737d39fe2eb3fb696ba784c6617450b2aa6f878830c2b4f9ac4c5ae956cdae2de81f59a4d455117b11be125d67da04d842b50e1e800877baf7aaf6a2b7443ba375091446eeafc654ea46ba6cb3", 0xaf}, {&(0x7f0000000700)="0a794f8ed7cd65eca9978ff86a6e77b9feae5c04a642a831602026dc631f992c0cb43ec7a00516e228eb375589ffc8833fcc9d015d9324f43d6d4c3fab6f646d7ca01f345a0a1d1dba4b34ddefec80c381c766b22bdeddafdce1da989024cabc6df067b8a75e7b070e6d784a7770e720c87fb603f0e8ade949351981eed2fbdfdc3bc67ddcb166e0f606876725b2de2cd5cf3628dea237a66e4a8a4174f0ff39dce35d82b350708ccedf6cfc2882db9d10a8a817badd4fef3ffeb273bce4919080eece5d448b1cae701d0b", 0xcb}, {&(0x7f0000000800)="30382306ebaeb01c1caee61267e40bd9fb680c666f212dbe58e93ccdf6789ded32b1dbad156e835b73ea29ba31fb99353cc377c78e2f2b2b90a6cfc3fc51ff18e7fe995d7ba49ff08150044da0a7898a5a113a4191bb466c88b7d9afe0e2b6c1", 0x60}], 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0xe8}, 0x810) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffca4, 0x84, 0xc, [@fwd={0x5}, @ptr={0xf, 0x0, 0x0, 0x2, 0x5}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x78, 0x0, 0x5a, 0x6}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xb}, {0x1}, {0xe}, {0xc, 0x2}, {0xb, 0x4}, {0x4, 0x1}, {0xe, 0x5}, {0x7}, {0x7, 0x1}, {0xd, 0x1}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x61, 0x0, 0x0, 0x30, 0x2e, 0x30, 0x28]}}, &(0x7f0000000280)=""/136, 0xa8, 0x88}, 0x20) 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x8, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) sendmsg$inet(r0, &(0x7f0000000a00)={&(0x7f0000000380)={0x2, 0x4e24, @rand_addr=0x64010101}, 0x10, &(0x7f0000000880)=[{&(0x7f00000003c0)="108b12a14638b676e50593c66c9391be093debb523457baa80e749402711f9200fc9ad5ce077dfd8acac3c25ed4cc3a76a93f4bc17a81ff24c0f22fa57b54bba9138b48434239890ad1e2e749d70a7336ba5ca11bd015f96b5f89c8c5f4b84cdd8a951ebac96959e9741accbdebd1005fd72c83542e3af751aeff604bb8b282eea1361e769403052be9ba31c3f4b11fd98c8552f48f73e7815132ed45f26d55581689a0f8827972498a9785ebc83219587abe614ef47b73b96fc35a79c22d1a0ae7161656a069cd98271de379a13a628", 0xd0}, {&(0x7f00000004c0)="bf4dd930aa99c1767b5024465c68b206b1643a5fffbce8705c7b2627eb59faec651b8a21832dbadf7d50c789e902d8c0bc37653f", 0x34}, {&(0x7f0000000500)}, {&(0x7f0000000540)="5f64db6a726ec28605f77df887d352851ae53de1e07ad9b5969365bfc5cd5201551119b4eb18a308179020ec998043e35f41c6450ea74fbfbcda5ea373ce64cc38662fe509b06901cd559de143a8b25cf0bc17ff919727387db8e4c138287c", 0x5f}, {&(0x7f00000005c0)="22fc3baf808a95cb0cc2886fb8e39a3e9e6c640e33442d4d1deabae612554a84a973670231f16e1a641057ff91b65fb84e725c8e3d4bd9af74e013bfe9d63c4573686087465a4ee881d5fb88f51ad9e03d13ab98b4", 0x55}, {&(0x7f0000000640)="cd77ecab2c7f3090f4ac860f0a471d2985256377b7dfea1520f406d189af5ae5cbae666757065be5775cf6fe408d8e45835d7179a5bd0caffa87359bfabdb4683ca73cc060e2b0c11b6d7901f58ba8592c31710e0413b40f090b3e65998b3af7ce09737d39fe2eb3fb696ba784c6617450b2aa6f878830c2b4f9ac4c5ae956cdae2de81f59a4d455117b11be125d67da04d842b50e1e800877baf7aaf6a2b7443ba375091446eeafc654ea46ba6cb3", 0xaf}, {&(0x7f0000000700)="0a794f8ed7cd65eca9978ff86a6e77b9feae5c04a642a831602026dc631f992c0cb43ec7a00516e228eb375589ffc8833fcc9d015d9324f43d6d4c3fab6f646d7ca01f345a0a1d1dba4b34ddefec80c381c766b22bdeddafdce1da989024cabc6df067b8a75e7b070e6d784a7770e720c87fb603f0e8ade949351981eed2fbdfdc3bc67ddcb166e0f606876725b2de2cd5cf3628dea237a66e4a8a4174f0ff39dce35d82b350708ccedf6cfc2882db9d10a8a817badd4fef3ffeb273bce4919080eece5d448b1cae701d0b", 0xcb}, {&(0x7f0000000800)="30382306ebaeb01c1caee61267e40bd9fb680c666f212dbe58e93ccdf6789ded32b1dbad156e835b73ea29ba31fb99353cc377c78e2f2b2b90a6cfc3fc51ff18e7fe995d7ba49ff08150044da0a7898a5a113a4191bb466c88b7d9afe0e2b6c1", 0x60}], 0x8, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], 0xe8}, 0x810) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xfffffca4, 0x84, 0xc, [@fwd={0x5}, @ptr={0xf, 0x0, 0x0, 0x2, 0x5}, @int={0x8, 0x0, 0x0, 0x1, 0x0, 0x78, 0x0, 0x5a, 0x6}, @func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0xb}, {0x1}, {0xe}, {0xc, 0x2}, {0xb, 0x4}, {0x4, 0x1}, {0xe, 