04542][ T2779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3006.312340][ T2779] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3006.320280][ T2779]
[ 3006.324746][ T2801] CPU: 1 PID: 2801 Comm: syz-executor.4 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3006.336205][ T2801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3006.346106][ T2801] Call Trace:
[ 3006.349220][ T2801]
[ 3006.351999][ T2801] dump_stack_lvl+0x151/0x1b7
[ 3006.356642][ T2801] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3006.362116][ T2801] ? __kasan_slab_alloc+0xc3/0xe0
[ 3006.366963][ T2801] ? __kasan_slab_alloc+0xb1/0xe0
[ 3006.371824][ T2801] ? slab_post_alloc_hook+0x53/0x2c0
[ 3006.376949][ T2801] ? dup_task_struct+0x53/0xc60
[ 3006.381628][ T2801] ? copy_process+0x5c4/0x3260
[ 3006.386232][ T2801] ? kernel_clone+0x21e/0x9e0
[ 3006.390767][ T2801] dump_stack+0x15/0x17
[ 3006.394738][ T2801] should_fail+0x3c6/0x510
[ 3006.398988][ T2801] __should_failslab+0xa4/0xe0
[ 3006.403590][ T2801] should_failslab+0x9/0x20
[ 3006.407932][ T2801] slab_pre_alloc_hook+0x37/0xd0
[ 3006.412701][ T2801] kmem_cache_alloc_trace+0x48/0x210
[ 3006.418023][ T2801] ? __get_vm_area_node+0x117/0x360
[ 3006.423056][ T2801] __get_vm_area_node+0x117/0x360
[ 3006.427911][ T2801] __vmalloc_node_range+0xe2/0x8d0
[ 3006.432867][ T2801] ? copy_process+0x5c4/0x3260
[ 3006.437466][ T2801] ? slab_post_alloc_hook+0x72/0x2c0
[ 3006.442581][ T2801] ? dup_task_struct+0x53/0xc60
[ 3006.447277][ T2801] dup_task_struct+0x416/0xc60
[ 3006.451864][ T2801] ? copy_process+0x5c4/0x3260
[ 3006.456465][ T2801] ? __kasan_check_write+0x14/0x20
[ 3006.461423][ T2801] copy_process+0x5c4/0x3260
[ 3006.466281][ T2801] ? __kasan_check_write+0x14/0x20
[ 3006.471219][ T2801] ? proc_fail_nth_write+0x20b/0x290
[ 3006.476341][ T2801] ? selinux_file_permission+0x2c4/0x570
[ 3006.481810][ T2801] ? fsnotify_perm+0x6a/0x5d0
[ 3006.486330][ T2801] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3006.491275][ T2801] ? vfs_write+0x9ec/0x1110
[ 3006.495697][ T2801] kernel_clone+0x21e/0x9e0
[ 3006.500040][ T2801] ? file_end_write+0x1c0/0x1c0
[ 3006.504720][ T2801] ? create_io_thread+0x1e0/0x1e0
[ 3006.509581][ T2801] ? mutex_unlock+0xb2/0x260
[ 3006.514009][ T2801] ? __mutex_lock_slowpath+0x10/0x10
[ 3006.519389][ T2801] __x64_sys_clone+0x23f/0x290
[ 3006.523990][ T2801] ? __do_sys_vfork+0x130/0x130
[ 3006.528676][ T2801] ? ksys_write+0x260/0x2c0
[ 3006.533018][ T2801] ? debug_smp_processor_id+0x17/0x20
[ 3006.538229][ T2801] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3006.544125][ T2801] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3006.549597][ T2801] do_syscall_64+0x3d/0xb0
[ 3006.553850][ T2801] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3006.559585][ T2801] RIP: 0033:0x7f74c9db9ae9
[ 3006.563830][ T2801] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3006.583268][ T2801] RSP: 002b:00007f74c8b3c078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3006.591518][ T2801] RAX: ffffffffffffffda RBX: 00007f74c9ed8f80 RCX: 00007f74c9db9ae9
[ 3006.599325][ T2801] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3006.607226][ T2801] RBP: 00007f74c8b3c120 R08: 0000000000000000 R09: 0000000000000000
[ 3006.615036][ T2801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3006.622848][ T2801] R13: 000000000000000b R14: 00007f74c9ed8f80 R15: 00007ffe00966378
[ 3006.630667][ T2801]
[ 3006.634276][ T2801] syz-executor.4: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0
[ 3006.649648][ T2801] CPU: 0 PID: 2801 Comm: syz-executor.4 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3006.661037][ T2801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3006.670925][ T2801] Call Trace:
[ 3006.674052][ T2801]
[ 3006.676827][ T2801] dump_stack_lvl+0x151/0x1b7
[ 3006.681346][ T2801] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3006.686809][ T2801] ? pr_cont_kernfs_name+0xf0/0x100
[ 3006.691844][ T2801] dump_stack+0x15/0x17
[ 3006.695832][ T2801] warn_alloc+0x21a/0x390
[ 3006.700004][ T2801] ? should_failslab+0x9/0x20
[ 3006.704528][ T2801] ? zone_watermark_ok_safe+0x270/0x270
[ 3006.709898][ T2801] ? __get_vm_area_node+0x347/0x360
[ 3006.714932][ T2801] __vmalloc_node_range+0x2c1/0x8d0
[ 3006.719962][ T2801] ? slab_post_alloc_hook+0x72/0x2c0
[ 3006.725172][ T2801] ? dup_task_struct+0x53/0xc60
[ 3006.729857][ T2801] dup_task_struct+0x416/0xc60
[ 3006.734470][ T2801] ? copy_process+0x5c4/0x3260
[ 3006.739056][ T2801] ? __kasan_check_write+0x14/0x20
[ 3006.744007][ T2801] copy_process+0x5c4/0x3260
[ 3006.748433][ T2801] ? __kasan_check_write+0x14/0x20
[ 3006.753381][ T2801] ? proc_fail_nth_write+0x20b/0x290
[ 3006.758501][ T2801] ? selinux_file_permission+0x2c4/0x570
[ 3006.764056][ T2801] ? fsnotify_perm+0x6a/0x5d0
[ 3006.768568][ T2801] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3006.773517][ T2801] ? vfs_write+0x9ec/0x1110
[ 3006.778383][ T2801] kernel_clone+0x21e/0x9e0
[ 3006.782736][ T2801] ? file_end_write+0x1c0/0x1c0
[ 3006.787402][ T2801] ? create_io_thread+0x1e0/0x1e0
[ 3006.792261][ T2801] ? mutex_unlock+0xb2/0x260
[ 3006.796689][ T2801] ? __mutex_lock_slowpath+0x10/0x10
[ 3006.801811][ T2801] __x64_sys_clone+0x23f/0x290
[ 3006.806413][ T2801] ? __do_sys_vfork+0x130/0x130
[ 3006.811104][ T2801] ? ksys_write+0x260/0x2c0
[ 3006.815449][ T2801] ? debug_smp_processor_id+0x17/0x20
[ 3006.820645][ T2801] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3006.826546][ T2801] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3006.832015][ T2801] do_syscall_64+0x3d/0xb0
[ 3006.836271][ T2801] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3006.841997][ T2801] RIP: 0033:0x7f74c9db9ae9
[ 3006.846247][ T2801] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3006.865778][ T2801] RSP: 002b:00007f74c8b3c078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3006.874022][ T2801] RAX: ffffffffffffffda RBX: 00007f74c9ed8f80 RCX: 00007f74c9db9ae9
[ 3006.881836][ T2801] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3006.889743][ T2801] RBP: 00007f74c8b3c120 R08: 0000000000000000 R09: 0000000000000000
[ 3006.897566][ T2801] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3006.905363][ T2801] R13: 000000000000000b R14: 00007f74c9ed8f80 R15: 00007ffe00966378
21:51:06 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000000)='freezer.state\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000100)={r2}, 0x8) (async)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
r4 = openat$cgroup(r3, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0)
r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000040), 0x12)
[ 3006.913179][ T2801]
[ 3006.922225][ T2801] Mem-Info:
[ 3006.925377][ T2801] active_anon:43357 inactive_anon:66223 isolated_anon:0
[ 3006.925377][ T2801] active_file:4075 inactive_file:7174 isolated_file:0
[ 3006.925377][ T2801] unevictable:0 dirty:3232 writeback:0
[ 3006.925377][ T2801] slab_reclaimable:15899 slab_unreclaimable:72598
[ 3006.925377][ T2801] mapped:33694 shmem:13981 pagetables:771 bounce:0
[ 3006.925377][ T2801] kernel_misc_reclaimable:0
21:51:07 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYRES64=r0], &(0x7f0000000100)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001e40)=ANY=[@ANYBLOB="b702000026000000bfa300000000000007030000007effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065060400010000050404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf27fb6d2c643db7e2d5fb4b0936cdf827fb43a431ca711fcd0cdfa146ed3d09a6175037958e27106e225b7937f02008b5e5a076d83923dd29c034055b67dafe6c8dc525d78c07f34e4d5b3185b310efcfa89147a09000000f110026e6d2ef831ab7ea0c34f17e3ad6eecbb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b0a341a2d7cbdb9cd38bdb2ca8e050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c214733a18c8b6619f28d9961b626c57c2691208173656d60a17e3c184b751c51160fbcbbdb5b1e7be6148ba532e60a0ac346dfebd31a08060000000200000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86acac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e957bc73ddc4eabba08ab1e1ad828267d4eadd3964663e88535c133f7130856f756436303767d2e24f29e5dad9796edb697a6ea0182babc190ae2ebf8aad34732181feb215139f15ea7e8cb0bae7c34d5ac5e7c805210600000000000000c3dec04b25dfc17975238345d4f71ab158c36657b7218baa0700f781c0a99bd50499ccc421ace5e845885efb5b9964e4beba3da8223fe5308e4e65ee93e107000000f8ddebf70132a4d0175b989b8eccf707882042cfd5e716df9b57b290c661d4e85031086197bcc5cb0e221a0c34323c129102b6ff0100002e88a1940b3c02ed9c92d6f64b1282dc51bb0015982730711c599e1c72ffa11ed8be1a6830d7507005154c46bd3ca96318c570f0721fc7aa2a5836ba99fe1f86468694f22cdf550ef091a78098534f0d973059594119d06d5ea9a8d0857382ec6e2a071474cfc12346e47ad97f4ead7cf70a9d1cdac944779dc08a705414888700a30e2366c6a06b3367a389ca39059787790017b0689a173db9c24db65c1e00015c1d093dab18fd0699fe3304000000323e9c7080397bc49d70c060d57bc88fbe3bbaa058b040362ab926150363fb099408885afc2bf9a46a076b7babfcddeff8c35030669ea6594c10ea35fe76ec7e97186f9ae97d5670dba6623279f73db9dec75070cd9ab0fda6b069ef6d2857ca3e4effcf7462710d133d541da86e0477e4a6cc999dc21c3ef408e6b178e7c9f26b697ecc12a0566fdfa35aa2000034837d365e63845f3c1092f8dde8af3904ea0f4b82649b83ed4fa0f873339c4cadecc13219ba7518aa4f7db34ead13484742067ab743c1d82a5687f2ed690000000000000000000000000000000000000000000099d4fa0000000000003f0ecdc7c82e72919c91d2039afe17e95edeeeba72205beff7771bcb293747b88486cacee403000000a2919a4bff2ed893f2c814679fa69fc7e0cf761f918725704a01c56009a9f748e5aaf30a10bd8c409b1870c1f75e26b45264e3d3f8e0048e55ae289ce2ad779ce71d4dc30cbb2cc4289d2f884d66cddc76eb7f601110ff39053c262279f4ef00fbdb8c328615a9ec84f27a9f3938ae736138b8c1ec220c1540bf3d162dc1c27fa30f0dc60b9f257db5d1c7ed2e152cb2cf06f8edb30177fead735a952ffce676a93110904d5ee2abdab2ef3ff84c4d61443f73552195c7ccfbf9f03c44432eaa3b7501d4239354da8de21eada75d3a3afb2c76ff0700007981699b6c0f0e946766f57544ff52cef0dd811bec4e3c0a30f2d7d19d26d2503a3ea376721b8eded3bc475958dd498ee2b2d6146e33fc0de1dc2e0516ac565ddb1d4ae89e6712824a85eb9ee0a3b68c9e209756623adf685dd715d68ed11e4b4d5502f5124948f8f98c615cac3666c58f785c3f758be352a71871d5c081197d37980e4f4e26b54790b20407ff7098b7174bef66fa03a99b5c0c20b378065fac4ef9ac2d0d804b9400000060e5d3f1749f6aecf69ba83a71caa9bdddc679f1b826f54b6563a4be1fd82b73c8c2bc65f63982b951fb058fd3c7b6341c4580376b6c16bd94d2da66059de81adba15eeeb88b6ae5882ad341032c73f1285e21fff5a1d138e061b1dc7bbda199b5fab8e0719e9cd69b47dcb52b0be6a3a73afdf328132e1d4f21065716be0c53a23940d07188b015fa341dbc92231c8b5e5717eac184f46c9f61b69f55cd2231bcf821052429a1f250e8b734be0605a15f25923d599544b319319ff0a32621019347df460a098119a6f47eb1bac47946d7a009cbc6ec74c19a93cc7c7138b28c95270116181fd5f553573c48104d2ad0e10d3663488e664401453f22f0d76d2162635365258af61ae1f46f4a7862f302d91e3f7c2781f602220522e84602a939a8d5e4137ae31ccd397404dc72e06715a6503d4d865182803ee6725da7293b23daeebefd6fce7411c9624a7e8d5ba5a13e1c32adc4f3274497c6882a72475e4280a4d9a47c003c6ed3071330c58145be813a10788a720a6b5a498ca2b42496c479a0a71e2f6f9bad8c84bc6be20281bde0b348cf2c60538a505ad4a0510eebb023e4954c9eb6cd70627f5c03d867dbf3ad5d1f1dc852064dd0efafc3df20ec8faf3d194db76127f88f284fa1b71ab964fdd2474471da76373e65e9a8bf844bdfdd348bc7d00c4c7e7afe8a1f8cde79b7a6c5aafe954b8ba37818e40c14b37c23f9f614576b689436fef2f27f8b75762fcd6c5281ba5f1e756e00262e22bca49c43fd73e7e99b2fa44a8c1db99c2cf2735ad6c5fabf082e0df0f8ba7e24272165f2f5b28230c02b53d44bd84bf7770157e96bbb96b5e1f165c87e7ad68a3600b3d357fa9a7d53c281d88ebb175a4dbb82130e6870982947913110f091d21760d985afd3163f2e6880682432f9b3b97d57a9f980edfa1116a3d04d58872a07d6a7e12db673acd2f7b8988d833e71943fe2c1c65a3cf36b955c56b55bfd3ecf0af694c71a03f2996c15b1ba971de1cb9c7e6a0000000000000014783ef54c51199317413f98dca8ff3d0bda50f6c0af58dbd6c031b1a5a7512c5896514adfa17d31429c68db50a93d88199defd3b4625fea426ff9293a28a544a6a9e2a79b55daa1b3c6b14c4ec6d164e902ce4913843d65d841973468729ea12bf6d3499036dbb66718f3497855c3baa6cc07c0fa388ec9df0617c1a28ef5a595ee267a76175b8a057e6efaf4fefe46def451f2858fe71a53e77b1a44e98843bb3a40102da3703dfb9f61bdcea2fb810b32d52e2157a150a63ea6135d1cf6f864c2e68884d7245bc5d61dc5a114d10ffb22e76678bbfc1e3865d17d128306d1b81884a934cb00000000000000000098a4526e6468987dbc63bff7590eb388afaba43d811996333eef7e9f472bee293f0c40d434b8be07cbd52325296e22802493edb5c590ad208bac683a8b2d4c9d2d57ff846ae8c422e0b28546671f11d8157bb762c91f3fbcca8e21589c92446ae65d408c0637ffcc2d44d715ce003dd1e12b085e186d069a55c2e96efbe5024d61a56a36d988c0f51a973a6c238e545b28211a92000000001501aed8d72af0fcd540a9d4e293690c5e697b3a1480e46df5371bca1cfb28a57c1b3c956ec81397e81fbf870a67385fea04220423f52ad8178b9fd04bdc7e5fee4bd52db996e633792118efdb6bb318ff7a7cf002b3f376fabe49516d9b9ed3bf97780b1be9a1c4fba0fbebde9fc3c6299d35dc80cd717712e03f24dae9f7f4dc235022c109bd69097b314365a8d0258dec46fa90f81886287017aa19f3bfff766e29490224fa4ba86dea5f937b2bbb3bdbc22b5277e30bb8955df3ae11bec3c9f14da08807e930b982e18a59fbc96450ae4e9f9e685bdf8ec7ff5a1e9f4589063bd057a46863d770c282a7363a1a11e422dc74a6468b08d426ca4d88cc2e19c79015dcbf0c7e9bc51468fd9d"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (async)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
write$cgroup_pid(r4, &(0x7f0000000040), 0x12)
[ 3006.925377][ T2801] free:1448125 free_pcp:23983 free_cma:0
[ 3006.971909][ T2801] Node 0 active_anon:173428kB inactive_anon:264892kB active_file:16300kB inactive_file:28696kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:134776kB dirty:12928kB writeback:0kB shmem:55924kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 2048kB writeback_tmp:0kB kernel_stack:4824kB pagetables:3084kB all_unreclaimable? no
21:51:07 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000001ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x8)
perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, 0x0, 0xcb}, 0x20) (async)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
r0 = gettid() (async)
r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, r0, 0x0, r1, 0x0) (async)
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffdb7, 0x0, @perf_config_ext={0x7fffffffffffffff}, 0x0, 0x3, 0x7, 0x0, 0x80002001, 0xe31, 0x8, 0x0, 0x0, 0x0, 0x2}, r0, 0x5, 0xffffffffffffffff, 0x3) (async)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x5d}, [@call={0x45}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0x4f, 0xcc, &(0x7f00000000c0)="bdc83ac2ecab037d4ffbdfe3871ca8997aaa58176e38435b79b5810cdc12e34b22d6e641bebe0892b5e49f31d097b354717380456da8b229075e3d99c9d46592e474ace6e6a886be427dc2270f5e07", &(0x7f00000006c0)=""/204, 0x0, 0x0, 0x2a, 0x1f6, &(0x7f0000000340)="f27a0cd21a9484ef643adf5ca10ed87bc9f9feff3153e5f3a47746ca7f02868c4e73d811ff7c938f36c99f46cbe38278dd81968479e73f2087f863a9f8e3499a2923f16c02bac9e97c9c2ddcc071fe568a0bc2aa607f25ff952a50008e423d8d47489df374a2b5dbcde4fa24e7af4f52ecb7c335208e2b20983e3a58c032dc1753b0fa39b9e36173a847c56e3cfd497c13dd2065f222ab349f9824abc6c928e3163596dcbd1084455ed2924e79a218fbf356b2b23c82c6e3468a5d34938a9e464dfe817173b6b12c730e", &(0x7f00000007c0)="028008794d4190b67ff43b508b4ee94a65fb6fb5fc4bd8500e1bc8956224fe948101f9e0dababc387b7b1fbf80115df0c0ce07627cefaa879939db97e234014ac3617896d57444739fe665bd99841a19e401ca798ecbc35099f207ee5766b749f444128533023212438fd89fedea675620501afce89b3ccf91efdda7e0e3569c2c88645d32b59611cbf1e217c65afd07a80081e31257b5f6650850bd60b51d6c8bf0875613bfa428e46ed48f7c141349be04d488dd415f18c1614f05e26f175dcfb42c0fa8763ddb08b8f0b26a9e456c03117d230f9bb9467023d6224f5d3b3b91529ce7455b54b1d839313e52f5589427f8f046670faeea3943d94a5401890c4b2ce8dd5e482e418410a104d5a08a6cddd48574c27c58f825c894a37d6aa8f858c48dd21af7db78ad47d47ac2bfb7e86c6fa1d8ad4cb772d583d070063baf14a5f608c43303af19741875f6a948211d93b6c235b964c45b64e581fa2a804ccee4a84c658fa460eabf58d19dec1cbb3c13f49242b31b0aeff08a426900dc2373738c65ccce3041b52e749361765cfe067a84000ca979c65cf2de1a56755370e755542f25896c849ca509a9ecf85611cc389d99263390268c2ef570b4e78a2c708c9c50b87cd0ce955dc4d4d15b09409caf3a9a615682589e2d071751a4441804c8c70000000009a930b677724cec4108678892dba61bf6ff229562ad4935b771098112afd597e32c1581646b3d72df", 0x0, 0x81}, 0x1a)
perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x3, 0x4, 0x0, 0x20, 0x0, 0x6, 0x2000, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x4, @perf_config_ext={0x80000000, 0x800}, 0x400, 0x48000000000000, 0x1, 0x7, 0xee3c, 0x8000, 0x5, 0x0, 0x1ff, 0x0, 0x40}, r0, 0x9, 0xffffffffffffffff, 0x8) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair(0x1, 0x0, 0x0, &(0x7f0000000140)) (async)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=""/124, 0x118, 0x7c, 0x3}, 0x20) (async)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0)
write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) (async)
r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) (async)
perf_event_open$cgroup(&(0x7f0000000500)={0x2, 0x80, 0xdf, 0x9, 0x0, 0x81, 0x0, 0x5, 0x28140, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000340), 0x9}, 0x200, 0xd3d, 0x4, 0x9, 0x1, 0x6, 0x8, 0x0, 0x5, 0x0, 0x1}, r3, 0xd, r4, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x660c, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000003c0)=0x6) (async)
r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x8, 0x0, 0x40, 0x4, 0x0, 0x401, 0x10004, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_bp={&(0x7f0000000240), 0xf}, 0x400, 0xffe000000, 0x1, 0x0, 0x100, 0x2, 0x100, 0x0, 0x81, 0x0, 0x10001}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x9) (async)
socketpair(0x2b, 0x2, 0x72c93fb5, &(0x7f0000000080))
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5)
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:07 executing program 2:
socketpair(0x3, 0xa, 0x0, 0x0)
syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:07 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2)
[ 3007.006237][ T2801] DMA32 free:2966328kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:8kB inactive_anon:532kB active_file:12kB inactive_file:0kB unevictable:0kB writepending:4kB present:3145324kB managed:2981496kB mlocked:0kB bounce:0kB free_pcp:14468kB local_pcp:12164kB free_cma:0kB
[ 3007.015925][ T2813] FAULT_INJECTION: forcing a failure.
[ 3007.015925][ T2813] name failslab, interval 1, probability 0, space 0, times 0
[ 3007.035521][ T2801] lowmem_reserve[]: 0 3941 3941
21:51:07 executing program 2:
socketpair(0x3, 0xa, 0x0, 0x0) (async)
syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3007.070726][ T2801] Normal free:2825948kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:173420kB inactive_anon:264360kB active_file:16288kB inactive_file:23896kB unevictable:0kB writepending:11740kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:85400kB local_pcp:41128kB free_cma:0kB
[ 3007.094402][ T2813] CPU: 0 PID: 2813 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3007.111730][ T2813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3007.121621][ T2813] Call Trace:
[ 3007.124753][ T2813]
[ 3007.127528][ T2813] dump_stack_lvl+0x151/0x1b7
[ 3007.132044][ T2813] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3007.133046][ T2801] lowmem_reserve[]:
[ 3007.137499][ T2813] ? __kasan_slab_alloc+0xc3/0xe0
[ 3007.137522][ T2813] ? __kasan_slab_alloc+0xb1/0xe0
[ 3007.137535][ T2813] ? slab_post_alloc_hook+0x53/0x2c0
[ 3007.137553][ T2813] ? dup_task_struct+0x53/0xc60
[ 3007.158433][ T2801] 0
[ 3007.160673][ T2813] ? copy_process+0x5c4/0x3260
[ 3007.162937][ T2801] 0
[ 3007.163015][ T2813] ? kernel_clone+0x21e/0x9e0
[ 3007.174479][ T2813] dump_stack+0x15/0x17
[ 3007.178467][ T2813] should_fail+0x3c6/0x510
[ 3007.182720][ T2813] __should_failslab+0xa4/0xe0
[ 3007.187318][ T2813] should_failslab+0x9/0x20
[ 3007.191658][ T2813] slab_pre_alloc_hook+0x37/0xd0
[ 3007.196430][ T2813] kmem_cache_alloc_trace+0x48/0x210
[ 3007.201552][ T2813] ? __get_vm_area_node+0x117/0x360
[ 3007.206591][ T2813] __get_vm_area_node+0x117/0x360
[ 3007.211451][ T2813] __vmalloc_node_range+0xe2/0x8d0
[ 3007.216395][ T2813] ? copy_process+0x5c4/0x3260
[ 3007.220997][ T2813] ? slab_post_alloc_hook+0x72/0x2c0
[ 3007.226118][ T2813] ? dup_task_struct+0x53/0xc60
[ 3007.230809][ T2813] ? dup_task_struct+0x53/0xc60
[ 3007.235490][ T2813] dup_task_struct+0x416/0xc60
[ 3007.240091][ T2813] ? copy_process+0x5c4/0x3260
[ 3007.244696][ T2813] ? __kasan_check_write+0x14/0x20
[ 3007.249648][ T2813] copy_process+0x5c4/0x3260
[ 3007.254064][ T2813] ? __kasan_check_write+0x14/0x20
[ 3007.259020][ T2813] ? proc_fail_nth_write+0x20b/0x290
[ 3007.264131][ T2813] ? selinux_file_permission+0x2c4/0x570
[ 3007.269604][ T2813] ? fsnotify_perm+0x6a/0x5d0
[ 3007.274111][ T2813] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3007.279057][ T2813] ? vfs_write+0x9ec/0x1110
[ 3007.283660][ T2813] kernel_clone+0x21e/0x9e0
[ 3007.288004][ T2813] ? file_end_write+0x1c0/0x1c0
[ 3007.292690][ T2813] ? create_io_thread+0x1e0/0x1e0
[ 3007.297544][ T2813] ? mutex_unlock+0xb2/0x260
[ 3007.301970][ T2813] ? __mutex_lock_slowpath+0x10/0x10
[ 3007.307093][ T2813] __x64_sys_clone+0x23f/0x290
[ 3007.311702][ T2813] ? __do_sys_vfork+0x130/0x130
[ 3007.316378][ T2813] ? ksys_write+0x260/0x2c0
[ 3007.324378][ T2813] ? debug_smp_processor_id+0x17/0x20
[ 3007.329574][ T2813] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3007.335473][ T2813] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3007.341031][ T2813] do_syscall_64+0x3d/0xb0
[ 3007.345283][ T2813] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3007.351010][ T2813] RIP: 0033:0x7f024b55cae9
[ 3007.355266][ T2813] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3007.374705][ T2813] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3007.382956][ T2813] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3007.390761][ T2813] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3007.398575][ T2813] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3007.406470][ T2813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3007.414283][ T2813] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3007.422096][ T2813]
[ 3007.431931][ T2801] 0
[ 3007.435095][ T2801] DMA32: 78*4kB (UME) 60*8kB (UME) 46*16kB (UME) 54*32kB (UM) 48*64kB (UME) 45*128kB (UE) 34*256kB (UM) 41*512kB (UME) 46*1024kB (UME) 33*2048kB (UME) 686*4096kB (UM) = 2966328kB
[ 3007.453399][ T2801] Normal: 12039*4kB (UME) 8988*8kB (UME) 6888*16kB (UME) 3443*32kB (UME) 2792*64kB (UME) 1599*128kB (UM) 898*256kB (UM) 683*512kB (UME) 412*1024kB (UM) 99*2048kB (UM) 219*4096kB (UM) = 2825052kB
21:51:07 executing program 4:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:07 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3)
21:51:07 executing program 2:
socketpair(0x3, 0xa, 0x0, 0x0) (async)
syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3007.479854][ T2801] 29316 total pagecache pages
[ 3007.484443][ T2801] 8134 pages in swap cache
[ 3007.489115][ T2801] Swap cache stats: add 60070, delete 51933, find 20265/39431
[ 3007.496744][ T2801] Free swap = 68320kB
[ 3007.500732][ T2801] Total swap = 124996kB
[ 3007.504695][ T2801] 2097051 pages RAM
[ 3007.508814][ T2801] 0 pages HighMem/MovableOnly
[ 3007.513382][ T2801] 342715 pages reserved
[ 3007.518078][ T2801] 0 pages cma reserved
[ 3007.533068][ T2838] FAULT_INJECTION: forcing a failure.
[ 3007.533068][ T2838] name failslab, interval 1, probability 0, space 0, times 0
[ 3007.559949][ T2838] CPU: 1 PID: 2838 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3007.571419][ T2838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3007.582437][ T2838] Call Trace:
[ 3007.585557][ T2838]
[ 3007.588339][ T2838] dump_stack_lvl+0x151/0x1b7
[ 3007.592852][ T2838] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3007.598604][ T2838] dump_stack+0x15/0x17
[ 3007.602592][ T2838] should_fail+0x3c6/0x510
[ 3007.606851][ T2838] __should_failslab+0xa4/0xe0
[ 3007.611448][ T2838] ? alloc_vmap_area+0x19e/0x1a80
[ 3007.616305][ T2838] should_failslab+0x9/0x20
[ 3007.620647][ T2838] slab_pre_alloc_hook+0x37/0xd0
[ 3007.625421][ T2838] ? alloc_vmap_area+0x19e/0x1a80
21:51:07 executing program 4:
syz_clone(0x2, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3007.630280][ T2838] kmem_cache_alloc+0x44/0x200
[ 3007.634882][ T2838] alloc_vmap_area+0x19e/0x1a80
[ 3007.639598][ T2838] ? vm_map_ram+0xa90/0xa90
[ 3007.643909][ T2838] ? kmem_cache_alloc_trace+0x115/0x210
[ 3007.649635][ T2838] ? __get_vm_area_node+0x117/0x360
[ 3007.654672][ T2838] __get_vm_area_node+0x158/0x360
[ 3007.659539][ T2838] __vmalloc_node_range+0xe2/0x8d0
[ 3007.664480][ T2838] ? copy_process+0x5c4/0x3260
[ 3007.669079][ T2838] ? slab_post_alloc_hook+0x72/0x2c0
[ 3007.674206][ T2838] ? dup_task_struct+0x53/0xc60
[ 3007.678888][ T2838] ? dup_task_struct+0x53/0xc60
[ 3007.683579][ T2838] dup_task_struct+0x416/0xc60
[ 3007.688432][ T2838] ? copy_process+0x5c4/0x3260
[ 3007.693063][ T2838] ? __kasan_check_write+0x14/0x20
[ 3007.697975][ T2838] copy_process+0x5c4/0x3260
[ 3007.702404][ T2838] ? __kasan_check_write+0x14/0x20
[ 3007.707346][ T2838] ? proc_fail_nth_write+0x20b/0x290
[ 3007.712557][ T2838] ? selinux_file_permission+0x2c4/0x570
[ 3007.718028][ T2838] ? fsnotify_perm+0x6a/0x5d0
[ 3007.722543][ T2838] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3007.727483][ T2838] ? vfs_write+0x9ec/0x1110
[ 3007.731836][ T2838] kernel_clone+0x21e/0x9e0
[ 3007.736162][ T2838] ? file_end_write+0x1c0/0x1c0
[ 3007.740857][ T2838] ? create_io_thread+0x1e0/0x1e0
[ 3007.745711][ T2838] ? mutex_unlock+0xb2/0x260
[ 3007.750312][ T2838] ? __mutex_lock_slowpath+0x10/0x10
[ 3007.755451][ T2838] __x64_sys_clone+0x23f/0x290
[ 3007.760091][ T2838] ? __do_sys_vfork+0x130/0x130
[ 3007.764978][ T2838] ? ksys_write+0x260/0x2c0
[ 3007.769331][ T2838] ? debug_smp_processor_id+0x17/0x20
[ 3007.774532][ T2838] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3007.780438][ T2838] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3007.785895][ T2838] do_syscall_64+0x3d/0xb0
[ 3007.790151][ T2838] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3007.795988][ T2838] RIP: 0033:0x7f024b55cae9
[ 3007.800218][ T2838] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3007.819658][ T2838] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:51:07 executing program 2:
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x81, 0x1, 0x7, 0x40, 0x0, 0x100, 0x4010, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0x7}, 0x200, 0x2, 0x101, 0x5, 0xfffffffffffffffa, 0x1, 0x15e, 0x0, 0x800, 0x0, 0x1}, r0, 0x4, 0xffffffffffffffff, 0x1)
21:51:07 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:51:07 executing program 4:
syz_clone(0x7, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:07 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYRES64=r0], &(0x7f0000000100)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_pid(r4, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0, @ANYRES64=r0, @ANYRES64=r0], &(0x7f0000000100)='GPL\x00', 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (async)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
write$cgroup_pid(r4, &(0x7f0000000040), 0x12) (async)
[ 3007.827905][ T2838] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3007.835714][ T2838] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3007.843526][ T2838] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3007.851427][ T2838] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3007.859244][ T2838] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3007.867051][ T2838]
21:51:07 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000001ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x8) (async, rerun: 32)
perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x3) (async, rerun: 32)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={0x0, 0x0, 0xcb}, 0x20)
bpf$MAP_CREATE(0x0, 0x0, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r0 = gettid() (async, rerun: 32)
r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (rerun: 32)
perf_event_open(0x0, r0, 0x0, r1, 0x0)
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffdb7, 0x0, @perf_config_ext={0x7fffffffffffffff}, 0x0, 0x3, 0x7, 0x0, 0x80002001, 0xe31, 0x8, 0x0, 0x0, 0x0, 0x2}, r0, 0x5, 0xffffffffffffffff, 0x3) (async)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x5d}, [@call={0x45}]}, &(0x7f0000000140)='GPL\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1e}, 0x64)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r2, 0x0, 0x4f, 0xcc, &(0x7f00000000c0)="bdc83ac2ecab037d4ffbdfe3871ca8997aaa58176e38435b79b5810cdc12e34b22d6e641bebe0892b5e49f31d097b354717380456da8b229075e3d99c9d46592e474ace6e6a886be427dc2270f5e07", &(0x7f00000006c0)=""/204, 0x0, 0x0, 0x2a, 0x1f6, &(0x7f0000000340)="f27a0cd21a9484ef643adf5ca10ed87bc9f9feff3153e5f3a47746ca7f02868c4e73d811ff7c938f36c99f46cbe38278dd81968479e73f2087f863a9f8e3499a2923f16c02bac9e97c9c2ddcc071fe568a0bc2aa607f25ff952a50008e423d8d47489df374a2b5dbcde4fa24e7af4f52ecb7c335208e2b20983e3a58c032dc1753b0fa39b9e36173a847c56e3cfd497c13dd2065f222ab349f9824abc6c928e3163596dcbd1084455ed2924e79a218fbf356b2b23c82c6e3468a5d34938a9e464dfe817173b6b12c730e", &(0x7f00000007c0)="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", 0x0, 0x81}, 0x1a)
perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x3, 0x4, 0x0, 0x20, 0x0, 0x6, 0x2000, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80000001, 0x4, @perf_config_ext={0x80000000, 0x800}, 0x400, 0x48000000000000, 0x1, 0x7, 0xee3c, 0x8000, 0x5, 0x0, 0x1ff, 0x0, 0x40}, r0, 0x9, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async, rerun: 64)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64)
socketpair(0x1, 0x0, 0x0, &(0x7f0000000140))
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)=""/124, 0x118, 0x7c, 0x3}, 0x20) (async, rerun: 32)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0)
write$cgroup_type(r3, &(0x7f0000000080), 0x11ffffce1) (async)
r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r4}, 0x8) (async)
perf_event_open$cgroup(&(0x7f0000000500)={0x2, 0x80, 0xdf, 0x9, 0x0, 0x81, 0x0, 0x5, 0x28140, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000340), 0x9}, 0x200, 0xd3d, 0x4, 0x9, 0x1, 0x6, 0x8, 0x0, 0x5, 0x0, 0x1}, r3, 0xd, r4, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x660c, 0x0) (async, rerun: 64)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000003c0)=0x6) (async, rerun: 64)
r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0x8, 0x0, 0x40, 0x4, 0x0, 0x401, 0x10004, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x5, @perf_bp={&(0x7f0000000240), 0xf}, 0x400, 0xffe000000, 0x1, 0x0, 0x100, 0x2, 0x100, 0x0, 0x81, 0x0, 0x10001}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x9)
socketpair(0x2b, 0x2, 0x72c93fb5, &(0x7f0000000080)) (async, rerun: 32)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r5) (async, rerun: 32)
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:07 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:51:07 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4)
21:51:07 executing program 2:
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x81, 0x1, 0x7, 0x40, 0x0, 0x100, 0x4010, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0x7}, 0x200, 0x2, 0x101, 0x5, 0xfffffffffffffffa, 0x1, 0x15e, 0x0, 0x800, 0x0, 0x1}, r0, 0x4, 0xffffffffffffffff, 0x1)
21:51:07 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:51:08 executing program 4:
syz_clone(0x8, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:08 executing program 2:
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x81, 0x1, 0x7, 0x40, 0x0, 0x100, 0x4010, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000000), 0x7}, 0x200, 0x2, 0x101, 0x5, 0xfffffffffffffffa, 0x1, 0x15e, 0x0, 0x800, 0x0, 0x1}, r0, 0x4, 0xffffffffffffffff, 0x1)
21:51:08 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:08 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x5)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r5, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:08 executing program 4:
syz_clone(0x9, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:08 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
[ 3007.994111][ T2868] FAULT_INJECTION: forcing a failure.
[ 3007.994111][ T2868] name failslab, interval 1, probability 0, space 0, times 0
[ 3008.013112][ T2868] CPU: 0 PID: 2868 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3008.024684][ T2868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3008.034550][ T2868] Call Trace:
[ 3008.037675][ T2868]
[ 3008.040453][ T2868] dump_stack_lvl+0x151/0x1b7
[ 3008.044968][ T2868] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3008.050433][ T2868] ? avc_has_perm_noaudit+0x348/0x430
[ 3008.055648][ T2868] dump_stack+0x15/0x17
[ 3008.059632][ T2868] should_fail+0x3c6/0x510
[ 3008.063889][ T2868] __should_failslab+0xa4/0xe0
[ 3008.068492][ T2868] ? dup_fd+0x72/0xb00
[ 3008.072393][ T2868] should_failslab+0x9/0x20
[ 3008.076736][ T2868] slab_pre_alloc_hook+0x37/0xd0
[ 3008.081511][ T2868] ? dup_fd+0x72/0xb00
[ 3008.085427][ T2868] kmem_cache_alloc+0x44/0x200
[ 3008.090031][ T2868] dup_fd+0x72/0xb00
[ 3008.093747][ T2868] ? avc_has_perm+0x16f/0x260
[ 3008.098290][ T2868] ? avc_has_perm_noaudit+0x430/0x430
[ 3008.103579][ T2868] copy_files+0xe6/0x200
[ 3008.107648][ T2868] ? perf_event_attrs+0x30/0x30
[ 3008.112318][ T2868] ? dup_task_struct+0xc60/0xc60
[ 3008.117093][ T2868] ? security_task_alloc+0xf9/0x130
[ 3008.122314][ T2868] copy_process+0x11f3/0x3260
[ 3008.126814][ T2868] ? proc_fail_nth_write+0x20b/0x290
[ 3008.131935][ T2868] ? fsnotify_perm+0x6a/0x5d0
[ 3008.136585][ T2868] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3008.141540][ T2868] ? vfs_write+0x9ec/0x1110
[ 3008.145860][ T2868] kernel_clone+0x21e/0x9e0
[ 3008.150196][ T2868] ? file_end_write+0x1c0/0x1c0
[ 3008.154890][ T2868] ? create_io_thread+0x1e0/0x1e0
[ 3008.159830][ T2868] ? mutex_unlock+0xb2/0x260
[ 3008.164257][ T2868] ? __mutex_lock_slowpath+0x10/0x10
[ 3008.169376][ T2868] __x64_sys_clone+0x23f/0x290
[ 3008.173975][ T2868] ? __do_sys_vfork+0x130/0x130
[ 3008.178663][ T2868] ? ksys_write+0x260/0x2c0
[ 3008.183004][ T2868] ? debug_smp_processor_id+0x17/0x20
[ 3008.188211][ T2868] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3008.194129][ T2868] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3008.199593][ T2868] do_syscall_64+0x3d/0xb0
[ 3008.203835][ T2868] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3008.209560][ T2868] RIP: 0033:0x7f024b55cae9
[ 3008.213828][ T2868] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3008.233664][ T2868] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:51:08 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000600)=""/153, 0x99}, {&(0x7f00000001c0)=""/89, 0x59}, {&(0x7f0000000240)=""/192, 0xc0}, {&(0x7f0000000300)=""/98, 0x62}, {&(0x7f0000000380)=""/24, 0x18}, {&(0x7f0000000100)=""/117, 0x75}], 0x6, &(0x7f00000003c0)}, 0x2163)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r1, 0x10f, 0x88, 0x0, 0x0)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x2040)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0)
socketpair(0x2a, 0xa, 0x33c8, &(0x7f00000003c0))
socketpair(0x1e, 0x3006564dbb652214, 0x401, &(0x7f0000000180))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x20, 0x80, 0x3, 0x8, 0x510, 0x1, 0xbf0c, '\x00', r3, r2, 0x0, 0x4, 0x3}, 0x48)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
[ 3008.241888][ T2868] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3008.250072][ T2868] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3008.257883][ T2868] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3008.265747][ T2868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3008.273514][ T2868] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3008.281530][ T2868]
21:51:08 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:08 executing program 4:
syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:08 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000600)=""/153, 0x99}, {&(0x7f00000001c0)=""/89, 0x59}, {&(0x7f0000000240)=""/192, 0xc0}, {&(0x7f0000000300)=""/98, 0x62}, {&(0x7f0000000380)=""/24, 0x18}, {&(0x7f0000000100)=""/117, 0x75}], 0x6, &(0x7f00000003c0)}, 0x2163)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r1, 0x10f, 0x88, 0x0, 0x0)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x2040)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0)
socketpair(0x2a, 0xa, 0x33c8, &(0x7f00000003c0))
socketpair(0x1e, 0x3006564dbb652214, 0x401, &(0x7f0000000180))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x20, 0x80, 0x3, 0x8, 0x510, 0x1, 0xbf0c, '\x00', r3, r2, 0x0, 0x4, 0x3}, 0x48)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000600)=""/153, 0x99}, {&(0x7f00000001c0)=""/89, 0x59}, {&(0x7f0000000240)=""/192, 0xc0}, {&(0x7f0000000300)=""/98, 0x62}, {&(0x7f0000000380)=""/24, 0x18}, {&(0x7f0000000100)=""/117, 0x75}], 0x6, &(0x7f00000003c0)}, 0x2163) (async)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async)
setsockopt$sock_attach_bpf(r1, 0x10f, 0x88, 0x0, 0x0) (async)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x2040) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async)
socketpair(0x2a, 0xa, 0x33c8, &(0x7f00000003c0)) (async)
socketpair(0x1e, 0x3006564dbb652214, 0x401, &(0x7f0000000180)) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x20, 0x80, 0x3, 0x8, 0x510, 0x1, 0xbf0c, '\x00', r3, r2, 0x0, 0x4, 0x3}, 0x48) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
21:51:08 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180))
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x0, 0x40, 0x7, 0x0, 0x0, r0, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48)
bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xd, 0x1, 0x1f, 0x1, 0x0, 0x1}, 0x48)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xa, 0x2, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0xc, &(0x7f0000000380)=""/12, 0x9f71cadf2e2d7e4c, 0x4, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x10, 0x4, 0x400}, 0x10, 0xffffffffffffffff}, 0x80)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8)
openat$cgroup_ro(r2, &(0x7f00000005c0)='memory.stat\x00', 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10)
r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0x5, 0x8}, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.throttle.io_serviced\x00', 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1c, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000001000100000000000900001018210000", @ANYRES32, @ANYBLOB="000000002ce60000183400b5000000000000000000000000184b0000050000000000000000000000185000000800000000000000000002009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x400, 0x37, &(0x7f0000000340)=""/55, 0x0, 0x9, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x2, 0x2e, 0x4}, 0x10, 0x0, r1, 0x0, &(0x7f0000000880)=[r0, r3]}, 0x80)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0xff87020000000000)
bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x7, &(0x7f0000000280)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @generic={0x0, 0x0, 0xd}, @alu={0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8}, @jmp={0x5, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x4}], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x0, 0x8, 0xffff}, 0x10}, 0x80)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800)
perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10)
21:51:08 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5)
21:51:08 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
close(r2)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
21:51:08 executing program 4:
syz_clone(0x70, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:08 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000580)=[{&(0x7f0000000600)=""/153, 0x99}, {&(0x7f00000001c0)=""/89, 0x59}, {&(0x7f0000000240)=""/192, 0xc0}, {&(0x7f0000000300)=""/98, 0x62}, {&(0x7f0000000380)=""/24, 0x18}, {&(0x7f0000000100)=""/117, 0x75}], 0x6, &(0x7f00000003c0)}, 0x2163) (async)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r1, 0x10f, 0x88, 0x0, 0x0) (async)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x2040)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) (async)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async)
socketpair(0x2a, 0xa, 0x33c8, &(0x7f00000003c0)) (async)
socketpair(0x1e, 0x3006564dbb652214, 0x401, &(0x7f0000000180)) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000440)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x5, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000500)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000740)}}, 0x10)
bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0x20, 0x80, 0x3, 0x8, 0x510, 0x1, 0xbf0c, '\x00', r3, r2, 0x0, 0x4, 0x3}, 0x48) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
[ 3008.469377][ T2909] FAULT_INJECTION: forcing a failure.
[ 3008.469377][ T2909] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3008.507065][ T2909] CPU: 1 PID: 2909 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3008.518535][ T2909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3008.528515][ T2909] Call Trace:
[ 3008.531633][ T2909]
[ 3008.534425][ T2909] dump_stack_lvl+0x151/0x1b7
[ 3008.538928][ T2909] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3008.544413][ T2909] ? arch_stack_walk+0xf3/0x140
[ 3008.549083][ T2909] dump_stack+0x15/0x17
[ 3008.553074][ T2909] should_fail+0x3c6/0x510
[ 3008.557505][ T2909] should_fail_alloc_page+0x5a/0x80
[ 3008.562539][ T2909] prepare_alloc_pages+0x15c/0x700
[ 3008.567487][ T2909] ? __alloc_pages_bulk+0xe60/0xe60
[ 3008.572519][ T2909] __alloc_pages+0x138/0x5e0
[ 3008.576941][ T2909] ? do_syscall_64+0x3d/0xb0
[ 3008.581375][ T2909] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3008.587271][ T2909] ? prep_new_page+0x110/0x110
[ 3008.591874][ T2909] __get_free_pages+0xe/0x30
[ 3008.596298][ T2909] kasan_populate_vmalloc_pte+0x39/0x130
[ 3008.602286][ T2909] ? __apply_to_page_range+0x8ca/0xbe0
[ 3008.607755][ T2909] __apply_to_page_range+0x8dd/0xbe0
[ 3008.612862][ T2909] ? kasan_populate_vmalloc+0x70/0x70
[ 3008.618070][ T2909] ? kasan_populate_vmalloc+0x70/0x70
[ 3008.623377][ T2909] apply_to_page_range+0x3b/0x50
[ 3008.628141][ T2909] kasan_populate_vmalloc+0x65/0x70
[ 3008.633696][ T2909] alloc_vmap_area+0x192f/0x1a80
[ 3008.638496][ T2909] ? vm_map_ram+0xa90/0xa90
[ 3008.642808][ T2909] ? kmem_cache_alloc_trace+0x115/0x210
[ 3008.648321][ T2909] ? __get_vm_area_node+0x117/0x360
[ 3008.653326][ T2909] __get_vm_area_node+0x158/0x360
[ 3008.658213][ T2909] __vmalloc_node_range+0xe2/0x8d0
[ 3008.663118][ T2909] ? copy_process+0x5c4/0x3260
[ 3008.667732][ T2909] ? slab_post_alloc_hook+0x72/0x2c0
[ 3008.672835][ T2909] ? dup_task_struct+0x53/0xc60
[ 3008.677522][ T2909] ? dup_task_struct+0x53/0xc60
[ 3008.682213][ T2909] dup_task_struct+0x416/0xc60
[ 3008.686811][ T2909] ? copy_process+0x5c4/0x3260
[ 3008.691414][ T2909] ? __kasan_check_write+0x14/0x20
[ 3008.696358][ T2909] copy_process+0x5c4/0x3260
[ 3008.700787][ T2909] ? __kasan_check_write+0x14/0x20
[ 3008.705745][ T2909] ? proc_fail_nth_write+0x20b/0x290
[ 3008.710850][ T2909] ? selinux_file_permission+0x2c4/0x570
[ 3008.716320][ T2909] ? fsnotify_perm+0x6a/0x5d0
[ 3008.720859][ T2909] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3008.725796][ T2909] ? vfs_write+0x9ec/0x1110
[ 3008.730140][ T2909] kernel_clone+0x21e/0x9e0
[ 3008.734464][ T2909] ? file_end_write+0x1c0/0x1c0
[ 3008.739147][ T2909] ? create_io_thread+0x1e0/0x1e0
[ 3008.744009][ T2909] ? mutex_unlock+0xb2/0x260
[ 3008.748693][ T2909] ? __mutex_lock_slowpath+0x10/0x10
[ 3008.753820][ T2909] __x64_sys_clone+0x23f/0x290
[ 3008.758421][ T2909] ? __do_sys_vfork+0x130/0x130
[ 3008.763192][ T2909] ? ksys_write+0x260/0x2c0
[ 3008.767534][ T2909] ? debug_smp_processor_id+0x17/0x20
[ 3008.772838][ T2909] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3008.778725][ T2909] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3008.784195][ T2909] do_syscall_64+0x3d/0xb0
[ 3008.789246][ T2909] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3008.794975][ T2909] RIP: 0033:0x7f024b55cae9
[ 3008.799228][ T2909] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
21:51:08 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x5) (async)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) (async, rerun: 32)
openat$cgroup_ro(r5, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async, rerun: 32)
openat$cgroup_ro(r5, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) (async, rerun: 32)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (rerun: 32)
21:51:08 executing program 2:
socketpair(0x0, 0x0, 0x4, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:51:08 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6)
[ 3008.818784][ T2909] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3008.827374][ T2909] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3008.835269][ T2909] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3008.843170][ T2909] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3008.851239][ T2909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3008.859144][ T2909] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3008.866963][ T2909]
21:51:08 executing program 4:
syz_clone(0x700, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3008.907536][ T2946] FAULT_INJECTION: forcing a failure.
[ 3008.907536][ T2946] name failslab, interval 1, probability 0, space 0, times 0
[ 3008.920267][ T2946] CPU: 0 PID: 2946 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3008.931745][ T2946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3008.941727][ T2946] Call Trace:
[ 3008.944851][ T2946]
[ 3008.947629][ T2946] dump_stack_lvl+0x151/0x1b7
[ 3008.952142][ T2946] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3008.957607][ T2946] ? __kasan_kmalloc+0x9/0x10
[ 3008.962116][ T2946] ? alloc_fdtable+0xaf/0x2a0
[ 3008.966627][ T2946] ? dup_fd+0x759/0xb00
[ 3008.970638][ T2946] ? copy_files+0xe6/0x200
[ 3008.974890][ T2946] ? kernel_clone+0x21e/0x9e0
[ 3008.979474][ T2946] ? __x64_sys_clone+0x23f/0x290
[ 3008.984248][ T2946] ? do_syscall_64+0x3d/0xb0
[ 3008.988709][ T2946] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3008.994674][ T2946] dump_stack+0x15/0x17
[ 3008.998665][ T2946] should_fail+0x3c6/0x510
[ 3009.003177][ T2946] __should_failslab+0xa4/0xe0
[ 3009.007788][ T2946] should_failslab+0x9/0x20
[ 3009.012117][ T2946] slab_pre_alloc_hook+0x37/0xd0
[ 3009.016893][ T2946] __kmalloc+0x6d/0x270
[ 3009.020882][ T2946] ? kvmalloc_node+0x1f0/0x4d0
[ 3009.025486][ T2946] kvmalloc_node+0x1f0/0x4d0
[ 3009.029997][ T2946] ? vm_mmap+0xb0/0xb0
[ 3009.033987][ T2946] ? __kasan_kmalloc+0x9/0x10
[ 3009.038504][ T2946] ? kmem_cache_alloc_trace+0x115/0x210
[ 3009.043883][ T2946] ? alloc_fdtable+0xaf/0x2a0
[ 3009.048402][ T2946] alloc_fdtable+0xeb/0x2a0
[ 3009.052746][ T2946] dup_fd+0x759/0xb00
[ 3009.056554][ T2946] ? avc_has_perm+0x16f/0x260
[ 3009.061071][ T2946] copy_files+0xe6/0x200
[ 3009.065167][ T2946] ? perf_event_attrs+0x30/0x30
[ 3009.069836][ T2946] ? dup_task_struct+0xc60/0xc60
[ 3009.074610][ T2946] ? security_task_alloc+0xf9/0x130
[ 3009.079641][ T2946] copy_process+0x11f3/0x3260
[ 3009.084159][ T2946] ? proc_fail_nth_write+0x20b/0x290
[ 3009.089278][ T2946] ? fsnotify_perm+0x6a/0x5d0
[ 3009.093798][ T2946] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3009.098738][ T2946] ? vfs_write+0x9ec/0x1110
[ 3009.103079][ T2946] kernel_clone+0x21e/0x9e0
[ 3009.107422][ T2946] ? file_end_write+0x1c0/0x1c0
[ 3009.112115][ T2946] ? create_io_thread+0x1e0/0x1e0
[ 3009.116971][ T2946] ? mutex_unlock+0xb2/0x260
[ 3009.121392][ T2946] ? __mutex_lock_slowpath+0x10/0x10
[ 3009.126513][ T2946] __x64_sys_clone+0x23f/0x290
[ 3009.131112][ T2946] ? __do_sys_vfork+0x130/0x130
[ 3009.135800][ T2946] ? ksys_write+0x260/0x2c0
[ 3009.140136][ T2946] ? debug_smp_processor_id+0x17/0x20
[ 3009.145363][ T2946] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3009.151334][ T2946] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3009.156807][ T2946] do_syscall_64+0x3d/0xb0
[ 3009.161055][ T2946] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3009.166783][ T2946] RIP: 0033:0x7f024b55cae9
[ 3009.171040][ T2946] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3009.190481][ T2946] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3009.198724][ T2946] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
21:51:08 executing program 2:
socketpair(0x0, 0x0, 0x4, 0x0) (async)
socketpair(0x0, 0x0, 0x4, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:51:09 executing program 4:
syz_clone(0x900, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:09 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7)
[ 3009.206542][ T2946] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3009.214358][ T2946] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3009.222199][ T2946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3009.230150][ T2946] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3009.237963][ T2946]
21:51:09 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 64)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (rerun: 64)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x0, 0x40, 0x7, 0x0, 0x0, r0, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xd, 0x1, 0x1f, 0x1, 0x0, 0x1}, 0x48) (async)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880), 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xa, 0x2, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0xc, &(0x7f0000000380)=""/12, 0x9f71cadf2e2d7e4c, 0x4, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x10, 0x4, 0x400}, 0x10, 0xffffffffffffffff}, 0x80) (async)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8)
openat$cgroup_ro(r2, &(0x7f00000005c0)='memory.stat\x00', 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async)
r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0x5, 0x8}, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.throttle.io_serviced\x00', 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1c, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000001000100000000000900001018210000", @ANYRES32, @ANYBLOB="000000002ce60000183400b5000000000000000000000000184b0000050000000000000000000000185000000800000000000000000002009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x400, 0x37, &(0x7f0000000340)=""/55, 0x0, 0x9, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x2, 0x2e, 0x4}, 0x10, 0x0, r1, 0x0, &(0x7f0000000880)=[r0, r3]}, 0x80) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0xff87020000000000)
bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x7, &(0x7f0000000280)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @generic={0x0, 0x0, 0xd}, @alu={0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8}, @jmp={0x5, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x4}], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x0, 0x8, 0xffff}, 0x10}, 0x80) (async)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) (async, rerun: 64)
perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) (rerun: 64)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10)
21:51:09 executing program 2:
socketpair(0x0, 0x0, 0x4, 0x0) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
[ 3009.275729][ T2965] FAULT_INJECTION: forcing a failure.
[ 3009.275729][ T2965] name failslab, interval 1, probability 0, space 0, times 0
[ 3009.296322][ T2965] CPU: 0 PID: 2965 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3009.308187][ T2965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3009.318146][ T2965] Call Trace:
[ 3009.321264][ T2965]
[ 3009.324042][ T2965] dump_stack_lvl+0x151/0x1b7
[ 3009.328572][ T2965] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3009.334112][ T2965] dump_stack+0x15/0x17
[ 3009.338127][ T2965] should_fail+0x3c6/0x510
[ 3009.342700][ T2965] __should_failslab+0xa4/0xe0
[ 3009.347289][ T2965] should_failslab+0x9/0x20
[ 3009.351630][ T2965] slab_pre_alloc_hook+0x37/0xd0
[ 3009.356413][ T2965] __kmalloc+0x6d/0x270
[ 3009.360403][ T2965] ? kvmalloc_node+0x1f0/0x4d0
[ 3009.365014][ T2965] kvmalloc_node+0x1f0/0x4d0
[ 3009.369424][ T2965] ? vm_mmap+0xb0/0xb0
[ 3009.373415][ T2965] ? __kasan_kmalloc+0x9/0x10
[ 3009.377927][ T2965] ? kmem_cache_alloc_trace+0x115/0x210
[ 3009.383313][ T2965] ? alloc_fdtable+0xaf/0x2a0
[ 3009.387836][ T2965] alloc_fdtable+0x163/0x2a0
[ 3009.392249][ T2965] dup_fd+0x759/0xb00
[ 3009.396157][ T2965] ? avc_has_perm+0x16f/0x260
[ 3009.400673][ T2965] copy_files+0xe6/0x200
[ 3009.405562][ T2965] ? perf_event_attrs+0x30/0x30
[ 3009.410215][ T2965] ? dup_task_struct+0xc60/0xc60
[ 3009.414992][ T2965] ? security_task_alloc+0xf9/0x130
[ 3009.420024][ T2965] copy_process+0x11f3/0x3260
[ 3009.424547][ T2965] ? proc_fail_nth_write+0x20b/0x290
[ 3009.429661][ T2965] ? fsnotify_perm+0x6a/0x5d0
[ 3009.434167][ T2965] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3009.439119][ T2965] ? vfs_write+0x9ec/0x1110
[ 3009.443460][ T2965] kernel_clone+0x21e/0x9e0
[ 3009.447799][ T2965] ? file_end_write+0x1c0/0x1c0
[ 3009.452483][ T2965] ? create_io_thread+0x1e0/0x1e0
[ 3009.457353][ T2965] ? mutex_unlock+0xb2/0x260
[ 3009.461771][ T2965] ? __mutex_lock_slowpath+0x10/0x10
[ 3009.466897][ T2965] __x64_sys_clone+0x23f/0x290
[ 3009.471494][ T2965] ? __do_sys_vfork+0x130/0x130
[ 3009.476179][ T2965] ? ksys_write+0x260/0x2c0
[ 3009.480518][ T2965] ? debug_smp_processor_id+0x17/0x20
[ 3009.485723][ T2965] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3009.491646][ T2965] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3009.497095][ T2965] do_syscall_64+0x3d/0xb0
[ 3009.501348][ T2965] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3009.507174][ T2965] RIP: 0033:0x7f024b55cae9
21:51:09 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
close(r2) (async)
close(r2)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
21:51:09 executing program 4:
syz_clone(0x1100, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:09 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) (async)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x0, 0x40, 0x7, 0x0, 0x0, r0, 0x3ff, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48)
bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xd, 0x1, 0x1f, 0x1, 0x0, 0x1}, 0x48) (async)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000880), 0x10) (async, rerun: 64)
bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xa, 0x2, 0x0, &(0x7f00000002c0)='GPL\x00', 0x0, 0xc, &(0x7f0000000380)=""/12, 0x9f71cadf2e2d7e4c, 0x4, '\x00', 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000680)={0x5, 0x10, 0x4, 0x400}, 0x10, 0xffffffffffffffff}, 0x80) (async, rerun: 64)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000580), 0x8)
openat$cgroup_ro(r2, &(0x7f00000005c0)='memory.stat\x00', 0x0, 0x0) (async, rerun: 64)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) (async, rerun: 64)
r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0x5, 0x8}, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000740)='blkio.throttle.io_serviced\x00', 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x1c, 0xb, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000001000100000000000900001018210000", @ANYRES32, @ANYBLOB="000000002ce60000183400b5000000000000000000000000184b0000050000000000000000000000185000000800000000000000000002009500000000000000"], &(0x7f00000002c0)='syzkaller\x00', 0x400, 0x37, &(0x7f0000000340)=""/55, 0x0, 0x9, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x0, 0x2, 0x2e, 0x4}, 0x10, 0x0, r1, 0x0, &(0x7f0000000880)=[r0, r3]}, 0x80) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)=0xff87020000000000) (async, rerun: 64)
bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x7, &(0x7f0000000280)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x2}, @generic={0x0, 0x0, 0xd}, @alu={0x7, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8}, @jmp={0x5, 0x0, 0x0, 0x9, 0x0, 0xffffffffffffffff, 0x4}], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000003c0)={0x0, 0x8, 0xffff}, 0x10}, 0x80) (async, rerun: 64)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) (async)
perf_event_open(0x0, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10)
[ 3009.511418][ T2965] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3009.530950][ T2965] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3009.539189][ T2965] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3009.547004][ T2965] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3009.554821][ T2965] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3009.562625][ T2965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3009.570523][ T2965] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3009.578430][ T2965]
21:51:09 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x5)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r5, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r5, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r3, &(0x7f0000000000)='blkio.bfq.empty_time\x00', 0x0, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:09 executing program 2:
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x8001}, 0xc)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000040)="673a8f99b98941014ace2aa295460a04e091dc82f806c75fa59fb3380f016ac956a2343757eb5e0314e03501771c5fb28c53f126334f80c96cdb3116dfa407f195fb0bcfacc3aa1c0b74aab2c300c5512b3ec19af2924e35061a16a8836d5ff772642f01d8a1b5b4f84b098adedf6abe08c242cfd2f8016ce6cd95d7d704a44f8321bd4efff2f81e691faf3f116ff1dd1bc65f0dae288b23f7c63f3e7d8c28d3bf9d7d3b6c194640", &(0x7f0000000100)=""/234}, 0x20)
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:51:09 executing program 4:
syz_clone(0x1f00, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:09 executing program 5:
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x80, 0x3, 0x7, 0x0, 0xffffffff80000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x1000c, 0x6, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0xffffff81, 0x0, 0x5}, r1, 0x0, r0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x5, 0x8b404, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x77}, 0x418, 0xab, 0x0, 0x6, 0xff, 0x3, 0x9, 0x0, 0x80000000, 0x0, 0x7a}, r3, 0x0, r2, 0xc)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x1, 0x3, 0x7, 0x20, 0x0, 0x4, 0x800, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xa27, 0x4, @perf_config_ext={0x3, 0x84}, 0x4, 0x4, 0xea94, 0xd, 0x400, 0x80, 0x3ff, 0x0, 0x8000, 0x0, 0xb4fb}, r1, 0x0, r2, 0xc)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, r1, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r5)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
openat$cgroup_ro(r6, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x0, 0x0)
recvmsg$unix(r6, &(0x7f00000006c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/109, 0x6d}, {&(0x7f0000000240)=""/181, 0xb5}, {&(0x7f0000000440)=""/144, 0x90}, {&(0x7f0000000300)=""/97, 0x61}, {0x0}, {&(0x7f00000005c0)=""/23, 0x17}], 0x6, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x60)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r8, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2d, 'cpuset'}, {0x2b, 'perf_event'}, {0x2b, 'rdma'}, {0x2d, 'rlimit'}, {0x2b, 'cpuacct'}]}, 0x2b)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rxrpc_propose_ack\x00'}, 0x10)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00"/48], 0xfe1b)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@map, 0xffffffffffffffff, 0x14}, 0x10)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
21:51:09 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8)
[ 3009.754376][ T3001] FAULT_INJECTION: forcing a failure.
[ 3009.754376][ T3001] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3009.774408][ T3001] CPU: 1 PID: 3001 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3009.785965][ T3001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3009.795857][ T3001] Call Trace:
[ 3009.798979][ T3001]
[ 3009.801761][ T3001] dump_stack_lvl+0x151/0x1b7
[ 3009.806275][ T3001] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3009.811739][ T3001] ? __stack_depot_save+0x34/0x470
[ 3009.816820][ T3001] ? __kasan_slab_alloc+0x63/0xe0
[ 3009.821675][ T3001] dump_stack+0x15/0x17
[ 3009.825665][ T3001] should_fail+0x3c6/0x510
[ 3009.829929][ T3001] should_fail_alloc_page+0x5a/0x80
[ 3009.834954][ T3001] prepare_alloc_pages+0x15c/0x700
[ 3009.840006][ T3001] ? __alloc_pages_bulk+0xe60/0xe60
[ 3009.845028][ T3001] __alloc_pages+0x138/0x5e0
[ 3009.849474][ T3001] ? prep_new_page+0x110/0x110
[ 3009.854052][ T3001] ? __kasan_kmalloc+0x9/0x10
[ 3009.858559][ T3001] ? __kmalloc+0x13a/0x270
[ 3009.862819][ T3001] ? __vmalloc_node_range+0x2d6/0x8d0
[ 3009.868022][ T3001] __vmalloc_node_range+0x482/0x8d0
[ 3009.873057][ T3001] dup_task_struct+0x416/0xc60
[ 3009.877653][ T3001] ? copy_process+0x5c4/0x3260
[ 3009.882257][ T3001] ? __kasan_check_write+0x14/0x20
[ 3009.887201][ T3001] copy_process+0x5c4/0x3260
[ 3009.891633][ T3001] ? __kasan_check_write+0x14/0x20
[ 3009.897530][ T3001] ? proc_fail_nth_write+0x20b/0x290
21:51:09 executing program 4:
syz_clone(0x2000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:09 executing program 2:
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x8001}, 0xc)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000040)="673a8f99b98941014ace2aa295460a04e091dc82f806c75fa59fb3380f016ac956a2343757eb5e0314e03501771c5fb28c53f126334f80c96cdb3116dfa407f195fb0bcfacc3aa1c0b74aab2c300c5512b3ec19af2924e35061a16a8836d5ff772642f01d8a1b5b4f84b098adedf6abe08c242cfd2f8016ce6cd95d7d704a44f8321bd4efff2f81e691faf3f116ff1dd1bc65f0dae288b23f7c63f3e7d8c28d3bf9d7d3b6c194640", &(0x7f0000000100)=""/234}, 0x20)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:51:09 executing program 4:
syz_clone(0x7000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:09 executing program 2:
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={0xffffffffffffffff, 0x8001}, 0xc)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r0, &(0x7f0000000040)="673a8f99b98941014ace2aa295460a04e091dc82f806c75fa59fb3380f016ac956a2343757eb5e0314e03501771c5fb28c53f126334f80c96cdb3116dfa407f195fb0bcfacc3aa1c0b74aab2c300c5512b3ec19af2924e35061a16a8836d5ff772642f01d8a1b5b4f84b098adedf6abe08c242cfd2f8016ce6cd95d7d704a44f8321bd4efff2f81e691faf3f116ff1dd1bc65f0dae288b23f7c63f3e7d8c28d3bf9d7d3b6c194640", &(0x7f0000000100)=""/234}, 0x20) (async, rerun: 32)
socketpair(0x0, 0x0, 0x0, 0x0) (async, rerun: 32)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
[ 3009.902651][ T3001] ? selinux_file_permission+0x2c4/0x570
[ 3009.908326][ T3001] ? fsnotify_perm+0x6a/0x5d0
[ 3009.912829][ T3001] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3009.917899][ T3001] ? vfs_write+0x9ec/0x1110
[ 3009.922241][ T3001] kernel_clone+0x21e/0x9e0
[ 3009.926576][ T3001] ? file_end_write+0x1c0/0x1c0
[ 3009.931356][ T3001] ? create_io_thread+0x1e0/0x1e0
[ 3009.936211][ T3001] ? mutex_unlock+0xb2/0x260
[ 3009.940643][ T3001] ? __mutex_lock_slowpath+0x10/0x10
[ 3009.945764][ T3001] __x64_sys_clone+0x23f/0x290
[ 3009.950357][ T3001] ? __do_sys_vfork+0x130/0x130
[ 3009.955041][ T3001] ? ksys_write+0x260/0x2c0
[ 3009.959386][ T3001] ? debug_smp_processor_id+0x17/0x20
[ 3009.964599][ T3001] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3009.970497][ T3001] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3009.975961][ T3001] do_syscall_64+0x3d/0xb0
[ 3009.980910][ T3001] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3009.986642][ T3001] RIP: 0033:0x7f024b55cae9
[ 3009.991152][ T3001] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3010.010776][ T3001] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3010.019022][ T3001] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3010.028012][ T3001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3010.035909][ T3001] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3010.044890][ T3001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3010.053177][ T3001] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3010.061515][ T3001]
21:51:10 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r3 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
close(r2)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
21:51:10 executing program 2:
socketpair(0x1a, 0xa, 0x0, 0x0)
socketpair(0x11, 0x2, 0x9, &(0x7f0000000000))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140))
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x3}, 0xc)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4000, r2}, 0x18)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0)
syz_clone(0x4e02db00, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:10 executing program 4:
syz_clone(0x10fff, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:10 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9)
21:51:10 executing program 4:
syz_clone(0x20010, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:10 executing program 5:
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
r1 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x80, 0x3, 0x7, 0x0, 0xffffffff80000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x1000c, 0x6, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0xffffff81, 0x0, 0x5}, r1, 0x0, r0, 0x0) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async, rerun: 64)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (rerun: 64)
perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x5, 0x8b404, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x77}, 0x418, 0xab, 0x0, 0x6, 0xff, 0x3, 0x9, 0x0, 0x80000000, 0x0, 0x7a}, r3, 0x0, r2, 0xc)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x1, 0x3, 0x7, 0x20, 0x0, 0x4, 0x800, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xa27, 0x4, @perf_config_ext={0x3, 0x84}, 0x4, 0x4, 0xea94, 0xd, 0x400, 0x80, 0x3ff, 0x0, 0x8000, 0x0, 0xb4fb}, r1, 0x0, r2, 0xc) (async, rerun: 64)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, r1, 0x0, 0xffffffffffffffff, 0x0) (rerun: 64)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r5) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
openat$cgroup_ro(r6, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x0, 0x0) (async, rerun: 32)
recvmsg$unix(r6, &(0x7f00000006c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/109, 0x6d}, {&(0x7f0000000240)=""/181, 0xb5}, {&(0x7f0000000440)=""/144, 0x90}, {&(0x7f0000000300)=""/97, 0x61}, {0x0}, {&(0x7f00000005c0)=""/23, 0x17}], 0x6, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x60) (async, rerun: 32)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r8, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async, rerun: 32)
write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2d, 'cpuset'}, {0x2b, 'perf_event'}, {0x2b, 'rdma'}, {0x2d, 'rlimit'}, {0x2b, 'cpuacct'}]}, 0x2b) (async, rerun: 32)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rxrpc_propose_ack\x00'}, 0x10)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00"/48], 0xfe1b)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@map, 0xffffffffffffffff, 0x14}, 0x10)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
[ 3010.616108][ T3039] FAULT_INJECTION: forcing a failure.
[ 3010.616108][ T3039] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3010.653255][ T3039] CPU: 0 PID: 3039 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3010.665006][ T3039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3010.674888][ T3039] Call Trace:
[ 3010.678006][ T3039]
[ 3010.680788][ T3039] dump_stack_lvl+0x151/0x1b7
[ 3010.685297][ T3039] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3010.690775][ T3039] ? __stack_depot_save+0x34/0x470
[ 3010.695802][ T3039] dump_stack+0x15/0x17
[ 3010.699796][ T3039] should_fail+0x3c6/0x510
[ 3010.704199][ T3039] should_fail_alloc_page+0x5a/0x80
[ 3010.709231][ T3039] prepare_alloc_pages+0x15c/0x700
[ 3010.714178][ T3039] ? __alloc_pages+0x5e0/0x5e0
[ 3010.718803][ T3039] ? __alloc_pages_bulk+0xe60/0xe60
[ 3010.723901][ T3039] __alloc_pages+0x138/0x5e0
[ 3010.728320][ T3039] ? prep_new_page+0x110/0x110
[ 3010.732921][ T3039] ? __kasan_kmalloc+0x9/0x10
[ 3010.737441][ T3039] ? __kmalloc+0x13a/0x270
[ 3010.741686][ T3039] ? __vmalloc_node_range+0x2d6/0x8d0
[ 3010.746901][ T3039] __vmalloc_node_range+0x482/0x8d0
[ 3010.751963][ T3039] dup_task_struct+0x416/0xc60
[ 3010.756560][ T3039] ? copy_process+0x5c4/0x3260
[ 3010.761216][ T3039] ? __kasan_check_write+0x14/0x20
[ 3010.766172][ T3039] copy_process+0x5c4/0x3260
[ 3010.770592][ T3039] ? __kasan_check_write+0x14/0x20
[ 3010.775561][ T3039] ? proc_fail_nth_write+0x20b/0x290
[ 3010.780654][ T3039] ? selinux_file_permission+0x2c4/0x570
[ 3010.786126][ T3039] ? fsnotify_perm+0x6a/0x5d0
[ 3010.790638][ T3039] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3010.795584][ T3039] ? vfs_write+0x9ec/0x1110
[ 3010.799927][ T3039] kernel_clone+0x21e/0x9e0
[ 3010.804262][ T3039] ? file_end_write+0x1c0/0x1c0
[ 3010.808950][ T3039] ? create_io_thread+0x1e0/0x1e0
[ 3010.814593][ T3039] ? mutex_unlock+0xb2/0x260
[ 3010.819025][ T3039] ? __mutex_lock_slowpath+0x10/0x10
[ 3010.824141][ T3039] __x64_sys_clone+0x23f/0x290
[ 3010.828743][ T3039] ? __do_sys_vfork+0x130/0x130
[ 3010.833514][ T3039] ? ksys_write+0x260/0x2c0
[ 3010.837854][ T3039] ? debug_smp_processor_id+0x17/0x20
[ 3010.843073][ T3039] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3010.848963][ T3039] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3010.854430][ T3039] do_syscall_64+0x3d/0xb0
[ 3010.858690][ T3039] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3010.864412][ T3039] RIP: 0033:0x7f024b55cae9
[ 3010.868666][ T3039] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3010.888209][ T3039] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3010.897533][ T3039] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3010.905426][ T3039] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
21:51:11 executing program 4:
syz_clone(0x20200, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:11 executing program 4:
syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:11 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10)
[ 3010.913327][ T3039] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3010.922025][ T3039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[ 3010.930919][ T3039] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3010.940749][ T3039]
21:51:11 executing program 3:
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup, 0x2, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)={@map, 0xffffffffffffffff, 0x1, 0x0, 0x0, @prog_fd, r0}, 0x20)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup, 0xffffffffffffffff, 0xf, 0x22, 0x0, @prog_id, r0}, 0x20)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
21:51:11 executing program 4:
syz_clone(0x101000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:11 executing program 3:
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup, 0x2, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0}, 0x40) (async)
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup, 0x2, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)={@map, 0xffffffffffffffff, 0x1, 0x0, 0x0, @prog_fd, r0}, 0x20)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup, 0xffffffffffffffff, 0xf, 0x22, 0x0, @prog_id, r0}, 0x20)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12) (async)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
[ 3010.994898][ T3055] FAULT_INJECTION: forcing a failure.
[ 3010.994898][ T3055] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3011.037698][ T3055] CPU: 0 PID: 3055 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3011.049170][ T3055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3011.059074][ T3055] Call Trace:
[ 3011.062190][ T3055]
[ 3011.064974][ T3055] dump_stack_lvl+0x151/0x1b7
[ 3011.069484][ T3055] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3011.074959][ T3055] ? __stack_depot_save+0x34/0x470
[ 3011.079901][ T3055] dump_stack+0x15/0x17
[ 3011.083890][ T3055] should_fail+0x3c6/0x510
[ 3011.088145][ T3055] should_fail_alloc_page+0x5a/0x80
[ 3011.093175][ T3055] prepare_alloc_pages+0x15c/0x700
[ 3011.098268][ T3055] ? __alloc_pages+0x5e0/0x5e0
[ 3011.102884][ T3055] ? __alloc_pages_bulk+0xe60/0xe60
[ 3011.108054][ T3055] __alloc_pages+0x138/0x5e0
[ 3011.112482][ T3055] ? prep_new_page+0x110/0x110
[ 3011.117085][ T3055] ? __kasan_kmalloc+0x9/0x10
[ 3011.121609][ T3055] ? __kmalloc+0x13a/0x270
[ 3011.125844][ T3055] ? __vmalloc_node_range+0x2d6/0x8d0
[ 3011.131054][ T3055] __vmalloc_node_range+0x482/0x8d0
[ 3011.136340][ T3055] dup_task_struct+0x416/0xc60
[ 3011.140973][ T3055] ? copy_process+0x5c4/0x3260
[ 3011.145569][ T3055] ? __kasan_check_write+0x14/0x20
[ 3011.150662][ T3055] copy_process+0x5c4/0x3260
[ 3011.155077][ T3055] ? __kasan_check_write+0x14/0x20
[ 3011.160037][ T3055] ? proc_fail_nth_write+0x20b/0x290
[ 3011.165238][ T3055] ? selinux_file_permission+0x2c4/0x570
[ 3011.170792][ T3055] ? fsnotify_perm+0x6a/0x5d0
[ 3011.175303][ T3055] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3011.180251][ T3055] ? vfs_write+0x9ec/0x1110
[ 3011.184598][ T3055] kernel_clone+0x21e/0x9e0
[ 3011.188943][ T3055] ? file_end_write+0x1c0/0x1c0
[ 3011.193971][ T3055] ? create_io_thread+0x1e0/0x1e0
[ 3011.198831][ T3055] ? mutex_unlock+0xb2/0x260
[ 3011.203257][ T3055] ? __mutex_lock_slowpath+0x10/0x10
[ 3011.208382][ T3055] __x64_sys_clone+0x23f/0x290
[ 3011.213087][ T3055] ? __do_sys_vfork+0x130/0x130
[ 3011.217766][ T3055] ? ksys_write+0x260/0x2c0
[ 3011.222111][ T3055] ? debug_smp_processor_id+0x17/0x20
[ 3011.227424][ T3055] ? fpregs_assert_state_consistent+0xb6/0xe0
21:51:11 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_pressure(r0, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0)
21:51:11 executing program 2:
socketpair(0x1a, 0xa, 0x0, 0x0)
socketpair(0x11, 0x2, 0x9, &(0x7f0000000000))
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140))
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x3}, 0xc)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4000, r2}, 0x18)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0)
syz_clone(0x4e02db00, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair(0x1a, 0xa, 0x0, 0x0) (async)
socketpair(0x11, 0x2, 0x9, &(0x7f0000000000)) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) (async)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x3}, 0xc) (async)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4000, r2}, 0x18) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r1, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) (async)
syz_clone(0x4e02db00, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
[ 3011.233324][ T3055] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3011.239572][ T3055] do_syscall_64+0x3d/0xb0
[ 3011.243826][ T3055] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3011.249586][ T3055] RIP: 0033:0x7f024b55cae9
[ 3011.253809][ T3055] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3011.273335][ T3055] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:51:11 executing program 3:
bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={@cgroup, 0x2, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0}, 0x40)
bpf$BPF_PROG_DETACH(0x9, &(0x7f00000006c0)={@map, 0xffffffffffffffff, 0x1, 0x0, 0x0, @prog_fd, r0}, 0x20) (async, rerun: 64)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup, 0xffffffffffffffff, 0xf, 0x22, 0x0, @prog_id, r0}, 0x20) (async, rerun: 64)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
21:51:11 executing program 4:
syz_clone(0x700000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:11 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
openat$cgroup_pressure(r0, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0)
[ 3011.281589][ T3055] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3011.289401][ T3055] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3011.297223][ T3055] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3011.305066][ T3055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3011.312823][ T3055] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3011.320745][ T3055]
21:51:11 executing program 5:
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64)
r1 = syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64)
perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x6, 0x80, 0x3, 0x7, 0x0, 0xffffffff80000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}, 0x1000c, 0x6, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0xffffff81, 0x0, 0x5}, r1, 0x0, r0, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0)
perf_event_open$cgroup(&(0x7f0000000180)={0x4, 0x80, 0x3f, 0x8, 0x0, 0x0, 0x0, 0x5, 0x8b404, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0x77}, 0x418, 0xab, 0x0, 0x6, 0xff, 0x3, 0x9, 0x0, 0x80000000, 0x0, 0x7a}, r3, 0x0, r2, 0xc)
perf_event_open(&(0x7f0000000780)={0x2, 0x80, 0x1, 0x3, 0x7, 0x20, 0x0, 0x4, 0x800, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xa27, 0x4, @perf_config_ext={0x3, 0x84}, 0x4, 0x4, 0xea94, 0xd, 0x400, 0x80, 0x3ff, 0x0, 0x8000, 0x0, 0xb4fb}, r1, 0x0, r2, 0xc)
perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0xc8}, r1, 0x0, 0xffffffffffffffff, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff})
close(r5) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
openat$cgroup_ro(r6, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x0, 0x0) (async)
recvmsg$unix(r6, &(0x7f00000006c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f00000001c0)=""/109, 0x6d}, {&(0x7f0000000240)=""/181, 0xb5}, {&(0x7f0000000440)=""/144, 0x90}, {&(0x7f0000000300)=""/97, 0x61}, {0x0}, {&(0x7f00000005c0)=""/23, 0x17}], 0x6, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x60)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r8, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
write$cgroup_subtree(r8, &(0x7f00000000c0)={[{0x2d, 'cpuset'}, {0x2b, 'perf_event'}, {0x2b, 'rdma'}, {0x2d, 'rlimit'}, {0x2b, 'cpuacct'}]}, 0x2b) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='rxrpc_propose_ack\x00'}, 0x10) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00"/48], 0xfe1b)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000400)={@map, 0xffffffffffffffff, 0x14}, 0x10) (async)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
21:51:11 executing program 4:
syz_clone(0xf0ff1f, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:11 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11)
21:51:11 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
openat$cgroup_pressure(r0, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0)
21:51:11 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2c07}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @ldst={0x2, 0x2, 0x1, 0x0, 0xa, 0x80}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x64, '\x00', r2, 0x0, r4, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0xa, 0x8000, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x1, 0x1], &(0x7f0000000280)=[{0x5, 0x3, 0xd, 0x6}, {0x4, 0x4, 0x1, 0x5}, {0x4, 0x1, 0x8, 0x2}, {0x1, 0x2, 0xb, 0xb}, {0x2, 0x2, 0xa, 0x9}, {0x3, 0x8434, 0x7, 0x5}, {0x2, 0x4, 0xe, 0x5}], 0x10, 0x3}, 0x90)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:11 executing program 2:
socketpair(0x1a, 0xa, 0x0, 0x0) (async, rerun: 32)
socketpair(0x11, 0x2, 0x9, &(0x7f0000000000)) (rerun: 32)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) (async)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0xffffffffffffffff, 0x3}, 0xc)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)=@o_path={&(0x7f0000000080)='./file0\x00', 0x0, 0x4000, r2}, 0x18) (async, rerun: 32)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (rerun: 32)
openat$cgroup_ro(r1, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) (async)
syz_clone(0x4e02db00, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:11 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8)
openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x0, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0)
write$cgroup_pid(r2, &(0x7f0000000000), 0x12)
[ 3011.568487][ T3093] FAULT_INJECTION: forcing a failure.
[ 3011.568487][ T3093] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3011.606295][ T3093] CPU: 1 PID: 3093 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
21:51:11 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8)
openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x0, 0x0) (async)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0)
write$cgroup_pid(r2, &(0x7f0000000000), 0x12)
21:51:11 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8)
openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.throttle.io_serviced\x00', 0x0, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) (async, rerun: 32)
write$cgroup_pid(r2, &(0x7f0000000000), 0x12) (rerun: 32)
21:51:11 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
[ 3011.617852][ T3093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3011.627750][ T3093] Call Trace:
[ 3011.630872][ T3093]
[ 3011.633649][ T3093] dump_stack_lvl+0x151/0x1b7
[ 3011.638178][ T3093] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3011.643633][ T3093] ? __stack_depot_save+0x34/0x470
[ 3011.648583][ T3093] dump_stack+0x15/0x17
[ 3011.652573][ T3093] should_fail+0x3c6/0x510
[ 3011.656913][ T3093] should_fail_alloc_page+0x5a/0x80
[ 3011.662036][ T3093] prepare_alloc_pages+0x15c/0x700
21:51:11 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
[ 3011.666997][ T3093] ? __alloc_pages+0x5e0/0x5e0
[ 3011.671606][ T3093] ? __alloc_pages_bulk+0xe60/0xe60
[ 3011.676710][ T3093] __alloc_pages+0x138/0x5e0
[ 3011.681126][ T3093] ? prep_new_page+0x110/0x110
[ 3011.685866][ T3093] ? __kasan_kmalloc+0x9/0x10
[ 3011.690365][ T3093] ? __kmalloc+0x13a/0x270
[ 3011.694865][ T3093] ? __vmalloc_node_range+0x2d6/0x8d0
[ 3011.700261][ T3093] __vmalloc_node_range+0x482/0x8d0
[ 3011.705382][ T3093] dup_task_struct+0x416/0xc60
[ 3011.709983][ T3093] ? copy_process+0x5c4/0x3260
21:51:11 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
[ 3011.714580][ T3093] ? __kasan_check_write+0x14/0x20
[ 3011.719568][ T3093] copy_process+0x5c4/0x3260
[ 3011.724080][ T3093] ? __kasan_check_write+0x14/0x20
[ 3011.729527][ T3093] ? proc_fail_nth_write+0x20b/0x290
[ 3011.734718][ T3093] ? selinux_file_permission+0x2c4/0x570
[ 3011.740194][ T3093] ? fsnotify_perm+0x6a/0x5d0
[ 3011.744700][ T3093] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3011.749643][ T3093] ? vfs_write+0x9ec/0x1110
[ 3011.754005][ T3093] kernel_clone+0x21e/0x9e0
[ 3011.758324][ T3093] ? file_end_write+0x1c0/0x1c0
[ 3011.763014][ T3093] ? create_io_thread+0x1e0/0x1e0
[ 3011.767883][ T3093] ? mutex_unlock+0xb2/0x260
[ 3011.772395][ T3093] ? __mutex_lock_slowpath+0x10/0x10
[ 3011.777512][ T3093] __x64_sys_clone+0x23f/0x290
[ 3011.782120][ T3093] ? __do_sys_vfork+0x130/0x130
[ 3011.786799][ T3093] ? ksys_write+0x260/0x2c0
[ 3011.791141][ T3093] ? debug_smp_processor_id+0x17/0x20
[ 3011.796349][ T3093] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3011.802424][ T3093] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3011.807892][ T3093] do_syscall_64+0x3d/0xb0
[ 3011.812322][ T3093] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3011.818056][ T3093] RIP: 0033:0x7f024b55cae9
[ 3011.823608][ T3093] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3011.843572][ T3093] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3011.852529][ T3093] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3011.860496][ T3093] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3011.869186][ T3093] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3011.877883][ T3093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3011.885710][ T3093] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3011.893598][ T3093]
21:51:12 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0)
21:51:12 executing program 4:
syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:12 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12)
21:51:12 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r0, 0x10f, 0x88, 0x0, 0x0)
setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x62, 0x6, 0x9, 0x3, 0x0, 0xedc, 0x400, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x40, 0x8b}, 0x0, 0x4, 0x1, 0x1, 0x7ff, 0x6, 0x1, 0x0, 0x1000, 0x0, 0x8000000000000000}, r1, 0x4, r2, 0x1)
r4 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x4, 0x4, 0x0, 0x2, 0x0, 0x709, 0x100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffff67, 0x0, @perf_bp={&(0x7f0000000140)}, 0xc115, 0xffffffffffffffff, 0xff, 0x6, 0x3, 0xfffffffc, 0x9, 0x0, 0x2, 0x0, 0xc7c}, 0xffffffffffffffff, 0xf, r3, 0x2)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x0, 0x40, 0x8, 0x0, 0x9, 0x10, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x18209, 0x7cb, 0xb2af, 0x1, 0x7, 0x8000, 0x3, 0x0, 0x9, 0x0, 0x20000000000}, 0x0, 0xe, r4, 0x9)
21:51:12 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async, rerun: 32)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 32)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2c07}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @ldst={0x2, 0x2, 0x1, 0x0, 0xa, 0x80}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x64, '\x00', r2, 0x0, r4, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0xa, 0x8000, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x1, 0x1], &(0x7f0000000280)=[{0x5, 0x3, 0xd, 0x6}, {0x4, 0x4, 0x1, 0x5}, {0x4, 0x1, 0x8, 0x2}, {0x1, 0x2, 0xb, 0xb}, {0x2, 0x2, 0xa, 0x9}, {0x3, 0x8434, 0x7, 0x5}, {0x2, 0x4, 0xe, 0x5}], 0x10, 0x3}, 0x90) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:12 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0)
21:51:12 executing program 4:
syz_clone(0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3012.529431][ T3143] FAULT_INJECTION: forcing a failure.
[ 3012.529431][ T3143] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3012.559514][ T3143] CPU: 0 PID: 3143 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3012.571118][ T3143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3012.581005][ T3143] Call Trace:
[ 3012.584134][ T3143]
[ 3012.586907][ T3143] dump_stack_lvl+0x151/0x1b7
[ 3012.591420][ T3143] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3012.596891][ T3143] ? __stack_depot_save+0x34/0x470
[ 3012.601837][ T3143] dump_stack+0x15/0x17
[ 3012.605831][ T3143] should_fail+0x3c6/0x510
[ 3012.610091][ T3143] should_fail_alloc_page+0x5a/0x80
[ 3012.615122][ T3143] prepare_alloc_pages+0x15c/0x700
[ 3012.620150][ T3143] ? __alloc_pages+0x5e0/0x5e0
[ 3012.624751][ T3143] ? __alloc_pages_bulk+0xe60/0xe60
21:51:12 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r0, 0x10f, 0x88, 0x0, 0x0)
setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4) (async)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3) (async)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x62, 0x6, 0x9, 0x3, 0x0, 0xedc, 0x400, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x40, 0x8b}, 0x0, 0x4, 0x1, 0x1, 0x7ff, 0x6, 0x1, 0x0, 0x1000, 0x0, 0x8000000000000000}, r1, 0x4, r2, 0x1)
r4 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x4, 0x4, 0x0, 0x2, 0x0, 0x709, 0x100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffff67, 0x0, @perf_bp={&(0x7f0000000140)}, 0xc115, 0xffffffffffffffff, 0xff, 0x6, 0x3, 0xfffffffc, 0x9, 0x0, 0x2, 0x0, 0xc7c}, 0xffffffffffffffff, 0xf, r3, 0x2)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x0, 0x40, 0x8, 0x0, 0x9, 0x10, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x18209, 0x7cb, 0xb2af, 0x1, 0x7, 0x8000, 0x3, 0x0, 0x9, 0x0, 0x20000000000}, 0x0, 0xe, r4, 0x9)
21:51:12 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000980)={0x1, 0x0}, 0x8)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/98}, 0x20)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x8, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/98}, 0x20)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x0, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000640)='GPL\x00', 0x3, 0xbc, &(0x7f00000007c0)=""/188, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5]}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x5, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x1f}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call, @initr0={0x18, 0x0, 0x0, 0x0, 0xa3c8, 0x0, 0x0, 0x0, 0x6}, @call]}, 0x0, 0x2e, 0xbd, &(0x7f00000006c0)=""/189, 0x0, 0x40, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0x3, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000ac0)=[{0x2, 0x4, 0xf}, {0x1, 0x1, 0xb}, {0x2, 0x4, 0x2, 0x2}, {0x1, 0x1, 0x7, 0x7}, {0x2, 0x3, 0xe, 0x3}, {0x3, 0x1, 0x6}], 0x10, 0x2}, 0x90)
r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0xc028660f, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x16, 0x0, &(0x7f0000000880), &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x19, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x5}, 0x8, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b80)=[r0, r6]}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x1, &(0x7f00000003c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0x96, &(0x7f0000000440)=""/150, 0x41100, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x9, 0xffc, 0x8e}, 0x10, r3}, 0x80)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x2df89)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xda00)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_int(r8, &(0x7f0000000200)=0x9100000000000000, 0x43405)
[ 3012.629785][ T3143] __alloc_pages+0x138/0x5e0
[ 3012.634213][ T3143] ? prep_new_page+0x110/0x110
[ 3012.638815][ T3143] ? __kasan_kmalloc+0x9/0x10
[ 3012.643323][ T3143] ? __kmalloc+0x13a/0x270
[ 3012.647574][ T3143] ? __vmalloc_node_range+0x2d6/0x8d0
[ 3012.652784][ T3143] __vmalloc_node_range+0x482/0x8d0
[ 3012.657823][ T3143] dup_task_struct+0x416/0xc60
[ 3012.662418][ T3143] ? copy_process+0x5c4/0x3260
[ 3012.667027][ T3143] ? __kasan_check_write+0x14/0x20
[ 3012.671972][ T3143] copy_process+0x5c4/0x3260
[ 3012.676395][ T3143] ? __kasan_check_write+0x14/0x20
[ 3012.681341][ T3143] ? proc_fail_nth_write+0x20b/0x290
[ 3012.686461][ T3143] ? selinux_file_permission+0x2c4/0x570
[ 3012.691927][ T3143] ? fsnotify_perm+0x6a/0x5d0
[ 3012.696446][ T3143] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3012.701389][ T3143] ? vfs_write+0x9ec/0x1110
[ 3012.705730][ T3143] kernel_clone+0x21e/0x9e0
[ 3012.710064][ T3143] ? file_end_write+0x1c0/0x1c0
[ 3012.714755][ T3143] ? create_io_thread+0x1e0/0x1e0
[ 3012.719612][ T3143] ? mutex_unlock+0xb2/0x260
[ 3012.724107][ T3143] ? __mutex_lock_slowpath+0x10/0x10
21:51:12 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r2, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0)
[ 3012.729250][ T3143] __x64_sys_clone+0x23f/0x290
[ 3012.733851][ T3143] ? __do_sys_vfork+0x130/0x130
[ 3012.738544][ T3143] ? ksys_write+0x260/0x2c0
[ 3012.743092][ T3143] ? debug_smp_processor_id+0x17/0x20
[ 3012.748257][ T3143] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3012.754682][ T3143] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3012.760153][ T3143] do_syscall_64+0x3d/0xb0
[ 3012.764402][ T3143] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3012.770129][ T3143] RIP: 0033:0x7f024b55cae9
[ 3012.774383][ T3143] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3012.794100][ T3143] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3012.802339][ T3143] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3012.810235][ T3143] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3012.818566][ T3143] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
21:51:12 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
21:51:12 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r0, 0x10f, 0x88, 0x0, 0x0) (async, rerun: 32)
setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4) (rerun: 32)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3) (async)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
r3 = perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x62, 0x6, 0x9, 0x3, 0x0, 0xedc, 0x400, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x40, 0x8b}, 0x0, 0x4, 0x1, 0x1, 0x7ff, 0x6, 0x1, 0x0, 0x1000, 0x0, 0x8000000000000000}, r1, 0x4, r2, 0x1)
r4 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x4, 0x4, 0x0, 0x2, 0x0, 0x709, 0x100, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffff67, 0x0, @perf_bp={&(0x7f0000000140)}, 0xc115, 0xffffffffffffffff, 0xff, 0x6, 0x3, 0xfffffffc, 0x9, 0x0, 0x2, 0x0, 0xc7c}, 0xffffffffffffffff, 0xf, r3, 0x2)
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x4, 0x0, 0x40, 0x8, 0x0, 0x9, 0x10, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x18209, 0x7cb, 0xb2af, 0x1, 0x7, 0x8000, 0x3, 0x0, 0x9, 0x0, 0x20000000000}, 0x0, 0xe, r4, 0x9)
21:51:12 executing program 4:
syz_clone(0x7000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3012.826384][ T3143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3012.834275][ T3143] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3012.842093][ T3143]
21:51:12 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13)
21:51:12 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
[ 3012.908395][ T3180] FAULT_INJECTION: forcing a failure.
[ 3012.908395][ T3180] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3012.941529][ T3180] CPU: 1 PID: 3180 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3012.953017][ T3180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3012.963348][ T3180] Call Trace:
[ 3012.966475][ T3180]
[ 3012.969251][ T3180] dump_stack_lvl+0x151/0x1b7
[ 3012.973782][ T3180] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3012.979403][ T3180] ? __stack_depot_save+0x34/0x470
[ 3012.984574][ T3180] dump_stack+0x15/0x17
[ 3012.988549][ T3180] should_fail+0x3c6/0x510
[ 3012.992803][ T3180] should_fail_alloc_page+0x5a/0x80
[ 3012.998119][ T3180] prepare_alloc_pages+0x15c/0x700
[ 3013.003162][ T3180] ? __alloc_pages+0x5e0/0x5e0
[ 3013.007745][ T3180] ? __alloc_pages_bulk+0xe60/0xe60
[ 3013.012791][ T3180] __alloc_pages+0x138/0x5e0
[ 3013.017311][ T3180] ? prep_new_page+0x110/0x110
[ 3013.021927][ T3180] ? __kasan_kmalloc+0x9/0x10
[ 3013.026434][ T3180] ? __kmalloc+0x13a/0x270
[ 3013.030677][ T3180] ? __vmalloc_node_range+0x2d6/0x8d0
[ 3013.035884][ T3180] __vmalloc_node_range+0x482/0x8d0
[ 3013.040925][ T3180] dup_task_struct+0x416/0xc60
[ 3013.045551][ T3180] ? copy_process+0x5c4/0x3260
[ 3013.050146][ T3180] ? __kasan_check_write+0x14/0x20
[ 3013.055067][ T3180] copy_process+0x5c4/0x3260
[ 3013.059496][ T3180] ? __kasan_check_write+0x14/0x20
[ 3013.064529][ T3180] ? proc_fail_nth_write+0x20b/0x290
[ 3013.069653][ T3180] ? selinux_file_permission+0x2c4/0x570
[ 3013.075201][ T3180] ? fsnotify_perm+0x6a/0x5d0
[ 3013.079720][ T3180] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3013.084678][ T3180] ? vfs_write+0x9ec/0x1110
[ 3013.089025][ T3180] kernel_clone+0x21e/0x9e0
[ 3013.093361][ T3180] ? file_end_write+0x1c0/0x1c0
[ 3013.098043][ T3180] ? create_io_thread+0x1e0/0x1e0
[ 3013.102890][ T3180] ? mutex_unlock+0xb2/0x260
[ 3013.107316][ T3180] ? __mutex_lock_slowpath+0x10/0x10
[ 3013.112438][ T3180] __x64_sys_clone+0x23f/0x290
[ 3013.117126][ T3180] ? __do_sys_vfork+0x130/0x130
[ 3013.121810][ T3180] ? ksys_write+0x260/0x2c0
[ 3013.126163][ T3180] ? debug_smp_processor_id+0x17/0x20
[ 3013.131448][ T3180] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3013.137348][ T3180] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3013.142816][ T3180] do_syscall_64+0x3d/0xb0
[ 3013.147072][ T3180] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3013.152796][ T3180] RIP: 0033:0x7f024b55cae9
[ 3013.157135][ T3180] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3013.176582][ T3180] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3013.184821][ T3180] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3013.192635][ T3180] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3013.200444][ T3180] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
21:51:13 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
[ 3013.208263][ T3180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3013.216074][ T3180] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3013.223900][ T3180]
21:51:13 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0xffffffffffffffff, 0x58, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2c07}, [@btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @ldst={0x2, 0x2, 0x1, 0x0, 0xa, 0x80}]}, &(0x7f0000000080)='syzkaller\x00', 0x6, 0x0, 0x0, 0x41000, 0x64, '\x00', r2, 0x0, r4, 0x8, &(0x7f00000001c0)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0xa, 0x8000, 0x9}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000240)=[0x1, 0x1], &(0x7f0000000280)=[{0x5, 0x3, 0xd, 0x6}, {0x4, 0x4, 0x1, 0x5}, {0x4, 0x1, 0x8, 0x2}, {0x1, 0x2, 0xb, 0xb}, {0x2, 0x2, 0xa, 0x9}, {0x3, 0x8434, 0x7, 0x5}, {0x2, 0x4, 0xe, 0x5}], 0x10, 0x3}, 0x90) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:13 executing program 4:
syz_clone(0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:13 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0x2, 0xc8, 0x3, 0x0, 0xffffffffffff8001, 0x21000, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x26, 0x7fffffff, 0x5, 0x7, 0x8, 0x9, 0xde3, 0x0, 0x8, 0x0, 0x929}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xc)
socketpair(0x5, 0x4, 0x1f2b9530, &(0x7f0000000140))
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x7f, 0x2, 0x2, 0x0, 0x20, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x5e19}, 0x810, 0x1, 0x7fffffff, 0x6, 0x7, 0x0, 0x2, 0x0, 0x80, 0x0, 0x9}, r1, 0x2, r3, 0x0)
r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x80, 0x1f, 0x9c, 0x80, 0x0, 0x56, 0x1f220, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xe57, 0x4, @perf_config_ext={0x7fff, 0x1}, 0x0, 0x9, 0xc0d3, 0x7, 0x800, 0x1f, 0x0, 0x0, 0x2, 0x0, 0x4}, r1, 0x0, r2, 0x8)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r6, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r6, &(0x7f0000000480)='blkio.throttle.io_serviced\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000380)=0x4)
r7 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000240), 0x10)
r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='kvm_dirty_ring_exit\x00'}, 0x10)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000440)=0x980b)
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x3, 0x1f, 0x6, 0x0, 0x9, 0x80120, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8e0, 0x4, @perf_bp={&(0x7f0000000180), 0x3}, 0x4a10, 0x7ff, 0x5, 0xd, 0x42b, 0x1, 0x2, 0x0, 0x81, 0x0, 0x3}, r0, 0x10, r7, 0x8)
21:51:13 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14)
[ 3013.464273][ T3206] FAULT_INJECTION: forcing a failure.
[ 3013.464273][ T3206] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3013.477744][ T3206] CPU: 0 PID: 3206 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3013.489408][ T3206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3013.499298][ T3206] Call Trace:
[ 3013.502542][ T3206]
[ 3013.505308][ T3206] dump_stack_lvl+0x151/0x1b7
[ 3013.509819][ T3206] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3013.515285][ T3206] ? __stack_depot_save+0x34/0x470
[ 3013.520235][ T3206] dump_stack+0x15/0x17
[ 3013.524225][ T3206] should_fail+0x3c6/0x510
[ 3013.528479][ T3206] should_fail_alloc_page+0x5a/0x80
[ 3013.533509][ T3206] prepare_alloc_pages+0x15c/0x700
[ 3013.538463][ T3206] ? __alloc_pages+0x5e0/0x5e0
[ 3013.543058][ T3206] ? __alloc_pages_bulk+0xe60/0xe60
[ 3013.548442][ T3206] __alloc_pages+0x138/0x5e0
[ 3013.552865][ T3206] ? prep_new_page+0x110/0x110
[ 3013.557468][ T3206] ? __kasan_kmalloc+0x9/0x10
[ 3013.561979][ T3206] ? __kmalloc+0x13a/0x270
[ 3013.566325][ T3206] ? __vmalloc_node_range+0x2d6/0x8d0
[ 3013.571532][ T3206] __vmalloc_node_range+0x482/0x8d0
[ 3013.576831][ T3206] dup_task_struct+0x416/0xc60
[ 3013.581427][ T3206] ? copy_process+0x5c4/0x3260
[ 3013.586039][ T3206] ? __kasan_check_write+0x14/0x20
[ 3013.590975][ T3206] copy_process+0x5c4/0x3260
[ 3013.595403][ T3206] ? __kasan_check_write+0x14/0x20
[ 3013.600966][ T3206] ? proc_fail_nth_write+0x20b/0x290
[ 3013.606084][ T3206] ? selinux_file_permission+0x2c4/0x570
[ 3013.611555][ T3206] ? fsnotify_perm+0x6a/0x5d0
[ 3013.616166][ T3206] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3013.621111][ T3206] ? vfs_write+0x9ec/0x1110
[ 3013.625443][ T3206] kernel_clone+0x21e/0x9e0
[ 3013.629791][ T3206] ? file_end_write+0x1c0/0x1c0
[ 3013.634636][ T3206] ? create_io_thread+0x1e0/0x1e0
[ 3013.639485][ T3206] ? mutex_unlock+0xb2/0x260
[ 3013.643908][ T3206] ? __mutex_lock_slowpath+0x10/0x10
[ 3013.649127][ T3206] __x64_sys_clone+0x23f/0x290
[ 3013.653712][ T3206] ? __do_sys_vfork+0x130/0x130
[ 3013.658397][ T3206] ? ksys_write+0x260/0x2c0
[ 3013.662740][ T3206] ? debug_smp_processor_id+0x17/0x20
[ 3013.667946][ T3206] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3013.673850][ T3206] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3013.679322][ T3206] do_syscall_64+0x3d/0xb0
[ 3013.683575][ T3206] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3013.689298][ T3206] RIP: 0033:0x7f024b55cae9
[ 3013.693554][ T3206] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3013.713081][ T3206] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3013.722648][ T3206] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3013.730513][ T3206] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3013.738313][ T3206] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3013.746141][ T3206] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3013.754025][ T3206] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3013.762017][ T3206]
21:51:13 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7f, 0xff, 0x6, 0xd3, 0x0, 0xffffffff, 0x184c0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x1b}, 0x8, 0x10001, 0x0, 0x7, 0x8, 0x4, 0x6, 0x0, 0xfffffff8, 0x0, 0x6}, r2, 0xa, 0xffffffffffffffff, 0x3)
21:51:13 executing program 4:
syz_clone(0x9000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:13 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15)
21:51:13 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000980)={0x1, 0x0}, 0x8)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/98}, 0x20)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x8, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/98}, 0x20) (async)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x20) (async, rerun: 32)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x0, 0x1}, 0x48) (rerun: 32)
bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000640)='GPL\x00', 0x3, 0xbc, &(0x7f00000007c0)=""/188, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5]}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x5, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x1f}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call, @initr0={0x18, 0x0, 0x0, 0x0, 0xa3c8, 0x0, 0x0, 0x0, 0x6}, @call]}, 0x0, 0x2e, 0xbd, &(0x7f00000006c0)=""/189, 0x0, 0x40, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0x3, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000ac0)=[{0x2, 0x4, 0xf}, {0x1, 0x1, 0xb}, {0x2, 0x4, 0x2, 0x2}, {0x1, 0x1, 0x7, 0x7}, {0x2, 0x3, 0xe, 0x3}, {0x3, 0x1, 0x6}], 0x10, 0x2}, 0x90) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0xc028660f, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x16, 0x0, &(0x7f0000000880), &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x19, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x5}, 0x8, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b80)=[r0, r6]}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x1, &(0x7f00000003c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0x96, &(0x7f0000000440)=""/150, 0x41100, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x9, 0xffc, 0x8e}, 0x10, r3}, 0x80)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) (async, rerun: 64)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) (rerun: 64)
write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x2df89) (async, rerun: 64)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) (async, rerun: 64)
r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xda00) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
write$cgroup_int(r8, &(0x7f0000000200)=0x9100000000000000, 0x43405)
21:51:13 executing program 4:
syz_clone(0x10000200, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:13 executing program 4:
syz_clone(0x11000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:13 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7f, 0xff, 0x6, 0xd3, 0x0, 0xffffffff, 0x184c0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x1b}, 0x8, 0x10001, 0x0, 0x7, 0x8, 0x4, 0x6, 0x0, 0xfffffff8, 0x0, 0x6}, r2, 0xa, 0xffffffffffffffff, 0x3)
21:51:13 executing program 4:
syz_clone(0x1f000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3013.945533][ T3230] FAULT_INJECTION: forcing a failure.
[ 3013.945533][ T3230] name failslab, interval 1, probability 0, space 0, times 0
[ 3013.984317][ T3230] CPU: 0 PID: 3230 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3013.995813][ T3230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3014.005963][ T3230] Call Trace:
[ 3014.009071][ T3230]
[ 3014.011852][ T3230] dump_stack_lvl+0x151/0x1b7
[ 3014.016366][ T3230] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3014.021836][ T3230] ? avc_denied+0x1b0/0x1b0
[ 3014.026256][ T3230] dump_stack+0x15/0x17
[ 3014.030250][ T3230] should_fail+0x3c6/0x510
[ 3014.034677][ T3230] __should_failslab+0xa4/0xe0
[ 3014.039323][ T3230] ? vm_area_dup+0x26/0x230
[ 3014.043618][ T3230] should_failslab+0x9/0x20
[ 3014.047957][ T3230] slab_pre_alloc_hook+0x37/0xd0
[ 3014.052730][ T3230] ? vm_area_dup+0x26/0x230
[ 3014.057073][ T3230] kmem_cache_alloc+0x44/0x200
[ 3014.061690][ T3230] vm_area_dup+0x26/0x230
[ 3014.065851][ T3230] copy_mm+0x9a1/0x13e0
[ 3014.069919][ T3230] ? copy_signal+0x610/0x610
[ 3014.074692][ T3230] ? __init_rwsem+0xd6/0x1c0
[ 3014.079116][ T3230] ? copy_signal+0x4e3/0x610
[ 3014.083540][ T3230] copy_process+0x12bc/0x3260
[ 3014.088057][ T3230] ? proc_fail_nth_write+0x20b/0x290
[ 3014.093176][ T3230] ? fsnotify_perm+0x6a/0x5d0
[ 3014.097793][ T3230] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3014.102735][ T3230] ? vfs_write+0x9ec/0x1110
[ 3014.107079][ T3230] kernel_clone+0x21e/0x9e0
[ 3014.111413][ T3230] ? file_end_write+0x1c0/0x1c0
[ 3014.116102][ T3230] ? create_io_thread+0x1e0/0x1e0
[ 3014.121044][ T3230] ? mutex_unlock+0xb2/0x260
[ 3014.125471][ T3230] ? __mutex_lock_slowpath+0x10/0x10
[ 3014.130592][ T3230] __x64_sys_clone+0x23f/0x290
[ 3014.135196][ T3230] ? __do_sys_vfork+0x130/0x130
[ 3014.140085][ T3230] ? ksys_write+0x260/0x2c0
[ 3014.144415][ T3230] ? debug_smp_processor_id+0x17/0x20
[ 3014.149618][ T3230] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3014.155608][ T3230] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3014.161077][ T3230] do_syscall_64+0x3d/0xb0
[ 3014.165329][ T3230] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3014.171056][ T3230] RIP: 0033:0x7f024b55cae9
[ 3014.175344][ T3230] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
21:51:14 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
mkdirat$cgroup(r2, &(0x7f0000000080)='syz0\x00', 0x1ff)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:14 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7f, 0xff, 0x6, 0xd3, 0x0, 0xffffffff, 0x184c0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x1b}, 0x8, 0x10001, 0x0, 0x7, 0x8, 0x4, 0x6, 0x0, 0xfffffff8, 0x0, 0x6}, r2, 0xa, 0xffffffffffffffff, 0x3)
21:51:14 executing program 4:
syz_clone(0x1ffff000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:14 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0x2, 0xc8, 0x3, 0x0, 0xffffffffffff8001, 0x21000, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x26, 0x7fffffff, 0x5, 0x7, 0x8, 0x9, 0xde3, 0x0, 0x8, 0x0, 0x929}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xc)
socketpair(0x5, 0x4, 0x1f2b9530, &(0x7f0000000140)) (async)
socketpair(0x5, 0x4, 0x1f2b9530, &(0x7f0000000140))
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x7f, 0x2, 0x2, 0x0, 0x20, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x5e19}, 0x810, 0x1, 0x7fffffff, 0x6, 0x7, 0x0, 0x2, 0x0, 0x80, 0x0, 0x9}, r1, 0x2, r3, 0x0)
r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x80, 0x1f, 0x9c, 0x80, 0x0, 0x56, 0x1f220, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xe57, 0x4, @perf_config_ext={0x7fff, 0x1}, 0x0, 0x9, 0xc0d3, 0x7, 0x800, 0x1f, 0x0, 0x0, 0x2, 0x0, 0x4}, r1, 0x0, r2, 0x8)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) (async)
write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r6, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r6, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r6, &(0x7f0000000480)='blkio.throttle.io_serviced\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r6, &(0x7f0000000480)='blkio.throttle.io_serviced\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000380)=0x4) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000380)=0x4)
r7 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000240), 0x10)
r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='kvm_dirty_ring_exit\x00'}, 0x10)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000440)=0x980b)
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x3, 0x1f, 0x6, 0x0, 0x9, 0x80120, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8e0, 0x4, @perf_bp={&(0x7f0000000180), 0x3}, 0x4a10, 0x7ff, 0x5, 0xd, 0x42b, 0x1, 0x2, 0x0, 0x81, 0x0, 0x3}, r0, 0x10, r7, 0x8) (async)
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x3, 0x1f, 0x6, 0x0, 0x9, 0x80120, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8e0, 0x4, @perf_bp={&(0x7f0000000180), 0x3}, 0x4a10, 0x7ff, 0x5, 0xd, 0x42b, 0x1, 0x2, 0x0, 0x81, 0x0, 0x3}, r0, 0x10, r7, 0x8)
[ 3014.195100][ T3230] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3014.203493][ T3230] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3014.211281][ T3230] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3014.219169][ T3230] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3014.227239][ T3230] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3014.235189][ T3230] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3014.243003][ T3230]
21:51:14 executing program 4:
syz_clone(0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:14 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
mkdirat$cgroup(r2, &(0x7f0000000080)='syz0\x00', 0x1ff)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async)
mkdirat$cgroup(r2, &(0x7f0000000080)='syz0\x00', 0x1ff) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
21:51:14 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16)
[ 3014.323529][ T3249] FAULT_INJECTION: forcing a failure.
[ 3014.323529][ T3249] name failslab, interval 1, probability 0, space 0, times 0
[ 3014.359899][ T3249] CPU: 0 PID: 3249 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3014.371392][ T3249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3014.381293][ T3249] Call Trace:
[ 3014.384413][ T3249]
[ 3014.387189][ T3249] dump_stack_lvl+0x151/0x1b7
[ 3014.391718][ T3249] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3014.397179][ T3249] ? avc_denied+0x1b0/0x1b0
[ 3014.401516][ T3249] dump_stack+0x15/0x17
[ 3014.405506][ T3249] should_fail+0x3c6/0x510
[ 3014.409771][ T3249] __should_failslab+0xa4/0xe0
[ 3014.414568][ T3249] ? vm_area_dup+0x26/0x230
[ 3014.418906][ T3249] should_failslab+0x9/0x20
[ 3014.423244][ T3249] slab_pre_alloc_hook+0x37/0xd0
[ 3014.428018][ T3249] ? vm_area_dup+0x26/0x230
[ 3014.432357][ T3249] kmem_cache_alloc+0x44/0x200
[ 3014.436969][ T3249] vm_area_dup+0x26/0x230
[ 3014.441128][ T3249] copy_mm+0x9a1/0x13e0
[ 3014.445124][ T3249] ? copy_signal+0x610/0x610
[ 3014.449546][ T3249] ? __init_rwsem+0xd6/0x1c0
[ 3014.453992][ T3249] ? copy_signal+0x4e3/0x610
[ 3014.458396][ T3249] copy_process+0x12bc/0x3260
[ 3014.462911][ T3249] ? proc_fail_nth_write+0x20b/0x290
[ 3014.468123][ T3249] ? fsnotify_perm+0x6a/0x5d0
[ 3014.472633][ T3249] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3014.477588][ T3249] ? vfs_write+0x9ec/0x1110
[ 3014.481923][ T3249] kernel_clone+0x21e/0x9e0
[ 3014.486269][ T3249] ? file_end_write+0x1c0/0x1c0
[ 3014.490947][ T3249] ? create_io_thread+0x1e0/0x1e0
[ 3014.495802][ T3249] ? mutex_unlock+0xb2/0x260
[ 3014.500232][ T3249] ? __mutex_lock_slowpath+0x10/0x10
[ 3014.505359][ T3249] __x64_sys_clone+0x23f/0x290
[ 3014.509961][ T3249] ? __do_sys_vfork+0x130/0x130
[ 3014.514639][ T3249] ? ksys_write+0x260/0x2c0
[ 3014.518983][ T3249] ? debug_smp_processor_id+0x17/0x20
[ 3014.524188][ T3249] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3014.530097][ T3249] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3014.535558][ T3249] do_syscall_64+0x3d/0xb0
[ 3014.539808][ T3249] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3014.545540][ T3249] RIP: 0033:0x7f024b55cae9
[ 3014.549793][ T3249] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3014.569238][ T3249] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3014.577481][ T3249] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3014.585290][ T3249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3014.593114][ T3249] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3014.600915][ T3249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3014.608725][ T3249] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3014.616546][ T3249]
21:51:14 executing program 5:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000980)={0x1, 0x0}, 0x8)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/98}, 0x20)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x0, 0x8, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/98}, 0x20) (async)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000140)={r4, &(0x7f0000000000), &(0x7f0000000040)=""/98}, 0x20)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000780)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x0, 0x1}, 0x48) (async)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x0, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000640)='GPL\x00', 0x3, 0xbc, &(0x7f00000007c0)=""/188, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5]}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0x5, &(0x7f0000000480)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@map_idx_val={0x18, 0x9, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}]}, &(0x7f0000000640)='GPL\x00', 0x3, 0xbc, &(0x7f00000007c0)=""/188, 0x40f00, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, r5]}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x5, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x1f}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call, @initr0={0x18, 0x0, 0x0, 0x0, 0xa3c8, 0x0, 0x0, 0x0, 0x6}, @call]}, 0x0, 0x2e, 0xbd, &(0x7f00000006c0)=""/189, 0x0, 0x40, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0x3, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000ac0)=[{0x2, 0x4, 0xf}, {0x1, 0x1, 0xb}, {0x2, 0x4, 0x2, 0x2}, {0x1, 0x1, 0x7, 0x7}, {0x2, 0x3, 0xe, 0x3}, {0x3, 0x1, 0x6}], 0x10, 0x2}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x5, 0x9, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x1f}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @call, @initr0={0x18, 0x0, 0x0, 0x0, 0xa3c8, 0x0, 0x0, 0x0, 0x6}, @call]}, 0x0, 0x2e, 0xbd, &(0x7f00000006c0)=""/189, 0x0, 0x40, '\x00', 0x0, 0xc, r2, 0x8, &(0x7f0000000780)={0x0, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0x3, 0x0, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000ac0)=[{0x2, 0x4, 0xf}, {0x1, 0x1, 0xb}, {0x2, 0x4, 0x2, 0x2}, {0x1, 0x1, 0x7, 0x7}, {0x2, 0x3, 0xe, 0x3}, {0x3, 0x1, 0x6}], 0x10, 0x2}, 0x90)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0xc028660f, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x16, 0x0, &(0x7f0000000880), &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x19, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, &(0x7f0000000900)={0x5}, 0x8, 0x10, 0x0, 0x0, r3, 0xffffffffffffffff, 0x0, &(0x7f0000000b80)=[r0, r6]}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x1, &(0x7f00000003c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x7}], &(0x7f0000000400)='syzkaller\x00', 0xfff, 0x96, &(0x7f0000000440)=""/150, 0x41100, 0xc, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x3, 0x9, 0xffc, 0x8e}, 0x10, r3}, 0x80)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x2df89)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff)
write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xda00)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_int(r8, &(0x7f0000000200)=0x9100000000000000, 0x43405) (async)
write$cgroup_int(r8, &(0x7f0000000200)=0x9100000000000000, 0x43405)
21:51:14 executing program 4:
syz_clone(0x242200a0, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:14 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
mkdirat$cgroup(r2, &(0x7f0000000080)='syz0\x00', 0x1ff)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:14 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17)
21:51:14 executing program 4:
syz_clone(0x808402a0, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3014.844329][ T3264] FAULT_INJECTION: forcing a failure.
[ 3014.844329][ T3264] name failslab, interval 1, probability 0, space 0, times 0
[ 3014.863426][ T3264] CPU: 1 PID: 3264 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3014.874892][ T3264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3014.884793][ T3264] Call Trace:
[ 3014.887912][ T3264]
21:51:14 executing program 4:
syz_clone(0xa0002224, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:14 executing program 4:
syz_clone(0xa0028480, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:14 executing program 4:
syz_clone(0xf5ffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3014.890688][ T3264] dump_stack_lvl+0x151/0x1b7
[ 3014.895212][ T3264] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3014.900684][ T3264] dump_stack+0x15/0x17
[ 3014.904661][ T3264] should_fail+0x3c6/0x510
[ 3014.908919][ T3264] __should_failslab+0xa4/0xe0
[ 3014.913599][ T3264] should_failslab+0x9/0x20
[ 3014.917943][ T3264] slab_pre_alloc_hook+0x37/0xd0
[ 3014.922846][ T3264] __kmalloc+0x6d/0x270
[ 3014.926834][ T3264] ? security_prepare_creds+0x4d/0x140
[ 3014.932141][ T3264] security_prepare_creds+0x4d/0x140
[ 3014.937384][ T3264] prepare_creds+0x472/0x6a0
[ 3014.941805][ T3264] copy_creds+0xf0/0x630
[ 3014.945885][ T3264] ? dup_task_struct+0x7e6/0xc60
[ 3014.950752][ T3264] copy_process+0x7c3/0x3260
[ 3014.955438][ T3264] ? __kasan_check_write+0x14/0x20
[ 3014.960377][ T3264] ? proc_fail_nth_write+0x20b/0x290
[ 3014.965603][ T3264] ? selinux_file_permission+0x2c4/0x570
[ 3014.971072][ T3264] ? fsnotify_perm+0x6a/0x5d0
[ 3014.975587][ T3264] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3014.980528][ T3264] ? vfs_write+0x9ec/0x1110
[ 3014.984870][ T3264] kernel_clone+0x21e/0x9e0
[ 3014.989214][ T3264] ? file_end_write+0x1c0/0x1c0
[ 3014.993891][ T3264] ? create_io_thread+0x1e0/0x1e0
[ 3014.998846][ T3264] ? mutex_unlock+0xb2/0x260
[ 3015.003389][ T3264] ? __mutex_lock_slowpath+0x10/0x10
[ 3015.009365][ T3264] __x64_sys_clone+0x23f/0x290
[ 3015.013969][ T3264] ? __do_sys_vfork+0x130/0x130
[ 3015.018751][ T3264] ? ksys_write+0x260/0x2c0
[ 3015.023348][ T3264] ? debug_smp_processor_id+0x17/0x20
[ 3015.028550][ T3264] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3015.034455][ T3264] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3015.039935][ T3264] do_syscall_64+0x3d/0xb0
[ 3015.044178][ T3264] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3015.049912][ T3264] RIP: 0033:0x7f024b55cae9
[ 3015.054426][ T3264] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3015.074385][ T3264] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3015.082625][ T3264] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3015.090445][ T3264] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3015.098332][ T3264] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3015.106231][ T3264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3015.114056][ T3264] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3015.121864][ T3264]
21:51:15 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0) (async)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x80, 0x5, 0x2, 0xc8, 0x3, 0x0, 0xffffffffffff8001, 0x21000, 0x6, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x26, 0x7fffffff, 0x5, 0x7, 0x8, 0x9, 0xde3, 0x0, 0x8, 0x0, 0x929}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0xc)
socketpair(0x5, 0x4, 0x1f2b9530, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x3, 0x7f, 0x2, 0x2, 0x0, 0x20, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x5e19}, 0x810, 0x1, 0x7fffffff, 0x6, 0x7, 0x0, 0x2, 0x0, 0x80, 0x0, 0x9}, r1, 0x2, r3, 0x0) (async)
r4 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x80, 0x1f, 0x9c, 0x80, 0x0, 0x56, 0x1f220, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xe57, 0x4, @perf_config_ext={0x7fff, 0x1}, 0x0, 0x9, 0xc0d3, 0x7, 0x800, 0x1f, 0x0, 0x0, 0x2, 0x0, 0x4}, r1, 0x0, r2, 0x8)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r6, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r6, &(0x7f0000000480)='blkio.throttle.io_serviced\x00', 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000380)=0x4) (async)
r7 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000240), 0x10) (async)
r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='kvm_dirty_ring_exit\x00'}, 0x10)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40082404, &(0x7f0000000440)=0x980b)
perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x9, 0x3, 0x1f, 0x6, 0x0, 0x9, 0x80120, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8e0, 0x4, @perf_bp={&(0x7f0000000180), 0x3}, 0x4a10, 0x7ff, 0x5, 0xd, 0x42b, 0x1, 0x2, 0x0, 0x81, 0x0, 0x3}, r0, 0x10, r7, 0x8)
21:51:15 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18)
21:51:15 executing program 4:
syz_clone(0xfbffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:15 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x3, [@struct={0xa, 0x2, 0x0, 0x4, 0x0, 0xffff, [{0xb, 0x3, 0x10001}, {0x10, 0x4, 0x7}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x5}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}, @struct={0xf, 0x7, 0x0, 0x4, 0x0, 0x80, [{0xb, 0x5, 0x1f}, {0x7, 0x4, 0x1ff}, {0x7, 0x5, 0x20}, {0xe, 0x4, 0x8}, {0xc, 0x0, 0x9}, {0x9, 0x4}, {0xb, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000440)=""/113, 0xbf, 0x71, 0x1, 0x4}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x7, &(0x7f0000000080)=@raw=[@generic={0x3, 0x8, 0x7, 0x20, 0xffff060c}, @call={0x85, 0x0, 0x0, 0x6c}, @ldst={0x0, 0x0, 0x2, 0x0, 0x9, 0x40, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x4, 0x0, 0x8, 0x7, 0x5, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x28}], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0xf1, &(0x7f0000000180)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000340)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0x2, 0x8000, 0x1000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000500)=[r2], &(0x7f0000000540)=[{0x2, 0x1, 0x0, 0x5}, {0x2, 0x5, 0x2, 0x5}, {0x4, 0x3, 0x8, 0x4}, {0x5, 0x1, 0xe, 0x4}, {0x4, 0x2, 0xf, 0x1}, {0x4, 0x3, 0xc, 0x2}], 0x10, 0x8}, 0x90)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000040), 0x12)
[ 3015.431205][ T3292] FAULT_INJECTION: forcing a failure.
[ 3015.431205][ T3292] name failslab, interval 1, probability 0, space 0, times 0
[ 3015.445527][ T3292] CPU: 1 PID: 3292 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3015.457000][ T3292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3015.467365][ T3292] Call Trace:
[ 3015.470499][ T3292]
[ 3015.473514][ T3292] dump_stack_lvl+0x151/0x1b7
[ 3015.478468][ T3292] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3015.484016][ T3292] ? avc_has_perm_noaudit+0x348/0x430
[ 3015.489226][ T3292] dump_stack+0x15/0x17
[ 3015.493220][ T3292] should_fail+0x3c6/0x510
[ 3015.497465][ T3292] __should_failslab+0xa4/0xe0
[ 3015.502066][ T3292] ? dup_fd+0x72/0xb00
[ 3015.505976][ T3292] should_failslab+0x9/0x20
[ 3015.510309][ T3292] slab_pre_alloc_hook+0x37/0xd0
[ 3015.515106][ T3292] ? dup_fd+0x72/0xb00
[ 3015.518994][ T3292] kmem_cache_alloc+0x44/0x200
[ 3015.524122][ T3292] dup_fd+0x72/0xb00
[ 3015.528126][ T3292] ? avc_has_perm+0x16f/0x260
[ 3015.533530][ T3292] ? avc_has_perm_noaudit+0x430/0x430
[ 3015.540029][ T3292] copy_files+0xe6/0x200
[ 3015.544109][ T3292] ? perf_event_attrs+0x30/0x30
[ 3015.548815][ T3292] ? dup_task_struct+0xc60/0xc60
[ 3015.554041][ T3292] ? security_task_alloc+0xf9/0x130
[ 3015.559320][ T3292] copy_process+0x11f3/0x3260
[ 3015.563989][ T3292] ? proc_fail_nth_write+0x20b/0x290
[ 3015.569216][ T3292] ? fsnotify_perm+0x6a/0x5d0
[ 3015.573833][ T3292] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3015.578774][ T3292] ? vfs_write+0x9ec/0x1110
[ 3015.583116][ T3292] kernel_clone+0x21e/0x9e0
[ 3015.587450][ T3292] ? file_end_write+0x1c0/0x1c0
[ 3015.592170][ T3292] ? create_io_thread+0x1e0/0x1e0
[ 3015.597166][ T3292] ? mutex_unlock+0xb2/0x260
[ 3015.601830][ T3292] ? __mutex_lock_slowpath+0x10/0x10
[ 3015.607069][ T3292] __x64_sys_clone+0x23f/0x290
[ 3015.611664][ T3292] ? __do_sys_vfork+0x130/0x130
[ 3015.616432][ T3292] ? ksys_write+0x260/0x2c0
[ 3015.620774][ T3292] ? debug_smp_processor_id+0x17/0x20
[ 3015.625978][ T3292] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3015.632668][ T3292] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3015.638132][ T3292] do_syscall_64+0x3d/0xb0
[ 3015.642417][ T3292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3015.648110][ T3292] RIP: 0033:0x7f024b55cae9
[ 3015.652365][ T3292] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3015.672932][ T3292] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3015.681181][ T3292] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3015.689071][ T3292] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3015.696882][ T3292] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3015.704959][ T3292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3015.714515][ T3292] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3015.722512][ T3292]
21:51:24 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19)
21:51:24 executing program 4:
syz_clone(0xff0f0100, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:24 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async, rerun: 32)
r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async, rerun: 32)
r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x3, [@struct={0xa, 0x2, 0x0, 0x4, 0x0, 0xffff, [{0xb, 0x3, 0x10001}, {0x10, 0x4, 0x7}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x5}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}, @struct={0xf, 0x7, 0x0, 0x4, 0x0, 0x80, [{0xb, 0x5, 0x1f}, {0x7, 0x4, 0x1ff}, {0x7, 0x5, 0x20}, {0xe, 0x4, 0x8}, {0xc, 0x0, 0x9}, {0x9, 0x4}, {0xb, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000440)=""/113, 0xbf, 0x71, 0x1, 0x4}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x7, &(0x7f0000000080)=@raw=[@generic={0x3, 0x8, 0x7, 0x20, 0xffff060c}, @call={0x85, 0x0, 0x0, 0x6c}, @ldst={0x0, 0x0, 0x2, 0x0, 0x9, 0x40, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x4, 0x0, 0x8, 0x7, 0x5, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x28}], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0xf1, &(0x7f0000000180)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000340)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0x2, 0x8000, 0x1000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000500)=[r2], &(0x7f0000000540)=[{0x2, 0x1, 0x0, 0x5}, {0x2, 0x5, 0x2, 0x5}, {0x4, 0x3, 0x8, 0x4}, {0x5, 0x1, 0xe, 0x4}, {0x4, 0x2, 0xf, 0x1}, {0x4, 0x3, 0xc, 0x2}], 0x10, 0x8}, 0x90) (async)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) (async, rerun: 64)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (rerun: 64)
r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000040), 0x12)
21:51:24 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000180)}, 0x20)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3, 0xad, 0x5, 0x8, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10)
r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0), 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000047f00000001000000000000909e1b437dae06e1000000000000000018460000faffffff000000e454d8e29afe581600f500100000000000000000009500000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x400, 0xc7, &(0x7f0000000c80)=""/199, 0x40f00, 0x12, '\x00', r3, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0xd, 0x6}, 0x10, 0x1a2b2, r4, 0x0, &(0x7f0000000b80)=[r7, r5, 0xffffffffffffffff, r6]}, 0x80)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10)
r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f0000001580)={0x6, 0x80, 0x9, 0x6, 0x9, 0x6, 0x0, 0x8, 0x2, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x8000}, 0x1210, 0x7f, 0x8, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x1}, r9, 0xb, 0xffffffffffffffff, 0x5)
bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x19, 0x9, &(0x7f00000024c0)=@raw=[@call={0x85, 0x0, 0x0, 0x63}, @call={0x85, 0x0, 0x0, 0x9b}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x2, 0xf063185b45d5b80c, 0x1, 0xa, 0xd1381e1b304832e9, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @map_fd={0x18, 0xa}, @alu={0x7, 0x0, 0x7, 0x8, 0x4, 0x6, 0x8}], &(0x7f0000002540)='GPL\x00', 0x0, 0x1a, &(0x7f00000026c0)=""/26, 0x41000, 0xe, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000002700)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000002740)={0x1, 0xd, 0x98, 0x3}, 0x10, r8, r9, 0x5, &(0x7f0000002800), &(0x7f0000002840)=[{0x1, 0x4, 0xc, 0x7}, {0x0, 0xffffffff, 0x4, 0x5}, {0x3, 0x2, 0x10, 0x9}, {0x4, 0x1, 0x1}, {0x4, 0x2, 0x8, 0x8}], 0x10, 0xfffffc01}, 0x90)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(r11, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f0000001580)={0x5, 0x80, 0x9, 0x6, 0x9, 0x6, 0x0, 0x8, 0x2, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x7}, 0x1210, 0x7f, 0x200008, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5)
bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x19, 0x9, &(0x7f00000024c0)=@raw=[@call={0x85, 0x0, 0x0, 0x63}, @call={0x85, 0x0, 0x0, 0x9b}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x2, 0xf063185b45d5b80c, 0x1, 0xa, 0xd1381e1b304832e9, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @map_fd={0x18, 0xa}, @alu={0x7, 0x0, 0x7, 0x8, 0x4, 0x6, 0x8}], &(0x7f0000002540)='GPL\x00', 0x0, 0x1a, &(0x7f00000026c0)=""/26, 0x41000, 0xe, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000002700)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000002740)={0x1, 0xd, 0x98, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000002800), &(0x7f0000002840)=[{0x1, 0x4, 0xc, 0x7}, {0x0, 0xffffffff, 0x4, 0x5}, {0x3, 0x2, 0x10, 0x9}, {0x4, 0x1, 0x1}, {0x4, 0x2, 0x8, 0x8}], 0x10, 0xfffffc01}, 0x90)
r12 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r12, &(0x7f0000000180)}, 0x20)
r13 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r13, &(0x7f0000000180)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xf, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000e8920000000000000000020085000000d200000007c3070007000000013eff007300000018130000", @ANYRES32=r0, @ANYBLOB="000000000000000018290000", @ANYRES32, @ANYBLOB="000000000801c3e97cdae6000018130b6ce3d401db2f7efdcde136afc90000", @ANYRES32=r1, @ANYBLOB="000000000000000018130000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8001, 0x1000, &(0x7f0000002a00)=""/4096, 0x41100, 0x23, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x5, 0x0, 0x81}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000540)=[r12, r13], &(0x7f0000000580)=[{0x3, 0x4, 0xc, 0xc}, {0x4, 0x3, 0x4, 0x6}, {0x3, 0x3, 0x0, 0x1}], 0x10, 0x2}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0xa, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000010000000000000007fbffff840000001e00000018200000", @ANYRES32=r0, @ANYBLOB="000000007f00000018290000", @ANYRES32=r1, @ANYBLOB="000000000700000085100000f9ffffffcd5740000000000095000000000000000d99da8ac57d1c442b56a2bff1843784f5e936435da6f15bb26465a9f4a0b2dc9ff09c16c442693ee8d57fe41c31bc5c03d079c58020e01b27cecadc0f20e164f81af81fb33fda9dbff4cfb0a5430b77ad9049e49a6872c6ce59089b0d71011c459f55c7140deeec1fe4f57a9ee46cf61664178ba644c388c2b8afd9e2641122842a95940ffcc283fdd5ae08973cb61e4b"], &(0x7f00000000c0)='GPL\x00', 0x7fffffff, 0x9, &(0x7f0000000100)=""/9, 0x40f00, 0x0, '\x00', r3, 0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xd, 0x7, 0x6}, 0x10, r8, r11, 0x0, 0x0, 0x0, 0x10, 0xa0}, 0x90)
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:51:24 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
mkdirat$cgroup(r4, &(0x7f0000000180)='syz1\x00', 0x1ff)
r5 = openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0)
write$cgroup_freezer_state(r5, &(0x7f0000000100)='FREEZING\x00', 0x9)
21:51:24 executing program 4:
syz_clone(0xfffffff5, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:24 executing program 4:
syz_clone(0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3024.597144][ T3312] FAULT_INJECTION: forcing a failure.
[ 3024.597144][ T3312] name failslab, interval 1, probability 0, space 0, times 0
[ 3024.618660][ T3312] CPU: 1 PID: 3312 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3024.630132][ T3312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3024.640418][ T3312] Call Trace:
[ 3024.643533][ T3312]
21:51:24 executing program 4:
syz_clone(0x1b0d41f000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:24 executing program 4:
syz_clone(0x2a1f7355f000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:24 executing program 4:
syz_clone(0x553a2637b000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3024.646314][ T3312] dump_stack_lvl+0x151/0x1b7
[ 3024.650826][ T3312] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3024.656294][ T3312] ? __kasan_kmalloc+0x9/0x10
[ 3024.660811][ T3312] ? alloc_fdtable+0xaf/0x2a0
[ 3024.665327][ T3312] ? dup_fd+0x759/0xb00
[ 3024.669327][ T3312] ? copy_files+0xe6/0x200
[ 3024.673565][ T3312] ? kernel_clone+0x21e/0x9e0
[ 3024.678077][ T3312] ? __x64_sys_clone+0x23f/0x290
[ 3024.682851][ T3312] ? do_syscall_64+0x3d/0xb0
[ 3024.687278][ T3312] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3024.693186][ T3312] dump_stack+0x15/0x17
21:51:24 executing program 4:
syz_clone(0x2001000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:24 executing program 4:
syz_clone(0x2020000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3024.697178][ T3312] should_fail+0x3c6/0x510
[ 3024.701615][ T3312] __should_failslab+0xa4/0xe0
[ 3024.706215][ T3312] should_failslab+0x9/0x20
[ 3024.710542][ T3312] slab_pre_alloc_hook+0x37/0xd0
[ 3024.715317][ T3312] __kmalloc+0x6d/0x270
[ 3024.719309][ T3312] ? kvmalloc_node+0x1f0/0x4d0
[ 3024.723907][ T3312] kvmalloc_node+0x1f0/0x4d0
[ 3024.728335][ T3312] ? vm_mmap+0xb0/0xb0
[ 3024.732247][ T3312] ? __kasan_kmalloc+0x9/0x10
[ 3024.736753][ T3312] ? kmem_cache_alloc_trace+0x115/0x210
[ 3024.742220][ T3312] ? alloc_fdtable+0xaf/0x2a0
[ 3024.746755][ T3312] alloc_fdtable+0xeb/0x2a0
[ 3024.751074][ T3312] dup_fd+0x759/0xb00
[ 3024.754898][ T3312] ? avc_has_perm+0x16f/0x260
[ 3024.759420][ T3312] copy_files+0xe6/0x200
[ 3024.763511][ T3312] ? perf_event_attrs+0x30/0x30
[ 3024.768171][ T3312] ? dup_task_struct+0xc60/0xc60
[ 3024.772941][ T3312] ? security_task_alloc+0xf9/0x130
[ 3024.777980][ T3312] copy_process+0x11f3/0x3260
[ 3024.782497][ T3312] ? proc_fail_nth_write+0x20b/0x290
[ 3024.787611][ T3312] ? fsnotify_perm+0x6a/0x5d0
[ 3024.792126][ T3312] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3024.797071][ T3312] ? vfs_write+0x9ec/0x1110
[ 3024.801414][ T3312] kernel_clone+0x21e/0x9e0
[ 3024.805752][ T3312] ? file_end_write+0x1c0/0x1c0
[ 3024.810438][ T3312] ? create_io_thread+0x1e0/0x1e0
[ 3024.815406][ T3312] ? mutex_unlock+0xb2/0x260
[ 3024.819822][ T3312] ? __mutex_lock_slowpath+0x10/0x10
[ 3024.824944][ T3312] __x64_sys_clone+0x23f/0x290
[ 3024.829539][ T3312] ? __do_sys_vfork+0x130/0x130
[ 3024.834250][ T3312] ? ksys_write+0x260/0x2c0
[ 3024.838562][ T3312] ? debug_smp_processor_id+0x17/0x20
[ 3024.843769][ T3312] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3024.849672][ T3312] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3024.855143][ T3312] do_syscall_64+0x3d/0xb0
[ 3024.859392][ T3312] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3024.865122][ T3312] RIP: 0033:0x7f024b55cae9
[ 3024.869375][ T3312] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3024.888826][ T3312] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:51:25 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20)
21:51:25 executing program 4:
syz_clone(0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3024.897061][ T3312] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3024.904879][ T3312] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3024.912686][ T3312] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3024.920498][ T3312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3024.928394][ T3312] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3024.936214][ T3312]
[ 3024.979835][ T3347] FAULT_INJECTION: forcing a failure.
[ 3024.979835][ T3347] name failslab, interval 1, probability 0, space 0, times 0
[ 3025.012016][ T3347] CPU: 1 PID: 3347 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3025.023485][ T3347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3025.033384][ T3347] Call Trace:
[ 3025.036502][ T3347]
[ 3025.039281][ T3347] dump_stack_lvl+0x151/0x1b7
[ 3025.043795][ T3347] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3025.049436][ T3347] dump_stack+0x15/0x17
[ 3025.053427][ T3347] should_fail+0x3c6/0x510
[ 3025.057683][ T3347] __should_failslab+0xa4/0xe0
[ 3025.062476][ T3347] ? anon_vma_clone+0x9a/0x500
[ 3025.067052][ T3347] should_failslab+0x9/0x20
[ 3025.071396][ T3347] slab_pre_alloc_hook+0x37/0xd0
[ 3025.076171][ T3347] ? anon_vma_clone+0x9a/0x500
[ 3025.080768][ T3347] kmem_cache_alloc+0x44/0x200
[ 3025.085478][ T3347] anon_vma_clone+0x9a/0x500
[ 3025.089881][ T3347] anon_vma_fork+0x91/0x4e0
[ 3025.094218][ T3347] ? anon_vma_name+0x4c/0x70
[ 3025.098651][ T3347] ? vm_area_dup+0x17a/0x230
[ 3025.103068][ T3347] copy_mm+0xa3a/0x13e0
[ 3025.107064][ T3347] ? copy_signal+0x610/0x610
[ 3025.111625][ T3347] ? __init_rwsem+0xd6/0x1c0
[ 3025.116042][ T3347] ? copy_signal+0x4e3/0x610
[ 3025.120705][ T3347] copy_process+0x12bc/0x3260
[ 3025.125216][ T3347] ? proc_fail_nth_write+0x20b/0x290
[ 3025.130337][ T3347] ? fsnotify_perm+0x6a/0x5d0
[ 3025.134848][ T3347] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3025.140241][ T3347] ? vfs_write+0x9ec/0x1110
[ 3025.144586][ T3347] kernel_clone+0x21e/0x9e0
[ 3025.148915][ T3347] ? file_end_write+0x1c0/0x1c0
[ 3025.153857][ T3347] ? create_io_thread+0x1e0/0x1e0
[ 3025.158755][ T3347] ? mutex_unlock+0xb2/0x260
[ 3025.163243][ T3347] ? __mutex_lock_slowpath+0x10/0x10
[ 3025.168354][ T3347] __x64_sys_clone+0x23f/0x290
[ 3025.172954][ T3347] ? __do_sys_vfork+0x130/0x130
[ 3025.177659][ T3347] ? ksys_write+0x260/0x2c0
[ 3025.182016][ T3347] ? debug_smp_processor_id+0x17/0x20
[ 3025.187201][ T3347] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3025.193087][ T3347] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3025.198557][ T3347] do_syscall_64+0x3d/0xb0
[ 3025.203692][ T3347] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3025.209405][ T3347] RIP: 0033:0x7f024b55cae9
[ 3025.213660][ T3347] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3025.233289][ T3347] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3025.241706][ T3347] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3025.249601][ T3347] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3025.257422][ T3347] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3025.265225][ T3347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3025.273561][ T3347] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3025.281374][ T3347]
21:51:25 executing program 0:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x3, [@struct={0xa, 0x2, 0x0, 0x4, 0x0, 0xffff, [{0xb, 0x3, 0x10001}, {0x10, 0x4, 0x7}]}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xf, 0x5}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x3}, @struct={0xf, 0x7, 0x0, 0x4, 0x0, 0x80, [{0xb, 0x5, 0x1f}, {0x7, 0x4, 0x1ff}, {0x7, 0x5, 0x20}, {0xe, 0x4, 0x8}, {0xc, 0x0, 0x9}, {0x9, 0x4}, {0xb, 0x5}]}]}, {0x0, [0x0]}}, &(0x7f0000000440)=""/113, 0xbf, 0x71, 0x1, 0x4}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x7, &(0x7f0000000080)=@raw=[@generic={0x3, 0x8, 0x7, 0x20, 0xffff060c}, @call={0x85, 0x0, 0x0, 0x6c}, @ldst={0x0, 0x0, 0x2, 0x0, 0x9, 0x40, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @alu={0x4, 0x0, 0x8, 0x7, 0x5, 0xc, 0xfffffffffffffffc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x28}], &(0x7f00000000c0)='syzkaller\x00', 0x9, 0xf1, &(0x7f0000000180)=""/241, 0x40f00, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000340)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0x2, 0x8000, 0x1000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000500)=[r2], &(0x7f0000000540)=[{0x2, 0x1, 0x0, 0x5}, {0x2, 0x5, 0x2, 0x5}, {0x4, 0x3, 0x8, 0x4}, {0x5, 0x1, 0xe, 0x4}, {0x4, 0x2, 0xf, 0x1}, {0x4, 0x3, 0xc, 0x2}], 0x10, 0x8}, 0x90) (async)
ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) (async, rerun: 32)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (rerun: 32)
r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000040), 0x12)
21:51:25 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000180)}, 0x20) (async)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) (async)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3, 0xad, 0x5, 0x8, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10)
r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180)) (async)
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0), 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000047f00000001000000000000909e1b437dae06e1000000000000000018460000faffffff000000e454d8e29afe581600f500100000000000000000009500000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x400, 0xc7, &(0x7f0000000c80)=""/199, 0x40f00, 0x12, '\x00', r3, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0xd, 0x6}, 0x10, 0x1a2b2, r4, 0x0, &(0x7f0000000b80)=[r7, r5, 0xffffffffffffffff, r6]}, 0x80) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) (async)
r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f0000001580)={0x6, 0x80, 0x9, 0x6, 0x9, 0x6, 0x0, 0x8, 0x2, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x8000}, 0x1210, 0x7f, 0x8, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x1}, r9, 0xb, 0xffffffffffffffff, 0x5) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x19, 0x9, &(0x7f00000024c0)=@raw=[@call={0x85, 0x0, 0x0, 0x63}, @call={0x85, 0x0, 0x0, 0x9b}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x2, 0xf063185b45d5b80c, 0x1, 0xa, 0xd1381e1b304832e9, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @map_fd={0x18, 0xa}, @alu={0x7, 0x0, 0x7, 0x8, 0x4, 0x6, 0x8}], &(0x7f0000002540)='GPL\x00', 0x0, 0x1a, &(0x7f00000026c0)=""/26, 0x41000, 0xe, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000002700)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000002740)={0x1, 0xd, 0x98, 0x3}, 0x10, r8, r9, 0x5, &(0x7f0000002800), &(0x7f0000002840)=[{0x1, 0x4, 0xc, 0x7}, {0x0, 0xffffffff, 0x4, 0x5}, {0x3, 0x2, 0x10, 0x9}, {0x4, 0x1, 0x1}, {0x4, 0x2, 0x8, 0x8}], 0x10, 0xfffffc01}, 0x90) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) (async)
openat$cgroup_ro(r11, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
perf_event_open$cgroup(&(0x7f0000001580)={0x5, 0x80, 0x9, 0x6, 0x9, 0x6, 0x0, 0x8, 0x2, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x7}, 0x1210, 0x7f, 0x200008, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x19, 0x9, &(0x7f00000024c0)=@raw=[@call={0x85, 0x0, 0x0, 0x63}, @call={0x85, 0x0, 0x0, 0x9b}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x2, 0xf063185b45d5b80c, 0x1, 0xa, 0xd1381e1b304832e9, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @map_fd={0x18, 0xa}, @alu={0x7, 0x0, 0x7, 0x8, 0x4, 0x6, 0x8}], &(0x7f0000002540)='GPL\x00', 0x0, 0x1a, &(0x7f00000026c0)=""/26, 0x41000, 0xe, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000002700)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000002740)={0x1, 0xd, 0x98, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000002800), &(0x7f0000002840)=[{0x1, 0x4, 0xc, 0x7}, {0x0, 0xffffffff, 0x4, 0x5}, {0x3, 0x2, 0x10, 0x9}, {0x4, 0x1, 0x1}, {0x4, 0x2, 0x8, 0x8}], 0x10, 0xfffffc01}, 0x90)
r12 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r12, &(0x7f0000000180)}, 0x20)
r13 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r13, &(0x7f0000000180)}, 0x20) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xf, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000e8920000000000000000020085000000d200000007c3070007000000013eff007300000018130000", @ANYRES32=r0, @ANYBLOB="000000000000000018290000", @ANYRES32, @ANYBLOB="000000000801c3e97cdae6000018130b6ce3d401db2f7efdcde136afc90000", @ANYRES32=r1, @ANYBLOB="000000000000000018130000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8001, 0x1000, &(0x7f0000002a00)=""/4096, 0x41100, 0x23, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x5, 0x0, 0x81}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000540)=[r12, r13], &(0x7f0000000580)=[{0x3, 0x4, 0xc, 0xc}, {0x4, 0x3, 0x4, 0x6}, {0x3, 0x3, 0x0, 0x1}], 0x10, 0x2}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0xa, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000010000000000000007fbffff840000001e00000018200000", @ANYRES32=r0, @ANYBLOB="000000007f00000018290000", @ANYRES32=r1, @ANYBLOB="000000000700000085100000f9ffffffcd5740000000000095000000000000000d99da8ac57d1c442b56a2bff1843784f5e936435da6f15bb26465a9f4a0b2dc9ff09c16c442693ee8d57fe41c31bc5c03d079c58020e01b27cecadc0f20e164f81af81fb33fda9dbff4cfb0a5430b77ad9049e49a6872c6ce59089b0d71011c459f55c7140deeec1fe4f57a9ee46cf61664178ba644c388c2b8afd9e2641122842a95940ffcc283fdd5ae08973cb61e4b"], &(0x7f00000000c0)='GPL\x00', 0x7fffffff, 0x9, &(0x7f0000000100)=""/9, 0x40f00, 0x0, '\x00', r3, 0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xd, 0x7, 0x6}, 0x10, r8, r11, 0x0, 0x0, 0x0, 0x10, 0xa0}, 0x90)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:51:25 executing program 4:
syz_clone(0x10100000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:25 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21)
21:51:25 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) (async)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12) (async)
openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
mkdirat$cgroup(r4, &(0x7f0000000180)='syz1\x00', 0x1ff) (async)
r5 = openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0)
write$cgroup_freezer_state(r5, &(0x7f0000000100)='FREEZING\x00', 0x9)
21:51:25 executing program 4:
syz_clone(0x70000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:25 executing program 4:
syz_clone(0xb037263a550000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:25 executing program 4:
syz_clone(0xf0410d1b000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:25 executing program 4:
syz_clone(0xf055731f2a0000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3025.467890][ T3359] FAULT_INJECTION: forcing a failure.
[ 3025.467890][ T3359] name failslab, interval 1, probability 0, space 0, times 0
[ 3025.481175][ T3359] CPU: 0 PID: 3359 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3025.492847][ T3359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3025.503450][ T3359] Call Trace:
[ 3025.506584][ T3359]
[ 3025.509337][ T3359] dump_stack_lvl+0x151/0x1b7
[ 3025.513941][ T3359] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3025.519408][ T3359] dump_stack+0x15/0x17
[ 3025.523504][ T3359] should_fail+0x3c6/0x510
[ 3025.527779][ T3359] __should_failslab+0xa4/0xe0
[ 3025.532361][ T3359] should_failslab+0x9/0x20
[ 3025.536686][ T3359] slab_pre_alloc_hook+0x37/0xd0
[ 3025.541464][ T3359] __kmalloc+0x6d/0x270
[ 3025.545453][ T3359] ? kvmalloc_node+0x1f0/0x4d0
[ 3025.550062][ T3359] kvmalloc_node+0x1f0/0x4d0
[ 3025.554667][ T3359] ? vm_mmap+0xb0/0xb0
[ 3025.558587][ T3359] ? __kasan_kmalloc+0x9/0x10
[ 3025.563165][ T3359] ? kmem_cache_alloc_trace+0x115/0x210
[ 3025.568627][ T3359] ? alloc_fdtable+0xaf/0x2a0
[ 3025.573250][ T3359] alloc_fdtable+0x163/0x2a0
[ 3025.577676][ T3359] dup_fd+0x759/0xb00
[ 3025.581491][ T3359] ? avc_has_perm+0x16f/0x260
[ 3025.586450][ T3359] copy_files+0xe6/0x200
[ 3025.590522][ T3359] ? perf_event_attrs+0x30/0x30
[ 3025.595207][ T3359] ? dup_task_struct+0xc60/0xc60
[ 3025.599988][ T3359] ? security_task_alloc+0xf9/0x130
[ 3025.605196][ T3359] copy_process+0x11f3/0x3260
[ 3025.609740][ T3359] ? proc_fail_nth_write+0x20b/0x290
[ 3025.614825][ T3359] ? fsnotify_perm+0x6a/0x5d0
[ 3025.619396][ T3359] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3025.624288][ T3359] ? vfs_write+0x9ec/0x1110
[ 3025.628712][ T3359] kernel_clone+0x21e/0x9e0
[ 3025.633066][ T3359] ? file_end_write+0x1c0/0x1c0
[ 3025.637743][ T3359] ? create_io_thread+0x1e0/0x1e0
[ 3025.642611][ T3359] ? mutex_unlock+0xb2/0x260
[ 3025.647700][ T3359] ? __mutex_lock_slowpath+0x10/0x10
[ 3025.655195][ T3359] __x64_sys_clone+0x23f/0x290
[ 3025.661554][ T3359] ? __do_sys_vfork+0x130/0x130
[ 3025.666452][ T3359] ? ksys_write+0x260/0x2c0
[ 3025.670961][ T3359] ? debug_smp_processor_id+0x17/0x20
[ 3025.677309][ T3359] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3025.685025][ T3359] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3025.690637][ T3359] do_syscall_64+0x3d/0xb0
[ 3025.694886][ T3359] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3025.700745][ T3359] RIP: 0033:0x7f024b55cae9
[ 3025.705113][ T3359] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3025.724556][ T3359] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3025.733252][ T3359] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3025.741065][ T3359] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3025.748876][ T3359] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3025.756684][ T3359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:51:25 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22)
21:51:25 executing program 4:
syz_clone(0xf0ff1f00000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:25 executing program 4:
syz_clone(0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3025.764493][ T3359] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3025.772316][ T3359]
[ 3025.793553][ T3383] FAULT_INJECTION: forcing a failure.
[ 3025.793553][ T3383] name failslab, interval 1, probability 0, space 0, times 0
[ 3025.806577][ T3383] CPU: 0 PID: 3383 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3025.818480][ T3383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3025.828370][ T3383] Call Trace:
[ 3025.831613][ T3383]
[ 3025.834485][ T3383] dump_stack_lvl+0x151/0x1b7
[ 3025.838999][ T3383] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3025.844603][ T3383] dump_stack+0x15/0x17
[ 3025.848568][ T3383] should_fail+0x3c6/0x510
[ 3025.852827][ T3383] __should_failslab+0xa4/0xe0
[ 3025.857425][ T3383] ? anon_vma_fork+0xf7/0x4e0
[ 3025.861948][ T3383] should_failslab+0x9/0x20
[ 3025.866363][ T3383] slab_pre_alloc_hook+0x37/0xd0
[ 3025.871162][ T3383] ? anon_vma_fork+0xf7/0x4e0
[ 3025.875651][ T3383] kmem_cache_alloc+0x44/0x200
[ 3025.880253][ T3383] anon_vma_fork+0xf7/0x4e0
[ 3025.884641][ T3383] ? anon_vma_name+0x4c/0x70
[ 3025.889018][ T3383] ? vm_area_dup+0x17a/0x230
[ 3025.893442][ T3383] copy_mm+0xa3a/0x13e0
[ 3025.897443][ T3383] ? copy_signal+0x610/0x610
[ 3025.901869][ T3383] ? __init_rwsem+0xd6/0x1c0
[ 3025.906292][ T3383] ? copy_signal+0x4e3/0x610
[ 3025.910716][ T3383] copy_process+0x12bc/0x3260
[ 3025.915237][ T3383] ? proc_fail_nth_write+0x20b/0x290
[ 3025.920348][ T3383] ? fsnotify_perm+0x6a/0x5d0
[ 3025.924861][ T3383] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3025.929836][ T3383] ? vfs_write+0x9ec/0x1110
[ 3025.934253][ T3383] kernel_clone+0x21e/0x9e0
[ 3025.938575][ T3383] ? file_end_write+0x1c0/0x1c0
[ 3025.943263][ T3383] ? create_io_thread+0x1e0/0x1e0
[ 3025.948119][ T3383] ? mutex_unlock+0xb2/0x260
[ 3025.952547][ T3383] ? __mutex_lock_slowpath+0x10/0x10
[ 3025.958308][ T3383] __x64_sys_clone+0x23f/0x290
[ 3025.963179][ T3383] ? __do_sys_vfork+0x130/0x130
[ 3025.967873][ T3383] ? ksys_write+0x260/0x2c0
[ 3025.972210][ T3383] ? debug_smp_processor_id+0x17/0x20
[ 3025.977409][ T3383] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3025.983310][ T3383] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3025.988784][ T3383] do_syscall_64+0x3d/0xb0
[ 3025.993028][ T3383] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3025.998933][ T3383] RIP: 0033:0x7f024b55cae9
[ 3026.003192][ T3383] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3026.023049][ T3383] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3026.031561][ T3383] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3026.039375][ T3383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3026.047179][ T3383] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3026.054989][ T3383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3026.062930][ T3383] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3026.070743][ T3383]
21:51:26 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:26 executing program 2:
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000180)}, 0x20)
r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) (async)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3, 0xad, 0x5, 0x8, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r2, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async)
r5 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180)) (async)
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0), 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000047f00000001000000000000909e1b437dae06e1000000000000000018460000faffffff000000e454d8e29afe581600f500100000000000000000009500000000000000"], &(0x7f0000000440)='syzkaller\x00', 0x400, 0xc7, &(0x7f0000000c80)=""/199, 0x40f00, 0x12, '\x00', r3, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0xd, 0x6}, 0x10, 0x1a2b2, r4, 0x0, &(0x7f0000000b80)=[r7, r5, 0xffffffffffffffff, r6]}, 0x80) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f0000000200)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000240), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) (async)
r9 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f0000001580)={0x6, 0x80, 0x9, 0x6, 0x9, 0x6, 0x0, 0x8, 0x2, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x8000}, 0x1210, 0x7f, 0x8, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x1}, r9, 0xb, 0xffffffffffffffff, 0x5) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x19, 0x9, &(0x7f00000024c0)=@raw=[@call={0x85, 0x0, 0x0, 0x63}, @call={0x85, 0x0, 0x0, 0x9b}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x2, 0xf063185b45d5b80c, 0x1, 0xa, 0xd1381e1b304832e9, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @map_fd={0x18, 0xa}, @alu={0x7, 0x0, 0x7, 0x8, 0x4, 0x6, 0x8}], &(0x7f0000002540)='GPL\x00', 0x0, 0x1a, &(0x7f00000026c0)=""/26, 0x41000, 0xe, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000002700)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000002740)={0x1, 0xd, 0x98, 0x3}, 0x10, r8, r9, 0x5, &(0x7f0000002800), &(0x7f0000002840)=[{0x1, 0x4, 0xc, 0x7}, {0x0, 0xffffffff, 0x4, 0x5}, {0x3, 0x2, 0x10, 0x9}, {0x4, 0x1, 0x1}, {0x4, 0x2, 0x8, 0x8}], 0x10, 0xfffffc01}, 0x90) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(r11, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
perf_event_open$cgroup(&(0x7f0000001580)={0x5, 0x80, 0x9, 0x6, 0x9, 0x6, 0x0, 0x8, 0x2, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x7}, 0x1210, 0x7f, 0x200008, 0x0, 0x100000000, 0x2, 0x0, 0x0, 0x3ff, 0x0, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x5) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000028c0)={0x19, 0x9, &(0x7f00000024c0)=@raw=[@call={0x85, 0x0, 0x0, 0x63}, @call={0x85, 0x0, 0x0, 0x9b}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @ldst={0x0, 0x2, 0xf063185b45d5b80c, 0x1, 0xa, 0xd1381e1b304832e9, 0x8}, @map_val={0x18, 0x6, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1000}, @map_fd={0x18, 0xa}, @alu={0x7, 0x0, 0x7, 0x8, 0x4, 0x6, 0x8}], &(0x7f0000002540)='GPL\x00', 0x0, 0x1a, &(0x7f00000026c0)=""/26, 0x41000, 0xe, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000002700)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000002740)={0x1, 0xd, 0x98, 0x3}, 0x10, 0x0, 0xffffffffffffffff, 0x5, &(0x7f0000002800), &(0x7f0000002840)=[{0x1, 0x4, 0xc, 0x7}, {0x0, 0xffffffff, 0x4, 0x5}, {0x3, 0x2, 0x10, 0x9}, {0x4, 0x1, 0x1}, {0x4, 0x2, 0x8, 0x8}], 0x10, 0xfffffc01}, 0x90)
r12 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r12, &(0x7f0000000180)}, 0x20)
r13 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r13, &(0x7f0000000180)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xf, 0xe, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000e8920000000000000000020085000000d200000007c3070007000000013eff007300000018130000", @ANYRES32=r0, @ANYBLOB="000000000000000018290000", @ANYRES32, @ANYBLOB="000000000801c3e97cdae6000018130b6ce3d401db2f7efdcde136afc90000", @ANYRES32=r1, @ANYBLOB="000000000000000018130000", @ANYRES32=r0, @ANYBLOB="00000000000000009500000000000000"], &(0x7f0000000280)='syzkaller\x00', 0x8001, 0x1000, &(0x7f0000002a00)=""/4096, 0x41100, 0x23, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x3, 0x5, 0x0, 0x81}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f0000000540)=[r12, r13], &(0x7f0000000580)=[{0x3, 0x4, 0xc, 0xc}, {0x4, 0x3, 0x4, 0x6}, {0x3, 0x3, 0x0, 0x1}], 0x10, 0x2}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1, 0xa, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000010000000000000007fbffff840000001e00000018200000", @ANYRES32=r0, @ANYBLOB="000000007f00000018290000", @ANYRES32=r1, @ANYBLOB="000000000700000085100000f9ffffffcd5740000000000095000000000000000d99da8ac57d1c442b56a2bff1843784f5e936435da6f15bb26465a9f4a0b2dc9ff09c16c442693ee8d57fe41c31bc5c03d079c58020e01b27cecadc0f20e164f81af81fb33fda9dbff4cfb0a5430b77ad9049e49a6872c6ce59089b0d71011c459f55c7140deeec1fe4f57a9ee46cf61664178ba644c388c2b8afd9e2641122842a95940ffcc283fdd5ae08973cb61e4b"], &(0x7f00000000c0)='GPL\x00', 0x7fffffff, 0x9, &(0x7f0000000100)=""/9, 0x40f00, 0x0, '\x00', r3, 0x30, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x2, 0xd, 0x7, 0x6}, 0x10, r8, r11, 0x0, 0x0, 0x0, 0x10, 0xa0}, 0x90)
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:51:26 executing program 4:
syz_clone(0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:26 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23)
21:51:26 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0) (async)
r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_merged_recursive\x00', 0x0, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
openat$cgroup_freezer_state(r1, &(0x7f0000000080), 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
mkdirat$cgroup(r4, &(0x7f0000000180)='syz1\x00', 0x1ff) (async)
mkdirat$cgroup(r4, &(0x7f0000000180)='syz1\x00', 0x1ff)
r5 = openat$cgroup_freezer_state(r0, &(0x7f00000000c0), 0x2, 0x0)
write$cgroup_freezer_state(r5, &(0x7f0000000100)='FREEZING\x00', 0x9) (async)
write$cgroup_freezer_state(r5, &(0x7f0000000100)='FREEZING\x00', 0x9)
21:51:27 executing program 5:
syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240))
21:51:27 executing program 4:
syz_clone(0x700000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:27 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
[ 3027.431179][ T3398] FAULT_INJECTION: forcing a failure.
[ 3027.431179][ T3398] name failslab, interval 1, probability 0, space 0, times 0
[ 3027.458347][ T3398] CPU: 1 PID: 3398 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3027.469813][ T3398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
21:51:27 executing program 4:
syz_clone(0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:27 executing program 4:
syz_clone(0x900000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3027.479717][ T3398] Call Trace:
[ 3027.482829][ T3398]
[ 3027.485606][ T3398] dump_stack_lvl+0x151/0x1b7
[ 3027.490126][ T3398] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3027.495591][ T3398] dump_stack+0x15/0x17
[ 3027.499580][ T3398] should_fail+0x3c6/0x510
[ 3027.503844][ T3398] __should_failslab+0xa4/0xe0
[ 3027.508435][ T3398] ? copy_sighand+0x54/0x250
[ 3027.512899][ T3398] should_failslab+0x9/0x20
[ 3027.517201][ T3398] slab_pre_alloc_hook+0x37/0xd0
[ 3027.521976][ T3398] ? copy_sighand+0x54/0x250
[ 3027.526401][ T3398] kmem_cache_alloc+0x44/0x200
21:51:27 executing program 4:
syz_clone(0x1100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:27 executing program 4:
syz_clone(0x1f00000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:27 executing program 4:
syz_clone(0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3027.531003][ T3398] copy_sighand+0x54/0x250
[ 3027.535254][ T3398] copy_process+0x1249/0x3260
[ 3027.539769][ T3398] ? proc_fail_nth_write+0x20b/0x290
[ 3027.544888][ T3398] ? fsnotify_perm+0x6a/0x5d0
[ 3027.549438][ T3398] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3027.554348][ T3398] ? vfs_write+0x9ec/0x1110
[ 3027.558692][ T3398] kernel_clone+0x21e/0x9e0
[ 3027.563032][ T3398] ? file_end_write+0x1c0/0x1c0
[ 3027.567719][ T3398] ? create_io_thread+0x1e0/0x1e0
[ 3027.572576][ T3398] ? mutex_unlock+0xb2/0x260
[ 3027.577004][ T3398] ? __mutex_lock_slowpath+0x10/0x10
[ 3027.582213][ T3398] __x64_sys_clone+0x23f/0x290
[ 3027.586812][ T3398] ? __do_sys_vfork+0x130/0x130
[ 3027.591495][ T3398] ? ksys_write+0x260/0x2c0
[ 3027.595835][ T3398] ? debug_smp_processor_id+0x17/0x20
[ 3027.601045][ T3398] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3027.606943][ T3398] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3027.612415][ T3398] do_syscall_64+0x3d/0xb0
[ 3027.616664][ T3398] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3027.622486][ T3398] RIP: 0033:0x7f024b55cae9
[ 3027.626729][ T3398] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3027.646435][ T3398] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3027.654764][ T3398] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3027.662580][ T3398] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3027.670391][ T3398] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3027.678298][ T3398] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3027.686105][ T3398] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3027.693928][ T3398]
21:51:28 executing program 2:
socketpair(0x1f, 0x1, 0x0, 0x0)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x5, 0xeb, 0x9, 0x6, 0x0, 0x40, 0x305, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7170d901, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x80000, 0x8, 0x645, 0x5, 0x2, 0x9, 0x654, 0x0, 0x9, 0x0, 0x4}, r0, 0xd, 0xffffffffffffffff, 0xb)
socketpair(0x2a, 0x1, 0x800, &(0x7f0000000200))
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xf8, 0x39, 0x6, 0x9, 0x0, 0x5, 0xa0, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0x20}, 0x100, 0xf81, 0x11a5, 0x4, 0x100, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8001}, r1, 0x10, r2, 0x8)
socketpair(0x1d, 0x2, 0x9, &(0x7f0000000000))
21:51:28 executing program 4:
syz_clone(0x242200a0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:28 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) (async)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:28 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:28 executing program 5:
syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240))
21:51:28 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24)
21:51:28 executing program 4:
syz_clone(0x808402a0ffffffff, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:28 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
[ 3028.278927][ T3445] FAULT_INJECTION: forcing a failure.
[ 3028.278927][ T3445] name failslab, interval 1, probability 0, space 0, times 0
21:51:28 executing program 4:
syz_clone(0xf5ffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:28 executing program 4:
syz_clone(0xfbffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:28 executing program 4:
syz_clone(0xff0f010000000000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3028.318660][ T3445] CPU: 1 PID: 3445 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3028.330128][ T3445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3028.341409][ T3445] Call Trace:
[ 3028.344536][ T3445]
[ 3028.347314][ T3445] dump_stack_lvl+0x151/0x1b7
[ 3028.351826][ T3445] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3028.357304][ T3445] dump_stack+0x15/0x17
[ 3028.361545][ T3445] should_fail+0x3c6/0x510
[ 3028.365808][ T3445] __should_failslab+0xa4/0xe0
[ 3028.370491][ T3445] ? copy_signal+0x55/0x610
[ 3028.374829][ T3445] should_failslab+0x9/0x20
21:51:28 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
[ 3028.379164][ T3445] slab_pre_alloc_hook+0x37/0xd0
[ 3028.383946][ T3445] ? copy_signal+0x55/0x610
[ 3028.388281][ T3445] kmem_cache_alloc+0x44/0x200
[ 3028.392879][ T3445] copy_signal+0x55/0x610
[ 3028.397135][ T3445] copy_process+0x1274/0x3260
[ 3028.401649][ T3445] ? proc_fail_nth_write+0x20b/0x290
[ 3028.406768][ T3445] ? fsnotify_perm+0x6a/0x5d0
[ 3028.411289][ T3445] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3028.416232][ T3445] ? vfs_write+0x9ec/0x1110
[ 3028.420654][ T3445] kernel_clone+0x21e/0x9e0
[ 3028.424992][ T3445] ? file_end_write+0x1c0/0x1c0
[ 3028.429770][ T3445] ? create_io_thread+0x1e0/0x1e0
[ 3028.434620][ T3445] ? mutex_unlock+0xb2/0x260
[ 3028.439046][ T3445] ? __mutex_lock_slowpath+0x10/0x10
[ 3028.444166][ T3445] __x64_sys_clone+0x23f/0x290
[ 3028.448766][ T3445] ? __do_sys_vfork+0x130/0x130
[ 3028.453454][ T3445] ? ksys_write+0x260/0x2c0
[ 3028.457796][ T3445] ? debug_smp_processor_id+0x17/0x20
[ 3028.463114][ T3445] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3028.469165][ T3445] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3028.474630][ T3445] do_syscall_64+0x3d/0xb0
[ 3028.478880][ T3445] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3028.484607][ T3445] RIP: 0033:0x7f024b55cae9
[ 3028.488875][ T3445] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3028.508479][ T3445] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3028.516718][ T3445] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
21:51:28 executing program 2:
socketpair(0x1f, 0x1, 0x0, 0x0) (async)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x5, 0xeb, 0x9, 0x6, 0x0, 0x40, 0x305, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7170d901, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x80000, 0x8, 0x645, 0x5, 0x2, 0x9, 0x654, 0x0, 0x9, 0x0, 0x4}, r0, 0xd, 0xffffffffffffffff, 0xb) (async, rerun: 32)
socketpair(0x2a, 0x1, 0x800, &(0x7f0000000200)) (async, rerun: 32)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3) (async)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xf8, 0x39, 0x6, 0x9, 0x0, 0x5, 0xa0, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0x20}, 0x100, 0xf81, 0x11a5, 0x4, 0x100, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8001}, r1, 0x10, r2, 0x8)
socketpair(0x1d, 0x2, 0x9, &(0x7f0000000000))
21:51:28 executing program 5:
syz_clone(0x40020000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240))
21:51:28 executing program 4:
syz_clone(0xffffffffa0002224, 0x0, 0x0, 0x0, 0x0, 0x0)
21:51:28 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x14, 0x7, 0x9, 0x5, 0x0, 0x5, 0xe608, 0xe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x7, 0x1}, 0x1aa21, 0x34, 0x1, 0x7, 0x80000001, 0x0, 0x1ff, 0x0, 0x7, 0x0, 0x401}, 0x0, 0x6, r1, 0x9)
write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'net'}, {0x2d, 'pids'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x17)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
21:51:28 executing program 0:
r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x0, 0x2, 0xcc, 0x0, 0x9b, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x1d8f, 0x9}, 0x1901, 0xfffffffffffffff7, 0xfffffffb, 0x5, 0x0, 0x471, 0x7ff, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x4)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000180)}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x12, 0x6, 0xfc55, 0x6, 0x101, r1, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xea, 0x77, 0x1f, 0xf7, 0x0, 0x8, 0x1004, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x2, 0x80000000d4}, 0x4002, 0x20, 0x32, 0x9, 0x438a8ada, 0x3, 0xffff, 0x0, 0x0, 0x0, 0x6}, r2, 0x5, r0, 0x6)
perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x6, 0x7f, 0x0, 0xffff, 0x20000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100), 0xc}, 0x82, 0x100, 0x2, 0x3, 0x100000001, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2}, r2, 0x3, r4, 0xd)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
21:51:28 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25)
[ 3028.524537][ T3445] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3028.532357][ T3445] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3028.540272][ T3445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3028.548069][ T3445] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3028.555888][ T3445]
21:51:28 executing program 0:
r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x0, 0x2, 0xcc, 0x0, 0x9b, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x1d8f, 0x9}, 0x1901, 0xfffffffffffffff7, 0xfffffffb, 0x5, 0x0, 0x471, 0x7ff, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x4)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000180)}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x12, 0x6, 0xfc55, 0x6, 0x101, r1, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xea, 0x77, 0x1f, 0xf7, 0x0, 0x8, 0x1004, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x2, 0x80000000d4}, 0x4002, 0x20, 0x32, 0x9, 0x438a8ada, 0x3, 0xffff, 0x0, 0x0, 0x0, 0x6}, r2, 0x5, r0, 0x6)
perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x6, 0x7f, 0x0, 0xffff, 0x20000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100), 0xc}, 0x82, 0x100, 0x2, 0x3, 0x100000001, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2}, r2, 0x3, r4, 0xd)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x0, 0x2, 0xcc, 0x0, 0x9b, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x1d8f, 0x9}, 0x1901, 0xfffffffffffffff7, 0xfffffffb, 0x5, 0x0, 0x471, 0x7ff, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x4) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000180)}, 0x20) (async)
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x12, 0x6, 0xfc55, 0x6, 0x101, r1, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xea, 0x77, 0x1f, 0xf7, 0x0, 0x8, 0x1004, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x2, 0x80000000d4}, 0x4002, 0x20, 0x32, 0x9, 0x438a8ada, 0x3, 0xffff, 0x0, 0x0, 0x0, 0x6}, r2, 0x5, r0, 0x6) (async)
perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x6, 0x7f, 0x0, 0xffff, 0x20000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100), 0xc}, 0x82, 0x100, 0x2, 0x3, 0x100000001, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2}, r2, 0x3, r4, 0xd) (async)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12) (async)
21:51:28 executing program 0:
r0 = perf_event_open$cgroup(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x0, 0x2, 0xcc, 0x0, 0x9b, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x1d8f, 0x9}, 0x1901, 0xfffffffffffffff7, 0xfffffffb, 0x5, 0x0, 0x471, 0x7ff, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x4) (async)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000180)}, 0x20) (async)
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x12, 0x6, 0xfc55, 0x6, 0x101, r1, 0xffffff00, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x2, 0x4}, 0x48)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r4 = perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xea, 0x77, 0x1f, 0xf7, 0x0, 0x8, 0x1004, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x2, 0x80000000d4}, 0x4002, 0x20, 0x32, 0x9, 0x438a8ada, 0x3, 0xffff, 0x0, 0x0, 0x0, 0x6}, r2, 0x5, r0, 0x6)
perf_event_open$cgroup(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x0, 0x6, 0x7f, 0x0, 0xffff, 0x20000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000100), 0xc}, 0x82, 0x100, 0x2, 0x3, 0x100000001, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2}, r2, 0x3, r4, 0xd)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
21:51:28 executing program 4:
syz_clone(0xffffffffa0028480, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3028.609442][ T3484] FAULT_INJECTION: forcing a failure.