0x5}, {0x7}, {0x7, 0x1}, {0xd, 0x1}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x61, 0x0, 0x0, 0x30, 0x2e, 0x30, 0x28]}}, &(0x7f0000000280)=""/136, 0xa8, 0x88}, 0x20) 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x9, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7a02}, 0x48) 00:44:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) 00:44:50 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x1b0e41f000, 0x0, 0x0, 0x0) 00:44:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) 00:44:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x3, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xa, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7c01}, 0x48) 00:44:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x7, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7c02}, 0x48) 00:44:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xb, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:50 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7c03}, 0x48) 00:44:50 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x8, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xc, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7e00}, 0x48) 00:44:51 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x2aa66eec8000, 0x0, 0x0, 0x0) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x9, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xd, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) openat$cgroup_type(r0, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x9, 0xff, 0x1, 0x0, 0x401, 0x4014, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x302, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x884, 0xfffffffffffffff9, 0x1, 0x5, 0x6, 0xfffff800, 0x11fd, 0x0, 0x7, 0x0, 0x5a}, 0xffffffffffffffff, 0x1, r0, 0xf0d6f22ada051a16) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x4, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4000}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000140)='GPL\x00', 0x101, 0xc9, &(0x7f0000000380)=""/201, 0x40f00, 0x10, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0xa, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b0000000000000008000000000000000000000000000000000000000000000000000000000000000000e8b7493a7c07020648b913826cb0b7c518c6d0b4a80de0a4ad11329e1f0cb4e2e453a7b55bb31361b92b492c9a445dd5843b6caa029091a48afbabcd514be9686313d7a337bb5d31"], &(0x7f00000001c0)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7e01}, 0x48) 00:44:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x9, 0xff, 0x1, 0x0, 0x401, 0x4014, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x302, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x884, 0xfffffffffffffff9, 0x1, 0x5, 0x6, 0xfffff800, 0x11fd, 0x0, 0x7, 0x0, 0x5a}, 0xffffffffffffffff, 0x1, r0, 0xf0d6f22ada051a16) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x4, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4000}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000140)='GPL\x00', 0x101, 0xc9, &(0x7f0000000380)=""/201, 0x40f00, 0x10, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0xa, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b0000000000000008000000000000000000000000000000000000000000000000000000000000000000e8b7493a7c07020648b913826cb0b7c518c6d0b4a80de0a4ad11329e1f0cb4e2e453a7b55bb31361b92b492c9a445dd5843b6caa029091a48afbabcd514be9686313d7a337bb5d31"], &(0x7f00000001c0)=""/197, 0x4e, 0xc5, 0x1}, 0x20) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x9, 0xff, 0x1, 0x0, 0x401, 0x4014, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x302, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x884, 0xfffffffffffffff9, 0x1, 0x5, 0x6, 0xfffff800, 0x11fd, 0x0, 0x7, 0x0, 0x5a}, 0xffffffffffffffff, 0x1, r0, 0xf0d6f22ada051a16) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x4, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4000}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000140)='GPL\x00', 0x101, 0xc9, &(0x7f0000000380)=""/201, 0x40f00, 