[ 3028.609442][ T3484] name failslab, interval 1, probability 0, space 0, times 0
[ 3028.624225][ T3484] CPU: 1 PID: 3484 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3028.635690][ T3484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3028.645591][ T3484] Call Trace:
[ 3028.648816][ T3484]
[ 3028.651571][ T3484] dump_stack_lvl+0x151/0x1b7
21:51:28 executing program 0:
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={0xffffffffffffffff, &(0x7f0000000500)="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", &(0x7f0000000380)=""/248}, 0x20)
r0 = syz_clone(0x20202000, &(0x7f0000000180)="e155511f3d8dd9c9b8c6cd86bf058bf56ec38a2a34e893cc261532f74b526297c871a3d61a26470f3b118563c74540608b2701d2390ec0baee9ca2993bf114b66d6831346cc763dea6a6242af41d63851ce9b46e5479541f8cea8715b8cf0be938518dfaf7c3440aa17a19659d4b47e3ca79a957d732463575924676c8dcd53154c15605af", 0x85, &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000280)="fc387e171f4d884a39ba6dcefe655e573abf457d2668f853480fbf3c4f69c9dc5d0fe53d2385eda0ff78c365c4afee5a17417e568c31a759bad8321501c9890e7ff29207b422365a0d7c3c2d5560ac018fe5a534e98f8806a523183022")
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x6, 0x5, 0x8, 0x0, 0xfffffffffffffffd, 0x12a20, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x2, @perf_bp={&(0x7f0000000000), 0x9}, 0x100, 0x8, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x3}, r0, 0xb, 0xffffffffffffffff, 0x2)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:51:28 executing program 0:
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={0xffffffffffffffff, &(0x7f0000000500)="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", &(0x7f0000000380)=""/248}, 0x20)
r0 = syz_clone(0x20202000, &(0x7f0000000180)="e155511f3d8dd9c9b8c6cd86bf058bf56ec38a2a34e893cc261532f74b526297c871a3d61a26470f3b118563c74540608b2701d2390ec0baee9ca2993bf114b66d6831346cc763dea6a6242af41d63851ce9b46e5479541f8cea8715b8cf0be938518dfaf7c3440aa17a19659d4b47e3ca79a957d732463575924676c8dcd53154c15605af", 0x85, &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000280)="fc387e171f4d884a39ba6dcefe655e573abf457d2668f853480fbf3c4f69c9dc5d0fe53d2385eda0ff78c365c4afee5a17417e568c31a759bad8321501c9890e7ff29207b422365a0d7c3c2d5560ac018fe5a534e98f8806a523183022")
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x6, 0x5, 0x8, 0x0, 0xfffffffffffffffd, 0x12a20, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x2, @perf_bp={&(0x7f0000000000), 0x9}, 0x100, 0x8, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x3}, r0, 0xb, 0xffffffffffffffff, 0x2) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
[ 3028.656087][ T3484] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3028.661555][ T3484] ? slab_post_alloc_hook+0x53/0x2c0
[ 3028.666690][ T3484] ? kernel_clone+0x21e/0x9e0
[ 3028.671226][ T3484] ? do_syscall_64+0x3d/0xb0
[ 3028.675632][ T3484] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3028.681518][ T3484] dump_stack+0x15/0x17
[ 3028.685509][ T3484] should_fail+0x3c6/0x510
[ 3028.689761][ T3484] __should_failslab+0xa4/0xe0
[ 3028.694364][ T3484] ? copy_mm+0x192/0x13e0
[ 3028.698525][ T3484] should_failslab+0x9/0x20
[ 3028.702866][ T3484] slab_pre_alloc_hook+0x37/0xd0
[ 3028.707642][ T3484] ? copy_mm+0x192/0x13e0
[ 3028.711810][ T3484] kmem_cache_alloc+0x44/0x200
[ 3028.716413][ T3484] copy_mm+0x192/0x13e0
[ 3028.720507][ T3484] ? _raw_spin_lock+0xa4/0x1b0
[ 3028.725660][ T3484] ? copy_signal+0x610/0x610
[ 3028.730143][ T3484] ? __kasan_check_write+0x14/0x20
[ 3028.735076][ T3484] ? __init_rwsem+0xd6/0x1c0
[ 3028.739504][ T3484] ? copy_signal+0x4e3/0x610
[ 3028.743939][ T3484] copy_process+0x12bc/0x3260
[ 3028.748447][ T3484] ? proc_fail_nth_write+0x20b/0x290
[ 3028.753566][ T3484] ? fsnotify_perm+0x6a/0x5d0
[ 3028.758178][ T3484] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3028.763297][ T3484] ? vfs_write+0x9ec/0x1110
[ 3028.767638][ T3484] kernel_clone+0x21e/0x9e0
[ 3028.771973][ T3484] ? file_end_write+0x1c0/0x1c0
[ 3028.776665][ T3484] ? create_io_thread+0x1e0/0x1e0
[ 3028.781520][ T3484] ? mutex_unlock+0xb2/0x260
[ 3028.785948][ T3484] ? __mutex_lock_slowpath+0x10/0x10
[ 3028.791073][ T3484] __x64_sys_clone+0x23f/0x290
[ 3028.795670][ T3484] ? __do_sys_vfork+0x130/0x130
[ 3028.800545][ T3484] ? ksys_write+0x260/0x2c0
[ 3028.804874][ T3484] ? debug_smp_processor_id+0x17/0x20
[ 3028.810080][ T3484] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3028.816240][ T3484] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3028.821707][ T3484] do_syscall_64+0x3d/0xb0
[ 3028.825959][ T3484] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3028.831691][ T3484] RIP: 0033:0x7f024b55cae9
[ 3028.835940][ T3484] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
21:51:28 executing program 4:
syz_clone(0x0, 0x0, 0x2, 0x0, 0x0, 0x0)
[ 3028.855907][ T3484] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3028.864154][ T3484] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3028.871990][ T3484] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3028.879772][ T3484] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3028.887773][ T3484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3028.895583][ T3484] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3028.903394][ T3484]
21:51:29 executing program 2:
socketpair(0x1f, 0x1, 0x0, 0x0) (async, rerun: 32)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (rerun: 32)
perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x5, 0xeb, 0x9, 0x6, 0x0, 0x40, 0x305, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7170d901, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x80000, 0x8, 0x645, 0x5, 0x2, 0x9, 0x654, 0x0, 0x9, 0x0, 0x4}, r0, 0xd, 0xffffffffffffffff, 0xb) (async)
socketpair(0x2a, 0x1, 0x800, &(0x7f0000000200)) (async, rerun: 32)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async)
perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xf8, 0x39, 0x6, 0x9, 0x0, 0x5, 0xa0, 0x9, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0x20}, 0x100, 0xf81, 0x11a5, 0x4, 0x100, 0x6, 0x6, 0x0, 0x0, 0x0, 0x8001}, r1, 0x10, r2, 0x8) (async)
socketpair(0x1d, 0x2, 0x9, &(0x7f0000000000))
21:51:29 executing program 0:
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={0xffffffffffffffff, &(0x7f0000000500)="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", &(0x7f0000000380)=""/248}, 0x20) (async)
r0 = syz_clone(0x20202000, &(0x7f0000000180)="e155511f3d8dd9c9b8c6cd86bf058bf56ec38a2a34e893cc261532f74b526297c871a3d61a26470f3b118563c74540608b2701d2390ec0baee9ca2993bf114b66d6831346cc763dea6a6242af41d63851ce9b46e5479541f8cea8715b8cf0be938518dfaf7c3440aa17a19659d4b47e3ca79a957d732463575924676c8dcd53154c15605af", 0x85, &(0x7f0000000100), &(0x7f0000000240), &(0x7f0000000280)="fc387e171f4d884a39ba6dcefe655e573abf457d2668f853480fbf3c4f69c9dc5d0fe53d2385eda0ff78c365c4afee5a17417e568c31a759bad8321501c9890e7ff29207b422365a0d7c3c2d5560ac018fe5a534e98f8806a523183022")
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x6, 0x5, 0x8, 0x0, 0xfffffffffffffffd, 0x12a20, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x200, 0x2, @perf_bp={&(0x7f0000000000), 0x9}, 0x100, 0x8, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, 0x0, 0x3}, r0, 0xb, 0xffffffffffffffff, 0x2)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:51:29 executing program 4:
syz_clone(0x0, 0x0, 0x7, 0x0, 0x0, 0x0)
21:51:29 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x14, 0x7, 0x9, 0x5, 0x0, 0x5, 0xe608, 0xe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x7, 0x1}, 0x1aa21, 0x34, 0x1, 0x7, 0x80000001, 0x0, 0x1ff, 0x0, 0x7, 0x0, 0x401}, 0x0, 0x6, r1, 0x9)
write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'net'}, {0x2d, 'pids'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x17) (async)
write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'net'}, {0x2d, 'pids'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x17)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12) (async)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
21:51:29 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26)
21:51:29 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240))
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="850000000000000007000000000002009500000000000000d078a601cc703dfdec761cd78e1e3e71281b543d3888c466219b905b175d5cdf77ee06aaef413f726d0afb38fa166eff0a02eae712f6d1a31a74ccf0f8b07895b702b8cb2d8583b3acda1146f3f0ac85d61aaf8a9e3404c1f561e509464b52bda0efc7a31ee0ce48922a07a34d927170c0289ec98b4c8bb138eb06b106d5527a7330b9d95d3a8760042db943343f4b9369487f54"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x2, &(0x7f0000000000)={0xa}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000140)='f2fs_truncate_partial_nodes\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x80, 0x3f, 0x3, 0x8, 0x1c, 0x0, 0xee8, 0x800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x7f}, 0x10002, 0x0, 0x8, 0x0, 0x6672b0b7, 0x3, 0x8}, r0, 0xf, r2, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580))
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000540)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x8, 0x1}, 0x48)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000300)={r5, &(0x7f0000000b80)="41eac2be0c8baf4e873c61757d94456ef30a0babd607000000000000002eda01cd1ae5911ab85208c68e5d7fa97bc65d2cd9860000000000", 0x20000000}, 0x20)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r5, 0x0}, 0x20)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r5, &(0x7f0000000640)='`', 0x0}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x13, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x98, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x1, 0xa, 0x5, 0x50, 0x8}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x5}, @map_idx={0x18, 0x1}]}, &(0x7f0000000940)='syzkaller\x00', 0x62, 0x3f, &(0x7f0000000980)=""/63, 0x40f00, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x4, 0x1, 0x3, 0x1f}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000b00)=[r3, 0xffffffffffffffff, r5], 0x0, 0x10, 0x31}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x23000)
openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0)
r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_handle_stats\x00', r6}, 0x10)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000b40)='rpcgss_svc_seqno_bad\x00'}, 0x10)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10)
21:51:29 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.events\x00', 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0)
21:51:29 executing program 4:
syz_clone(0x0, 0x0, 0x8, 0x0, 0x0, 0x0)
21:51:29 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async, rerun: 32)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) (rerun: 32)
openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.events\x00', 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0)
21:51:29 executing program 4:
syz_clone(0x0, 0x0, 0x9, 0x0, 0x0, 0x0)
[ 3029.434633][ T3585] FAULT_INJECTION: forcing a failure.
[ 3029.434633][ T3585] name failslab, interval 1, probability 0, space 0, times 0
[ 3029.456299][ T3585] CPU: 1 PID: 3585 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3029.467775][ T3585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3029.477690][ T3585] Call Trace:
[ 3029.480788][ T3585]
[ 3029.483567][ T3585] dump_stack_lvl+0x151/0x1b7
[ 3029.488083][ T3585] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3029.493988][ T3585] ? slab_post_alloc_hook+0x53/0x2c0
[ 3029.499106][ T3585] ? kernel_clone+0x21e/0x9e0
[ 3029.504139][ T3585] ? do_syscall_64+0x3d/0xb0
[ 3029.508560][ T3585] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3029.514464][ T3585] dump_stack+0x15/0x17
[ 3029.518456][ T3585] should_fail+0x3c6/0x510
[ 3029.523132][ T3585] __should_failslab+0xa4/0xe0
[ 3029.527747][ T3585] ? copy_mm+0x192/0x13e0
[ 3029.531908][ T3585] should_failslab+0x9/0x20
[ 3029.536250][ T3585] slab_pre_alloc_hook+0x37/0xd0
[ 3029.541042][ T3585] ? copy_mm+0x192/0x13e0
[ 3029.545311][ T3585] kmem_cache_alloc+0x44/0x200
[ 3029.549917][ T3585] copy_mm+0x192/0x13e0
[ 3029.553913][ T3585] ? _raw_spin_lock+0xa4/0x1b0
[ 3029.558591][ T3585] ? copy_signal+0x610/0x610
[ 3029.563623][ T3585] ? __kasan_check_write+0x14/0x20
[ 3029.568601][ T3585] ? __init_rwsem+0xd6/0x1c0
[ 3029.572998][ T3585] ? copy_signal+0x4e3/0x610
[ 3029.577433][ T3585] copy_process+0x12bc/0x3260
[ 3029.582026][ T3585] ? proc_fail_nth_write+0x20b/0x290
[ 3029.587145][ T3585] ? fsnotify_perm+0x6a/0x5d0
[ 3029.591660][ T3585] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3029.596713][ T3585] ? vfs_write+0x9ec/0x1110
[ 3029.601060][ T3585] kernel_clone+0x21e/0x9e0
[ 3029.605463][ T3585] ? file_end_write+0x1c0/0x1c0
[ 3029.610324][ T3585] ? create_io_thread+0x1e0/0x1e0
[ 3029.615180][ T3585] ? mutex_unlock+0xb2/0x260
[ 3029.619604][ T3585] ? __mutex_lock_slowpath+0x10/0x10
[ 3029.624732][ T3585] __x64_sys_clone+0x23f/0x290
[ 3029.629851][ T3585] ? __do_sys_vfork+0x130/0x130
[ 3029.634925][ T3585] ? ksys_write+0x260/0x2c0
[ 3029.639263][ T3585] ? debug_smp_processor_id+0x17/0x20
[ 3029.644659][ T3585] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3029.650547][ T3585] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3029.656017][ T3585] do_syscall_64+0x3d/0xb0
[ 3029.660266][ T3585] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3029.666007][ T3585] RIP: 0033:0x7f024b55cae9
[ 3029.670254][ T3585] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3029.691917][ T3585] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3029.700161][ T3585] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3029.707971][ T3585] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3029.715782][ T3585] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3029.723861][ T3585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:51:29 executing program 4:
syz_clone(0x0, 0x0, 0x11, 0x0, 0x0, 0x0)
[ 3029.732182][ T3585] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3029.740095][ T3585]
21:51:29 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000080)='memory.swap.events\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r2, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x0, 0x0)
21:51:29 executing program 2:
sendmsg$tipc(0xffffffffffffffff, 0xfffffffffffffffc, 0x408c5)
socketpair(0x0, 0x0, 0x0, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58}, 0x10)
syz_clone(0x2849300, 0x0, 0xfffffdcb, 0x0, 0x0, 0x0)
21:51:29 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27)
21:51:29 executing program 4:
syz_clone(0x0, 0x0, 0x70, 0x0, 0x0, 0x0)
[ 3029.850484][ T3608] FAULT_INJECTION: forcing a failure.
[ 3029.850484][ T3608] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3029.882265][ T3608] CPU: 0 PID: 3608 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3029.893821][ T3608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3029.903815][ T3608] Call Trace:
[ 3029.906942][ T3608]
[ 3029.909705][ T3608] dump_stack_lvl+0x151/0x1b7
[ 3029.914309][ T3608] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3029.920010][ T3608] ? stack_trace_save+0x113/0x1c0
[ 3029.925055][ T3608] ? stack_trace_snprint+0xf0/0xf0
[ 3029.929979][ T3608] ? _find_next_bit+0x1f3/0x200
[ 3029.934756][ T3608] dump_stack+0x15/0x17
[ 3029.938771][ T3608] should_fail+0x3c6/0x510
[ 3029.943002][ T3608] should_fail_alloc_page+0x5a/0x80
[ 3029.948124][ T3608] prepare_alloc_pages+0x15c/0x700
[ 3029.953071][ T3608] ? __alloc_pages_bulk+0xe60/0xe60
[ 3029.958196][ T3608] ? __kasan_check_write+0x14/0x20
[ 3029.963228][ T3608] ? pcpu_memcg_post_alloc_hook+0x1b1/0x260
[ 3029.968956][ T3608] __alloc_pages+0x138/0x5e0
[ 3029.973387][ T3608] ? prep_new_page+0x110/0x110
[ 3029.977974][ T3608] ? pcpu_alloc+0xda0/0x13e0
[ 3029.982411][ T3608] __get_free_pages+0xe/0x30
[ 3029.986914][ T3608] pgd_alloc+0x21/0x2c0
[ 3029.991519][ T3608] mm_init+0x5c7/0x970
[ 3029.995511][ T3608] copy_mm+0x1e3/0x13e0
[ 3029.999503][ T3608] ? _raw_spin_lock+0xa4/0x1b0
[ 3030.004101][ T3608] ? copy_signal+0x610/0x610
[ 3030.008526][ T3608] ? __kasan_check_write+0x14/0x20
[ 3030.013475][ T3608] ? __init_rwsem+0xd6/0x1c0
[ 3030.017898][ T3608] ? copy_signal+0x4e3/0x610
[ 3030.022329][ T3608] copy_process+0x12bc/0x3260
[ 3030.026888][ T3608] ? proc_fail_nth_write+0x20b/0x290
[ 3030.032049][ T3608] ? fsnotify_perm+0x6a/0x5d0
[ 3030.036562][ T3608] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3030.041510][ T3608] ? vfs_write+0x9ec/0x1110
[ 3030.046027][ T3608] kernel_clone+0x21e/0x9e0
[ 3030.050408][ T3608] ? file_end_write+0x1c0/0x1c0
[ 3030.055082][ T3608] ? create_io_thread+0x1e0/0x1e0
[ 3030.059914][ T3608] ? mutex_unlock+0xb2/0x260
[ 3030.064340][ T3608] ? __mutex_lock_slowpath+0x10/0x10
[ 3030.069543][ T3608] __x64_sys_clone+0x23f/0x290
[ 3030.074318][ T3608] ? __do_sys_vfork+0x130/0x130
[ 3030.079625][ T3608] ? ksys_write+0x260/0x2c0
[ 3030.083952][ T3608] ? debug_smp_processor_id+0x17/0x20
[ 3030.089157][ T3608] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3030.095061][ T3608] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3030.100978][ T3608] do_syscall_64+0x3d/0xb0
[ 3030.105284][ T3608] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3030.111059][ T3608] RIP: 0033:0x7f024b55cae9
[ 3030.115300][ T3608] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3030.135716][ T3608] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3030.143977][ T3608] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3030.151855][ T3608] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3030.159938][ T3608] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3030.168007][ T3608] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3030.175988][ T3608] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3030.183807][ T3608]
21:51:30 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x14, 0x7, 0x9, 0x5, 0x0, 0x5, 0xe608, 0xe, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x7, 0x1}, 0x1aa21, 0x34, 0x1, 0x7, 0x80000001, 0x0, 0x1ff, 0x0, 0x7, 0x0, 0x401}, 0x0, 0x6, r1, 0x9)
write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'net'}, {0x2d, 'pids'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x17) (async)
write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'net'}, {0x2d, 'pids'}, {0x2d, 'rdma'}, {0x2d, 'rdma'}]}, 0x17)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
21:51:30 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0)
r3 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
write$cgroup_type(r2, &(0x7f00000000c0), 0x9)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r3, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r2, &(0x7f0000000080)=r3, 0x12)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:33 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240))
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async)
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="850000000000000007000000000002009500000000000000d078a601cc703dfdec761cd78e1e3e71281b543d3888c466219b905b175d5cdf77ee06aaef413f726d0afb38fa166eff0a02eae712f6d1a31a74ccf0f8b07895b702b8cb2d8583b3acda1146f3f0ac85d61aaf8a9e3404c1f561e509464b52bda0efc7a31ee0ce48922a07a34d927170c0289ec98b4c8bb138eb06b106d5527a7330b9d95d3a8760042db943343f4b9369487f54"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x2, &(0x7f0000000000)={0xa}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000140)='f2fs_truncate_partial_nodes\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x80, 0x3f, 0x3, 0x8, 0x1c, 0x0, 0xee8, 0x800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x7f}, 0x10002, 0x0, 0x8, 0x0, 0x6672b0b7, 0x3, 0x8}, r0, 0xf, r2, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) (async, rerun: 64)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000540)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (rerun: 64)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x8, 0x1}, 0x48)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000300)={r5, &(0x7f0000000b80)="41eac2be0c8baf4e873c61757d94456ef30a0babd607000000000000002eda01cd1ae5911ab85208c68e5d7fa97bc65d2cd9860000000000", 0x20000000}, 0x20) (async, rerun: 64)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r5, 0x0}, 0x20) (async, rerun: 64)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r5, &(0x7f0000000640)='`', 0x0}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x13, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x98, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x1, 0xa, 0x5, 0x50, 0x8}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x5}, @map_idx={0x18, 0x1}]}, &(0x7f0000000940)='syzkaller\x00', 0x62, 0x3f, &(0x7f0000000980)=""/63, 0x40f00, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x4, 0x1, 0x3, 0x1f}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000b00)=[r3, 0xffffffffffffffff, r5], 0x0, 0x10, 0x31}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) (async)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) (async, rerun: 32)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x23000) (async, rerun: 32)
openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0) (async)
r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_handle_stats\x00', r6}, 0x10) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
bpf$MAP_CREATE(0x0, 0x0, 0x0) (async, rerun: 32)
bpf$MAP_CREATE(0x0, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000b40)='rpcgss_svc_seqno_bad\x00'}, 0x10) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10)
21:51:33 executing program 4:
syz_clone(0x0, 0x0, 0x700, 0x0, 0x0, 0x0)
21:51:33 executing program 2:
sendmsg$tipc(0xffffffffffffffff, 0xfffffffffffffffc, 0x408c5) (async, rerun: 64)
socketpair(0x0, 0x0, 0x0, 0x0) (rerun: 64)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58}, 0x10) (async)
syz_clone(0x2849300, 0x0, 0xfffffdcb, 0x0, 0x0, 0x0)
21:51:33 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28)
21:51:33 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) (async)
r3 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
write$cgroup_type(r2, &(0x7f00000000c0), 0x9)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r3, 0x0, 0xffffffffffffffff, 0x3) (async)
write$cgroup_pid(r2, &(0x7f0000000080)=r3, 0x12) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:33 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0)
[ 3033.693848][ T3629] FAULT_INJECTION: forcing a failure.
[ 3033.693848][ T3629] name failslab, interval 1, probability 0, space 0, times 0
[ 3033.724041][ T3629] CPU: 1 PID: 3629 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3033.736297][ T3629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3033.746710][ T3629] Call Trace:
[ 3033.750007][ T3629]
[ 3033.753239][ T3629] dump_stack_lvl+0x151/0x1b7
[ 3033.757751][ T3629] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3033.764196][ T3629] ? __alloc_pages+0x206/0x5e0
[ 3033.769032][ T3629] dump_stack+0x15/0x17
[ 3033.773280][ T3629] should_fail+0x3c6/0x510
[ 3033.777542][ T3629] __should_failslab+0xa4/0xe0
[ 3033.782133][ T3629] ? vm_area_dup+0x26/0x230
[ 3033.786561][ T3629] should_failslab+0x9/0x20
[ 3033.790898][ T3629] slab_pre_alloc_hook+0x37/0xd0
[ 3033.795676][ T3629] ? vm_area_dup+0x26/0x230
[ 3033.800015][ T3629] kmem_cache_alloc+0x44/0x200
[ 3033.804614][ T3629] vm_area_dup+0x26/0x230
[ 3033.808794][ T3629] copy_mm+0x9a1/0x13e0
[ 3033.813077][ T3629] ? copy_signal+0x610/0x610
[ 3033.818803][ T3629] ? __init_rwsem+0xd6/0x1c0
[ 3033.823227][ T3629] ? copy_signal+0x4e3/0x610
[ 3033.827653][ T3629] copy_process+0x12bc/0x3260
[ 3033.832185][ T3629] ? proc_fail_nth_write+0x20b/0x290
[ 3033.837584][ T3629] ? fsnotify_perm+0x6a/0x5d0
21:51:33 executing program 2:
sendmsg$tipc(0xffffffffffffffff, 0xfffffffffffffffc, 0x408c5)
socketpair(0x0, 0x0, 0x0, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={0xffffffffffffffff, 0x58}, 0x10)
syz_clone(0x2849300, 0x0, 0xfffffdcb, 0x0, 0x0, 0x0) (async)
syz_clone(0x2849300, 0x0, 0xfffffdcb, 0x0, 0x0, 0x0)
21:51:33 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async, rerun: 32)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) (async, rerun: 32)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0)
[ 3033.842498][ T3629] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3033.847443][ T3629] ? vfs_write+0x9ec/0x1110
[ 3033.851784][ T3629] kernel_clone+0x21e/0x9e0
[ 3033.856211][ T3629] ? file_end_write+0x1c0/0x1c0
[ 3033.861521][ T3629] ? create_io_thread+0x1e0/0x1e0
[ 3033.866449][ T3629] ? mutex_unlock+0xb2/0x260
[ 3033.871139][ T3629] ? __mutex_lock_slowpath+0x10/0x10
[ 3033.876603][ T3629] __x64_sys_clone+0x23f/0x290
[ 3033.881218][ T3629] ? __do_sys_vfork+0x130/0x130
[ 3033.886019][ T3629] ? ksys_write+0x260/0x2c0
[ 3033.890334][ T3629] ? debug_smp_processor_id+0x17/0x20
[ 3033.896056][ T3629] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3033.902039][ T3629] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3033.907513][ T3629] do_syscall_64+0x3d/0xb0
[ 3033.911770][ T3629] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3033.917516][ T3629] RIP: 0033:0x7f024b55cae9
[ 3033.921839][ T3629] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
21:51:34 executing program 2:
socketpair(0x0, 0x0, 0xef7, 0x0)
socketpair(0x9, 0x4, 0x6, &(0x7f0000000000))
socketpair(0x3, 0x6, 0x7fff, &(0x7f0000000080))
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
socketpair(0x22, 0xa, 0x5, &(0x7f0000000040))
21:51:34 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) (async)
r2 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0)
r3 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
write$cgroup_type(r2, &(0x7f00000000c0), 0x9)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r3, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r2, &(0x7f0000000080)=r3, 0x12)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:34 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) (async)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async)
r0 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000a40)=ANY=[@ANYBLOB="850000000000000007000000000002009500000000000000d078a601cc703dfdec761cd78e1e3e71281b543d3888c466219b905b175d5cdf77ee06aaef413f726d0afb38fa166eff0a02eae712f6d1a31a74ccf0f8b07895b702b8cb2d8583b3acda1146f3f0ac85d61aaf8a9e3404c1f561e509464b52bda0efc7a31ee0ce48922a07a34d927170c0289ec98b4c8bb138eb06b106d5527a7330b9d95d3a8760042db943343f4b9369487f54"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x2, &(0x7f0000000000)={0xa}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
r1 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000140)='f2fs_truncate_partial_nodes\x00', r0}, 0x10)
perf_event_open$cgroup(&(0x7f0000000300)={0x2, 0x80, 0x3f, 0x3, 0x8, 0x1c, 0x0, 0xee8, 0x800, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x7f}, 0x10002, 0x0, 0x8, 0x0, 0x6672b0b7, 0x3, 0x8}, r0, 0xf, r2, 0x0) (async)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580))
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x4, &(0x7f0000000540)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x80) (async)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x47, 0x10001, 0x8, 0x1}, 0x48)
bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000300)={r5, &(0x7f0000000b80)="41eac2be0c8baf4e873c61757d94456ef30a0babd607000000000000002eda01cd1ae5911ab85208c68e5d7fa97bc65d2cd9860000000000", 0x20000000}, 0x20) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r5, 0x0}, 0x20)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r5, &(0x7f0000000640)='`', 0x0}, 0x20) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x13, 0x8, &(0x7f00000005c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x98, 0x0, 0x0, 0x0, 0x1}, [@alu={0x7, 0x1, 0x1, 0xa, 0x5, 0x50, 0x8}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0x5}, @map_idx={0x18, 0x1}]}, &(0x7f0000000940)='syzkaller\x00', 0x62, 0x3f, &(0x7f0000000980)=""/63, 0x40f00, 0x20, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f00000009c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a00)={0x4, 0x1, 0x3, 0x1f}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f0000000b00)=[r3, 0xffffffffffffffff, r5], 0x0, 0x10, 0x31}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10)
bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0x4) (async)
write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x23000) (async)
openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0), 0x2, 0x0) (async)
r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='jbd2_handle_stats\x00', r6}, 0x10) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0xe0, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
bpf$MAP_CREATE(0x0, 0x0, 0x0) (async)
bpf$MAP_CREATE(0x0, 0x0, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000b40)='rpcgss_svc_seqno_bad\x00'}, 0x10)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={r3, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000600), &(0x7f0000000680), 0x8, 0x10, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10)
21:51:34 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) (async)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) (async)
21:51:34 executing program 4:
syz_clone(0x0, 0x0, 0x900, 0x0, 0x0, 0x0)
[ 3033.941274][ T3629] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3033.949685][ T3629] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3033.957500][ T3629] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3033.965316][ T3629] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3033.973120][ T3629] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3033.981107][ T3629] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3033.988918][ T3629]
21:51:34 executing program 2:
socketpair(0x0, 0x0, 0xef7, 0x0)
socketpair(0x9, 0x4, 0x6, &(0x7f0000000000))
socketpair(0x3, 0x6, 0x7fff, &(0x7f0000000080)) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async, rerun: 32)
socketpair(0x22, 0xa, 0x5, &(0x7f0000000040)) (rerun: 32)
21:51:34 executing program 4:
syz_clone(0x0, 0x0, 0x1100, 0x0, 0x0, 0x0)
21:51:34 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29)
21:51:34 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x0, 0x0)
21:51:34 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:34 executing program 2:
socketpair(0x0, 0x0, 0xef7, 0x0)
socketpair(0x9, 0x4, 0x6, &(0x7f0000000000)) (async)
socketpair(0x9, 0x4, 0x6, &(0x7f0000000000))
socketpair(0x3, 0x6, 0x7fff, &(0x7f0000000080))
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
socketpair(0x22, 0xa, 0x5, &(0x7f0000000040))
21:51:35 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x0, 0x0)
21:51:35 executing program 4:
syz_clone(0x0, 0x0, 0x1f00, 0x0, 0x0, 0x0)
21:51:35 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_queued\x00', 0x0, 0x0)
21:51:35 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
21:51:35 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x2, 0x0, &(0x7f0000000680)='GPL\x00', 0x58c1, 0x10, &(0x7f00000006c0)=""/16, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x0, 0x4, 0x8cf}, 0x10}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000008000000090000000064c1d9e52be3f01e582e2a00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10)
r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x4, 0x0, 0x3f2b, 0x0, 0x0, 0x0, 0x0, 0x10001})
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001f40)={0x0, 0x80, 0x20, 0x8, 0x5, 0xff, 0x0, 0x0, 0x20200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x9d70}, 0x84090, 0x20, 0x0, 0x9, 0x101, 0x1f, 0x401, 0x0, 0x2, 0x0, 0x401})
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000840)='./file0\x00', 0x0, 0x4008, r0}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000021c0)={r2, 0xe0, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001e80)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000002040)=[0x0], &(0x7f0000002080)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000020c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002100), &(0x7f0000002140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002180)}}, 0x10)
r9 = bpf$ITER_CREATE(0x21, &(0x7f0000002480), 0x8)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002580)={0x11, 0xa, &(0x7f0000001a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_fd={0x18, 0xa, 0x1, 0x0, r7}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000001b40)='GPL\x00', 0x8f88, 0x78, &(0x7f0000001fc0)=""/120, 0x41000, 0x39, '\x00', r8, 0x0, r9, 0x8, &(0x7f00000024c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002500)={0x0, 0x4, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002540)=[r1, r1, r1, r1], 0x0, 0x10, 0x1f}, 0x90)
perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0xff, 0xcd, 0x0, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x84000001, 0x2}, 0x84000, 0x1, 0x5bd, 0x3, 0x8000, 0x4, 0x2, 0x0, 0xff, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3)
r10 = perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x80, 0x1, 0x9, 0x4, 0x0, 0x7d5a, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xa63e0000}, 0xa420, 0x7fffffffffffffff, 0x6, 0x2, 0x2, 0x3, 0x7ff, 0x0, 0x800, 0x0, 0x4}, 0x0, 0xb, r4, 0x3)
ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000800)='threaded\x00')
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c80)={0xffffffffffffffff, 0xe0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40), &(0x7f0000001e00), 0x0, 0x8, &(0x7f0000001e00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001ac0), &(0x7f0000001b00), 0x8, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10)
r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001cc0)=r5, 0x4)
bpf$ITER_CREATE(0x21, &(0x7f0000001d80), 0x8)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001dc0)={0xffffffffffffffff, 0x3ff}, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ec0)={0x18, 0x1, &(0x7f0000002200)=ANY=[@ANYBLOB="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"], &(0x7f0000000980)='syzkaller\x00', 0x5, 0x1000, &(0x7f00000009c0)=""/4096, 0x40f00, 0x10, '\x00', r12, 0x0, r13, 0x8, &(0x7f0000001d00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001d40)={0x4, 0x4, 0x5, 0x5}, 0x10}, 0x90)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff)
syz_clone(0x76246180, 0x0, 0xd, 0x0, 0x0, 0x0)
[ 3035.429446][ T3737] FAULT_INJECTION: forcing a failure.
[ 3035.429446][ T3737] name failslab, interval 1, probability 0, space 0, times 0
21:51:35 executing program 3:
r0 = getpid()
write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=r0, 0x12)
r1 = gettid()
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xf7, 0x0, 0x20, 0x80, 0x0, 0x4, 0x414, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000200), 0x8}, 0x1000, 0x8, 0x10001, 0x0, 0x4, 0x1, 0xee, 0x0, 0x2, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x20, 0x5, 0x4, 0x5, 0x0, 0x3ae, 0x40402, 0xd, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x3, 0x7}, 0x860, 0xfffffffffffffffe, 0x20, 0x3, 0x7e4e, 0xffffffc3, 0x4c, 0x0, 0x9, 0x0, 0x61700434}, 0x0, 0x5, r2, 0xa)
perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x1, 0xff, 0x59, 0xfb, 0x0, 0x400, 0x4010, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x51a9615a, 0x4, 0x9, 0x3, 0x1, 0x0, 0x8001, 0x0, 0x6}, r0, 0x9, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000300))
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000000), 0x12)
[ 3035.479233][ T3737] CPU: 1 PID: 3737 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3035.490701][ T3737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3035.500684][ T3737] Call Trace:
[ 3035.503807][ T3737]
[ 3035.506584][ T3737] dump_stack_lvl+0x151/0x1b7
[ 3035.511103][ T3737] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3035.516590][ T3737] ? avc_denied+0x1b0/0x1b0
[ 3035.521343][ T3737] dump_stack+0x15/0x17
[ 3035.525347][ T3737] should_fail+0x3c6/0x510
[ 3035.529589][ T3737] __should_failslab+0xa4/0xe0
[ 3035.534186][ T3737] ? vm_area_dup+0x26/0x230
[ 3035.538612][ T3737] should_failslab+0x9/0x20
[ 3035.543128][ T3737] slab_pre_alloc_hook+0x37/0xd0
[ 3035.547898][ T3737] ? vm_area_dup+0x26/0x230
[ 3035.552264][ T3737] kmem_cache_alloc+0x44/0x200
[ 3035.556840][ T3737] vm_area_dup+0x26/0x230
[ 3035.561007][ T3737] copy_mm+0x9a1/0x13e0
[ 3035.565004][ T3737] ? copy_signal+0x610/0x610
[ 3035.569426][ T3737] ? __init_rwsem+0xd6/0x1c0
[ 3035.573947][ T3737] ? copy_signal+0x4e3/0x610
21:51:35 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:51:35 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair(0x8, 0x6, 0x81, &(0x7f0000000000))
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
[ 3035.578381][ T3737] copy_process+0x12bc/0x3260
[ 3035.582899][ T3737] ? proc_fail_nth_write+0x20b/0x290
[ 3035.588009][ T3737] ? fsnotify_perm+0x6a/0x5d0
[ 3035.592522][ T3737] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3035.597473][ T3737] ? vfs_write+0x9ec/0x1110
[ 3035.601898][ T3737] kernel_clone+0x21e/0x9e0
[ 3035.606233][ T3737] ? file_end_write+0x1c0/0x1c0
[ 3035.610922][ T3737] ? create_io_thread+0x1e0/0x1e0
[ 3035.615782][ T3737] ? mutex_unlock+0xb2/0x260
[ 3035.620212][ T3737] ? __mutex_lock_slowpath+0x10/0x10
[ 3035.625329][ T3737] __x64_sys_clone+0x23f/0x290
[ 3035.629932][ T3737] ? __do_sys_vfork+0x130/0x130
[ 3035.634631][ T3737] ? ksys_write+0x260/0x2c0
[ 3035.638957][ T3737] ? debug_smp_processor_id+0x17/0x20
[ 3035.644155][ T3737] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3035.650059][ T3737] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3035.655530][ T3737] do_syscall_64+0x3d/0xb0
[ 3035.659780][ T3737] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3035.665509][ T3737] RIP: 0033:0x7f024b55cae9
[ 3035.669783][ T3737] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3035.689201][ T3737] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3035.697474][ T3737] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3035.705266][ T3737] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3035.713070][ T3737] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3035.721413][ T3737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3035.729385][ T3737] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3035.737215][ T3737]
21:51:35 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30)
21:51:35 executing program 4:
syz_clone(0x0, 0x0, 0x2000, 0x0, 0x0, 0x0)
21:51:35 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000180)}, 0x20)
close(r1)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
21:51:35 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0) (async)
socketpair(0x8, 0x6, 0x81, &(0x7f0000000000)) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:51:35 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000180)}, 0x20) (async)
close(r1) (async)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
21:51:35 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0) (async)
socketpair(0x8, 0x6, 0x81, &(0x7f0000000000)) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
[ 3035.889271][ T3771] FAULT_INJECTION: forcing a failure.
[ 3035.889271][ T3771] name failslab, interval 1, probability 0, space 0, times 0
[ 3035.913215][ T3771] CPU: 0 PID: 3771 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3035.924772][ T3771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3035.934936][ T3771] Call Trace:
[ 3035.938054][ T3771]
[ 3035.940834][ T3771] dump_stack_lvl+0x151/0x1b7
[ 3035.945442][ T3771] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3035.950900][ T3771] dump_stack+0x15/0x17
[ 3035.955030][ T3771] should_fail+0x3c6/0x510
[ 3035.959282][ T3771] __should_failslab+0xa4/0xe0
[ 3035.963879][ T3771] ? anon_vma_fork+0xf7/0x4e0
[ 3035.968392][ T3771] should_failslab+0x9/0x20
[ 3035.973176][ T3771] slab_pre_alloc_hook+0x37/0xd0
[ 3035.977938][ T3771] ? anon_vma_fork+0xf7/0x4e0
[ 3035.982737][ T3771] kmem_cache_alloc+0x44/0x200
[ 3035.988184][ T3771] anon_vma_fork+0xf7/0x4e0
[ 3035.992522][ T3771] ? anon_vma_name+0x4c/0x70
[ 3035.996947][ T3771] ? vm_area_dup+0x17a/0x230
[ 3036.001497][ T3771] copy_mm+0xa3a/0x13e0
[ 3036.005729][ T3771] ? copy_signal+0x610/0x610
[ 3036.010145][ T3771] ? __init_rwsem+0xd6/0x1c0
[ 3036.014576][ T3771] ? copy_signal+0x4e3/0x610
[ 3036.019173][ T3771] copy_process+0x12bc/0x3260
[ 3036.023688][ T3771] ? proc_fail_nth_write+0x20b/0x290
[ 3036.028896][ T3771] ? fsnotify_perm+0x6a/0x5d0
[ 3036.033411][ T3771] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3036.038356][ T3771] ? vfs_write+0x9ec/0x1110
[ 3036.042697][ T3771] kernel_clone+0x21e/0x9e0
[ 3036.047035][ T3771] ? file_end_write+0x1c0/0x1c0
[ 3036.051734][ T3771] ? create_io_thread+0x1e0/0x1e0
[ 3036.056583][ T3771] ? mutex_unlock+0xb2/0x260
[ 3036.061010][ T3771] ? __mutex_lock_slowpath+0x10/0x10
[ 3036.066127][ T3771] __x64_sys_clone+0x23f/0x290
[ 3036.070825][ T3771] ? __do_sys_vfork+0x130/0x130
[ 3036.075501][ T3771] ? ksys_write+0x260/0x2c0
[ 3036.079845][ T3771] ? debug_smp_processor_id+0x17/0x20
[ 3036.085064][ T3771] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3036.091090][ T3771] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3036.096632][ T3771] do_syscall_64+0x3d/0xb0
[ 3036.100882][ T3771] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3036.106603][ T3771] RIP: 0033:0x7f024b55cae9
[ 3036.110881][ T3771] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3036.130325][ T3771] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:51:36 executing program 4:
syz_clone(0x0, 0x0, 0x7000, 0x0, 0x0, 0x0)
21:51:36 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000180)}, 0x20) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, &(0x7f0000000180)}, 0x20)
close(r1) (async)
close(r1)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
[ 3036.138713][ T3771] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3036.146700][ T3771] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3036.154512][ T3771] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3036.162419][ T3771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3036.170219][ T3771] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3036.178041][ T3771]
21:51:39 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x2, 0x0, &(0x7f0000000680)='GPL\x00', 0x58c1, 0x10, &(0x7f00000006c0)=""/16, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x0, 0x4, 0x8cf}, 0x10}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80) (async)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000008000000090000000064c1d9e52be3f01e582e2a00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async, rerun: 64)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (rerun: 64)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10)
r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x4, 0x0, 0x3f2b, 0x0, 0x0, 0x0, 0x0, 0x10001}) (async)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001f40)={0x0, 0x80, 0x20, 0x8, 0x5, 0xff, 0x0, 0x0, 0x20200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x9d70}, 0x84090, 0x20, 0x0, 0x9, 0x101, 0x1f, 0x401, 0x0, 0x2, 0x0, 0x401})
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000840)='./file0\x00', 0x0, 0x4008, r0}, 0x18)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000021c0)={r2, 0xe0, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001e80)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000002040)=[0x0], &(0x7f0000002080)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000020c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002100), &(0x7f0000002140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002180)}}, 0x10)
r9 = bpf$ITER_CREATE(0x21, &(0x7f0000002480), 0x8)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002580)={0x11, 0xa, &(0x7f0000001a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_fd={0x18, 0xa, 0x1, 0x0, r7}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000001b40)='GPL\x00', 0x8f88, 0x78, &(0x7f0000001fc0)=""/120, 0x41000, 0x39, '\x00', r8, 0x0, r9, 0x8, &(0x7f00000024c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002500)={0x0, 0x4, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002540)=[r1, r1, r1, r1], 0x0, 0x10, 0x1f}, 0x90)
perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0xff, 0xcd, 0x0, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x84000001, 0x2}, 0x84000, 0x1, 0x5bd, 0x3, 0x8000, 0x4, 0x2, 0x0, 0xff, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3)
r10 = perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x80, 0x1, 0x9, 0x4, 0x0, 0x7d5a, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xa63e0000}, 0xa420, 0x7fffffffffffffff, 0x6, 0x2, 0x2, 0x3, 0x7ff, 0x0, 0x800, 0x0, 0x4}, 0x0, 0xb, r4, 0x3)
ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000800)='threaded\x00')
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c80)={0xffffffffffffffff, 0xe0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40), &(0x7f0000001e00), 0x0, 0x8, &(0x7f0000001e00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001ac0), &(0x7f0000001b00), 0x8, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) (async)
r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001cc0)=r5, 0x4)
bpf$ITER_CREATE(0x21, &(0x7f0000001d80), 0x8) (async, rerun: 32)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001dc0)={0xffffffffffffffff, 0x3ff}, 0xc) (rerun: 32)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ec0)={0x18, 0x1, &(0x7f0000002200)=ANY=[@ANYBLOB="85fa1000ffffffffe39d60417cb659a37f52291794b1d9880bf10a014594aa539919d6046c89fa68424abcf6defdd49c9731eaf71f49dbd5972d4959ca9d1053645b480779c695f3c46599a60475723c3ded17815db3958006452ad90082000000795d14c8da89de02a545dc2a17c376c8098a8b800015ab79ac4828116d280879dc246817c97618efeddd3a570c2e41add05d5ec64983c832838122192381291cec16a81d53f074d89c24117da567d9188893c8829050883495801f73a3354f2410b391ada28abe81e6ff2d51b4e9573571f4f906e463451fdd9bca315a4c452f3fe55892513b79fa3a794a5075b2d7e93a42d9fa8b43f8b65562bd92da6f5801b8cf9971853183008af9712eac75cad3d3fc4dccf8d414c030d4df94e9e586b98fe13767d07ea47eb4a0a2e76fef91e099dab6e98e78aebec1e8da397525207569360dae3bb9fbd1556f4bd4dc0e89120867a1e4f89e307da20003005840720b2d8f01021571e5da632d11576e8961d5c9ab3630371e95413c765a237816e4"], &(0x7f0000000980)='syzkaller\x00', 0x5, 0x1000, &(0x7f00000009c0)=""/4096, 0x40f00, 0x10, '\x00', r12, 0x0, r13, 0x8, &(0x7f0000001d00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001d40)={0x4, 0x4, 0x5, 0x5}, 0x10}, 0x90) (async)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async)
syz_clone(0x76246180, 0x0, 0xd, 0x0, 0x0, 0x0)
21:52:30 executing program 3:
getpid() (async)
r0 = getpid()
write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=r0, 0x12)
r1 = gettid()
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xf7, 0x0, 0x20, 0x80, 0x0, 0x4, 0x414, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000200), 0x8}, 0x1000, 0x8, 0x10001, 0x0, 0x4, 0x1, 0xee, 0x0, 0x2, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xf7, 0x0, 0x20, 0x80, 0x0, 0x4, 0x414, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000200), 0x8}, 0x1000, 0x8, 0x10001, 0x0, 0x4, 0x1, 0xee, 0x0, 0x2, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x20, 0x5, 0x4, 0x5, 0x0, 0x3ae, 0x40402, 0xd, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x3, 0x7}, 0x860, 0xfffffffffffffffe, 0x20, 0x3, 0x7e4e, 0xffffffc3, 0x4c, 0x0, 0x9, 0x0, 0x61700434}, 0x0, 0x5, r2, 0xa)
perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x1, 0xff, 0x59, 0xfb, 0x0, 0x400, 0x4010, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x51a9615a, 0x4, 0x9, 0x3, 0x1, 0x0, 0x8001, 0x0, 0x6}, r0, 0x9, 0xffffffffffffffff, 0x9) (async)
perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x1, 0xff, 0x59, 0xfb, 0x0, 0x400, 0x4010, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x51a9615a, 0x4, 0x9, 0x3, 0x1, 0x0, 0x8001, 0x0, 0x6}, r0, 0x9, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000300))
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000000), 0x12)
21:52:30 executing program 4:
syz_clone(0x0, 0x0, 0x10fff, 0x0, 0x0, 0x0)
21:52:30 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r1 = getpid()
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_pid(r3, &(0x7f0000000040)=r1, 0x8)
21:52:30 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='xprtrdma_cb_setup\x00'}, 0x10)
perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x4, 0x1c, 0x80, 0x81, 0x0, 0x0, 0x0, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x277, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x8420e, 0x2, 0x101, 0x9, 0x1, 0x400, 0x1d0, 0x0, 0xffff7fff, 0x0, 0x51cb6f8d}, r0, 0x10, r1, 0xb)
r2 = getpid()
r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x61, 0x20, 0x1, 0x28, 0x0, 0x1, 0x1500, 0xd, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x1800, 0x9, 0x9, 0x9, 0x2, 0x3, 0x400, 0x0, 0x8, 0x0, 0x2}, r2, 0x10001, r3, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x8000000000000000)
r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8, 0xae, 0x4, 0x20, 0x0, 0x6, 0xc00, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x8800, 0x81, 0x80000000, 0x5, 0x6, 0xfff, 0x44e, 0x0, 0x8, 0x0, 0x58}, r0, 0x4, r4, 0x9)
perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x3, 0x7f, 0x3f, 0x3, 0x0, 0x6, 0x68022, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_bp={&(0x7f00000000c0)}, 0xa000, 0x5, 0x8, 0x7, 0xd66, 0x80, 0x1f, 0x0, 0x1, 0x0, 0x40}, 0x0, 0x10, 0xffffffffffffffff, 0x1)
21:52:30 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31)
21:52:30 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc) (async)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x2, 0x0, &(0x7f0000000680)='GPL\x00', 0x58c1, 0x10, &(0x7f00000006c0)=""/16, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x0, 0x4, 0x8cf}, 0x10}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="0100000008000000090000000064c1d9e52be3f01e582e2a00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) (async)
r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9, 0x4, 0x0, 0x3f2b, 0x0, 0x0, 0x0, 0x0, 0x10001}) (async)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001f40)={0x0, 0x80, 0x20, 0x8, 0x5, 0xff, 0x0, 0x0, 0x20200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x9d70}, 0x84090, 0x20, 0x0, 0x9, 0x101, 0x1f, 0x401, 0x0, 0x2, 0x0, 0x401}) (async)
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000008c0)=@o_path={&(0x7f0000000840)='./file0\x00', 0x0, 0x4008, r0}, 0x18) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000021c0)={r2, 0xe0, &(0x7f0000002380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000001e80)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000002040)=[0x0], &(0x7f0000002080)=[0x0, 0x0], 0x0, 0x8, &(0x7f00000020c0)=[{}, {}], 0x10, 0x10, &(0x7f0000002100), &(0x7f0000002140), 0x8, 0x10, 0x8, 0x8, &(0x7f0000002180)}}, 0x10) (async)
r9 = bpf$ITER_CREATE(0x21, &(0x7f0000002480), 0x8)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002580)={0x11, 0xa, &(0x7f0000001a40)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_fd={0x18, 0xa, 0x1, 0x0, r7}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}]}, &(0x7f0000001b40)='GPL\x00', 0x8f88, 0x78, &(0x7f0000001fc0)=""/120, 0x41000, 0x39, '\x00', r8, 0x0, r9, 0x8, &(0x7f00000024c0)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002500)={0x0, 0x4, 0x0, 0x8}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002540)=[r1, r1, r1, r1], 0x0, 0x10, 0x1f}, 0x90) (async)
perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0xff, 0xcd, 0x0, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x84000001, 0x2}, 0x84000, 0x1, 0x5bd, 0x3, 0x8000, 0x4, 0x2, 0x0, 0xff, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) (async)
r10 = perf_event_open(&(0x7f0000000440)={0x5, 0x80, 0x80, 0x1, 0x9, 0x4, 0x0, 0x7d5a, 0x10, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0xa63e0000}, 0xa420, 0x7fffffffffffffff, 0x6, 0x2, 0x2, 0x3, 0x7ff, 0x0, 0x800, 0x0, 0x4}, 0x0, 0xb, r4, 0x3)
ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x40082406, &(0x7f0000000800)='threaded\x00') (async)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r11, 0x4030582a, &(0x7f0000000040)) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c80)={0xffffffffffffffff, 0xe0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40), &(0x7f0000001e00), 0x0, 0x8, &(0x7f0000001e00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000001ac0), &(0x7f0000001b00), 0x8, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10)
r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001cc0)=r5, 0x4)
bpf$ITER_CREATE(0x21, &(0x7f0000001d80), 0x8)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001dc0)={0xffffffffffffffff, 0x3ff}, 0xc)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000007c0)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ec0)={0x18, 0x1, &(0x7f0000002200)=ANY=[@ANYBLOB="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"], &(0x7f0000000980)='syzkaller\x00', 0x5, 0x1000, &(0x7f00000009c0)=""/4096, 0x40f00, 0x10, '\x00', r12, 0x0, r13, 0x8, &(0x7f0000001d00)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000001d40)={0x4, 0x4, 0x5, 0x5}, 0x10}, 0x90) (async)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async)
syz_clone(0x76246180, 0x0, 0xd, 0x0, 0x0, 0x0)
21:52:30 executing program 4:
syz_clone(0x0, 0x0, 0x20010, 0x0, 0x0, 0x0)
[ 3090.515520][ T3858] FAULT_INJECTION: forcing a failure.
[ 3090.515520][ T3858] name failslab, interval 1, probability 0, space 0, times 0
[ 3090.549239][ T3858] CPU: 0 PID: 3858 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
21:52:30 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async, rerun: 32)
r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='xprtrdma_cb_setup\x00'}, 0x10) (rerun: 32)
perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x4, 0x1c, 0x80, 0x81, 0x0, 0x0, 0x0, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x277, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x8420e, 0x2, 0x101, 0x9, 0x1, 0x400, 0x1d0, 0x0, 0xffff7fff, 0x0, 0x51cb6f8d}, r0, 0x10, r1, 0xb) (async)
r2 = getpid() (async)
r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async)
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x61, 0x20, 0x1, 0x28, 0x0, 0x1, 0x1500, 0xd, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x1800, 0x9, 0x9, 0x9, 0x2, 0x3, 0x400, 0x0, 0x8, 0x0, 0x2}, r2, 0x10001, r3, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x8000000000000000)
r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8, 0xae, 0x4, 0x20, 0x0, 0x6, 0xc00, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x8800, 0x81, 0x80000000, 0x5, 0x6, 0xfff, 0x44e, 0x0, 0x8, 0x0, 0x58}, r0, 0x4, r4, 0x9) (async)
perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x3, 0x7f, 0x3f, 0x3, 0x0, 0x6, 0x68022, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_bp={&(0x7f00000000c0)}, 0xa000, 0x5, 0x8, 0x7, 0xd66, 0x80, 0x1f, 0x0, 0x1, 0x0, 0x40}, 0x0, 0x10, 0xffffffffffffffff, 0x1)
[ 3090.560721][ T3858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3090.570621][ T3858] Call Trace:
[ 3090.573739][ T3858]
[ 3090.576706][ T3858] dump_stack_lvl+0x151/0x1b7
[ 3090.581558][ T3858] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3090.587019][ T3858] dump_stack+0x15/0x17
[ 3090.591382][ T3858] should_fail+0x3c6/0x510
[ 3090.595620][ T3858] __should_failslab+0xa4/0xe0
[ 3090.600221][ T3858] ? vm_area_dup+0x26/0x230
[ 3090.604904][ T3858] should_failslab+0x9/0x20
[ 3090.609254][ T3858] slab_pre_alloc_hook+0x37/0xd0
[ 3090.614104][ T3858] ? vm_area_dup+0x26/0x230
[ 3090.618442][ T3858] kmem_cache_alloc+0x44/0x200
[ 3090.623055][ T3858] vm_area_dup+0x26/0x230
[ 3090.627254][ T3858] copy_mm+0x9a1/0x13e0
[ 3090.631254][ T3858] ? copy_signal+0x610/0x610
[ 3090.635626][ T3858] ? __init_rwsem+0xd6/0x1c0
[ 3090.640054][ T3858] ? copy_signal+0x4e3/0x610
[ 3090.644482][ T3858] copy_process+0x12bc/0x3260
[ 3090.649010][ T3858] ? proc_fail_nth_write+0x20b/0x290
[ 3090.654114][ T3858] ? fsnotify_perm+0x6a/0x5d0
[ 3090.658631][ T3858] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3090.663575][ T3858] ? vfs_write+0x9ec/0x1110
[ 3090.667914][ T3858] kernel_clone+0x21e/0x9e0
[ 3090.672259][ T3858] ? file_end_write+0x1c0/0x1c0
[ 3090.676943][ T3858] ? create_io_thread+0x1e0/0x1e0
[ 3090.681804][ T3858] ? mutex_unlock+0xb2/0x260
[ 3090.686229][ T3858] ? __mutex_lock_slowpath+0x10/0x10
[ 3090.691349][ T3858] __x64_sys_clone+0x23f/0x290
[ 3090.695949][ T3858] ? __do_sys_vfork+0x130/0x130
[ 3090.700643][ T3858] ? ksys_write+0x260/0x2c0
[ 3090.704979][ T3858] ? debug_smp_processor_id+0x17/0x20
[ 3090.710183][ T3858] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3090.716091][ T3858] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3090.721560][ T3858] do_syscall_64+0x3d/0xb0
[ 3090.725809][ T3858] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3090.731538][ T3858] RIP: 0033:0x7f024b55cae9
[ 3090.735788][ T3858] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3090.755411][ T3858] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:52:30 executing program 4:
syz_clone(0x0, 0x0, 0x20200, 0x0, 0x0, 0x0)
21:52:30 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32)
[ 3090.763656][ T3858] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3090.771460][ T3858] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3090.779269][ T3858] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3090.787083][ T3858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3090.794902][ T3858] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3090.802708][ T3858]
21:52:30 executing program 4:
syz_clone(0x0, 0x0, 0x80000, 0x0, 0x0, 0x0)
[ 3090.841231][ T3891] FAULT_INJECTION: forcing a failure.
[ 3090.841231][ T3891] name failslab, interval 1, probability 0, space 0, times 0
[ 3090.867954][ T3891] CPU: 0 PID: 3891 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3090.879421][ T3891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3090.889312][ T3891] Call Trace:
[ 3090.892439][ T3891]
[ 3090.895215][ T3891] dump_stack_lvl+0x151/0x1b7
[ 3090.899733][ T3891] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3090.905200][ T3891] dump_stack+0x15/0x17
[ 3090.909190][ T3891] should_fail+0x3c6/0x510
[ 3090.913452][ T3891] __should_failslab+0xa4/0xe0
[ 3090.918050][ T3891] ? vm_area_dup+0x26/0x230
[ 3090.922381][ T3891] should_failslab+0x9/0x20
[ 3090.926732][ T3891] slab_pre_alloc_hook+0x37/0xd0
[ 3090.931495][ T3891] ? vm_area_dup+0x26/0x230
[ 3090.935838][ T3891] kmem_cache_alloc+0x44/0x200
[ 3090.940435][ T3891] vm_area_dup+0x26/0x230
[ 3090.944617][ T3891] copy_mm+0x9a1/0x13e0
[ 3090.948598][ T3891] ? copy_signal+0x610/0x610
[ 3090.953121][ T3891] ? __init_rwsem+0xd6/0x1c0
[ 3090.957532][ T3891] ? copy_signal+0x4e3/0x610
[ 3090.961961][ T3891] copy_process+0x12bc/0x3260
[ 3090.966565][ T3891] ? proc_fail_nth_write+0x20b/0x290
[ 3090.971693][ T3891] ? fsnotify_perm+0x6a/0x5d0
[ 3090.976293][ T3891] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3090.981259][ T3891] ? vfs_write+0x9ec/0x1110
[ 3090.985601][ T3891] kernel_clone+0x21e/0x9e0
[ 3090.989917][ T3891] ? file_end_write+0x1c0/0x1c0
[ 3090.994605][ T3891] ? create_io_thread+0x1e0/0x1e0
[ 3090.999463][ T3891] ? mutex_unlock+0xb2/0x260
[ 3091.003891][ T3891] ? __mutex_lock_slowpath+0x10/0x10
[ 3091.009013][ T3891] __x64_sys_clone+0x23f/0x290
[ 3091.013614][ T3891] ? __do_sys_vfork+0x130/0x130
[ 3091.018300][ T3891] ? ksys_write+0x260/0x2c0
[ 3091.022639][ T3891] ? debug_smp_processor_id+0x17/0x20
[ 3091.027856][ T3891] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3091.033752][ T3891] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3091.039216][ T3891] do_syscall_64+0x3d/0xb0
[ 3091.043473][ T3891] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3091.049196][ T3891] RIP: 0033:0x7f024b55cae9
[ 3091.053457][ T3891] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3091.072893][ T3891] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3091.081143][ T3891] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
21:52:31 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80)
close(0xffffffffffffffff)
r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r3, &(0x7f00000002c0)='memory.events.local\x00', 0x0, 0x0)
r4 = openat$cgroup_ro(r1, &(0x7f0000000440)='cgroup.freeze\x00', 0x0, 0x0)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r6, &(0x7f0000000180)}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="853b00f8040000000f76ffffffffffff9500000000000000c5c8030699735a2b637a32050000000000000060c0a6164c641b111b8bda38e5d549dfe1f70aab8b296ff1e5c3f3eea3c408b402f393e155b6bd0200000000000000ff951f6b296980c421f7c57edba0e8bb56185bf3591c53894ce9afea9c5e413174207125f37b4a59c5850258c71083bf11560c1b828bb4677ce79d0b010065976e48e3a5ad48bf5568be881cb5e590a191f6192ca9650a921b000d1c61cef6771a2358df6402000000036a1a614cb928415a18b2c1e1288e35f90963c8b97e3dc40202000000000000000000000000000000000000000000ef928d8754f355ae9e8f8f3de0516fb793a40a1fcb2847fe1c106e355d4268fada10500046a72d276ab5e01399cd4625536c4d86f17f189fe11a010646c2d71961038a9102f6cb82a0aa8fa052141a73e9bc1f8b6146ed84491886a42b1d9f55dcf46d63d4ea3b3353a8f28eb44fab9a11aa9aa01387632b65a300ac24cedbcdff337654e32f9e1360a12a0e89b83b179a20afc1526c04dc9eb72dfb4573dea77e0a5ef1893107fa4228da233ffceacff614f3dc710fdf195249f4115803aee50896c2f61b1965bb03b7b38ad6a44af7d39a271b1c4732995c8fa6a6a2200f5630a04a85174706f0757c99596c0e262ea37ae347a019caf565ba5bb0b600"/507], &(0x7f0000000300)='GPL\x00', 0x6, 0xe4, &(0x7f0000000340)=""/228, 0x41100, 0x48, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000480)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x2, 0x3eb82ec3, 0x3}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0xffffffffffffffff, r5, r6], &(0x7f0000000540)=[{0x0, 0x3, 0x0, 0x4}, {0x2, 0x5, 0x3, 0x7}, {0x0, 0x1, 0xa}, {0x5, 0x5, 0x2, 0x2}], 0x10, 0x9}, 0x90)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000600), 0x0, r2}, 0x38)
perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0xbb, 0x5, 0xce, 0x3, 0x0, 0x10000, 0x4, 0xd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2ece, 0x0, @perf_config_ext={0x8}, 0xd400, 0x2, 0x10001, 0x3, 0x0, 0x187e9d36, 0x4, 0x0, 0x1ff, 0x0, 0x4}, r1, 0xf, r0, 0x4)
r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r8 = openat$cgroup_ro(r1, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000140)='blkio.bfq.io_service_time\x00')
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xcd, 0x7f, 0x1, 0x0, 0x0, 0x3, 0x90, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2a, 0x2, @perf_config_ext={0xffff, 0x76}, 0x10280, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x0, 0x0, 0x101, 0x0, 0xffff}, r7, 0x10, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
[ 3091.089040][ T3891] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3091.097108][ T3891] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3091.105013][ T3891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3091.112821][ T3891] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3091.120633][ T3891]
[ 3092.567992][ T3931] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3092.574845][ T3931] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3092.582218][ T3931] device bridge_slave_0 entered promiscuous mode
[ 3092.588932][ T3931] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3092.595755][ T3931] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3092.603154][ T3931] device bridge_slave_1 entered promiscuous mode
[ 3092.640454][ T3931] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3092.647309][ T3931] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3092.654381][ T3931] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3092.661218][ T3931] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3092.680394][T29667] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3092.687538][T29667] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3092.694768][T29667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 3092.702755][T29667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 3092.711792][T29679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 3092.719903][T29679] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3092.726932][T29679] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3092.736314][T29667] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 3092.744543][T29667] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3092.751507][T29667] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3092.767235][T29676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 3092.775131][T29676] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 3092.784639][T29667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 3092.796009][ T3931] device veth0_vlan entered promiscuous mode
[ 3092.802351][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 3092.810469][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 3092.817816][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 3092.828857][T29679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 3092.837736][ T3931] device veth1_macvtap entered promiscuous mode
[ 3092.847710][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 3092.859200][T29667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
21:53:27 executing program 3:
r0 = getpid()
write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=r0, 0x12)
r1 = gettid()
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xf7, 0x0, 0x20, 0x80, 0x0, 0x4, 0x414, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000200), 0x8}, 0x1000, 0x8, 0x10001, 0x0, 0x4, 0x1, 0xee, 0x0, 0x2, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
r3 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x20, 0x5, 0x4, 0x5, 0x0, 0x3ae, 0x40402, 0xd, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x3, 0x7}, 0x860, 0xfffffffffffffffe, 0x20, 0x3, 0x7e4e, 0xffffffc3, 0x4c, 0x0, 0x9, 0x0, 0x61700434}, 0x0, 0x5, r2, 0xa)
perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x1, 0xff, 0x59, 0xfb, 0x0, 0x400, 0x4010, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x51a9615a, 0x4, 0x9, 0x3, 0x1, 0x0, 0x8001, 0x0, 0x6}, r0, 0x9, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000300))
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r5 = openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000000), 0x12)
getpid() (async)
write$cgroup_pid(0xffffffffffffffff, &(0x7f00000002c0)=r0, 0x12) (async)
gettid() (async)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xf7, 0x0, 0x20, 0x80, 0x0, 0x4, 0x414, 0x5, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_bp={&(0x7f0000000200), 0x8}, 0x1000, 0x8, 0x10001, 0x0, 0x4, 0x1, 0xee, 0x0, 0x2, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async)
perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x20, 0x5, 0x4, 0x5, 0x0, 0x3ae, 0x40402, 0xd, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x3, 0x7}, 0x860, 0xfffffffffffffffe, 0x20, 0x3, 0x7e4e, 0xffffffc3, 0x4c, 0x0, 0x9, 0x0, 0x61700434}, 0x0, 0x5, r2, 0xa) (async)
perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x1, 0xff, 0x59, 0xfb, 0x0, 0x400, 0x4010, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x1, 0x51a9615a, 0x4, 0x9, 0x3, 0x1, 0x0, 0x8001, 0x0, 0x6}, r0, 0x9, 0xffffffffffffffff, 0x9) (async)
ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000300)) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r4, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r5, &(0x7f0000000000), 0x12) (async)
21:53:27 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33)
21:53:27 executing program 4:
syz_clone(0x0, 0x0, 0x101000, 0x0, 0x0, 0x0)
21:53:27 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r1 = getpid() (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
write$cgroup_pid(r3, &(0x7f0000000040)=r1, 0x8)
21:53:27 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async, rerun: 64)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (rerun: 64)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) (async)
close(0xffffffffffffffff) (async)
r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) (rerun: 32)
openat$cgroup_ro(r3, &(0x7f00000002c0)='memory.events.local\x00', 0x0, 0x0) (async, rerun: 32)
r4 = openat$cgroup_ro(r1, &(0x7f0000000440)='cgroup.freeze\x00', 0x0, 0x0) (async, rerun: 32)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20) (async)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r6, &(0x7f0000000180)}, 0x20) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="853b00f8040000000f76ffffffffffff9500000000000000c5c8030699735a2b637a32050000000000000060c0a6164c641b111b8bda38e5d549dfe1f70aab8b296ff1e5c3f3eea3c408b402f393e155b6bd0200000000000000ff951f6b296980c421f7c57edba0e8bb56185bf3591c53894ce9afea9c5e413174207125f37b4a59c5850258c71083bf11560c1b828bb4677ce79d0b010065976e48e3a5ad48bf5568be881cb5e590a191f6192ca9650a921b000d1c61cef6771a2358df6402000000036a1a614cb928415a18b2c1e1288e35f90963c8b97e3dc40202000000000000000000000000000000000000000000ef928d8754f355ae9e8f8f3de0516fb793a40a1fcb2847fe1c106e355d4268fada10500046a72d276ab5e01399cd4625536c4d86f17f189fe11a010646c2d71961038a9102f6cb82a0aa8fa052141a73e9bc1f8b6146ed84491886a42b1d9f55dcf46d63d4ea3b3353a8f28eb44fab9a11aa9aa01387632b65a300ac24cedbcdff337654e32f9e1360a12a0e89b83b179a20afc1526c04dc9eb72dfb4573dea77e0a5ef1893107fa4228da233ffceacff614f3dc710fdf195249f4115803aee50896c2f61b1965bb03b7b38ad6a44af7d39a271b1c4732995c8fa6a6a2200f5630a04a85174706f0757c99596c0e262ea37ae347a019caf565ba5bb0b600"/507], &(0x7f0000000300)='GPL\x00', 0x6, 0xe4, &(0x7f0000000340)=""/228, 0x41100, 0x48, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000480)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x2, 0x3eb82ec3, 0x3}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0xffffffffffffffff, r5, r6], &(0x7f0000000540)=[{0x0, 0x3, 0x0, 0x4}, {0x2, 0x5, 0x3, 0x7}, {0x0, 0x1, 0xa}, {0x5, 0x5, 0x2, 0x2}], 0x10, 0x9}, 0x90) (async)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000600), 0x0, r2}, 0x38) (async)
perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0xbb, 0x5, 0xce, 0x3, 0x0, 0x10000, 0x4, 0xd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2ece, 0x0, @perf_config_ext={0x8}, 0xd400, 0x2, 0x10001, 0x3, 0x0, 0x187e9d36, 0x4, 0x0, 0x1ff, 0x0, 0x4}, r1, 0xf, r0, 0x4) (async)
r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
r8 = openat$cgroup_ro(r1, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000140)='blkio.bfq.io_service_time\x00')
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xcd, 0x7f, 0x1, 0x0, 0x0, 0x3, 0x90, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2a, 0x2, @perf_config_ext={0xffff, 0x76}, 0x10280, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x0, 0x0, 0x101, 0x0, 0xffff}, r7, 0x10, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
21:53:27 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0) (async)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='xprtrdma_cb_setup\x00'}, 0x10)
perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0x4, 0x1c, 0x80, 0x81, 0x0, 0x0, 0x0, 0xa, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x277, 0x0, @perf_bp={&(0x7f0000000140), 0x5}, 0x8420e, 0x2, 0x101, 0x9, 0x1, 0x400, 0x1d0, 0x0, 0xffff7fff, 0x0, 0x51cb6f8d}, r0, 0x10, r1, 0xb) (async)
r2 = getpid()
r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async, rerun: 64)
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x61, 0x20, 0x1, 0x28, 0x0, 0x1, 0x1500, 0xd, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp, 0x1800, 0x9, 0x9, 0x9, 0x2, 0x3, 0x400, 0x0, 0x8, 0x0, 0x2}, r2, 0x10001, r3, 0x2) (async, rerun: 64)
ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000100)=0x8000000000000000)
r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8)
perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x8, 0xae, 0x4, 0x20, 0x0, 0x6, 0xc00, 0xc, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000380), 0x8}, 0x8800, 0x81, 0x80000000, 0x5, 0x6, 0xfff, 0x44e, 0x0, 0x8, 0x0, 0x58}, r0, 0x4, r4, 0x9) (async, rerun: 32)
perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x3, 0x7f, 0x3f, 0x3, 0x0, 0x6, 0x68022, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_bp={&(0x7f00000000c0)}, 0xa000, 0x5, 0x8, 0x7, 0xd66, 0x80, 0x1f, 0x0, 0x1, 0x0, 0x40}, 0x0, 0x10, 0xffffffffffffffff, 0x1) (rerun: 32)
21:53:27 executing program 4:
syz_clone(0x0, 0x0, 0x700000, 0x0, 0x0, 0x0)
21:53:28 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000180)}, 0x20)
close(r0)
[ 3147.889986][ T3999] FAULT_INJECTION: forcing a failure.
[ 3147.889986][ T3999] name failslab, interval 1, probability 0, space 0, times 0
21:53:28 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) (async)
close(0xffffffffffffffff) (async)
r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async)
bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async)
openat$cgroup_ro(r3, &(0x7f00000002c0)='memory.events.local\x00', 0x0, 0x0)
r4 = openat$cgroup_ro(r1, &(0x7f0000000440)='cgroup.freeze\x00', 0x0, 0x0) (async)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r6, &(0x7f0000000180)}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="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"/507], &(0x7f0000000300)='GPL\x00', 0x6, 0xe4, &(0x7f0000000340)=""/228, 0x41100, 0x48, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000480)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x2, 0x3eb82ec3, 0x3}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000500)=[0xffffffffffffffff, r5, r6], &(0x7f0000000540)=[{0x0, 0x3, 0x0, 0x4}, {0x2, 0x5, 0x3, 0x7}, {0x0, 0x1, 0xa}, {0x5, 0x5, 0x2, 0x2}], 0x10, 0x9}, 0x90) (async)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000002c0), &(0x7f0000000600), 0x0, r2}, 0x38) (async)
perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x80, 0xbb, 0x5, 0xce, 0x3, 0x0, 0x10000, 0x4, 0xd, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2ece, 0x0, @perf_config_ext={0x8}, 0xd400, 0x2, 0x10001, 0x3, 0x0, 0x187e9d36, 0x4, 0x0, 0x1ff, 0x0, 0x4}, r1, 0xf, r0, 0x4)
r7 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
r8 = openat$cgroup_ro(r1, &(0x7f00000000c0)='net_prio.prioidx\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f0000000140)='blkio.bfq.io_service_time\x00') (async)
perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0xcd, 0x7f, 0x1, 0x0, 0x0, 0x3, 0x90, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf2a, 0x2, @perf_config_ext={0xffff, 0x76}, 0x10280, 0x0, 0x1ff, 0x9, 0x2, 0x1, 0x0, 0x0, 0x101, 0x0, 0xffff}, r7, 0x10, 0xffffffffffffffff, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
[ 3147.960914][ T3999] CPU: 0 PID: 3999 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3147.972396][ T3999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3147.982380][ T3999] Call Trace:
[ 3147.985497][ T3999]
[ 3147.988281][ T3999] dump_stack_lvl+0x151/0x1b7
[ 3147.992798][ T3999] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3147.998264][ T3999] dump_stack+0x15/0x17
[ 3148.002255][ T3999] should_fail+0x3c6/0x510
[ 3148.006511][ T3999] __should_failslab+0xa4/0xe0
[ 3148.011107][ T3999] ? anon_vma_clone+0x9a/0x500
[ 3148.015707][ T3999] should_failslab+0x9/0x20
[ 3148.020046][ T3999] slab_pre_alloc_hook+0x37/0xd0
[ 3148.024820][ T3999] ? anon_vma_clone+0x9a/0x500
[ 3148.029423][ T3999] kmem_cache_alloc+0x44/0x200
[ 3148.034034][ T3999] anon_vma_clone+0x9a/0x500
[ 3148.038447][ T3999] anon_vma_fork+0x91/0x4e0
[ 3148.044003][ T3999] ? anon_vma_name+0x4c/0x70
[ 3148.048431][ T3999] ? vm_area_dup+0x17a/0x230
[ 3148.052853][ T3999] copy_mm+0xa3a/0x13e0
21:53:28 executing program 5:
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x20, 0x10, 0x0}, 0x90)
r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8)
close(r3)
perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x90, 0x2, 0x7, 0x6c, 0x0, 0x8000, 0x200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x80}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x1, 0x5, 0x0, 0x1}, r3, 0x9, r1, 0x2)
perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000500)={0x2, 0x8e, 0x1f, 0x6, 0x0, 0x0, 0x0, 0x40006, 0x800, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x40}, 0x8020, 0x7a, 0x4, 0x3, 0x80000000, 0x0, 0x800, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x64}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000180))
r5 = openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.idle_time\x00', 0x0, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
openat$cgroup(r5, 0x0, 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180))
r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xffffe1fb}, 0xc)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x0, 0x2, 0x4, 0x240, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1, 0xb}, 0x48)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='blkio.bfq.io_merged\x00', 0x0, 0x0)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180))
r10 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r10, &(0x7f0000000180)}, 0x20)
bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x0, r10}, 0x18)
bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x9, &(0x7f00000009c0)=@raw=[@ldst={0x3, 0x0, 0x3, 0x5, 0x2, 0x2, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x20}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x33}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000580)='syzkaller\x00', 0x1, 0x77, &(0x7f00000005c0)=""/119, 0x41000, 0xfd724a64dd281b6d, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000000640)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x10, 0xff, 0xfffffff9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000a80)=[r7, r8, r6, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x2, 0x2, 0x9, 0xc}], 0x10, 0x84b1}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x0, 0x0, 0x0, &(0x7f00000006c0)='GPL\x00', 0x0, 0x63, &(0x7f0000000700)=""/99, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000d00)={0x7}, 0x8, 0x10, &(0x7f0000000d40)={0x0, 0x0, 0x40, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)}, 0x80)
write$cgroup_type(r6, &(0x7f0000000000), 0x248800)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0)
21:53:28 executing program 4:
syz_clone(0x0, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0)
[ 3148.056850][ T3999] ? copy_signal+0x610/0x610
[ 3148.061454][ T3999] ? __init_rwsem+0xd6/0x1c0
[ 3148.065888][ T3999] ? copy_signal+0x4e3/0x610
[ 3148.070306][ T3999] copy_process+0x12bc/0x3260
[ 3148.074821][ T3999] ? proc_fail_nth_write+0x20b/0x290
[ 3148.079940][ T3999] ? fsnotify_perm+0x6a/0x5d0
[ 3148.084467][ T3999] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3148.089402][ T3999] ? vfs_write+0x9ec/0x1110
[ 3148.093744][ T3999] kernel_clone+0x21e/0x9e0
[ 3148.098082][ T3999] ? file_end_write+0x1c0/0x1c0
[ 3148.102864][ T3999] ? create_io_thread+0x1e0/0x1e0
[ 3148.107713][ T3999] ? mutex_unlock+0xb2/0x260
[ 3148.112155][ T3999] ? __mutex_lock_slowpath+0x10/0x10
[ 3148.117282][ T3999] __x64_sys_clone+0x23f/0x290
[ 3148.121865][ T3999] ? __do_sys_vfork+0x130/0x130
[ 3148.126556][ T3999] ? ksys_write+0x260/0x2c0
[ 3148.130889][ T3999] ? debug_smp_processor_id+0x17/0x20
[ 3148.136115][ T3999] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3148.141996][ T3999] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3148.147784][ T3999] do_syscall_64+0x3d/0xb0
[ 3148.151978][ T3999] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3148.157707][ T3999] RIP: 0033:0x7f024b55cae9
[ 3148.161962][ T3999] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3148.181401][ T3999] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3148.189646][ T3999] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3148.197549][ T3999] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
21:53:28 executing program 4:
syz_clone(0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0)
[ 3148.205448][ T3999] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3148.213254][ T3999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3148.221064][ T3999] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3148.228914][ T3999]
[ 3149.663336][ T4047] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3149.670282][ T4047] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3149.677656][ T4047] device bridge_slave_0 entered promiscuous mode
[ 3149.684236][ T4047] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3149.691140][ T4047] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3149.698210][ T4047] device bridge_slave_1 entered promiscuous mode
[ 3149.735473][ T4047] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3149.742346][ T4047] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3149.749634][ T4047] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3149.756497][ T4047] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3149.775797][T29669] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3149.783208][T29669] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3149.790991][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 3149.798434][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 3149.817402][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 3149.826569][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 3149.834478][T29669] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3149.841235][T29669] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3149.848382][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 3149.856427][T29669] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3149.863254][T29669] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3149.871072][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 3149.878834][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 3149.890470][T29678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 3149.898647][T29678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 3149.905861][T29678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 3149.914084][ T4047] device veth0_vlan entered promiscuous mode
[ 3149.924629][ T4047] device veth1_macvtap entered promiscuous mode
[ 3149.933453][T29662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 3149.946250][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
[ 3149.954417][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
21:54:25 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34)
21:54:25 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r1 = getpid()
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_pid(r3, &(0x7f0000000040)=r1, 0x8)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
getpid() (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
write$cgroup_pid(r3, &(0x7f0000000040)=r1, 0x8) (async)
21:54:25 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000180)}, 0x20)
close(r0)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000180)}, 0x20) (async)
close(r0) (async)
21:54:25 executing program 3:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:54:25 executing program 4:
syz_clone(0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0)
21:54:25 executing program 5:
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
r1 = perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="1800001d0000000000000000000000000000400000000000c4a79234706b0c64e36536e01fc6e73fb51b4f6ec788fb0300ecff7af25fdbf2e961bb94329250e3434df1fe3eff3e7e34efc6152f1050cbd53196ac0206de8ef29cdce53c45109533cb76bd52d05c54d82a0e182eb92c0abcd6a868bd9ed1751dc1a6182c8cb2580c050e974129833f597ca0745bc20541193ab02d51d189095a4f0b4b6b364ce0d6ebf308e20c51248640f1d2cfdec5cab9fbf82aa966ce401a12a54d0071a376ce5ab9e1e7cd567c5b8e6e6324d8bb8535d8d943b7671b64654ebeeda304b2f8b288baa0afb5a11a6f5b83a6b9746b59aaf678c3a907bccbe59540ea3232374b07a2830082ea404f3f045ed60aa3f29f10a8f79e9a90451f6e08d482fc1e42836ef4d848a76451efe7b1816a58a2a8e0d473da68db773214561832f192773b7eb36574df0e3f635aea211ad2922aca1f979ad37a27f3eed42be57a93862290c7408f632200af040c85494b805dee10ba9db507917c4f74d110f7291008ad3a68f0cfa7da125d11b772398bb6e78ff6b928b4fcfde5a358e1adc5bb5c0bfc62b807053e845c1f79d830eed74adbfec3da07dd546af462274dbfcc92ac766880a50e01e142dfdeb4283b0a5b9c187814"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x20, 0x10, 0x0}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x20, 0x10, 0x0}, 0x90)
r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8)
close(r3)
perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x90, 0x2, 0x7, 0x6c, 0x0, 0x8000, 0x200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x80}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x1, 0x5, 0x0, 0x1}, r3, 0x9, r1, 0x2) (async)
perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x90, 0x2, 0x7, 0x6c, 0x0, 0x8000, 0x200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x80}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x1, 0x5, 0x0, 0x1}, r3, 0x9, r1, 0x2)
perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000500)={0x2, 0x8e, 0x1f, 0x6, 0x0, 0x0, 0x0, 0x40006, 0x800, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x40}, 0x8020, 0x7a, 0x4, 0x3, 0x80000000, 0x0, 0x800, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x64}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000180))
openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async)
r5 = openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.idle_time\x00', 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
openat$cgroup(r5, 0x0, 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180))
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xffffe1fb}, 0xc) (async)
r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xffffe1fb}, 0xc)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x0, 0x2, 0x4, 0x240, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1, 0xb}, 0x48)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='blkio.bfq.io_merged\x00', 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='blkio.bfq.io_merged\x00', 0x0, 0x0)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180))
r10 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r10, &(0x7f0000000180)}, 0x20)
bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x0, r10}, 0x18)
bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x9, &(0x7f00000009c0)=@raw=[@ldst={0x3, 0x0, 0x3, 0x5, 0x2, 0x2, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x20}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x33}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000580)='syzkaller\x00', 0x1, 0x77, &(0x7f00000005c0)=""/119, 0x41000, 0xfd724a64dd281b6d, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000000640)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x10, 0xff, 0xfffffff9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000a80)=[r7, r8, r6, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x2, 0x2, 0x9, 0xc}], 0x10, 0x84b1}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x9, &(0x7f00000009c0)=@raw=[@ldst={0x3, 0x0, 0x3, 0x5, 0x2, 0x2, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x20}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x33}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000580)='syzkaller\x00', 0x1, 0x77, &(0x7f00000005c0)=""/119, 0x41000, 0xfd724a64dd281b6d, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000000640)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x10, 0xff, 0xfffffff9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000a80)=[r7, r8, r6, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x2, 0x2, 0x9, 0xc}], 0x10, 0x84b1}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x0, 0x0, 0x0, &(0x7f00000006c0)='GPL\x00', 0x0, 0x63, &(0x7f0000000700)=""/99, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000d00)={0x7}, 0x8, 0x10, &(0x7f0000000d40)={0x0, 0x0, 0x40, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)}, 0x80)
write$cgroup_type(r6, &(0x7f0000000000), 0x248800)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0)
21:54:25 executing program 4:
syz_clone(0x0, 0x0, 0x7000000, 0x0, 0x0, 0x0)
21:54:25 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000180)}, 0x20) (async)
close(r0)
[ 3204.987032][ T4111] FAULT_INJECTION: forcing a failure.
[ 3204.987032][ T4111] name failslab, interval 1, probability 0, space 0, times 0
21:54:25 executing program 2:
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x6, [@enum={0x8, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x3ff}, {0xb, 0xffffffff}, {0xd, 0x2ec}, {0x1, 0xff}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x5}}, @volatile={0xa, 0x0, 0x0, 0x9, 0x2}, @func={0xe, 0x0, 0x0, 0xc, 0x4}, @var={0x8, 0x0, 0x0, 0xe, 0x2}, @volatile={0xc, 0x0, 0x0, 0x9, 0x4}, @restrict={0x10, 0x0, 0x0, 0xb, 0x4}, @func={0x7, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x61, 0x2e, 0x0, 0x1e]}}, &(0x7f0000000380)=""/233, 0xba, 0xe9, 0x0, 0x3}, 0x20)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000540)=""/197, 0xc5, 0x0, &(0x7f0000000640)=""/23, 0x17}}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x7, 0x2, &(0x7f0000000700)=@raw=[@jmp={0x5, 0x1, 0x0, 0x5, 0x1, 0xc, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f0000000740)='syzkaller\x00', 0x8fd0, 0xd4, &(0x7f0000000780)=""/212, 0x41100, 0x2, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0x1, 0x1000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000900)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000940)=[{0x0, 0x4, 0x3, 0x1}, {0x0, 0x1, 0x2, 0x1}, {0x2, 0x2, 0xe, 0x9}], 0x10, 0x1ff}, 0x90)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000180)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x20, 0x3, &(0x7f0000000140)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0xb}, @alu={0x4, 0x0, 0x2, 0x6, 0x4, 0x2, 0x8}], &(0x7f0000000180)='GPL\x00', 0x859c, 0xe2, &(0x7f00000001c0)=""/226, 0x41100, 0x1e, '\x00', 0x0, 0x3, r0, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xe, 0x59, 0x9}, 0x10, r1, r2, 0x2, &(0x7f0000000a40)=[r3], &(0x7f0000000a80)=[{0x5, 0x5, 0x0, 0x2}, {0x3, 0x4, 0x2, 0x3}], 0x10, 0x5ad}, 0x90)
socketpair(0x0, 0x0, 0x0, 0x0)
r4 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r5 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8)
ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000100)={0x1, 0x9, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @multicast, @multicast, @random="f78b916a665b", @random="5b71cbf64593", @empty, @empty]})
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xf8, 0xce, 0x6a, 0x1, 0x0, 0x3d, 0x2200, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0xd511abedfb016ef6}, 0x10212, 0x6, 0x5, 0x3, 0x0, 0x9, 0x5, 0x0, 0x9, 0x0, 0x4}, r4, 0x8, 0xffffffffffffffff, 0x0)
[ 3205.055451][ T4111] CPU: 0 PID: 4111 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3205.066925][ T4111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3205.076818][ T4111] Call Trace:
[ 3205.079944][ T4111]
[ 3205.082721][ T4111] dump_stack_lvl+0x151/0x1b7
[ 3205.087242][ T4111] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3205.092716][ T4111] dump_stack+0x15/0x17
[ 3205.096693][ T4111] should_fail+0x3c6/0x510
[ 3205.100948][ T4111] __should_failslab+0xa4/0xe0
21:54:25 executing program 4:
syz_clone(0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0)
[ 3205.105547][ T4111] ? anon_vma_clone+0x9a/0x500
[ 3205.110145][ T4111] should_failslab+0x9/0x20
[ 3205.114489][ T4111] slab_pre_alloc_hook+0x37/0xd0
[ 3205.119263][ T4111] ? anon_vma_clone+0x9a/0x500
[ 3205.123860][ T4111] kmem_cache_alloc+0x44/0x200
[ 3205.128464][ T4111] anon_vma_clone+0x9a/0x500
[ 3205.132893][ T4111] anon_vma_fork+0x91/0x4e0
[ 3205.137226][ T4111] ? anon_vma_name+0x4c/0x70
[ 3205.141652][ T4111] ? vm_area_dup+0x17a/0x230
[ 3205.146167][ T4111] copy_mm+0xa3a/0x13e0
[ 3205.150165][ T4111] ? copy_signal+0x610/0x610
[ 3205.154584][ T4111] ? __init_rwsem+0xd6/0x1c0
[ 3205.159011][ T4111] ? copy_signal+0x4e3/0x610
[ 3205.163443][ T4111] copy_process+0x12bc/0x3260
[ 3205.167958][ T4111] ? proc_fail_nth_write+0x20b/0x290
[ 3205.173073][ T4111] ? fsnotify_perm+0x6a/0x5d0
[ 3205.177587][ T4111] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3205.182531][ T4111] ? vfs_write+0x9ec/0x1110
[ 3205.186876][ T4111] kernel_clone+0x21e/0x9e0
[ 3205.191211][ T4111] ? file_end_write+0x1c0/0x1c0
[ 3205.195907][ T4111] ? create_io_thread+0x1e0/0x1e0
[ 3205.200761][ T4111] ? mutex_unlock+0xb2/0x260
[ 3205.205192][ T4111] ? __mutex_lock_slowpath+0x10/0x10
[ 3205.210305][ T4111] __x64_sys_clone+0x23f/0x290
[ 3205.214902][ T4111] ? __do_sys_vfork+0x130/0x130
[ 3205.219599][ T4111] ? ksys_write+0x260/0x2c0
[ 3205.223930][ T4111] ? debug_smp_processor_id+0x17/0x20
[ 3205.229159][ T4111] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3205.235036][ T4111] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3205.240528][ T4111] do_syscall_64+0x3d/0xb0
[ 3205.244756][ T4111] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3205.250487][ T4111] RIP: 0033:0x7f024b55cae9
[ 3205.254740][ T4111] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3205.274189][ T4111] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3205.282448][ T4111] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3205.290238][ T4111] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3205.298049][ T4111] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3205.305857][ T4111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3205.313673][ T4111] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3205.321488][ T4111]
21:54:25 executing program 2:
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x6, [@enum={0x8, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x3ff}, {0xb, 0xffffffff}, {0xd, 0x2ec}, {0x1, 0xff}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x5}}, @volatile={0xa, 0x0, 0x0, 0x9, 0x2}, @func={0xe, 0x0, 0x0, 0xc, 0x4}, @var={0x8, 0x0, 0x0, 0xe, 0x2}, @volatile={0xc, 0x0, 0x0, 0x9, 0x4}, @restrict={0x10, 0x0, 0x0, 0xb, 0x4}, @func={0x7, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x61, 0x2e, 0x0, 0x1e]}}, &(0x7f0000000380)=""/233, 0xba, 0xe9, 0x0, 0x3}, 0x20)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000540)=""/197, 0xc5, 0x0, &(0x7f0000000640)=""/23, 0x17}}, 0x10)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x7, 0x2, &(0x7f0000000700)=@raw=[@jmp={0x5, 0x1, 0x0, 0x5, 0x1, 0xc, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f0000000740)='syzkaller\x00', 0x8fd0, 0xd4, &(0x7f0000000780)=""/212, 0x41100, 0x2, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0x1, 0x1000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000900)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000940)=[{0x0, 0x4, 0x3, 0x1}, {0x0, 0x1, 0x2, 0x1}, {0x2, 0x2, 0xe, 0x9}], 0x10, 0x1ff}, 0x90)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000180)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x20, 0x3, &(0x7f0000000140)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0xb}, @alu={0x4, 0x0, 0x2, 0x6, 0x4, 0x2, 0x8}], &(0x7f0000000180)='GPL\x00', 0x859c, 0xe2, &(0x7f00000001c0)=""/226, 0x41100, 0x1e, '\x00', 0x0, 0x3, r0, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xe, 0x59, 0x9}, 0x10, r1, r2, 0x2, &(0x7f0000000a40)=[r3], &(0x7f0000000a80)=[{0x5, 0x5, 0x0, 0x2}, {0x3, 0x4, 0x2, 0x3}], 0x10, 0x5ad}, 0x90)
socketpair(0x0, 0x0, 0x0, 0x0)
r4 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r5 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8)
ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000100)={0x1, 0x9, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @multicast, @multicast, @random="f78b916a665b", @random="5b71cbf64593", @empty, @empty]})
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xf8, 0xce, 0x6a, 0x1, 0x0, 0x3d, 0x2200, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0xd511abedfb016ef6}, 0x10212, 0x6, 0x5, 0x3, 0x0, 0x9, 0x5, 0x0, 0x9, 0x0, 0x4}, r4, 0x8, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x6, [@enum={0x8, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x3ff}, {0xb, 0xffffffff}, {0xd, 0x2ec}, {0x1, 0xff}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x5}}, @volatile={0xa, 0x0, 0x0, 0x9, 0x2}, @func={0xe, 0x0, 0x0, 0xc, 0x4}, @var={0x8, 0x0, 0x0, 0xe, 0x2}, @volatile={0xc, 0x0, 0x0, 0x9, 0x4}, @restrict={0x10, 0x0, 0x0, 0xb, 0x4}, @func={0x7, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x61, 0x2e, 0x0, 0x1e]}}, &(0x7f0000000380)=""/233, 0xba, 0xe9, 0x0, 0x3}, 0x20) (async)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000540)=""/197, 0xc5, 0x0, &(0x7f0000000640)=""/23, 0x17}}, 0x10) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x7, 0x2, &(0x7f0000000700)=@raw=[@jmp={0x5, 0x1, 0x0, 0x5, 0x1, 0xc, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f0000000740)='syzkaller\x00', 0x8fd0, 0xd4, &(0x7f0000000780)=""/212, 0x41100, 0x2, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0x1, 0x1000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000900)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000940)=[{0x0, 0x4, 0x3, 0x1}, {0x0, 0x1, 0x2, 0x1}, {0x2, 0x2, 0xe, 0x9}], 0x10, 0x1ff}, 0x90) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000180)}, 0x20) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x20, 0x3, &(0x7f0000000140)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0xb}, @alu={0x4, 0x0, 0x2, 0x6, 0x4, 0x2, 0x8}], &(0x7f0000000180)='GPL\x00', 0x859c, 0xe2, &(0x7f00000001c0)=""/226, 0x41100, 0x1e, '\x00', 0x0, 0x3, r0, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xe, 0x59, 0x9}, 0x10, r1, r2, 0x2, &(0x7f0000000a40)=[r3], &(0x7f0000000a80)=[{0x5, 0x5, 0x0, 0x2}, {0x3, 0x4, 0x2, 0x3}], 0x10, 0x5ad}, 0x90) (async)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async)
ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000100)={0x1, 0x9, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @multicast, @multicast, @random="f78b916a665b", @random="5b71cbf64593", @empty, @empty]}) (async)
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xf8, 0xce, 0x6a, 0x1, 0x0, 0x3d, 0x2200, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0xd511abedfb016ef6}, 0x10212, 0x6, 0x5, 0x3, 0x0, 0x9, 0x5, 0x0, 0x9, 0x0, 0x4}, r4, 0x8, 0xffffffffffffffff, 0x0) (async)
21:54:25 executing program 5:
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) (async)
r1 = perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x20, 0x10, 0x0}, 0x90) (async)
r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8)
close(r3)
perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x80, 0x90, 0x2, 0x7, 0x6c, 0x0, 0x8000, 0x200, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x7f, 0x80}, 0x0, 0x0, 0x0, 0x9, 0x7, 0x1, 0x5, 0x0, 0x1}, r3, 0x9, r1, 0x2)
perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000500)={0x2, 0x8e, 0x1f, 0x6, 0x0, 0x0, 0x0, 0x40006, 0x800, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x8, 0x40}, 0x8020, 0x7a, 0x4, 0x3, 0x80000000, 0x0, 0x800, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x64}, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000180))
r5 = openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
openat$cgroup(r5, 0x0, 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) (async)
r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0xffffffffffffffff, 0xffffe1fb}, 0xc) (async)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@bloom_filter={0x1e, 0x0, 0x2, 0x4, 0x240, r3, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x1, 0xb}, 0x48)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='blkio.bfq.io_merged\x00', 0x0, 0x0)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) (async)
r10 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r10, &(0x7f0000000180)}, 0x20)
bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)=@o_path={&(0x7f0000000040)='./file0\x00', 0x0, 0x0, r10}, 0x18)
bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x9, &(0x7f00000009c0)=@raw=[@ldst={0x3, 0x0, 0x3, 0x5, 0x2, 0x2, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x9}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x20}, @map_val={0x18, 0x4, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x33}, @map_val={0x18, 0xb, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000000580)='syzkaller\x00', 0x1, 0x77, &(0x7f00000005c0)=""/119, 0x41000, 0xfd724a64dd281b6d, '\x00', 0x0, 0x23, r5, 0x8, &(0x7f0000000640)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000680)={0x3, 0x10, 0xff, 0xfffffff9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, &(0x7f0000000a80)=[r7, r8, r6, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000008c0)=[{0x2, 0x2, 0x9, 0xc}], 0x10, 0x84b1}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000dc0)={0x0, 0x0, 0x0, &(0x7f00000006c0)='GPL\x00', 0x0, 0x63, &(0x7f0000000700)=""/99, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000d00)={0x7}, 0x8, 0x10, &(0x7f0000000d40)={0x0, 0x0, 0x40, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d80)}, 0x80) (async)
write$cgroup_type(r6, &(0x7f0000000000), 0x248800) (async)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0)
21:54:25 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35)
[ 3205.569984][ T4168] FAULT_INJECTION: forcing a failure.
[ 3205.569984][ T4168] name failslab, interval 1, probability 0, space 0, times 0
[ 3205.593685][ T4168] CPU: 1 PID: 4168 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3205.605159][ T4168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3205.615054][ T4168] Call Trace:
[ 3205.618173][ T4168]
[ 3205.620966][ T4168] dump_stack_lvl+0x151/0x1b7
[ 3205.625476][ T4168] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3205.630940][ T4168] dump_stack+0x15/0x17
[ 3205.634923][ T4168] should_fail+0x3c6/0x510
[ 3205.639181][ T4168] __should_failslab+0xa4/0xe0
[ 3205.643781][ T4168] ? anon_vma_clone+0x9a/0x500
[ 3205.648394][ T4168] should_failslab+0x9/0x20
[ 3205.652720][ T4168] slab_pre_alloc_hook+0x37/0xd0
[ 3205.657495][ T4168] ? anon_vma_clone+0x9a/0x500
[ 3205.662101][ T4168] kmem_cache_alloc+0x44/0x200
[ 3205.666696][ T4168] anon_vma_clone+0x9a/0x500
[ 3205.671126][ T4168] anon_vma_fork+0x91/0x4e0
[ 3205.675458][ T4168] ? anon_vma_name+0x4c/0x70
[ 3205.679886][ T4168] ? vm_area_dup+0x17a/0x230
[ 3205.684320][ T4168] copy_mm+0xa3a/0x13e0
[ 3205.688311][ T4168] ? copy_signal+0x610/0x610
[ 3205.692733][ T4168] ? __init_rwsem+0xd6/0x1c0
[ 3205.697246][ T4168] ? copy_signal+0x4e3/0x610
[ 3205.701749][ T4168] copy_process+0x12bc/0x3260
[ 3205.706273][ T4168] ? proc_fail_nth_write+0x20b/0x290
[ 3205.711430][ T4168] ? fsnotify_perm+0x6a/0x5d0
[ 3205.715908][ T4168] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3205.721028][ T4168] ? vfs_write+0x9ec/0x1110
[ 3205.725367][ T4168] kernel_clone+0x21e/0x9e0
[ 3205.729732][ T4168] ? file_end_write+0x1c0/0x1c0
[ 3205.734506][ T4168] ? create_io_thread+0x1e0/0x1e0
[ 3205.739725][ T4168] ? mutex_unlock+0xb2/0x260
[ 3205.744226][ T4168] ? __mutex_lock_slowpath+0x10/0x10
[ 3205.749513][ T4168] __x64_sys_clone+0x23f/0x290
[ 3205.754132][ T4168] ? __do_sys_vfork+0x130/0x130
[ 3205.758889][ T4168] ? ksys_write+0x260/0x2c0
[ 3205.763230][ T4168] ? debug_smp_processor_id+0x17/0x20
[ 3205.768693][ T4168] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3205.774685][ T4168] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3205.780197][ T4168] do_syscall_64+0x3d/0xb0
[ 3205.784598][ T4168] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3205.790305][ T4168] RIP: 0033:0x7f024b55cae9
[ 3205.794557][ T4168] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3205.814017][ T4168] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3205.822246][ T4168] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3205.830058][ T4168] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3205.837872][ T4168] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3205.845684][ T4168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3205.853490][ T4168] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3205.861306][ T4168]
[ 3207.041558][ T4172] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3207.048455][ T4172] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3207.055571][ T4172] device bridge_slave_0 entered promiscuous mode
[ 3207.062483][ T4172] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3207.069412][ T4172] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3207.076636][ T4172] device bridge_slave_1 entered promiscuous mode
[ 3207.113572][ T4172] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3207.120544][ T4172] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3207.127631][ T4172] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3207.134405][ T4172] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3207.153868][T29679] bridge0: port 1(bridge_slave_0) entered disabled state
[ 3207.160978][T29679] bridge0: port 2(bridge_slave_1) entered disabled state
[ 3207.168417][T29679] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[ 3207.175608][T29679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[ 3207.185131][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[ 3207.193210][T29669] bridge0: port 1(bridge_slave_0) entered blocking state
[ 3207.200055][T29669] bridge0: port 1(bridge_slave_0) entered forwarding state
[ 3207.217461][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[ 3207.225406][T29669] bridge0: port 2(bridge_slave_1) entered blocking state
[ 3207.232262][T29669] bridge0: port 2(bridge_slave_1) entered forwarding state
[ 3207.239420][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[ 3207.247317][T29669] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[ 3207.257509][T29662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready
[ 3207.269426][ T4172] device veth0_vlan entered promiscuous mode
[ 3207.276479][T29679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready
[ 3207.284256][T29679] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready
[ 3207.291906][T29679] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready
[ 3207.302783][T29662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready
[ 3207.312037][ T4172] device veth1_macvtap entered promiscuous mode
21:54:27 executing program 3:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:54:27 executing program 2:
r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9c, 0x9c, 0x6, [@enum={0x8, 0x4, 0x0, 0x6, 0x4, [{0x2, 0x3ff}, {0xb, 0xffffffff}, {0xd, 0x2ec}, {0x1, 0xff}]}, @restrict={0x6, 0x0, 0x0, 0xb, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x5, 0x5}}, @volatile={0xa, 0x0, 0x0, 0x9, 0x2}, @func={0xe, 0x0, 0x0, 0xc, 0x4}, @var={0x8, 0x0, 0x0, 0xe, 0x2}, @volatile={0xc, 0x0, 0x0, 0x9, 0x4}, @restrict={0x10, 0x0, 0x0, 0xb, 0x4}, @func={0x7, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x61, 0x2e, 0x0, 0x1e]}}, &(0x7f0000000380)=""/233, 0xba, 0xe9, 0x0, 0x3}, 0x20)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000540)=""/197, 0xc5, 0x0, &(0x7f0000000640)=""/23, 0x17}}, 0x10)
bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x7, 0x2, &(0x7f0000000700)=@raw=[@jmp={0x5, 0x1, 0x0, 0x5, 0x1, 0xc, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f0000000740)='syzkaller\x00', 0x8fd0, 0xd4, &(0x7f0000000780)=""/212, 0x41100, 0x2, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0x1, 0x1000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000900)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000940)=[{0x0, 0x4, 0x3, 0x1}, {0x0, 0x1, 0x2, 0x1}, {0x2, 0x2, 0xe, 0x9}], 0x10, 0x1ff}, 0x90) (async)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x7, 0x2, &(0x7f0000000700)=@raw=[@jmp={0x5, 0x1, 0x0, 0x5, 0x1, 0xc, 0x10}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f0000000740)='syzkaller\x00', 0x8fd0, 0xd4, &(0x7f0000000780)=""/212, 0x41100, 0x2, '\x00', 0x0, 0x2c, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0xa, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x1, 0x9, 0x1, 0x1000}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x3, &(0x7f0000000900)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff], &(0x7f0000000940)=[{0x0, 0x4, 0x3, 0x1}, {0x0, 0x1, 0x2, 0x1}, {0x2, 0x2, 0xe, 0x9}], 0x10, 0x1ff}, 0x90)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000180)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x20, 0x3, &(0x7f0000000140)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0xb}, @alu={0x4, 0x0, 0x2, 0x6, 0x4, 0x2, 0x8}], &(0x7f0000000180)='GPL\x00', 0x859c, 0xe2, &(0x7f00000001c0)=""/226, 0x41100, 0x1e, '\x00', 0x0, 0x3, r0, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xe, 0x59, 0x9}, 0x10, r1, r2, 0x2, &(0x7f0000000a40)=[r3], &(0x7f0000000a80)=[{0x5, 0x5, 0x0, 0x2}, {0x3, 0x4, 0x2, 0x3}], 0x10, 0x5ad}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x20, 0x3, &(0x7f0000000140)=@raw=[@map_idx={0x18, 0x1, 0x5, 0x0, 0xb}, @alu={0x4, 0x0, 0x2, 0x6, 0x4, 0x2, 0x8}], &(0x7f0000000180)='GPL\x00', 0x859c, 0xe2, &(0x7f00000001c0)=""/226, 0x41100, 0x1e, '\x00', 0x0, 0x3, r0, 0x8, &(0x7f00000004c0)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000500)={0x5, 0xe, 0x59, 0x9}, 0x10, r1, r2, 0x2, &(0x7f0000000a40)=[r3], &(0x7f0000000a80)=[{0x5, 0x5, 0x0, 0x2}, {0x3, 0x4, 0x2, 0x3}], 0x10, 0x5ad}, 0x90)
socketpair(0x0, 0x0, 0x0, 0x0)
r4 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r5 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8)
ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000100)={0x1, 0x9, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @multicast, @multicast, @random="f78b916a665b", @random="5b71cbf64593", @empty, @empty]}) (async)
ioctl$TUNSETTXFILTER(r5, 0x400454d1, &(0x7f0000000100)={0x1, 0x9, [@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @multicast, @multicast, @random="f78b916a665b", @random="5b71cbf64593", @empty, @empty]})
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0xf8, 0xce, 0x6a, 0x1, 0x0, 0x3d, 0x2200, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0xd511abedfb016ef6}, 0x10212, 0x6, 0x5, 0x3, 0x0, 0x9, 0x5, 0x0, 0x9, 0x0, 0x4}, r4, 0x8, 0xffffffffffffffff, 0x0)
21:54:27 executing program 4:
syz_clone(0x0, 0x0, 0x9000000, 0x0, 0x0, 0x0)
21:54:27 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:27 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x3, 0x3ff, 0x7fffffff, 0x9f4, 0x3, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
gettid()
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfdfffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="dcfad33789175c41987037ca99cbdbb6ba69fe4b1ea1eb32f54fdf052aaeee23b38fee5d299fcacc6a9c196c16a21581684a6fa6f99c82"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='ext4_es_insert_delayed_block\x00', r0}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sys_exit\x00', r2}, 0x10)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xe18676d968224d3f}, 0x20)
write$cgroup_type(r1, &(0x7f0000000180), 0x40001)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10)
r3 = getpid()
perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xb)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r1}, 0x10)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x6, 0x4, 0x2, 0x6, 0x0, 0x1, 0x10000, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x2040, 0x0, 0x4, 0x8, 0x6, 0x1, 0x4, 0x0, 0x9, 0x0, 0xfffffffffffff375}, r3, 0xe, r4, 0x2)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='rdma.current\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x84, &(0x7f0000000780)=""/132, 0x40f00, 0xe, '\x00', r5, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x10000}, 0x8, 0x10, &(0x7f0000000900)={0x2, 0xc, 0x4, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)}, 0x80)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='rdma.current\x00', 0x26e1, 0x0)
r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0xc, &(0x7f00000009c0)=@raw=[@generic={0x80, 0x0, 0x4, 0x7fff, 0x97}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}, @ldst={0x2, 0x2, 0x6, 0x9, 0x7, 0xfffffffffffffffc, 0x1}, @alu={0x4, 0x0, 0x8, 0x5, 0xa, 0x80, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0xc, 0x5, 0x0, 0x2}, @generic={0x1, 0xa, 0x5, 0x4, 0x5}], &(0x7f0000000740)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x60, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x5, 0x1, 0x7460}, 0x10, 0x280b1, r1, 0x8, 0x0, &(0x7f0000000ac0)=[{0x4, 0x3, 0x1, 0x3}, {0x5, 0x5, 0xd, 0x2}, {0x3, 0x2, 0x4, 0x8}, {0x2, 0x2, 0xf, 0x3}, {0x1, 0x1, 0x2}, {0x5, 0x5, 0x0, 0xb}, {0x2, 0x1, 0xa, 0x4}, {0x0, 0x3, 0xa}], 0x10, 0xcf56}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r6, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000c00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000c40)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000cc0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10)
21:54:27 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36)
[ 3207.321690][T29679] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready
[ 3207.333125][T29662] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready
21:54:27 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async)
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
[ 3207.369238][ T4186] FAULT_INJECTION: forcing a failure.
[ 3207.369238][ T4186] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3207.395462][ T4186] CPU: 1 PID: 4186 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3207.406935][ T4186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3207.416831][ T4186] Call Trace:
[ 3207.419971][ T4186]
[ 3207.422736][ T4186] dump_stack_lvl+0x151/0x1b7
[ 3207.427246][ T4186] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3207.432709][ T4186] dump_stack+0x15/0x17
[ 3207.436703][ T4186] should_fail+0x3c6/0x510
[ 3207.440967][ T4186] should_fail_alloc_page+0x5a/0x80
[ 3207.445989][ T4186] prepare_alloc_pages+0x15c/0x700
[ 3207.450933][ T4186] ? __alloc_pages+0x5e0/0x5e0
[ 3207.455534][ T4186] ? __alloc_pages_bulk+0xe60/0xe60
[ 3207.460569][ T4186] __alloc_pages+0x138/0x5e0
[ 3207.464995][ T4186] ? prep_new_page+0x110/0x110
[ 3207.469598][ T4186] ? 0xffffffffa0028480
[ 3207.473599][ T4186] ? is_bpf_text_address+0x172/0x190
[ 3207.478710][ T4186] pte_alloc_one+0x73/0x1b0
[ 3207.483576][ T4186] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3207.488602][ T4186] ? arch_stack_walk+0xf3/0x140
[ 3207.493291][ T4186] __pte_alloc+0x86/0x350
[ 3207.497457][ T4186] ? free_pgtables+0x280/0x280
[ 3207.502054][ T4186] ? _raw_spin_lock+0xa4/0x1b0
[ 3207.506773][ T4186] ? __kasan_check_write+0x14/0x20
[ 3207.511705][ T4186] copy_page_range+0x28a8/0x2f90
[ 3207.516475][ T4186] ? __kasan_slab_alloc+0xb1/0xe0
[ 3207.521338][ T4186] ? pfn_valid+0x1e0/0x1e0
[ 3207.525757][ T4186] ? vma_gap_callbacks_rotate+0x1b7/0x210
[ 3207.531322][ T4186] ? __rb_insert_augmented+0x5de/0x610
[ 3207.536608][ T4186] copy_mm+0xc7e/0x13e0
[ 3207.540603][ T4186] ? copy_signal+0x610/0x610
[ 3207.545029][ T4186] ? __init_rwsem+0xd6/0x1c0
[ 3207.549452][ T4186] ? copy_signal+0x4e3/0x610
[ 3207.553878][ T4186] copy_process+0x12bc/0x3260
[ 3207.558394][ T4186] ? proc_fail_nth_write+0x20b/0x290
[ 3207.563514][ T4186] ? fsnotify_perm+0x6a/0x5d0
[ 3207.568040][ T4186] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3207.572983][ T4186] ? vfs_write+0x9ec/0x1110
[ 3207.577315][ T4186] kernel_clone+0x21e/0x9e0
[ 3207.581653][ T4186] ? file_end_write+0x1c0/0x1c0
[ 3207.586339][ T4186] ? create_io_thread+0x1e0/0x1e0
[ 3207.591199][ T4186] ? mutex_unlock+0xb2/0x260
[ 3207.595627][ T4186] ? __mutex_lock_slowpath+0x10/0x10
[ 3207.600751][ T4186] __x64_sys_clone+0x23f/0x290
[ 3207.605346][ T4186] ? __do_sys_vfork+0x130/0x130
[ 3207.610045][ T4186] ? ksys_write+0x260/0x2c0
[ 3207.614376][ T4186] ? debug_smp_processor_id+0x17/0x20
[ 3207.619581][ T4186] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3207.625489][ T4186] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3207.630952][ T4186] do_syscall_64+0x3d/0xb0
[ 3207.635207][ T4186] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3207.640933][ T4186] RIP: 0033:0x7f024b55cae9
[ 3207.645187][ T4186] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
21:54:27 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37)
21:54:27 executing program 4:
syz_clone(0x0, 0x0, 0x10000200, 0x0, 0x0, 0x0)
21:54:27 executing program 3:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
[ 3207.664629][ T4186] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3207.672875][ T4186] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3207.680693][ T4186] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3207.688495][ T4186] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3207.696309][ T4186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3207.704205][ T4186] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3207.712021][ T4186]
21:54:27 executing program 2:
r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x4, 0x5, 0x1f, 0x0, 0x1f, 0x80001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0x4}, 0xa60, 0x9, 0x4, 0x8, 0x7, 0x1, 0xaa, 0x0, 0x0, 0x0, 0xb3}, 0x0, 0xc, 0xffffffffffffffff, 0x3)
socketpair(0x0, 0x0, 0x0, 0x0)
r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x80, 0x8f, 0x7, 0x1, 0x20, 0x0, 0x8, 0x1088, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x92, 0x1, @perf_bp={&(0x7f00000002c0), 0xe}, 0x80030, 0x4, 0x3, 0x0, 0x1, 0x2f87, 0x7fff, 0x0, 0x9, 0x0, 0xe8e9}, 0xffffffffffffffff, 0xf, r0, 0x2)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x8, 0x80, 0x5, 0x3, 0x0, 0x9, 0x400, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x60, 0x1, @perf_config_ext={0x80}, 0xc739, 0xadf7, 0xf, 0x8, 0x9, 0x3f, 0x4b2, 0x0, 0x9, 0x0, 0x8}, 0x0, 0xc, r1, 0x2)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
syz_clone(0xa80, &(0x7f0000000080)="256a4d9c0c8dd67c90060b631aeaf142ba24dd078ab9be9c6ef4228ed52f38f8dba9bf3d439f3bddd35f940e97d687d8f5d2440c8a3c00d0d6b271dd1b0fe7906a4938ca4306c0bb6a0fc8b9e77bad5b2dae8d6a69bd12d9823bd3935808a5f1e9f2698bfc408ec892f4ce963fe8fe9e128b61281578bcab81f9b61912a7e66d7eff3bee3aca73426cfc0a758dddda64045298d3bff6fbdbaf4f31aeb6b08bbfa09625bb4992a052e48a43286980679bfa4e16712734a48b4993", 0xba, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="4ff4b88239505bdc4c788a33e04e38e2648bfd277f174ed1c4ed3549ab3f3f7973cd12c03fddb1e49a300a193e9f74ca62cb88d3ed56a290ca42dd0400d18c48312f9b0e2d7454aac6d5")
21:54:27 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
[ 3207.742233][ T4200] FAULT_INJECTION: forcing a failure.
[ 3207.742233][ T4200] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3207.774644][ T4200] CPU: 0 PID: 4200 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
21:54:27 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup, r3, 0x2e, 0x0, 0x0, @prog_fd=r5}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0))
recvmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x2)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000500)=0x6)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r8, &(0x7f0000000180)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@exit, @generic={0x3f, 0x3, 0x9, 0x85ba, 0xfffff410}, @cb_func={0x18, 0x9}, @ldst={0x1, 0x1, 0x3, 0xb, 0x3, 0x6, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000180)='GPL\x00', 0x3, 0x4d, &(0x7f00000001c0)=""/77, 0x40f00, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x3, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[0xffffffffffffffff, r7, r4, r8], &(0x7f0000000300)=[{0x0, 0x2, 0x2, 0xa}, {0x0, 0x1, 0x7, 0x4}, {0x5, 0x2, 0x4, 0x2}, {0x0, 0x4, 0xa, 0xc}, {0x2, 0x1, 0x7, 0x3}, {0x5, 0x1, 0xa, 0x5}], 0x10, 0x800}, 0x90)
21:54:27 executing program 2:
r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x4, 0x5, 0x1f, 0x0, 0x1f, 0x80001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0x4}, 0xa60, 0x9, 0x4, 0x8, 0x7, 0x1, 0xaa, 0x0, 0x0, 0x0, 0xb3}, 0x0, 0xc, 0xffffffffffffffff, 0x3)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x80, 0x8f, 0x7, 0x1, 0x20, 0x0, 0x8, 0x1088, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x92, 0x1, @perf_bp={&(0x7f00000002c0), 0xe}, 0x80030, 0x4, 0x3, 0x0, 0x1, 0x2f87, 0x7fff, 0x0, 0x9, 0x0, 0xe8e9}, 0xffffffffffffffff, 0xf, r0, 0x2)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x8, 0x80, 0x5, 0x3, 0x0, 0x9, 0x400, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x60, 0x1, @perf_config_ext={0x80}, 0xc739, 0xadf7, 0xf, 0x8, 0x9, 0x3f, 0x4b2, 0x0, 0x9, 0x0, 0x8}, 0x0, 0xc, r1, 0x2) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
syz_clone(0xa80, &(0x7f0000000080)="256a4d9c0c8dd67c90060b631aeaf142ba24dd078ab9be9c6ef4228ed52f38f8dba9bf3d439f3bddd35f940e97d687d8f5d2440c8a3c00d0d6b271dd1b0fe7906a4938ca4306c0bb6a0fc8b9e77bad5b2dae8d6a69bd12d9823bd3935808a5f1e9f2698bfc408ec892f4ce963fe8fe9e128b61281578bcab81f9b61912a7e66d7eff3bee3aca73426cfc0a758dddda64045298d3bff6fbdbaf4f31aeb6b08bbfa09625bb4992a052e48a43286980679bfa4e16712734a48b4993", 0xba, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="4ff4b88239505bdc4c788a33e04e38e2648bfd277f174ed1c4ed3549ab3f3f7973cd12c03fddb1e49a300a193e9f74ca62cb88d3ed56a290ca42dd0400d18c48312f9b0e2d7454aac6d5")
21:54:27 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
[ 3207.786111][ T4200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3207.796013][ T4200] Call Trace:
[ 3207.799130][ T4200]
[ 3207.801906][ T4200] dump_stack_lvl+0x151/0x1b7
[ 3207.806426][ T4200] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3207.811890][ T4200] dump_stack+0x15/0x17
[ 3207.815877][ T4200] should_fail+0x3c6/0x510
[ 3207.820135][ T4200] should_fail_alloc_page+0x5a/0x80
[ 3207.825167][ T4200] prepare_alloc_pages+0x15c/0x700
[ 3207.830116][ T4200] ? __alloc_pages_bulk+0xe60/0xe60
[ 3207.835149][ T4200] __alloc_pages+0x138/0x5e0
21:54:27 executing program 4:
syz_clone(0x0, 0x0, 0x11000000, 0x0, 0x0, 0x0)
[ 3207.839575][ T4200] ? stack_trace_save+0x1c0/0x1c0
[ 3207.844434][ T4200] ? prep_new_page+0x110/0x110
[ 3207.849038][ T4200] get_zeroed_page+0x19/0x40
[ 3207.853464][ T4200] __pud_alloc+0x8b/0x260
[ 3207.857627][ T4200] ? stack_trace_snprint+0xf0/0xf0
[ 3207.862576][ T4200] ? do_handle_mm_fault+0x2330/0x2330
[ 3207.868129][ T4200] ? __stack_depot_save+0x34/0x470
[ 3207.873077][ T4200] ? anon_vma_clone+0x9a/0x500
[ 3207.877677][ T4200] copy_page_range+0x2bcf/0x2f90
[ 3207.882446][ T4200] ? __kasan_slab_alloc+0xb1/0xe0
[ 3207.887311][ T4200] ? slab_post_alloc_hook+0x53/0x2c0
[ 3207.892465][ T4200] ? copy_mm+0xa3a/0x13e0
[ 3207.896597][ T4200] ? copy_process+0x12bc/0x3260
[ 3207.901283][ T4200] ? kernel_clone+0x21e/0x9e0
[ 3207.905797][ T4200] ? __x64_sys_clone+0x23f/0x290
[ 3207.910573][ T4200] ? do_syscall_64+0x3d/0xb0
[ 3207.914999][ T4200] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3207.920912][ T4200] ? pfn_valid+0x1e0/0x1e0
[ 3207.925154][ T4200] ? rwsem_write_trylock+0x15b/0x290
[ 3207.930275][ T4200] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0
[ 3207.936530][ T4200] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3207.942083][ T4200] ? __rb_insert_augmented+0x5de/0x610
[ 3207.947378][ T4200] copy_mm+0xc7e/0x13e0
[ 3207.951369][ T4200] ? copy_signal+0x610/0x610
[ 3207.955793][ T4200] ? __init_rwsem+0xd6/0x1c0
[ 3207.960231][ T4200] ? copy_signal+0x4e3/0x610
[ 3207.964645][ T4200] copy_process+0x12bc/0x3260
[ 3207.969166][ T4200] ? proc_fail_nth_write+0x20b/0x290
[ 3207.974277][ T4200] ? fsnotify_perm+0x6a/0x5d0
[ 3207.978791][ T4200] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3207.983734][ T4200] ? vfs_write+0x9ec/0x1110
[ 3207.988075][ T4200] kernel_clone+0x21e/0x9e0
[ 3207.992413][ T4200] ? file_end_write+0x1c0/0x1c0
[ 3207.997098][ T4200] ? create_io_thread+0x1e0/0x1e0
[ 3208.001957][ T4200] ? mutex_unlock+0xb2/0x260
[ 3208.006387][ T4200] ? __mutex_lock_slowpath+0x10/0x10
[ 3208.011510][ T4200] __x64_sys_clone+0x23f/0x290
[ 3208.016115][ T4200] ? __do_sys_vfork+0x130/0x130
[ 3208.020892][ T4200] ? ksys_write+0x260/0x2c0
[ 3208.025232][ T4200] ? debug_smp_processor_id+0x17/0x20
[ 3208.030438][ T4200] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3208.036346][ T4200] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3208.041815][ T4200] do_syscall_64+0x3d/0xb0
[ 3208.046060][ T4200] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3208.051797][ T4200] RIP: 0033:0x7f024b55cae9
[ 3208.056043][ T4200] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3208.075570][ T4200] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3208.083816][ T4200] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
21:54:28 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x3, 0x3ff, 0x7fffffff, 0x9f4, 0x3, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
gettid()
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfdfffffffffffff, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="dcfad33789175c41987037ca99cbdbb6ba69fe4b1ea1eb32f54fdf052aaeee23b38fee5d299fcacc6a9c196c16a21581684a6fa6f99c82"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='ext4_es_insert_delayed_block\x00', r0}, 0x10) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sys_exit\x00', r2}, 0x10) (async)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xe18676d968224d3f}, 0x20) (async)
write$cgroup_type(r1, &(0x7f0000000180), 0x40001)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10)
r3 = getpid()
perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xb)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r1}, 0x10)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x6, 0x4, 0x2, 0x6, 0x0, 0x1, 0x10000, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x2040, 0x0, 0x4, 0x8, 0x6, 0x1, 0x4, 0x0, 0x9, 0x0, 0xfffffffffffff375}, r3, 0xe, r4, 0x2) (async)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='rdma.current\x00', 0x26e1, 0x0) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x84, &(0x7f0000000780)=""/132, 0x40f00, 0xe, '\x00', r5, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x10000}, 0x8, 0x10, &(0x7f0000000900)={0x2, 0xc, 0x4, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)}, 0x80) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='rdma.current\x00', 0x26e1, 0x0)
r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0xc, &(0x7f00000009c0)=@raw=[@generic={0x80, 0x0, 0x4, 0x7fff, 0x97}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}, @ldst={0x2, 0x2, 0x6, 0x9, 0x7, 0xfffffffffffffffc, 0x1}, @alu={0x4, 0x0, 0x8, 0x5, 0xa, 0x80, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0xc, 0x5, 0x0, 0x2}, @generic={0x1, 0xa, 0x5, 0x4, 0x5}], &(0x7f0000000740)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x60, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x5, 0x1, 0x7460}, 0x10, 0x280b1, r1, 0x8, 0x0, &(0x7f0000000ac0)=[{0x4, 0x3, 0x1, 0x3}, {0x5, 0x5, 0xd, 0x2}, {0x3, 0x2, 0x4, 0x8}, {0x2, 0x2, 0xf, 0x3}, {0x1, 0x1, 0x2}, {0x5, 0x5, 0x0, 0xb}, {0x2, 0x1, 0xa, 0x4}, {0x0, 0x3, 0xa}], 0x10, 0xcf56}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r6, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000c00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000c40)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000cc0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10)
21:54:28 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:28 executing program 2:
r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x4, 0x5, 0x1f, 0x0, 0x1f, 0x80001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0x4}, 0xa60, 0x9, 0x4, 0x8, 0x7, 0x1, 0xaa, 0x0, 0x0, 0x0, 0xb3}, 0x0, 0xc, 0xffffffffffffffff, 0x3)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x80, 0x8f, 0x7, 0x1, 0x20, 0x0, 0x8, 0x1088, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x92, 0x1, @perf_bp={&(0x7f00000002c0), 0xe}, 0x80030, 0x4, 0x3, 0x0, 0x1, 0x2f87, 0x7fff, 0x0, 0x9, 0x0, 0xe8e9}, 0xffffffffffffffff, 0xf, r0, 0x2)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x8, 0x80, 0x5, 0x3, 0x0, 0x9, 0x400, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x60, 0x1, @perf_config_ext={0x80}, 0xc739, 0xadf7, 0xf, 0x8, 0x9, 0x3f, 0x4b2, 0x0, 0x9, 0x0, 0x8}, 0x0, 0xc, r1, 0x2)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
syz_clone(0xa80, &(0x7f0000000080)="256a4d9c0c8dd67c90060b631aeaf142ba24dd078ab9be9c6ef4228ed52f38f8dba9bf3d439f3bddd35f940e97d687d8f5d2440c8a3c00d0d6b271dd1b0fe7906a4938ca4306c0bb6a0fc8b9e77bad5b2dae8d6a69bd12d9823bd3935808a5f1e9f2698bfc408ec892f4ce963fe8fe9e128b61281578bcab81f9b61912a7e66d7eff3bee3aca73426cfc0a758dddda64045298d3bff6fbdbaf4f31aeb6b08bbfa09625bb4992a052e48a43286980679bfa4e16712734a48b4993", 0xba, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="4ff4b88239505bdc4c788a33e04e38e2648bfd277f174ed1c4ed3549ab3f3f7973cd12c03fddb1e49a300a193e9f74ca62cb88d3ed56a290ca42dd0400d18c48312f9b0e2d7454aac6d5")
21:54:28 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38)
21:54:28 executing program 4:
syz_clone(0x0, 0x0, 0x1f000000, 0x0, 0x0, 0x0)
21:54:28 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
[ 3208.091625][ T4200] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3208.099436][ T4200] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3208.107248][ T4200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3208.115060][ T4200] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3208.122876][ T4200]
21:54:28 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xc3, 0x9, 0x40, 0x4c, 0x0, 0x8, 0x20480, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x8}, 0x10, 0x9, 0x20, 0xf, 0xff, 0x6, 0x81, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xb)
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair(0x25, 0x3, 0x20, &(0x7f0000000000))
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9)
21:54:28 executing program 5:
bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x3, 0x3ff, 0x7fffffff, 0x9f4, 0x3, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
gettid()
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfdfffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfdfffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000300)=ANY=[@ANYBLOB="dcfad33789175c41987037ca99cbdbb6ba69fe4b1ea1eb32f54fdf052aaeee23b38fee5d299fcacc6a9c196c16a21581684a6fa6f99c82"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='ext4_es_insert_delayed_block\x00', r0}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x11, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sys_exit\x00', r2}, 0x10) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sys_exit\x00', r2}, 0x10)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0xe18676d968224d3f}, 0x20)
write$cgroup_type(r1, &(0x7f0000000180), 0x40001)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000340)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000000380)=[0x0, 0x0], &(0x7f00000003c0)=[0x0], 0x0, 0x8, &(0x7f0000000400)=[{}, {}], 0x10, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x10, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10)
r3 = getpid()
perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xb)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000080)={0x0, r1}, 0x10)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x6, 0x4, 0x2, 0x6, 0x0, 0x1, 0x10000, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x2040, 0x0, 0x4, 0x8, 0x6, 0x1, 0x4, 0x0, 0x9, 0x0, 0xfffffffffffff375}, r3, 0xe, r4, 0x2)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000f40)}, 0x10) (async)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='rdma.current\x00', 0x26e1, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='rdma.current\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x84, &(0x7f0000000780)=""/132, 0x40f00, 0xe, '\x00', r5, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x10000}, 0x8, 0x10, &(0x7f0000000900)={0x2, 0xc, 0x4, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)}, 0x80) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x2, 0x84, &(0x7f0000000780)=""/132, 0x40f00, 0xe, '\x00', r5, 0x12, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x10000}, 0x8, 0x10, &(0x7f0000000900)={0x2, 0xc, 0x4, 0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a00)}, 0x80)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='rdma.current\x00', 0x26e1, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0xc, &(0x7f00000009c0)=@raw=[@generic={0x80, 0x0, 0x4, 0x7fff, 0x97}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}, @ldst={0x2, 0x2, 0x6, 0x9, 0x7, 0xfffffffffffffffc, 0x1}, @alu={0x4, 0x0, 0x8, 0x5, 0xa, 0x80, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0xc, 0x5, 0x0, 0x2}, @generic={0x1, 0xa, 0x5, 0x4, 0x5}], &(0x7f0000000740)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x60, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x5, 0x1, 0x7460}, 0x10, 0x280b1, r1, 0x8, 0x0, &(0x7f0000000ac0)=[{0x4, 0x3, 0x1, 0x3}, {0x5, 0x5, 0xd, 0x2}, {0x3, 0x2, 0x4, 0x8}, {0x2, 0x2, 0xf, 0x3}, {0x1, 0x1, 0x2}, {0x5, 0x5, 0x0, 0xb}, {0x2, 0x1, 0xa, 0x4}, {0x0, 0x3, 0xa}], 0x10, 0xcf56}, 0x90) (async)
r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b40)=@bpf_ext={0x1c, 0xc, &(0x7f00000009c0)=@raw=[@generic={0x80, 0x0, 0x4, 0x7fff, 0x97}, @btf_id={0x18, 0x8, 0x3, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_idx={0x18, 0x7, 0x5, 0x0, 0x2}, @ldst={0x2, 0x2, 0x6, 0x9, 0x7, 0xfffffffffffffffc, 0x1}, @alu={0x4, 0x0, 0x8, 0x5, 0xa, 0x80, 0xffffffffffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_idx={0x18, 0xc, 0x5, 0x0, 0x2}, @generic={0x1, 0xa, 0x5, 0x4, 0x5}], &(0x7f0000000740)='GPL\x00', 0xfff, 0x0, 0x0, 0x40f00, 0x60, '\x00', r5, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000a40)={0x4, 0x1}, 0x8, 0x10, &(0x7f0000000a80)={0x2, 0x5, 0x1, 0x7460}, 0x10, 0x280b1, r1, 0x8, 0x0, &(0x7f0000000ac0)=[{0x4, 0x3, 0x1, 0x3}, {0x5, 0x5, 0xd, 0x2}, {0x3, 0x2, 0x4, 0x8}, {0x2, 0x2, 0xf, 0x3}, {0x1, 0x1, 0x2}, {0x5, 0x5, 0x0, 0xb}, {0x2, 0x1, 0xa, 0x4}, {0x0, 0x3, 0xa}], 0x10, 0xcf56}, 0x90)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ec0)={r6, 0xe0, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000c00)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000c40)=[0x0, 0x0], &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000cc0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000d00), &(0x7f0000000d40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10)
[ 3208.194909][ T4243] FAULT_INJECTION: forcing a failure.
[ 3208.194909][ T4243] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3208.217567][ T4243] CPU: 1 PID: 4243 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3208.229031][ T4243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3208.238935][ T4243] Call Trace:
[ 3208.242056][ T4243]
[ 3208.244824][ T4243] dump_stack_lvl+0x151/0x1b7
[ 3208.249339][ T4243] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3208.255067][ T4243] dump_stack+0x15/0x17
[ 3208.259057][ T4243] should_fail+0x3c6/0x510
[ 3208.263312][ T4243] should_fail_alloc_page+0x5a/0x80
[ 3208.268708][ T4243] prepare_alloc_pages+0x15c/0x700
[ 3208.273643][ T4243] ? __alloc_pages+0x5e0/0x5e0
[ 3208.278341][ T4243] ? __alloc_pages_bulk+0xe60/0xe60
[ 3208.283365][ T4243] __alloc_pages+0x138/0x5e0
[ 3208.287787][ T4243] ? prep_new_page+0x110/0x110
[ 3208.292391][ T4243] ? 0xffffffffa0028480
[ 3208.296380][ T4243] ? is_bpf_text_address+0x172/0x190
[ 3208.301502][ T4243] pte_alloc_one+0x73/0x1b0
[ 3208.305839][ T4243] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3208.310874][ T4243] ? arch_stack_walk+0xf3/0x140
[ 3208.315563][ T4243] __pte_alloc+0x86/0x350
[ 3208.319731][ T4243] ? free_pgtables+0x280/0x280
[ 3208.324325][ T4243] ? _raw_spin_lock+0xa4/0x1b0
[ 3208.328939][ T4243] ? __kasan_check_write+0x14/0x20
[ 3208.333887][ T4243] copy_page_range+0x28a8/0x2f90
[ 3208.338660][ T4243] ? __kasan_slab_alloc+0xb1/0xe0
[ 3208.343608][ T4243] ? pfn_valid+0x1e0/0x1e0
[ 3208.347968][ T4243] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3208.353527][ T4243] ? __rb_insert_augmented+0x5de/0x610
[ 3208.359268][ T4243] copy_mm+0xc7e/0x13e0
[ 3208.363262][ T4243] ? copy_signal+0x610/0x610
[ 3208.367674][ T4243] ? __init_rwsem+0xd6/0x1c0
[ 3208.372100][ T4243] ? copy_signal+0x4e3/0x610
[ 3208.376612][ T4243] copy_process+0x12bc/0x3260
[ 3208.381130][ T4243] ? proc_fail_nth_write+0x20b/0x290
[ 3208.386265][ T4243] ? fsnotify_perm+0x6a/0x5d0
[ 3208.390758][ T4243] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3208.395706][ T4243] ? vfs_write+0x9ec/0x1110
[ 3208.400049][ T4243] kernel_clone+0x21e/0x9e0
[ 3208.404394][ T4243] ? file_end_write+0x1c0/0x1c0
[ 3208.409161][ T4243] ? create_io_thread+0x1e0/0x1e0
[ 3208.414021][ T4243] ? mutex_unlock+0xb2/0x260
[ 3208.418445][ T4243] ? __mutex_lock_slowpath+0x10/0x10
[ 3208.423569][ T4243] __x64_sys_clone+0x23f/0x290
[ 3208.428167][ T4243] ? __do_sys_vfork+0x130/0x130
[ 3208.432853][ T4243] ? ksys_write+0x260/0x2c0
[ 3208.437195][ T4243] ? debug_smp_processor_id+0x17/0x20
[ 3208.442399][ T4243] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3208.448301][ T4243] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3208.453771][ T4243] do_syscall_64+0x3d/0xb0
[ 3208.458032][ T4243] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3208.463751][ T4243] RIP: 0033:0x7f024b55cae9
[ 3208.468027][ T4243] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3208.487445][ T4243] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3208.495692][ T4243] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3208.503500][ T4243] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3208.511315][ T4243] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3208.519129][ T4243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3208.526938][ T4243] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3208.534752][ T4243]
21:54:29 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup, r3, 0x2e, 0x0, 0x0, @prog_fd=r5}, 0x20)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0))
recvmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x2)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000500)=0x6)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r8, &(0x7f0000000180)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@exit, @generic={0x3f, 0x3, 0x9, 0x85ba, 0xfffff410}, @cb_func={0x18, 0x9}, @ldst={0x1, 0x1, 0x3, 0xb, 0x3, 0x6, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000180)='GPL\x00', 0x3, 0x4d, &(0x7f00000001c0)=""/77, 0x40f00, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x3, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[0xffffffffffffffff, r7, r4, r8], &(0x7f0000000300)=[{0x0, 0x2, 0x2, 0xa}, {0x0, 0x1, 0x7, 0x4}, {0x5, 0x2, 0x4, 0x2}, {0x0, 0x4, 0xa, 0xc}, {0x2, 0x1, 0x7, 0x3}, {0x5, 0x1, 0xa, 0x5}], 0x10, 0x800}, 0x90)
21:54:29 executing program 4:
syz_clone(0x0, 0x0, 0x1ffff000, 0x0, 0x0, 0x0)
21:54:29 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:29 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39)
21:54:29 executing program 5:
r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x4, 0x5, 0x1f, 0x0, 0x1f, 0x80001, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_config_ext={0x2, 0x4}, 0xa60, 0x9, 0x4, 0x8, 0x7, 0x1, 0xaa, 0x0, 0x0, 0x0, 0xb3}, 0x0, 0xc, 0xffffffffffffffff, 0x3)
socketpair(0x0, 0x0, 0x0, 0x0)
r1 = perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x80, 0x8f, 0x7, 0x1, 0x20, 0x0, 0x8, 0x1088, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x92, 0x1, @perf_bp={&(0x7f00000002c0), 0xe}, 0x80030, 0x4, 0x3, 0x0, 0x1, 0x2f87, 0x7fff, 0x0, 0x9, 0x0, 0xe8e9}, 0xffffffffffffffff, 0xf, r0, 0x2)
perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0x8, 0x80, 0x5, 0x3, 0x0, 0x9, 0x400, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x60, 0x1, @perf_config_ext={0x80}, 0xc739, 0xadf7, 0xf, 0x8, 0x9, 0x3f, 0x4b2, 0x0, 0x9, 0x0, 0x8}, 0x0, 0xc, r1, 0x2)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
syz_clone(0xa80, &(0x7f0000000080)="256a4d9c0c8dd67c90060b631aeaf142ba24dd078ab9be9c6ef4228ed52f38f8dba9bf3d439f3bddd35f940e97d687d8f5d2440c8a3c00d0d6b271dd1b0fe7906a4938ca4306c0bb6a0fc8b9e77bad5b2dae8d6a69bd12d9823bd3935808a5f1e9f2698bfc408ec892f4ce963fe8fe9e128b61281578bcab81f9b61912a7e66d7eff3bee3aca73426cfc0a758dddda64045298d3bff6fbdbaf4f31aeb6b08bbfa09625bb4992a052e48a43286980679bfa4e16712734a48b4993", 0xba, &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="4ff4b88239505bdc4c788a33e04e38e2648bfd277f174ed1c4ed3549ab3f3f7973cd12c03fddb1e49a300a193e9f74ca62cb88d3ed56a290ca42dd0400d18c48312f9b0e2d7454aac6d5")
21:54:29 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
[ 3208.974371][ T4257] FAULT_INJECTION: forcing a failure.
[ 3208.974371][ T4257] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3209.006215][ T4257] CPU: 0 PID: 4257 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3209.017686][ T4257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3209.027583][ T4257] Call Trace:
[ 3209.030718][ T4257]
[ 3209.033582][ T4257] dump_stack_lvl+0x151/0x1b7
[ 3209.038090][ T4257] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3209.043568][ T4257] dump_stack+0x15/0x17
[ 3209.047550][ T4257] should_fail+0x3c6/0x510
[ 3209.051809][ T4257] should_fail_alloc_page+0x5a/0x80
[ 3209.056839][ T4257] prepare_alloc_pages+0x15c/0x700
[ 3209.061786][ T4257] ? __alloc_pages_bulk+0xe60/0xe60
[ 3209.066820][ T4257] __alloc_pages+0x138/0x5e0
[ 3209.071256][ T4257] ? prep_new_page+0x110/0x110
[ 3209.075849][ T4257] ? __alloc_pages+0x206/0x5e0
[ 3209.080442][ T4257] ? stack_trace_save+0x1c0/0x1c0
[ 3209.085994][ T4257] ? __kasan_check_write+0x14/0x20
[ 3209.090943][ T4257] ? _raw_spin_lock+0xa4/0x1b0
[ 3209.095543][ T4257] __pmd_alloc+0xb1/0x550
[ 3209.099888][ T4257] ? __pud_alloc+0x260/0x260
[ 3209.104308][ T4257] ? __pud_alloc+0x213/0x260
[ 3209.108752][ T4257] ? do_handle_mm_fault+0x2330/0x2330
[ 3209.113937][ T4257] ? __stack_depot_save+0x34/0x470
[ 3209.119320][ T4257] ? anon_vma_clone+0x9a/0x500
[ 3209.123920][ T4257] copy_page_range+0x2b3d/0x2f90
[ 3209.128692][ T4257] ? __kasan_slab_alloc+0xb1/0xe0
[ 3209.133554][ T4257] ? slab_post_alloc_hook+0x53/0x2c0
[ 3209.138855][ T4257] ? copy_mm+0xa3a/0x13e0
[ 3209.143018][ T4257] ? copy_process+0x12bc/0x3260
[ 3209.147875][ T4257] ? kernel_clone+0x21e/0x9e0
[ 3209.152389][ T4257] ? do_syscall_64+0x3d/0xb0
[ 3209.156821][ T4257] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3209.162810][ T4257] ? pfn_valid+0x1e0/0x1e0
[ 3209.167056][ T4257] ? rwsem_write_trylock+0x15b/0x290
[ 3209.172177][ T4257] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0
[ 3209.178439][ T4257] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3209.183981][ T4257] ? __rb_insert_augmented+0x5de/0x610
[ 3209.189277][ T4257] copy_mm+0xc7e/0x13e0
[ 3209.193268][ T4257] ? copy_signal+0x610/0x610
[ 3209.197694][ T4257] ? __init_rwsem+0xd6/0x1c0
[ 3209.202292][ T4257] ? copy_signal+0x4e3/0x610
[ 3209.206722][ T4257] copy_process+0x12bc/0x3260
[ 3209.211234][ T4257] ? proc_fail_nth_write+0x20b/0x290
[ 3209.216356][ T4257] ? fsnotify_perm+0x6a/0x5d0
[ 3209.220869][ T4257] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3209.225813][ T4257] ? vfs_write+0x9ec/0x1110
[ 3209.230155][ T4257] kernel_clone+0x21e/0x9e0
[ 3209.234495][ T4257] ? file_end_write+0x1c0/0x1c0
[ 3209.239183][ T4257] ? create_io_thread+0x1e0/0x1e0
[ 3209.244039][ T4257] ? mutex_unlock+0xb2/0x260
[ 3209.248468][ T4257] ? __mutex_lock_slowpath+0x10/0x10
[ 3209.253587][ T4257] __x64_sys_clone+0x23f/0x290
[ 3209.258188][ T4257] ? __do_sys_vfork+0x130/0x130
[ 3209.262874][ T4257] ? ksys_write+0x260/0x2c0
[ 3209.267216][ T4257] ? debug_smp_processor_id+0x17/0x20
[ 3209.272422][ T4257] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3209.278426][ T4257] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3209.283879][ T4257] do_syscall_64+0x3d/0xb0
[ 3209.288133][ T4257] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3209.293872][ T4257] RIP: 0033:0x7f024b55cae9
[ 3209.298121][ T4257] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3209.317556][ T4257] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:54:29 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xc3, 0x9, 0x40, 0x4c, 0x0, 0x8, 0x20480, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x8}, 0x10, 0x9, 0x20, 0xf, 0xff, 0x6, 0x81, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xb) (async)
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair(0x25, 0x3, 0x20, &(0x7f0000000000)) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9)
21:54:29 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40)
[ 3209.325889][ T4257] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3209.333697][ T4257] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3209.341511][ T4257] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3209.349322][ T4257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3209.357132][ T4257] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3209.364947][ T4257]
21:54:29 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:29 executing program 4:
syz_clone(0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0)
21:54:29 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = getpid()
r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f0000000780)={0x0, 0x80, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x1, 0x40, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}, 0x1010, 0x100, 0x2, 0x5, 0x3, 0x1, 0xfffa, 0x0, 0x17, 0x0, 0x48}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x6)
perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r3}, 0x38)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r3, &(0x7f0000000100), &(0x7f0000002240)=""/99}, 0x20)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f00000000c0)="e17a9dfc98d05330", &(0x7f0000000200)=""/92, &(0x7f0000000280)="b3a9e6ee427ff046c9c8e009c6681ab685", &(0x7f00000002c0)="0ef0a3790181efc17902a3795123107125b858738482bae94495c948c3889c218fb6da14adbf27e30b0805b2c6686853fbd60d4e7a4e051d0e3eec9c22c7f95c93f91e1e7c556686ac0a622fcc7b313371ab3cddc690a9c23ba7d20e1bbe3760c456ff41d58d6c58df1b8d6f093e7a986cf1cfa32767b1a2da14c7907ade4083d73d2bc9f933", 0x4, r3}, 0x38)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, &(0x7f00000005c0))
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r4, &(0x7f0000000180), 0x9)
r5 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r5, 0x0, 0xffffffffffffffff, 0x3)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.stat\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
r7 = openat$cgroup(r2, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r7, &(0x7f0000000680), 0x2, 0x0)
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(r8, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x80, 0x0, 0xc9, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000480), 0x8}, 0x80000, 0xfff, 0x0, 0x5, 0xff, 0x1, 0x5, 0x0, 0xffffff31, 0x0, 0xffffffffffffff22}, r5, 0xc, r8, 0x1)
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x40, 0xa4, 0x2, 0x2a, 0x0, 0x7, 0x450, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_bp={0x0, 0x2}, 0x13781, 0x0, 0x0, 0x0, 0x400, 0x7ff, 0xffff, 0x0, 0x6, 0x0, 0x58b}, r0, 0xe, r4, 0x0)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x20, 0x0, 0x6, 0x3, 0x0, 0x8000000006, 0x10800, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x401, 0x1, @perf_bp, 0x8000, 0x7, 0x2, 0x4, 0x55, 0x800, 0x1000, 0x0, 0xffffffff, 0x0, 0xa7}, 0xffffffffffffffff, 0xd, r1, 0x2)
[ 3209.389679][ T4276] FAULT_INJECTION: forcing a failure.
[ 3209.389679][ T4276] name failslab, interval 1, probability 0, space 0, times 0
[ 3209.420574][ T4276] CPU: 1 PID: 4276 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3209.432044][ T4276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3209.441935][ T4276] Call Trace:
[ 3209.445056][ T4276]
[ 3209.447833][ T4276] dump_stack_lvl+0x151/0x1b7
[ 3209.452349][ T4276] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3209.457820][ T4276] dump_stack+0x15/0x17
[ 3209.461813][ T4276] should_fail+0x3c6/0x510
[ 3209.466172][ T4276] __should_failslab+0xa4/0xe0
[ 3209.470766][ T4276] ? vm_area_dup+0x26/0x230
[ 3209.475106][ T4276] should_failslab+0x9/0x20
[ 3209.479864][ T4276] slab_pre_alloc_hook+0x37/0xd0
[ 3209.484566][ T4276] ? vm_area_dup+0x26/0x230
[ 3209.488901][ T4276] kmem_cache_alloc+0x44/0x200
[ 3209.493504][ T4276] vm_area_dup+0x26/0x230
[ 3209.497678][ T4276] copy_mm+0x9a1/0x13e0
[ 3209.501667][ T4276] ? copy_signal+0x610/0x610
[ 3209.506193][ T4276] ? __init_rwsem+0xd6/0x1c0
[ 3209.510603][ T4276] ? copy_signal+0x4e3/0x610
[ 3209.515033][ T4276] copy_process+0x12bc/0x3260
[ 3209.519548][ T4276] ? proc_fail_nth_write+0x20b/0x290
[ 3209.524668][ T4276] ? fsnotify_perm+0x6a/0x5d0
[ 3209.529177][ T4276] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3209.534126][ T4276] ? vfs_write+0x9ec/0x1110
[ 3209.538466][ T4276] kernel_clone+0x21e/0x9e0
[ 3209.542814][ T4276] ? file_end_write+0x1c0/0x1c0
[ 3209.547494][ T4276] ? create_io_thread+0x1e0/0x1e0
[ 3209.552353][ T4276] ? mutex_unlock+0xb2/0x260
[ 3209.557993][ T4276] ? __mutex_lock_slowpath+0x10/0x10
[ 3209.563114][ T4276] __x64_sys_clone+0x23f/0x290
[ 3209.567815][ T4276] ? __do_sys_vfork+0x130/0x130
[ 3209.572576][ T4276] ? ksys_write+0x260/0x2c0
[ 3209.576917][ T4276] ? debug_smp_processor_id+0x17/0x20
[ 3209.582122][ T4276] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3209.588026][ T4276] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3209.593492][ T4276] do_syscall_64+0x3d/0xb0
[ 3209.597753][ T4276] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3209.603564][ T4276] RIP: 0033:0x7f024b55cae9
[ 3209.607817][ T4276] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3209.627523][ T4276] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:54:29 executing program 4:
syz_clone(0x0, 0x0, 0x242200a0, 0x0, 0x0, 0x0)
[ 3209.635763][ T4276] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3209.643570][ T4276] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3209.651385][ T4276] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3209.659285][ T4276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3209.667181][ T4276] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3209.675090][ T4276]
21:54:29 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0)
openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r4, &(0x7f0000000180)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
r5 = openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000140)='blkio.bfq.empty_time\x00', 0x0, 0x0)
21:54:29 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41)
21:54:29 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) (async)
r4 = openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4)
bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={@cgroup, r3, 0x2e, 0x0, 0x0, @prog_fd=r5}, 0x20) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r3, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x2) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
ioctl$TUNSETSNDBUF(r3, 0x400454d4, &(0x7f0000000500)=0x6) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r8, &(0x7f0000000180)}, 0x20) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x17, 0x9, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x6}, [@exit, @generic={0x3f, 0x3, 0x9, 0x85ba, 0xfffff410}, @cb_func={0x18, 0x9}, @ldst={0x1, 0x1, 0x3, 0xb, 0x3, 0x6, 0x4}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}]}, &(0x7f0000000180)='GPL\x00', 0x3, 0x4d, &(0x7f00000001c0)=""/77, 0x40f00, 0x0, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x3, 0x6, 0x1}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x6, &(0x7f00000002c0)=[0xffffffffffffffff, r7, r4, r8], &(0x7f0000000300)=[{0x0, 0x2, 0x2, 0xa}, {0x0, 0x1, 0x7, 0x4}, {0x5, 0x2, 0x4, 0x2}, {0x0, 0x4, 0xa, 0xc}, {0x2, 0x1, 0x7, 0x3}, {0x5, 0x1, 0xa, 0x5}], 0x10, 0x800}, 0x90)
21:54:29 executing program 4:
syz_clone(0x0, 0x0, 0x808402a0, 0x0, 0x0, 0x0)
21:54:29 executing program 4:
syz_clone(0x0, 0x0, 0xa0002224, 0x0, 0x0, 0x0)
[ 3209.887433][ T4308] FAULT_INJECTION: forcing a failure.
[ 3209.887433][ T4308] name failslab, interval 1, probability 0, space 0, times 0
[ 3209.920265][ T4308] CPU: 1 PID: 4308 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
21:54:30 executing program 4:
syz_clone(0x0, 0x0, 0xa0028480, 0x0, 0x0, 0x0)
[ 3209.931734][ T4308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3209.941630][ T4308] Call Trace:
[ 3209.944748][ T4308]
[ 3209.947525][ T4308] dump_stack_lvl+0x151/0x1b7
[ 3209.952040][ T4308] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3209.957518][ T4308] dump_stack+0x15/0x17
[ 3209.961505][ T4308] should_fail+0x3c6/0x510
[ 3209.965756][ T4308] __should_failslab+0xa4/0xe0
[ 3209.970357][ T4308] ? vm_area_dup+0x26/0x230
[ 3209.974693][ T4308] should_failslab+0x9/0x20
[ 3209.979036][ T4308] slab_pre_alloc_hook+0x37/0xd0
[ 3209.983818][ T4308] ? vm_area_dup+0x26/0x230
[ 3209.988149][ T4308] kmem_cache_alloc+0x44/0x200
[ 3209.992747][ T4308] vm_area_dup+0x26/0x230
[ 3209.996913][ T4308] copy_mm+0x9a1/0x13e0
[ 3210.000912][ T4308] ? copy_signal+0x610/0x610
[ 3210.005334][ T4308] ? __init_rwsem+0xd6/0x1c0
[ 3210.009802][ T4308] ? copy_signal+0x4e3/0x610
[ 3210.014372][ T4308] copy_process+0x12bc/0x3260
[ 3210.019135][ T4308] ? proc_fail_nth_write+0x20b/0x290
[ 3210.024254][ T4308] ? fsnotify_perm+0x6a/0x5d0
[ 3210.028776][ T4308] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3210.033726][ T4308] ? vfs_write+0x9ec/0x1110
[ 3210.038058][ T4308] kernel_clone+0x21e/0x9e0
[ 3210.042402][ T4308] ? file_end_write+0x1c0/0x1c0
[ 3210.047092][ T4308] ? create_io_thread+0x1e0/0x1e0
[ 3210.051940][ T4308] ? mutex_unlock+0xb2/0x260
[ 3210.056368][ T4308] ? __mutex_lock_slowpath+0x10/0x10
[ 3210.061493][ T4308] __x64_sys_clone+0x23f/0x290
[ 3210.066096][ T4308] ? __do_sys_vfork+0x130/0x130
[ 3210.070810][ T4308] ? ksys_write+0x260/0x2c0
[ 3210.075118][ T4308] ? debug_smp_processor_id+0x17/0x20
[ 3210.080325][ T4308] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3210.086238][ T4308] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3210.092127][ T4308] do_syscall_64+0x3d/0xb0
[ 3210.096380][ T4308] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3210.102107][ T4308] RIP: 0033:0x7f024b55cae9
[ 3210.106362][ T4308] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3210.125980][ T4308] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:54:30 executing program 2:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xc3, 0x9, 0x40, 0x4c, 0x0, 0x8, 0x20480, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x8}, 0x10, 0x9, 0x20, 0xf, 0xff, 0x6, 0x81, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xb)
socketpair(0x0, 0x0, 0x0, 0x0)
socketpair(0x25, 0x3, 0x20, &(0x7f0000000000))
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xc3, 0x9, 0x40, 0x4c, 0x0, 0x8, 0x20480, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x6, 0x8}, 0x10, 0x9, 0x20, 0xf, 0xff, 0x6, 0x81, 0x0, 0x4, 0x0, 0x5}, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xb) (async)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
socketpair(0x25, 0x3, 0x20, &(0x7f0000000000)) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
write$cgroup_type(0xffffffffffffffff, &(0x7f0000000040), 0x9) (async)
21:54:30 executing program 4:
syz_clone(0x0, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0)
21:54:30 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42)
[ 3210.134224][ T4308] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3210.142032][ T4308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3210.149934][ T4308] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3210.157752][ T4308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3210.165562][ T4308] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3210.173374][ T4308]
[ 3210.223802][ T4321] FAULT_INJECTION: forcing a failure.
[ 3210.223802][ T4321] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3210.255471][ T4321] CPU: 0 PID: 4321 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3210.266948][ T4321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3210.276841][ T4321] Call Trace:
[ 3210.279962][ T4321]
[ 3210.282743][ T4321] dump_stack_lvl+0x151/0x1b7
[ 3210.287517][ T4321] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3210.292984][ T4321] ? __update_load_avg_cfs_rq+0xb1/0x2f0
[ 3210.298452][ T4321] dump_stack+0x15/0x17
[ 3210.302444][ T4321] should_fail+0x3c6/0x510
[ 3210.306697][ T4321] should_fail_alloc_page+0x5a/0x80
[ 3210.311733][ T4321] prepare_alloc_pages+0x15c/0x700
[ 3210.316688][ T4321] ? __alloc_pages_bulk+0xe60/0xe60
21:54:30 executing program 4:
syz_clone(0x0, 0x0, 0xfbffffff, 0x0, 0x0, 0x0)
[ 3210.321733][ T4321] ? sched_clock+0x9/0x10
[ 3210.325889][ T4321] ? native_set_ldt+0x360/0x360
[ 3210.330567][ T4321] __alloc_pages+0x138/0x5e0
[ 3210.334991][ T4321] ? _raw_spin_unlock+0x4d/0x70
[ 3210.339685][ T4321] ? prep_new_page+0x110/0x110
[ 3210.344287][ T4321] pte_alloc_one+0x73/0x1b0
[ 3210.348629][ T4321] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3210.353652][ T4321] ? preempt_schedule+0xd9/0xe0
[ 3210.358340][ T4321] ? preempt_schedule_common+0xbe/0xf0
[ 3210.363633][ T4321] __pte_alloc+0x86/0x350
[ 3210.367800][ T4321] ? free_pgtables+0x280/0x280
[ 3210.372398][ T4321] ? _raw_spin_lock+0xa4/0x1b0
[ 3210.376998][ T4321] ? __kasan_check_write+0x14/0x20
[ 3210.381946][ T4321] copy_page_range+0x28a8/0x2f90
[ 3210.386718][ T4321] ? __kasan_slab_alloc+0xb1/0xe0
[ 3210.391592][ T4321] ? pfn_valid+0x1e0/0x1e0
[ 3210.395923][ T4321] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3210.401476][ T4321] ? __rb_insert_augmented+0x5de/0x610
[ 3210.406769][ T4321] copy_mm+0xc7e/0x13e0
[ 3210.410757][ T4321] ? copy_signal+0x610/0x610
[ 3210.415182][ T4321] ? __init_rwsem+0xd6/0x1c0
[ 3210.419608][ T4321] ? copy_signal+0x4e3/0x610
[ 3210.424033][ T4321] copy_process+0x12bc/0x3260
[ 3210.428635][ T4321] ? proc_fail_nth_write+0x20b/0x290
[ 3210.433754][ T4321] ? fsnotify_perm+0x6a/0x5d0
[ 3210.438271][ T4321] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3210.443217][ T4321] ? vfs_write+0x9ec/0x1110
[ 3210.447556][ T4321] kernel_clone+0x21e/0x9e0
[ 3210.451895][ T4321] ? file_end_write+0x1c0/0x1c0
[ 3210.456582][ T4321] ? create_io_thread+0x1e0/0x1e0
[ 3210.461443][ T4321] ? mutex_unlock+0xb2/0x260
[ 3210.465871][ T4321] ? __mutex_lock_slowpath+0x10/0x10
[ 3210.470992][ T4321] __x64_sys_clone+0x23f/0x290
[ 3210.475589][ T4321] ? __do_sys_vfork+0x130/0x130
[ 3210.480276][ T4321] ? ksys_write+0x260/0x2c0
[ 3210.484618][ T4321] ? debug_smp_processor_id+0x17/0x20
[ 3210.489822][ T4321] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3210.495728][ T4321] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3210.501194][ T4321] do_syscall_64+0x3d/0xb0
[ 3210.505534][ T4321] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3210.511290][ T4321] RIP: 0033:0x7f024b55cae9
[ 3210.515521][ T4321] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3210.534994][ T4321] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3210.543202][ T4321] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3210.551015][ T4321] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3210.558826][ T4321] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3210.566635][ T4321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:54:30 executing program 4:
syz_clone(0x0, 0x0, 0xff0f0100, 0x0, 0x0, 0x0)
21:54:30 executing program 2:
socketpair(0x22, 0x3, 0x1, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
[ 3210.574621][ T4321] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3210.582437][ T4321]
21:54:30 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async)
openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) (async)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r4, &(0x7f0000000180)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async)
r5 = openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000140)='blkio.bfq.empty_time\x00', 0x0, 0x0)
21:54:30 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xee6, 0x3, 0x2, 0x2, 0x1, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2, 0xd}, 0x48)
openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0)
21:54:30 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = getpid()
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async)
r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f0000000780)={0x0, 0x80, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x1, 0x40, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}, 0x1010, 0x100, 0x2, 0x5, 0x3, 0x1, 0xfffa, 0x0, 0x17, 0x0, 0x48}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x6)
perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0) (async)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r3}, 0x38)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r3, &(0x7f0000000100), &(0x7f0000002240)=""/99}, 0x20)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f00000000c0)="e17a9dfc98d05330", &(0x7f0000000200)=""/92, &(0x7f0000000280)="b3a9e6ee427ff046c9c8e009c6681ab685", &(0x7f00000002c0)="0ef0a3790181efc17902a3795123107125b858738482bae94495c948c3889c218fb6da14adbf27e30b0805b2c6686853fbd60d4e7a4e051d0e3eec9c22c7f95c93f91e1e7c556686ac0a622fcc7b313371ab3cddc690a9c23ba7d20e1bbe3760c456ff41d58d6c58df1b8d6f093e7a986cf1cfa32767b1a2da14c7907ade4083d73d2bc9f933", 0x4, r3}, 0x38)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, &(0x7f00000005c0)) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, &(0x7f00000005c0))
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r4, &(0x7f0000000180), 0x9)
r5 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r5, 0x0, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r5, 0x0, 0xffffffffffffffff, 0x3)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.stat\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
openat$cgroup(r2, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) (async)
r7 = openat$cgroup(r2, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r7, &(0x7f0000000680), 0x2, 0x0)
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(r8, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r8, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x80, 0x0, 0xc9, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000480), 0x8}, 0x80000, 0xfff, 0x0, 0x5, 0xff, 0x1, 0x5, 0x0, 0xffffff31, 0x0, 0xffffffffffffff22}, r5, 0xc, r8, 0x1) (async)
perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x80, 0x0, 0xc9, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000480), 0x8}, 0x80000, 0xfff, 0x0, 0x5, 0xff, 0x1, 0x5, 0x0, 0xffffff31, 0x0, 0xffffffffffffff22}, r5, 0xc, r8, 0x1)
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x40, 0xa4, 0x2, 0x2a, 0x0, 0x7, 0x450, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_bp={0x0, 0x2}, 0x13781, 0x0, 0x0, 0x0, 0x400, 0x7ff, 0xffff, 0x0, 0x6, 0x0, 0x58b}, r0, 0xe, r4, 0x0)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x20, 0x0, 0x6, 0x3, 0x0, 0x8000000006, 0x10800, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x401, 0x1, @perf_bp, 0x8000, 0x7, 0x2, 0x4, 0x55, 0x800, 0x1000, 0x0, 0xffffffff, 0x0, 0xa7}, 0xffffffffffffffff, 0xd, r1, 0x2)
21:54:30 executing program 4:
syz_clone(0x0, 0x0, 0xfffffff5, 0x0, 0x0, 0x0)
21:54:30 executing program 2:
socketpair(0x22, 0x3, 0x1, 0x0) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
21:54:30 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43)
21:54:30 executing program 2:
socketpair(0x22, 0x3, 0x1, 0x0) (async, rerun: 64)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (rerun: 64)
21:54:30 executing program 4:
syz_clone(0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0)
[ 3210.906708][ T4356] FAULT_INJECTION: forcing a failure.
[ 3210.906708][ T4356] name failslab, interval 1, probability 0, space 0, times 0
21:54:31 executing program 4:
syz_clone(0x0, 0x0, 0x1b0d41f000, 0x0, 0x0, 0x0)
[ 3210.985392][ T4356] CPU: 0 PID: 4356 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3210.996853][ T4356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3211.006767][ T4356] Call Trace:
[ 3211.009869][ T4356]
[ 3211.012660][ T4356] dump_stack_lvl+0x151/0x1b7
[ 3211.017161][ T4356] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3211.022637][ T4356] dump_stack+0x15/0x17
[ 3211.026626][ T4356] should_fail+0x3c6/0x510
[ 3211.030883][ T4356] __should_failslab+0xa4/0xe0
[ 3211.035478][ T4356] ? anon_vma_clone+0x9a/0x500
[ 3211.040073][ T4356] should_failslab+0x9/0x20
[ 3211.044417][ T4356] slab_pre_alloc_hook+0x37/0xd0
[ 3211.049231][ T4356] ? anon_vma_clone+0x9a/0x500
[ 3211.053788][ T4356] kmem_cache_alloc+0x44/0x200
[ 3211.058390][ T4356] anon_vma_clone+0x9a/0x500
[ 3211.062816][ T4356] anon_vma_fork+0x91/0x4e0
[ 3211.067160][ T4356] ? anon_vma_name+0x4c/0x70
[ 3211.071583][ T4356] ? vm_area_dup+0x17a/0x230
[ 3211.076011][ T4356] copy_mm+0xa3a/0x13e0
[ 3211.080009][ T4356] ? copy_signal+0x610/0x610
[ 3211.084437][ T4356] ? __init_rwsem+0xd6/0x1c0
[ 3211.088851][ T4356] ? copy_signal+0x4e3/0x610
[ 3211.093276][ T4356] copy_process+0x12bc/0x3260
[ 3211.097794][ T4356] ? proc_fail_nth_write+0x20b/0x290
[ 3211.102916][ T4356] ? fsnotify_perm+0x6a/0x5d0
[ 3211.107427][ T4356] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3211.112378][ T4356] ? vfs_write+0x9ec/0x1110
[ 3211.116725][ T4356] kernel_clone+0x21e/0x9e0
[ 3211.121054][ T4356] ? file_end_write+0x1c0/0x1c0
[ 3211.125777][ T4356] ? create_io_thread+0x1e0/0x1e0
[ 3211.130597][ T4356] ? mutex_unlock+0xb2/0x260
[ 3211.135021][ T4356] ? __mutex_lock_slowpath+0x10/0x10
[ 3211.140152][ T4356] __x64_sys_clone+0x23f/0x290
[ 3211.144745][ T4356] ? __do_sys_vfork+0x130/0x130
[ 3211.149427][ T4356] ? ksys_write+0x260/0x2c0
[ 3211.153767][ T4356] ? debug_smp_processor_id+0x17/0x20
[ 3211.158975][ T4356] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3211.164876][ T4356] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3211.170347][ T4356] do_syscall_64+0x3d/0xb0
[ 3211.174599][ T4356] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3211.180332][ T4356] RIP: 0033:0x7f024b55cae9
[ 3211.184583][ T4356] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3211.204024][ T4356] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3211.212267][ T4356] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3211.220077][ T4356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3211.227891][ T4356] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3211.235711][ T4356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3211.243512][ T4356] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3211.251329][ T4356]
21:54:31 executing program 4:
syz_clone(0x0, 0x0, 0x2a1f7355f000, 0x0, 0x0, 0x0)
21:54:31 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44)
21:54:31 executing program 4:
syz_clone(0x0, 0x0, 0x553a2637b000, 0x0, 0x0, 0x0)
[ 3211.470978][ T4439] FAULT_INJECTION: forcing a failure.
[ 3211.470978][ T4439] name failslab, interval 1, probability 0, space 0, times 0
[ 3211.502910][ T4439] CPU: 0 PID: 4439 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
21:54:31 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async)
openat$cgroup_int(r0, &(0x7f00000000c0)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) (async)
r2 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r4, &(0x7f0000000180)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
r5 = openat$cgroup(r1, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000140)='blkio.bfq.empty_time\x00', 0x0, 0x0)
[ 3211.514675][ T4439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3211.524569][ T4439] Call Trace:
[ 3211.527758][ T4439]
[ 3211.530471][ T4439] dump_stack_lvl+0x151/0x1b7
[ 3211.534983][ T4439] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3211.540457][ T4439] dump_stack+0x15/0x17
[ 3211.544445][ T4439] should_fail+0x3c6/0x510
[ 3211.548706][ T4439] __should_failslab+0xa4/0xe0
[ 3211.553319][ T4439] ? anon_vma_fork+0xf7/0x4e0
[ 3211.557810][ T4439] should_failslab+0x9/0x20
[ 3211.562202][ T4439] slab_pre_alloc_hook+0x37/0xd0
[ 3211.566922][ T4439] ? anon_vma_fork+0xf7/0x4e0
[ 3211.571442][ T4439] kmem_cache_alloc+0x44/0x200
[ 3211.576228][ T4439] anon_vma_fork+0xf7/0x4e0
[ 3211.580562][ T4439] ? anon_vma_name+0x4c/0x70
[ 3211.584994][ T4439] ? vm_area_dup+0x17a/0x230
[ 3211.589432][ T4439] copy_mm+0xa3a/0x13e0
[ 3211.593415][ T4439] ? copy_signal+0x610/0x610
[ 3211.597929][ T4439] ? __init_rwsem+0xd6/0x1c0
[ 3211.602358][ T4439] ? copy_signal+0x4e3/0x610
[ 3211.606790][ T4439] copy_process+0x12bc/0x3260
[ 3211.611299][ T4439] ? proc_fail_nth_write+0x20b/0x290
[ 3211.616418][ T4439] ? fsnotify_perm+0x6a/0x5d0
[ 3211.620935][ T4439] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3211.625886][ T4439] ? vfs_write+0x9ec/0x1110
[ 3211.630220][ T4439] kernel_clone+0x21e/0x9e0
[ 3211.634559][ T4439] ? file_end_write+0x1c0/0x1c0
[ 3211.639247][ T4439] ? create_io_thread+0x1e0/0x1e0
[ 3211.644208][ T4439] ? mutex_unlock+0xb2/0x260
[ 3211.648640][ T4439] ? __mutex_lock_slowpath+0x10/0x10
[ 3211.653755][ T4439] __x64_sys_clone+0x23f/0x290
[ 3211.658354][ T4439] ? __do_sys_vfork+0x130/0x130
[ 3211.663037][ T4439] ? ksys_write+0x260/0x2c0
[ 3211.667380][ T4439] ? debug_smp_processor_id+0x17/0x20
[ 3211.672589][ T4439] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3211.678491][ T4439] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3211.684046][ T4439] do_syscall_64+0x3d/0xb0
[ 3211.688383][ T4439] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3211.694162][ T4439] RIP: 0033:0x7f024b55cae9
[ 3211.698365][ T4439] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3211.718200][ T4439] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3211.726399][ T4439] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3211.734212][ T4439] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3211.742283][ T4439] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3211.750790][ T4439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3211.758692][ T4439] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3211.766506][ T4439]
21:54:33 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xee6, 0x3, 0x2, 0x2, 0x1, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2, 0xd}, 0x48)
openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0)
21:54:33 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
r0 = getpid()
r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) (async, rerun: 32)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f0000000780)={0x0, 0x80, 0x0, 0x5, 0x0, 0x7f, 0x0, 0x1, 0x40, 0xa, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}, 0x1010, 0x100, 0x2, 0x5, 0x3, 0x1, 0xfffa, 0x0, 0x17, 0x0, 0x48}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x6)
perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.stat\x00', 0x0, 0x0)
r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0)
bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000140), 0x1003, r3}, 0x38) (async)
bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r3, &(0x7f0000000100), &(0x7f0000002240)=""/99}, 0x20) (async, rerun: 64)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000380)={&(0x7f00000000c0)="e17a9dfc98d05330", &(0x7f0000000200)=""/92, &(0x7f0000000280)="b3a9e6ee427ff046c9c8e009c6681ab685", &(0x7f00000002c0)="0ef0a3790181efc17902a3795123107125b858738482bae94495c948c3889c218fb6da14adbf27e30b0805b2c6686853fbd60d4e7a4e051d0e3eec9c22c7f95c93f91e1e7c556686ac0a622fcc7b313371ab3cddc690a9c23ba7d20e1bbe3760c456ff41d58d6c58df1b8d6f093e7a986cf1cfa32767b1a2da14c7907ade4083d73d2bc9f933", 0x4, r3}, 0x38) (async, rerun: 64)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4004662b, &(0x7f00000005c0)) (async)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r4, &(0x7f0000000180), 0x9) (async)
r5 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r5, 0x0, 0xffffffffffffffff, 0x3) (async, rerun: 32)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuacct.stat\x00', 0x0, 0x0) (rerun: 32)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
r7 = openat$cgroup(r2, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0)
openat$cgroup_freezer_state(r7, &(0x7f0000000680), 0x2, 0x0) (async)
recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(r8, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000600)={0x4, 0x80, 0x80, 0x0, 0xc9, 0x1, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000480), 0x8}, 0x80000, 0xfff, 0x0, 0x5, 0xff, 0x1, 0x5, 0x0, 0xffffff31, 0x0, 0xffffffffffffff22}, r5, 0xc, r8, 0x1)
perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x40, 0xa4, 0x2, 0x2a, 0x0, 0x7, 0x450, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffff, 0x1, @perf_bp={0x0, 0x2}, 0x13781, 0x0, 0x0, 0x0, 0x400, 0x7ff, 0xffff, 0x0, 0x6, 0x0, 0x58b}, r0, 0xe, r4, 0x0) (async)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x20, 0x0, 0x6, 0x3, 0x0, 0x8000000006, 0x10800, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x401, 0x1, @perf_bp, 0x8000, 0x7, 0x2, 0x4, 0x55, 0x800, 0x1000, 0x0, 0xffffffff, 0x0, 0xa7}, 0xffffffffffffffff, 0xd, r1, 0x2)
21:54:33 executing program 4:
syz_clone(0x0, 0x0, 0x2001000000000, 0x0, 0x0, 0x0)
21:54:33 executing program 2:
socketpair(0x9, 0x5, 0x5, &(0x7f0000000080))
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
socketpair(0x10, 0x80000, 0x2, &(0x7f00000000c0))
r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xc0, 0x2, 0x5, 0x0, 0x8ef0, 0x10140, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x4, @perf_config_ext={0xa, 0x7}, 0x80000, 0x7, 0xad5, 0x7, 0xfff, 0x1, 0x8, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9)
21:54:33 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45)
21:54:33 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000000)='memory.events.local\x00', 0x0, 0x0)
21:54:33 executing program 4:
syz_clone(0x0, 0x0, 0x2020000000000, 0x0, 0x0, 0x0)
[ 3213.734757][ T4461] FAULT_INJECTION: forcing a failure.
[ 3213.734757][ T4461] name failslab, interval 1, probability 0, space 0, times 0
[ 3213.761816][ T4461] CPU: 0 PID: 4461 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3213.773283][ T4461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3213.783187][ T4461] Call Trace:
[ 3213.786303][ T4461]
[ 3213.789080][ T4461] dump_stack_lvl+0x151/0x1b7
[ 3213.793591][ T4461] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3213.799065][ T4461] dump_stack+0x15/0x17
[ 3213.803050][ T4461] should_fail+0x3c6/0x510
[ 3213.807306][ T4461] __should_failslab+0xa4/0xe0
[ 3213.811906][ T4461] ? anon_vma_fork+0x1df/0x4e0
[ 3213.816607][ T4461] should_failslab+0x9/0x20
[ 3213.820933][ T4461] slab_pre_alloc_hook+0x37/0xd0
[ 3213.825708][ T4461] ? anon_vma_fork+0x1df/0x4e0
[ 3213.830307][ T4461] kmem_cache_alloc+0x44/0x200
[ 3213.834907][ T4461] anon_vma_fork+0x1df/0x4e0
[ 3213.839335][ T4461] copy_mm+0xa3a/0x13e0
[ 3213.843327][ T4461] ? copy_signal+0x610/0x610
[ 3213.847752][ T4461] ? __init_rwsem+0xd6/0x1c0
[ 3213.852178][ T4461] ? copy_signal+0x4e3/0x610
[ 3213.856602][ T4461] copy_process+0x12bc/0x3260
[ 3213.861120][ T4461] ? proc_fail_nth_write+0x20b/0x290
[ 3213.866242][ T4461] ? fsnotify_perm+0x6a/0x5d0
[ 3213.870749][ T4461] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3213.875701][ T4461] ? vfs_write+0x9ec/0x1110
[ 3213.880042][ T4461] kernel_clone+0x21e/0x9e0
21:54:33 executing program 2:
socketpair(0x9, 0x5, 0x5, &(0x7f0000000080)) (async)
socketpair(0x0, 0x0, 0x0, 0x0)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
socketpair(0x10, 0x80000, 0x2, &(0x7f00000000c0)) (async)
r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xc0, 0x2, 0x5, 0x0, 0x8ef0, 0x10140, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x4, @perf_config_ext={0xa, 0x7}, 0x80000, 0x7, 0xad5, 0x7, 0xfff, 0x1, 0x8, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9)
21:54:33 executing program 2:
socketpair(0x9, 0x5, 0x5, &(0x7f0000000080)) (async)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
socketpair(0x10, 0x80000, 0x2, &(0x7f00000000c0)) (async)
r0 = perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x8, 0xc0, 0x2, 0x5, 0x0, 0x8ef0, 0x10140, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x4, @perf_config_ext={0xa, 0x7}, 0x80000, 0x7, 0xad5, 0x7, 0xfff, 0x1, 0x8, 0x0, 0x7, 0x0, 0x7}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x9)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9)
[ 3213.884377][ T4461] ? file_end_write+0x1c0/0x1c0
[ 3213.889066][ T4461] ? create_io_thread+0x1e0/0x1e0
[ 3213.893923][ T4461] ? mutex_unlock+0xb2/0x260
[ 3213.898361][ T4461] ? __mutex_lock_slowpath+0x10/0x10
[ 3213.903473][ T4461] __x64_sys_clone+0x23f/0x290
[ 3213.908074][ T4461] ? __do_sys_vfork+0x130/0x130
[ 3213.912758][ T4461] ? ksys_write+0x260/0x2c0
[ 3213.917101][ T4461] ? debug_smp_processor_id+0x17/0x20
[ 3213.922306][ T4461] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3213.928206][ T4461] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3213.933675][ T4461] do_syscall_64+0x3d/0xb0
[ 3213.937929][ T4461] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3213.943654][ T4461] RIP: 0033:0x7f024b55cae9
[ 3213.947921][ T4461] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3213.967352][ T4461] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3213.975605][ T4461] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
21:54:34 executing program 4:
syz_clone(0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0)
21:54:34 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r3 = getpid()
r4 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1, 0x9}, 0x0, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r4, 0x0, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0xe, 0x3f, 0x20, 0x0, 0x1ff, 0x800, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000140)}, 0x80, 0x0, 0x4, 0x7, 0xf956, 0x59, 0x7ff, 0x0, 0x2, 0x0, 0x100}, r4, 0x6, r2, 0x3)
r5 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x1, 0x9, 0x0, 0x0, 0x3ff, 0x410, 0x16, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xf, 0x4, @perf_bp={&(0x7f0000000080), 0x5}, 0x808, 0x7fff, 0xfff, 0x9, 0x3, 0x6, 0x9, 0x0, 0x3, 0x0, 0x6}, r3, 0x6, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0xb5, 0x2, 0x7, 0x0, 0x7ff, 0xc020, 0xb, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x314, 0x101}, 0x100, 0x2000000000, 0x7ff, 0x4, 0x7fff, 0x4, 0x3f, 0x0, 0x401, 0x0, 0xae}, r1, 0x0, 0xffffffffffffffff, 0x9)
r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0xff, 0x3, 0x4, 0x7a, 0x0, 0x1, 0x40000, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x637a, 0x1, @perf_bp={&(0x7f0000000300), 0x9}, 0x1008, 0x7dd1, 0x200, 0x0, 0x8000, 0x8, 0x3f, 0x0, 0x101, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x0)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0x2, 0xfc, 0xd4, 0x0, 0x7fff, 0x2400, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1000000, 0x2, @perf_config_ext={0x9, 0x7ff}, 0xa001, 0x80000001, 0x8, 0x9, 0x897, 0x6, 0x0, 0x0, 0x25b4, 0x0, 0x80}, r0, 0x5, r6, 0x8)
21:54:34 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46)
[ 3213.983409][ T4461] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3213.991222][ T4461] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3213.999042][ T4461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3214.006845][ T4461] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3214.014656][ T4461]
[ 3214.064996][ T4499] FAULT_INJECTION: forcing a failure.