0x10, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0xa, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[r0]}, 0x80) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x7}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b0000000000000008000000000000000000000000000000000000000000000000000000000000000000e8b7493a7c07020648b913826cb0b7c518c6d0b4a80de0a4ad11329e1f0cb4e2e453a7b55bb31361b92b492c9a445dd5843b6caa029091a48afbabcd514be9686313d7a337bb5d31"], &(0x7f00000001c0)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0xe, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7e02}, 0x48) 00:44:51 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) openat$cgroup_type(r0, &(0x7f0000000200), 0x2, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x300, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x553a26308000, 0x0, 0x0, 0x0) 00:44:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x80, 0x1, 0x9, 0xff, 0x1, 0x0, 0x401, 0x4014, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x302, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x884, 0xfffffffffffffff9, 0x1, 0x5, 0x6, 0xfffff800, 0x11fd, 0x0, 0x7, 0x0, 0x5a}, 0xffffffffffffffff, 0x1, r0, 0xf0d6f22ada051a16) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x4, 0x9, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x9}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit, @map_val={0x18, 0x6, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x4000}, @func={0x85, 0x0, 0x1, 0x0, 0x4}]}, &(0x7f0000000140)='GPL\x00', 0x101, 0xc9, &(0x7f0000000380)=""/201, 0x40f00, 0x10, '\x00', 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0xa, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x7}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000500000d000000000b0000000000000008000000000000000000000000000000000000000000000000000000000000000000e8b7493a7c07020648b913826cb0b7c518c6d0b4a80de0a4ad11329e1f0cb4e2e453a7b55bb31361b92b492c9a445dd5843b6caa029091a48afbabcd514be9686313d7a337bb5d31"], &(0x7f00000001c0)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x7e03}, 0x48) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x10, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 1: openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) openat$cgroup_type(r0, &(0x7f0000000200), 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x3fc, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8002}, 0x48) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x11, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x12, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8003}, 0x48) 00:44:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x8, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, [@exit, @alu={0x4, 0x1, 0xc, 0xb, 0x0, 0xc, 0x10}, @exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x807fff, 0x4f, &(0x7f0000000540)=""/79, 0x40f00, 0x0, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x3, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) 00:44:51 executing program 3: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYRES32=r0], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x5, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000680)='syzkaller\x00', 0x1, 0x25, &(0x7f00000006c0)=""/37, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0xc, 0x1f, 0xabff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x8d, &(0x7f0000000200)=""/141, 0x40f00, 0x1, '\x00', r2, 0x19, r1, 0x8, &(0x7f00000005c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0xa, 0xafb, 0xc6e}, 0x10, 0x26fc7, r3}, 0x80) 00:44:51 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8200}, 0x48) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x700, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x18, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 3: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) (async) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYRES32=r0], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x5, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000680)='syzkaller\x00', 0x1, 0x25, &(0x7f00000006c0)=""/37, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0xc, 0x1f, 0xabff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x8d, &(0x7f0000000200)=""/141, 0x40f00, 0x1, '\x00', r2, 0x19, r1, 0x8, &(0x7f00000005c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0xa, 0xafb, 0xc6e}, 0x10, 0x26fc7, r3}, 0x80) 00:44:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x8, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, [@exit, @alu={0x4, 0x1, 0xc, 0xb, 0x0, 0xc, 0x10}, @exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x807fff, 0x4f, &(0x7f0000000540)=""/79, 0x40f00, 0x0, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x3, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x900, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8201}, 0x48) 00:44:51 executing program 3: r0 = getpid() syz_open_procfs$namespace(r0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYRES32=r0], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x9, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) (async) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x5, &(0x7f0000000640)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x8}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000680)='syzkaller\x00', 0x1, 0x25, &(0x7f00000006c0)=""/37, 0x40f00, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0xc, 0x1f, 0xabff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000780)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_tracing={0x1a, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x81}, [@map_idx={0x18, 0x6, 0x5, 0x0, 0xc}]}, &(0x7f0000000040)='GPL\x00', 0x4, 0x8d, &(0x7f0000000200)=""/141, 0x40f00, 0x1, '\x00', r2, 0x19, r1, 0x8, &(0x7f00000005c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0xa, 0xafb, 0xc6e}, 0x10, 0x26fc7, r3}, 0x80) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x25, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x8, &(0x7f00000004c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x10001}, [@exit, @alu={0x4, 0x1, 0xc, 0xb, 0x0, 0xc, 0x10}, @exit, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x807fff, 0x4f, &(0x7f0000000540)=""/79, 0x40f00, 0x0, '\x00', 0x0, 0x25, r0, 0x8, &(0x7f0000000340)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x3, 0x2, 0x4}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[0x1, 0xffffffffffffffff, r1, 0xffffffffffffffff]}, 0x80) (rerun: 64) 00:44:51 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x2001000000000, 0x0, 0x0, 0x0) 00:44:51 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x8, 0x5, 0x1000, r1, 0x7, '\x00', 0x0, r0, 0x1, 0x5, 0x4, 0xc}, 0x48) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x48, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8202}, 0x48) 00:44:51 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x8, 0x5, 0x1000, r1, 0x7, '\x00', 0x0, r0, 0x1, 0x5, 0x4, 0xc}, 0x48) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8401}, 0x48) 00:44:51 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0xb}, {0x8}, {}, {}, {}]}]}}, &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async, rerun: 32) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='memory.current\x00', 0x0, 0x0) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@bloom_filter={0x1e, 0x0, 0x8, 0x5, 0x1000, r1, 0x7, '\x00', 0x0, r0, 0x1, 0x5, 0x4, 0xc}, 0x48) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x4c, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000004000003400000034000000020000000000000005fcff0d000000000b0000000000000008000000ed00000400000095b5029f0000000000000000000000000000000000000000442c5e9230236cffab163cf64644a6fcfd1fd050e98fe8e684a432e8f19ec15ab632ac805d2ae12933c6d9a4497a26e2e53c31770e9aca78abeed9288f30520e75f2b5ba3238a71984d366a6919706e8aa3bc626e4a295618d3d2a1aa338398a928e542627ee"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000740), 0x12) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r3, 0x58, &(0x7f0000000280)}, 0x10) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8402}, 