[ 3214.064996][ T4499] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3214.096226][ T4499] CPU: 0 PID: 4499 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3214.107689][ T4499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3214.117586][ T4499] Call Trace:
[ 3214.120706][ T4499]
[ 3214.123483][ T4499] dump_stack_lvl+0x151/0x1b7
[ 3214.128002][ T4499] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3214.133474][ T4499] dump_stack+0x15/0x17
[ 3214.137457][ T4499] should_fail+0x3c6/0x510
[ 3214.141723][ T4499] should_fail_alloc_page+0x5a/0x80
[ 3214.146744][ T4499] prepare_alloc_pages+0x15c/0x700
[ 3214.151693][ T4499] ? __alloc_pages+0x5e0/0x5e0
[ 3214.156295][ T4499] ? __alloc_pages_bulk+0xe60/0xe60
[ 3214.161329][ T4499] __alloc_pages+0x138/0x5e0
[ 3214.165755][ T4499] ? prep_new_page+0x110/0x110
[ 3214.170356][ T4499] ? 0xffffffffa0028480
[ 3214.174345][ T4499] ? is_bpf_text_address+0x172/0x190
[ 3214.179476][ T4499] pte_alloc_one+0x73/0x1b0
[ 3214.183805][ T4499] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3214.188842][ T4499] ? arch_stack_walk+0xf3/0x140
[ 3214.193527][ T4499] __pte_alloc+0x86/0x350
[ 3214.197694][ T4499] ? free_pgtables+0x280/0x280
[ 3214.202293][ T4499] ? _raw_spin_lock+0xa4/0x1b0
[ 3214.207016][ T4499] ? __kasan_check_write+0x14/0x20
[ 3214.211950][ T4499] copy_page_range+0x28a8/0x2f90
[ 3214.216733][ T4499] ? __kasan_slab_alloc+0xb1/0xe0
[ 3214.221937][ T4499] ? pfn_valid+0x1e0/0x1e0
[ 3214.226181][ T4499] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3214.231826][ T4499] ? __rb_insert_augmented+0x5de/0x610
[ 3214.237122][ T4499] copy_mm+0xc7e/0x13e0
[ 3214.241112][ T4499] ? copy_signal+0x610/0x610
[ 3214.245535][ T4499] ? __init_rwsem+0xd6/0x1c0
[ 3214.249960][ T4499] ? copy_signal+0x4e3/0x610
[ 3214.254388][ T4499] copy_process+0x12bc/0x3260
[ 3214.258909][ T4499] ? proc_fail_nth_write+0x20b/0x290
[ 3214.264038][ T4499] ? fsnotify_perm+0x6a/0x5d0
[ 3214.268539][ T4499] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3214.273484][ T4499] ? vfs_write+0x9ec/0x1110
[ 3214.277822][ T4499] kernel_clone+0x21e/0x9e0
[ 3214.282169][ T4499] ? file_end_write+0x1c0/0x1c0
[ 3214.286853][ T4499] ? create_io_thread+0x1e0/0x1e0
[ 3214.291712][ T4499] ? mutex_unlock+0xb2/0x260
[ 3214.296139][ T4499] ? __mutex_lock_slowpath+0x10/0x10
[ 3214.301258][ T4499] __x64_sys_clone+0x23f/0x290
[ 3214.305864][ T4499] ? __do_sys_vfork+0x130/0x130
[ 3214.310544][ T4499] ? ksys_write+0x260/0x2c0
[ 3214.314884][ T4499] ? debug_smp_processor_id+0x17/0x20
[ 3214.320109][ T4499] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3214.326012][ T4499] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3214.331551][ T4499] do_syscall_64+0x3d/0xb0
[ 3214.335812][ T4499] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3214.341529][ T4499] RIP: 0033:0x7f024b55cae9
[ 3214.345783][ T4499] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3214.365311][ T4499] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3214.373555][ T4499] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3214.381371][ T4499] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3214.389181][ T4499] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3214.396989][ T4499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3214.404801][ T4499] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3214.412622][ T4499]
21:54:36 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0)
r2 = openat$cgroup_procs(r1, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r2, &(0x7f0000000040), 0x12)
bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0xee6, 0x3, 0x2, 0x2, 0x1, 0xfffffff8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2, 0xd}, 0x48) (async)
openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.threads\x00', 0x2, 0x0)
21:54:36 executing program 4:
syz_clone(0x0, 0x0, 0x10100000000000, 0x0, 0x0, 0x0)
21:54:36 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0) (async)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r3 = getpid() (async)
r4 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1, 0x9}, 0x0, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r4, 0x0, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0xe, 0x3f, 0x20, 0x0, 0x1ff, 0x800, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000140)}, 0x80, 0x0, 0x4, 0x7, 0xf956, 0x59, 0x7ff, 0x0, 0x2, 0x0, 0x100}, r4, 0x6, r2, 0x3)
r5 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x1, 0x9, 0x0, 0x0, 0x3ff, 0x410, 0x16, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xf, 0x4, @perf_bp={&(0x7f0000000080), 0x5}, 0x808, 0x7fff, 0xfff, 0x9, 0x3, 0x6, 0x9, 0x0, 0x3, 0x0, 0x6}, r3, 0x6, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0xb5, 0x2, 0x7, 0x0, 0x7ff, 0xc020, 0xb, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x314, 0x101}, 0x100, 0x2000000000, 0x7ff, 0x4, 0x7fff, 0x4, 0x3f, 0x0, 0x401, 0x0, 0xae}, r1, 0x0, 0xffffffffffffffff, 0x9) (async)
r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0xff, 0x3, 0x4, 0x7a, 0x0, 0x1, 0x40000, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x637a, 0x1, @perf_bp={&(0x7f0000000300), 0x9}, 0x1008, 0x7dd1, 0x200, 0x0, 0x8000, 0x8, 0x3f, 0x0, 0x101, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x0)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0x2, 0xfc, 0xd4, 0x0, 0x7fff, 0x2400, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1000000, 0x2, @perf_config_ext={0x9, 0x7ff}, 0xa001, 0x80000001, 0x8, 0x9, 0x897, 0x6, 0x0, 0x0, 0x25b4, 0x0, 0x80}, r0, 0x5, r6, 0x8)
21:54:36 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47)
21:54:36 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000000)='memory.events.local\x00', 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r3, &(0x7f0000000000)='memory.events.local\x00', 0x0, 0x0) (async)
21:54:36 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600)
r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x6, r0, 0x0)
r1 = gettid()
r2 = getpid()
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2, 0x9, 0x0, 0x2, 0x0, 0x3d8a, 0x40, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0xa260, 0x3, 0x182b263b, 0x3, 0x7f, 0xffff6529, 0x0, 0x0, 0x4, 0x0, 0x1}, r2, 0x2, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0)
perf_event_open(&(0x7f0000000740)={0x4, 0x80, 0x3e, 0xf7, 0x0, 0x0, 0x0, 0xffff, 0x200, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x82000, 0x8000000000000000, 0x8, 0x1, 0x2, 0x2, 0x9df1, 0x0, 0x3, 0x0, 0xac}, r1, 0x6, 0xffffffffffffffff, 0x2)
getpid()
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffff8000, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x100000000, 0x9, 0x4, 0x6, 0x3f2b, 0x3, 0x0, 0x8001, 0x0, 0x10001})
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x7, 0x0, 0x80000001, 0x0, 0x9, 0x0, 0x80, 0x0, 0x40}, r1, 0x5, 0xffffffffffffffff, 0x0)
close(0xffffffffffffffff)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r5 = openat$cgroup_ro(r4, &(0x7f0000001300)='pids.current\x00', 0x26e1, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_type(r7, &(0x7f0000000000), 0x248800)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b80)={0x11, 0x6, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x1, 0x2, 0x1, 0x20, 0xffffffffffffffff}, @ldst={0x0, 0x3, 0x3, 0x4, 0x1, 0x0, 0xfffffffffffffff0}, @exit]}, &(0x7f0000001540)='GPL\x00', 0x0, 0x9a, &(0x7f0000001580)=""/154, 0x1f00, 0x10, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001940)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001980)={0x1, 0xb, 0x3, 0x6}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000001ac0)=[r6, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, 0xffffffffffffffff], &(0x7f0000001b00)=[{0x0, 0x3, 0x8}, {0x0, 0x3, 0xe, 0x1}, {0x0, 0x3, 0xd}, {0x2, 0x5, 0x3, 0x8}, {0x2, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x9, 0x4}, {0x2, 0x4, 0x1, 0xa}, {0x4, 0x4, 0x8}], 0x10, 0x7ff}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48)
21:54:36 executing program 4:
syz_clone(0x0, 0x0, 0x70000000000000, 0x0, 0x0, 0x0)
[ 3216.744653][ T4514] FAULT_INJECTION: forcing a failure.
[ 3216.744653][ T4514] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3216.802521][ T4514] CPU: 1 PID: 4514 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3216.814073][ T4514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3216.823969][ T4514] Call Trace:
[ 3216.827094][ T4514]
[ 3216.829871][ T4514] dump_stack_lvl+0x151/0x1b7
[ 3216.834471][ T4514] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3216.839964][ T4514] ? sched_clock+0x9/0x10
[ 3216.844106][ T4514] dump_stack+0x15/0x17
[ 3216.848096][ T4514] should_fail+0x3c6/0x510
[ 3216.852352][ T4514] should_fail_alloc_page+0x5a/0x80
[ 3216.857384][ T4514] prepare_alloc_pages+0x15c/0x700
[ 3216.862340][ T4514] ? __alloc_pages_bulk+0xe60/0xe60
[ 3216.867367][ T4514] __alloc_pages+0x138/0x5e0
[ 3216.871793][ T4514] ? stack_trace_save+0x1c0/0x1c0
[ 3216.876651][ T4514] ? prep_new_page+0x110/0x110
[ 3216.881258][ T4514] get_zeroed_page+0x19/0x40
[ 3216.885679][ T4514] __pud_alloc+0x8b/0x260
[ 3216.889843][ T4514] ? stack_trace_snprint+0xf0/0xf0
[ 3216.895090][ T4514] ? do_handle_mm_fault+0x2330/0x2330
21:54:36 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) (async)
r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x6, r0, 0x0) (async, rerun: 32)
r1 = gettid() (rerun: 32)
r2 = getpid()
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2, 0x9, 0x0, 0x2, 0x0, 0x3d8a, 0x40, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0xa260, 0x3, 0x182b263b, 0x3, 0x7f, 0xffff6529, 0x0, 0x0, 0x4, 0x0, 0x1}, r2, 0x2, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000740)={0x4, 0x80, 0x3e, 0xf7, 0x0, 0x0, 0x0, 0xffff, 0x200, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x82000, 0x8000000000000000, 0x8, 0x1, 0x2, 0x2, 0x9df1, 0x0, 0x3, 0x0, 0xac}, r1, 0x6, 0xffffffffffffffff, 0x2)
getpid() (async)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffff8000, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x100000000, 0x9, 0x4, 0x6, 0x3f2b, 0x3, 0x0, 0x8001, 0x0, 0x10001})
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x7, 0x0, 0x80000001, 0x0, 0x9, 0x0, 0x80, 0x0, 0x40}, r1, 0x5, 0xffffffffffffffff, 0x0) (async)
close(0xffffffffffffffff) (async)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async, rerun: 64)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0) (rerun: 64)
r5 = openat$cgroup_ro(r4, &(0x7f0000001300)='pids.current\x00', 0x26e1, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (rerun: 32)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_type(r7, &(0x7f0000000000), 0x248800) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b80)={0x11, 0x6, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x1, 0x2, 0x1, 0x20, 0xffffffffffffffff}, @ldst={0x0, 0x3, 0x3, 0x4, 0x1, 0x0, 0xfffffffffffffff0}, @exit]}, &(0x7f0000001540)='GPL\x00', 0x0, 0x9a, &(0x7f0000001580)=""/154, 0x1f00, 0x10, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001940)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001980)={0x1, 0xb, 0x3, 0x6}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000001ac0)=[r6, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, 0xffffffffffffffff], &(0x7f0000001b00)=[{0x0, 0x3, 0x8}, {0x0, 0x3, 0xe, 0x1}, {0x0, 0x3, 0xd}, {0x2, 0x5, 0x3, 0x8}, {0x2, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x9, 0x4}, {0x2, 0x4, 0x1, 0xa}, {0x4, 0x4, 0x8}], 0x10, 0x7ff}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48)
21:54:36 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r3, &(0x7f0000000000)='memory.events.local\x00', 0x0, 0x0)
21:54:36 executing program 4:
syz_clone(0x0, 0x0, 0xb037263a550000, 0x0, 0x0, 0x0)
[ 3216.900295][ T4514] ? __stack_depot_save+0x34/0x470
[ 3216.905241][ T4514] ? anon_vma_clone+0x9a/0x500
[ 3216.909841][ T4514] copy_page_range+0x2bcf/0x2f90
[ 3216.914616][ T4514] ? __kasan_slab_alloc+0xb1/0xe0
[ 3216.919477][ T4514] ? slab_post_alloc_hook+0x53/0x2c0
[ 3216.924596][ T4514] ? copy_mm+0xa3a/0x13e0
[ 3216.928847][ T4514] ? copy_process+0x12bc/0x3260
[ 3216.933531][ T4514] ? kernel_clone+0x21e/0x9e0
[ 3216.938043][ T4514] ? __x64_sys_clone+0x23f/0x290
[ 3216.942817][ T4514] ? do_syscall_64+0x3d/0xb0
[ 3216.947329][ T4514] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3216.953239][ T4514] ? pfn_valid+0x1e0/0x1e0
[ 3216.957488][ T4514] ? rwsem_write_trylock+0x15b/0x290
[ 3216.962606][ T4514] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0
[ 3216.969085][ T4514] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3216.974586][ T4514] ? __rb_insert_augmented+0x5de/0x610
[ 3216.979879][ T4514] copy_mm+0xc7e/0x13e0
[ 3216.983874][ T4514] ? copy_signal+0x610/0x610
[ 3216.988296][ T4514] ? __init_rwsem+0xd6/0x1c0
[ 3216.992722][ T4514] ? copy_signal+0x4e3/0x610
[ 3216.997152][ T4514] copy_process+0x12bc/0x3260
[ 3217.001663][ T4514] ? proc_fail_nth_write+0x20b/0x290
[ 3217.006788][ T4514] ? fsnotify_perm+0x6a/0x5d0
[ 3217.011300][ T4514] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3217.016339][ T4514] ? vfs_write+0x9ec/0x1110
[ 3217.021021][ T4514] kernel_clone+0x21e/0x9e0
[ 3217.025358][ T4514] ? file_end_write+0x1c0/0x1c0
[ 3217.030045][ T4514] ? create_io_thread+0x1e0/0x1e0
[ 3217.035079][ T4514] ? mutex_unlock+0xb2/0x260
[ 3217.039505][ T4514] ? __mutex_lock_slowpath+0x10/0x10
[ 3217.044628][ T4514] __x64_sys_clone+0x23f/0x290
[ 3217.049225][ T4514] ? __do_sys_vfork+0x130/0x130
[ 3217.053910][ T4514] ? ksys_write+0x260/0x2c0
[ 3217.058342][ T4514] ? debug_smp_processor_id+0x17/0x20
[ 3217.063547][ T4514] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3217.069450][ T4514] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3217.074917][ T4514] do_syscall_64+0x3d/0xb0
[ 3217.079172][ T4514] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3217.084900][ T4514] RIP: 0033:0x7f024b55cae9
[ 3217.089151][ T4514] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3217.108681][ T4514] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3217.116926][ T4514] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3217.124737][ T4514] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3217.132546][ T4514] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3217.140798][ T4514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:54:37 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48)
[ 3217.148605][ T4514] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3217.156420][ T4514]
21:54:37 executing program 4:
syz_clone(0x0, 0x0, 0xf0410d1b000000, 0x0, 0x0, 0x0)
[ 3217.206554][ T4550] FAULT_INJECTION: forcing a failure.
[ 3217.206554][ T4550] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3217.246291][ T4550] CPU: 0 PID: 4550 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3217.257757][ T4550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3217.267650][ T4550] Call Trace:
[ 3217.271292][ T4550]
[ 3217.274072][ T4550] dump_stack_lvl+0x151/0x1b7
[ 3217.278809][ T4550] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3217.284547][ T4550] dump_stack+0x15/0x17
[ 3217.288704][ T4550] should_fail+0x3c6/0x510
[ 3217.292962][ T4550] should_fail_alloc_page+0x5a/0x80
[ 3217.297982][ T4550] prepare_alloc_pages+0x15c/0x700
[ 3217.302951][ T4550] ? __alloc_pages_bulk+0xe60/0xe60
[ 3217.307961][ T4550] __alloc_pages+0x138/0x5e0
[ 3217.312385][ T4550] ? prep_new_page+0x110/0x110
[ 3217.316987][ T4550] ? __alloc_pages+0x206/0x5e0
[ 3217.321585][ T4550] ? prep_new_page+0x110/0x110
[ 3217.326186][ T4550] ? __kasan_check_write+0x14/0x20
[ 3217.331149][ T4550] ? _raw_spin_lock+0xa4/0x1b0
[ 3217.335743][ T4550] pte_alloc_one+0x73/0x1b0
[ 3217.340071][ T4550] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3217.345107][ T4550] ? __pmd_alloc+0x48d/0x550
[ 3217.349533][ T4550] __pte_alloc+0x86/0x350
[ 3217.353707][ T4550] ? __pud_alloc+0x260/0x260
[ 3217.358123][ T4550] ? __pud_alloc+0x213/0x260
[ 3217.362845][ T4550] ? free_pgtables+0x280/0x280
[ 3217.367552][ T4550] ? do_handle_mm_fault+0x2330/0x2330
[ 3217.372740][ T4550] ? __stack_depot_save+0x34/0x470
[ 3217.377687][ T4550] ? anon_vma_clone+0x9a/0x500
[ 3217.382318][ T4550] copy_page_range+0x28a8/0x2f90
[ 3217.387064][ T4550] ? __kasan_slab_alloc+0xb1/0xe0
[ 3217.391941][ T4550] ? slab_post_alloc_hook+0x53/0x2c0
[ 3217.397045][ T4550] ? kernel_clone+0x21e/0x9e0
[ 3217.401560][ T4550] ? do_syscall_64+0x3d/0xb0
[ 3217.405985][ T4550] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3217.411892][ T4550] ? pfn_valid+0x1e0/0x1e0
[ 3217.416140][ T4550] ? rwsem_write_trylock+0x15b/0x290
[ 3217.421265][ T4550] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0
[ 3217.427511][ T4550] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3217.433075][ T4550] ? __rb_insert_augmented+0x5de/0x610
[ 3217.438375][ T4550] copy_mm+0xc7e/0x13e0
[ 3217.442465][ T4550] ? copy_signal+0x610/0x610
[ 3217.447250][ T4550] ? __init_rwsem+0xd6/0x1c0
[ 3217.452224][ T4550] ? copy_signal+0x4e3/0x610
[ 3217.457052][ T4550] copy_process+0x12bc/0x3260
[ 3217.461569][ T4550] ? proc_fail_nth_write+0x20b/0x290
[ 3217.466689][ T4550] ? fsnotify_perm+0x6a/0x5d0
[ 3217.471292][ T4550] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3217.476232][ T4550] ? vfs_write+0x9ec/0x1110
[ 3217.480663][ T4550] kernel_clone+0x21e/0x9e0
[ 3217.485085][ T4550] ? file_end_write+0x1c0/0x1c0
[ 3217.489775][ T4550] ? create_io_thread+0x1e0/0x1e0
[ 3217.495673][ T4550] ? mutex_unlock+0xb2/0x260
[ 3217.500539][ T4550] ? __mutex_lock_slowpath+0x10/0x10
[ 3217.505663][ T4550] __x64_sys_clone+0x23f/0x290
[ 3217.510274][ T4550] ? __do_sys_vfork+0x130/0x130
[ 3217.515032][ T4550] ? ksys_write+0x260/0x2c0
[ 3217.519371][ T4550] ? debug_smp_processor_id+0x17/0x20
[ 3217.524596][ T4550] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3217.530566][ T4550] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3217.536051][ T4550] do_syscall_64+0x3d/0xb0
[ 3217.540288][ T4550] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3217.546015][ T4550] RIP: 0033:0x7f024b55cae9
[ 3217.550892][ T4550] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3217.570503][ T4550] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3217.579124][ T4550] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3217.586924][ T4550] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3217.594737][ T4550] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3217.602723][ T4550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3217.610532][ T4550] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3217.618958][ T4550]
21:54:39 executing program 2:
socketpair(0x0, 0x0, 0x0, 0x0)
r0 = syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r3 = getpid()
r4 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1, 0x9}, 0x0, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r4, 0x0, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0xe, 0x3f, 0x20, 0x0, 0x1ff, 0x800, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000140)}, 0x80, 0x0, 0x4, 0x7, 0xf956, 0x59, 0x7ff, 0x0, 0x2, 0x0, 0x100}, r4, 0x6, r2, 0x3)
r5 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x1, 0x9, 0x0, 0x0, 0x3ff, 0x410, 0x16, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xf, 0x4, @perf_bp={&(0x7f0000000080), 0x5}, 0x808, 0x7fff, 0xfff, 0x9, 0x3, 0x6, 0x9, 0x0, 0x3, 0x0, 0x6}, r3, 0x6, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0xb5, 0x2, 0x7, 0x0, 0x7ff, 0xc020, 0xb, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x314, 0x101}, 0x100, 0x2000000000, 0x7ff, 0x4, 0x7fff, 0x4, 0x3f, 0x0, 0x401, 0x0, 0xae}, r1, 0x0, 0xffffffffffffffff, 0x9)
r6 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0xff, 0x3, 0x4, 0x7a, 0x0, 0x1, 0x40000, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x637a, 0x1, @perf_bp={&(0x7f0000000300), 0x9}, 0x1008, 0x7dd1, 0x200, 0x0, 0x8000, 0x8, 0x3f, 0x0, 0x101, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x0)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0x2, 0xfc, 0xd4, 0x0, 0x7fff, 0x2400, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1000000, 0x2, @perf_config_ext={0x9, 0x7ff}, 0xa001, 0x80000001, 0x8, 0x9, 0x897, 0x6, 0x0, 0x0, 0x25b4, 0x0, 0x80}, r0, 0x5, r6, 0x8)
socketpair(0x0, 0x0, 0x0, 0x0) (async)
syz_clone(0x4049300, 0x0, 0x94b18cca6c1b290e, 0x0, 0x0, 0x0) (async)
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3) (async)
getpid() (async)
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x1, 0x9}, 0x0, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r4, 0x0, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0xe, 0x3f, 0x20, 0x0, 0x1ff, 0x800, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000140)}, 0x80, 0x0, 0x4, 0x7, 0xf956, 0x59, 0x7ff, 0x0, 0x2, 0x0, 0x100}, r4, 0x6, r2, 0x3) (async)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x1, 0x9, 0x0, 0x0, 0x3ff, 0x410, 0x16, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xf, 0x4, @perf_bp={&(0x7f0000000080), 0x5}, 0x808, 0x7fff, 0xfff, 0x9, 0x3, 0x6, 0x9, 0x0, 0x3, 0x0, 0x6}, r3, 0x6, 0xffffffffffffffff, 0x8) (async)
perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x2, 0xb5, 0x2, 0x7, 0x0, 0x7ff, 0xc020, 0xb, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x401, 0x2, @perf_config_ext={0x314, 0x101}, 0x100, 0x2000000000, 0x7ff, 0x4, 0x7fff, 0x4, 0x3f, 0x0, 0x401, 0x0, 0xae}, r1, 0x0, 0xffffffffffffffff, 0x9) (async)
perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0xff, 0x3, 0x4, 0x7a, 0x0, 0x1, 0x40000, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x637a, 0x1, @perf_bp={&(0x7f0000000300), 0x9}, 0x1008, 0x7dd1, 0x200, 0x0, 0x8000, 0x8, 0x3f, 0x0, 0x101, 0x0, 0x3}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0x0) (async)
perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x40, 0x2, 0xfc, 0xd4, 0x0, 0x7fff, 0x2400, 0xa, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1000000, 0x2, @perf_config_ext={0x9, 0x7ff}, 0xa001, 0x80000001, 0x8, 0x9, 0x897, 0x6, 0x0, 0x0, 0x25b4, 0x0, 0x80}, r0, 0x5, r6, 0x8) (async)
21:54:39 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x4, 0x1000, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x32600) (async)
r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x6, r0, 0x0)
r1 = gettid() (async)
r2 = getpid()
perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x2, 0x9, 0x0, 0x2, 0x0, 0x3d8a, 0x40, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0xa260, 0x3, 0x182b263b, 0x3, 0x7f, 0xffff6529, 0x0, 0x0, 0x4, 0x0, 0x1}, r2, 0x2, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0)
perf_event_open(&(0x7f0000000740)={0x4, 0x80, 0x3e, 0xf7, 0x0, 0x0, 0x0, 0xffff, 0x200, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x82000, 0x8000000000000000, 0x8, 0x1, 0x2, 0x2, 0x9df1, 0x0, 0x3, 0x0, 0xac}, r1, 0x6, 0xffffffffffffffff, 0x2) (async)
getpid() (async)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffff8000, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x100000000, 0x9, 0x4, 0x6, 0x3f2b, 0x3, 0x0, 0x8001, 0x0, 0x10001}) (async)
perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0xdf, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000440), 0x2}, 0x0, 0x0, 0x7, 0x0, 0x80000001, 0x0, 0x9, 0x0, 0x80, 0x0, 0x40}, r1, 0x5, 0xffffffffffffffff, 0x0) (async)
close(0xffffffffffffffff)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) (async)
r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r5 = openat$cgroup_ro(r4, &(0x7f0000001300)='pids.current\x00', 0x26e1, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40086602, &(0x7f0000000180))
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
write$cgroup_type(r7, &(0x7f0000000000), 0x248800) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001b80)={0x11, 0x6, &(0x7f0000001500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6}, [@jmp={0x5, 0x0, 0x1, 0x2, 0x1, 0x20, 0xffffffffffffffff}, @ldst={0x0, 0x3, 0x3, 0x4, 0x1, 0x0, 0xfffffffffffffff0}, @exit]}, &(0x7f0000001540)='GPL\x00', 0x0, 0x9a, &(0x7f0000001580)=""/154, 0x1f00, 0x10, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000001940)={0xa, 0x2}, 0x8, 0x10, &(0x7f0000001980)={0x1, 0xb, 0x3, 0x6}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000001ac0)=[r6, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, r5, r6, 0xffffffffffffffff], &(0x7f0000001b00)=[{0x0, 0x3, 0x8}, {0x0, 0x3, 0xe, 0x1}, {0x0, 0x3, 0xd}, {0x2, 0x5, 0x3, 0x8}, {0x2, 0x2, 0x0, 0x8}, {0x1, 0x5, 0x9, 0x4}, {0x2, 0x4, 0x1, 0xa}, {0x4, 0x4, 0x8}], 0x10, 0x7ff}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48)
21:54:39 executing program 4:
syz_clone(0x0, 0x0, 0xf055731f2a0000, 0x0, 0x0, 0x0)
21:54:39 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49)
21:54:39 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x0, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:39 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='tasks\x00', 0x2, 0x0)
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xab, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12)
21:54:39 executing program 4:
syz_clone(0x0, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0)
[ 3219.783744][ T4568] FAULT_INJECTION: forcing a failure.
[ 3219.783744][ T4568] name failslab, interval 1, probability 0, space 0, times 0
[ 3219.811822][ T4568] CPU: 0 PID: 4568 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3219.823387][ T4568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3219.833694][ T4568] Call Trace:
[ 3219.836802][ T4568]
[ 3219.839680][ T4568] dump_stack_lvl+0x151/0x1b7
[ 3219.844196][ T4568] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3219.849691][ T4568] dump_stack+0x15/0x17
[ 3219.853661][ T4568] should_fail+0x3c6/0x510
[ 3219.857919][ T4568] __should_failslab+0xa4/0xe0
[ 3219.862509][ T4568] ? vm_area_dup+0x26/0x230
[ 3219.866847][ T4568] should_failslab+0x9/0x20
[ 3219.871184][ T4568] slab_pre_alloc_hook+0x37/0xd0
[ 3219.875958][ T4568] ? vm_area_dup+0x26/0x230
21:54:39 executing program 5:
socketpair$unix(0x1, 0x0, 0x0, 0x0)
syz_clone(0x158a4600, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r0, 0x10f, 0x88, 0x0, 0x0)
recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/255, 0xff}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000380)=""/8, 0x8}, {&(0x7f00000003c0)=""/12, 0xc}, {&(0x7f0000000400)=""/1, 0x1}], 0x7, &(0x7f00000004c0)=[@cred={{0x1c}}], 0x20}, 0x2140)
21:54:39 executing program 5:
socketpair$unix(0x1, 0x0, 0x0, 0x0)
syz_clone(0x158a4600, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r0, 0x10f, 0x88, 0x0, 0x0) (async)
setsockopt$sock_attach_bpf(r0, 0x10f, 0x88, 0x0, 0x0)
recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/255, 0xff}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000380)=""/8, 0x8}, {&(0x7f00000003c0)=""/12, 0xc}, {&(0x7f0000000400)=""/1, 0x1}], 0x7, &(0x7f00000004c0)=[@cred={{0x1c}}], 0x20}, 0x2140)
[ 3219.880386][ T4568] kmem_cache_alloc+0x44/0x200
[ 3219.884988][ T4568] vm_area_dup+0x26/0x230
[ 3219.889239][ T4568] copy_mm+0x9a1/0x13e0
[ 3219.893241][ T4568] ? copy_signal+0x610/0x610
[ 3219.897657][ T4568] ? __init_rwsem+0xd6/0x1c0
[ 3219.902090][ T4568] ? copy_signal+0x4e3/0x610
[ 3219.906513][ T4568] copy_process+0x12bc/0x3260
[ 3219.911032][ T4568] ? proc_fail_nth_write+0x20b/0x290
[ 3219.916148][ T4568] ? fsnotify_perm+0x6a/0x5d0
[ 3219.920660][ T4568] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3219.925696][ T4568] ? vfs_write+0x9ec/0x1110
[ 3219.930122][ T4568] kernel_clone+0x21e/0x9e0
[ 3219.934461][ T4568] ? file_end_write+0x1c0/0x1c0
[ 3219.939702][ T4568] ? create_io_thread+0x1e0/0x1e0
[ 3219.944585][ T4568] ? mutex_unlock+0xb2/0x260
[ 3219.948991][ T4568] ? __mutex_lock_slowpath+0x10/0x10
[ 3219.954106][ T4568] __x64_sys_clone+0x23f/0x290
[ 3219.958928][ T4568] ? __do_sys_vfork+0x130/0x130
[ 3219.963699][ T4568] ? ksys_write+0x260/0x2c0
[ 3219.968059][ T4568] ? debug_smp_processor_id+0x17/0x20
[ 3219.973249][ T4568] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3219.979582][ T4568] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3219.985080][ T4568] do_syscall_64+0x3d/0xb0
[ 3219.989300][ T4568] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3219.995672][ T4568] RIP: 0033:0x7f024b55cae9
[ 3220.000022][ T4568] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3220.019546][ T4568] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:54:40 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='tasks\x00', 0x2, 0x0)
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async, rerun: 32)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async, rerun: 32)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xab, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3) (async)
write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12)
21:54:40 executing program 5:
socketpair$unix(0x1, 0x0, 0x0, 0x0) (async)
socketpair$unix(0x1, 0x0, 0x0, 0x0)
syz_clone(0x158a4600, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r0, 0x10f, 0x88, 0x0, 0x0)
recvmsg$unix(r0, &(0x7f0000000500)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000080)=""/184, 0xb8}, {&(0x7f0000000140)=""/255, 0xff}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f00000002c0)=""/146, 0x92}, {&(0x7f0000000380)=""/8, 0x8}, {&(0x7f00000003c0)=""/12, 0xc}, {&(0x7f0000000400)=""/1, 0x1}], 0x7, &(0x7f00000004c0)=[@cred={{0x1c}}], 0x20}, 0x2140)
21:54:40 executing program 4:
syz_clone(0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0)
21:54:40 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50)
[ 3220.027796][ T4568] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3220.035695][ T4568] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3220.043588][ T4568] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3220.052275][ T4568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3220.060351][ T4568] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3220.068179][ T4568]
21:54:40 executing program 5:
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x18)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0)
r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000007c0)=0x1)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x5)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112})
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x6}]})
close(r2)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r3}, 0x10)
r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000b40)=ANY=[@ANYBLOB="18590000000000000060d21a754edc8d85f174af5200000000000000", @ANYRES32=r4, @ANYBLOB="000000000000000056080000830000001800000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
r5 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x6, 0x3f, 0x9, 0x80, 0x0, 0x1, 0x1028, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0x8}, 0x80400, 0x3, 0x0, 0x1, 0x7fff, 0x0, 0x5, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8)
r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x16, 0xb4, 0x7f}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x56, 0x8, 0x0, 0x0, 0x83}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
r7 = perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x3, 0x3, 0x9, 0x6, 0x0, 0x4, 0x100000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x6}, 0x80, 0x1, 0x1, 0x4, 0x3, 0x7, 0x6, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x8, r5, 0x8)
openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x0, 0x0, 0xffffffff, 0x1402, r3, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x6}, 0x48)
r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r3, 0x0, &(0x7f0000000500)=""/245}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x400006}, @map_fd={0x18, 0x0, 0x1, 0x0, r8}, @generic={0x56, 0x8, 0x0, 0x0, 0x83}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
close(r8)
perf_event_open(&(0x7f00000008c0)={0x4, 0x80, 0x7, 0x1, 0x5d, 0x3, 0x0, 0x4, 0x81180, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x55, 0x6}, 0x4006, 0x6f, 0x3, 0x0, 0x3ff, 0x3, 0x9b68, 0x0, 0x1b, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0x9)
21:54:40 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x1)
socketpair(0x0, 0x0, 0x3, 0x0)
socketpair(0x26, 0xa, 0x1000, &(0x7f0000000040))
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair(0x1f, 0xa, 0xa00000, &(0x7f0000000000))
socketpair(0x15, 0x4, 0x1, &(0x7f00000000c0))
21:54:40 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x1)
socketpair(0x0, 0x0, 0x3, 0x0)
socketpair(0x26, 0xa, 0x1000, &(0x7f0000000040))
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair(0x1f, 0xa, 0xa00000, &(0x7f0000000000))
socketpair(0x15, 0x4, 0x1, &(0x7f00000000c0))
mkdir(&(0x7f0000000080)='./file0\x00', 0x1) (async)
socketpair(0x0, 0x0, 0x3, 0x0) (async)
socketpair(0x26, 0xa, 0x1000, &(0x7f0000000040)) (async)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
socketpair(0x1f, 0xa, 0xa00000, &(0x7f0000000000)) (async)
socketpair(0x15, 0x4, 0x1, &(0x7f00000000c0)) (async)
[ 3220.125873][ T4609] FAULT_INJECTION: forcing a failure.
[ 3220.125873][ T4609] name failslab, interval 1, probability 0, space 0, times 0
[ 3220.177415][ T4609] CPU: 1 PID: 4609 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3220.188891][ T4609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3220.198785][ T4609] Call Trace:
[ 3220.201909][ T4609]
[ 3220.204689][ T4609] dump_stack_lvl+0x151/0x1b7
[ 3220.209249][ T4609] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3220.214952][ T4609] dump_stack+0x15/0x17
[ 3220.219110][ T4609] should_fail+0x3c6/0x510
[ 3220.223360][ T4609] __should_failslab+0xa4/0xe0
[ 3220.227961][ T4609] ? vm_area_dup+0x26/0x230
[ 3220.232823][ T4609] should_failslab+0x9/0x20
[ 3220.237161][ T4609] slab_pre_alloc_hook+0x37/0xd0
[ 3220.242296][ T4609] ? vm_area_dup+0x26/0x230
[ 3220.246630][ T4609] kmem_cache_alloc+0x44/0x200
[ 3220.251232][ T4609] vm_area_dup+0x26/0x230
[ 3220.255488][ T4609] copy_mm+0x9a1/0x13e0
[ 3220.259506][ T4609] ? copy_signal+0x610/0x610
[ 3220.263992][ T4609] ? __init_rwsem+0xd6/0x1c0
[ 3220.268420][ T4609] ? copy_signal+0x4e3/0x610
[ 3220.272843][ T4609] copy_process+0x12bc/0x3260
[ 3220.277532][ T4609] ? proc_fail_nth_write+0x20b/0x290
[ 3220.282643][ T4609] ? fsnotify_perm+0x6a/0x5d0
[ 3220.287157][ T4609] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3220.292104][ T4609] ? vfs_write+0x9ec/0x1110
[ 3220.296453][ T4609] kernel_clone+0x21e/0x9e0
[ 3220.300971][ T4609] ? file_end_write+0x1c0/0x1c0
[ 3220.305647][ T4609] ? create_io_thread+0x1e0/0x1e0
[ 3220.310598][ T4609] ? mutex_unlock+0xb2/0x260
[ 3220.315020][ T4609] ? __mutex_lock_slowpath+0x10/0x10
[ 3220.320673][ T4609] __x64_sys_clone+0x23f/0x290
[ 3220.325439][ T4609] ? __do_sys_vfork+0x130/0x130
[ 3220.330209][ T4609] ? ksys_write+0x260/0x2c0
[ 3220.334637][ T4609] ? debug_smp_processor_id+0x17/0x20
[ 3220.339842][ T4609] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3220.345745][ T4609] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3220.351214][ T4609] do_syscall_64+0x3d/0xb0
[ 3220.355639][ T4609] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3220.361626][ T4609] RIP: 0033:0x7f024b55cae9
[ 3220.365880][ T4609] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3220.385332][ T4609] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3220.393565][ T4609] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3220.401378][ T4609] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3220.409277][ T4609] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3220.417089][ T4609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3220.425072][ T4609] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3220.432898][ T4609]
21:54:40 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x0, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x0, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
21:54:40 executing program 4:
syz_clone(0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0)
21:54:40 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51)
21:54:40 executing program 2:
mkdir(&(0x7f0000000080)='./file0\x00', 0x1)
socketpair(0x0, 0x0, 0x3, 0x0)
socketpair(0x26, 0xa, 0x1000, &(0x7f0000000040)) (async)
socketpair(0x26, 0xa, 0x1000, &(0x7f0000000040))
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
socketpair(0x1f, 0xa, 0xa00000, &(0x7f0000000000))
socketpair(0x15, 0x4, 0x1, &(0x7f00000000c0)) (async)
socketpair(0x15, 0x4, 0x1, &(0x7f00000000c0))
21:54:40 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='tasks\x00', 0x2, 0x0)
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xab, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12)
21:54:40 executing program 5:
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x18) (async)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async)
r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000007c0)=0x1) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x5)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) (async)
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x6}]}) (async)
close(r2) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r3}, 0x10)
r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000b40)=ANY=[@ANYBLOB="18590000000000000060d21a754edc8d85f174af5200000000000000", @ANYRES32=r4, @ANYBLOB="000000000000000056080000830000001800000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
r5 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x6, 0x3f, 0x9, 0x80, 0x0, 0x1, 0x1028, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0x8}, 0x80400, 0x3, 0x0, 0x1, 0x7fff, 0x0, 0x5, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8) (async)
r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x16, 0xb4, 0x7f}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x56, 0x8, 0x0, 0x0, 0x83}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
r7 = perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x3, 0x3, 0x9, 0x6, 0x0, 0x4, 0x100000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x6}, 0x80, 0x1, 0x1, 0x4, 0x3, 0x7, 0x6, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x8, r5, 0x8)
openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x0, 0x0, 0xffffffff, 0x1402, r3, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x6}, 0x48) (async, rerun: 32)
r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48) (async, rerun: 32)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r3, 0x0, &(0x7f0000000500)=""/245}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x400006}, @map_fd={0x18, 0x0, 0x1, 0x0, r8}, @generic={0x56, 0x8, 0x0, 0x0, 0x83}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
close(r8) (async, rerun: 32)
perf_event_open(&(0x7f00000008c0)={0x4, 0x80, 0x7, 0x1, 0x5d, 0x3, 0x0, 0x4, 0x81180, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x55, 0x6}, 0x4006, 0x6f, 0x3, 0x0, 0x3ff, 0x3, 0x9b68, 0x0, 0x1b, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0x9) (rerun: 32)
21:54:40 executing program 2:
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x7fffffff, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0))
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0)
r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='rpc_socket_nospace\x00', r1}, 0x10)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open$cgroup(&(0x7f0000000780)={0x3, 0x80, 0x9, 0x7f, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x10080, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xae, 0x1, @perf_bp={&(0x7f0000000300), 0x10}, 0x1000, 0x5, 0x5, 0x2, 0x3, 0x4, 0x7, 0x0, 0x7fff, 0x0, 0xfffffffffffffff8}, r0, 0x1, r2, 0x6)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x8, 0x0}, 0x8)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x9, 0xb9ddce269930e476}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000900)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f00000006c0), 0x0, 0x8, &(0x7f00000009c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000080)='@\x00')
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x7, 0x0, 0x0, 0x9, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xc}, 0x48)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="500658070000000000f3ffffff5dde58b8"], &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x27, &(0x7f0000000380)=""/39, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000400)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x3, 0x6, 0x41}, 0x10, r4, 0x0, 0x2, &(0x7f0000000540)=[r0, r6], &(0x7f0000000580)=[{0x0, 0x5, 0x4, 0xc}, {0x3, 0x1, 0x7}], 0x10, 0x6}, 0x90)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x3, 0x8}, 0xc)
bpf$MAP_GET_NEXT_KEY(0x3, 0x0, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x1ff)
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xprtrdma_err_unrecognized\x00', r1}, 0x10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000002c0)='^+[,-[[\x00')
[ 3220.632070][ T4642] FAULT_INJECTION: forcing a failure.
[ 3220.632070][ T4642] name failslab, interval 1, probability 0, space 0, times 0
[ 3220.655750][ T4642] CPU: 1 PID: 4642 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3220.668115][ T4642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3220.678193][ T4642] Call Trace:
[ 3220.681307][ T4642]
[ 3220.684106][ T4642] dump_stack_lvl+0x151/0x1b7
[ 3220.688598][ T4642] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3220.694074][ T4642] dump_stack+0x15/0x17
[ 3220.698056][ T4642] should_fail+0x3c6/0x510
[ 3220.702317][ T4642] __should_failslab+0xa4/0xe0
[ 3220.706912][ T4642] ? vm_area_dup+0x26/0x230
[ 3220.711249][ T4642] should_failslab+0x9/0x20
[ 3220.715589][ T4642] slab_pre_alloc_hook+0x37/0xd0
[ 3220.720367][ T4642] ? vm_area_dup+0x26/0x230
[ 3220.724702][ T4642] kmem_cache_alloc+0x44/0x200
[ 3220.729489][ T4642] vm_area_dup+0x26/0x230
[ 3220.733642][ T4642] copy_mm+0x9a1/0x13e0
[ 3220.737635][ T4642] ? copy_signal+0x610/0x610
[ 3220.742062][ T4642] ? __init_rwsem+0xd6/0x1c0
[ 3220.746488][ T4642] ? copy_signal+0x4e3/0x610
[ 3220.750908][ T4642] copy_process+0x12bc/0x3260
[ 3220.755529][ T4642] ? proc_fail_nth_write+0x20b/0x290
[ 3220.760629][ T4642] ? fsnotify_perm+0x6a/0x5d0
[ 3220.765232][ T4642] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3220.770263][ T4642] ? vfs_write+0x9ec/0x1110
[ 3220.775154][ T4642] kernel_clone+0x21e/0x9e0
[ 3220.779490][ T4642] ? file_end_write+0x1c0/0x1c0
[ 3220.784183][ T4642] ? create_io_thread+0x1e0/0x1e0
[ 3220.789212][ T4642] ? mutex_unlock+0xb2/0x260
[ 3220.793640][ T4642] ? __mutex_lock_slowpath+0x10/0x10
[ 3220.798761][ T4642] __x64_sys_clone+0x23f/0x290
[ 3220.803362][ T4642] ? __do_sys_vfork+0x130/0x130
[ 3220.808049][ T4642] ? ksys_write+0x260/0x2c0
[ 3220.813257][ T4642] ? debug_smp_processor_id+0x17/0x20
[ 3220.818638][ T4642] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3220.824627][ T4642] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3220.830096][ T4642] do_syscall_64+0x3d/0xb0
[ 3220.834345][ T4642] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3220.840074][ T4642] RIP: 0033:0x7f024b55cae9
[ 3220.844337][ T4642] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3220.863770][ T4642] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3220.872015][ T4642] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
21:54:40 executing program 4:
syz_clone(0x0, 0x0, 0x700000000000000, 0x0, 0x0, 0x0)
21:54:41 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3, 0xad, 0x5, 0x8, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10)
r8 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180))
r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0), 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf5}]}, &(0x7f0000000440)='syzkaller\x00', 0x400, 0xc7, &(0x7f0000000c80)=""/199, 0x40f00, 0x12, '\x00', r6, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0xd, 0x6}, 0x10, 0x1a2b2, r7, 0x0, &(0x7f0000000b80)=[r10, r8, 0xffffffffffffffff, r9]}, 0x80)
r11 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r11, &(0x7f0000000180)}, 0x20)
r12 = openat$cgroup_ro(r0, &(0x7f0000000340)='freezer.self_freezing\x00', 0x0, 0x0)
r13 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r13, &(0x7f0000000180)}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x68}, @generic={0x4, 0xb, 0x7, 0x2, 0x220}, @jmp={0x5, 0x0, 0x4, 0x4, 0x1, 0xffffffffffffffe0, 0x8}], &(0x7f00000001c0)='GPL\x00', 0x1, 0xc0, &(0x7f0000000200)=""/192, 0x40f00, 0x10, '\x00', r6, 0x0, r2, 0x8, &(0x7f00000002c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xa, 0x8000, 0x3}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000440)=[r2, r11, r4, r12, r4, r13, 0xffffffffffffffff, r2], &(0x7f0000000480)=[{0x0, 0x1, 0x7, 0x7}, {0x5, 0x5, 0x3, 0x6}, {0x0, 0x4, 0x1, 0xb}, {0x2, 0x3, 0xf, 0x9}], 0x10, 0x80000000}, 0x90)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_type(r4, &(0x7f0000000000), 0x9)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0)
openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
close(r0)
21:54:41 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52)
[ 3220.880796][ T4642] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3220.888964][ T4642] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3220.896967][ T4642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3220.904760][ T4642] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3220.912577][ T4642]
21:54:41 executing program 4:
syz_clone(0x0, 0x0, 0x800000000000000, 0x0, 0x0, 0x0)
21:54:41 executing program 5:
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000800)=@generic={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x18) (async)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async)
r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000007c0)=0x1) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x5)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async)
r1 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) (async)
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x6}]}) (async)
close(r2) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000040)={0x0, r3}, 0x10) (async)
r4 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000b40)=ANY=[@ANYBLOB="18590000000000000060d21a754edc8d85f174af5200000000000000", @ANYRES32=r4, @ANYBLOB="000000000000000056080000830000001800000000000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
r5 = perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x6, 0x3f, 0x9, 0x80, 0x0, 0x1, 0x1028, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000300), 0x8}, 0x80400, 0x3, 0x0, 0x1, 0x7fff, 0x0, 0x5, 0x0, 0x8}, 0xffffffffffffffff, 0xf, r0, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r1}, 0x8)
r6 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x0, 0x16, 0xb4, 0x7f}, 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x9, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r6}, @generic={0x56, 0x8, 0x0, 0x0, 0x83}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x6, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
r7 = perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x3, 0x3, 0x9, 0x6, 0x0, 0x4, 0x100000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x6}, 0x80, 0x1, 0x1, 0x4, 0x3, 0x7, 0x6, 0x0, 0x6, 0x0, 0x6}, 0x0, 0x8, r5, 0x8)
openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x100, 0x0) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@bloom_filter={0x1e, 0x0, 0x0, 0xffffffff, 0x1402, r3, 0xffff, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x6}, 0x48)
r8 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r3, 0x0, &(0x7f0000000500)=""/245}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x400006}, @map_fd={0x18, 0x0, 0x1, 0x0, r8}, @generic={0x56, 0x8, 0x0, 0x0, 0x83}, @initr0, @exit]}, &(0x7f0000000000)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
close(r8) (async)
perf_event_open(&(0x7f00000008c0)={0x4, 0x80, 0x7, 0x1, 0x5d, 0x3, 0x0, 0x4, 0x81180, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x55, 0x6}, 0x4006, 0x6f, 0x3, 0x0, 0x3ff, 0x3, 0x9b68, 0x0, 0x1b, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0x9)
[ 3221.006381][ T4680] FAULT_INJECTION: forcing a failure.
[ 3221.006381][ T4680] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3221.032314][ T4680] CPU: 0 PID: 4680 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3221.043960][ T4680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3221.053856][ T4680] Call Trace:
[ 3221.057423][ T4680]
[ 3221.060189][ T4680] dump_stack_lvl+0x151/0x1b7
[ 3221.064707][ T4680] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3221.070170][ T4680] dump_stack+0x15/0x17
[ 3221.074166][ T4680] should_fail+0x3c6/0x510
[ 3221.078419][ T4680] should_fail_alloc_page+0x5a/0x80
[ 3221.083448][ T4680] prepare_alloc_pages+0x15c/0x700
[ 3221.088400][ T4680] ? __alloc_pages_bulk+0xe60/0xe60
[ 3221.093430][ T4680] ? trace_event_raw_event_sched_switch+0x4b0/0x4b0
[ 3221.099859][ T4680] __alloc_pages+0x138/0x5e0
[ 3221.104280][ T4680] ? _raw_spin_unlock+0x4d/0x70
[ 3221.108974][ T4680] ? prep_new_page+0x110/0x110
[ 3221.113567][ T4680] pte_alloc_one+0x73/0x1b0
[ 3221.117899][ T4680] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3221.123019][ T4680] ? preempt_schedule+0xd9/0xe0
[ 3221.127796][ T4680] ? preempt_schedule_common+0xbe/0xf0
[ 3221.133089][ T4680] __pte_alloc+0x86/0x350
[ 3221.137255][ T4680] ? free_pgtables+0x280/0x280
[ 3221.141856][ T4680] ? _raw_spin_lock+0xa4/0x1b0
[ 3221.146468][ T4680] ? __kasan_check_write+0x14/0x20
[ 3221.151402][ T4680] copy_page_range+0x28a8/0x2f90
[ 3221.156177][ T4680] ? __kasan_slab_alloc+0xb1/0xe0
[ 3221.161041][ T4680] ? pfn_valid+0x1e0/0x1e0
[ 3221.165304][ T4680] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3221.170844][ T4680] ? __rb_insert_augmented+0x5de/0x610
[ 3221.176144][ T4680] copy_mm+0xc7e/0x13e0
[ 3221.180131][ T4680] ? copy_signal+0x610/0x610
[ 3221.184744][ T4680] ? __init_rwsem+0xd6/0x1c0
[ 3221.189171][ T4680] ? copy_signal+0x4e3/0x610
[ 3221.193599][ T4680] copy_process+0x12bc/0x3260
[ 3221.198198][ T4680] ? proc_fail_nth_write+0x20b/0x290
[ 3221.203319][ T4680] ? fsnotify_perm+0x6a/0x5d0
[ 3221.207830][ T4680] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3221.212954][ T4680] ? vfs_write+0x9ec/0x1110
[ 3221.217294][ T4680] kernel_clone+0x21e/0x9e0
[ 3221.221632][ T4680] ? file_end_write+0x1c0/0x1c0
[ 3221.226751][ T4680] ? create_io_thread+0x1e0/0x1e0
[ 3221.231783][ T4680] ? mutex_unlock+0xb2/0x260
[ 3221.236212][ T4680] ? __mutex_lock_slowpath+0x10/0x10
[ 3221.243613][ T4680] __x64_sys_clone+0x23f/0x290
[ 3221.251261][ T4680] ? __do_sys_vfork+0x130/0x130
[ 3221.256051][ T4680] ? ksys_write+0x260/0x2c0
[ 3221.260643][ T4680] ? debug_smp_processor_id+0x17/0x20
[ 3221.265893][ T4680] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3221.272277][ T4680] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3221.277756][ T4680] do_syscall_64+0x3d/0xb0
[ 3221.282000][ T4680] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3221.288810][ T4680] RIP: 0033:0x7f024b55cae9
[ 3221.295469][ T4680] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3221.314869][ T4680] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3221.323111][ T4680] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3221.330925][ T4680] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3221.338820][ T4680] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3221.346638][ T4680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3221.354558][ T4680] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3221.362371][ T4680]
21:54:41 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) (async)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r3, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x0, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:41 executing program 4:
syz_clone(0x0, 0x0, 0x900000000000000, 0x0, 0x0, 0x0)
21:54:41 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53)
21:54:41 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0xfd, 0x0, 0xfe, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x1}, 0x0, 0xea5c, 0x0, 0x5, 0x0, 0x3f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x80841, 0x0)
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2)
close(0xffffffffffffffff)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112})
r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x20)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
r4 = perf_event_open$cgroup(&(0x7f00000008c0)={0x1, 0x80, 0x1, 0x7, 0xc6, 0x8, 0x0, 0x4, 0x1, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f00000007c0), 0x5}, 0x9000, 0x8000000000000001, 0x80000000, 0x6, 0x2, 0x8, 0x4, 0x0, 0xb1c, 0x0, 0xff800000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x4, 0x1f, 0x6, 0x2, 0x0, 0x1, 0x4, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000500), 0x6}, 0x6604, 0x7, 0x7, 0x6, 0x5, 0x4f5, 0x0, 0x0, 0x1f, 0x0, 0x2}, 0xffffffffffffffff, 0x1, r4, 0x10)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000100)="b9ff036844268cb89e14f086dd1be0", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50)
ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0)
close(0xffffffffffffffff)
close(r1)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52c61100, 0x0, @perf_config_ext={0x0, 0x87}, 0x4731f, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000b00)={'team_slave_1\x00', 0x20})
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x7f, 0x8, 0x0, 0x20, 0x0, 0xd0, 0x42822, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x7, 0x2}, 0x4, 0x101, 0x21b, 0x5, 0x3, 0xffff, 0xfff7, 0x0, 0xffff90d1, 0x0, 0x7}, 0x0, 0xa, r2, 0x3)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640), 0x10)
recvmsg$unix(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000240)=""/85, 0x55}, {&(0x7f0000000300)=""/29, 0x1d}, {0x0}], 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="07fe00001c0000000000002a201437d400efc2b56d11bacbe6468ef2c811c975750f5a124dc302dbabf3530ac45b6482055c271247e3e221440d6565ec415de3edd50f77ee047f6057bd77c162f91e8c5c22c9deb68f543d74636d87d0658f0925e342356745e41d5d4d60a07c6a723091b7af7d85fa78c686deb2579aa0a1430470b3860cdfeb51d90f3bbcf3834e82e73a53e1bc83358b124d92ef29944c82be502948c8664ef5a646e1b5763c689f4458ded580e67c3d02db0c45835490128a02e01cf27dd0107055e802b76ec2a4b65cd2a1f5923060fd9409fda0464c7db943e36b68c37b3801", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x98}, 0x10002)
bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xc, 0x2, &(0x7f0000000980)=ANY=[], &(0x7f0000000480)='syzkaller\x00', 0x4, 0x0, 0x0, 0x1e00, 0x5b, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90)
socketpair(0x27, 0x3, 0x3, &(0x7f0000000440))
21:54:41 executing program 2:
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x7fffffff, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0))
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async)
r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='rpc_socket_nospace\x00', r1}, 0x10) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) (async)
r3 = perf_event_open$cgroup(&(0x7f0000000780)={0x3, 0x80, 0x9, 0x7f, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x10080, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xae, 0x1, @perf_bp={&(0x7f0000000300), 0x10}, 0x1000, 0x5, 0x5, 0x2, 0x3, 0x4, 0x7, 0x0, 0x7fff, 0x0, 0xfffffffffffffff8}, r0, 0x1, r2, 0x6)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) (async)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x8, 0x0}, 0x8)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x9, 0xb9ddce269930e476}, 0xc) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000900)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f00000006c0), 0x0, 0x8, &(0x7f00000009c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) (async)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000080)='@\x00')
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x7, 0x0, 0x0, 0x9, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xc}, 0x48)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="500658070000000000f3ffffff5dde58b8"], &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x27, &(0x7f0000000380)=""/39, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000400)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x3, 0x6, 0x41}, 0x10, r4, 0x0, 0x2, &(0x7f0000000540)=[r0, r6], &(0x7f0000000580)=[{0x0, 0x5, 0x4, 0xc}, {0x3, 0x1, 0x7}], 0x10, 0x6}, 0x90) (async)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x3, 0x8}, 0xc) (async)
bpf$MAP_GET_NEXT_KEY(0x3, 0x0, 0x0) (async)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x1ff) (async)
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async)
r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xprtrdma_err_unrecognized\x00', r1}, 0x10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000002c0)='^+[,-[[\x00')
[ 3221.506563][ T4713] FAULT_INJECTION: forcing a failure.
[ 3221.506563][ T4713] name failslab, interval 1, probability 0, space 0, times 0
[ 3221.519076][ T4713] CPU: 1 PID: 4713 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3221.530435][ T4713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3221.540334][ T4713] Call Trace:
[ 3221.543454][ T4713]
[ 3221.546243][ T4713] dump_stack_lvl+0x151/0x1b7
[ 3221.550750][ T4713] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3221.556212][ T4713] ? avc_denied+0x1b0/0x1b0
[ 3221.560556][ T4713] dump_stack+0x15/0x17
[ 3221.564545][ T4713] should_fail+0x3c6/0x510
[ 3221.568796][ T4713] __should_failslab+0xa4/0xe0
[ 3221.573392][ T4713] ? vm_area_dup+0x26/0x230
[ 3221.577733][ T4713] should_failslab+0x9/0x20
[ 3221.582072][ T4713] slab_pre_alloc_hook+0x37/0xd0
[ 3221.587022][ T4713] ? vm_area_dup+0x26/0x230
[ 3221.591360][ T4713] kmem_cache_alloc+0x44/0x200
[ 3221.595963][ T4713] vm_area_dup+0x26/0x230
[ 3221.600127][ T4713] copy_mm+0x9a1/0x13e0
[ 3221.604119][ T4713] ? copy_signal+0x610/0x610
[ 3221.608543][ T4713] ? __init_rwsem+0xd6/0x1c0
[ 3221.612976][ T4713] ? copy_signal+0x4e3/0x610
[ 3221.617401][ T4713] copy_process+0x12bc/0x3260
[ 3221.622258][ T4713] ? proc_fail_nth_write+0x20b/0x290
[ 3221.627401][ T4713] ? fsnotify_perm+0x6a/0x5d0
[ 3221.631903][ T4713] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3221.636842][ T4713] ? vfs_write+0x9ec/0x1110
[ 3221.641183][ T4713] kernel_clone+0x21e/0x9e0
[ 3221.645693][ T4713] ? file_end_write+0x1c0/0x1c0
[ 3221.650378][ T4713] ? create_io_thread+0x1e0/0x1e0
[ 3221.655237][ T4713] ? mutex_unlock+0xb2/0x260
[ 3221.659665][ T4713] ? __mutex_lock_slowpath+0x10/0x10
[ 3221.664786][ T4713] __x64_sys_clone+0x23f/0x290
[ 3221.669386][ T4713] ? __do_sys_vfork+0x130/0x130
[ 3221.674076][ T4713] ? ksys_write+0x260/0x2c0
[ 3221.678846][ T4713] ? debug_smp_processor_id+0x17/0x20
[ 3221.684052][ T4713] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3221.689957][ T4713] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3221.695430][ T4713] do_syscall_64+0x3d/0xb0
[ 3221.699678][ T4713] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3221.705403][ T4713] RIP: 0033:0x7f024b55cae9
[ 3221.709660][ T4713] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3221.729201][ T4713] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3221.737522][ T4713] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3221.745327][ T4713] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
21:54:41 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54)
21:54:41 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3, 0xad, 0x5, 0x8, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async, rerun: 32)
r8 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) (rerun: 32)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) (async)
r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0), 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf5}]}, &(0x7f0000000440)='syzkaller\x00', 0x400, 0xc7, &(0x7f0000000c80)=""/199, 0x40f00, 0x12, '\x00', r6, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0xd, 0x6}, 0x10, 0x1a2b2, r7, 0x0, &(0x7f0000000b80)=[r10, r8, 0xffffffffffffffff, r9]}, 0x80) (async, rerun: 32)
r11 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (rerun: 32)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r11, &(0x7f0000000180)}, 0x20)
r12 = openat$cgroup_ro(r0, &(0x7f0000000340)='freezer.self_freezing\x00', 0x0, 0x0) (async, rerun: 64)
r13 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (rerun: 64)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r13, &(0x7f0000000180)}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x68}, @generic={0x4, 0xb, 0x7, 0x2, 0x220}, @jmp={0x5, 0x0, 0x4, 0x4, 0x1, 0xffffffffffffffe0, 0x8}], &(0x7f00000001c0)='GPL\x00', 0x1, 0xc0, &(0x7f0000000200)=""/192, 0x40f00, 0x10, '\x00', r6, 0x0, r2, 0x8, &(0x7f00000002c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xa, 0x8000, 0x3}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000440)=[r2, r11, r4, r12, r4, r13, 0xffffffffffffffff, r2], &(0x7f0000000480)=[{0x0, 0x1, 0x7, 0x7}, {0x5, 0x5, 0x3, 0x6}, {0x0, 0x4, 0x1, 0xb}, {0x2, 0x3, 0xf, 0x9}], 0x10, 0x80000000}, 0x90) (async, rerun: 64)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (rerun: 64)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
write$cgroup_type(r4, &(0x7f0000000000), 0x9) (async)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0) (async)
openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.time_recursive\x00', 0x0, 0x0) (async)
close(r0)
[ 3221.753146][ T4713] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3221.760950][ T4713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3221.768766][ T4713] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3221.776581][ T4713]
21:54:41 executing program 4:
syz_clone(0x0, 0x0, 0x1100000000000000, 0x0, 0x0, 0x0)
21:54:41 executing program 4:
syz_clone(0x0, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0)
21:54:41 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0xfd, 0x0, 0xfe, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x1}, 0x0, 0xea5c, 0x0, 0x5, 0x0, 0x3f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x80841, 0x0)
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2)
close(0xffffffffffffffff) (async)
close(0xffffffffffffffff)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112})
r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749da00000097f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff472558014391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d74e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00000000000000000000000000c8b8b5b137dcb7a7949e12307d1fce56fe5b76d2f3f5a7692379542e3fd9a5a7dc57e1dec0bdce65b5db59a0733c9b9da612adb91948ecbfaff8fc206b8350fe268b98aaa2e288be77aedddcc7fb7d631e69b176e2e6678fe1237cb2"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
r4 = perf_event_open$cgroup(&(0x7f00000008c0)={0x1, 0x80, 0x1, 0x7, 0xc6, 0x8, 0x0, 0x4, 0x1, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f00000007c0), 0x5}, 0x9000, 0x8000000000000001, 0x80000000, 0x6, 0x2, 0x8, 0x4, 0x0, 0xb1c, 0x0, 0xff800000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x4, 0x1f, 0x6, 0x2, 0x0, 0x1, 0x4, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000500), 0x6}, 0x6604, 0x7, 0x7, 0x6, 0x5, 0x4f5, 0x0, 0x0, 0x1f, 0x0, 0x2}, 0xffffffffffffffff, 0x1, r4, 0x10) (async)
perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x4, 0x1f, 0x6, 0x2, 0x0, 0x1, 0x4, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000500), 0x6}, 0x6604, 0x7, 0x7, 0x6, 0x5, 0x4f5, 0x0, 0x0, 0x1f, 0x0, 0x2}, 0xffffffffffffffff, 0x1, r4, 0x10)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000100)="b9ff036844268cb89e14f086dd1be0", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50)
ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) (async)
ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0)
close(0xffffffffffffffff)
close(r1) (async)
close(r1)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52c61100, 0x0, @perf_config_ext={0x0, 0x87}, 0x4731f, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000b00)={'team_slave_1\x00', 0x20})
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0) (async)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0)
perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x7f, 0x8, 0x0, 0x20, 0x0, 0xd0, 0x42822, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x7, 0x2}, 0x4, 0x101, 0x21b, 0x5, 0x3, 0xffff, 0xfff7, 0x0, 0xffff90d1, 0x0, 0x7}, 0x0, 0xa, r2, 0x3)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) (async)
r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640), 0x10) (async)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640), 0x10)
recvmsg$unix(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000240)=""/85, 0x55}, {&(0x7f0000000300)=""/29, 0x1d}, {0x0}], 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="07fe00001c0000000000002a201437d400efc2b56d11bacbe6468ef2c811c975750f5a124dc302dbabf3530ac45b6482055c271247e3e221440d6565ec415de3edd50f77ee047f6057bd77c162f91e8c5c22c9deb68f543d74636d87d0658f0925e342356745e41d5d4d60a07c6a723091b7af7d85fa78c686deb2579aa0a1430470b3860cdfeb51d90f3bbcf3834e82e73a53e1bc83358b124d92ef29944c82be502948c8664ef5a646e1b5763c689f4458ded580e67c3d02db0c45835490128a02e01cf27dd0107055e802b76ec2a4b65cd2a1f5923060fd9409fda0464c7db943e36b68c37b3801", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x98}, 0x10002)
bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xc, 0x2, &(0x7f0000000980)=ANY=[], &(0x7f0000000480)='syzkaller\x00', 0x4, 0x0, 0x0, 0x1e00, 0x5b, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90)
socketpair(0x27, 0x3, 0x3, &(0x7f0000000440))
21:54:42 executing program 2:
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x7fffffff, 0x8000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) (async)
ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0))
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0)
r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='rpc_socket_nospace\x00', r1}, 0x10)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open$cgroup(&(0x7f0000000780)={0x3, 0x80, 0x9, 0x7f, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x10080, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xae, 0x1, @perf_bp={&(0x7f0000000300), 0x10}, 0x1000, 0x5, 0x5, 0x2, 0x3, 0x4, 0x7, 0x0, 0x7fff, 0x0, 0xfffffffffffffff8}, r0, 0x1, r2, 0x6)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x8}, 0x8) (async)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x8, 0x0}, 0x8)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x9, 0xb9ddce269930e476}, 0xc) (async)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x9, 0xb9ddce269930e476}, 0xc)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000900)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f00000006c0), 0x0, 0x8, &(0x7f00000009c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000a00), &(0x7f0000000a40), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10)
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000080)='@\x00') (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000080)='@\x00')
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x7, 0x0, 0x0, 0x9, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xc}, 0x48)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="500658070000000000f3ffffff5dde58b8"], &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x27, &(0x7f0000000380)=""/39, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000400)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x3, 0x6, 0x41}, 0x10, r4, 0x0, 0x2, &(0x7f0000000540)=[r0, r6], &(0x7f0000000580)=[{0x0, 0x5, 0x4, 0xc}, {0x3, 0x1, 0x7}], 0x10, 0x6}, 0x90)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x3, 0x8}, 0xc)
bpf$MAP_GET_NEXT_KEY(0x3, 0x0, 0x0) (async)
bpf$MAP_GET_NEXT_KEY(0x3, 0x0, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='./cgroup.net/syz1\x00', 0x1ff)
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xprtrdma_err_unrecognized\x00', r1}, 0x10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x40082406, &(0x7f00000002c0)='^+[,-[[\x00')
21:54:42 executing program 4:
syz_clone(0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0)
[ 3222.088051][ T4738] FAULT_INJECTION: forcing a failure.
[ 3222.088051][ T4738] name failslab, interval 1, probability 0, space 0, times 0
[ 3222.108388][ T4738] CPU: 0 PID: 4738 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3222.119856][ T4738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3222.129929][ T4738] Call Trace:
[ 3222.133051][ T4738]
[ 3222.135825][ T4738] dump_stack_lvl+0x151/0x1b7
[ 3222.140342][ T4738] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3222.145807][ T4738] dump_stack+0x15/0x17
[ 3222.149971][ T4738] should_fail+0x3c6/0x510
[ 3222.154263][ T4738] __should_failslab+0xa4/0xe0
[ 3222.158825][ T4738] ? anon_vma_clone+0x9a/0x500
[ 3222.163425][ T4738] should_failslab+0x9/0x20
[ 3222.167764][ T4738] slab_pre_alloc_hook+0x37/0xd0
[ 3222.172538][ T4738] ? anon_vma_clone+0x9a/0x500
[ 3222.177141][ T4738] kmem_cache_alloc+0x44/0x200
[ 3222.181739][ T4738] anon_vma_clone+0x9a/0x500
[ 3222.186169][ T4738] anon_vma_fork+0x91/0x4e0
[ 3222.190510][ T4738] ? anon_vma_name+0x43/0x70
[ 3222.194932][ T4738] ? vm_area_dup+0x17a/0x230
[ 3222.199358][ T4738] copy_mm+0xa3a/0x13e0
[ 3222.203357][ T4738] ? copy_signal+0x610/0x610
[ 3222.207783][ T4738] ? __init_rwsem+0xd6/0x1c0
[ 3222.212201][ T4738] ? copy_signal+0x4e3/0x610
[ 3222.216743][ T4738] copy_process+0x12bc/0x3260
[ 3222.221258][ T4738] ? proc_fail_nth_write+0x20b/0x290
[ 3222.226375][ T4738] ? fsnotify_perm+0x6a/0x5d0
[ 3222.230893][ T4738] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3222.235835][ T4738] ? vfs_write+0x9ec/0x1110
[ 3222.240177][ T4738] kernel_clone+0x21e/0x9e0
[ 3222.244601][ T4738] ? file_end_write+0x1c0/0x1c0
[ 3222.249287][ T4738] ? create_io_thread+0x1e0/0x1e0
[ 3222.254146][ T4738] ? mutex_unlock+0xb2/0x260
[ 3222.258576][ T4738] ? __mutex_lock_slowpath+0x10/0x10
[ 3222.263698][ T4738] __x64_sys_clone+0x23f/0x290
[ 3222.268304][ T4738] ? __do_sys_vfork+0x130/0x130
[ 3222.272984][ T4738] ? ksys_write+0x260/0x2c0
[ 3222.277346][ T4738] ? debug_smp_processor_id+0x17/0x20
[ 3222.282529][ T4738] ? perf_trace_sys_enter+0x30/0x140
[ 3222.287656][ T4738] ? syscall_enter_from_user_mode+0x14d/0x1b0
[ 3222.293553][ T4738] do_syscall_64+0x3d/0xb0
[ 3222.297809][ T4738] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3222.303619][ T4738] RIP: 0033:0x7f024b55cae9
[ 3222.307873][ T4738] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3222.327316][ T4738] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3222.335560][ T4738] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3222.343370][ T4738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3222.351445][ T4738] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3222.359260][ T4738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3222.367153][ T4738] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3222.374973][ T4738]
21:54:42 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:42 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55)
21:54:42 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async)
perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0xfd, 0x0, 0xfe, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x1}, 0x0, 0xea5c, 0x0, 0x5, 0x0, 0x3f}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async)
r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x80841, 0x0)
perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) (async)
close(0xffffffffffffffff) (async)
ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112})
r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={0x0, 0x0, 0x37}, 0x20) (async)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001080)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48)
r4 = perf_event_open$cgroup(&(0x7f00000008c0)={0x1, 0x80, 0x1, 0x7, 0xc6, 0x8, 0x0, 0x4, 0x1, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f00000007c0), 0x5}, 0x9000, 0x8000000000000001, 0x80000000, 0x6, 0x2, 0x8, 0x4, 0x0, 0xb1c, 0x0, 0xff800000}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x4, 0x1f, 0x6, 0x2, 0x0, 0x1, 0x4, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000500), 0x6}, 0x6604, 0x7, 0x7, 0x6, 0x5, 0x4f5, 0x0, 0x0, 0x1f, 0x0, 0x2}, 0xffffffffffffffff, 0x1, r4, 0x10) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000100)="b9ff036844268cb89e14f086dd1be0", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (async)
ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x0) (async)
close(0xffffffffffffffff) (async)
close(r1) (async)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52c61100, 0x0, @perf_config_ext={0x0, 0x87}, 0x4731f, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000b00)={'team_slave_1\x00', 0x20})
r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000001c0)='cgroup.events\x00', 0x0, 0x0) (async)
ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) (async)
perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x7f, 0x8, 0x0, 0x20, 0x0, 0xd0, 0x42822, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x7, 0x2}, 0x4, 0x101, 0x21b, 0x5, 0x3, 0xffff, 0xfff7, 0x0, 0xffff90d1, 0x0, 0x7}, 0x0, 0xa, r2, 0x3) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, 0x0)
r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xffe6) (async)
bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640), 0x10) (async)
recvmsg$unix(r6, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/122, 0x7a}, {&(0x7f0000000240)=""/85, 0x55}, {&(0x7f0000000300)=""/29, 0x1d}, {0x0}], 0x4, &(0x7f0000000940)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="07fe00001c0000000000002a201437d400efc2b56d11bacbe6468ef2c811c975750f5a124dc302dbabf3530ac45b6482055c271247e3e221440d6565ec415de3edd50f77ee047f6057bd77c162f91e8c5c22c9deb68f543d74636d87d0658f0925e342356745e41d5d4d60a07c6a723091b7af7d85fa78c686deb2579aa0a1430470b3860cdfeb51d90f3bbcf3834e82e73a53e1bc83358b124d92ef29944c82be502948c8664ef5a646e1b5763c689f4458ded580e67c3d02db0c45835490128a02e01cf27dd0107055e802b76ec2a4b65cd2a1f5923060fd9409fda0464c7db943e36b68c37b3801", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32, @ANYRES32], 0x98}, 0x10002) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xc, 0x2, &(0x7f0000000980)=ANY=[], &(0x7f0000000480)='syzkaller\x00', 0x4, 0x0, 0x0, 0x1e00, 0x5b, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000004c0)={0x8}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r5]}, 0x90)
socketpair(0x27, 0x3, 0x3, &(0x7f0000000440))
21:54:42 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfefffffffffffff, 0xffffffffffffffff, 0x0)
r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb5b0018000000020000000c0000000c0000000300000001000000000000080000e5ff006100"], &(0x7f0000000040)=""/240, 0x27, 0xf0, 0x1}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x2, 0xd1, &(0x7f0000000200)=""/209, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300), 0x8, 0x10, 0x0}, 0x80)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
r3 = getpid()
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000e00)=ANY=[@ANYBLOB="1801dd0000000000000000000000ea0425e24efb34335d87850004005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
perf_event_open(0x0, r3, 0x0, r1, 0x5)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r4}, 0x10)
r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0xfffffc00}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf6c1, 0x0, 0x0, 0x0, 0x532}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xb9}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @generic={0xc0, 0x5, 0x3}, @generic={0x0, 0xa, 0xf, 0x6, 0x9}, @alu={0x0, 0x1, 0xd, 0x0, 0x8, 0xffffffffffffffff, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r5, 0x1]}, 0x80)
r6 = bpf$ITER_CREATE(0x21, &(0x7f00000008c0)={r0}, 0x8)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x7, &(0x7f0000000740)=@framed={{}, [@generic={0x0, 0x9, 0xa, 0xd3}, @alu={0x4, 0x0, 0x0, 0x8, 0x4, 0x30, 0x4}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x6}]}, &(0x7f0000000780)='GPL\x00', 0x5, 0x29, &(0x7f00000007c0)=""/41, 0x40f00, 0xe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x2}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x9, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x80)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000480)='syzkaller\x00', 0x1, 0x58, &(0x7f0000000c40)=""/88, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xe, 0x7, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d40)=[r5, r6, 0xffffffffffffffff, r6]}, 0x80)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x7, 0x0, 0x8, 0x0, 0xf7a, 0x22800, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x8, 0x9, 0x0, 0x10000, 0x0, 0x2}, r3, 0x7, 0xffffffffffffffff, 0xb)
r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_service_time\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x6, 0x5, 0xfc, 0x3f, 0x0, 0x5fd, 0x40080, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x20, 0x2, @perf_config_ext={0x6, 0x80}, 0x903, 0x3, 0x0, 0x0, 0xb2e3, 0x0, 0x8, 0x0, 0x1f, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x14, 0x9, &(0x7f0000000cc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf97f}, [@exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x15, &(0x7f0000000800)=""/21, 0x41000, 0x63, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x0, 0xa, 0x8001}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f00000012c0)=[0xffffffffffffffff, r2, 0xffffffffffffffff], &(0x7f0000001300)=[{0x1, 0x3, 0x4, 0x6}, {0x3, 0x1, 0x10, 0x7}, {0x3, 0x1, 0xe, 0xa}], 0x10, 0x1ff}, 0x90)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40086602, &(0x7f0000000180))
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
write$cgroup_type(r9, &(0x7f0000000000), 0x248800)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(r10, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0)
r11 = syz_clone(0x8a280, &(0x7f0000000980)="10100408f77c6b5ba6ba4a6ca91382cbbfe459", 0x13, &(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)="c83d7d1f627cae7d5373a7666328cf76ca0631297fb2d70e9c14c2f1a655cf9da4a6ab3fa20a24e492841e21184c08eea27a529652052dd0231a621a25977cdb9de813700f1d0b595fcb9f8669e29adeebd8276c7b7e7df1acc803677000ac88d944be1743cdfab0f4c8ec8fca8c0d10e4b2d1abd2f0cb0bfdc52d22db8fcee5dbe72b6997abada71208eea88a7fb5758586f8dc68b37d86c69f1c1349855396f99d6cd60422525e94d05b75d5d37cd3db9922b52ba05d7d76a69087d2868a6f430b23a926f4bc19188b57ec51b11c5187987661e48de2e6")
perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x7f, 0x7f, 0x6, 0x6, 0x0, 0xffff, 0xd10a8, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000640), 0xa}, 0x1, 0x4, 0x0, 0x5, 0x800, 0x2, 0x4, 0x0, 0xffff, 0x0, 0x9}, r11, 0xd, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180))
21:54:42 executing program 4:
syz_clone(0x0, 0x0, 0x242200a0ffffffff, 0x0, 0x0, 0x0)
21:54:42 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:42 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = openat$cgroup_ro(r0, &(0x7f0000000100)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3, 0xad, 0x5, 0x8, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r5, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10)
r8 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (async)
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180))
r10 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0), 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf5}]}, &(0x7f0000000440)='syzkaller\x00', 0x400, 0xc7, &(0x7f0000000c80)=""/199, 0x40f00, 0x12, '\x00', r6, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0xd, 0x6}, 0x10, 0x1a2b2, r7, 0x0, &(0x7f0000000b80)=[r10, r8, 0xffffffffffffffff, r9]}, 0x80) (async)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf5}]}, &(0x7f0000000440)='syzkaller\x00', 0x400, 0xc7, &(0x7f0000000c80)=""/199, 0x40f00, 0x12, '\x00', r6, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0xd, 0x6}, 0x10, 0x1a2b2, r7, 0x0, &(0x7f0000000b80)=[r10, r8, 0xffffffffffffffff, r9]}, 0x80)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
r11 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r11, &(0x7f0000000180)}, 0x20)
r12 = openat$cgroup_ro(r0, &(0x7f0000000340)='freezer.self_freezing\x00', 0x0, 0x0)
r13 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r13, &(0x7f0000000180)}, 0x20) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r13, &(0x7f0000000180)}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x3, &(0x7f0000000180)=@raw=[@call={0x85, 0x0, 0x0, 0x68}, @generic={0x4, 0xb, 0x7, 0x2, 0x220}, @jmp={0x5, 0x0, 0x4, 0x4, 0x1, 0xffffffffffffffe0, 0x8}], &(0x7f00000001c0)='GPL\x00', 0x1, 0xc0, &(0x7f0000000200)=""/192, 0x40f00, 0x10, '\x00', r6, 0x0, r2, 0x8, &(0x7f00000002c0)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000300)={0x4, 0xa, 0x8000, 0x3}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000440)=[r2, r11, r4, r12, r4, r13, 0xffffffffffffffff, r2], &(0x7f0000000480)=[{0x0, 0x1, 0x7, 0x7}, {0x5, 0x5, 0x3, 0x6}, {0x0, 0x4, 0x1, 0xb}, {0x2, 0x3, 0xf, 0x9}], 0x10, 0x80000000}, 0x90)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) (async)
write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_type(r4, &(0x7f0000000000), 0x9)
openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000080), 0x2, 0x0)
openat$cgroup_ro(r2, &(0x7f00000000c0)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
close(r0)
[ 3222.628034][ T4764] FAULT_INJECTION: forcing a failure.