0x48) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000b6000000b6000000030000000d0000000300000604000000000000d63e9bf69fc37cc70034ee000025000000ffff00000b000040000000090300abec574900000000000a0200fbff010000000100000405000401000000010000000200000000000008050000000d0000000600000f020000000300000003000000d394ec360200000003000000ff0100000200000080001200030000000400000092000000f20d000002000000350f00000201000003000000ff0f0000000000003d150038480c0b5800"/222], &(0x7f0000000080)=""/187, 0xd3, 0xbb, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000012c0)={0xffffffffffffffff, 0x20, &(0x7f0000001280)={&(0x7f0000001300)=""/172, 0xac, 0x0, &(0x7f0000000280)=""/4088, 0xff8}}, 0x10) 00:44:51 executing program 4: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x2020000000000, 0x0, 0x0, 0x0) 00:44:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000004000003400000034000000020000000000000005fcff0d000000000b0000000000000008000000ed00000400000095b5029f0000000000000000000000000000000000000000442c5e9230236cffab163cf64644a6fcfd1fd050e98fe8e684a432e8f19ec15ab632ac805d2ae12933c6d9a4497a26e2e53c31770e9aca78abeed9288f30520e75f2b5ba3238a71984d366a6919706e8aa3bc626e4a295618d3d2a1aa338398a928e542627ee"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r3, &(0x7f0000000740), 0x12) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r3, 0x58, &(0x7f0000000280)}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000004000003400000034000000020000000000000005fcff0d000000000b0000000000000008000000ed00000400000095b5029f0000000000000000000000000000000000000000442c5e9230236cffab163cf64644a6fcfd1fd050e98fe8e684a432e8f19ec15ab632ac805d2ae12933c6d9a4497a26e2e53c31770e9aca78abeed9288f30520e75f2b5ba3238a71984d366a6919706e8aa3bc626e4a295618d3d2a1aa338398a928e542627ee"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async) write$cgroup_pid(r3, &(0x7f0000000740), 0x12) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r0}, 0x8) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r3, 0x58, &(0x7f0000000280)}, 0x10) (async) 00:44:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto={0x0, 0x68, 0x0, 0x88}]}}, &(0x7f0000000080)=""/197, 0x26, 0xc5, 0x1}, 0x20) 00:44:51 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xa, 0x800, 0x20, 0x800, 0x2, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8403}, 0x48) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="9feb01001800000000000000b6000000b6000000030000000d0000000300000604000000000000d63e9bf69fc37cc70034ee000025000000ffff00000b000040000000090300abec574900000000000a0200fbff010000000100000405000401000000010000000200000000000008050000000d0000000600000f020000000300000003000000d394ec360200000003000000ff0100000200000080001200030000000400000092000000f20d000002000000350f00000201000003000000ff0f0000000000003d150038480c0b5800"/222], &(0x7f0000000080)=""/187, 0xd3, 0xbb, 0x1}, 0x20) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000012c0)={0xffffffffffffffff, 0x20, &(0x7f0000001280)={&(0x7f0000001300)=""/172, 0xac, 0x0, &(0x7f0000000280)=""/4088, 0xff8}}, 0x10) 00:44:51 executing program 0: perf_event_open(&(0x7f00000002c0)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0xfc03, 0x0, 0x0, 0x0, 0x0, 0x0) 00:44:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000004000003400000034000000020000000000000005fcff0d000000000b0000000000000008000000ed00000400000095b5029f0000000000000000000000000000000000000000442c5e9230236cffab163cf64644a6fcfd1fd050e98fe8e684a432e8f19ec15ab632ac805d2ae12933c6d9a4497a26e2e53c31770e9aca78abeed9288f30520e75f2b5ba3238a71984d366a6919706e8aa3bc626e4a295618d3d2a1aa338398a928e542627ee"], &(0x7f0000000080)=""/197, 0x4e, 0xc5, 0x1}, 0x20) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r0, &(0x7f0000000740), 0x12) (async) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000740), 0x12) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r2, &(0x7f0000000740), 0x12) (async) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000700)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) write$cgroup_pid(r3,