[ 3222.628034][ T4764] name failslab, interval 1, probability 0, space 0, times 0
[ 3222.690752][ T4764] CPU: 0 PID: 4764 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3222.702235][ T4764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3222.712219][ T4764] Call Trace:
[ 3222.715340][ T4764]
[ 3222.718117][ T4764] dump_stack_lvl+0x151/0x1b7
[ 3222.722819][ T4764] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3222.728279][ T4764] dump_stack+0x15/0x17
[ 3222.732269][ T4764] should_fail+0x3c6/0x510
[ 3222.736534][ T4764] __should_failslab+0xa4/0xe0
[ 3222.741159][ T4764] ? vm_area_dup+0x26/0x230
[ 3222.745468][ T4764] should_failslab+0x9/0x20
[ 3222.749883][ T4764] slab_pre_alloc_hook+0x37/0xd0
[ 3222.754667][ T4764] ? vm_area_dup+0x26/0x230
[ 3222.758999][ T4764] kmem_cache_alloc+0x44/0x200
[ 3222.763598][ T4764] vm_area_dup+0x26/0x230
[ 3222.767765][ T4764] copy_mm+0x9a1/0x13e0
[ 3222.771761][ T4764] ? copy_signal+0x610/0x610
[ 3222.776186][ T4764] ? __init_rwsem+0xd6/0x1c0
[ 3222.780610][ T4764] ? copy_signal+0x4e3/0x610
[ 3222.785038][ T4764] copy_process+0x12bc/0x3260
[ 3222.789557][ T4764] ? proc_fail_nth_write+0x20b/0x290
[ 3222.794676][ T4764] ? fsnotify_perm+0x6a/0x5d0
[ 3222.799359][ T4764] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3222.804309][ T4764] ? vfs_write+0x9ec/0x1110
[ 3222.808648][ T4764] kernel_clone+0x21e/0x9e0
[ 3222.813074][ T4764] ? file_end_write+0x1c0/0x1c0
[ 3222.817759][ T4764] ? create_io_thread+0x1e0/0x1e0
[ 3222.822615][ T4764] ? mutex_unlock+0xb2/0x260
[ 3222.827044][ T4764] ? __mutex_lock_slowpath+0x10/0x10
[ 3222.832159][ T4764] __x64_sys_clone+0x23f/0x290
[ 3222.836759][ T4764] ? __do_sys_vfork+0x130/0x130
[ 3222.841454][ T4764] ? ksys_write+0x260/0x2c0
[ 3222.845786][ T4764] ? debug_smp_processor_id+0x17/0x20
[ 3222.850992][ T4764] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3222.856896][ T4764] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3222.862364][ T4764] do_syscall_64+0x3d/0xb0
[ 3222.866621][ T4764] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3222.872343][ T4764] RIP: 0033:0x7f024b55cae9
[ 3222.876601][ T4764] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3222.896127][ T4764] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3222.904554][ T4764] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3222.912355][ T4764] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3222.920169][ T4764] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3222.927982][ T4764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
[ 3222.935794][ T4764] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3222.943614][ T4764]
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.parent_freezing\x00', 0x0, 0x0)
r2 = getpid()
r3 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x4, 0x0, 0x4, 0x76, 0x0, 0x3, 0x0, 0x10, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe3, 0x2, @perf_bp={&(0x7f0000000200), 0xb}, 0x2, 0x400, 0x8, 0x3, 0x8000000000000000, 0x200, 0x1, 0x0, 0xfffffffc, 0x0, 0xd89}, r2, 0x5, r1, 0x3)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x40, 0x2, 0x55, 0x48, 0x0, 0x3bed, 0xd213, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffeff, 0x2, @perf_bp={&(0x7f0000000100), 0x3}, 0x2000, 0x8, 0x7, 0x0, 0x0, 0xff, 0x2, 0x0, 0x68e5, 0x0, 0x7f800000000}, r2, 0x3, 0xffffffffffffffff, 0xb)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xe6, 0x3, 0x6, 0x40, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_bp={&(0x7f00000004c0)}, 0x40, 0x7fffffff, 0x0, 0x4, 0x1d9, 0x0, 0xd1, 0x0, 0x2e, 0x0, 0x6}, r2, 0x9, r1, 0x9)
perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xf8, 0xff, 0x1, 0x3b, 0x0, 0x5, 0x40204, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x8000, 0xfff}, 0x100, 0x3, 0x3, 0x0, 0x2, 0x20, 0x0, 0x0, 0x3}, r0, 0x3, r3, 0xc)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='afs_cell\x00', r1}, 0x10)
perf_event_open(&(0x7f0000000300)={0x4d1e501821ff6024, 0x80, 0x1, 0x4, 0x2, 0x4, 0x0, 0x6, 0x80400, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0), 0xa}, 0x14, 0x1, 0x10000000, 0x0, 0x1, 0x3ff, 0x5, 0x0, 0x401, 0x0, 0x4}, r2, 0x8, r4, 0x1)
r5 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000040), 0x12)
21:54:43 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000001a80)=ANY=[@ANYBLOB="180100000000000000000000ea04850000005000000095faccf6e526489e959be526f2ebb2830000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002380)={0x18, 0x13, &(0x7f00000028c0)=ANY=[@ANYBLOB="1893e433d0f7ba61422f00000000040000000000003631000085100000050000009e3e3f00356500021864000002000200000000000800000085100000faffffff181200006916fb604670174fb7c4a1edcfe1cb2b56abe4de5240932f287ae04e3a49f9ab298a4431c01e1c9e25966d73e21caa6e01", @ANYRES32=r0, @ANYBLOB="00000000000000001857e6ff0600000000000000000000001844000002000000000000000000047f1f4800000000007bc600001826000000000000000000000000000000a95fab6071a3bb935bb395a9afdfe44ba22a96cf7f1780d5221749ff90db8997c2fb69a40328", @ANYBLOB="3236c36a8604c0b4ab93d0daf3c15b8716ee6265fa645d7f3fdb3991629c0eea939297f88703efec0a09e5084ffbfaad7527b38d6809e68c0b6b7c4f8baca99eb9bce640001642b75ec0862daae245bc63f12e5fd6c1f8b17313ba1098a6a0205d387223094d3b43e5c13c44461b7ed7ea2e6a23155048a8dc96981bdfa71d896a4444fe8005e0c5fc29c2977c0052574471b32723aae1924173d7030920372176cdf023795716cc8ecae12331f9da1128046de562931a0a09b1c8276151a5bf5b6f182a3e", @ANYRES32], &(0x7f0000002080)='GPL\x00', 0x7fff, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x3, 0xa, 0x6, 0x1fc}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002340)}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001fc0)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x100000000, 0x9, 0x0, 0x6, 0x3f29, 0x0, 0x0, 0x8001, 0x0, 0x10000})
syz_clone(0x76246180, 0x0, 0xd, 0x0, 0x0, 0x0)
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.parent_freezing\x00', 0x0, 0x0)
r2 = getpid()
r3 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x4, 0x0, 0x4, 0x76, 0x0, 0x3, 0x0, 0x10, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe3, 0x2, @perf_bp={&(0x7f0000000200), 0xb}, 0x2, 0x400, 0x8, 0x3, 0x8000000000000000, 0x200, 0x1, 0x0, 0xfffffffc, 0x0, 0xd89}, r2, 0x5, r1, 0x3)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x40, 0x2, 0x55, 0x48, 0x0, 0x3bed, 0xd213, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffeff, 0x2, @perf_bp={&(0x7f0000000100), 0x3}, 0x2000, 0x8, 0x7, 0x0, 0x0, 0xff, 0x2, 0x0, 0x68e5, 0x0, 0x7f800000000}, r2, 0x3, 0xffffffffffffffff, 0xb)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xe6, 0x3, 0x6, 0x40, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_bp={&(0x7f00000004c0)}, 0x40, 0x7fffffff, 0x0, 0x4, 0x1d9, 0x0, 0xd1, 0x0, 0x2e, 0x0, 0x6}, r2, 0x9, r1, 0x9)
perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xf8, 0xff, 0x1, 0x3b, 0x0, 0x5, 0x40204, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x8000, 0xfff}, 0x100, 0x3, 0x3, 0x0, 0x2, 0x20, 0x0, 0x0, 0x3}, r0, 0x3, r3, 0xc)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='afs_cell\x00', r1}, 0x10)
perf_event_open(&(0x7f0000000300)={0x4d1e501821ff6024, 0x80, 0x1, 0x4, 0x2, 0x4, 0x0, 0x6, 0x80400, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0), 0xa}, 0x14, 0x1, 0x10000000, 0x0, 0x1, 0x3ff, 0x5, 0x0, 0x401, 0x0, 0x4}, r2, 0x8, r4, 0x1)
r5 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async)
openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) (async)
openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.parent_freezing\x00', 0x0, 0x0) (async)
getpid() (async)
perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x4, 0x0, 0x4, 0x76, 0x0, 0x3, 0x0, 0x10, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe3, 0x2, @perf_bp={&(0x7f0000000200), 0xb}, 0x2, 0x400, 0x8, 0x3, 0x8000000000000000, 0x200, 0x1, 0x0, 0xfffffffc, 0x0, 0xd89}, r2, 0x5, r1, 0x3) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x40, 0x2, 0x55, 0x48, 0x0, 0x3bed, 0xd213, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffeff, 0x2, @perf_bp={&(0x7f0000000100), 0x3}, 0x2000, 0x8, 0x7, 0x0, 0x0, 0xff, 0x2, 0x0, 0x68e5, 0x0, 0x7f800000000}, r2, 0x3, 0xffffffffffffffff, 0xb) (async)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xe6, 0x3, 0x6, 0x40, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_bp={&(0x7f00000004c0)}, 0x40, 0x7fffffff, 0x0, 0x4, 0x1d9, 0x0, 0xd1, 0x0, 0x2e, 0x0, 0x6}, r2, 0x9, r1, 0x9) (async)
perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xf8, 0xff, 0x1, 0x3b, 0x0, 0x5, 0x40204, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x8000, 0xfff}, 0x100, 0x3, 0x3, 0x0, 0x2, 0x20, 0x0, 0x0, 0x3}, r0, 0x3, r3, 0xc) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='afs_cell\x00', r1}, 0x10) (async)
perf_event_open(&(0x7f0000000300)={0x4d1e501821ff6024, 0x80, 0x1, 0x4, 0x2, 0x4, 0x0, 0x6, 0x80400, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0), 0xa}, 0x14, 0x1, 0x10000000, 0x0, 0x1, 0x3ff, 0x5, 0x0, 0x401, 0x0, 0x4}, r2, 0x8, r4, 0x1) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r5, &(0x7f0000000040), 0x12) (async)
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0) (async)
openat$cgroup_procs(r1, &(0x7f0000000080)='cgroup.threads\x00', 0x2, 0x0)
openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.parent_freezing\x00', 0x0, 0x0)
r2 = getpid()
r3 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x4, 0x0, 0x4, 0x76, 0x0, 0x3, 0x0, 0x10, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe3, 0x2, @perf_bp={&(0x7f0000000200), 0xb}, 0x2, 0x400, 0x8, 0x3, 0x8000000000000000, 0x200, 0x1, 0x0, 0xfffffffc, 0x0, 0xd89}, r2, 0x5, r1, 0x3)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x40, 0x2, 0x55, 0x48, 0x0, 0x3bed, 0xd213, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffeff, 0x2, @perf_bp={&(0x7f0000000100), 0x3}, 0x2000, 0x8, 0x7, 0x0, 0x0, 0xff, 0x2, 0x0, 0x68e5, 0x0, 0x7f800000000}, r2, 0x3, 0xffffffffffffffff, 0xb) (async)
perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x40, 0x2, 0x55, 0x48, 0x0, 0x3bed, 0xd213, 0x6, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffeff, 0x2, @perf_bp={&(0x7f0000000100), 0x3}, 0x2000, 0x8, 0x7, 0x0, 0x0, 0xff, 0x2, 0x0, 0x68e5, 0x0, 0x7f800000000}, r2, 0x3, 0xffffffffffffffff, 0xb)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xe6, 0x3, 0x6, 0x40, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_bp={&(0x7f00000004c0)}, 0x40, 0x7fffffff, 0x0, 0x4, 0x1d9, 0x0, 0xd1, 0x0, 0x2e, 0x0, 0x6}, r2, 0x9, r1, 0x9) (async)
perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0xe6, 0x3, 0x6, 0x40, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_bp={&(0x7f00000004c0)}, 0x40, 0x7fffffff, 0x0, 0x4, 0x1d9, 0x0, 0xd1, 0x0, 0x2e, 0x0, 0x6}, r2, 0x9, r1, 0x9)
perf_event_open$cgroup(&(0x7f00000003c0)={0x2, 0x80, 0xf8, 0xff, 0x1, 0x3b, 0x0, 0x5, 0x40204, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1f, 0x4, @perf_config_ext={0x8000, 0xfff}, 0x100, 0x3, 0x3, 0x0, 0x2, 0x20, 0x0, 0x0, 0x3}, r0, 0x3, r3, 0xc)
r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000440)='afs_cell\x00', r1}, 0x10)
perf_event_open(&(0x7f0000000300)={0x4d1e501821ff6024, 0x80, 0x1, 0x4, 0x2, 0x4, 0x0, 0x6, 0x80400, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0), 0xa}, 0x14, 0x1, 0x10000000, 0x0, 0x1, 0x3ff, 0x5, 0x0, 0x401, 0x0, 0x4}, r2, 0x8, r4, 0x1) (async)
perf_event_open(&(0x7f0000000300)={0x4d1e501821ff6024, 0x80, 0x1, 0x4, 0x2, 0x4, 0x0, 0x6, 0x80400, 0x9, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f00000002c0), 0xa}, 0x14, 0x1, 0x10000000, 0x0, 0x1, 0x3ff, 0x5, 0x0, 0x401, 0x0, 0x4}, r2, 0x8, r4, 0x1)
r5 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r5, &(0x7f0000000040), 0x12)
21:54:43 executing program 4:
syz_clone(0x0, 0x0, 0x808402a0ffffffff, 0x0, 0x0, 0x0)
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0)
r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='freezer.self_freezing\x00', 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0)
r3 = gettid()
write$cgroup_pid(r1, &(0x7f0000000040)=r3, 0xff78)
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0)
r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='freezer.self_freezing\x00', 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0)
r3 = gettid()
write$cgroup_pid(r1, &(0x7f0000000040)=r3, 0xff78)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) (async)
openat$cgroup_ro(r0, &(0x7f0000000080)='freezer.self_freezing\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0) (async)
gettid() (async)
write$cgroup_pid(r1, &(0x7f0000000040)=r3, 0xff78) (async)
21:54:43 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) (async)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfefffffffffffff, 0xffffffffffffffff, 0x0) (async)
r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb5b0018000000020000000c0000000c0000000300000001000000000000080000e5ff006100"], &(0x7f0000000040)=""/240, 0x27, 0xf0, 0x1}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x2, 0xd1, &(0x7f0000000200)=""/209, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300), 0x8, 0x10, 0x0}, 0x80)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) (async)
r3 = getpid()
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000e00)=ANY=[@ANYBLOB="1801dd0000000000000000000000ea0425e24efb34335d87850004005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
perf_event_open(0x0, r3, 0x0, r1, 0x5)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r4}, 0x10)
r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0xfffffc00}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf6c1, 0x0, 0x0, 0x0, 0x532}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xb9}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @generic={0xc0, 0x5, 0x3}, @generic={0x0, 0xa, 0xf, 0x6, 0x9}, @alu={0x0, 0x1, 0xd, 0x0, 0x8, 0xffffffffffffffff, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r5, 0x1]}, 0x80) (async, rerun: 32)
r6 = bpf$ITER_CREATE(0x21, &(0x7f00000008c0)={r0}, 0x8) (rerun: 32)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x7, &(0x7f0000000740)=@framed={{}, [@generic={0x0, 0x9, 0xa, 0xd3}, @alu={0x4, 0x0, 0x0, 0x8, 0x4, 0x30, 0x4}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x6}]}, &(0x7f0000000780)='GPL\x00', 0x5, 0x29, &(0x7f00000007c0)=""/41, 0x40f00, 0xe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x2}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x9, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x80)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000480)='syzkaller\x00', 0x1, 0x58, &(0x7f0000000c40)=""/88, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xe, 0x7, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d40)=[r5, r6, 0xffffffffffffffff, r6]}, 0x80) (async)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x7, 0x0, 0x8, 0x0, 0xf7a, 0x22800, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x8, 0x9, 0x0, 0x10000, 0x0, 0x2}, r3, 0x7, 0xffffffffffffffff, 0xb) (async)
r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_service_time\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x6, 0x5, 0xfc, 0x3f, 0x0, 0x5fd, 0x40080, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x20, 0x2, @perf_config_ext={0x6, 0x80}, 0x903, 0x3, 0x0, 0x0, 0xb2e3, 0x0, 0x8, 0x0, 0x1f, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x14, 0x9, &(0x7f0000000cc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf97f}, [@exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x15, &(0x7f0000000800)=""/21, 0x41000, 0x63, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x0, 0xa, 0x8001}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f00000012c0)=[0xffffffffffffffff, r2, 0xffffffffffffffff], &(0x7f0000001300)=[{0x1, 0x3, 0x4, 0x6}, {0x3, 0x1, 0x10, 0x7}, {0x3, 0x1, 0xe, 0xa}], 0x10, 0x1ff}, 0x90) (async, rerun: 32)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (rerun: 32)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40086602, &(0x7f0000000180))
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
write$cgroup_type(r9, &(0x7f0000000000), 0x248800) (async)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(r10, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0) (async)
r11 = syz_clone(0x8a280, &(0x7f0000000980)="10100408f77c6b5ba6ba4a6ca91382cbbfe459", 0x13, &(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)="c83d7d1f627cae7d5373a7666328cf76ca0631297fb2d70e9c14c2f1a655cf9da4a6ab3fa20a24e492841e21184c08eea27a529652052dd0231a621a25977cdb9de813700f1d0b595fcb9f8669e29adeebd8276c7b7e7df1acc803677000ac88d944be1743cdfab0f4c8ec8fca8c0d10e4b2d1abd2f0cb0bfdc52d22db8fcee5dbe72b6997abada71208eea88a7fb5758586f8dc68b37d86c69f1c1349855396f99d6cd60422525e94d05b75d5d37cd3db9922b52ba05d7d76a69087d2868a6f430b23a926f4bc19188b57ec51b11c5187987661e48de2e6")
perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x7f, 0x7f, 0x6, 0x6, 0x0, 0xffff, 0xd10a8, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000640), 0xa}, 0x1, 0x4, 0x0, 0x5, 0x800, 0x2, 0x4, 0x0, 0xffff, 0x0, 0x9}, r11, 0xd, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180))
21:54:43 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56)
21:54:43 executing program 4:
syz_clone(0x0, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0)
21:54:43 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000001a80)=ANY=[@ANYBLOB="180100000000000000000000ea04850000005000000095faccf6e526489e959be526f2ebb2830000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002380)={0x18, 0x13, &(0x7f00000028c0)=ANY=[@ANYBLOB="1893e433d0f7ba61422f00000000040000000000003631000085100000050000009e3e3f00356500021864000002000200000000000800000085100000faffffff181200006916fb604670174fb7c4a1edcfe1cb2b56abe4de5240932f287ae04e3a49f9ab298a4431c01e1c9e25966d73e21caa6e01", @ANYRES32=r0, @ANYBLOB="00000000000000001857e6ff0600000000000000000000001844000002000000000000000000047f1f4800000000007bc600001826000000000000000000000000000000a95fab6071a3bb935bb395a9afdfe44ba22a96cf7f1780d5221749ff90db8997c2fb69a40328", @ANYBLOB="3236c36a8604c0b4ab93d0daf3c15b8716ee6265fa645d7f3fdb3991629c0eea939297f88703efec0a09e5084ffbfaad7527b38d6809e68c0b6b7c4f8baca99eb9bce640001642b75ec0862daae245bc63f12e5fd6c1f8b17313ba1098a6a0205d387223094d3b43e5c13c44461b7ed7ea2e6a23155048a8dc96981bdfa71d896a4444fe8005e0c5fc29c2977c0052574471b32723aae1924173d7030920372176cdf023795716cc8ecae12331f9da1128046de562931a0a09b1c8276151a5bf5b6f182a3e", @ANYRES32], &(0x7f0000002080)='GPL\x00', 0x7fff, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x3, 0xa, 0x6, 0x1fc}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002340)}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001fc0)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x100000000, 0x9, 0x0, 0x6, 0x3f29, 0x0, 0x0, 0x8001, 0x0, 0x10000})
syz_clone(0x76246180, 0x0, 0xd, 0x0, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80) (async)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000001a80)=ANY=[@ANYBLOB="180100000000000000000000ea04850000005000000095faccf6e526489e959be526f2ebb2830000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002380)={0x18, 0x13, &(0x7f00000028c0)=ANY=[@ANYBLOB="1893e433d0f7ba61422f00000000040000000000003631000085100000050000009e3e3f00356500021864000002000200000000000800000085100000faffffff181200006916fb604670174fb7c4a1edcfe1cb2b56abe4de5240932f287ae04e3a49f9ab298a4431c01e1c9e25966d73e21caa6e01", @ANYRES32=r0, @ANYBLOB="00000000000000001857e6ff0600000000000000000000001844000002000000000000000000047f1f4800000000007bc600001826000000000000000000000000000000a95fab6071a3bb935bb395a9afdfe44ba22a96cf7f1780d5221749ff90db8997c2fb69a40328", @ANYBLOB="3236c36a8604c0b4ab93d0daf3c15b8716ee6265fa645d7f3fdb3991629c0eea939297f88703efec0a09e5084ffbfaad7527b38d6809e68c0b6b7c4f8baca99eb9bce640001642b75ec0862daae245bc63f12e5fd6c1f8b17313ba1098a6a0205d387223094d3b43e5c13c44461b7ed7ea2e6a23155048a8dc96981bdfa71d896a4444fe8005e0c5fc29c2977c0052574471b32723aae1924173d7030920372176cdf023795716cc8ecae12331f9da1128046de562931a0a09b1c8276151a5bf5b6f182a3e", @ANYRES32], &(0x7f0000002080)='GPL\x00', 0x7fff, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x3, 0xa, 0x6, 0x1fc}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002340)}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) (async)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001fc0)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x100000000, 0x9, 0x0, 0x6, 0x3f29, 0x0, 0x0, 0x8001, 0x0, 0x10000}) (async)
syz_clone(0x76246180, 0x0, 0xd, 0x0, 0x0, 0x0) (async)
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) (async)
r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='freezer.self_freezing\x00', 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f00000000c0)='memory.current\x00', 0x0, 0x0)
r3 = gettid()
write$cgroup_pid(r1, &(0x7f0000000040)=r3, 0xff78)
21:54:43 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r2 = gettid()
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x6, 0x5, 0x20, 0x4, 0x0, 0x100000001, 0x622, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x20}, 0x300, 0x7ff, 0x3deb, 0x7, 0x800, 0x83f, 0x2, 0x0, 0x8, 0x0, 0x6}, r2, 0xe, 0xffffffffffffffff, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.time\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080))
21:54:43 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.time\x00', 0x0, 0x0) (async, rerun: 32)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (rerun: 32)
[ 3223.568076][ T4833] FAULT_INJECTION: forcing a failure.
[ 3223.568076][ T4833] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3223.638033][ T4833] CPU: 1 PID: 4833 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3223.649497][ T4833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3223.659392][ T4833] Call Trace:
[ 3223.662518][ T4833]
[ 3223.665301][ T4833] dump_stack_lvl+0x151/0x1b7
[ 3223.669816][ T4833] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3223.675282][ T4833] dump_stack+0x15/0x17
[ 3223.679268][ T4833] should_fail+0x3c6/0x510
[ 3223.683522][ T4833] should_fail_alloc_page+0x5a/0x80
[ 3223.688561][ T4833] prepare_alloc_pages+0x15c/0x700
[ 3223.693503][ T4833] ? __alloc_pages+0x5e0/0x5e0
[ 3223.698104][ T4833] ? __alloc_pages_bulk+0xe60/0xe60
[ 3223.703137][ T4833] __alloc_pages+0x138/0x5e0
[ 3223.707660][ T4833] ? prep_new_page+0x110/0x110
[ 3223.712253][ T4833] ? 0xffffffffa0028480
[ 3223.716373][ T4833] ? is_bpf_text_address+0x172/0x190
[ 3223.721450][ T4833] pte_alloc_one+0x73/0x1b0
[ 3223.725789][ T4833] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3223.730822][ T4833] ? arch_stack_walk+0xf3/0x140
21:54:43 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000001a80)=ANY=[@ANYBLOB="180100000000000000000000ea04850000005000000095faccf6e526489e959be526f2ebb2830000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002380)={0x18, 0x13, &(0x7f00000028c0)=ANY=[@ANYBLOB="1893e433d0f7ba61422f00000000040000000000003631000085100000050000009e3e3f00356500021864000002000200000000000800000085100000faffffff181200006916fb604670174fb7c4a1edcfe1cb2b56abe4de5240932f287ae04e3a49f9ab298a4431c01e1c9e25966d73e21caa6e01", @ANYRES32=r0, @ANYBLOB="00000000000000001857e6ff0600000000000000000000001844000002000000000000000000047f1f4800000000007bc600001826000000000000000000000000000000a95fab6071a3bb935bb395a9afdfe44ba22a96cf7f1780d5221749ff90db8997c2fb69a40328", @ANYBLOB="3236c36a8604c0b4ab93d0daf3c15b8716ee6265fa645d7f3fdb3991629c0eea939297f88703efec0a09e5084ffbfaad7527b38d6809e68c0b6b7c4f8baca99eb9bce640001642b75ec0862daae245bc63f12e5fd6c1f8b17313ba1098a6a0205d387223094d3b43e5c13c44461b7ed7ea2e6a23155048a8dc96981bdfa71d896a4444fe8005e0c5fc29c2977c0052574471b32723aae1924173d7030920372176cdf023795716cc8ecae12331f9da1128046de562931a0a09b1c8276151a5bf5b6f182a3e", @ANYRES32], &(0x7f0000002080)='GPL\x00', 0x7fff, 0x0, 0x0, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x3, 0xa, 0x6, 0x1fc}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002340)}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.memory_pressure_enabled\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) (async)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001fc0)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x100000000, 0x9, 0x0, 0x6, 0x3f29, 0x0, 0x0, 0x8001, 0x0, 0x10000})
syz_clone(0x76246180, 0x0, 0xd, 0x0, 0x0, 0x0)
[ 3223.735519][ T4833] __pte_alloc+0x86/0x350
[ 3223.739685][ T4833] ? free_pgtables+0x280/0x280
[ 3223.744277][ T4833] ? _raw_spin_lock+0xa4/0x1b0
[ 3223.748880][ T4833] ? __kasan_check_write+0x14/0x20
[ 3223.753842][ T4833] copy_page_range+0x28a8/0x2f90
[ 3223.758599][ T4833] ? __kasan_slab_alloc+0xb1/0xe0
[ 3223.763463][ T4833] ? pfn_valid+0x1e0/0x1e0
[ 3223.767715][ T4833] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3223.773278][ T4833] ? __rb_insert_augmented+0x5de/0x610
[ 3223.778569][ T4833] copy_mm+0xc7e/0x13e0
[ 3223.782558][ T4833] ? copy_signal+0x610/0x610
[ 3223.786977][ T4833] ? __init_rwsem+0xd6/0x1c0
[ 3223.791406][ T4833] ? copy_signal+0x4e3/0x610
[ 3223.795835][ T4833] copy_process+0x12bc/0x3260
[ 3223.800348][ T4833] ? proc_fail_nth_write+0x20b/0x290
[ 3223.805468][ T4833] ? fsnotify_perm+0x6a/0x5d0
[ 3223.809984][ T4833] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3223.814929][ T4833] ? vfs_write+0x9ec/0x1110
[ 3223.819271][ T4833] kernel_clone+0x21e/0x9e0
[ 3223.823614][ T4833] ? file_end_write+0x1c0/0x1c0
[ 3223.828300][ T4833] ? create_io_thread+0x1e0/0x1e0
[ 3223.833153][ T4833] ? mutex_unlock+0xb2/0x260
[ 3223.837581][ T4833] ? __mutex_lock_slowpath+0x10/0x10
[ 3223.842706][ T4833] __x64_sys_clone+0x23f/0x290
[ 3223.847310][ T4833] ? __do_sys_vfork+0x130/0x130
[ 3223.851994][ T4833] ? ksys_write+0x260/0x2c0
[ 3223.856331][ T4833] ? debug_smp_processor_id+0x17/0x20
[ 3223.861535][ T4833] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3223.867437][ T4833] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3223.872907][ T4833] do_syscall_64+0x3d/0xb0
[ 3223.877157][ T4833] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3223.882884][ T4833] RIP: 0033:0x7f024b55cae9
[ 3223.887132][ T4833] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3223.906585][ T4833] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3223.914820][ T4833] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3223.922629][ T4833] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3223.930440][ T4833] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
21:54:44 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.time\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080))
21:54:44 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1000, &(0x7f0000003fc0)=""/4096, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002900), 0x10)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$nbd(0x1, 0x1, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, 0x0)
perf_event_open(&(0x7f0000001340)={0x2, 0x80, 0x2, 0x4, 0x4, 0xcf, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffff, 0xd0}, 0x80, 0x7, 0x2, 0x4, 0x0, 0x3f, 0x2, 0x0, 0x80000000, 0x0, 0x8000}, 0x0, 0x0, r1, 0x2)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0)
ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000))
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000002940), 0x8)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="8520000005000000851000000083350bfd6848bd566c98ccca340000ff000000"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x18, &(0x7f00000003c0)=""/24, 0x41000, 0x5, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x5, 0x4, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000500)=[0xffffffffffffffff, r2, r2, 0xffffffffffffffff, r3], &(0x7f0000000540)=[{0x5, 0x2, 0x10, 0x6}, {0x0, 0x2, 0xc, 0x6}, {0x5, 0x4, 0xe, 0x3}, {0x3, 0x4, 0x4, 0x4}, {0x3, 0x5, 0xf, 0x1}, {0x1, 0x4, 0x2, 0x9}, {0x1, 0x5, 0xb, 0x2}], 0x10, 0x400}, 0x90)
r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@bloom_filter={0x1e, 0xffffd6a0, 0xfffffff7, 0xffff0879, 0x20, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5, 0xa}, 0x48)
ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x9)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0)
sendmsg$inet(r1, &(0x7f0000003f80)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002b00)="9607e1a72f604c61ae1267303a72efe44f4f2cce64458ba977519f0817cff9e9201b11dbbd7b1ebc2d2de1ff2070f303e80d1f600b9a3f0e7c941328953bde7eadec9f26b3a1508ce32d91571065bb7cf684ee6fc5d07280eabbe6c0d110c6f0262fd273912dd41a4ebc0d3bee5dc0edcc91851278e89c125d74637cf2f76ab5a75f611f00472a7f16753d939ecc511eab18d074f86ff469f05e119010f3be243956d088518e03238bd9e153bcdd1dd003ad69cfed0dbf5f00f802175374fea5d789d02b6c34af5129d42c6d6332b817368bef3673ce2f26ad37280108f0f9ea2843703e0b769bc444cfc31bc585e3423dd6c88ac4cd8321da29d5dc85e83792f2a2f8e6059eb46bd3f8d4a1742132abc5707ba120ab9b531c978e5081cfa42c39961e70ce04f0a92c09173b8566868384dabf3b056d27f1e06d311bc8ed49b25ea9bd8e9eabf7cf966f32f62c90b726af61fc8f2345d8a1d023e219bb5e8d02e040721dff245278a96c2728d97460d0a83a5631a1570c72e4fc333009c02a81e5ecf24b4c7d2212f06f221f9ec8e59e1abff0b857063d1cba51cc42588c85c0df5afad5b5e5c3b5a33ec29ebeb649d2d37f709cca72e9c346f9356d93112d43598e48e7a165f419c165d6eacec41a1094abb0600d01391194b9593a7882671c6518e249a6704573e8b99661c867beaae7187d70d1032c3bf54be989cff4cb80d7b3a1f0ea33f3871243b3d48d97349f18ca9882af7732adc7cd19dda825441c235ce07b0eac52d5debd0a5352ccb8ea5d389ad170c60eec4dd92212f4a81fece098d643cf7b75745d4d695ac7cb39c1acf780e1bec88e4ddaf058c37f613e4e2d90082bf06fa687b438531c8cab43dc520d0fd7638acecaca49743ff7d25d81ebb91614acbf133a9fc5fc53a0fdc4128f044cfde58b8c9ea60497b75b7d46938ab9e6a35aa893204a4ca9dda713087c45cecac0a52766ae708afe94ae84a66f02a5f201c99f8d387f543423ca54fef9d4dfa0c1d03e78518e25e1c8e23879c16ff6cbb0a737805087d24df706c9a11334368cdbb99ada36d2f94aa654868cf800b8a1cfffd527b714d69ea667ecc5cf2e41838ffda992f480155b07488c3c0b29e8f505b65ec95c81f33b7c0f613c7aa7139353493dd2ff0d07be12434cb7e02ece76a5470c8b53bc10f5e798d7ea5dc2a8239b10529d509e3329ef43ff5d2c64a4dd867f72346146af91cde5b20d04bea93229d68bc2c31f4288d5ec31d77c73707ededb5334fad4e284f9a57e56e15babf51b82d3b1f4a8d0e1c441eab022bb4d93eba9dd5a230ed9fac44813a3f6f4864909e9334964442c65643c3416e9bdb7ebcae5f7a0101a98b2d8080f544eaa59d79459d6117234b2843ee4f5d6e4e6c62aed3ff25069c1b0458090c8d694815fae22b7e4543ba25314a5838c8a816d2f0b41c17c4f7d759498085d9d595f7770546b42e9986db04a4332b7942f1e5e772824f5f2c35459560029cb629cd1b7d9480306f0705e15da2eb4ff767da2928a5c39c38fb0bbb9a368877902f69ef9ac3f48a87447809ea59ac5dc6358c11064980dce03dab0935207b786779f75f6fd268dfeb11ffb2f5f8c3af329ce30619f2440d52861a1802a95dba1a41b35b40d42efa5ea4081d4f6f579a2c46a367a32eec497f7470f41122ba88f7aac5c193c2e52b3372b3513669d7a268761d187fdb139798fbbfd9c9748f20f7f1168f6cd8f4f54b3c26b598ed7a9ab65904008c06e83546c11b1373006253ba80865e933c40f79cc90f76d5968a0fdd75c604e680308cb4b059f874b31bcb98b08cf4f38efb069272bc0077428468c040d5c056a711e0bcf2117c1e56d0e86b58e04fdff38f9626d4451793b1ee36145240bc7828af03b8741f73062d1347da18ab2d81e6516d39dc682b5034abc0d06faf6569a7b3e1dd02b5c563d4b01b1a133860393f396b760f75ac5ee595043c383c85eec02ddebc70ea1ef6adc9b9b30a47643f4f26e7ea7286ea83f3cd92758854a032bb38afb303dfc92cade8d508d212cdf9dcdff163447e5436b016ea8eda61101f7c2adc4e79871e5a534832c348b207bb92688c53c52da40246c3423e7fc84d974ab6aa289ae964dde887c270147ebebfddcf1560661ba8218f5480febcbc4b27d1e6dedd4ef9ed0671db0b4a0cd50e79871ec3c15af49cbedb06ef1cf74c6863b02d4a80a374558ba4c3056e153b8b5dcffcbf51d4156ca462351035d9a74cb27ec78ebb3d60502bebbafab37d9a66a76a541d590c2e34a450855c10822f8e1e4602693231b3b174d0ba75a66657267ab06bd27b63ddba69a700395e1bf91fd2bb8e8887bb551b1c51824b3df953aa2a6ef09ce5b26237b1d1edb1219d23601a02db6fd2e63e11211c6b6db1ef77ef642735bfe43b0dca22c8fbaf1a94f329178ab9c03f1e4db374b2287e547629d0e2884c15fe4e3c8d171e027acfb64ecbf9ffafbb127ddd205d5000ed93f1cb1911c635154e20b838c42572b409238c21ddac173e89e16a2ccadc184c2bb47e500e1cfd2a5190902056ee144371672554e99d1eb7bf7124ce114dfbfee03386b93168a57886a7590d33063f796e6225c78245f533706ce7987d06b5efa0bc283a7903765447caa445e6a5fb9860798280e6d7f708cda2f492e7c02c1e1cad77130d094ca4dbee322af3f9498ab68c26addd8c9128c49cdffc014a9f7b924e5bd9036241b56cdcd2e8cd0a87969d8ea5dbc2c972b900f5256864d529c7d9ccbab5566b60054c4b118e45cced3bdd6144e197181912c299f0719ee2e415c243052c5840e63fcfa4ca9ca919c654b6810", 0x7df}, {0x0}, {&(0x7f0000003c80)="abe4afa99916765bf1007e0d3d7141cb69b3b7ee2a7a2c9b338a53b11949483da615f304d3c5ea8faf0862f8edf21ce7b61e1869fa2b0033260a8c442584dc", 0x3f}, {0x0}, {&(0x7f0000003d80)}], 0x5, &(0x7f0000003ec0)}, 0x80)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x1ff)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140))
syz_clone(0x75848406, 0x0, 0x0, 0x0, 0x0, 0x0)
gettid()
syz_clone(0x8010000, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000240)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0)
[ 3223.938252][ T4833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3223.946064][ T4833] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3223.954228][ T4833]
21:54:44 executing program 4:
syz_clone(0x0, 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0)
21:54:44 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xbfefffffffffffff, 0xffffffffffffffff, 0x0)
r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb5b0018000000020000000c0000000c0000000300000001000000000000080000e5ff006100"], &(0x7f0000000040)=""/240, 0x27, 0xf0, 0x1}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x2, 0xd1, &(0x7f0000000200)=""/209, 0x0, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000300), 0x8, 0x10, 0x0}, 0x80)
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
r3 = getpid()
r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000e00)=ANY=[@ANYBLOB="1801dd0000000000000000000000ea0425e24efb34335d87850004005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
perf_event_open(0x0, r3, 0x0, r1, 0x5) (async)
perf_event_open(0x0, r3, 0x0, r1, 0x5)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r4}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0xfffffc00}, 0xc) (async)
r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000007c0)={0x0, 0xfffffc00}, 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf6c1, 0x0, 0x0, 0x0, 0x532}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xb9}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @generic={0xc0, 0x5, 0x3}, @generic={0x0, 0xa, 0xf, 0x6, 0x9}, @alu={0x0, 0x1, 0xd, 0x0, 0x8, 0xffffffffffffffff, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r5, 0x1]}, 0x80) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf6c1, 0x0, 0x0, 0x0, 0x532}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}, @call={0x85, 0x0, 0x0, 0xb9}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffe}, @generic={0xc0, 0x5, 0x3}, @generic={0x0, 0xa, 0xf, 0x6, 0x9}, @alu={0x0, 0x1, 0xd, 0x0, 0x8, 0xffffffffffffffff, 0x8}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x2}]}, &(0x7f0000000e40)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=[r5, 0x1]}, 0x80)
bpf$ITER_CREATE(0x21, &(0x7f00000008c0)={r0}, 0x8) (async)
r6 = bpf$ITER_CREATE(0x21, &(0x7f00000008c0)={r0}, 0x8)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x7, &(0x7f0000000740)=@framed={{}, [@generic={0x0, 0x9, 0xa, 0xd3}, @alu={0x4, 0x0, 0x0, 0x8, 0x4, 0x30, 0x4}, @map_idx={0x18, 0x3, 0x5, 0x0, 0x6}]}, &(0x7f0000000780)='GPL\x00', 0x5, 0x29, &(0x7f00000007c0)=""/41, 0x40f00, 0xe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000840)={0x2}, 0x8, 0x10, &(0x7f0000000880)={0x0, 0x9, 0x200}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff]}, 0x80)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d80)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000480)='syzkaller\x00', 0x1, 0x58, &(0x7f0000000c40)=""/88, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000340)={0x2, 0xe, 0x7, 0x80000000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000d40)=[r5, r6, 0xffffffffffffffff, r6]}, 0x80)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x7, 0x0, 0x8, 0x0, 0xf7a, 0x22800, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xfffffffb, 0x1, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0x0, 0x8, 0x3, 0x2, 0x8, 0x9, 0x0, 0x10000, 0x0, 0x2}, r3, 0x7, 0xffffffffffffffff, 0xb)
r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_service_time\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r7, &(0x7f0000000700)='blkio.bfq.io_service_time\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000580)={0x5, 0x80, 0x6, 0x5, 0xfc, 0x3f, 0x0, 0x5fd, 0x40080, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x20, 0x2, @perf_config_ext={0x6, 0x80}, 0x903, 0x3, 0x0, 0x0, 0xb2e3, 0x0, 0x8, 0x0, 0x1f, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x14, 0x9, &(0x7f0000000cc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf97f}, [@exit, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0xff}, @map_val={0x18, 0x1, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f00000004c0)='GPL\x00', 0x3ff, 0x15, &(0x7f0000000800)=""/21, 0x41000, 0x63, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, &(0x7f0000000c00)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000000e80)={0x0, 0xa, 0x8001}, 0x10, 0x0, 0xffffffffffffffff, 0x3, &(0x7f00000012c0)=[0xffffffffffffffff, r2, 0xffffffffffffffff], &(0x7f0000001300)=[{0x1, 0x3, 0x4, 0x6}, {0x3, 0x1, 0x10, 0x7}, {0x3, 0x1, 0xe, 0xa}], 0x10, 0x1ff}, 0x90)
r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40086602, &(0x7f0000000180))
r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000066000000004b64ffec850000006d000000c50000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
write$cgroup_type(r9, &(0x7f0000000000), 0x248800) (async)
write$cgroup_type(r9, &(0x7f0000000000), 0x248800)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) (async)
r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0)
openat$cgroup_ro(r10, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r10, &(0x7f0000000500)='cpuacct.usage_user\x00', 0x0, 0x0)
syz_clone(0x8a280, &(0x7f0000000980)="10100408f77c6b5ba6ba4a6ca91382cbbfe459", 0x13, &(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)="c83d7d1f627cae7d5373a7666328cf76ca0631297fb2d70e9c14c2f1a655cf9da4a6ab3fa20a24e492841e21184c08eea27a529652052dd0231a621a25977cdb9de813700f1d0b595fcb9f8669e29adeebd8276c7b7e7df1acc803677000ac88d944be1743cdfab0f4c8ec8fca8c0d10e4b2d1abd2f0cb0bfdc52d22db8fcee5dbe72b6997abada71208eea88a7fb5758586f8dc68b37d86c69f1c1349855396f99d6cd60422525e94d05b75d5d37cd3db9922b52ba05d7d76a69087d2868a6f430b23a926f4bc19188b57ec51b11c5187987661e48de2e6") (async)
r11 = syz_clone(0x8a280, &(0x7f0000000980)="10100408f77c6b5ba6ba4a6ca91382cbbfe459", 0x13, &(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)="c83d7d1f627cae7d5373a7666328cf76ca0631297fb2d70e9c14c2f1a655cf9da4a6ab3fa20a24e492841e21184c08eea27a529652052dd0231a621a25977cdb9de813700f1d0b595fcb9f8669e29adeebd8276c7b7e7df1acc803677000ac88d944be1743cdfab0f4c8ec8fca8c0d10e4b2d1abd2f0cb0bfdc52d22db8fcee5dbe72b6997abada71208eea88a7fb5758586f8dc68b37d86c69f1c1349855396f99d6cd60422525e94d05b75d5d37cd3db9922b52ba05d7d76a69087d2868a6f430b23a926f4bc19188b57ec51b11c5187987661e48de2e6")
perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x7f, 0x7f, 0x6, 0x6, 0x0, 0xffff, 0xd10a8, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000640), 0xa}, 0x1, 0x4, 0x0, 0x5, 0x800, 0x2, 0x4, 0x0, 0xffff, 0x0, 0x9}, r11, 0xd, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x7f, 0x7f, 0x6, 0x6, 0x0, 0xffff, 0xd10a8, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000640), 0xa}, 0x1, 0x4, 0x0, 0x5, 0x800, 0x2, 0x4, 0x0, 0xffff, 0x0, 0x9}, r11, 0xd, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180))
21:54:44 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12)
r3 = openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r5, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r6 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r6, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r5, &(0x7f0000000100)=r6, 0x12)
openat$cgroup_devices(r3, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0)
21:54:44 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57)
[ 3224.162090][ T4882] FAULT_INJECTION: forcing a failure.
[ 3224.162090][ T4882] name failslab, interval 1, probability 0, space 0, times 0
[ 3224.205012][ T4882] CPU: 0 PID: 4882 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3224.216479][ T4882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3224.226389][ T4882] Call Trace:
[ 3224.229498][ T4882]
[ 3224.232288][ T4882] dump_stack_lvl+0x151/0x1b7
[ 3224.236786][ T4882] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3224.242255][ T4882] dump_stack+0x15/0x17
[ 3224.246512][ T4882] should_fail+0x3c6/0x510
[ 3224.250769][ T4882] __should_failslab+0xa4/0xe0
[ 3224.255358][ T4882] ? vm_area_dup+0x26/0x230
[ 3224.259705][ T4882] should_failslab+0x9/0x20
[ 3224.264249][ T4882] slab_pre_alloc_hook+0x37/0xd0
[ 3224.269000][ T4882] ? vm_area_dup+0x26/0x230
[ 3224.273325][ T4882] kmem_cache_alloc+0x44/0x200
[ 3224.277930][ T4882] vm_area_dup+0x26/0x230
[ 3224.282092][ T4882] copy_mm+0x9a1/0x13e0
[ 3224.286613][ T4882] ? copy_signal+0x610/0x610
[ 3224.291031][ T4882] ? __init_rwsem+0xd6/0x1c0
[ 3224.295634][ T4882] ? copy_signal+0x4e3/0x610
[ 3224.300146][ T4882] copy_process+0x12bc/0x3260
[ 3224.304660][ T4882] ? proc_fail_nth_write+0x20b/0x290
[ 3224.309781][ T4882] ? fsnotify_perm+0x6a/0x5d0
[ 3224.314292][ T4882] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3224.319242][ T4882] ? vfs_write+0x9ec/0x1110
[ 3224.323597][ T4882] kernel_clone+0x21e/0x9e0
[ 3224.327919][ T4882] ? file_end_write+0x1c0/0x1c0
[ 3224.333050][ T4882] ? create_io_thread+0x1e0/0x1e0
[ 3224.337999][ T4882] ? mutex_unlock+0xb2/0x260
[ 3224.342414][ T4882] ? __mutex_lock_slowpath+0x10/0x10
[ 3224.347535][ T4882] __x64_sys_clone+0x23f/0x290
[ 3224.352919][ T4882] ? __do_sys_vfork+0x130/0x130
[ 3224.357610][ T4882] ? ksys_write+0x260/0x2c0
[ 3224.361941][ T4882] ? debug_smp_processor_id+0x17/0x20
[ 3224.367147][ T4882] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3224.373046][ T4882] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3224.378516][ T4882] do_syscall_64+0x3d/0xb0
[ 3224.384068][ T4882] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3224.389806][ T4882] RIP: 0033:0x7f024b55cae9
[ 3224.394056][ T4882] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3224.413577][ T4882] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3224.421823][ T4882] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3224.429636][ T4882] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3224.437445][ T4882] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3224.445258][ T4882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:54:44 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async, rerun: 32)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async, rerun: 32)
openat$cgroup_ro(r1, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async, rerun: 64)
r2 = gettid() (rerun: 64)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x6, 0x5, 0x20, 0x4, 0x0, 0x100000001, 0x622, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x20}, 0x300, 0x7ff, 0x3deb, 0x7, 0x800, 0x83f, 0x2, 0x0, 0x8, 0x0, 0x6}, r2, 0xe, 0xffffffffffffffff, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:54:44 executing program 4:
syz_clone(0x0, 0x0, 0xff0f010000000000, 0x0, 0x0, 0x0)
[ 3224.453070][ T4882] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3224.460886][ T4882]
21:54:44 executing program 2:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='jbd2_checkpoint_stats\x00', r0}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x600000000000000)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x8, 0x9, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0x3}, 0x80000, 0x100000001, 0x9, 0x0, 0x8, 0x99f2, 0x8, 0x0, 0x1}, r2, 0x10, r4, 0x2)
21:54:44 executing program 4:
syz_clone(0x0, 0x0, 0xffffffffa0002224, 0x0, 0x0, 0x0)
21:54:44 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58)
21:54:45 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12)
r3 = openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r5, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r6 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r6, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r5, &(0x7f0000000100)=r6, 0x12)
openat$cgroup_devices(r3, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3) (async)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) (async)
openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r5, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r6, 0x0, 0xffffffffffffffff, 0x3) (async)
write$cgroup_pid(r5, &(0x7f0000000100)=r6, 0x12) (async)
openat$cgroup_devices(r3, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0) (async)
[ 3225.057904][ T4912] FAULT_INJECTION: forcing a failure.
[ 3225.057904][ T4912] name failslab, interval 1, probability 0, space 0, times 0
[ 3225.096244][ T4912] CPU: 1 PID: 4912 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3225.107716][ T4912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3225.117612][ T4912] Call Trace:
[ 3225.120734][ T4912]
[ 3225.123514][ T4912] dump_stack_lvl+0x151/0x1b7
[ 3225.128029][ T4912] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3225.133494][ T4912] dump_stack+0x15/0x17
[ 3225.137484][ T4912] should_fail+0x3c6/0x510
[ 3225.141743][ T4912] __should_failslab+0xa4/0xe0
[ 3225.146346][ T4912] ? anon_vma_clone+0x9a/0x500
[ 3225.150939][ T4912] should_failslab+0x9/0x20
[ 3225.155278][ T4912] slab_pre_alloc_hook+0x37/0xd0
[ 3225.160077][ T4912] ? anon_vma_clone+0x9a/0x500
[ 3225.164654][ T4912] kmem_cache_alloc+0x44/0x200
[ 3225.169254][ T4912] anon_vma_clone+0x9a/0x500
[ 3225.173688][ T4912] anon_vma_fork+0x91/0x4e0
[ 3225.178020][ T4912] ? anon_vma_name+0x43/0x70
[ 3225.182444][ T4912] ? vm_area_dup+0x17a/0x230
[ 3225.186871][ T4912] copy_mm+0xa3a/0x13e0
[ 3225.190869][ T4912] ? copy_signal+0x610/0x610
[ 3225.195375][ T4912] ? __init_rwsem+0xd6/0x1c0
[ 3225.199802][ T4912] ? copy_signal+0x4e3/0x610
[ 3225.204240][ T4912] copy_process+0x12bc/0x3260
[ 3225.208747][ T4912] ? proc_fail_nth_write+0x20b/0x290
[ 3225.213864][ T4912] ? fsnotify_perm+0x6a/0x5d0
[ 3225.218380][ T4912] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3225.223327][ T4912] ? vfs_write+0x9ec/0x1110
[ 3225.227949][ T4912] kernel_clone+0x21e/0x9e0
[ 3225.232284][ T4912] ? file_end_write+0x1c0/0x1c0
[ 3225.236972][ T4912] ? create_io_thread+0x1e0/0x1e0
[ 3225.241828][ T4912] ? mutex_unlock+0xb2/0x260
[ 3225.246258][ T4912] ? __mutex_lock_slowpath+0x10/0x10
[ 3225.251381][ T4912] __x64_sys_clone+0x23f/0x290
21:54:45 executing program 4:
syz_clone(0x0, 0x0, 0xffffffffa0028480, 0x0, 0x0, 0x0)
[ 3225.255979][ T4912] ? __do_sys_vfork+0x130/0x130
[ 3225.260664][ T4912] ? ksys_write+0x260/0x2c0
[ 3225.265004][ T4912] ? debug_smp_processor_id+0x17/0x20
[ 3225.270210][ T4912] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3225.276117][ T4912] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3225.281585][ T4912] do_syscall_64+0x3d/0xb0
[ 3225.285837][ T4912] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3225.291563][ T4912] RIP: 0033:0x7f024b55cae9
[ 3225.295909][ T4912] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3225.315343][ T4912] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3225.323591][ T4912] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3225.331405][ T4912] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3225.339308][ T4912] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3225.347112][ T4912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3225.354922][ T4912] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3225.362739][ T4912]
21:54:45 executing program 3:
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
r2 = gettid()
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x6, 0x5, 0x20, 0x4, 0x0, 0x100000001, 0x622, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x20}, 0x300, 0x7ff, 0x3deb, 0x7, 0x800, 0x83f, 0x2, 0x0, 0x8, 0x0, 0x6}, r2, 0xe, 0xffffffffffffffff, 0x0) (async)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:54:45 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59)
21:54:45 executing program 4:
openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0)
21:54:45 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1000, &(0x7f0000003fc0)=""/4096, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002900), 0x10)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
socketpair$nbd(0x1, 0x1, 0x0, 0x0) (async)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, 0x0) (async)
perf_event_open(&(0x7f0000001340)={0x2, 0x80, 0x2, 0x4, 0x4, 0xcf, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffff, 0xd0}, 0x80, 0x7, 0x2, 0x4, 0x0, 0x3f, 0x2, 0x0, 0x80000000, 0x0, 0x8000}, 0x0, 0x0, r1, 0x2)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) (async)
ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000)) (async)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000002940), 0x8) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="8520000005000000851000000083350bfd6848bd566c98ccca340000ff000000"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x18, &(0x7f00000003c0)=""/24, 0x41000, 0x5, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x5, 0x4, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000500)=[0xffffffffffffffff, r2, r2, 0xffffffffffffffff, r3], &(0x7f0000000540)=[{0x5, 0x2, 0x10, 0x6}, {0x0, 0x2, 0xc, 0x6}, {0x5, 0x4, 0xe, 0x3}, {0x3, 0x4, 0x4, 0x4}, {0x3, 0x5, 0xf, 0x1}, {0x1, 0x4, 0x2, 0x9}, {0x1, 0x5, 0xb, 0x2}], 0x10, 0x400}, 0x90) (async)
r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@bloom_filter={0x1e, 0xffffd6a0, 0xfffffff7, 0xffff0879, 0x20, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5, 0xa}, 0x48)
ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x9) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) (async)
sendmsg$inet(r1, &(0x7f0000003f80)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002b00)="9607e1a72f604c61ae1267303a72efe44f4f2cce64458ba977519f0817cff9e9201b11dbbd7b1ebc2d2de1ff2070f303e80d1f600b9a3f0e7c941328953bde7eadec9f26b3a1508ce32d91571065bb7cf684ee6fc5d07280eabbe6c0d110c6f0262fd273912dd41a4ebc0d3bee5dc0edcc91851278e89c125d74637cf2f76ab5a75f611f00472a7f16753d939ecc511eab18d074f86ff469f05e119010f3be243956d088518e03238bd9e153bcdd1dd003ad69cfed0dbf5f00f802175374fea5d789d02b6c34af5129d42c6d6332b817368bef3673ce2f26ad37280108f0f9ea2843703e0b769bc444cfc31bc585e3423dd6c88ac4cd8321da29d5dc85e83792f2a2f8e6059eb46bd3f8d4a1742132abc5707ba120ab9b531c978e5081cfa42c39961e70ce04f0a92c09173b8566868384dabf3b056d27f1e06d311bc8ed49b25ea9bd8e9eabf7cf966f32f62c90b726af61fc8f2345d8a1d023e219bb5e8d02e040721dff245278a96c2728d97460d0a83a5631a1570c72e4fc333009c02a81e5ecf24b4c7d2212f06f221f9ec8e59e1abff0b857063d1cba51cc42588c85c0df5afad5b5e5c3b5a33ec29ebeb649d2d37f709cca72e9c346f9356d93112d43598e48e7a165f419c165d6eacec41a1094abb0600d01391194b9593a7882671c6518e249a6704573e8b99661c867beaae7187d70d1032c3bf54be989cff4cb80d7b3a1f0ea33f3871243b3d48d97349f18ca9882af7732adc7cd19dda825441c235ce07b0eac52d5debd0a5352ccb8ea5d389ad170c60eec4dd92212f4a81fece098d643cf7b75745d4d695ac7cb39c1acf780e1bec88e4ddaf058c37f613e4e2d90082bf06fa687b438531c8cab43dc520d0fd7638acecaca49743ff7d25d81ebb91614acbf133a9fc5fc53a0fdc4128f044cfde58b8c9ea60497b75b7d46938ab9e6a35aa893204a4ca9dda713087c45cecac0a52766ae708afe94ae84a66f02a5f201c99f8d387f543423ca54fef9d4dfa0c1d03e78518e25e1c8e23879c16ff6cbb0a737805087d24df706c9a11334368cdbb99ada36d2f94aa654868cf800b8a1cfffd527b714d69ea667ecc5cf2e41838ffda992f480155b07488c3c0b29e8f505b65ec95c81f33b7c0f613c7aa7139353493dd2ff0d07be12434cb7e02ece76a5470c8b53bc10f5e798d7ea5dc2a8239b10529d509e3329ef43ff5d2c64a4dd867f72346146af91cde5b20d04bea93229d68bc2c31f4288d5ec31d77c73707ededb5334fad4e284f9a57e56e15babf51b82d3b1f4a8d0e1c441eab022bb4d93eba9dd5a230ed9fac44813a3f6f4864909e9334964442c65643c3416e9bdb7ebcae5f7a0101a98b2d8080f544eaa59d79459d6117234b2843ee4f5d6e4e6c62aed3ff25069c1b0458090c8d694815fae22b7e4543ba25314a5838c8a816d2f0b41c17c4f7d759498085d9d595f7770546b42e9986db04a4332b7942f1e5e772824f5f2c35459560029cb629cd1b7d9480306f0705e15da2eb4ff767da2928a5c39c38fb0bbb9a368877902f69ef9ac3f48a87447809ea59ac5dc6358c11064980dce03dab0935207b786779f75f6fd268dfeb11ffb2f5f8c3af329ce30619f2440d52861a1802a95dba1a41b35b40d42efa5ea4081d4f6f579a2c46a367a32eec497f7470f41122ba88f7aac5c193c2e52b3372b3513669d7a268761d187fdb139798fbbfd9c9748f20f7f1168f6cd8f4f54b3c26b598ed7a9ab65904008c06e83546c11b1373006253ba80865e933c40f79cc90f76d5968a0fdd75c604e680308cb4b059f874b31bcb98b08cf4f38efb069272bc0077428468c040d5c056a711e0bcf2117c1e56d0e86b58e04fdff38f9626d4451793b1ee36145240bc7828af03b8741f73062d1347da18ab2d81e6516d39dc682b5034abc0d06faf6569a7b3e1dd02b5c563d4b01b1a133860393f396b760f75ac5ee595043c383c85eec02ddebc70ea1ef6adc9b9b30a47643f4f26e7ea7286ea83f3cd92758854a032bb38afb303dfc92cade8d508d212cdf9dcdff163447e5436b016ea8eda61101f7c2adc4e79871e5a534832c348b207bb92688c53c52da40246c3423e7fc84d974ab6aa289ae964dde887c270147ebebfddcf1560661ba8218f5480febcbc4b27d1e6dedd4ef9ed0671db0b4a0cd50e79871ec3c15af49cbedb06ef1cf74c6863b02d4a80a374558ba4c3056e153b8b5dcffcbf51d4156ca462351035d9a74cb27ec78ebb3d60502bebbafab37d9a66a76a541d590c2e34a450855c10822f8e1e4602693231b3b174d0ba75a66657267ab06bd27b63ddba69a700395e1bf91fd2bb8e8887bb551b1c51824b3df953aa2a6ef09ce5b26237b1d1edb1219d23601a02db6fd2e63e11211c6b6db1ef77ef642735bfe43b0dca22c8fbaf1a94f329178ab9c03f1e4db374b2287e547629d0e2884c15fe4e3c8d171e027acfb64ecbf9ffafbb127ddd205d5000ed93f1cb1911c635154e20b838c42572b409238c21ddac173e89e16a2ccadc184c2bb47e500e1cfd2a5190902056ee144371672554e99d1eb7bf7124ce114dfbfee03386b93168a57886a7590d33063f796e6225c78245f533706ce7987d06b5efa0bc283a7903765447caa445e6a5fb9860798280e6d7f708cda2f492e7c02c1e1cad77130d094ca4dbee322af3f9498ab68c26addd8c9128c49cdffc014a9f7b924e5bd9036241b56cdcd2e8cd0a87969d8ea5dbc2c972b900f5256864d529c7d9ccbab5566b60054c4b118e45cced3bdd6144e197181912c299f0719ee2e415c243052c5840e63fcfa4ca9ca919c654b6810", 0x7df}, {0x0}, {&(0x7f0000003c80)="abe4afa99916765bf1007e0d3d7141cb69b3b7ee2a7a2c9b338a53b11949483da615f304d3c5ea8faf0862f8edf21ce7b61e1869fa2b0033260a8c442584dc", 0x3f}, {0x0}, {&(0x7f0000003d80)}], 0x5, &(0x7f0000003ec0)}, 0x80) (async)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x1ff) (async)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff) (async)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140))
syz_clone(0x75848406, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
gettid() (async)
syz_clone(0x8010000, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000240)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0)
21:54:45 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3) (async)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000)=r2, 0x12) (async)
r3 = openat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x200002, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r5, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r5, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r6 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r6, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r5, &(0x7f0000000100)=r6, 0x12) (async)
openat$cgroup_devices(r3, &(0x7f00000000c0)='devices.allow\x00', 0x2, 0x0)
21:54:45 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='jbd2_checkpoint_stats\x00', r0}, 0x10)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x600000000000000)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) (async)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) (async)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x8, 0x9, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0x3}, 0x80000, 0x100000001, 0x9, 0x0, 0x8, 0x99f2, 0x8, 0x0, 0x1}, r2, 0x10, r4, 0x2)
[ 3225.570553][ T4942] FAULT_INJECTION: forcing a failure.
[ 3225.570553][ T4942] name failslab, interval 1, probability 0, space 0, times 0
[ 3225.604609][ T4942] CPU: 1 PID: 4942 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3225.616069][ T4942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3225.626045][ T4942] Call Trace:
[ 3225.629169][ T4942]
[ 3225.631947][ T4942] dump_stack_lvl+0x151/0x1b7
[ 3225.636460][ T4942] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3225.641936][ T4942] dump_stack+0x15/0x17
[ 3225.645925][ T4942] should_fail+0x3c6/0x510
[ 3225.650205][ T4942] __should_failslab+0xa4/0xe0
[ 3225.654803][ T4942] ? vm_area_dup+0x26/0x230
[ 3225.659119][ T4942] should_failslab+0x9/0x20
[ 3225.663456][ T4942] slab_pre_alloc_hook+0x37/0xd0
[ 3225.668228][ T4942] ? vm_area_dup+0x26/0x230
[ 3225.673713][ T4942] kmem_cache_alloc+0x44/0x200
[ 3225.678321][ T4942] vm_area_dup+0x26/0x230
[ 3225.682465][ T4942] copy_mm+0x9a1/0x13e0
[ 3225.686549][ T4942] ? copy_signal+0x610/0x610
[ 3225.690975][ T4942] ? __init_rwsem+0xd6/0x1c0
[ 3225.695642][ T4942] ? copy_signal+0x4e3/0x610
[ 3225.700000][ T4942] copy_process+0x12bc/0x3260
[ 3225.704603][ T4942] ? proc_fail_nth_write+0x20b/0x290
[ 3225.709733][ T4942] ? fsnotify_perm+0x6a/0x5d0
[ 3225.714667][ T4942] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3225.719701][ T4942] ? vfs_write+0x9ec/0x1110
[ 3225.724043][ T4942] kernel_clone+0x21e/0x9e0
[ 3225.728465][ T4942] ? file_end_write+0x1c0/0x1c0
[ 3225.733161][ T4942] ? create_io_thread+0x1e0/0x1e0
[ 3225.738537][ T4942] ? mutex_unlock+0xb2/0x260
[ 3225.743395][ T4942] ? __mutex_lock_slowpath+0x10/0x10
[ 3225.748695][ T4942] __x64_sys_clone+0x23f/0x290
[ 3225.753467][ T4942] ? __do_sys_vfork+0x130/0x130
[ 3225.758154][ T4942] ? ksys_write+0x260/0x2c0
[ 3225.762490][ T4942] ? debug_smp_processor_id+0x17/0x20
[ 3225.767701][ T4942] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3225.773602][ T4942] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3225.779069][ T4942] do_syscall_64+0x3d/0xb0
[ 3225.783320][ T4942] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3225.789089][ T4942] RIP: 0033:0x7f024b55cae9
[ 3225.794001][ T4942] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3225.813440][ T4942] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3225.821778][ T4942] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3225.829583][ T4942] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3225.837397][ T4942] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3225.845291][ T4942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3225.853195][ T4942] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3225.861004][ T4942]
21:54:45 executing program 0:
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:54:45 executing program 0:
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
21:54:46 executing program 0:
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x1)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async, rerun: 64)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12) (rerun: 64)
21:54:46 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60)
21:54:46 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1000, &(0x7f0000003fc0)=""/4096, 0x0, 0x6, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async)
bpf$OBJ_PIN_MAP(0x6, &(0x7f0000002900), 0x10) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
socketpair$nbd(0x1, 0x1, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, 0x0) (async)
perf_event_open(&(0x7f0000001340)={0x2, 0x80, 0x2, 0x4, 0x4, 0xcf, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0xffffffff, 0xd0}, 0x80, 0x7, 0x2, 0x4, 0x0, 0x3f, 0x2, 0x0, 0x80000000, 0x0, 0x8000}, 0x0, 0x0, r1, 0x2) (async)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) (async)
ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000)) (async)
r2 = bpf$ITER_CREATE(0x21, &(0x7f0000002940), 0x8) (async)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x15, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="8520000005000000851000000083350bfd6848bd566c98ccca340000ff000000"], &(0x7f0000000340)='syzkaller\x00', 0x6, 0x18, &(0x7f00000003c0)=""/24, 0x41000, 0x5, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x4, 0x5, 0x4, 0x1}, 0x10, 0x0, 0xffffffffffffffff, 0x7, &(0x7f0000000500)=[0xffffffffffffffff, r2, r2, 0xffffffffffffffff, r3], &(0x7f0000000540)=[{0x5, 0x2, 0x10, 0x6}, {0x0, 0x2, 0xc, 0x6}, {0x5, 0x4, 0xe, 0x3}, {0x3, 0x4, 0x4, 0x4}, {0x3, 0x5, 0xf, 0x1}, {0x1, 0x4, 0x2, 0x9}, {0x1, 0x5, 0xb, 0x2}], 0x10, 0x400}, 0x90) (async)
r4 = openat$cgroup_ro(r3, &(0x7f0000000180)='cgroup.controllers\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=@bloom_filter={0x1e, 0xffffd6a0, 0xfffffff7, 0xffff0879, 0x20, r4, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x5, 0xa}, 0x48)
ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x9) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) (async)
sendmsg$inet(r1, &(0x7f0000003f80)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000002b00)="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", 0x7df}, {0x0}, {&(0x7f0000003c80)="abe4afa99916765bf1007e0d3d7141cb69b3b7ee2a7a2c9b338a53b11949483da615f304d3c5ea8faf0862f8edf21ce7b61e1869fa2b0033260a8c442584dc", 0x3f}, {0x0}, {&(0x7f0000003d80)}], 0x5, &(0x7f0000003ec0)}, 0x80) (async)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.cpu/syz1\x00', 0x1ff) (async)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu/syz1\x00', 0x1ff)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) (async)
syz_clone(0x75848406, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
gettid() (async)
syz_clone(0x8010000, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000240)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0)
21:54:46 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8)
r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='pids.events\x00', 0x0, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0x0, 0x800, 0x18}, 0xc)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20)
r6 = openat$cgroup_ro(r0, &(0x7f00000005c0)='devices.list\x00', 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x262e, 0x0, 0x0, 0x0, 0x170}, @alu={0x7, 0x0, 0x8, 0x9, 0x406beb8866b9874f, 0x100, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0x71, &(0x7f0000000480)=""/113, 0x41000, 0x69, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x3, 0x3, 0x400}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000600)=[r0, r0, r4, r5, r1, r6, r0, r7, r1], &(0x7f0000000640)=[{0x4, 0x4, 0x5, 0x3}, {0x4, 0x2, 0x10}, {0x4, 0x4, 0x6, 0x3}, {0x5, 0x2, 0x0, 0x6}, {0x1, 0x1, 0x4, 0xc}, {0x4, 0x2, 0xd, 0x6}, {0x7, 0x4, 0x1, 0xa}], 0x10, 0x1ff}, 0x90)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
openat$cgroup_procs(r2, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r9, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r9, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_subtree(r9, &(0x7f0000000780)={[{0x2b, 'net_cls'}, {0x2d, 'net'}, {0x2d, 'net_cls'}]}, 0x17)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000100)={&(0x7f00000000c0), &(0x7f0000000180)=""/83, &(0x7f0000000200)="522ab85420ae0f56ccd3ad60aecb3d74751a1ec2f6888eba01cb803fac067ae5d90011f8d5319255fd2e255f689c5a25baf85ee5ef690c2318116c394fe82a627ffbd79f91f8e4406585d6ca1e4a1c3772ec523408e7171d5fcb9231802a31e94bdbf0d02be4929dd98e2a42f76905d023588d43b9dbddc746f103c85755c00669e69ba061d013e44c631d79c8f2a2d78511bc2e301fec49501a45eb6530d1e03ea1341554e19e522edd011be6c4e64caad180fe", &(0x7f00000002c0)="e4a19117afa4485702838f3e349536e66e7391c0c0a7cf508eaa7a9893e37a489a561bc219c9cba2dac8e0886814f40b326f68c5a321af5c937b31b6fffb8178df84008a57c078b97f967647e986d056c26c64753382a40f1eba075251b34beb4974405cce4ff6f790ad8190d4018f9d0051ef92da99577f29d84f1d441d39a1f7fca4812f157a071cbbd04de7b2ca924456b689d934076d7d6354a2b8e61a7887c8ec2271347d368739c974152e37cbc6eed6a4ece7cf1baefe15", 0x1ff}, 0x38)
[ 3226.021026][ T4969] FAULT_INJECTION: forcing a failure.
[ 3226.021026][ T4969] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 3226.085804][ T4969] CPU: 0 PID: 4969 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3226.097273][ T4969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3226.107172][ T4969] Call Trace:
[ 3226.110346][ T4969]
[ 3226.113071][ T4969] dump_stack_lvl+0x151/0x1b7
[ 3226.117929][ T4969] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3226.123632][ T4969] dump_stack+0x15/0x17
[ 3226.127613][ T4969] should_fail+0x3c6/0x510
[ 3226.131869][ T4969] should_fail_alloc_page+0x5a/0x80
[ 3226.136900][ T4969] prepare_alloc_pages+0x15c/0x700
[ 3226.141844][ T4969] ? __alloc_pages+0x5e0/0x5e0
[ 3226.146447][ T4969] ? __alloc_pages_bulk+0xe60/0xe60
[ 3226.151476][ T4969] ? sched_clock+0x9/0x10
[ 3226.155644][ T4969] __alloc_pages+0x138/0x5e0
[ 3226.160070][ T4969] ? prep_new_page+0x110/0x110
[ 3226.164670][ T4969] ? 0xffffffffa0028480
[ 3226.168660][ T4969] ? is_bpf_text_address+0x172/0x190
[ 3226.174056][ T4969] pte_alloc_one+0x73/0x1b0
[ 3226.178383][ T4969] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3226.183417][ T4969] ? arch_stack_walk+0xf3/0x140
[ 3226.188196][ T4969] __pte_alloc+0x86/0x350
[ 3226.192356][ T4969] ? free_pgtables+0x280/0x280
[ 3226.196955][ T4969] ? _raw_spin_lock+0xa4/0x1b0
[ 3226.201556][ T4969] ? __kasan_check_write+0x14/0x20
[ 3226.206501][ T4969] copy_page_range+0x28a8/0x2f90
[ 3226.211280][ T4969] ? __kasan_slab_alloc+0xb1/0xe0
[ 3226.216148][ T4969] ? pfn_valid+0x1e0/0x1e0
[ 3226.220478][ T4969] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3226.226032][ T4969] ? __rb_insert_augmented+0x5de/0x610
[ 3226.231327][ T4969] copy_mm+0xc7e/0x13e0
[ 3226.235319][ T4969] ? copy_signal+0x610/0x610
[ 3226.239745][ T4969] ? __init_rwsem+0xd6/0x1c0
[ 3226.244172][ T4969] ? copy_signal+0x4e3/0x610
[ 3226.248609][ T4969] copy_process+0x12bc/0x3260
[ 3226.253118][ T4969] ? proc_fail_nth_write+0x20b/0x290
[ 3226.258321][ T4969] ? fsnotify_perm+0x6a/0x5d0
[ 3226.262831][ T4969] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3226.267778][ T4969] ? vfs_write+0x9ec/0x1110
[ 3226.272123][ T4969] kernel_clone+0x21e/0x9e0
[ 3226.276458][ T4969] ? file_end_write+0x1c0/0x1c0
[ 3226.281147][ T4969] ? create_io_thread+0x1e0/0x1e0
[ 3226.286021][ T4969] ? mutex_unlock+0xb2/0x260
[ 3226.290445][ T4969] ? __mutex_lock_slowpath+0x10/0x10
[ 3226.295591][ T4969] __x64_sys_clone+0x23f/0x290
[ 3226.300244][ T4969] ? __do_sys_vfork+0x130/0x130
[ 3226.305015][ T4969] ? ksys_write+0x260/0x2c0
[ 3226.309356][ T4969] ? debug_smp_processor_id+0x17/0x20
[ 3226.314574][ T4969] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3226.320464][ T4969] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3226.325934][ T4969] do_syscall_64+0x3d/0xb0
[ 3226.330359][ T4969] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3226.336088][ T4969] RIP: 0033:0x7f024b55cae9
[ 3226.340469][ T4969] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3226.361008][ T4969] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3226.369445][ T4969] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3226.377308][ T4969] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
21:54:46 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r2, &(0x7f0000000180)="9c34c5f9ad0bf84008139dbd53ae1efd4ebb853dcb0a7e5a6b30fb8c3236a90fe6571354f26f89b59983accef1ea1b62bacb6faca5c8e5b32354e948faed0500eaf808b3a37b4be2beff46e14583e1b6277a37de46097ebaded2282670069c14bca12bc281807047fb7b8dd6f81bf4cd0b679b0fbaff43521a667cb92559f622c08b2760b60c1067fd3b0b4095ab931b2a4b3b9a76817a3334c35f3c535bff909cccb1374ed3841aa878046fdd83987d0ccac51f44f4de4d8ea2312a3a37b865fcfe"}, 0x20)
r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r3, &(0x7f00000003c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r2, &(0x7f0000000080)="660d4ca85d5309e11222602ddf0f80fef06e2f4882c2bb13d8176a4fd09ef61955779b1f5b0ed89692cae4a6af8db59af71cfa6de74770b595746a9d6a4075b57fdec3329bdd8c6f62d587ea2b958a7bfb"}, 0x20)
openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:46 executing program 5:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xa}, 0x10}, 0x80)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x126, 0x0, &(0x7f00000004c0)="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", 0x0, 0x35, 0x6000000000000000, 0x0, 0x8, &(0x7f0000000000), &(0x7f0000000300)="f90232000073f4dc", 0x0, 0xfffffffe}, 0x48)
r1 = getpid()
syz_open_procfs$namespace(r1, 0x0)
perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x5, 0x0, 0x3f, 0x80, 0x0, 0x2, 0x73071914393b6e53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x11c00, 0x6, 0x1, 0x5, 0x200000000000003, 0x3, 0x4000, 0x0, 0x3f, 0x0, 0x6d}, 0x0, 0x100a, 0xffffffffffffffff, 0x3)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pimreg\x00', 0x5dcf70ef8daa5d0e})
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {0x30}, {0x6}]})
r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}, 0x8006, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00')
openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r1, 0xffffffffffffffff, 0x0, 0xb4, &(0x7f0000000b80)='(\x0fP\xa9\xfeG\'^\x86|!{\x16\xdf]\x12E\x7f\r\xe6\xb2\x06\xa4\x0f\xec\xf7\xd2\xf6\xeb7\xb91^\xe9\xa4e\x0f]\xf2\x1e\xa5\xb1Y\xa4u40\x18\xe6\xa7x\xb5\x1d\xa7\xcb[f\x1b\x90[i\x98=\x90\xbe \x96\xf4\x1f\xd6\xc1\bO,?^\xad\xfc\x02\vxE\xe9\x8d\xe6\x8b\xf9\x95\xc9\x95-\xcel\xc9\xea\x85\x9a(\x7f\x97\x14\x89\xd3\xe3\x94\xbcZ(\x9e\x83-Mz\x14\xa6\xd1\xdf\xec\xe9\'\b\xdf\xd1\x89K?l\xf0\x9e\xec}\xb1\x95\xca\x02\xf4\xc1\xd1w\xdf7\xd5[\n\xc3\x01\xfdpnk\xc9Gb\x9b\x9b\x1a\xa9C\xb4\x92\xda#\xe8\x02\xf3\fw\x8d\x1e\xf9\x04\xc2|\xe0\xac\x81\x01\xcc\xe8\x9c'}, 0x30)
ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100})
socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080))
socketpair(0x0, 0x80000, 0x471, &(0x7f00000001c0))
r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8)
r8 = openat$cgroup_ro(r4, &(0x7f0000000b40)='cpuacct.usage_user\x00', 0x0, 0x0)
openat$cgroup_ro(r8, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080))
socketpair(0x21, 0x100009, 0x2, &(0x7f0000000640))
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x0, 0x800, 0x1, 0x7, 0x48, r7, 0x7, '\x00', 0x0, r4, 0x3}, 0x48)
perf_event_open(&(0x7f0000000ac0)={0x1, 0x80, 0x4, 0x1, 0x3, 0x1, 0x0, 0x5, 0x1080, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x2382, 0x2000001, 0x7, 0x7, 0x0, 0x5, 0xffff, 0x0, 0x2, 0x0, 0x80000000}, 0x0, 0x0, r8, 0x12)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x6b3e37004a612d52, 0x4, &(0x7f0000000a80)=ANY=[@ANYRESOCT=r1], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x46, &(0x7f0000000880)=""/70, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x100, 0x8, 0x600, 0xc0}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x90)
[ 3226.385156][ T4969] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3226.393071][ T4969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3226.401145][ T4969] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3226.408961][ T4969]
21:54:46 executing program 4:
openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0)
21:54:46 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async, rerun: 64)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (rerun: 64)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r2, &(0x7f0000000180)="9c34c5f9ad0bf84008139dbd53ae1efd4ebb853dcb0a7e5a6b30fb8c3236a90fe6571354f26f89b59983accef1ea1b62bacb6faca5c8e5b32354e948faed0500eaf808b3a37b4be2beff46e14583e1b6277a37de46097ebaded2282670069c14bca12bc281807047fb7b8dd6f81bf4cd0b679b0fbaff43521a667cb92559f622c08b2760b60c1067fd3b0b4095ab931b2a4b3b9a76817a3334c35f3c535bff909cccb1374ed3841aa878046fdd83987d0ccac51f44f4de4d8ea2312a3a37b865fcfe"}, 0x20) (async, rerun: 32)
r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0) (rerun: 32)
openat$cgroup_ro(r3, &(0x7f00000003c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) (async, rerun: 64)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r2, &(0x7f0000000080)="660d4ca85d5309e11222602ddf0f80fef06e2f4882c2bb13d8176a4fd09ef61955779b1f5b0ed89692cae4a6af8db59af71cfa6de74770b595746a9d6a4075b57fdec3329bdd8c6f62d587ea2b958a7bfb"}, 0x20) (async, rerun: 64)
openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) (async, rerun: 32)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (rerun: 32)
21:54:46 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61)
[ 3226.895441][ T4994] FAULT_INJECTION: forcing a failure.
[ 3226.895441][ T4994] name failslab, interval 1, probability 0, space 0, times 0
[ 3226.927388][ T4994] CPU: 1 PID: 4994 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3226.938853][ T4994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3226.948924][ T4994] Call Trace:
[ 3226.952047][ T4994]
[ 3226.954825][ T4994] dump_stack_lvl+0x151/0x1b7
[ 3226.959376][ T4994] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3226.964896][ T4994] dump_stack+0x15/0x17
[ 3226.968880][ T4994] should_fail+0x3c6/0x510
[ 3226.973488][ T4994] __should_failslab+0xa4/0xe0
[ 3226.978083][ T4994] ? vm_area_dup+0x26/0x230
[ 3226.982428][ T4994] should_failslab+0x9/0x20
[ 3226.986777][ T4994] slab_pre_alloc_hook+0x37/0xd0
[ 3226.991538][ T4994] ? vm_area_dup+0x26/0x230
[ 3226.995877][ T4994] kmem_cache_alloc+0x44/0x200
[ 3227.000566][ T4994] vm_area_dup+0x26/0x230
[ 3227.004725][ T4994] copy_mm+0x9a1/0x13e0
[ 3227.008726][ T4994] ? copy_signal+0x610/0x610
[ 3227.013148][ T4994] ? __init_rwsem+0xd6/0x1c0
[ 3227.017578][ T4994] ? copy_signal+0x4e3/0x610
[ 3227.022003][ T4994] copy_process+0x12bc/0x3260
[ 3227.026520][ T4994] ? proc_fail_nth_write+0x20b/0x290
[ 3227.031637][ T4994] ? fsnotify_perm+0x6a/0x5d0
[ 3227.036151][ T4994] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3227.041095][ T4994] ? vfs_write+0x9ec/0x1110
[ 3227.045441][ T4994] kernel_clone+0x21e/0x9e0
[ 3227.049774][ T4994] ? file_end_write+0x1c0/0x1c0
[ 3227.054462][ T4994] ? create_io_thread+0x1e0/0x1e0
[ 3227.059318][ T4994] ? mutex_unlock+0xb2/0x260
[ 3227.067586][ T4994] ? __mutex_lock_slowpath+0x10/0x10
[ 3227.072784][ T4994] __x64_sys_clone+0x23f/0x290
[ 3227.077471][ T4994] ? __do_sys_vfork+0x130/0x130
[ 3227.082411][ T4994] ? ksys_write+0x260/0x2c0
[ 3227.086754][ T4994] ? debug_smp_processor_id+0x17/0x20
[ 3227.091968][ T4994] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3227.097946][ T4994] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3227.103410][ T4994] do_syscall_64+0x3d/0xb0
[ 3227.107678][ T4994] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3227.113394][ T4994] RIP: 0033:0x7f024b55cae9
[ 3227.117657][ T4994] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3227.137775][ T4994] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:54:47 executing program 2:
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='jbd2_checkpoint_stats\x00', r0}, 0x10) (async)
r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuset.effective_cpus\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4004662b, &(0x7f00000005c0)=0x600000000000000)
r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
perf_event_open$cgroup(&(0x7f00000002c0)={0x3, 0x80, 0x8, 0x9, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0x3}, 0x80000, 0x100000001, 0x9, 0x0, 0x8, 0x99f2, 0x8, 0x0, 0x1}, r2, 0x10, r4, 0x2)
21:54:47 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r2, &(0x7f0000000180)="9c34c5f9ad0bf84008139dbd53ae1efd4ebb853dcb0a7e5a6b30fb8c3236a90fe6571354f26f89b59983accef1ea1b62bacb6faca5c8e5b32354e948faed0500eaf808b3a37b4be2beff46e14583e1b6277a37de46097ebaded2282670069c14bca12bc281807047fb7b8dd6f81bf4cd0b679b0fbaff43521a667cb92559f622c08b2760b60c1067fd3b0b4095ab931b2a4b3b9a76817a3334c35f3c535bff909cccb1374ed3841aa878046fdd83987d0ccac51f44f4de4d8ea2312a3a37b865fcfe"}, 0x20) (async)
r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000280)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r3, &(0x7f00000003c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000100)={r2, &(0x7f0000000080)="660d4ca85d5309e11222602ddf0f80fef06e2f4882c2bb13d8176a4fd09ef61955779b1f5b0ed89692cae4a6af8db59af71cfa6de74770b595746a9d6a4075b57fdec3329bdd8c6f62d587ea2b958a7bfb"}, 0x20) (async)
openat$cgroup_devices(r0, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) (async)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
21:54:47 executing program 0:
bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async)
r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8)
r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='pids.events\x00', 0x0, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0x0, 0x800, 0x18}, 0xc)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20)
r6 = openat$cgroup_ro(r0, &(0x7f00000005c0)='devices.list\x00', 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x262e, 0x0, 0x0, 0x0, 0x170}, @alu={0x7, 0x0, 0x8, 0x9, 0x406beb8866b9874f, 0x100, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0x71, &(0x7f0000000480)=""/113, 0x41000, 0x69, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x3, 0x3, 0x400}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000600)=[r0, r0, r4, r5, r1, r6, r0, r7, r1], &(0x7f0000000640)=[{0x4, 0x4, 0x5, 0x3}, {0x4, 0x2, 0x10}, {0x4, 0x4, 0x6, 0x3}, {0x5, 0x2, 0x0, 0x6}, {0x1, 0x1, 0x4, 0xc}, {0x4, 0x2, 0xd, 0x6}, {0x7, 0x4, 0x1, 0xa}], 0x10, 0x1ff}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x262e, 0x0, 0x0, 0x0, 0x170}, @alu={0x7, 0x0, 0x8, 0x9, 0x406beb8866b9874f, 0x100, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0x71, &(0x7f0000000480)=""/113, 0x41000, 0x69, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x3, 0x3, 0x400}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000600)=[r0, r0, r4, r5, r1, r6, r0, r7, r1], &(0x7f0000000640)=[{0x4, 0x4, 0x5, 0x3}, {0x4, 0x2, 0x10}, {0x4, 0x4, 0x6, 0x3}, {0x5, 0x2, 0x0, 0x6}, {0x1, 0x1, 0x4, 0xc}, {0x4, 0x2, 0xd, 0x6}, {0x7, 0x4, 0x1, 0xa}], 0x10, 0x1ff}, 0x90)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12) (async)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
openat$cgroup_procs(r2, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r9, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r9, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r9, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_subtree(r9, &(0x7f0000000780)={[{0x2b, 'net_cls'}, {0x2d, 'net'}, {0x2d, 'net_cls'}]}, 0x17) (async)
write$cgroup_subtree(r9, &(0x7f0000000780)={[{0x2b, 'net_cls'}, {0x2d, 'net'}, {0x2d, 'net_cls'}]}, 0x17)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000100)={&(0x7f00000000c0), &(0x7f0000000180)=""/83, &(0x7f0000000200)="522ab85420ae0f56ccd3ad60aecb3d74751a1ec2f6888eba01cb803fac067ae5d90011f8d5319255fd2e255f689c5a25baf85ee5ef690c2318116c394fe82a627ffbd79f91f8e4406585d6ca1e4a1c3772ec523408e7171d5fcb9231802a31e94bdbf0d02be4929dd98e2a42f76905d023588d43b9dbddc746f103c85755c00669e69ba061d013e44c631d79c8f2a2d78511bc2e301fec49501a45eb6530d1e03ea1341554e19e522edd011be6c4e64caad180fe", &(0x7f00000002c0)="e4a19117afa4485702838f3e349536e66e7391c0c0a7cf508eaa7a9893e37a489a561bc219c9cba2dac8e0886814f40b326f68c5a321af5c937b31b6fffb8178df84008a57c078b97f967647e986d056c26c64753382a40f1eba075251b34beb4974405cce4ff6f790ad8190d4018f9d0051ef92da99577f29d84f1d441d39a1f7fca4812f157a071cbbd04de7b2ca924456b689d934076d7d6354a2b8e61a7887c8ec2271347d368739c974152e37cbc6eed6a4ece7cf1baefe15", 0x1ff}, 0x38)
[ 3227.146110][ T4994] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3227.153918][ T4994] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3227.161731][ T4994] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3227.169635][ T4994] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3227.177525][ T4994] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3227.185347][ T4994]
21:54:47 executing program 3:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12)
21:54:47 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62)
21:54:47 executing program 5:
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xa}, 0x10}, 0x80)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x126, 0x0, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff310000002b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472be0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x35, 0x6000000000000000, 0x0, 0x8, &(0x7f0000000000), &(0x7f0000000300)="f90232000073f4dc", 0x0, 0xfffffffe}, 0x48) (async)
r1 = getpid()
syz_open_procfs$namespace(r1, 0x0) (async)
perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x5, 0x0, 0x3f, 0x80, 0x0, 0x2, 0x73071914393b6e53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x11c00, 0x6, 0x1, 0x5, 0x200000000000003, 0x3, 0x4000, 0x0, 0x3f, 0x0, 0x6d}, 0x0, 0x100a, 0xffffffffffffffff, 0x3)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pimreg\x00', 0x5dcf70ef8daa5d0e})
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {0x30}, {0x6}]})
r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}, 0x8006, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') (async)
openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) (async, rerun: 32)
r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0) (rerun: 32)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r1, 0xffffffffffffffff, 0x0, 0xb4, &(0x7f0000000b80)='(\x0fP\xa9\xfeG\'^\x86|!{\x16\xdf]\x12E\x7f\r\xe6\xb2\x06\xa4\x0f\xec\xf7\xd2\xf6\xeb7\xb91^\xe9\xa4e\x0f]\xf2\x1e\xa5\xb1Y\xa4u40\x18\xe6\xa7x\xb5\x1d\xa7\xcb[f\x1b\x90[i\x98=\x90\xbe \x96\xf4\x1f\xd6\xc1\bO,?^\xad\xfc\x02\vxE\xe9\x8d\xe6\x8b\xf9\x95\xc9\x95-\xcel\xc9\xea\x85\x9a(\x7f\x97\x14\x89\xd3\xe3\x94\xbcZ(\x9e\x83-Mz\x14\xa6\xd1\xdf\xec\xe9\'\b\xdf\xd1\x89K?l\xf0\x9e\xec}\xb1\x95\xca\x02\xf4\xc1\xd1w\xdf7\xd5[\n\xc3\x01\xfdpnk\xc9Gb\x9b\x9b\x1a\xa9C\xb4\x92\xda#\xe8\x02\xf3\fw\x8d\x1e\xf9\x04\xc2|\xe0\xac\x81\x01\xcc\xe8\x9c'}, 0x30) (async)
ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100}) (async)
socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async)
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) (async)
socketpair(0x0, 0x80000, 0x471, &(0x7f00000001c0)) (async)
r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) (async)
r8 = openat$cgroup_ro(r4, &(0x7f0000000b40)='cpuacct.usage_user\x00', 0x0, 0x0)
openat$cgroup_ro(r8, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080))
socketpair(0x21, 0x100009, 0x2, &(0x7f0000000640)) (async)
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64)
bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x0, 0x800, 0x1, 0x7, 0x48, r7, 0x7, '\x00', 0x0, r4, 0x3}, 0x48) (rerun: 64)
perf_event_open(&(0x7f0000000ac0)={0x1, 0x80, 0x4, 0x1, 0x3, 0x1, 0x0, 0x5, 0x1080, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x2382, 0x2000001, 0x7, 0x7, 0x0, 0x5, 0xffff, 0x0, 0x2, 0x0, 0x80000000}, 0x0, 0x0, r8, 0x12) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x6b3e37004a612d52, 0x4, &(0x7f0000000a80)=ANY=[@ANYRESOCT=r1], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x46, &(0x7f0000000880)=""/70, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x100, 0x8, 0x600, 0xc0}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x90)
[ 3227.300932][ T5014] FAULT_INJECTION: forcing a failure.
[ 3227.300932][ T5014] name failslab, interval 1, probability 0, space 0, times 0
[ 3227.326392][ T5014] CPU: 0 PID: 5014 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3227.337974][ T5014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3227.347870][ T5014] Call Trace:
[ 3227.351005][ T5014]
[ 3227.353958][ T5014] dump_stack_lvl+0x151/0x1b7
[ 3227.358473][ T5014] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3227.363935][ T5014] dump_stack+0x15/0x17
[ 3227.367929][ T5014] should_fail+0x3c6/0x510
[ 3227.372177][ T5014] __should_failslab+0xa4/0xe0
[ 3227.376776][ T5014] ? anon_vma_clone+0x9a/0x500
[ 3227.381374][ T5014] should_failslab+0x9/0x20
[ 3227.386062][ T5014] slab_pre_alloc_hook+0x37/0xd0
[ 3227.390835][ T5014] ? anon_vma_clone+0x9a/0x500
[ 3227.395437][ T5014] kmem_cache_alloc+0x44/0x200
[ 3227.400037][ T5014] anon_vma_clone+0x9a/0x500
[ 3227.404464][ T5014] anon_vma_fork+0x91/0x4e0
[ 3227.408802][ T5014] ? anon_vma_name+0x43/0x70
[ 3227.413229][ T5014] ? vm_area_dup+0x17a/0x230
[ 3227.417828][ T5014] copy_mm+0xa3a/0x13e0
[ 3227.421825][ T5014] ? copy_signal+0x610/0x610
[ 3227.426249][ T5014] ? __init_rwsem+0xd6/0x1c0
[ 3227.430673][ T5014] ? copy_signal+0x4e3/0x610
[ 3227.435105][ T5014] copy_process+0x12bc/0x3260
[ 3227.439617][ T5014] ? proc_fail_nth_write+0x20b/0x290
[ 3227.444739][ T5014] ? fsnotify_perm+0x6a/0x5d0
[ 3227.449337][ T5014] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3227.454372][ T5014] ? vfs_write+0x9ec/0x1110
[ 3227.458714][ T5014] kernel_clone+0x21e/0x9e0
[ 3227.463049][ T5014] ? file_end_write+0x1c0/0x1c0
[ 3227.467738][ T5014] ? create_io_thread+0x1e0/0x1e0
[ 3227.472597][ T5014] ? mutex_unlock+0xb2/0x260
[ 3227.477040][ T5014] ? __mutex_lock_slowpath+0x10/0x10
[ 3227.482232][ T5014] __x64_sys_clone+0x23f/0x290
[ 3227.486829][ T5014] ? __do_sys_vfork+0x130/0x130
[ 3227.491708][ T5014] ? ksys_write+0x260/0x2c0
[ 3227.496051][ T5014] ? debug_smp_processor_id+0x17/0x20
[ 3227.501257][ T5014] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3227.507163][ T5014] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3227.512628][ T5014] do_syscall_64+0x3d/0xb0
[ 3227.516878][ T5014] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3227.522609][ T5014] RIP: 0033:0x7f024b55cae9
[ 3227.526866][ T5014] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3227.546670][ T5014] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3227.555096][ T5014] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3227.562989][ T5014] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3227.570889][ T5014] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3227.578737][ T5014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3227.586684][ T5014] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3227.594590][ T5014]
21:54:47 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63)
[ 3227.860919][ T5037] FAULT_INJECTION: forcing a failure.
[ 3227.860919][ T5037] name failslab, interval 1, probability 0, space 0, times 0
[ 3227.894420][ T5037] CPU: 1 PID: 5037 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3227.906583][ T5037] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3227.916482][ T5037] Call Trace:
[ 3227.919602][ T5037]
[ 3227.922378][ T5037] dump_stack_lvl+0x151/0x1b7
[ 3227.926893][ T5037] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3227.932359][ T5037] dump_stack+0x15/0x17
[ 3227.936353][ T5037] should_fail+0x3c6/0x510
[ 3227.940604][ T5037] __should_failslab+0xa4/0xe0
[ 3227.945206][ T5037] ? anon_vma_clone+0x9a/0x500
[ 3227.949805][ T5037] should_failslab+0x9/0x20
[ 3227.954144][ T5037] slab_pre_alloc_hook+0x37/0xd0
[ 3227.958919][ T5037] ? anon_vma_clone+0x9a/0x500
[ 3227.963527][ T5037] kmem_cache_alloc+0x44/0x200
[ 3227.968209][ T5037] anon_vma_clone+0x9a/0x500
[ 3227.972653][ T5037] anon_vma_fork+0x91/0x4e0
[ 3227.977002][ T5037] ? anon_vma_name+0x43/0x70
[ 3227.981399][ T5037] ? vm_area_dup+0x17a/0x230
[ 3227.985926][ T5037] copy_mm+0xa3a/0x13e0
[ 3227.989908][ T5037] ? copy_signal+0x610/0x610
[ 3227.994704][ T5037] ? __init_rwsem+0xd6/0x1c0
[ 3227.999105][ T5037] ? copy_signal+0x4e3/0x610
[ 3228.003985][ T5037] copy_process+0x12bc/0x3260
[ 3228.008570][ T5037] ? proc_fail_nth_write+0x20b/0x290
[ 3228.013797][ T5037] ? fsnotify_perm+0x6a/0x5d0
[ 3228.018311][ T5037] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3228.023258][ T5037] ? vfs_write+0x9ec/0x1110
[ 3228.027601][ T5037] kernel_clone+0x21e/0x9e0
[ 3228.032287][ T5037] ? file_end_write+0x1c0/0x1c0
[ 3228.036975][ T5037] ? create_io_thread+0x1e0/0x1e0
[ 3228.041920][ T5037] ? mutex_unlock+0xb2/0x260
[ 3228.046353][ T5037] ? __mutex_lock_slowpath+0x10/0x10
[ 3228.051467][ T5037] __x64_sys_clone+0x23f/0x290
[ 3228.056156][ T5037] ? __do_sys_vfork+0x130/0x130
[ 3228.061285][ T5037] ? ksys_write+0x260/0x2c0
[ 3228.065713][ T5037] ? debug_smp_processor_id+0x17/0x20
[ 3228.071008][ T5037] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3228.076905][ T5037] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3228.082376][ T5037] do_syscall_64+0x3d/0xb0
[ 3228.086633][ T5037] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3228.092353][ T5037] RIP: 0033:0x7f024b55cae9
[ 3228.096698][ T5037] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3228.116142][ T5037] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3228.124648][ T5037] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3228.132554][ T5037] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3228.140376][ T5037] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3228.148179][ T5037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:54:48 executing program 4:
openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r1, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='freezer.self_freezing\x00', 0x0, 0x0)
21:54:48 executing program 0:
r0 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8)
r1 = openat$cgroup_ro(r0, &(0x7f0000000380)='pids.events\x00', 0x0, 0x0)
r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r3 = openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0)
r4 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0x0, 0x800, 0x18}, 0xc)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20)
r6 = openat$cgroup_ro(r0, &(0x7f00000005c0)='devices.list\x00', 0x0, 0x0)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x262e, 0x0, 0x0, 0x0, 0x170}, @alu={0x7, 0x0, 0x8, 0x9, 0x406beb8866b9874f, 0x100, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0x71, &(0x7f0000000480)=""/113, 0x41000, 0x69, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x3, 0x3, 0x400}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000600)=[r0, r0, r4, r5, r1, r6, r0, r7, r1], &(0x7f0000000640)=[{0x4, 0x4, 0x5, 0x3}, {0x4, 0x2, 0x10}, {0x4, 0x4, 0x6, 0x3}, {0x5, 0x2, 0x0, 0x6}, {0x1, 0x1, 0x4, 0xc}, {0x4, 0x2, 0xd, 0x6}, {0x7, 0x4, 0x1, 0xa}], 0x10, 0x1ff}, 0x90)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12)
openat$cgroup_procs(r2, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r9, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r9, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
write$cgroup_subtree(r9, &(0x7f0000000780)={[{0x2b, 'net_cls'}, {0x2d, 'net'}, {0x2d, 'net_cls'}]}, 0x17)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000100)={&(0x7f00000000c0), &(0x7f0000000180)=""/83, &(0x7f0000000200)="522ab85420ae0f56ccd3ad60aecb3d74751a1ec2f6888eba01cb803fac067ae5d90011f8d5319255fd2e255f689c5a25baf85ee5ef690c2318116c394fe82a627ffbd79f91f8e4406585d6ca1e4a1c3772ec523408e7171d5fcb9231802a31e94bdbf0d02be4929dd98e2a42f76905d023588d43b9dbddc746f103c85755c00669e69ba061d013e44c631d79c8f2a2d78511bc2e301fec49501a45eb6530d1e03ea1341554e19e522edd011be6c4e64caad180fe", &(0x7f00000002c0)="e4a19117afa4485702838f3e349536e66e7391c0c0a7cf508eaa7a9893e37a489a561bc219c9cba2dac8e0886814f40b326f68c5a321af5c937b31b6fffb8178df84008a57c078b97f967647e986d056c26c64753382a40f1eba075251b34beb4974405cce4ff6f790ad8190d4018f9d0051ef92da99577f29d84f1d441d39a1f7fca4812f157a071cbbd04de7b2ca924456b689d934076d7d6354a2b8e61a7887c8ec2271347d368739c974152e37cbc6eed6a4ece7cf1baefe15", 0x1ff}, 0x38)
bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) (async)
openat$cgroup_ro(r0, &(0x7f0000000380)='pids.events\x00', 0x0, 0x0) (async)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(r2, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) (async)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000580)={0x0, 0x800, 0x18}, 0xc) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20) (async)
openat$cgroup_ro(r0, &(0x7f00000005c0)='devices.list\x00', 0x0, 0x0) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xd, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, [@cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x262e, 0x0, 0x0, 0x0, 0x170}, @alu={0x7, 0x0, 0x8, 0x9, 0x406beb8866b9874f, 0x100, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}]}, &(0x7f0000000440)='GPL\x00', 0x0, 0x71, &(0x7f0000000480)=""/113, 0x41000, 0x69, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x3, 0x3, 0x400}, 0x10, 0x0, 0x0, 0x7, &(0x7f0000000600)=[r0, r0, r4, r5, r1, r6, r0, r7, r1], &(0x7f0000000640)=[{0x4, 0x4, 0x5, 0x3}, {0x4, 0x2, 0x10}, {0x4, 0x4, 0x6, 0x3}, {0x5, 0x2, 0x0, 0x6}, {0x1, 0x1, 0x4, 0xc}, {0x4, 0x2, 0xd, 0x6}, {0x7, 0x4, 0x1, 0xa}], 0x10, 0x1ff}, 0x90) (async)
write$cgroup_pid(r3, &(0x7f0000000040), 0x12) (async)
openat$cgroup_procs(r2, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
write$cgroup_subtree(r9, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r9, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
write$cgroup_subtree(r9, &(0x7f0000000780)={[{0x2b, 'net_cls'}, {0x2d, 'net'}, {0x2d, 'net_cls'}]}, 0x17) (async)
bpf$MAP_DELETE_BATCH(0x1b, &(0x7f0000000100)={&(0x7f00000000c0), &(0x7f0000000180)=""/83, &(0x7f0000000200)="522ab85420ae0f56ccd3ad60aecb3d74751a1ec2f6888eba01cb803fac067ae5d90011f8d5319255fd2e255f689c5a25baf85ee5ef690c2318116c394fe82a627ffbd79f91f8e4406585d6ca1e4a1c3772ec523408e7171d5fcb9231802a31e94bdbf0d02be4929dd98e2a42f76905d023588d43b9dbddc746f103c85755c00669e69ba061d013e44c631d79c8f2a2d78511bc2e301fec49501a45eb6530d1e03ea1341554e19e522edd011be6c4e64caad180fe", &(0x7f00000002c0)="e4a19117afa4485702838f3e349536e66e7391c0c0a7cf508eaa7a9893e37a489a561bc219c9cba2dac8e0886814f40b326f68c5a321af5c937b31b6fffb8178df84008a57c078b97f967647e986d056c26c64753382a40f1eba075251b34beb4974405cce4ff6f790ad8190d4018f9d0051ef92da99577f29d84f1d441d39a1f7fca4812f157a071cbbd04de7b2ca924456b689d934076d7d6354a2b8e61a7887c8ec2271347d368739c974152e37cbc6eed6a4ece7cf1baefe15", 0x1ff}, 0x38) (async)
21:54:48 executing program 3:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3) (async)
write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12)
21:54:48 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0xa, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001480)={0x0, 0x1, 0x18}, 0xc)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r4, &(0x7f0000000180)}, 0x20)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
syz_clone(0x4000100, &(0x7f0000001680)="9bdadfeebb181c7ae81d4ed78f285f596ef39ca3d9ee0a8ca02b8592488c9d941a4f2ddae7a7403a563b24d646ed9a367667edf7e365e7294ee1d8a990d955a30bc309b63ba489febb", 0x49, &(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)="1f1666a37b7f2fc31869ef6a78c1b5cea28a74366b55d59ef4040d8bd01d146f0ae159c50212b1ba228d1ee8661e0470d8ca3d92761be7a4524046cc12fee29f5263989d67f7d61d8c6bce46467a0ae17a78d39ea41a91fbcc25a408d5392ff9bce70118b0fe2201dd5aaefc1c679bfa51c673bba6")
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002840)={r4, &(0x7f0000001800)="ad43a43d08f5476b67934ebd3274f22bfe7d5566ff972a310af205d7e2b21e610bb592dbcd5122903691c311ff27504bf0ed9a1d666c10c7da6c4551ff333230586666d1cd27a763b11f2ea61f5638c9bf75eea23a476647caaaaed0e7f7fa387c574136289a5f875cf62592d595498ccf01e7af0ea96f3b9300c12ed56bdaa952aa0f1e401fef39470d965d3d77f3a6c05df8073c8f4c31fe7277c9abba434cc5f02bac3b7e7a4b589e6a02a591668516e83ab129bf52bb2895f09a8841a0f6c83018c032b3308ffecb529b3bb4d930ad1602d6b6d6cdef1bfcbf8da42e6f494b686411a37a82f09c1aac1091a4c64157ad54fadf79b37a6205f73dafc7d43e2811049896d26b3e3d9568568bea2ff9a50262512450b8d84983d5f69f3bc43761e32537a8723f5f70619f89f51647383909cc8fd52808d669b9a29e773de15f85a057071b65d82949164efa361d5bd5048e1616f0d7084f1d489dc0846173cc27cbba754d3bbbe52665d492b8c21349b79e07b15bf8a60e801ac46136c0f8eab66f13f8a78512b8d76ee0b0eaee8854926ff9e7ad687f48a73ba93a362b818047ece38a4fc82de04c4ea052b152fb7ea3001401f22918b1c2bf8c61e60b798fd3f7c1e3420214f6c7ec9fa7d62cca9eb187ad36f7a7d247f6a147d2cbffcd4220188fc48c857957645268146242227456d639812613856349621cbfc14cc75460401372fe50517db8f57c1324531a1485f423027a3525ced6dafd602ca9779bc8ec48dd5c05ca31ace728f0879a08e9dc69b85f67a12f276188129dacf7f3a2e63626332ad07acf4a245f2a0fa87aa18743bdadfba8f0b2ebea5860a44ab40819a8cb1f0b37436fe36c05cf35768c72497c31b90c786dc5d82b3db745d6231ffe4979d4037e88dd9f442cc388860ce9d8518c7a64b84ded251cbfe0e31c1ee1bbf841c60e55cc3168d6e1c8906ff541f5358f1dd2b610f78bfa1f874aac8a77d6e4373c9c51b075a7e85261f62f984991bba7d08db13ea8f6881b7413b0d61c49c1a6ee55e6e019548cfe844abfa58ea0191fcc54d9b678cadc1b13cea68fe86482827400a05fdd02b365c15127d1dd3d9af23d32510b7a13a98f0554c549e2459eb556b5abc5239a2976391505da25b1cac2ffb329f5e62e6b75cc1ef7e45352407b5cdae991cc410e98a34172384b503b3005acde4adcd542620ef2e4e7a3b38bdb538066e62d475440e44bd443590a7bfaef6fc4108cf3b862a40bfaaded556fb4d92c4cd8dd2777b532cd8d0e5d29cad84efc0b54f29642e3a3016ae6928a2f58a8e03de296037317f6fd3ef1236fd10e329e16a5e9790597652a043b1d0cafaadd598d9b365d608cd74a5df54216dd9692354360318f6c498922ef1a4eb8a5b34f56a06a1516d73905629c05688c42a85457d42f8854fdc635afcc3fec7b84a46e9481b902c66a2ecd66ca2432e87884759e1851219d8f154bcdcab6a5d5fe7e34404647d366b25165311f64fa6af3d4acfd87f3bbc5e1fb4238e248fa3e418f4e842d805a38977fd70f416b3b2a8bc2a1705f4ddb2e5ecd59ef08c7998c64ad2f55fe5b03d2515587610cf96c97d78d5689a535bc0844b46d8ec26f0b45535856f43af6bc741ca8ea3f13e38a570ecf1b7b5b733a663915622ac130f5934ffd031f76db9f17f56cf34b7c0c6ed547dd5350d0efcd815cd4bc40b1470acb3af11a69e28688557ed5ccdcb677859a3e69b755c75374629a17d2ad6e7df48b8fb29a11bd20ff75bb30d20f2fd9f2a0451f1807a38d8f32d6b71d21817dc060ce09b6a92305975f36c657a4a50e35220aa27624a57945fce5f27979f042fa171fb520c64f8ef909f0f10c7a651447617ccf0ce57eef3e5b81266416083caebb10e12993dea04748c4654601dd70e9145d0de4273aa54a3654aa4e7e9e29d0bdad00c342d03d508f93201f80c0e604337ea1e08161786eac6156a94daaef3e0a4d2d42024fc8cfe57f7dc97368e821d608520c7fea202428e9e9c7e2236736cbd36ba9050c28b548fedc57d4630d8030c455aae26953b0e17a045ed7321fbff9b19b5dba37fe3721c2411f90830b5286c52a60df796e7a41b823e0c68aa4cdf54e1795042ea57aec18cde55fbccca6be64deaea566b0b641595f313cf6c16322f8edff56ea3a910349ccb55b13a4ec926f00a8cd4e0d7e9cf69cf15ce0c21be5cce7fb04c0dcd6a589bd3dd76f3258d8aeb2ea6326801e65537913fb95b4ccec15cb25ac4f940515958789001b70c8f0646538fec267f5450ff9151240caeb6db8cca265e13d6bb565211118a2d0114941229edb94f1dbe0a4dfedea3766bb03b2b2e127c834df21fdc788c8b1a55a32dff92bcaf50a8db0e1c2b5acbb6326626657d639004459bca7c1f8084e5f92c28d74db0853e856131658cc609bfc99e5def4aba83d6d25013601656bd19fb79687082402eff4077cd62fcfe1008f51a5de1b1f9bd536e397eaa362f4aa14fcdcc46a92f177680bb3017af7a78fb260f6bc68fd248005c7acae4caaad486497aaff4c3ed046b7bbedd7060c66a31e7027838a6a8a54d763fd71c378a7d4655c594e843dc258353f71bd5b6bab5463bee78a48c4a88426f6da96268942d48854120c2dd3c939dfc6dbccb2a80a7edbd197fa1a0e5c045ac72b0c669eba2076ecf60f2ff147de273a51a7de9b025a9de831fe62e9ed6a8dfbcbd1b05a52fe7ec737d2be9860160690614762de90045f616b13088d0a6a3c53521627c3931da477846f4a7e11de4b7bad66f63f96311e1c3fc250b7ab46a477ea3335d98d46a0301786be750c21ac1a8758e04e105a10aa04c4ca0a73cbbfd987faa0a238ca21655af7eb9b09bcfa5ecc81b185865ce0dfcf476e6f9f192db10a90584f5ab40fe3244b674b677831e641b00c23ddcc085d48455c0676cf7ed97e2ff6969072f5a43651e469e3f9cf191b21528a024ca15baa70e4886b68d321573ea3ba2778fa2223c638ee2a583a684f39c7627f0437aa4c000c84bd03cae210a8810ebcae6b6e4098a2e85d6983f6bec7fdc37e7d3b5bb9dd0b33b223b4cdc40fe4b50b34b37596e4e9c6106e88f34f45e4acef06cb6bdc03f76ae7f41b1b26e8d063f901cd50c5d04c0750715f82624b2c39045d09122f5011af604f4a00e0cf780fe26743675e62612c4b9d21841bc9202010f301a3e2ca68e63d4101cd174fe1a800b5b44289feef94ff7e5970bb49b04c5e9bf083cbb1ce249b4e15b6068e7ab9d4e6eea26d442277c3877040c8625cb8eb574df4c119f61089d59d321c431678f57d839ee5506a5ff66ad7fab0adfed8961fc49a8352707f3f1adc6703bf83463417487d1f1503d500d4738722d2364a4ad9d8f0df8cc45d6f2f20e7169be374abe39be2aa983fddcb75bfb8ba16b4e8b1da1f92f1ca022d3d35cc8068813fa497e4d994a93e1ace8ce762258a1f7a90096ef39b00dfa8924b3764628975ce2780775bdd770ad6c0a4c7bbf7e8d891dbe1d5d2654ae0dea80baa398b8ec9eae75a7a4aff225f42588e878a9ca8bf6b7a697f507566c14c4f96d899ec55cc24731e8eba3975a162c8fc44d262157a2d71ad5f171f55928bfaff3cd1ab86e30d436a031374f21530e002e7c9c31dfdcd11ebf2022e65befccebd67fe5b73fe3beafe8b87657b808f033135ef248bfc9126d205278763af5bdd2ab5445ff4505037a2b7841e926eed7a3c3a78a9e8b4450aa315f718c48e84a2ef2d867d177a2190fe59bdfd3c46d72cd5a015619723bfc141b341e327069fb5ac494e3de7b0ad455ba67e55e3d634e6260c4ee8a1bb0b42f1393f84058ec686365f08ba642edaa1080491176139cdd3eb859fb49b51d84e2bb822a7dd838e94c46faacb9f6ae74d894d4312feecc83c118ea1f7528b8c686495d504dc2d93f47c43544eab8d7576af1cf5e6594f885cbe1ecce8323a78137ae9fa963c6c0c4abd1760f94ae6dd27737bafdcefa299db6c5fbe33f7b21c11a1731643c504c590304de7aa93950cb0792f5a6190c7ea476cdeeb1a25941e4bddff2e692fe466cd45330307736ca591dc8748b08552445a5b8325ffa9a49daed3923b50d0619289c852f17f37626e19f091b8645de705472a5f6d4edf74320de84c4e7e163356600173d332a4ad9bb43ec55227349265951f8443feebe6894464204101a754567400027351a7250140593ab75f990963c75ba9e72b8c9a78247be1f570a426973d020b6db6507fc58332c79acc401d605909832864e253539827a9df35dd011a0671de0f09789230244c3d2a7f42f7fb1fdcde68df6d251e7fe5a2b7f6c602e2d3932381565e0162f98bd5c771a1132db011780f49d1dcc1bffc45e1f9bcce4aa585a5ea4cfde199778bec7238a2075c5318bae99069fe0f762fc9a4c023dc16812005cb41e649073cda9739a40b92ac631118951981a1de53f1f3a79d43114c44962d2eace2b6e808b1e6072d650041957091150e7c05745a0bf3bf1e235ab6c2af28bae14c1b5e31986fb1caffa5378896f0985e2f36d46eba654db5d78f6f904a63e3384f3b1e2bfce93fd37094ce92ae79ab5c06ed30a55551537bed1eab53f4e127fea6ae2b777e38de32b77b526ddd186d05da0f41073674aac2d3dfd20da258c10f148f98af3fa6fec30b12e74013c0c6b0c484d4215e8cc2300e097e327fe498cd0d48c7268376ba192f93d5cd5933d71ca7364f8db1ad7ca5f42fa7f120bb43aeb4b9294b0c4058dfe6850b5c33279c3dd88949fe0d61f04f6535fcd8966c08941ddf75bf9325b0fd10ac39d4a0eceefe7b5f5c8125d42e751017dc697b7111e0ff5fc851cea0cf9640ddecb8a35560255effc78a7bc729cd312b9072e2583ba8a488b5ed89665550e50ea122a19a42e0756a673b31c7d9e0ae66737dbb9af70ccad5c8b1f50216d3071ceacb136f628cddede9f1be37390f34021e97e49ff8e3bf750621360eb5b163f265d5b262300773d9bb13c3cdb7f5650ddc53e0b04b12b375c47fcc889bdf543974f191e657acf69dd4fdcf80a8a5176186e84287116ed6c6c42e5c15eb5b3971d0d9dc66102567866c420879e65e3fc6d0d8d9c6e9279c6cb981554b7abdc25589b17548202502075151f4ec7535e0008b7c3a423115cf08ae963b38e133466154d8b7ff4c76ba3b5e5a624b1b7600f27fccf721424cffdd59e856ed46cf893ec8eee28abbe3bcc01fc596af9a8c658a82725e8ea15d06f8765376ed00ccd48e7ea82ccce8a5a7b4fee5b62d26792dfc8fc1276cdb29297da741d36a6be4735bc9849551b378ada929b9a59da05ae4546081f8411b4543c6f69bd8c6659f0f76988e28faae75e833d01215f62cd80b19b414fe6d447c22d20a53837498b79b9d967243780f7b4987e47ee5193e726fc4c9be55751ea7e714c9d0e60e53183ae6f33562eee3185b076b1a7faf91d879e5c5c5bb0365b6d393fdeb7be6ac9dda9134aef146cbc337dd73f0f6ff0e4d9c94622c09365835b59bb790f8f2af8048c8419f3c00f3f59aa42a0c22fd68ef3cc594d4bd50cc5abe8162e2d01c644b09d6c0d8ffcf3eea834e6b0a95d3923aff312fe8aa25386f9ce60b2c05ee8f811170e6b599facb7ae750f684b4673d6601d0671515356106841c73920b662b362567d030ae166b578986ffcd1602e07cfc50c544f6a631b2d875faf75a7434e037d10d03d659677a450a507163019396ca9fe87ae764a253fe9e2159786a4711e7ac3c56af414dbae78a0d3c1b5c5546", &(0x7f0000002800)=""/26}, 0x20)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r6, &(0x7f0000000180)}, 0x20)
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001500)=@generic={&(0x7f00000014c0)='./file0\x00'}, 0x18)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x1, &(0x7f0000000080)=@raw=[@generic={0x3, 0x2, 0x3, 0x6f96, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x1000, &(0x7f0000000440)=""/4096, 0x41000, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001440)={0x0, 0x9, 0xb8a, 0x85d}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001540)=[r3, r4, r5, r1, r6, r7, r1], &(0x7f0000001580)=[{0x0, 0x1, 0xe, 0xd}], 0x10, 0xd17}, 0x90)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1c, 0x4, 0x8, 0xfff, 0xa, 0x1, 0x8, '\x00', 0x0, r1, 0x4, 0x1, 0x2}, 0x48)
[ 3228.156202][ T5037] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3228.165214][ T5037]
21:54:48 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000080), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000180)=""/111, 0x6f}, {&(0x7f0000000200)=""/132, 0x84}], 0x3, &(0x7f0000000300)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x40000000)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES16=r0], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x2, &(0x7f0000000000)=@raw=[@exit, @jmp={0x5, 0x1, 0x8, 0x8, 0xb, 0xc, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x87, &(0x7f00000003c0)=""/135, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_procs(r2, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:54:48 executing program 5:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x0, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xa}, 0x10}, 0x80)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x126, 0x0, &(0x7f00000004c0)="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", 0x0, 0x35, 0x6000000000000000, 0x0, 0x8, &(0x7f0000000000), &(0x7f0000000300)="f90232000073f4dc", 0x0, 0xfffffffe}, 0x48)
r1 = getpid()
syz_open_procfs$namespace(r1, 0x0) (async)
perf_event_open(&(0x7f0000000400)={0x1, 0x80, 0x5, 0x0, 0x3f, 0x80, 0x0, 0x2, 0x73071914393b6e53, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x11c00, 0x6, 0x1, 0x5, 0x200000000000003, 0x3, 0x4000, 0x0, 0x3f, 0x0, 0x6d}, 0x0, 0x100a, 0xffffffffffffffff, 0x3) (async)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'pimreg\x00', 0x5dcf70ef8daa5d0e}) (async)
ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{}, {0x30}, {0x6}]}) (async)
r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}, 0x8006, 0x0, 0x0, 0x1, 0x0, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000003c0)='memory.numa_stat\x00') (async)
openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) (async)
r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000009c0)='cpuacct.usage_sys\x00', 0x26e1, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000006c0)={r1, 0xffffffffffffffff, 0x0, 0xb4, &(0x7f0000000b80)='(\x0fP\xa9\xfeG\'^\x86|!{\x16\xdf]\x12E\x7f\r\xe6\xb2\x06\xa4\x0f\xec\xf7\xd2\xf6\xeb7\xb91^\xe9\xa4e\x0f]\xf2\x1e\xa5\xb1Y\xa4u40\x18\xe6\xa7x\xb5\x1d\xa7\xcb[f\x1b\x90[i\x98=\x90\xbe \x96\xf4\x1f\xd6\xc1\bO,?^\xad\xfc\x02\vxE\xe9\x8d\xe6\x8b\xf9\x95\xc9\x95-\xcel\xc9\xea\x85\x9a(\x7f\x97\x14\x89\xd3\xe3\x94\xbcZ(\x9e\x83-Mz\x14\xa6\xd1\xdf\xec\xe9\'\b\xdf\xd1\x89K?l\xf0\x9e\xec}\xb1\x95\xca\x02\xf4\xc1\xd1w\xdf7\xd5[\n\xc3\x01\xfdpnk\xc9Gb\x9b\x9b\x1a\xa9C\xb4\x92\xda#\xe8\x02\xf3\fw\x8d\x1e\xf9\x04\xc2|\xe0\xac\x81\x01\xcc\xe8\x9c'}, 0x30) (async)
ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x100})
socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff})
socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) (async)
socketpair(0x0, 0x80000, 0x471, &(0x7f00000001c0)) (async)
r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8)
r8 = openat$cgroup_ro(r4, &(0x7f0000000b40)='cpuacct.usage_user\x00', 0x0, 0x0)
openat$cgroup_ro(r8, &(0x7f0000000600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080))
socketpair(0x21, 0x100009, 0x2, &(0x7f0000000640)) (async)
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000940)=@base={0x0, 0x800, 0x1, 0x7, 0x48, r7, 0x7, '\x00', 0x0, r4, 0x3}, 0x48) (async)
perf_event_open(&(0x7f0000000ac0)={0x1, 0x80, 0x4, 0x1, 0x3, 0x1, 0x0, 0x5, 0x1080, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000480), 0x5}, 0x2382, 0x2000001, 0x7, 0x7, 0x0, 0x5, 0xffff, 0x0, 0x2, 0x0, 0x80000000}, 0x0, 0x0, r8, 0x12) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x6b3e37004a612d52, 0x4, &(0x7f0000000a80)=ANY=[@ANYRESOCT=r1], &(0x7f00000007c0)='syzkaller\x00', 0x0, 0x46, &(0x7f0000000880)=""/70, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x3, 0x1}, 0x8, 0x10, &(0x7f0000000900)={0x100, 0x8, 0x600, 0xc0}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000380)}, 0x90)
21:54:48 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64)
[ 3228.421114][ T5087] FAULT_INJECTION: forcing a failure.
[ 3228.421114][ T5087] name failslab, interval 1, probability 0, space 0, times 0
[ 3228.466279][ T5087] CPU: 0 PID: 5087 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3228.479137][ T5087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3228.490188][ T5087] Call Trace:
[ 3228.493285][ T5087]
[ 3228.496148][ T5087] dump_stack_lvl+0x151/0x1b7
[ 3228.501455][ T5087] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3228.507766][ T5087] dump_stack+0x15/0x17
[ 3228.512806][ T5087] should_fail+0x3c6/0x510
[ 3228.517138][ T5087] __should_failslab+0xa4/0xe0
[ 3228.521738][ T5087] ? anon_vma_clone+0x9a/0x500
[ 3228.526448][ T5087] should_failslab+0x9/0x20
[ 3228.530788][ T5087] slab_pre_alloc_hook+0x37/0xd0
[ 3228.535565][ T5087] ? anon_vma_clone+0x9a/0x500
[ 3228.540163][ T5087] kmem_cache_alloc+0x44/0x200
[ 3228.544764][ T5087] anon_vma_clone+0x9a/0x500
[ 3228.549192][ T5087] anon_vma_fork+0x91/0x4e0
[ 3228.554653][ T5087] ? anon_vma_name+0x43/0x70
[ 3228.559083][ T5087] ? vm_area_dup+0x17a/0x230
[ 3228.563510][ T5087] copy_mm+0xa3a/0x13e0
[ 3228.567502][ T5087] ? copy_signal+0x610/0x610
[ 3228.571944][ T5087] ? __init_rwsem+0xd6/0x1c0
[ 3228.576612][ T5087] ? copy_signal+0x4e3/0x610
[ 3228.582431][ T5087] copy_process+0x12bc/0x3260
[ 3228.587034][ T5087] ? proc_fail_nth_write+0x20b/0x290
[ 3228.592240][ T5087] ? fsnotify_perm+0x6a/0x5d0
[ 3228.597878][ T5087] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3228.602917][ T5087] ? vfs_write+0x9ec/0x1110
[ 3228.608037][ T5087] kernel_clone+0x21e/0x9e0
[ 3228.612374][ T5087] ? file_end_write+0x1c0/0x1c0
21:54:48 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x7, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800004001000080091b0000", @ANYRES32=0x1, @ANYBLOB="00000000000000511177527dbe155909"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x17, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x100003}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x0, 0x20}, 0x10}, 0x80)
r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x8, 0x1, 0x4, 0x6, 0x0, 0x2a8, 0x21408, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000004, 0xc89ed430c85625d, @perf_config_ext={0xc61a, 0x785a}, 0x2, 0xfffffffffffffff8, 0xfff, 0x0, 0x6, 0x949, 0x2eb, 0x0, 0x2b53, 0x0, 0x1003}, 0x0, 0x2, r2, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
openat$cgroup_ro(r3, 0x0, 0x0, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0x43405)
openat$cgroup_ro(r3, &(0x7f0000000640)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0)
openat$cgroup_devices(r3, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0)
r4 = openat$cgroup_ro(r0, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, r6, 0x9)
r7 = gettid()
perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x6, 0x78, 0xea, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x40003}, 0x0, 0x5, 0xffff, 0x0, 0x0, 0x3, 0x35ef, 0x0, 0xf70, 0x0, 0x9}, r7, 0xa, 0xffffffffffffffff, 0x8)
r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x202, 0x0, 0x0, 0x0, 0x4, 0x773}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x3f, 0xe5, 0x6, 0x3f, 0x0, 0xb0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x8088b, 0x7f, 0x7, 0x2, 0x0, 0x3f, 0x6, 0x0, 0x10001, 0x0, 0xfe}, r7, 0xc, r8, 0xf)
r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
perf_event_open(&(0x7f00000000c0)={0x6c8f2d7be4c81520, 0x80, 0x0, 0x2, 0x0, 0x9, 0x0, 0x4, 0x80, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5cc, 0x4, @perf_bp={&(0x7f0000000040), 0xc}, 0x60, 0x0, 0x10000000, 0x7, 0x1, 0x7, 0x0, 0x0, 0xfffffffc}, r7, 0x0, 0xffffffffffffffff, 0xb)
r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3, 0x10}, 0xc)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
r12 = openat$cgroup_ro(r11, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='^\x00')
bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x8, 0x11, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xd53}, [@map_fd, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0x8, 0x91, &(0x7f0000000380)=""/145, 0x41100, 0xc, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x7, 0x9742, 0x6}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f00000004c0)=[r3, r0, r0, r4, r6, r9, r10, r0, r12]}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='block_plug\x00', r1}, 0x10)
r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r13, &(0x7f0000000180), 0x40001)
[ 3228.617078][ T5087] ? create_io_thread+0x1e0/0x1e0
[ 3228.621980][ T5087] ? mutex_unlock+0xb2/0x260
[ 3228.626347][ T5087] ? __mutex_lock_slowpath+0x10/0x10
[ 3228.632076][ T5087] __x64_sys_clone+0x23f/0x290
[ 3228.636675][ T5087] ? __do_sys_vfork+0x130/0x130
[ 3228.641535][ T5087] ? ksys_write+0x260/0x2c0
[ 3228.645970][ T5087] ? debug_smp_processor_id+0x17/0x20
[ 3228.651779][ T5087] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3228.657680][ T5087] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3228.663145][ T5087] do_syscall_64+0x3d/0xb0
[ 3228.667396][ T5087] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3228.673209][ T5087] RIP: 0033:0x7f024b55cae9
[ 3228.677551][ T5087] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3228.696988][ T5087] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3228.705235][ T5087] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
21:54:48 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65)
[ 3228.713309][ T5087] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3228.721488][ T5087] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3228.729547][ T5087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3228.737718][ T5087] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3228.745796][ T5087]
[ 3228.792503][ T5094] FAULT_INJECTION: forcing a failure.
[ 3228.792503][ T5094] name failslab, interval 1, probability 0, space 0, times 0
[ 3228.845958][ T5094] CPU: 1 PID: 5094 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3228.858036][ T5094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3228.868018][ T5094] Call Trace:
[ 3228.871134][ T5094]
[ 3228.873943][ T5094] dump_stack_lvl+0x151/0x1b7
[ 3228.878427][ T5094] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3228.883898][ T5094] dump_stack+0x15/0x17
[ 3228.887887][ T5094] should_fail+0x3c6/0x510
[ 3228.892161][ T5094] __should_failslab+0xa4/0xe0
[ 3228.896827][ T5094] ? anon_vma_clone+0x9a/0x500
[ 3228.901427][ T5094] should_failslab+0x9/0x20
[ 3228.905769][ T5094] slab_pre_alloc_hook+0x37/0xd0
[ 3228.910544][ T5094] ? anon_vma_clone+0x9a/0x500
[ 3228.915138][ T5094] kmem_cache_alloc+0x44/0x200
[ 3228.919741][ T5094] anon_vma_clone+0x9a/0x500
[ 3228.924169][ T5094] anon_vma_fork+0x91/0x4e0
[ 3228.928508][ T5094] ? anon_vma_name+0x43/0x70
[ 3228.932934][ T5094] ? vm_area_dup+0x17a/0x230
[ 3228.937359][ T5094] copy_mm+0xa3a/0x13e0
[ 3228.941355][ T5094] ? copy_signal+0x610/0x610
[ 3228.945782][ T5094] ? __init_rwsem+0xd6/0x1c0
[ 3228.950207][ T5094] ? copy_signal+0x4e3/0x610
[ 3228.954634][ T5094] copy_process+0x12bc/0x3260
[ 3228.959148][ T5094] ? proc_fail_nth_write+0x20b/0x290
[ 3228.964319][ T5094] ? fsnotify_perm+0x6a/0x5d0
[ 3228.968794][ T5094] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3228.973902][ T5094] ? vfs_write+0x9ec/0x1110
[ 3228.978242][ T5094] kernel_clone+0x21e/0x9e0
[ 3228.982671][ T5094] ? file_end_write+0x1c0/0x1c0
[ 3228.987355][ T5094] ? create_io_thread+0x1e0/0x1e0
[ 3228.992751][ T5094] ? mutex_unlock+0xb2/0x260
[ 3228.997161][ T5094] ? __mutex_lock_slowpath+0x10/0x10
[ 3229.002287][ T5094] __x64_sys_clone+0x23f/0x290
[ 3229.006887][ T5094] ? __do_sys_vfork+0x130/0x130
[ 3229.013668][ T5094] ? ksys_write+0x260/0x2c0
[ 3229.018080][ T5094] ? debug_smp_processor_id+0x17/0x20
[ 3229.023629][ T5094] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3229.029529][ T5094] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3229.034996][ T5094] do_syscall_64+0x3d/0xb0
[ 3229.039253][ T5094] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3229.044975][ T5094] RIP: 0033:0x7f024b55cae9
[ 3229.049232][ T5094] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3229.068675][ T5094] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3229.076918][ T5094] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3229.084818][ T5094] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
21:54:49 executing program 3:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12) (async)
write$cgroup_pid(r1, &(0x7f0000000080)=r2, 0x12)
21:54:49 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000080), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000180)=""/111, 0x6f}, {&(0x7f0000000200)=""/132, 0x84}], 0x3, &(0x7f0000000300)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x40000000)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYRES16=r0], 0x18}, 0x0) (async)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES16=r0], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x2, &(0x7f0000000000)=@raw=[@exit, @jmp={0x5, 0x1, 0x8, 0x8, 0xb, 0xc, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x87, &(0x7f00000003c0)=""/135, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_procs(r2, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12) (async)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:54:49 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0xa, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) (async, rerun: 32)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) (rerun: 32)
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001480)={0x0, 0x1, 0x18}, 0xc)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r4, &(0x7f0000000180)}, 0x20) (async)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
syz_clone(0x4000100, &(0x7f0000001680)="9bdadfeebb181c7ae81d4ed78f285f596ef39ca3d9ee0a8ca02b8592488c9d941a4f2ddae7a7403a563b24d646ed9a367667edf7e365e7294ee1d8a990d955a30bc309b63ba489febb", 0x49, &(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)="1f1666a37b7f2fc31869ef6a78c1b5cea28a74366b55d59ef4040d8bd01d146f0ae159c50212b1ba228d1ee8661e0470d8ca3d92761be7a4524046cc12fee29f5263989d67f7d61d8c6bce46467a0ae17a78d39ea41a91fbcc25a408d5392ff9bce70118b0fe2201dd5aaefc1c679bfa51c673bba6") (async, rerun: 32)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20) (async, rerun: 32)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002840)={r4, &(0x7f0000001800)="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", &(0x7f0000002800)=""/26}, 0x20)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r6, &(0x7f0000000180)}, 0x20) (async)
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001500)=@generic={&(0x7f00000014c0)='./file0\x00'}, 0x18)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x1, &(0x7f0000000080)=@raw=[@generic={0x3, 0x2, 0x3, 0x6f96, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x1000, &(0x7f0000000440)=""/4096, 0x41000, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001440)={0x0, 0x9, 0xb8a, 0x85d}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001540)=[r3, r4, r5, r1, r6, r7, r1], &(0x7f0000001580)=[{0x0, 0x1, 0xe, 0xd}], 0x10, 0xd17}, 0x90) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1c, 0x4, 0x8, 0xfff, 0xa, 0x1, 0x8, '\x00', 0x0, r1, 0x4, 0x1, 0x2}, 0x48)
[ 3229.092626][ T5094] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3229.100569][ T5094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3229.108354][ T5094] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3229.116446][ T5094]
21:54:49 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x1, 0x4, 0x6, 0x0, 0x2, 0x1ad00008cfcf8f2a, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x1f, 0xfc}, 0x209, 0x7f, 0x7, 0x8, 0x0, 0x9, 0x5, 0x0, 0xffffc6d9, 0x0, 0xff}, r0, 0xe, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r2)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r2, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30)
21:54:49 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66)
21:54:49 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x7, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800004001000080091b0000", @ANYRES32=0x1, @ANYBLOB="00000000000000511177527dbe155909"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x17, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x100003}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x0, 0x20}, 0x10}, 0x80) (async)
r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x8, 0x1, 0x4, 0x6, 0x0, 0x2a8, 0x21408, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000004, 0xc89ed430c85625d, @perf_config_ext={0xc61a, 0x785a}, 0x2, 0xfffffffffffffff8, 0xfff, 0x0, 0x6, 0x949, 0x2eb, 0x0, 0x2b53, 0x0, 0x1003}, 0x0, 0x2, r2, 0x0)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
openat$cgroup_ro(r3, 0x0, 0x0, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0x43405)
openat$cgroup_ro(r3, &(0x7f0000000640)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) (async)
openat$cgroup_devices(r3, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) (async)
r4 = openat$cgroup_ro(r0, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, r6, 0x9) (async)
r7 = gettid()
perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x6, 0x78, 0xea, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x40003}, 0x0, 0x5, 0xffff, 0x0, 0x0, 0x3, 0x35ef, 0x0, 0xf70, 0x0, 0x9}, r7, 0xa, 0xffffffffffffffff, 0x8) (async)
r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x202, 0x0, 0x0, 0x0, 0x4, 0x773}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, 0xfffffffffffffffc) (async)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x3f, 0xe5, 0x6, 0x3f, 0x0, 0xb0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x8088b, 0x7f, 0x7, 0x2, 0x0, 0x3f, 0x6, 0x0, 0x10001, 0x0, 0xfe}, r7, 0xc, r8, 0xf) (async)
r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async)
perf_event_open(&(0x7f00000000c0)={0x6c8f2d7be4c81520, 0x80, 0x0, 0x2, 0x0, 0x9, 0x0, 0x4, 0x80, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5cc, 0x4, @perf_bp={&(0x7f0000000040), 0xc}, 0x60, 0x0, 0x10000000, 0x7, 0x1, 0x7, 0x0, 0x0, 0xfffffffc}, r7, 0x0, 0xffffffffffffffff, 0xb) (async)
r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3, 0x10}, 0xc) (async)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
r12 = openat$cgroup_ro(r11, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='^\x00') (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x8, 0x11, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xd53}, [@map_fd, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0x8, 0x91, &(0x7f0000000380)=""/145, 0x41100, 0xc, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x7, 0x9742, 0x6}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f00000004c0)=[r3, r0, r0, r4, r6, r9, r10, r0, r12]}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='block_plug\x00', r1}, 0x10)
r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r13, &(0x7f0000000180), 0x40001)
[ 3229.279768][ T5122] FAULT_INJECTION: forcing a failure.
[ 3229.279768][ T5122] name failslab, interval 1, probability 0, space 0, times 0
[ 3229.330314][ T5122] CPU: 0 PID: 5122 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3229.341787][ T5122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3229.351682][ T5122] Call Trace:
[ 3229.354808][ T5122]
[ 3229.357577][ T5122] dump_stack_lvl+0x151/0x1b7
[ 3229.362281][ T5122] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3229.367739][ T5122] dump_stack+0x15/0x17
[ 3229.371726][ T5122] should_fail+0x3c6/0x510
[ 3229.375981][ T5122] __should_failslab+0xa4/0xe0
[ 3229.380585][ T5122] ? vm_area_dup+0x26/0x230
[ 3229.384919][ T5122] should_failslab+0x9/0x20
[ 3229.389274][ T5122] slab_pre_alloc_hook+0x37/0xd0
[ 3229.394034][ T5122] ? vm_area_dup+0x26/0x230
[ 3229.398374][ T5122] kmem_cache_alloc+0x44/0x200
[ 3229.402973][ T5122] vm_area_dup+0x26/0x230
[ 3229.407229][ T5122] copy_mm+0x9a1/0x13e0
[ 3229.411311][ T5122] ? copy_signal+0x610/0x610
[ 3229.415821][ T5122] ? __init_rwsem+0xd6/0x1c0
[ 3229.420246][ T5122] ? copy_signal+0x4e3/0x610
[ 3229.424682][ T5122] copy_process+0x12bc/0x3260
[ 3229.429187][ T5122] ? proc_fail_nth_write+0x20b/0x290
[ 3229.434332][ T5122] ? fsnotify_perm+0x6a/0x5d0
[ 3229.438820][ T5122] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3229.443775][ T5122] ? vfs_write+0x9ec/0x1110
[ 3229.448109][ T5122] kernel_clone+0x21e/0x9e0
[ 3229.452446][ T5122] ? file_end_write+0x1c0/0x1c0
[ 3229.457135][ T5122] ? create_io_thread+0x1e0/0x1e0
[ 3229.461996][ T5122] ? mutex_unlock+0xb2/0x260
[ 3229.466421][ T5122] ? __mutex_lock_slowpath+0x10/0x10
[ 3229.471541][ T5122] __x64_sys_clone+0x23f/0x290
[ 3229.476313][ T5122] ? __do_sys_vfork+0x130/0x130
[ 3229.481001][ T5122] ? ksys_write+0x260/0x2c0
[ 3229.485341][ T5122] ? debug_smp_processor_id+0x17/0x20
[ 3229.490549][ T5122] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3229.496451][ T5122] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3229.501916][ T5122] do_syscall_64+0x3d/0xb0
[ 3229.506344][ T5122] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3229.512072][ T5122] RIP: 0033:0x7f024b55cae9
[ 3229.516414][ T5122] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3229.535854][ T5122] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3229.544101][ T5122] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3229.551913][ T5122] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3229.559724][ T5122] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3229.567621][ T5122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:54:49 executing program 5:
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) (async)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x7, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800004001000080091b0000", @ANYRES32=0x1, @ANYBLOB="00000000000000511177527dbe155909"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x17, '\x00', 0x0, 0x15, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x100003}, 0x8, 0x10, &(0x7f0000000300)={0x1, 0x0, 0x20}, 0x10}, 0x80) (async, rerun: 32)
r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (rerun: 32)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async, rerun: 64)
perf_event_open(&(0x7f0000000700)={0x3, 0x80, 0x8, 0x1, 0x4, 0x6, 0x0, 0x2a8, 0x21408, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x80000004, 0xc89ed430c85625d, @perf_config_ext={0xc61a, 0x785a}, 0x2, 0xfffffffffffffff8, 0xfff, 0x0, 0x6, 0x949, 0x2eb, 0x0, 0x2b53, 0x0, 0x1003}, 0x0, 0x2, r2, 0x0) (rerun: 64)
r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
openat$cgroup_ro(r3, 0x0, 0x0, 0x0)
write$cgroup_int(r3, &(0x7f0000000200), 0x43405) (async)
openat$cgroup_ro(r3, &(0x7f0000000640)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) (async)
openat$cgroup_devices(r3, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) (async)
r4 = openat$cgroup_ro(r0, &(0x7f0000000440)='memory.stat\x00', 0x0, 0x0) (async)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
r6 = openat$cgroup_ro(r5, 0x0, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, r6, 0x9) (async)
r7 = gettid()
perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x6, 0x78, 0xea, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x40003}, 0x0, 0x5, 0xffff, 0x0, 0x0, 0x3, 0x35ef, 0x0, 0xf70, 0x0, 0x9}, r7, 0xa, 0xffffffffffffffff, 0x8) (async, rerun: 64)
r8 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}, 0x0, 0x202, 0x0, 0x0, 0x0, 0x4, 0x773}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, 0xfffffffffffffffc) (async)
perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x3f, 0xe5, 0x6, 0x3f, 0x0, 0xb0, 0x1890a, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000380), 0x2}, 0x8088b, 0x7f, 0x7, 0x2, 0x0, 0x3f, 0x6, 0x0, 0x10001, 0x0, 0xfe}, r7, 0xc, r8, 0xf)
r9 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async)
perf_event_open(&(0x7f00000000c0)={0x6c8f2d7be4c81520, 0x80, 0x0, 0x2, 0x0, 0x9, 0x0, 0x4, 0x80, 0x8, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc5cc, 0x4, @perf_bp={&(0x7f0000000040), 0xc}, 0x60, 0x0, 0x10000000, 0x7, 0x1, 0x7, 0x0, 0x0, 0xfffffffc}, r7, 0x0, 0xffffffffffffffff, 0xb) (async, rerun: 32)
r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000480)={0xffffffffffffffff, 0x3, 0x10}, 0xc) (rerun: 32)
r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700)
r12 = openat$cgroup_ro(r11, 0x0, 0x0, 0x0) (async, rerun: 64)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000005c0)='^\x00') (rerun: 64)
bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x8, 0x11, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xd53}, [@map_fd, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0xa}, @map_idx={0x18, 0x6, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x5}]}, &(0x7f0000000140)='GPL\x00', 0x8, 0x91, &(0x7f0000000380)=""/145, 0x41100, 0xc, '\x00', 0x0, 0xe, r0, 0x8, &(0x7f0000000200)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x7, 0x9742, 0x6}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f00000004c0)=[r3, r0, r0, r4, r6, r9, r10, r0, r12]}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='block_plug\x00', r1}, 0x10) (async)
r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0)
write$cgroup_type(r13, &(0x7f0000000180), 0x40001)
21:54:49 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67)
[ 3229.575431][ T5122] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3229.583335][ T5122]
[ 3229.621868][ T5154] FAULT_INJECTION: forcing a failure.
[ 3229.621868][ T5154] name failslab, interval 1, probability 0, space 0, times 0
[ 3229.695296][ T5154] CPU: 1 PID: 5154 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3229.706767][ T5154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3229.716661][ T5154] Call Trace:
[ 3229.719784][ T5154]
[ 3229.722563][ T5154] dump_stack_lvl+0x151/0x1b7
[ 3229.727271][ T5154] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3229.732816][ T5154] ? avc_denied+0x1b0/0x1b0
[ 3229.737153][ T5154] dump_stack+0x15/0x17
21:54:49 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x1, 0x4, 0x6, 0x0, 0x2, 0x1ad00008cfcf8f2a, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x1f, 0xfc}, 0x209, 0x7f, 0x7, 0x8, 0x0, 0x9, 0x5, 0x0, 0xffffc6d9, 0x0, 0xff}, r0, 0xe, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r2)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r2, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30)
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x1, 0x4, 0x6, 0x0, 0x2, 0x1ad00008cfcf8f2a, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x1f, 0xfc}, 0x209, 0x7f, 0x7, 0x8, 0x0, 0x9, 0x5, 0x0, 0xffffc6d9, 0x0, 0xff}, r0, 0xe, 0xffffffffffffffff, 0x2) (async)
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
close(r2) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r2, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) (async)
[ 3229.741670][ T5154] should_fail+0x3c6/0x510
[ 3229.746006][ T5154] __should_failslab+0xa4/0xe0
[ 3229.750606][ T5154] ? vm_area_dup+0x26/0x230
[ 3229.754942][ T5154] should_failslab+0x9/0x20
[ 3229.759292][ T5154] slab_pre_alloc_hook+0x37/0xd0
[ 3229.764058][ T5154] ? vm_area_dup+0x26/0x230
[ 3229.768484][ T5154] kmem_cache_alloc+0x44/0x200
[ 3229.773085][ T5154] vm_area_dup+0x26/0x230
[ 3229.777250][ T5154] copy_mm+0x9a1/0x13e0
[ 3229.781249][ T5154] ? copy_signal+0x610/0x610
[ 3229.785673][ T5154] ? __init_rwsem+0xd6/0x1c0
[ 3229.790181][ T5154] ? copy_signal+0x4e3/0x610
[ 3229.794607][ T5154] copy_process+0x12bc/0x3260
[ 3229.799117][ T5154] ? proc_fail_nth_write+0x20b/0x290
[ 3229.804368][ T5154] ? fsnotify_perm+0x6a/0x5d0
[ 3229.808869][ T5154] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3229.814028][ T5154] ? vfs_write+0x9ec/0x1110
[ 3229.818329][ T5154] kernel_clone+0x21e/0x9e0
[ 3229.822755][ T5154] ? file_end_write+0x1c0/0x1c0
[ 3229.827452][ T5154] ? create_io_thread+0x1e0/0x1e0
[ 3229.832304][ T5154] ? mutex_unlock+0xb2/0x260
[ 3229.836816][ T5154] ? __mutex_lock_slowpath+0x10/0x10
[ 3229.841933][ T5154] __x64_sys_clone+0x23f/0x290
[ 3229.846620][ T5154] ? __do_sys_vfork+0x130/0x130
[ 3229.851306][ T5154] ? ksys_write+0x260/0x2c0
[ 3229.856514][ T5154] ? debug_smp_processor_id+0x17/0x20
[ 3229.861808][ T5154] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3229.867887][ T5154] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3229.873439][ T5154] do_syscall_64+0x3d/0xb0
[ 3229.877865][ T5154] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3229.883590][ T5154] RIP: 0033:0x7f024b55cae9
[ 3229.887849][ T5154] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3229.907378][ T5154] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3229.915901][ T5154] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3229.924475][ T5154] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3229.932289][ T5154] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
21:54:50 executing program 2:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0xa, 0x4, &(0x7f00000000c0)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x21}]}, &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async)
r3 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001480)={0x0, 0x1, 0x18}, 0xc)
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r4, &(0x7f0000000180)}, 0x20) (async)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
syz_clone(0x4000100, &(0x7f0000001680)="9bdadfeebb181c7ae81d4ed78f285f596ef39ca3d9ee0a8ca02b8592488c9d941a4f2ddae7a7403a563b24d646ed9a367667edf7e365e7294ee1d8a990d955a30bc309b63ba489febb", 0x49, &(0x7f0000001700), &(0x7f0000001740), &(0x7f0000001780)="1f1666a37b7f2fc31869ef6a78c1b5cea28a74366b55d59ef4040d8bd01d146f0ae159c50212b1ba228d1ee8661e0470d8ca3d92761be7a4524046cc12fee29f5263989d67f7d61d8c6bce46467a0ae17a78d39ea41a91fbcc25a408d5392ff9bce70118b0fe2201dd5aaefc1c679bfa51c673bba6")
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r5, &(0x7f0000000180)}, 0x20) (async)
r6 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000002840)={r4, &(0x7f0000001800)="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", &(0x7f0000002800)=""/26}, 0x20) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r6, &(0x7f0000000180)}, 0x20)
r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001500)=@generic={&(0x7f00000014c0)='./file0\x00'}, 0x18)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0x1, &(0x7f0000000080)=@raw=[@generic={0x3, 0x2, 0x3, 0x6f96, 0x3}], &(0x7f0000000100)='syzkaller\x00', 0x101, 0x1000, &(0x7f0000000440)=""/4096, 0x41000, 0x20, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000001440)={0x0, 0x9, 0xb8a, 0x85d}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000001540)=[r3, r4, r5, r1, r6, r7, r1], &(0x7f0000001580)=[{0x0, 0x1, 0xe, 0xd}], 0x10, 0xd17}, 0x90) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1c, 0x4, 0x8, 0xfff, 0xa, 0x1, 0x8, '\x00', 0x0, r1, 0x4, 0x1, 0x2}, 0x48)
21:54:50 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000080), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000180)=""/111, 0x6f}, {&(0x7f0000000200)=""/132, 0x84}], 0x3, &(0x7f0000000300)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x40000000)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES16=r0], 0x18}, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x2, &(0x7f0000000000)=@raw=[@exit, @jmp={0x5, 0x1, 0x8, 0x8, 0xb, 0xc, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x87, &(0x7f00000003c0)=""/135, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_procs(r2, &(0x7f0000000000)='tasks\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r1, &(0x7f0000000340)={&(0x7f0000000080), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/56, 0x38}, {&(0x7f0000000180)=""/111, 0x6f}, {&(0x7f0000000200)=""/132, 0x84}], 0x3, &(0x7f0000000300)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x40000000) (async)
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYRES16=r0], 0x18}, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async)
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) (async)
write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x6, 0x2, &(0x7f0000000000)=@raw=[@exit, @jmp={0x5, 0x1, 0x8, 0x8, 0xb, 0xc, 0x4}], &(0x7f0000000040)='syzkaller\x00', 0x3, 0x87, &(0x7f00000003c0)=""/135, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_procs(r2, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) (async)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12) (async)
[ 3229.940096][ T5154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3229.948286][ T5154] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3229.956496][ T5154]
21:54:50 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.swap.events\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r5 = openat$cgroup_ro(r4, &(0x7f00000001c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000200)='blkio.bfq.sectors\x00', 0x0, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0)
mkdirat$cgroup(r4, &(0x7f00000000c0)='syz0\x00', 0x1ff)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff})
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000780)=[0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10)
sendmsg$inet(r6, &(0x7f0000000700)={&(0x7f0000000280)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10, &(0x7f0000000340)=[{&(0x7f00000002c0)="a5def802eecee4dd8c8bb6c5ade057e1214e55b963381dd36a2f76655417b0f50fbcc7f5f488e059c6e356cbdd81deb532892a8e38e4f682054cc94cd751781648ece30f35b3f91d98825630277df957", 0x50}, {&(0x7f0000000440)="7025f6413425af82693fe38c1e25685216d7ffbc23322602114bc95b4d81ead70aacc374ccf86e0875843aecc927182745e0cea69dca9e02bcd3211ad2d1e42cbbca3aa15af14737c2501dfa59addd3a41135ec01e23b56499ae36c94e2a9347e087940b", 0x64}], 0x2, &(0x7f0000000a80)=[@ip_retopts={{0x50, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xb9, [@private=0xa010100, @rand_addr=0x64010101, @private=0xa010102, @rand_addr=0x64010100, @local, @loopback]}, @timestamp={0x44, 0x18, 0x73, 0x0, 0x2, [0x8, 0xffffff9c, 0x4, 0x1a73, 0x2]}, @ssrr={0x89, 0xb, 0xad, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local]}]}}}, @ip_retopts={{0xc0, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xf5, 0x1, 0x1, [{@empty, 0x3f}, {@rand_addr=0x64010102, 0x1}]}, @end, @lsrr={0x83, 0x7, 0xda, [@dev={0xac, 0x14, 0x14, 0x34}]}, @rr={0x7, 0x23, 0x57, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @dev={0xac, 0x14, 0x14, 0x18}, @local, @local, @private=0xa010100, @multicast1, @loopback]}, @cipso={0x86, 0x43, 0x2, [{0x7, 0x3, "e8"}, {0x5, 0x2}, {0x5, 0xc, "b3e7ef6b95a7bbe7678a"}, {0x2, 0xc, "a15e518377473570e58e"}, {0x1, 0x12, "4ebee5a6bf767760f6755d8978ec1112"}, {0x0, 0xe, "3bcf62388d7a5273b0df7f94"}]}, @rr={0x7, 0x3, 0xd}, @timestamp_addr={0x44, 0x24, 0xb9, 0x1, 0x6, [{@remote, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@multicast1, 0x8000}]}, @generic={0x83, 0x6, "71f64f79"}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x79f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @rand_addr=0x64010101, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @dev={0xac, 0x14, 0x14, 0x2f}, @remote}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x198}, 0x40000080)
21:54:50 executing program 5:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000140)=0x9)
syz_open_procfs$namespace(0x0, 0x0)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
close(0xffffffffffffffff)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x8)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001940)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f00ab1d638ad714b98080372400100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f999355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c931d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1ab9e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2773c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a00"/3606], &(0x7f0000000100)='GPL\x00'}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r2}, 0x10)
socketpair(0x1e, 0x2, 0xa2, &(0x7f0000000040))
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3, 0x0, 0x5, 0xca, 0x0, 0x3, 0xc000, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe8, 0x0, @perf_bp={&(0x7f00000000c0), 0x1c8d35c48fd44c36}, 0x24, 0x2, 0x0, 0x2, 0x8, 0xfffffff7, 0x30, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xc)
r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000006000000100000000000000b040000000000000000000003000000000300000001000000690f0000070000000000000a03000000080000000000000902000000002e3061fd008e97675e64d0033d1a91"], &(0x7f0000001780)=""/198, 0x5a, 0xc6, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0xa, &(0x7f0000000680)=@raw=[@jmp={0x5, 0x0, 0x0, 0x5, 0x6, 0x4}, @ldst={0x1, 0x1, 0x3, 0x6, 0x9, 0x100, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0xa, 0x0, 0xa, 0xfffffffffffffff8, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x7, 0x4, 0xe, 0x2, 0x4}, @alu={0x7, 0x0, 0x3, 0xc, 0x9, 0xfffffffffffffffc, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0x1, 0x9, 0x2, 0x3, 0x4, 0x1}, @call={0x85, 0x0, 0x0, 0x4c}, @generic={0x1, 0x6, 0xc, 0xff, 0x8}], &(0x7f0000000500)='syzkaller\x00', 0x3, 0x87, &(0x7f0000000780)=""/135, 0x40f00, 0x64, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000840)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x10, 0x8b, 0x1}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000008c0)=[r3, 0xffffffffffffffff, r3], &(0x7f0000000900)=[{0x2, 0x5, 0x0, 0xa}, {0x2, 0x2, 0x3, 0xb}, {0x0, 0x2, 0x5, 0xf}, {0x5, 0x1, 0xc, 0x8}, {0x5, 0x4, 0x4, 0x2}, {0x4, 0x3, 0x10, 0x1}, {0x5, 0x2, 0x2, 0x5}, {0x3, 0x3, 0x6, 0x2}], 0x10, 0xffffffe1}, 0x90)
21:54:50 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68)
[ 3230.044098][ T5177] FAULT_INJECTION: forcing a failure.
[ 3230.044098][ T5177] name failslab, interval 1, probability 0, space 0, times 0
[ 3230.069793][ T5177] CPU: 0 PID: 5177 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3230.081261][ T5177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3230.091605][ T5177] Call Trace:
[ 3230.094812][ T5177]
[ 3230.097592][ T5177] dump_stack_lvl+0x151/0x1b7
[ 3230.102105][ T5177] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3230.107575][ T5177] ? avc_denied+0x1b0/0x1b0
[ 3230.111999][ T5177] dump_stack+0x15/0x17
[ 3230.115991][ T5177] should_fail+0x3c6/0x510
[ 3230.120336][ T5177] __should_failslab+0xa4/0xe0
[ 3230.124936][ T5177] ? vm_area_dup+0x26/0x230
[ 3230.129273][ T5177] should_failslab+0x9/0x20
[ 3230.133618][ T5177] slab_pre_alloc_hook+0x37/0xd0
[ 3230.138492][ T5177] ? vm_area_dup+0x26/0x230
[ 3230.142812][ T5177] kmem_cache_alloc+0x44/0x200
[ 3230.147416][ T5177] vm_area_dup+0x26/0x230
[ 3230.151576][ T5177] copy_mm+0x9a1/0x13e0
[ 3230.155573][ T5177] ? copy_signal+0x610/0x610
[ 3230.160082][ T5177] ? __init_rwsem+0xd6/0x1c0
[ 3230.164510][ T5177] ? copy_signal+0x4e3/0x610
[ 3230.168941][ T5177] copy_process+0x12bc/0x3260
[ 3230.174496][ T5177] ? proc_fail_nth_write+0x20b/0x290
[ 3230.179759][ T5177] ? fsnotify_perm+0x6a/0x5d0
[ 3230.184441][ T5177] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3230.189491][ T5177] ? vfs_write+0x9ec/0x1110
[ 3230.193828][ T5177] kernel_clone+0x21e/0x9e0
[ 3230.198254][ T5177] ? file_end_write+0x1c0/0x1c0
[ 3230.202941][ T5177] ? create_io_thread+0x1e0/0x1e0
[ 3230.207815][ T5177] ? mutex_unlock+0xb2/0x260
[ 3230.212357][ T5177] ? __mutex_lock_slowpath+0x10/0x10
[ 3230.217612][ T5177] __x64_sys_clone+0x23f/0x290
[ 3230.222207][ T5177] ? __do_sys_vfork+0x130/0x130
[ 3230.226890][ T5177] ? ksys_write+0x260/0x2c0
[ 3230.231406][ T5177] ? debug_smp_processor_id+0x17/0x20
[ 3230.236705][ T5177] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3230.242600][ T5177] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3230.248079][ T5177] do_syscall_64+0x3d/0xb0
[ 3230.252323][ T5177] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3230.258048][ T5177] RIP: 0033:0x7f024b55cae9
[ 3230.262403][ T5177] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3230.281920][ T5177] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3230.290774][ T5177] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3230.298584][ T5177] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3230.306393][ T5177] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3230.314635][ T5177] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3230.322448][ T5177] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3230.330264][ T5177]
21:54:50 executing program 4:
r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x4, 0x1, 0x4, 0x6, 0x0, 0x2, 0x1ad00008cfcf8f2a, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x1f, 0xfc}, 0x209, 0x7f, 0x7, 0x8, 0x0, 0x9, 0x5, 0x0, 0xffffc6d9, 0x0, 0xff}, r0, 0xe, 0xffffffffffffffff, 0x2)
r1 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r1, 0x0, 0xffffffffffffffff, 0x3) (async)
r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
close(r2) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r1, r2, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30)
21:54:50 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:54:50 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12) (async)
21:54:50 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:54:50 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1400000000880c04d20fd6953a5cb18b0f0aedcd28322d331e400e3dbe8f2e4001869335f7b88c63bce97fff4a13aef2c03f9990a43b38912b31057e8e9ba6e041cc82131ce18e046965ae2589532cc76e8b49ee7a4adecabc0e892a634af90dd777eabc7c3116519a465080b389bdd673635431c500d0eb06bcbffb64072986a85a47334b81fd63e703f887b68b0e2c39478d61bfee7a0e853b828db56ecdc42fb5ce7d6aac964bce375786ed15b56750192697e1529155b104d0637e6e6c", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r4, 0x10f, 0x88, 0x0, 0x0)
recvmsg$unix(r4, &(0x7f00000003c0)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000440)=""/180, 0xb4}], 0x1}, 0x21)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.group_wait_time\x00', 0x0, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
r5 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0)
r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x2a, 0x78, 0x31b7, 0x1, r2, 0x8, '\x00', 0x0, r6, 0x5, 0x3, 0x3, 0xa}, 0x48)
r7 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r7, &(0x7f0000000040), 0x12)
openat$cgroup_ro(r5, &(0x7f0000000200)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
21:54:50 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69)
[ 3230.590485][ T5219] FAULT_INJECTION: forcing a failure.
[ 3230.590485][ T5219] name failslab, interval 1, probability 0, space 0, times 0
21:54:50 executing program 4:
syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3230.631356][ T5219] CPU: 0 PID: 5219 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3230.642854][ T5219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3230.652721][ T5219] Call Trace:
[ 3230.655842][ T5219]
[ 3230.658637][ T5219] dump_stack_lvl+0x151/0x1b7
[ 3230.663744][ T5219] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3230.669234][ T5219] dump_stack+0x15/0x17
[ 3230.673335][ T5219] should_fail+0x3c6/0x510
[ 3230.677587][ T5219] __should_failslab+0xa4/0xe0
[ 3230.682185][ T5219] ? anon_vma_clone+0x9a/0x500
[ 3230.686783][ T5219] should_failslab+0x9/0x20
[ 3230.691208][ T5219] slab_pre_alloc_hook+0x37/0xd0
[ 3230.696167][ T5219] ? anon_vma_clone+0x9a/0x500
[ 3230.700769][ T5219] kmem_cache_alloc+0x44/0x200
[ 3230.705371][ T5219] anon_vma_clone+0x9a/0x500
[ 3230.709792][ T5219] anon_vma_fork+0x91/0x4e0
[ 3230.714227][ T5219] ? anon_vma_name+0x4c/0x70
[ 3230.718746][ T5219] ? vm_area_dup+0x17a/0x230
[ 3230.723508][ T5219] copy_mm+0xa3a/0x13e0
[ 3230.727522][ T5219] ? copy_signal+0x610/0x610
[ 3230.731926][ T5219] ? __init_rwsem+0xd6/0x1c0
[ 3230.736369][ T5219] ? copy_signal+0x4e3/0x610
[ 3230.740880][ T5219] copy_process+0x12bc/0x3260
[ 3230.745662][ T5219] ? proc_fail_nth_write+0x20b/0x290
[ 3230.750771][ T5219] ? fsnotify_perm+0x6a/0x5d0
[ 3230.755461][ T5219] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3230.760841][ T5219] ? vfs_write+0x9ec/0x1110
[ 3230.765181][ T5219] kernel_clone+0x21e/0x9e0
[ 3230.769963][ T5219] ? file_end_write+0x1c0/0x1c0
[ 3230.774729][ T5219] ? create_io_thread+0x1e0/0x1e0
[ 3230.779903][ T5219] ? mutex_unlock+0xb2/0x260
[ 3230.784535][ T5219] ? __mutex_lock_slowpath+0x10/0x10
[ 3230.789745][ T5219] __x64_sys_clone+0x23f/0x290
[ 3230.795914][ T5219] ? __do_sys_vfork+0x130/0x130
[ 3230.801492][ T5219] ? ksys_write+0x260/0x2c0
[ 3230.805978][ T5219] ? debug_smp_processor_id+0x17/0x20
[ 3230.811483][ T5219] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3230.818038][ T5219] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3230.823896][ T5219] do_syscall_64+0x3d/0xb0
21:54:50 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0)
r1 = gettid()
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x69, 0x1, 0x0, 0x8000, 0x84808, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x4, 0xfffffffffffffffa, 0x8001, 0x1, 0x5, 0x7, 0x58f2, 0x0, 0x7a7d, 0x0, 0x7}, r1, 0x4, r0, 0x8)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
syz_clone(0xe5004000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3230.828757][ T5219] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3230.836288][ T5219] RIP: 0033:0x7f024b55cae9
[ 3230.840538][ T5219] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3230.861715][ T5219] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3230.869961][ T5219] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
21:54:50 executing program 5:
bpf$PROG_LOAD(0x5, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000140)=0x9) (async)
syz_open_procfs$namespace(0x0, 0x0) (async)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
close(0xffffffffffffffff) (async)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x8) (async)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001940)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f00ab1d638ad714b98080372400100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f999355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c931d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1ab9e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa165099c5ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2773c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a00"/3606], &(0x7f0000000100)='GPL\x00'}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r2}, 0x10) (async)
socketpair(0x1e, 0x2, 0xa2, &(0x7f0000000040)) (async)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3, 0x0, 0x5, 0xca, 0x0, 0x3, 0xc000, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe8, 0x0, @perf_bp={&(0x7f00000000c0), 0x1c8d35c48fd44c36}, 0x24, 0x2, 0x0, 0x2, 0x8, 0xfffffff7, 0x30, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xc) (async)
r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000006000000100000000000000b040000000000000000000003000000000300000001000000690f0000070000000000000a03000000080000000000000902000000002e3061fd008e97675e64d0033d1a91"], &(0x7f0000001780)=""/198, 0x5a, 0xc6, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0xa, &(0x7f0000000680)=@raw=[@jmp={0x5, 0x0, 0x0, 0x5, 0x6, 0x4}, @ldst={0x1, 0x1, 0x3, 0x6, 0x9, 0x100, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0xa, 0x0, 0xa, 0xfffffffffffffff8, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x7, 0x4, 0xe, 0x2, 0x4}, @alu={0x7, 0x0, 0x3, 0xc, 0x9, 0xfffffffffffffffc, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0x1, 0x9, 0x2, 0x3, 0x4, 0x1}, @call={0x85, 0x0, 0x0, 0x4c}, @generic={0x1, 0x6, 0xc, 0xff, 0x8}], &(0x7f0000000500)='syzkaller\x00', 0x3, 0x87, &(0x7f0000000780)=""/135, 0x40f00, 0x64, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000840)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x10, 0x8b, 0x1}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000008c0)=[r3, 0xffffffffffffffff, r3], &(0x7f0000000900)=[{0x2, 0x5, 0x0, 0xa}, {0x2, 0x2, 0x3, 0xb}, {0x0, 0x2, 0x5, 0xf}, {0x5, 0x1, 0xc, 0x8}, {0x5, 0x4, 0x4, 0x2}, {0x4, 0x3, 0x10, 0x1}, {0x5, 0x2, 0x2, 0x5}, {0x3, 0x3, 0x6, 0x2}], 0x10, 0xffffffe1}, 0x90)
21:54:50 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.swap.events\x00', 0x0, 0x0) (async)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) (async, rerun: 64)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (rerun: 64)
r5 = openat$cgroup_ro(r4, &(0x7f00000001c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000200)='blkio.bfq.sectors\x00', 0x0, 0x0)
openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) (async, rerun: 64)
mkdirat$cgroup(r4, &(0x7f00000000c0)='syz0\x00', 0x1ff) (rerun: 64)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (async, rerun: 64)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000780)=[0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10)
sendmsg$inet(r6, &(0x7f0000000700)={&(0x7f0000000280)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10, &(0x7f0000000340)=[{&(0x7f00000002c0)="a5def802eecee4dd8c8bb6c5ade057e1214e55b963381dd36a2f76655417b0f50fbcc7f5f488e059c6e356cbdd81deb532892a8e38e4f682054cc94cd751781648ece30f35b3f91d98825630277df957", 0x50}, {&(0x7f0000000440)="7025f6413425af82693fe38c1e25685216d7ffbc23322602114bc95b4d81ead70aacc374ccf86e0875843aecc927182745e0cea69dca9e02bcd3211ad2d1e42cbbca3aa15af14737c2501dfa59addd3a41135ec01e23b56499ae36c94e2a9347e087940b", 0x64}], 0x2, &(0x7f0000000a80)=[@ip_retopts={{0x50, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xb9, [@private=0xa010100, @rand_addr=0x64010101, @private=0xa010102, @rand_addr=0x64010100, @local, @loopback]}, @timestamp={0x44, 0x18, 0x73, 0x0, 0x2, [0x8, 0xffffff9c, 0x4, 0x1a73, 0x2]}, @ssrr={0x89, 0xb, 0xad, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local]}]}}}, @ip_retopts={{0xc0, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xf5, 0x1, 0x1, [{@empty, 0x3f}, {@rand_addr=0x64010102, 0x1}]}, @end, @lsrr={0x83, 0x7, 0xda, [@dev={0xac, 0x14, 0x14, 0x34}]}, @rr={0x7, 0x23, 0x57, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @dev={0xac, 0x14, 0x14, 0x18}, @local, @local, @private=0xa010100, @multicast1, @loopback]}, @cipso={0x86, 0x43, 0x2, [{0x7, 0x3, "e8"}, {0x5, 0x2}, {0x5, 0xc, "b3e7ef6b95a7bbe7678a"}, {0x2, 0xc, "a15e518377473570e58e"}, {0x1, 0x12, "4ebee5a6bf767760f6755d8978ec1112"}, {0x0, 0xe, "3bcf62388d7a5273b0df7f94"}]}, @rr={0x7, 0x3, 0xd}, @timestamp_addr={0x44, 0x24, 0xb9, 0x1, 0x6, [{@remote, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@multicast1, 0x8000}]}, @generic={0x83, 0x6, "71f64f79"}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x79f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @rand_addr=0x64010101, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @dev={0xac, 0x14, 0x14, 0x2f}, @remote}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x198}, 0x40000080)
[ 3230.877769][ T5219] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3230.885673][ T5219] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3230.893481][ T5219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3230.901358][ T5219] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3230.909178][ T5219]
21:54:51 executing program 4:
syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:54:51 executing program 5:
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2802, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r1, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r1, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000140)=0x9) (async)
syz_open_procfs$namespace(0x0, 0x0)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async)
close(0xffffffffffffffff) (async)
ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x8) (async)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000001940)=ANY=[@ANYBLOB="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"/3606], &(0x7f0000000100)='GPL\x00'}, 0x48)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r2}, 0x10) (async)
socketpair(0x1e, 0x2, 0xa2, &(0x7f0000000040)) (async)
perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x3, 0x0, 0x5, 0xca, 0x0, 0x3, 0xc000, 0xd, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xe8, 0x0, @perf_bp={&(0x7f00000000c0), 0x1c8d35c48fd44c36}, 0x24, 0x2, 0x0, 0x2, 0x8, 0xfffffff7, 0x30, 0x0, 0x2, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xc) (async)
r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000200), 0x8) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000240)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001900)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000400)=[{}], 0x8, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0x10, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) (async)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000006000000100000000000000b040000000000000000000003000000000300000001000000690f0000070000000000000a03000000080000000000000902000000002e3061fd008e97675e64d0033d1a91"], &(0x7f0000001780)=""/198, 0x5a, 0xc6, 0x1}, 0x20)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x6, 0xa, &(0x7f0000000680)=@raw=[@jmp={0x5, 0x0, 0x0, 0x5, 0x6, 0x4}, @ldst={0x1, 0x1, 0x3, 0x6, 0x9, 0x100, 0xfffffffffffffffc}, @alu={0x7, 0x1, 0xa, 0x0, 0xa, 0xfffffffffffffff8, 0xffffffffffffffff}, @alu={0x7, 0x0, 0x7, 0x4, 0xe, 0x2, 0x4}, @alu={0x7, 0x0, 0x3, 0xc, 0x9, 0xfffffffffffffffc, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @jmp={0x5, 0x1, 0x9, 0x2, 0x3, 0x4, 0x1}, @call={0x85, 0x0, 0x0, 0x4c}, @generic={0x1, 0x6, 0xc, 0xff, 0x8}], &(0x7f0000000500)='syzkaller\x00', 0x3, 0x87, &(0x7f0000000780)=""/135, 0x40f00, 0x64, '\x00', 0x0, 0x25, r4, 0x8, &(0x7f0000000840)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x2, 0x10, 0x8b, 0x1}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000008c0)=[r3, 0xffffffffffffffff, r3], &(0x7f0000000900)=[{0x2, 0x5, 0x0, 0xa}, {0x2, 0x2, 0x3, 0xb}, {0x0, 0x2, 0x5, 0xf}, {0x5, 0x1, 0xc, 0x8}, {0x5, 0x4, 0x4, 0x2}, {0x4, 0x3, 0x10, 0x1}, {0x5, 0x2, 0x2, 0x5}, {0x3, 0x3, 0x6, 0x2}], 0x10, 0xffffffe1}, 0x90)
21:54:51 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70)
21:54:51 executing program 4:
syz_clone(0x80000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:54:51 executing program 4:
syz_clone(0x20000, 0x0, 0xfffffeb6, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x81, 0x9, 0x7f, 0x3, 0x0, 0xffffffff7fffffff, 0x290, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xef7, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x981a, 0x3, 0x4, 0x1, 0x20, 0x3, 0xff, 0x0, 0xf5f, 0x0, 0x200}, 0x0, 0x10, 0xffffffffffffffff, 0x2)
21:54:51 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) (async)
r1 = gettid()
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x69, 0x1, 0x0, 0x8000, 0x84808, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x4, 0xfffffffffffffffa, 0x8001, 0x1, 0x5, 0x7, 0x58f2, 0x0, 0x7a7d, 0x0, 0x7}, r1, 0x4, r0, 0x8)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async)
syz_clone(0xe5004000, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3231.213890][ T5267] FAULT_INJECTION: forcing a failure.
[ 3231.213890][ T5267] name failslab, interval 1, probability 0, space 0, times 0
[ 3231.228622][ T5267] CPU: 0 PID: 5267 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3231.240290][ T5267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3231.250359][ T5267] Call Trace:
[ 3231.253566][ T5267]
[ 3231.256428][ T5267] dump_stack_lvl+0x151/0x1b7
[ 3231.261309][ T5267] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3231.266774][ T5267] dump_stack+0x15/0x17
[ 3231.270764][ T5267] should_fail+0x3c6/0x510
[ 3231.275013][ T5267] __should_failslab+0xa4/0xe0
[ 3231.279617][ T5267] ? anon_vma_clone+0x9a/0x500
[ 3231.284219][ T5267] should_failslab+0x9/0x20
[ 3231.288643][ T5267] slab_pre_alloc_hook+0x37/0xd0
[ 3231.293419][ T5267] ? anon_vma_clone+0x9a/0x500
[ 3231.298102][ T5267] kmem_cache_alloc+0x44/0x200
[ 3231.302702][ T5267] anon_vma_clone+0x9a/0x500
[ 3231.307135][ T5267] anon_vma_fork+0x91/0x4e0
21:54:51 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1400000000880c04d20fd6953a5cb18b0f0aedcd28322d331e400e3dbe8f2e4001869335f7b88c63bce97fff4a13aef2c03f9990a43b38912b31057e8e9ba6e041cc82131ce18e046965ae2589532cc76e8b49ee7a4adecabc0e892a634af90dd777eabc7c3116519a465080b389bdd673635431c500d0eb06bcbffb64072986a85a47334b81fd63e703f887b68b0e2c39478d61bfee7a0e853b828db56ecdc42fb5ce7d6aac964bce375786ed15b56750192697e1529155b104d0637e6e6c", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) (async)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) (async)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r4, 0x10f, 0x88, 0x0, 0x0)
recvmsg$unix(r4, &(0x7f00000003c0)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000440)=""/180, 0xb4}], 0x1}, 0x21)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0) (async)
openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
r5 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) (async)
r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x2a, 0x78, 0x31b7, 0x1, r2, 0x8, '\x00', 0x0, r6, 0x5, 0x3, 0x3, 0xa}, 0x48)
r7 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r7, &(0x7f0000000040), 0x12) (async)
openat$cgroup_ro(r5, &(0x7f0000000200)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
21:54:51 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x2, &(0x7f0000001a40)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0x58c1, 0x10, &(0x7f00000006c0)=""/16, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x0, 0x4, 0x8cf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x90)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002380)={0x18, 0x13, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1893e433d0f7ba61422f00000000040000000000003631000085100000050000009e3e3f00356500021864000002000200000000000800000085100000faffffff181200006916fb604670174fb7c4a1edcfe1cb2b56abe4de5240932f287ae04e3a49f9ab298a4431c01e1c9e25966d73e21caa6e01", @ANYRES32=r0, @ANYBLOB="00000000000000001857e6ff0600000000000000000000001844000002000000000000000000047f1f4800000000007bc600001826000000000000000000000000000000a95fab6071a3bb935bb395a9afdfe44ba22a96cf7f1780d5221749ff90db8997c2fb69a403285ee7b227347131847f61ea0c7fc01f3db20e816709661b8a740d1179be7681f65d4dba1add053a04d7a2603ef78f746fb9da11a52d210f314e667a3e6032e4b608c31493279cd3122cbba890ef3779f94fb920d3b5774fe22672d5c949f76ea72ade2cb7df53e0808189f2525d68389c29531b2399aea6b24df43a6d5848e5c8bd2d9240cbe897f979a7f55d3250301f020c4883f7222334699c496ada7dd200"/281, @ANYBLOB="3236c36a8604c0b4ab93d0daf3c15b8716ee6265fa645d7f3fdb3991629c0eea939297f88703efec0a09e5084ffbfaad7527b38d6809e68c0b6b7c4f8baca99eb9bce640001642b75ec0862daae245bc63f12e5fd6c1f8b17313ba1098a6a0205d387223094d3b43e5c13c44461b7ed7ea2e6ad55c23155048a8dc96981bdfa71d896a4444fe8005e0c5fc29c2977c0052574471b32723aae1924173d7030920372176cdf023795716cc8ecae12331f9da1128046de562931a0a09b1c8276151a5bf5b6f182a3e", @ANYRES32], &(0x7f0000002080)='GPL\x00', 0x7fff, 0x9d, &(0x7f00000020c0)=""/157, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x3, 0xa, 0x6, 0x1fc}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002340)}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000180)}, 0x20)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x9, &(0x7f00000007c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @generic={0x0, 0xd, 0xe, 0x0, 0x2}, @alu={0x7, 0x1, 0xb, 0xa, 0x4, 0xffffffffffffffc0, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x6e}, @map_val={0x18, 0x2, 0x2, 0x0, r3}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @ldst={0x3, 0x2, 0x2, 0x2, 0x4, 0xfffffffffffffff8, 0x8}], &(0x7f0000000480)='syzkaller\x00', 0x6, 0xb4, &(0x7f00000009c0)=""/180, 0x41100, 0x20, '\x00', r4, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000b40)={0x2, 0x2, 0x0, 0x8}, 0x10, 0x14ca, r1, 0x6, 0x0, &(0x7f0000000b80)=[{0x1, 0x4, 0x9, 0x6}, {0x1, 0x5, 0x10, 0x1}, {0x1, 0x3, 0xe, 0x8}, {0x3, 0x4, 0xc, 0x4}, {0x0, 0x2, 0x4, 0xc}, {0x4, 0x3, 0xc, 0x8}], 0x10, 0x5}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10)
r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x100000000, 0x9, 0x4, 0x6, 0x3f2b, 0x0, 0x0, 0x8001, 0x0, 0x10001})
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001f40)={0x0, 0x80, 0x20, 0x8, 0x5, 0xff, 0x0, 0x4, 0x20200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x9d70}, 0x84090, 0x20, 0x5, 0x9, 0x101, 0x1f, 0x401, 0x0, 0x2, 0x0, 0x401})
perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0xff, 0xcd, 0x0, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffc01, 0x2, @perf_config_ext={0x84000001}, 0x84000, 0x1, 0x5bd, 0x3, 0x8000, 0x4, 0x2, 0x0, 0xff, 0x0, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3)
r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040))
openat$cgroup_ro(r6, &(0x7f0000000440)='blkio.throttle.io_serviced\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c80)={0xffffffffffffffff, 0xe0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40), &(0x7f0000001e00), 0x0, 0x8, &(0x7f0000001e00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000001ac0), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
21:54:51 executing program 4:
syz_clone(0x20000, 0x0, 0xfffffeb6, 0x0, 0x0, 0x0) (async, rerun: 32)
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x81, 0x9, 0x7f, 0x3, 0x0, 0xffffffff7fffffff, 0x290, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xef7, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x981a, 0x3, 0x4, 0x1, 0x20, 0x3, 0xff, 0x0, 0xf5f, 0x0, 0x200}, 0x0, 0x10, 0xffffffffffffffff, 0x2) (rerun: 32)
[ 3231.311556][ T5267] ? anon_vma_name+0x43/0x70
[ 3231.315979][ T5267] ? vm_area_dup+0x17a/0x230
[ 3231.320407][ T5267] copy_mm+0xa3a/0x13e0
[ 3231.324405][ T5267] ? copy_signal+0x610/0x610
[ 3231.328825][ T5267] ? __init_rwsem+0xd6/0x1c0
[ 3231.333255][ T5267] ? copy_signal+0x4e3/0x610
[ 3231.337771][ T5267] copy_process+0x12bc/0x3260
[ 3231.342282][ T5267] ? proc_fail_nth_write+0x20b/0x290
[ 3231.347586][ T5267] ? fsnotify_perm+0x6a/0x5d0
[ 3231.352096][ T5267] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3231.357070][ T5267] ? vfs_write+0x9ec/0x1110
[ 3231.361469][ T5267] kernel_clone+0x21e/0x9e0
[ 3231.365806][ T5267] ? file_end_write+0x1c0/0x1c0
[ 3231.370586][ T5267] ? create_io_thread+0x1e0/0x1e0
[ 3231.375528][ T5267] ? mutex_unlock+0xb2/0x260
[ 3231.380029][ T5267] ? __mutex_lock_slowpath+0x10/0x10
[ 3231.385078][ T5267] __x64_sys_clone+0x23f/0x290
[ 3231.389681][ T5267] ? __do_sys_vfork+0x130/0x130
[ 3231.394367][ T5267] ? ksys_write+0x260/0x2c0
[ 3231.398707][ T5267] ? debug_smp_processor_id+0x17/0x20
[ 3231.403998][ T5267] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3231.409929][ T5267] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3231.415377][ T5267] do_syscall_64+0x3d/0xb0
[ 3231.419711][ T5267] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3231.425436][ T5267] RIP: 0033:0x7f024b55cae9
[ 3231.429690][ T5267] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3231.449407][ T5267] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:54:51 executing program 2:
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x401c5820, 0x0) (async, rerun: 32)
r1 = gettid() (rerun: 32)
perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x69, 0x1, 0x0, 0x8000, 0x84808, 0x9, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000000), 0x4}, 0x4, 0xfffffffffffffffa, 0x8001, 0x1, 0x5, 0x7, 0x58f2, 0x0, 0x7a7d, 0x0, 0x7}, r1, 0x4, r0, 0x8)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async)
syz_clone(0xe5004000, 0x0, 0x0, 0x0, 0x0, 0x0)
21:54:51 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71)
[ 3231.457654][ T5267] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3231.465463][ T5267] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3231.473270][ T5267] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3231.481167][ T5267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3231.488982][ T5267] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3231.496880][ T5267]
[ 3231.545687][ T5292] FAULT_INJECTION: forcing a failure.
[ 3231.545687][ T5292] name failslab, interval 1, probability 0, space 0, times 0
[ 3231.616405][ T5292] CPU: 0 PID: 5292 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3231.628056][ T5292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3231.637955][ T5292] Call Trace:
[ 3231.641076][ T5292]
[ 3231.643871][ T5292] dump_stack_lvl+0x151/0x1b7
[ 3231.648375][ T5292] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3231.653923][ T5292] dump_stack+0x15/0x17
[ 3231.657914][ T5292] should_fail+0x3c6/0x510
[ 3231.662171][ T5292] __should_failslab+0xa4/0xe0
[ 3231.666765][ T5292] ? anon_vma_fork+0xf7/0x4e0
[ 3231.671452][ T5292] should_failslab+0x9/0x20
[ 3231.675793][ T5292] slab_pre_alloc_hook+0x37/0xd0
[ 3231.680743][ T5292] ? anon_vma_fork+0xf7/0x4e0
[ 3231.685514][ T5292] kmem_cache_alloc+0x44/0x200
[ 3231.690120][ T5292] anon_vma_fork+0xf7/0x4e0
[ 3231.694460][ T5292] ? anon_vma_name+0x43/0x70
[ 3231.699142][ T5292] ? vm_area_dup+0x17a/0x230
[ 3231.703917][ T5292] copy_mm+0xa3a/0x13e0
[ 3231.708092][ T5292] ? copy_signal+0x610/0x610
[ 3231.713029][ T5292] ? __init_rwsem+0xd6/0x1c0
[ 3231.717892][ T5292] ? copy_signal+0x4e3/0x610
[ 3231.722323][ T5292] copy_process+0x12bc/0x3260
[ 3231.726836][ T5292] ? proc_fail_nth_write+0x20b/0x290
[ 3231.732041][ T5292] ? fsnotify_perm+0x6a/0x5d0
[ 3231.736728][ T5292] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3231.741721][ T5292] ? vfs_write+0x9ec/0x1110
[ 3231.746016][ T5292] kernel_clone+0x21e/0x9e0
[ 3231.750957][ T5292] ? file_end_write+0x1c0/0x1c0
[ 3231.756087][ T5292] ? create_io_thread+0x1e0/0x1e0
[ 3231.760941][ T5292] ? mutex_unlock+0xb2/0x260
21:54:51 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async, rerun: 32)
r2 = openat$cgroup_ro(r0, &(0x7f0000000180)='memory.swap.events\x00', 0x0, 0x0) (async, rerun: 32)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff})
recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef) (async, rerun: 64)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async, rerun: 64)
r5 = openat$cgroup_ro(r4, &(0x7f00000001c0)='blkio.bfq.io_service_time_recursive\x00', 0x0, 0x0)
openat$cgroup_ro(r5, &(0x7f0000000200)='blkio.bfq.sectors\x00', 0x0, 0x0) (async)
openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) (async, rerun: 64)
mkdirat$cgroup(r4, &(0x7f00000000c0)='syz0\x00', 0x1ff) (async, rerun: 64)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff})
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r5, 0x58, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a40)={r2, 0xe0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000780)=[0x0, 0x0], &(0x7f00000007c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000880), &(0x7f00000008c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000900)}}, 0x10)
sendmsg$inet(r6, &(0x7f0000000700)={&(0x7f0000000280)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10, &(0x7f0000000340)=[{&(0x7f00000002c0)="a5def802eecee4dd8c8bb6c5ade057e1214e55b963381dd36a2f76655417b0f50fbcc7f5f488e059c6e356cbdd81deb532892a8e38e4f682054cc94cd751781648ece30f35b3f91d98825630277df957", 0x50}, {&(0x7f0000000440)="7025f6413425af82693fe38c1e25685216d7ffbc23322602114bc95b4d81ead70aacc374ccf86e0875843aecc927182745e0cea69dca9e02bcd3211ad2d1e42cbbca3aa15af14737c2501dfa59addd3a41135ec01e23b56499ae36c94e2a9347e087940b", 0x64}], 0x2, &(0x7f0000000a80)=[@ip_retopts={{0x50, 0x0, 0x7, {[@lsrr={0x83, 0x1b, 0xb9, [@private=0xa010100, @rand_addr=0x64010101, @private=0xa010102, @rand_addr=0x64010100, @local, @loopback]}, @timestamp={0x44, 0x18, 0x73, 0x0, 0x2, [0x8, 0xffffff9c, 0x4, 0x1a73, 0x2]}, @ssrr={0x89, 0xb, 0xad, [@initdev={0xac, 0x1e, 0x0, 0x0}, @local]}]}}}, @ip_retopts={{0xc0, 0x0, 0x7, {[@timestamp_addr={0x44, 0x14, 0xf5, 0x1, 0x1, [{@empty, 0x3f}, {@rand_addr=0x64010102, 0x1}]}, @end, @lsrr={0x83, 0x7, 0xda, [@dev={0xac, 0x14, 0x14, 0x34}]}, @rr={0x7, 0x23, 0x57, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @dev={0xac, 0x14, 0x14, 0x18}, @local, @local, @private=0xa010100, @multicast1, @loopback]}, @cipso={0x86, 0x43, 0x2, [{0x7, 0x3, "e8"}, {0x5, 0x2}, {0x5, 0xc, "b3e7ef6b95a7bbe7678a"}, {0x2, 0xc, "a15e518377473570e58e"}, {0x1, 0x12, "4ebee5a6bf767760f6755d8978ec1112"}, {0x0, 0xe, "3bcf62388d7a5273b0df7f94"}]}, @rr={0x7, 0x3, 0xd}, @timestamp_addr={0x44, 0x24, 0xb9, 0x1, 0x6, [{@remote, 0x9}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x9}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4}, {@multicast1, 0x8000}]}, @generic={0x83, 0x6, "71f64f79"}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x79f}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @rand_addr=0x64010101, @remote}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @dev={0xac, 0x14, 0x14, 0x2f}, @remote}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x198}, 0x40000080)
[ 3231.765366][ T5292] ? __mutex_lock_slowpath+0x10/0x10
[ 3231.771008][ T5292] __x64_sys_clone+0x23f/0x290
[ 3231.775606][ T5292] ? __do_sys_vfork+0x130/0x130
[ 3231.780463][ T5292] ? ksys_write+0x260/0x2c0
[ 3231.784807][ T5292] ? debug_smp_processor_id+0x17/0x20
[ 3231.790197][ T5292] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3231.796101][ T5292] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3231.801571][ T5292] do_syscall_64+0x3d/0xb0
[ 3231.805997][ T5292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3231.811732][ T5292] RIP: 0033:0x7f024b55cae9
[ 3231.815975][ T5292] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3231.835417][ T5292] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3231.843660][ T5292] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3231.851494][ T5292] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3231.859281][ T5292] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3231.867094][ T5292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3231.874907][ T5292] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3231.882740][ T5292]
21:54:51 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x8)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000100), 0x10)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x0, 0x3, 0x40, 0x0, 0x1, 0x6401, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x6c, 0x6, 0x6, 0x7fffffffffffffff, 0x4800000, 0xfffe, 0x0, 0x6, 0x0, 0x3}, r2, 0x5, r3, 0x3)
21:54:52 executing program 2:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.group_wait_time\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040))
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r1 = getpid()
perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x80, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x600, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xb61a, 0x13e}, 0x400, 0x244, 0x3, 0x0, 0x0, 0x9, 0x4, 0x0, 0x4, 0x0, 0x8}, r1, 0xa, 0xffffffffffffffff, 0x0)
getpid()
r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0xffff, 0x0, 0x200, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1000001, 0x4, 0xd}, 0x48)
r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES32], 0x0, 0xcb, 0x0, 0xfffffffd}, 0x20)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x1, 0x812, 0xffffffffffffffff, 0x400, '\x00', 0x0, r3, 0x3, 0x1, 0x3, 0xa}, 0x48)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
socketpair(0x1, 0x2, 0x0, &(0x7f0000000140))
perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0xff, 0x80, 0x1f, 0x7, 0x0, 0xfffffffffffffffe, 0x100, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1002, 0x8, 0x2000000, 0x5, 0xfffffffffffc0000, 0x0, 0x0, 0x0, 0x5}, r1, 0xa, r2, 0x8)
r5 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x8, &(0x7f0000000840)=ANY=[@ANYBLOB="32c272eb180000006d7400080000000001000000184b0000fd070000010075e0562800009d5200000000388c5e5d4ba8d68f667b0018230000", @ANYRES32, @ANYBLOB="00000000090000009500000044b4cdae"], &(0x7f0000000480)='GPL\x00', 0x40, 0x31, &(0x7f00000004c0)=""/49, 0x41100, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x1, 0x4, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80)
perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x1, 0x6, 0x0, 0x40, 0x0, 0xb6d8, 0x4, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd436, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x86000, 0x5, 0x3, 0x0, 0x7, 0x2, 0xffc0, 0x0, 0x3, 0x0, 0x5890}, 0x0, 0xa, 0xffffffffffffffff, 0x2)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x4, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000b629d48440f0d50c15b0100010104000000000000000000000000000085c9953763124908b33ff8fb3e45fe93a8b62dfd936c2e9c9b6924629eb3ecd42a2caed96e44adf62cf9cba28795a7b0b3429efa457f7814d96f9ecf732d1a010c1b5be8dc39eae529150ba758a0c7e43e6fe7c94dbdd8d38b6eb590d28a90de3be948627890b47d0911"], &(0x7f0000000500)='syzkaller\x00', 0x200, 0xbb, &(0x7f0000000a80)=""/187, 0x403e6dd0f9c515f7, 0x3, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000600)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x9, 0x400, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, r6, 0xffffffffffffffff, r4]}, 0x80)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)=0x200)
perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x0, 0xb5, 0x2, 0x0, 0x0, 0x7, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000380)}, 0x200, 0x200000877a, 0x0, 0x3, 0x1, 0x7fff, 0x1ff, 0x0, 0x8}, 0x0, 0xf, r5, 0x0)
getpid()
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0)
perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x3, 0xfd, 0x3, 0x1, 0x0, 0x9, 0x20, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x2, @perf_config_ext={0x3ff, 0xfffffffffffffffa}, 0x8c8, 0x0, 0xf, 0x7, 0x5, 0x7, 0x9, 0x0, 0xfffff0be, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1)
perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x1c, 0x8, 0x4, 0x0, 0x0, 0x2010e, 0x7fa78d00459f32fd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x2}, 0x8, 0x6, 0x4, 0x6, 0xfffffffffffff16f, 0xd8, 0x1, 0x0, 0xfffffffa, 0x0, 0xffffffffffffff80}, 0x0, 0xf, 0xffffffffffffffff, 0x0)
socketpair(0x1, 0x2, 0x0, &(0x7f0000000000))
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
[ 3231.988263][ T5292] ==================================================================
[ 3231.996508][ T5292] BUG: KASAN: use-after-free in vm_area_free_no_check+0x7e/0x130
[ 3232.004578][ T5292] Write of size 4 at addr ffff8881728b7be8 by task syz-executor.1/5292
[ 3232.012647][ T5292]
[ 3232.014825][ T5292] CPU: 0 PID: 5292 Comm: syz-executor.1 Tainted: G W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3232.026379][ T5292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3232.036257][ T5292] Call Trace:
[ 3232.039377][ T5292]
[ 3232.042154][ T5292] dump_stack_lvl+0x151/0x1b7
[ 3232.046665][ T5292] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3232.052133][ T5292] ? panic+0x751/0x751
[ 3232.056036][ T5292] ? slab_free_freelist_hook+0xbd/0x190
[ 3232.061422][ T5292] print_address_description+0x87/0x3b0
[ 3232.066900][ T5292] kasan_report+0x179/0x1c0
[ 3232.071241][ T5292] ? vm_area_free_no_check+0x7e/0x130
[ 3232.076457][ T5292] ? vm_area_free_no_check+0x7e/0x130
[ 3232.081654][ T5292] kasan_check_range+0x293/0x2a0
[ 3232.086460][ T5292] __kasan_check_write+0x14/0x20
[ 3232.091467][ T5292] vm_area_free_no_check+0x7e/0x130
[ 3232.096507][ T5292] copy_mm+0xefb/0x13e0
[ 3232.100492][ T5292] ? copy_signal+0x610/0x610
[ 3232.104913][ T5292] ? __init_rwsem+0xd6/0x1c0
[ 3232.109461][ T5292] ? copy_signal+0x4e3/0x610
[ 3232.113866][ T5292] copy_process+0x12bc/0x3260
[ 3232.118657][ T5292] ? proc_fail_nth_write+0x20b/0x290
[ 3232.124123][ T5292] ? fsnotify_perm+0x6a/0x5d0
[ 3232.128638][ T5292] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3232.133583][ T5292] ? vfs_write+0x9ec/0x1110
[ 3232.137925][ T5292] kernel_clone+0x21e/0x9e0
[ 3232.142260][ T5292] ? file_end_write+0x1c0/0x1c0
[ 3232.146953][ T5292] ? create_io_thread+0x1e0/0x1e0
[ 3232.151806][ T5292] ? mutex_unlock+0xb2/0x260
[ 3232.156241][ T5292] ? __mutex_lock_slowpath+0x10/0x10
[ 3232.161359][ T5292] __x64_sys_clone+0x23f/0x290
[ 3232.165960][ T5292] ? __do_sys_vfork+0x130/0x130
[ 3232.170642][ T5292] ? ksys_write+0x260/0x2c0
[ 3232.175421][ T5292] ? debug_smp_processor_id+0x17/0x20
[ 3232.180629][ T5292] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3232.186528][ T5292] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3232.191995][ T5292] do_syscall_64+0x3d/0xb0
[ 3232.196601][ T5292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3232.202325][ T5292] RIP: 0033:0x7f024b55cae9
[ 3232.206579][ T5292] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3232.226279][ T5292] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3232.234523][ T5292] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3232.242346][ T5292] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3232.251915][ T5292] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3232.260517][ T5292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3232.268459][ T5292] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3232.278011][ T5292]
[ 3232.280874][ T5292]
[ 3232.283171][ T5292] Allocated by task 5267:
[ 3232.287632][ T5292] __kasan_slab_alloc+0xb1/0xe0
[ 3232.292336][ T5292] slab_post_alloc_hook+0x53/0x2c0
[ 3232.300738][ T5292] kmem_cache_alloc+0xf5/0x200
[ 3232.305341][ T5292] vm_area_dup+0x26/0x230
[ 3232.309588][ T5292] copy_mm+0x9a1/0x13e0
[ 3232.313586][ T5292] copy_process+0x12bc/0x3260
[ 3232.318182][ T5292] kernel_clone+0x21e/0x9e0
[ 3232.322527][ T5292] __x64_sys_clone+0x23f/0x290
[ 3232.327125][ T5292] do_syscall_64+0x3d/0xb0
[ 3232.331371][ T5292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3232.337187][ T5292]
[ 3232.339444][ T5292] Freed by task 285:
[ 3232.343262][ T5292] kasan_set_track+0x4b/0x70
[ 3232.348216][ T5292] kasan_set_free_info+0x23/0x40
[ 3232.352982][ T5292] ____kasan_slab_free+0x126/0x160
[ 3232.357932][ T5292] __kasan_slab_free+0x11/0x20
[ 3232.362532][ T5292] slab_free_freelist_hook+0xbd/0x190
[ 3232.367753][ T5292] kmem_cache_free+0x116/0x2e0
[ 3232.372337][ T5292] __free_vm_area_struct+0x1c/0x20
[ 3232.377510][ T5292] rcu_do_batch+0x57a/0xc10
[ 3232.381915][ T5292] rcu_core+0x517/0x1020
[ 3232.385997][ T5292] rcu_core_si+0x9/0x10
[ 3232.389989][ T5292] __do_softirq+0x26d/0x5bf
[ 3232.394328][ T5292]
[ 3232.396500][ T5292] Last potentially related work creation:
[ 3232.402050][ T5292] kasan_save_stack+0x3b/0x60
[ 3232.406651][ T5292] __kasan_record_aux_stack+0xd3/0xf0
[ 3232.412466][ T5292] kasan_record_aux_stack_noalloc+0xb/0x10
[ 3232.418888][ T5292] call_rcu+0x133/0x12a0
[ 3232.422972][ T5292] vm_area_free_no_check+0xff/0x130
[ 3232.428090][ T5292] vm_area_free+0x53/0x60
[ 3232.432256][ T5292] exit_mmap+0x50d/0x6f0
[ 3232.436509][ T5292] __mmput+0x95/0x310
[ 3232.440328][ T5292] mmput+0x5b/0x170
[ 3232.444146][ T5292] do_exit+0xbb4/0x2b60
[ 3232.448152][ T5292] __ia32_sys_exit+0x0/0x40
[ 3232.452505][ T5292] do_syscall_64+0x3d/0xb0
[ 3232.457089][ T5292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3232.462804][ T5292]
[ 3232.464998][ T5292] Second to last potentially related work creation:
[ 3232.471400][ T5292] kasan_save_stack+0x3b/0x60
[ 3232.475912][ T5292] __kasan_record_aux_stack+0xd3/0xf0
[ 3232.481120][ T5292] kasan_record_aux_stack_noalloc+0xb/0x10
[ 3232.487475][ T5292] call_rcu+0x133/0x12a0
[ 3232.491536][ T5292] vm_area_free_no_check+0xff/0x130
[ 3232.496569][ T5292] vm_area_free+0x53/0x60
[ 3232.500736][ T5292] exit_mmap+0x50d/0x6f0
[ 3232.504815][ T5292] __mmput+0x95/0x310
[ 3232.509098][ T5292] mmput+0x5b/0x170
[ 3232.513801][ T5292] copy_process+0x2766/0x3260
[ 3232.518300][ T5292] kernel_clone+0x21e/0x9e0
[ 3232.522737][ T5292] __x64_sys_clone+0x23f/0x290
[ 3232.527327][ T5292] do_syscall_64+0x3d/0xb0
[ 3232.531926][ T5292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3232.537664][ T5292]
[ 3232.539824][ T5292] The buggy address belongs to the object at ffff8881728b7b90
[ 3232.539824][ T5292] which belongs to the cache vm_area_struct of size 232
[ 3232.554496][ T5292] The buggy address is located 88 bytes inside of
[ 3232.554496][ T5292] 232-byte region [ffff8881728b7b90, ffff8881728b7c78)
[ 3232.567514][ T5292] The buggy address belongs to the page:
[ 3232.572983][ T5292] page:ffffea0005ca2dc0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1728b7
[ 3232.583051][ T5292] flags: 0x4000000000000200(slab|zone=1)
[ 3232.588615][ T5292] raw: 4000000000000200 ffffea00044fb3c0 0000000400000004 ffff8881001bd500
[ 3232.597117][ T5292] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000
[ 3232.605532][ T5292] page dumped because: kasan: bad access detected
[ 3232.612308][ T5292] page_owner tracks the page as allocated
[ 3232.617948][ T5292] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 4369, ts 3211461225748, free_ts 3211458294502
[ 3232.635319][ T5292] post_alloc_hook+0x1a3/0x1b0
[ 3232.640177][ T5292] prep_new_page+0x1b/0x110
[ 3232.645360][ T5292] get_page_from_freelist+0x3550/0x35d0
[ 3232.651149][ T5292] __alloc_pages+0x206/0x5e0
[ 3232.655574][ T5292] new_slab+0x9a/0x4e0
[ 3232.659569][ T5292] ___slab_alloc+0x39e/0x830
[ 3232.663992][ T5292] __slab_alloc+0x4a/0x90
[ 3232.668162][ T5292] kmem_cache_alloc+0x134/0x200
[ 3232.672843][ T5292] vm_area_dup+0x26/0x230
[ 3232.677270][ T5292] copy_mm+0x9a1/0x13e0
[ 3232.681353][ T5292] copy_process+0x12bc/0x3260
[ 3232.685962][ T5292] kernel_clone+0x21e/0x9e0
[ 3232.690466][ T5292] __x64_sys_clone+0x23f/0x290
[ 3232.696032][ T5292] do_syscall_64+0x3d/0xb0
[ 3232.700296][ T5292] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3232.706093][ T5292] page last free stack trace:
[ 3232.710693][ T5292] free_unref_page_prepare+0x7c8/0x7d0
[ 3232.715981][ T5292] free_unref_page_list+0x14b/0xa60
[ 3232.721293][ T5292] release_pages+0x1310/0x1370
[ 3232.726486][ T5292] free_pages_and_swap_cache+0x8a/0xa0
[ 3232.731775][ T5292] tlb_finish_mmu+0x177/0x320
[ 3232.736306][ T5292] exit_mmap+0x3ef/0x6f0
[ 3232.740546][ T5292] __mmput+0x95/0x310
[ 3232.745073][ T5292] mmput+0x5b/0x170
[ 3232.748700][ T5292] do_exit+0xbb4/0x2b60
[ 3232.752695][ T5292] do_group_exit+0x141/0x310
[ 3232.757138][ T5292] get_signal+0x7a3/0x1630
[ 3232.761376][ T5292] arch_do_signal_or_restart+0xbd/0x1680
[ 3232.768583][ T5292] exit_to_user_mode_loop+0xa0/0xe0
[ 3232.773620][ T5292] exit_to_user_mode_prepare+0x5a/0xa0
[ 3232.778999][ T5292] syscall_exit_to_user_mode+0x26/0x160
[ 3232.784375][ T5292] do_syscall_64+0x49/0xb0
[ 3232.788632][ T5292]
[ 3232.790797][ T5292] Memory state around the buggy address:
[ 3232.796276][ T5292] ffff8881728b7a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 3232.804525][ T5292] ffff8881728b7b00: fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc
[ 3232.812435][ T5292] >ffff8881728b7b80: fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 3232.820349][ T5292] ^
[ 3232.827617][ T5292] ffff8881728b7c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc
21:54:52 executing program 0:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1400000000880c04d20fd6953a5cb18b0f0aedcd28322d331e400e3dbe8f2e4001869335f7b88c63bce97fff4a13aef2c03f9990a43b38912b31057e8e9ba6e041cc82131ce18e046965ae2589532cc76e8b49ee7a4adecabc0e892a634af90dd777eabc7c3116519a465080b389bdd673635431c500d0eb06bcbffb64072986a85a47334b81fd63e703f887b68b0e2c39478d61bfee7a0e853b828db56ecdc42fb5ce7d6aac964bce375786ed15b56750192697e1529155b104d0637e6e6c", @ANYRES32=0xffffffffffffffff, @ANYBLOB='\x00\x00\x00\x00'], 0x18}, 0x0) (async)
r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00', 0x200002, 0x0) (async)
socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0})
setsockopt$sock_attach_bpf(r4, 0x10f, 0x88, 0x0, 0x0) (async)
recvmsg$unix(r4, &(0x7f00000003c0)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000440)=""/180, 0xb4}], 0x1}, 0x21)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000280)='blkio.bfq.group_wait_time\x00', 0x0, 0x0) (async)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (async)
r5 = openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_procs(r2, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0)
r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4)
bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x2a, 0x78, 0x31b7, 0x1, r2, 0x8, '\x00', 0x0, r6, 0x5, 0x3, 0x3, 0xa}, 0x48) (async)
r7 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r7, &(0x7f0000000040), 0x12) (async)
openat$cgroup_ro(r5, &(0x7f0000000200)='blkio.bfq.time_recursive\x00', 0x0, 0x0)
21:54:52 executing program 4:
syz_clone(0x20000, 0x0, 0xfffffeb6, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x81, 0x9, 0x7f, 0x3, 0x0, 0xffffffff7fffffff, 0x290, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xef7, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x981a, 0x3, 0x4, 0x1, 0x20, 0x3, 0xff, 0x0, 0xf5f, 0x0, 0x200}, 0x0, 0x10, 0xffffffffffffffff, 0x2)
syz_clone(0x20000, 0x0, 0xfffffeb6, 0x0, 0x0, 0x0) (async)
perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x81, 0x9, 0x7f, 0x3, 0x0, 0xffffffff7fffffff, 0x290, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xef7, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x981a, 0x3, 0x4, 0x1, 0x20, 0x3, 0xff, 0x0, 0xf5f, 0x0, 0x200}, 0x0, 0x10, 0xffffffffffffffff, 0x2) (async)
21:54:52 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72)
[ 3232.835686][ T5292] ffff8881728b7c80: fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb fb
[ 3232.844274][ T5292] ==================================================================
[ 3232.852174][ T5292] Disabling lock debugging due to kernel taint
21:54:53 executing program 2:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.group_wait_time\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) (async, rerun: 32)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
r1 = getpid()
perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x80, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x600, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xb61a, 0x13e}, 0x400, 0x244, 0x3, 0x0, 0x0, 0x9, 0x4, 0x0, 0x4, 0x0, 0x8}, r1, 0xa, 0xffffffffffffffff, 0x0)
getpid()
r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0xffff, 0x0, 0x200, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1000001, 0x4, 0xd}, 0x48) (async)
r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES32], 0x0, 0xcb, 0x0, 0xfffffffd}, 0x20)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x1, 0x812, 0xffffffffffffffff, 0x400, '\x00', 0x0, r3, 0x3, 0x1, 0x3, 0xa}, 0x48) (async)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) (async)
socketpair(0x1, 0x2, 0x0, &(0x7f0000000140)) (async)
perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0xff, 0x80, 0x1f, 0x7, 0x0, 0xfffffffffffffffe, 0x100, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1002, 0x8, 0x2000000, 0x5, 0xfffffffffffc0000, 0x0, 0x0, 0x0, 0x5}, r1, 0xa, r2, 0x8) (async)
r5 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x8, &(0x7f0000000840)=ANY=[@ANYBLOB="32c272eb180000006d7400080000000001000000184b0000fd070000010075e0562800009d5200000000388c5e5d4ba8d68f667b0018230000", @ANYRES32, @ANYBLOB="00000000090000009500000044b4cdae"], &(0x7f0000000480)='GPL\x00', 0x40, 0x31, &(0x7f00000004c0)=""/49, 0x41100, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x1, 0x4, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async, rerun: 64)
perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x1, 0x6, 0x0, 0x40, 0x0, 0xb6d8, 0x4, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd436, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x86000, 0x5, 0x3, 0x0, 0x7, 0x2, 0xffc0, 0x0, 0x3, 0x0, 0x5890}, 0x0, 0xa, 0xffffffffffffffff, 0x2)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x4, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000b629d48440f0d50c15b0100010104000000000000000000000000000085c9953763124908b33ff8fb3e45fe93a8b62dfd936c2e9c9b6924629eb3ecd42a2caed96e44adf62cf9cba28795a7b0b3429efa457f7814d96f9ecf732d1a010c1b5be8dc39eae529150ba758a0c7e43e6fe7c94dbdd8d38b6eb590d28a90de3be948627890b47d0911"], &(0x7f0000000500)='syzkaller\x00', 0x200, 0xbb, &(0x7f0000000a80)=""/187, 0x403e6dd0f9c515f7, 0x3, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000600)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x9, 0x400, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, r6, 0xffffffffffffffff, r4]}, 0x80) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)=0x200) (async)
perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x0, 0xb5, 0x2, 0x0, 0x0, 0x7, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000380)}, 0x200, 0x200000877a, 0x0, 0x3, 0x1, 0x7fff, 0x1ff, 0x0, 0x8}, 0x0, 0xf, r5, 0x0) (async)
getpid() (async, rerun: 64)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) (async, rerun: 64)
perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x3, 0xfd, 0x3, 0x1, 0x0, 0x9, 0x20, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x2, @perf_config_ext={0x3ff, 0xfffffffffffffffa}, 0x8c8, 0x0, 0xf, 0x7, 0x5, 0x7, 0x9, 0x0, 0xfffff0be, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1)
perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x1c, 0x8, 0x4, 0x0, 0x0, 0x2010e, 0x7fa78d00459f32fd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x2}, 0x8, 0x6, 0x4, 0x6, 0xfffffffffffff16f, 0xd8, 0x1, 0x0, 0xfffffffa, 0x0, 0xffffffffffffff80}, 0x0, 0xf, 0xffffffffffffffff, 0x0)
socketpair(0x1, 0x2, 0x0, &(0x7f0000000000)) (async)
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
21:54:53 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x2, &(0x7f0000001a40)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0x58c1, 0x10, &(0x7f00000006c0)=""/16, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x0, 0x4, 0x8cf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x90)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80) (async)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002380)={0x18, 0x13, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1893e433d0f7ba61422f00000000040000000000003631000085100000050000009e3e3f00356500021864000002000200000000000800000085100000faffffff181200006916fb604670174fb7c4a1edcfe1cb2b56abe4de5240932f287ae04e3a49f9ab298a4431c01e1c9e25966d73e21caa6e01", @ANYRES32=r0, @ANYBLOB="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"/281, @ANYBLOB="3236c36a8604c0b4ab93d0daf3c15b8716ee6265fa645d7f3fdb3991629c0eea939297f88703efec0a09e5084ffbfaad7527b38d6809e68c0b6b7c4f8baca99eb9bce640001642b75ec0862daae245bc63f12e5fd6c1f8b17313ba1098a6a0205d387223094d3b43e5c13c44461b7ed7ea2e6ad55c23155048a8dc96981bdfa71d896a4444fe8005e0c5fc29c2977c0052574471b32723aae1924173d7030920372176cdf023795716cc8ecae12331f9da1128046de562931a0a09b1c8276151a5bf5b6f182a3e", @ANYRES32], &(0x7f0000002080)='GPL\x00', 0x7fff, 0x9d, &(0x7f00000020c0)=""/157, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x3, 0xa, 0x6, 0x1fc}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002340)}, 0x90) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000180)}, 0x20) (async)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x9, &(0x7f00000007c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @generic={0x0, 0xd, 0xe, 0x0, 0x2}, @alu={0x7, 0x1, 0xb, 0xa, 0x4, 0xffffffffffffffc0, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x6e}, @map_val={0x18, 0x2, 0x2, 0x0, r3}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @ldst={0x3, 0x2, 0x2, 0x2, 0x4, 0xfffffffffffffff8, 0x8}], &(0x7f0000000480)='syzkaller\x00', 0x6, 0xb4, &(0x7f00000009c0)=""/180, 0x41100, 0x20, '\x00', r4, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000b40)={0x2, 0x2, 0x0, 0x8}, 0x10, 0x14ca, r1, 0x6, 0x0, &(0x7f0000000b80)=[{0x1, 0x4, 0x9, 0x6}, {0x1, 0x5, 0x10, 0x1}, {0x1, 0x3, 0xe, 0x8}, {0x3, 0x4, 0xc, 0x4}, {0x0, 0x2, 0x4, 0xc}, {0x4, 0x3, 0xc, 0x8}], 0x10, 0x5}, 0x90) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10)
r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x100000000, 0x9, 0x4, 0x6, 0x3f2b, 0x0, 0x0, 0x8001, 0x0, 0x10001}) (async)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001f40)={0x0, 0x80, 0x20, 0x8, 0x5, 0xff, 0x0, 0x4, 0x20200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x9d70}, 0x84090, 0x20, 0x5, 0x9, 0x101, 0x1f, 0x401, 0x0, 0x2, 0x0, 0x401}) (async)
perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0xff, 0xcd, 0x0, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffc01, 0x2, @perf_config_ext={0x84000001}, 0x84000, 0x1, 0x5bd, 0x3, 0x8000, 0x4, 0x2, 0x0, 0xff, 0x0, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) (async)
r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) (async)
openat$cgroup_ro(r6, &(0x7f0000000440)='blkio.throttle.io_serviced\x00', 0x0, 0x0) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c80)={0xffffffffffffffff, 0xe0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40), &(0x7f0000001e00), 0x0, 0x8, &(0x7f0000001e00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000001ac0), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10) (async)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
21:54:53 executing program 2:
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='blkio.bfq.group_wait_time\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000040))
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
getpid() (async)
r1 = getpid()
perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x80, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x600, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0xb61a, 0x13e}, 0x400, 0x244, 0x3, 0x0, 0x0, 0x9, 0x4, 0x0, 0x4, 0x0, 0x8}, r1, 0xa, 0xffffffffffffffff, 0x0)
getpid()
r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0xffff, 0x0, 0x200, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1000001, 0x4, 0xd}, 0x48) (async)
bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x1, 0xffff, 0x0, 0x200, r0, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1000001, 0x4, 0xd}, 0x48)
r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000340)=ANY=[@ANYRES16, @ANYRES32], 0x0, 0xcb, 0x0, 0xfffffffd}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x1, 0x812, 0xffffffffffffffff, 0x400, '\x00', 0x0, r3, 0x3, 0x1, 0x3, 0xa}, 0x48) (async)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@bloom_filter={0x1e, 0x3, 0x20a, 0x1, 0x812, 0xffffffffffffffff, 0x400, '\x00', 0x0, r3, 0x3, 0x1, 0x3, 0xa}, 0x48)
perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0)
socketpair(0x1, 0x2, 0x0, &(0x7f0000000140))
perf_event_open(&(0x7f00000003c0)={0x3, 0x80, 0xff, 0x80, 0x1f, 0x7, 0x0, 0xfffffffffffffffe, 0x100, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={&(0x7f0000000080), 0x1}, 0x1002, 0x8, 0x2000000, 0x5, 0xfffffffffffc0000, 0x0, 0x0, 0x0, 0x5}, r1, 0xa, r2, 0x8)
r5 = perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xd7, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x80, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0x8, &(0x7f0000000840)=ANY=[@ANYBLOB="32c272eb180000006d7400080000000001000000184b0000fd070000010075e0562800009d5200000000388c5e5d4ba8d68f667b0018230000", @ANYRES32, @ANYBLOB="00000000090000009500000044b4cdae"], &(0x7f0000000480)='GPL\x00', 0x40, 0x31, &(0x7f00000004c0)=""/49, 0x41100, 0x1a, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000000980)={0x4, 0x1, 0x4, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000a00)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80)
perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x1, 0x6, 0x0, 0x40, 0x0, 0xb6d8, 0x4, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd436, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x86000, 0x5, 0x3, 0x0, 0x7, 0x2, 0xffc0, 0x0, 0x3, 0x0, 0x5890}, 0x0, 0xa, 0xffffffffffffffff, 0x2) (async)
perf_event_open(&(0x7f00000007c0)={0x4, 0x80, 0x1, 0x6, 0x0, 0x40, 0x0, 0xb6d8, 0x4, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd436, 0x0, @perf_bp={&(0x7f00000002c0), 0x5}, 0x86000, 0x5, 0x3, 0x0, 0x7, 0x2, 0xffc0, 0x0, 0x3, 0x0, 0x5890}, 0x0, 0xa, 0xffffffffffffffff, 0x2)
r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x4, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000b629d48440f0d50c15b0100010104000000000000000000000000000085c9953763124908b33ff8fb3e45fe93a8b62dfd936c2e9c9b6924629eb3ecd42a2caed96e44adf62cf9cba28795a7b0b3429efa457f7814d96f9ecf732d1a010c1b5be8dc39eae529150ba758a0c7e43e6fe7c94dbdd8d38b6eb590d28a90de3be948627890b47d0911"], &(0x7f0000000500)='syzkaller\x00', 0x200, 0xbb, &(0x7f0000000a80)=""/187, 0x403e6dd0f9c515f7, 0x3, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000600)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x9, 0x400, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, r6, 0xffffffffffffffff, r4]}, 0x80) (async)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x6, 0x4, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000b629d48440f0d50c15b0100010104000000000000000000000000000085c9953763124908b33ff8fb3e45fe93a8b62dfd936c2e9c9b6924629eb3ecd42a2caed96e44adf62cf9cba28795a7b0b3429efa457f7814d96f9ecf732d1a010c1b5be8dc39eae529150ba758a0c7e43e6fe7c94dbdd8d38b6eb590d28a90de3be948627890b47d0911"], &(0x7f0000000500)='syzkaller\x00', 0x200, 0xbb, &(0x7f0000000a80)=""/187, 0x403e6dd0f9c515f7, 0x3, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000600)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x9, 0x400, 0x2}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000900)=[0xffffffffffffffff, r6, 0xffffffffffffffff, r4]}, 0x80)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)=0x200) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000280)=0x200)
perf_event_open(&(0x7f0000000680)={0x3, 0x80, 0x0, 0xb5, 0x2, 0x0, 0x0, 0x7, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000380)}, 0x200, 0x200000877a, 0x0, 0x3, 0x1, 0x7fff, 0x1ff, 0x0, 0x8}, 0x0, 0xf, r5, 0x0)
getpid() (async)
getpid()
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0)
perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x3, 0xfd, 0x3, 0x1, 0x0, 0x9, 0x20, 0x4, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7fff, 0x2, @perf_config_ext={0x3ff, 0xfffffffffffffffa}, 0x8c8, 0x0, 0xf, 0x7, 0x5, 0x7, 0x9, 0x0, 0xfffff0be, 0x0, 0x3}, 0x0, 0xf, 0xffffffffffffffff, 0x2)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1) (async)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4004662b, &(0x7f00000005c0)=0x1)
perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x1c, 0x8, 0x4, 0x0, 0x0, 0x2010e, 0x7fa78d00459f32fd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x2}, 0x8, 0x6, 0x4, 0x6, 0xfffffffffffff16f, 0xd8, 0x1, 0x0, 0xfffffffa, 0x0, 0xffffffffffffff80}, 0x0, 0xf, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x20, 0x1c, 0x8, 0x4, 0x0, 0x0, 0x2010e, 0x7fa78d00459f32fd, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x2, 0x2}, 0x8, 0x6, 0x4, 0x6, 0xfffffffffffff16f, 0xd8, 0x1, 0x0, 0xfffffffa, 0x0, 0xffffffffffffff80}, 0x0, 0xf, 0xffffffffffffffff, 0x0)
socketpair(0x1, 0x2, 0x0, &(0x7f0000000000))
syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
21:54:53 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x8) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3)
r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000100), 0x10)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x0, 0x3, 0x40, 0x0, 0x1, 0x6401, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x6c, 0x6, 0x6, 0x7fffffffffffffff, 0x4800000, 0xfffe, 0x0, 0x6, 0x0, 0x3}, r2, 0x5, r3, 0x3)
21:54:53 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r1, &(0x7f0000000040), 0x12)
r2 = syz_clone(0x75848400, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x8) (async)
perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0xff, 0x80, 0xb0, 0x3, 0x0, 0x10001, 0x100, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x4, @perf_config_ext={0x0, 0x9}, 0x610, 0x7f3, 0x1, 0x7, 0x8, 0xd728, 0xff, 0x0, 0x40, 0x0, 0xffff}, r2, 0x0, 0xffffffffffffffff, 0x3) (async)
r3 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000100), 0x10)
perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x9, 0x0, 0x3, 0x40, 0x0, 0x1, 0x6401, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x6c, 0x6, 0x6, 0x7fffffffffffffff, 0x4800000, 0xfffe, 0x0, 0x6, 0x0, 0x3}, r2, 0x5, r3, 0x3)
21:54:53 executing program 2:
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0))
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0)
r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='rpc_socket_nospace\x00', r1}, 0x10)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open$cgroup(&(0x7f0000000780)={0x3, 0x80, 0x9, 0x7f, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x10080, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xae, 0x1, @perf_bp={&(0x7f0000000300), 0x10}, 0x1000, 0x5, 0x5, 0x2, 0x3, 0x4, 0x7, 0x0, 0x7fff, 0x0, 0xfffffffffffffff8}, r0, 0x1, r2, 0x6)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6)
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0xff, 0x9, 0xde, 0x0, 0x0, 0x9, 0x4002, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xa73, 0x4, @perf_bp={&(0x7f00000008c0), 0x4}, 0x13410, 0x6, 0x3, 0x4, 0xffffffffffffffc0, 0x2, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r4, 0x9)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x8, 0x0}, 0x8)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x6, 0x6ce0, 0x8, 0x5, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x2}, 0x48)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000680)=ANY=[@ANYRESDEC, @ANYRESDEC=r5, @ANYRES16=r4, @ANYRES64=r5, @ANYRES8=r1, @ANYRES32], &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x23, &(0x7f0000000380)=""/35, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000400)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x3, 0x6, 0x9f0}, 0x10, r6, 0x0, 0x3, &(0x7f0000000540)=[r0, r7], &(0x7f0000000580)=[{0x6, 0x3, 0xe, 0x5}, {0x4, 0x5, 0xc}, {0x0, 0x1, 0x0, 0x2}], 0x10, 0x6}, 0x90)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x3, 0x8}, 0xc)
bpf$MAP_GET_NEXT_KEY(0x3, 0x0, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff)
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xprtrdma_err_unrecognized\x00', r1}, 0x10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='^+[,-[[\x00')
[ 3233.337124][ T5362] FAULT_INJECTION: forcing a failure.
[ 3233.337124][ T5362] name failslab, interval 1, probability 0, space 0, times 0
[ 3233.399300][ T5362] CPU: 0 PID: 5362 Comm: syz-executor.1 Tainted: G B W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3233.410770][ T5362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3233.420665][ T5362] Call Trace:
[ 3233.423790][ T5362]
[ 3233.426563][ T5362] dump_stack_lvl+0x151/0x1b7
[ 3233.431085][ T5362] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3233.436555][ T5362] dump_stack+0x15/0x17
[ 3233.440539][ T5362] should_fail+0x3c6/0x510
[ 3233.444794][ T5362] __should_failslab+0xa4/0xe0
[ 3233.449427][ T5362] ? anon_vma_fork+0x1df/0x4e0
[ 3233.453993][ T5362] should_failslab+0x9/0x20
[ 3233.458328][ T5362] slab_pre_alloc_hook+0x37/0xd0
[ 3233.463104][ T5362] ? anon_vma_fork+0x1df/0x4e0
[ 3233.467702][ T5362] kmem_cache_alloc+0x44/0x200
[ 3233.472304][ T5362] anon_vma_fork+0x1df/0x4e0
[ 3233.476732][ T5362] copy_mm+0xa3a/0x13e0
[ 3233.480725][ T5362] ? copy_signal+0x610/0x610
[ 3233.485151][ T5362] ? __init_rwsem+0xd6/0x1c0
[ 3233.489583][ T5362] ? copy_signal+0x4e3/0x610
[ 3233.494005][ T5362] copy_process+0x12bc/0x3260
[ 3233.498520][ T5362] ? proc_fail_nth_write+0x20b/0x290
[ 3233.503638][ T5362] ? fsnotify_perm+0x6a/0x5d0
[ 3233.508151][ T5362] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3233.513103][ T5362] ? vfs_write+0x9ec/0x1110
[ 3233.517440][ T5362] kernel_clone+0x21e/0x9e0
[ 3233.521780][ T5362] ? file_end_write+0x1c0/0x1c0
[ 3233.526464][ T5362] ? create_io_thread+0x1e0/0x1e0
[ 3233.531330][ T5362] ? mutex_unlock+0xb2/0x260
[ 3233.536187][ T5362] ? __mutex_lock_slowpath+0x10/0x10
[ 3233.541316][ T5362] __x64_sys_clone+0x23f/0x290
21:54:53 executing program 5:
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 64)
perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 64)
r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880), 0xc)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x2, &(0x7f0000001a40)=@raw=[@map_idx={0x18, 0x4, 0x5, 0x0, 0x6}], &(0x7f0000000680)='GPL\x00', 0x58c1, 0x10, &(0x7f00000006c0)=""/16, 0x40f00, 0xe, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000740)={0x1, 0x0, 0x4, 0x8cf}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff]}, 0x90) (async, rerun: 64)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xe, 0x10, 0x0}, 0x80) (rerun: 64)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002380)={0x18, 0x13, &(0x7f0000000cc0)=ANY=[@ANYBLOB="1893e433d0f7ba61422f00000000040000000000003631000085100000050000009e3e3f00356500021864000002000200000000000800000085100000faffffff181200006916fb604670174fb7c4a1edcfe1cb2b56abe4de5240932f287ae04e3a49f9ab298a4431c01e1c9e25966d73e21caa6e01", @ANYRES32=r0, @ANYBLOB="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"/281, @ANYBLOB="3236c36a8604c0b4ab93d0daf3c15b8716ee6265fa645d7f3fdb3991629c0eea939297f88703efec0a09e5084ffbfaad7527b38d6809e68c0b6b7c4f8baca99eb9bce640001642b75ec0862daae245bc63f12e5fd6c1f8b17313ba1098a6a0205d387223094d3b43e5c13c44461b7ed7ea2e6ad55c23155048a8dc96981bdfa71d896a4444fe8005e0c5fc29c2977c0052574471b32723aae1924173d7030920372176cdf023795716cc8ecae12331f9da1128046de562931a0a09b1c8276151a5bf5b6f182a3e", @ANYRES32], &(0x7f0000002080)='GPL\x00', 0x7fff, 0x9d, &(0x7f00000020c0)=""/157, 0x40f00, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002180)={0x6, 0x1}, 0x8, 0x10, &(0x7f00000021c0)={0x3, 0xa, 0x6, 0x1fc}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002340)}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) (async)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r3, &(0x7f0000000180)}, 0x20) (async)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000840)={r0, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x9, &(0x7f00000007c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @generic={0x0, 0xd, 0xe, 0x0, 0x2}, @alu={0x7, 0x1, 0xb, 0xa, 0x4, 0xffffffffffffffc0, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x6e}, @map_val={0x18, 0x2, 0x2, 0x0, r3}, @map_fd={0x18, 0x0, 0x1, 0x0, r0}, @ldst={0x3, 0x2, 0x2, 0x2, 0x4, 0xfffffffffffffff8, 0x8}], &(0x7f0000000480)='syzkaller\x00', 0x6, 0xb4, &(0x7f00000009c0)=""/180, 0x41100, 0x20, '\x00', r4, 0x17, 0xffffffffffffffff, 0x8, &(0x7f0000000b00)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000b40)={0x2, 0x2, 0x0, 0x8}, 0x10, 0x14ca, r1, 0x6, 0x0, &(0x7f0000000b80)=[{0x1, 0x4, 0x9, 0x6}, {0x1, 0x5, 0x10, 0x1}, {0x1, 0x3, 0xe, 0x8}, {0x3, 0x4, 0xc, 0x4}, {0x0, 0x2, 0x4, 0xc}, {0x4, 0x3, 0xc, 0x8}], 0x10, 0x5}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0x8, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f0000000400), &(0x7f0000001a00), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) (async)
r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f0000000500)={0x1, 0x80, 0x7d, 0x9, 0x9, 0xcb, 0x0, 0x10001, 0x0, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}, 0x0, 0x100000000, 0x9, 0x4, 0x6, 0x3f2b, 0x0, 0x0, 0x8001, 0x0, 0x10001}) (async, rerun: 32)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000001f40)={0x0, 0x80, 0x20, 0x8, 0x5, 0xff, 0x0, 0x4, 0x20200, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8001, 0x0, @perf_config_ext={0x9d70}, 0x84090, 0x20, 0x5, 0x9, 0x101, 0x1f, 0x401, 0x0, 0x2, 0x0, 0x401}) (async, rerun: 32)
perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0xff, 0xcd, 0x0, 0x0, 0x8001, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffc01, 0x2, @perf_config_ext={0x84000001}, 0x84000, 0x1, 0x5bd, 0x3, 0x8000, 0x4, 0x2, 0x0, 0xff, 0x0, 0x5}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x3) (async)
r6 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_user\x00', 0x26e1, 0x0)
ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x4030582a, &(0x7f0000000040)) (async)
openat$cgroup_ro(r6, &(0x7f0000000440)='blkio.throttle.io_serviced\x00', 0x0, 0x0)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001c80)={0xffffffffffffffff, 0xe0, &(0x7f0000001b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40), &(0x7f0000001e00), 0x0, 0x8, &(0x7f0000001e00)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000001ac0), 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f00000019c0)}}, 0x10)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0)
[ 3233.545907][ T5362] ? __do_sys_vfork+0x130/0x130
[ 3233.550595][ T5362] ? ksys_write+0x260/0x2c0
[ 3233.555211][ T5362] ? debug_smp_processor_id+0x17/0x20
[ 3233.560413][ T5362] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3233.566314][ T5362] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3233.572043][ T5362] do_syscall_64+0x3d/0xb0
[ 3233.576295][ T5362] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3233.582025][ T5362] RIP: 0033:0x7f024b55cae9
[ 3233.586279][ T5362] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3233.605725][ T5362] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
[ 3233.614138][ T5362] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3233.621942][ T5362] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3233.629773][ T5362] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3233.637598][ T5362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
21:54:53 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup_ro(r2, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0)
r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0)
mkdirat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x1ff)
r4 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r4, &(0x7f0000000040), 0x12)
[ 3233.645383][ T5362] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 3233.653200][ T5362]
21:54:53 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
bpf$MAP_CREATE(0x0, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"/2992], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242909880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="59235bd7a9324ff307d87177332368fbdeefaa1544600ea1870645446c357de433206896637019b84d57c3de1ea07638e494dd701db1af6fc15db78cf79f5ab4bc7aee8553677ffe377a35b4afdb989fb7da1ff63956ffb796d51daf1c268b9f1a4a06583f8c03ec1671b151a8a495c1b006fa5f2f3a54a46aeee8005b178b9516d2b928984ccb942fa2278a2e33a0b619f2dd814fc91942e03c48fd9b7d19d9a6612b46805b267ef3132a724cbfcd1c715be67930e2ae2b9a2479c5a4b2fecd301a745a6fd67598a5e5ecc1e56e58159c47def7f9285acfedc980596377e6f9ee076fa094e5d8f838b718ed63ff8265a1dbc1549bed03e6b27b6fc2b8a07373506a1a41d5a71cbf0eaa24ec737b02a8a2d5114c3c4e5810a2c3eae3373fd341800cfb0fb35cefe04ca4da2b02a83c40126e23cdf3c817b530bbe7b431bc0b7d864e3e6dd1ab90259a8bd7ad7dd4c6366ea6da661fd016b394adcce5988fff85fbc832a927c97b89337e195f562cd284911eef1ee52e4ff033b33beedea7cf43c4d0cc0471fa91011e1e7e8733bf82c01346d6ecb49f1a84e92d063c81a7227d89be33f7273b87e29ae53a5f38dc94cf391fcb82c9432821ef1a0f6bbfe8f7d6574479a8f621e1d8f7d9bb20f3d8d469e6d232d7d7837ff12a224a65c604907e787baaf7c863ad48a5edecbe1470c20507a6ee5dee75e9ef84c71af5af800a9ce9787ebdee9e1c8189fbf66048d5c3757fb2b697ce68cfd316a7b25a385111e0cd2fddb81602e36e74c4f99b403cb304a4774e648054c0456c7869f9d97873ff80e2664c1265292941a9b767c7f40767cfccdbcaa156453d6a910fd5440f7a2bf8f4bb6d6d9fd443f2304617a684b6afa99c157dcf70e51fdb55fd0dbf5c6733841024599f8d1791a07c5dc3a4ccaf4d7c0ca3d101b2beba3a49d2378c9fe4fdb10babd95083a0c4db5a30c4490828d97efe807a13e587fbac1089843964facfd27d287262759384fe9b610f81048be430c1e8fe6327c0f2fd003021d20563ec0c7e39aec6718649c958da2e02cb3848c76924492678889c18bea02ed5ee080106e9838cbca9ad5f66c0434182225b13a236b342cf80562c10d4a3459aea17589b84904d3d2c2b", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22)
21:54:53 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_pid(r1, &(0x7f0000000080)=0xffffffffffffffff, 0x12)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:54:54 executing program 4:
syz_clone(0x6083e00, 0x0, 0xfffffffffffffe9e, 0x0, 0x0, 0x0)
21:54:54 executing program 5:
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
bpf$MAP_CREATE(0x0, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"/2992], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242909880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="59235bd7a9324ff307d87177332368fbdeefaa1544600ea1870645446c357de433206896637019b84d57c3de1ea07638e494dd701db1af6fc15db78cf79f5ab4bc7aee8553677ffe377a35b4afdb989fb7da1ff63956ffb796d51daf1c268b9f1a4a06583f8c03ec1671b151a8a495c1b006fa5f2f3a54a46aeee8005b178b9516d2b928984ccb942fa2278a2e33a0b619f2dd814fc91942e03c48fd9b7d19d9a6612b46805b267ef3132a724cbfcd1c715be67930e2ae2b9a2479c5a4b2fecd301a745a6fd67598a5e5ecc1e56e58159c47def7f9285acfedc980596377e6f9ee076fa094e5d8f838b718ed63ff8265a1dbc1549bed03e6b27b6fc2b8a07373506a1a41d5a71cbf0eaa24ec737b02a8a2d5114c3c4e5810a2c3eae3373fd341800cfb0fb35cefe04ca4da2b02a83c40126e23cdf3c817b530bbe7b431bc0b7d864e3e6dd1ab90259a8bd7ad7dd4c6366ea6da661fd016b394adcce5988fff85fbc832a927c97b89337e195f562cd284911eef1ee52e4ff033b33beedea7cf43c4d0cc0471fa91011e1e7e8733bf82c01346d6ecb49f1a84e92d063c81a7227d89be33f7273b87e29ae53a5f38dc94cf391fcb82c9432821ef1a0f6bbfe8f7d6574479a8f621e1d8f7d9bb20f3d8d469e6d232d7d7837ff12a224a65c604907e787baaf7c863ad48a5edecbe1470c20507a6ee5dee75e9ef84c71af5af800a9ce9787ebdee9e1c8189fbf66048d5c3757fb2b697ce68cfd316a7b25a385111e0cd2fddb81602e36e74c4f99b403cb304a4774e648054c0456c7869f9d97873ff80e2664c1265292941a9b767c7f40767cfccdbcaa156453d6a910fd5440f7a2bf8f4bb6d6d9fd443f2304617a684b6afa99c157dcf70e51fdb55fd0dbf5c6733841024599f8d1791a07c5dc3a4ccaf4d7c0ca3d101b2beba3a49d2378c9fe4fdb10babd95083a0c4db5a30c4490828d97efe807a13e587fbac1089843964facfd27d287262759384fe9b610f81048be430c1e8fe6327c0f2fd003021d20563ec0c7e39aec6718649c958da2e02cb3848c76924492678889c18bea02ed5ee080106e9838cbca9ad5f66c0434182225b13a236b342cf80562c10d4a3459aea17589b84904d3d2c2b", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22)
21:54:54 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8)
write$cgroup_pid(r1, &(0x7f0000000080)=0xffffffffffffffff, 0x12) (async)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:54:54 executing program 2:
perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) (async)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0))
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) (async)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8)
ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0)
r2 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xee, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='rpc_socket_nospace\x00', r1}, 0x10) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='rpc_socket_nospace\x00', r1}, 0x10)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000001ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0)
r3 = perf_event_open$cgroup(&(0x7f0000000780)={0x3, 0x80, 0x9, 0x7f, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x10080, 0x7, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xae, 0x1, @perf_bp={&(0x7f0000000300), 0x10}, 0x1000, 0x5, 0x5, 0x2, 0x3, 0x4, 0x7, 0x0, 0x7fff, 0x0, 0xfffffffffffffff8}, r0, 0x1, r2, 0x6)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6)
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async)
recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r4, &(0x7f0000000000), 0xfdef)
openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
r5 = openat$cgroup_ro(r4, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0xff, 0x9, 0xde, 0x0, 0x0, 0x9, 0x4002, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xa73, 0x4, @perf_bp={&(0x7f00000008c0), 0x4}, 0x13410, 0x6, 0x3, 0x4, 0xffffffffffffffc0, 0x2, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r4, 0x9) (async)
perf_event_open(&(0x7f0000000900)={0x0, 0x80, 0xff, 0x9, 0xde, 0x0, 0x0, 0x9, 0x4002, 0x7, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xa73, 0x4, @perf_bp={&(0x7f00000008c0), 0x4}, 0x13410, 0x6, 0x3, 0x4, 0xffffffffffffffc0, 0x2, 0x7, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r4, 0x9)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x8, 0x0}, 0x8)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@bloom_filter={0x1e, 0x6, 0x6ce0, 0x8, 0x5, r0, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x3, 0x2}, 0x48)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000680)=ANY=[@ANYRESDEC, @ANYRESDEC=r5, @ANYRES16=r4, @ANYRES64=r5, @ANYRES8=r1, @ANYRES32], &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x23, &(0x7f0000000380)=""/35, 0x40f00, 0x0, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000400)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x1, 0x3, 0x6, 0x9f0}, 0x10, r6, 0x0, 0x3, &(0x7f0000000540)=[r0, r7], &(0x7f0000000580)=[{0x6, 0x3, 0xe, 0x5}, {0x4, 0x5, 0xc}, {0x0, 0x1, 0x0, 0x2}], 0x10, 0x6}, 0x90)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x3, 0x8}, 0xc)
bpf$MAP_GET_NEXT_KEY(0x3, 0x0, 0x0)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff) (async)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.net/syz1\x00', 0x1ff)
syz_clone(0x738c0480, 0x0, 0x0, 0x0, 0x0, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0)
r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='xprtrdma_err_unrecognized\x00', r1}, 0x10)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='^+[,-[[\x00') (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='^+[,-[[\x00')
21:54:54 executing program 1:
syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73)
21:54:54 executing program 0:
r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async, rerun: 64)
r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (rerun: 64)
write$cgroup_pid(r1, &(0x7f0000000080)=0xffffffffffffffff, 0x12) (async)
write$cgroup_pid(r0, &(0x7f0000000040), 0x12)
21:54:54 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00')
bpf$MAP_CREATE(0x0, 0x0, 0x0)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000001c80)=ANY=[@ANYBLOB="850000002200000007000000000000089500000000000000e26c9bd1a6361b80cdd64bdf00000000000869045aac0000659f55df08f9b90788ff7f00000010000029c21ebbcde61d8ab5920aef6c3e007fe61241638962cf0b89ef506cfd3f1d4163d3cfca3733b30070a7cf53021a9554328a702688f92b6b71569d65e33d46f8d8ae24ba69c657afac04379cb536008c219991704f11c5a01ba62ed8f2c6a503dd1b1d076f03b0f917c766f3a7598bbc00feb3bc8e88f79df517b37b56bcbc290080000000000000e675458a43b8a8935bf9cf0be7d0aeaac41405e341cd0ba0d6fd562489dad595712a4051bb6cf826ab757193fc093b8b3353fbbb278d19000000000000007b61805ed430ef06000000000000001e93f640f159320c8b088f4d64977b2eb312d4967aff9e4c14c66c90000054ed82c7cba4c81f91d6dfed18767bf0df584b4b6c4204df411f921e3aa02a67dd324b8176020e9c024751df38c05727f82c92046bfe64babb6d7ba86526b7886a0c2481c5812812a6fa3fca3758cbd8c33b25ce8be225bd1f16297baa065f5bf96330fad0aaa4388c06c0eb2ecdf829af9577fcd868cc269b740000b777d73a63246ce6f0467167626329ab91df7a13d9ec9a64e7f6b56aeab8c38f69a213c96e2d2ad7978c9d721c270f27e7025d576535198742d403ec43572d7d0baf00e882617b260627805ca44200335ea4363066944d0aa6feb9705b09ba40d4642519281151f875cbf13a582f90ad719f0eccf02a473dd508a16138904933689ea6ee02412064730700aeff2b69c2f2bf6f691c3560e068743ae8e8771280da61fd8fdc3f7a35ea352e35753c59ebc1bd27ab6603e6afb1b3f057fbb7ed3aabe702b3c6301d3f5c295d1d69d1541d0e64631c95d6c0999e27e8d1a58f6a00f19102d2bfaf53f25a45637b1c577ae50c4c56d9abc40c64a20c14ff0b1bf4d23fe07ae90f503ba9c64bf89b26e7d8d70710b04f9ece69023acadbb4582272e5b3a0429a5675e5a9554de54945d9a270180e0545b0c824ad36f7cc8be12b3874d5a19349b0ede845e9ece24d546d3af1bae069b89f6ecf2aabb17eb1840bc8e0ed1dd8b9b7eeaf32a185d80250a7f2eeb756eadafe20bbc616bc44b347abc8caf722b2c3b06884c1d1690f23b06fa4541bb2a81073b452764f04bd39008b65ee222cf697ac21b087548e9708dffaff2859e973b1e88668c8022cc6dac8548167e5798ec9c7d288a7fa7749f07513187cd8f060abbbc5e37dd1be3aab927be1b409be733b7408534e5b0951e9ecfd0a1c77e3ab9be4c4093330124615056e3ce0ce6ac91b1242d3bb2e787a186dc2ec284d60e9d8a03884a22eeaa1efa497ee88c6cb565b164a260afb5157e392b1ebb1a4d4f992011ecbac4a0a6df5bdc6f7994a422bb2761edd2d8f20f5f879a88f89d48b8314f862585e4b7a9d6a6681f40e8b82cc974faa2587a6e3af3b9458f7d4b4077b3002536b10ea24d73307a33090c4c270909a5322eac32cb175e68fa83457b21465c08c02dcefccc0c714c2862ddbe567755f05a1e671328d160d3752345ca1db6e74c720e42afca982ba6befd96c5575f1dd8f87ff6606301c0000000000000000000000000000000000000004d0d54b4caf78018766cdb971e8b168d4763c21181f00000003d4e1d842caf457797f93db93e4f38a9dbd79f6bf5dc40b55fdbf9b856665061b2e2924f27eb2d2b5a181ccfd9eeb11dec165b6f12433f00bb06124041ffdcdcdc91f3b3b76635a689c9249cf69bcae654bfa81e75b7c7002b883c56026d83520395b7d511f607cf2f899c7b1c7402192f775d72247167285857588ace1115fbebfe63c16b84cf7036d41c493a63c09f2ce46c1f5995c2d7fe58c15e64bb4cb7e7f336cc22fa1ea1363bce375bd3d579be1dddb08ed5147b629e4b3f0e65783ee5e20d9270802f2a7500738bf356131ca53e9d7ba8d486fb26252d684b84fa24639089064ca7b93057c041f12d544dab4d24a4f952b4f265a69ba279929959991b7ac63786055b3c029a0e8b6e4c26497c029bb61462623a58556cd62844d4d23cc738ee5b36c71d2c010b089251d5806000b1ade92dd9f441468967c052aecd9de81b4b55d06670597991f37ddc4fa19a6369d5bf76c474633a337f676ad255869881da5cadcf49ce9188129cc978977f87b32bd49457536430ffbd3e01e67ff087644f52fcf0a3c732b0586cb87972443d2616bf4e521dc3126bf1760243d51a197d3ecfd74bd625e9f496175cfeaaa020817d33d513f3e97854ea76e04e96a8639a297871485a8609f8ca842b3321932c4d9e224a0cec5946cec9e359fd3687415cad5fb8c678136f36d9f781fade9f2469477748f4dfa0f56c326c89bb5d07f35aaf95303b5a620fc84e1c735647895713cbcea57b2277831f8f633f0d29371e645e5544e57010a9b76457f6ad73231a9fb1f6bbb1b95248aeda5a9df9dea64cc1fd1f06a980fcf3a792bb0910e45fce298ab0a0298fc33a423e860d5b308d7849381b294106af25f15fec047d5b844a99f36e342165df728e381b48c20e0900f8d265157467d3494f2b96acf060774084760d226f50edb115c2e075f3c663a4b4169b900fa0a13cf796e0d7a9dad86953c13ed6241206d682e194c64c491de6a531e9bd45abe705f07000a82ccd41a2c1b9d5dd8bf6c28653eb84f117e476e052a9db790e0a71dac9d8b343efebdc026860000000000000000000000000000aad579302085dfdf75bea24798c680b3de341e3bd57543bf74fd58bcebdbb883c743ed43ba7f540f2c4e0310c21e7deff9e45b8bd2cf65bb584091b8e80e34b3e59185fe32d1d73dd4f62712a39b13661516723b6b80a7e99e5aa6536982c02275fc53fa3ef14d9fccb05f9c4e69a3af0fde863af2d9a0f8a94fc571b0ab4ad714f41fa4ee0b8b44e3c41a3125be95e4b23d5f05395852761bfaebe0db979d5f3991d826cc74542b85cfd0dba66bc93cfd79178ab0b79fa3b29ff9c19e0424513c91980187c9d94b8354337a1fc782505db900c47d83bd49276cfe6e242ba8365b1ea4598a21f50f5415a70990b5bb4a1f6bd8acdf2c7da3d648754767089c9b5ceb556fafa3cc5afd2f3e9a62a90262a76ff89a2751b59a744f0d3f36ca503357daa3e29ce6f357dc1e4839277d003e93fdbb955e1a1302a76aea7e73835094fb15464e94e814c77c293121d0433e80d444c4ca17abaf32b521d8686666055da023aef9c8df3e80d2ed640ed10aa19a036dcef172dbd3b3600b69f9b90c6222e167d7c76059f2b5f3b3004e8a20d1f6612efeb629573be97aa949c6016e7e16283e84986aaa4fc8a098708ebe36f377ada63d9b464c39342e0682549862de3ec75e7b031bc49f341a21417fb6375e8701481b59d1722c836961804666801678eb25750b520bf1615a4bbf30aa74d60ec6b657f2dd298b0419da43fc708a60c94a7ff2fd6a2d08005ad73c9e2d0200d2857be8fb3f12bfa6628bccb153e39172d07563d6a1dc75c347c08060304f291230bd74b49ecdd13bf480db3984622a167c8603b8c501280059a7b6123c8f8cd217f64eccc2dffe4f3a1e8c9a96a13d8126f3ea26779fbd0069d729a7764d4ddd7d9d820b0de2530969362b94b974678527f5bac7eb8d6e321b2be0b2f7534634a5ecd1248d7ad7e8e03163e92e9f1d620e28597bd881eea0981e8adfd70b670b0763ce9226f7c3e156b353e22fdea6942b577bbc539aab23cbd46bdd0ea1e67140c759f208c12dc57f3100000000000000e4965fcb6c2749955eac9476687e63b41c6282bbcb0c3d8b0c9493a3a5f6d879d7257b4b68dc7cac3d9d5f5bbe937c501866ee4042b250e516ec074559e1e551167138766eeecb6941e8305d9cde1800c821536f9d25bd14163890842a08135bdb7a90db630b18f099855a7d9de65c80fa71ff90e873361d0e11a7dfebe56ffb2000b711a0b7914d6351ff60593e48af60e1ffecba7cd6f8ab662eb3c8f3164139e994d6a706afb92722595d649a04f1ff64e5634e7cb9106173a9d5d8cf3e5a959e6bfdc1b6507b851c4ba43312726cfec58dedece1355a087c1b60882713a6161914f09267e2ce8aa886b3c0add5cd92e185d345c9b2933a78a4215133e8e7247fa4c62419d82f8e1c4f564d48abefab44aee30bfb6c00"/2992], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242909880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="59235bd7a9324ff307d87177332368fbdeefaa1544600ea1870645446c357de433206896637019b84d57c3de1ea07638e494dd701db1af6fc15db78cf79f5ab4bc7aee8553677ffe377a35b4afdb989fb7da1ff63956ffb796d51daf1c268b9f1a4a06583f8c03ec1671b151a8a495c1b006fa5f2f3a54a46aeee8005b178b9516d2b928984ccb942fa2278a2e33a0b619f2dd814fc91942e03c48fd9b7d19d9a6612b46805b267ef3132a724cbfcd1c715be67930e2ae2b9a2479c5a4b2fecd301a745a6fd67598a5e5ecc1e56e58159c47def7f9285acfedc980596377e6f9ee076fa094e5d8f838b718ed63ff8265a1dbc1549bed03e6b27b6fc2b8a07373506a1a41d5a71cbf0eaa24ec737b02a8a2d5114c3c4e5810a2c3eae3373fd341800cfb0fb35cefe04ca4da2b02a83c40126e23cdf3c817b530bbe7b431bc0b7d864e3e6dd1ab90259a8bd7ad7dd4c6366ea6da661fd016b394adcce5988fff85fbc832a927c97b89337e195f562cd284911eef1ee52e4ff033b33beedea7cf43c4d0cc0471fa91011e1e7e8733bf82c01346d6ecb49f1a84e92d063c81a7227d89be33f7273b87e29ae53a5f38dc94cf391fcb82c9432821ef1a0f6bbfe8f7d6574479a8f621e1d8f7d9bb20f3d8d469e6d232d7d7837ff12a224a65c604907e787baaf7c863ad48a5edecbe1470c20507a6ee5dee75e9ef84c71af5af800a9ce9787ebdee9e1c8189fbf66048d5c3757fb2b697ce68cfd316a7b25a385111e0cd2fddb81602e36e74c4f99b403cb304a4774e648054c0456c7869f9d97873ff80e2664c1265292941a9b767c7f40767cfccdbcaa156453d6a910fd5440f7a2bf8f4bb6d6d9fd443f2304617a684b6afa99c157dcf70e51fdb55fd0dbf5c6733841024599f8d1791a07c5dc3a4ccaf4d7c0ca3d101b2beba3a49d2378c9fe4fdb10babd95083a0c4db5a30c4490828d97efe807a13e587fbac1089843964facfd27d287262759384fe9b610f81048be430c1e8fe6327c0f2fd003021d20563ec0c7e39aec6718649c958da2e02cb3848c76924492678889c18bea02ed5ee080106e9838cbca9ad5f66c0434182225b13a236b342cf80562c10d4a3459aea17589b84904d3d2c2b", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) (async)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x5452, &(0x7f00000004c0)='\x02;\xe5\b\x00\x00\x9c\x00\x00\x00\x00\x00\x00') (async)
bpf$MAP_CREATE(0x0, 0x0, 0x0) (async)
write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) (async)
bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000001c80)=ANY=[@ANYBLOB="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"/2992], &(0x7f0000014ff5)='GPL\x00', 0x2, 0x103a, &(0x7f0000014000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2a3}, 0x48) (async)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r1, 0x3a, 0xcc0, 0xcc0, &(0x7f0000000200)="e460cdfbef2408322900119386dd6a00000000072feb311ccd3ec8a755c1e1380081ffad008036e8d50000ff010000001400000500242909880bd320d98a61a90021e9bf", 0x0, 0x401, 0x0, 0xa8, 0x0, &(0x7f00000011c0)="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", &(0x7f00000004c0)="b33620dad49cc786c86a5c5444e76c2a1ef9224fb91083d2ba4368e98a14467703e9ee585196fa95320bd53c6a76ad443b81dc833b22016aeaafb4597c06919ecf7e5ea4d0a8995feaaf9a9feb0c4b5277398049a2f5475f6ceb26bd128189f4b1b3c662d3d1630717791de0cdac3ce6e01c5719b670da5ded7dfa9dda53f04ad151cb952d708eaa69e983dcfab36b2dac3f3fe85e1d86b3d73d4879fb11cfac51f3cb669a50", 0x1, 0xfffffffd}, 0x22) (async)
21:54:54 executing program 0:
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x3, 0xad, 0x5, 0x8, 0x1, 0x80000001, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={r0, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10)
r3 = bpf$OBJ_GET_MAP(0x7, 0x0, 0x0)
r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700)
ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40086602, &(0x7f0000000180))
r5 = openat$cgroup(r4, &(0x7f00000028c0)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(r5, &(0x7f0000002900)='blkio.bfq.io_queued\x00', 0x0, 0x0)
r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)=@o_path={&(0x7f0000002880)='./file0\x00', 0x0, 0x28, r2}, 0x18)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000d80)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff}, [@cb_func={0x18, 0x5, 0x4, 0x0, 0x3}, @cb_func={0x18, 0x6, 0x4, 0x0, 0xfffffffffffffffa}, @initr0={0x18, 0x0, 0x0, 0x0, 0xf5}]}, &(0x7f0000000440)='syzkaller\x00', 0x400, 0xc7, &(0x7f0000002780)=""/199, 0x40f00, 0x12, '\x00', r1, 0x1a, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000007c0)={0x0, 0xd, 0x5}, 0x10, 0x1a2b2, r2, 0x0, &(0x7f0000000b80)=[r6, r3, 0xffffffffffffffff, r4]}, 0x90)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000026c0)={0x18, 0x2, &(0x7f0000000380)=@raw=[@map_idx={0x18, 0x6, 0x5, 0x0, 0x8}], &(0x7f0000002580)='syzkaller\x00', 0x1, 0x1000, &(0x7f0000002a00)=""/4096, 0x41100, 0x44, '\x00', r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000025c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000002600)={0x0, 0x7, 0x3, 0x9}, 0x10, 0x0, 0x0, 0x5, 0x0, &(0x7f0000002640)=[{0x2, 0x1, 0x9, 0x9}, {0x2, 0x5, 0xf, 0x4}, {0x4, 0x3, 0x8, 0x3}, {0x4, 0x3, 0x8, 0x1}, {0x4, 0x4, 0x0, 0x5}], 0x10, 0xe5}, 0x90)
openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r8, &(0x7f0000000000), 0xfdef)
recvmsg$unix(0xffffffffffffffff, &(0x7f0000002540)={&(0x7f0000000080), 0x6e, &(0x7f00000024c0)=[{&(0x7f0000000180)=""/196, 0xc4}, {&(0x7f0000000100)=""/19, 0x13}, {&(0x7f0000000280)=""/165, 0xa5}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000340)=""/21, 0x15}, {&(0x7f0000000380)}, {&(0x7f0000001440)=""/71, 0x47}, {&(0x7f00000014c0)=""/4096, 0x1000}], 0x8}, 0x2000)
openat$cgroup_ro(r8, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
openat$cgroup(r8, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0)
write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000040), 0x12)
[ 3234.069341][ T5399] FAULT_INJECTION: forcing a failure.
[ 3234.069341][ T5399] name fail_page_alloc, interval 1, probability 0, space 0, times 0
21:54:54 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x2, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000400)}, 0x82081, 0x3, 0x6, 0x5, 0x1, 0x10000, 0x7, 0x0, 0x2, 0x0, 0x5a5a027c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xfc, 0x9, 0xbe, 0x2, 0x0, 0x76, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x1, 0xffffffffffffffaf}, 0x1, 0x100000001, 0x100, 0x9, 0x6457, 0x2, 0xca9, 0x0, 0x6, 0x0, 0x1000}, 0xffffffffffffffff, 0x5, r0, 0xa)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x5, 0x0, 0x8, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
close(0xffffffffffffffff)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000200)={0x0, 0x0})
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r2, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000500), &(0x7f00000009c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10)
r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000bd7f8d1d6d7ddb3ba26cbbdd04000000000000008dfaa032d81c26cc0f9ea6812b7084424aca7b3c8310ad72ee5d946603c8d67ef98aa89dc67c65007741f0c58c7cfe5f2597f80244b2f488f39e4ade297743e9f05fc0c3cd2537327d9abc10ee1c34c48c8f6f701bf8269d20c3f6f199dd47c0f6fb0f8321f979a50ee39076b47915ca423d2400f7043052311baf66e8457529a7a047944423610becb576c1d24159f08d937ff17210c132573f0e44ac84399ba0b6d066a00b8b3bc7b07b0ac90fa08e0d06cbc32a28314b9769122ba2623cb2bb8c069d5e"], &(0x7f00000002c0)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x90)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000a00)={0x2, 0x80, 0xfb, 0x1, 0x4, 0x0, 0x0, 0x0, 0x84080, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1ff}, 0x80331, 0x9, 0xffffffff, 0x3, 0x4d4f, 0x0, 0x3f, 0x0, 0x2, 0x0, 0xffffffffffffffdf})
bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x4, 0xec, &(0x7f0000000700)=""/236, 0x40f00, 0x8, '\x00', 0x0, 0x5, r2, 0x8, &(0x7f0000000580)={0x8}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0x7, 0x0, 0xfffffffa}, 0x10, 0x0, r2, 0x0, &(0x7f0000000600)=[0xffffffffffffffff]}, 0x80)
r5 = openat$cgroup_ro(r4, &(0x7f0000000d00)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={r2, 0x20, &(0x7f0000000f40)={&(0x7f0000000dc0)=""/143, 0x8f, 0x0, &(0x7f0000000e80)=""/141, 0x8d}}, 0x10)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r8, &(0x7f0000000180)}, 0x20)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r9 = openat$cgroup_ro(r2, &(0x7f0000001400)='io.stat\x00', 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x1a, 0xf, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x20}, [@jmp={0x5, 0x1, 0x4, 0x8, 0x8, 0x20, 0x18}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x1f}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x569}, @exit, @map_idx={0x18, 0x6, 0x5, 0x0, 0x5}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc0d4}]}, &(0x7f0000001200)='GPL\x00', 0x1ff, 0xc1, &(0x7f0000001240)=""/193, 0x41100, 0x40, '\x00', r3, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000013c0)={0x5, 0xf, 0x3, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001440)=[r7, r7, r9, 0xffffffffffffffff], &(0x7f0000001480)=[{0x1, 0x3, 0xe, 0x7}], 0x10, 0x7fffffff}, 0x90)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000180)}, 0x20)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5)
bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x5, 0x11, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @call={0x85, 0x0, 0x0, 0x11}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @generic={0xc1, 0xc, 0x6, 0x4, 0x3}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0x8}, @jmp={0x5, 0x0, 0xa, 0x7, 0x7, 0xffffffffffffff9c, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @generic={0x20, 0x3, 0x4, 0x101, 0x401}]}, &(0x7f0000000cc0)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', r3, 0x22, r5, 0x8, &(0x7f0000000d40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000d80)={0x3, 0x6, 0xffffffff, 0x7ff}, 0x10, r6, r1, 0x4, &(0x7f0000000fc0)=[r4, r2, r4, r7, r4, r8, 0xffffffffffffffff], &(0x7f0000001000)=[{0x4, 0x5, 0xf, 0x5}, {0x4, 0x4, 0x8, 0x2}, {0x3, 0x3, 0x1, 0x6}, {0x0, 0x4, 0x9, 0x5}], 0x10, 0x3}, 0x90)
openat$cgroup(r2, &(0x7f0000000980)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.memory_pressure\x00', 0x0, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000100)}, 0x10)
[ 3234.154029][ T5399] CPU: 0 PID: 5399 Comm: syz-executor.1 Tainted: G B W 5.15.131-syzkaller-00653-gea586874d2f9 #0
[ 3234.165495][ T5399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[ 3234.175414][ T5399] Call Trace:
[ 3234.178514][ T5399]
[ 3234.181291][ T5399] dump_stack_lvl+0x151/0x1b7
[ 3234.185807][ T5399] ? io_uring_drop_tctx_refs+0x190/0x190
[ 3234.191283][ T5399] dump_stack+0x15/0x17
[ 3234.195267][ T5399] should_fail+0x3c6/0x510
[ 3234.199551][ T5399] should_fail_alloc_page+0x5a/0x80
[ 3234.204813][ T5399] prepare_alloc_pages+0x15c/0x700
[ 3234.209936][ T5399] ? __alloc_pages_bulk+0xe60/0xe60
[ 3234.215057][ T5399] __alloc_pages+0x138/0x5e0
[ 3234.219482][ T5399] ? prep_new_page+0x110/0x110
[ 3234.224084][ T5399] ? is_bpf_text_address+0x172/0x190
[ 3234.229201][ T5399] ? stack_trace_save+0x1c0/0x1c0
[ 3234.234088][ T5399] ? __kernel_text_address+0x9b/0x110
[ 3234.239281][ T5399] pte_alloc_one+0x73/0x1b0
[ 3234.243611][ T5399] ? pfn_modify_allowed+0x2f0/0x2f0
[ 3234.248655][ T5399] __pte_alloc+0x86/0x350
[ 3234.252810][ T5399] ? free_pgtables+0x280/0x280
[ 3234.257499][ T5399] ? _raw_spin_lock+0xa4/0x1b0
[ 3234.262097][ T5399] ? __kasan_check_write+0x14/0x20
[ 3234.267400][ T5399] copy_page_range+0x28a8/0x2f90
[ 3234.272165][ T5399] ? __kasan_slab_alloc+0xb1/0xe0
[ 3234.277027][ T5399] ? slab_post_alloc_hook+0x53/0x2c0
[ 3234.282147][ T5399] ? do_syscall_64+0x3d/0xb0
[ 3234.286693][ T5399] ? pfn_valid+0x1e0/0x1e0
[ 3234.290923][ T5399] ? rwsem_write_trylock+0x15b/0x290
[ 3234.296044][ T5399] ? vma_interval_tree_augment_rotate+0x1d0/0x1d0
[ 3234.302298][ T5399] ? vma_gap_callbacks_rotate+0x1e2/0x210
[ 3234.307850][ T5399] ? __rb_insert_augmented+0x5de/0x610
[ 3234.313151][ T5399] copy_mm+0xc7e/0x13e0
[ 3234.317140][ T5399] ? copy_signal+0x610/0x610
[ 3234.321562][ T5399] ? __init_rwsem+0xd6/0x1c0
[ 3234.325990][ T5399] ? copy_signal+0x4e3/0x610
[ 3234.330426][ T5399] copy_process+0x12bc/0x3260
[ 3234.334928][ T5399] ? proc_fail_nth_write+0x20b/0x290
[ 3234.340079][ T5399] ? fsnotify_perm+0x6a/0x5d0
[ 3234.344566][ T5399] ? pidfd_show_fdinfo+0x2b0/0x2b0
[ 3234.349513][ T5399] ? vfs_write+0x9ec/0x1110
[ 3234.353852][ T5399] kernel_clone+0x21e/0x9e0
[ 3234.358190][ T5399] ? file_end_write+0x1c0/0x1c0
[ 3234.362875][ T5399] ? create_io_thread+0x1e0/0x1e0
[ 3234.367739][ T5399] ? mutex_unlock+0xb2/0x260
[ 3234.372163][ T5399] ? __mutex_lock_slowpath+0x10/0x10
[ 3234.378083][ T5399] __x64_sys_clone+0x23f/0x290
[ 3234.382670][ T5399] ? __do_sys_vfork+0x130/0x130
[ 3234.387353][ T5399] ? ksys_write+0x260/0x2c0
[ 3234.391695][ T5399] ? debug_smp_processor_id+0x17/0x20
[ 3234.396896][ T5399] ? fpregs_assert_state_consistent+0xb6/0xe0
[ 3234.402798][ T5399] ? exit_to_user_mode_prepare+0x39/0xa0
[ 3234.408271][ T5399] do_syscall_64+0x3d/0xb0
[ 3234.412521][ T5399] entry_SYSCALL_64_after_hwframe+0x61/0xcb
[ 3234.418247][ T5399] RIP: 0033:0x7f024b55cae9
[ 3234.422513][ T5399] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[ 3234.441941][ T5399] RSP: 002b:00007f024a2df078 EFLAGS: 00000246 ORIG_RAX: 0000000000000038
21:54:54 executing program 3:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) (async)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff})
recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0)
write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) (async)
openat$cgroup_ro(r2, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
openat$cgroup_ro(r2, &(0x7f0000000100)='cgroup.events\x00', 0x0, 0x0) (async)
r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000080)='syz1\x00', 0x200002, 0x0)
openat$cgroup_ro(r3, &(0x7f0000000180)='cpuset.memory_pressure\x00', 0x0, 0x0)
mkdirat$cgroup(r0, &(0x7f0000000000)='syz1\x00', 0x1ff) (async)
r4 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0)
write$cgroup_pid(r4, &(0x7f0000000040), 0x12)
21:54:54 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x2, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000400)}, 0x82081, 0x3, 0x6, 0x5, 0x1, 0x10000, 0x7, 0x0, 0x2, 0x0, 0x5a5a027c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) (async)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xfc, 0x9, 0xbe, 0x2, 0x0, 0x76, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x1, 0xffffffffffffffaf}, 0x1, 0x100000001, 0x100, 0x9, 0x6457, 0x2, 0xca9, 0x0, 0x6, 0x0, 0x1000}, 0xffffffffffffffff, 0x5, r0, 0xa)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x5, 0x0, 0x8, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
close(0xffffffffffffffff) (async)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000200)={0x0, 0x0}) (async)
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180)) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r2, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000500), &(0x7f00000009c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) (async)
r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000bd7f8d1d6d7ddb3ba26cbbdd04000000000000008dfaa032d81c26cc0f9ea6812b7084424aca7b3c8310ad72ee5d946603c8d67ef98aa89dc67c65007741f0c58c7cfe5f2597f80244b2f488f39e4ade297743e9f05fc0c3cd2537327d9abc10ee1c34c48c8f6f701bf8269d20c3f6f199dd47c0f6fb0f8321f979a50ee39076b47915ca423d2400f7043052311baf66e8457529a7a047944423610becb576c1d24159f08d937ff17210c132573f0e44ac84399ba0b6d066a00b8b3bc7b07b0ac90fa08e0d06cbc32a28314b9769122ba2623cb2bb8c069d5e"], &(0x7f00000002c0)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x90)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000a00)={0x2, 0x80, 0xfb, 0x1, 0x4, 0x0, 0x0, 0x0, 0x84080, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1ff}, 0x80331, 0x9, 0xffffffff, 0x3, 0x4d4f, 0x0, 0x3f, 0x0, 0x2, 0x0, 0xffffffffffffffdf})
bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x4, 0xec, &(0x7f0000000700)=""/236, 0x40f00, 0x8, '\x00', 0x0, 0x5, r2, 0x8, &(0x7f0000000580)={0x8}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0x7, 0x0, 0xfffffffa}, 0x10, 0x0, r2, 0x0, &(0x7f0000000600)=[0xffffffffffffffff]}, 0x80) (async)
r5 = openat$cgroup_ro(r4, &(0x7f0000000d00)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0) (async)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={r2, 0x20, &(0x7f0000000f40)={&(0x7f0000000dc0)=""/143, 0x8f, 0x0, &(0x7f0000000e80)=""/141, 0x8d}}, 0x10) (async)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20) (async)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r8, &(0x7f0000000180)}, 0x20)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0) (async)
r9 = openat$cgroup_ro(r2, &(0x7f0000001400)='io.stat\x00', 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x1a, 0xf, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x20}, [@jmp={0x5, 0x1, 0x4, 0x8, 0x8, 0x20, 0x18}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x1f}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x569}, @exit, @map_idx={0x18, 0x6, 0x5, 0x0, 0x5}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc0d4}]}, &(0x7f0000001200)='GPL\x00', 0x1ff, 0xc1, &(0x7f0000001240)=""/193, 0x41100, 0x40, '\x00', r3, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000013c0)={0x5, 0xf, 0x3, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001440)=[r7, r7, r9, 0xffffffffffffffff], &(0x7f0000001480)=[{0x1, 0x3, 0xe, 0x7}], 0x10, 0x7fffffff}, 0x90) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000180)}, 0x20) (async)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5)
bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x5, 0x11, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @call={0x85, 0x0, 0x0, 0x11}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @generic={0xc1, 0xc, 0x6, 0x4, 0x3}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0x8}, @jmp={0x5, 0x0, 0xa, 0x7, 0x7, 0xffffffffffffff9c, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @generic={0x20, 0x3, 0x4, 0x101, 0x401}]}, &(0x7f0000000cc0)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', r3, 0x22, r5, 0x8, &(0x7f0000000d40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000d80)={0x3, 0x6, 0xffffffff, 0x7ff}, 0x10, r6, r1, 0x4, &(0x7f0000000fc0)=[r4, r2, r4, r7, r4, r8, 0xffffffffffffffff], &(0x7f0000001000)=[{0x4, 0x5, 0xf, 0x5}, {0x4, 0x4, 0x8, 0x2}, {0x3, 0x3, 0x1, 0x6}, {0x0, 0x4, 0x9, 0x5}], 0x10, 0x3}, 0x90) (async)
openat$cgroup(r2, &(0x7f0000000980)='syz0\x00', 0x200002, 0x0) (async)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.memory_pressure\x00', 0x0, 0x0) (async)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000100)}, 0x10)
21:54:54 executing program 4:
syz_clone(0x6083e00, 0x0, 0xfffffffffffffe9e, 0x0, 0x0, 0x0)
21:54:54 executing program 5:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x2, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000400)}, 0x82081, 0x3, 0x6, 0x5, 0x1, 0x10000, 0x7, 0x0, 0x2, 0x0, 0x5a5a027c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9) (async)
perf_event_open(&(0x7f0000000440)={0x0, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x2, 0xb, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000400)}, 0x82081, 0x3, 0x6, 0x5, 0x1, 0x10000, 0x7, 0x0, 0x2, 0x0, 0x5a5a027c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x9)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3) (async)
perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x3)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xfc, 0x9, 0xbe, 0x2, 0x0, 0x76, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x1, 0xffffffffffffffaf}, 0x1, 0x100000001, 0x100, 0x9, 0x6457, 0x2, 0xca9, 0x0, 0x6, 0x0, 0x1000}, 0xffffffffffffffff, 0x5, r0, 0xa) (async)
perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0xfc, 0x9, 0xbe, 0x2, 0x0, 0x76, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x1, 0xffffffffffffffaf}, 0x1, 0x100000001, 0x100, 0x9, 0x6457, 0x2, 0xca9, 0x0, 0x6, 0x0, 0x1000}, 0xffffffffffffffff, 0x5, r0, 0xa)
perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x5, 0x0, 0x8, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90) (async)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xa, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x340}, [@alu={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x0, 0x5, 0x0, 0x8, 0xfffffffffffffffe}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x90)
close(0xffffffffffffffff) (async)
close(0xffffffffffffffff)
r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000200)={0x0, 0x0})
ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, &(0x7f0000000180))
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r2, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000500), &(0x7f00000009c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10) (async)
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000bc0)={r2, 0xe0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, &(0x7f0000000040)=[0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000500), &(0x7f00000009c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000a80)}}, 0x10)
r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000540)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x3, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000bd7f8d1d6d7ddb3ba26cbbdd04000000000000008dfaa032d81c26cc0f9ea6812b7084424aca7b3c8310ad72ee5d946603c8d67ef98aa89dc67c65007741f0c58c7cfe5f2597f80244b2f488f39e4ade297743e9f05fc0c3cd2537327d9abc10ee1c34c48c8f6f701bf8269d20c3f6f199dd47c0f6fb0f8321f979a50ee39076b47915ca423d2400f7043052311baf66e8457529a7a047944423610becb576c1d24159f08d937ff17210c132573f0e44ac84399ba0b6d066a00b8b3bc7b07b0ac90fa08e0d06cbc32a28314b9769122ba2623cb2bb8c069d5e"], &(0x7f00000002c0)='GPL\x00', 0x10000, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x5}, 0x8, 0x10, 0x0}, 0x90)
ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000a00)={0x2, 0x80, 0xfb, 0x1, 0x4, 0x0, 0x0, 0x0, 0x84080, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1ff}, 0x80331, 0x9, 0xffffffff, 0x3, 0x4d4f, 0x0, 0x3f, 0x0, 0x2, 0x0, 0xffffffffffffffdf})
bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x4, 0xec, &(0x7f0000000700)=""/236, 0x40f00, 0x8, '\x00', 0x0, 0x5, r2, 0x8, &(0x7f0000000580)={0x8}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0x7, 0x0, 0xfffffffa}, 0x10, 0x0, r2, 0x0, &(0x7f0000000600)=[0xffffffffffffffff]}, 0x80)
r5 = openat$cgroup_ro(r4, &(0x7f0000000d00)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x0, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={r2, 0x20, &(0x7f0000000f40)={&(0x7f0000000dc0)=""/143, 0x8f, 0x0, &(0x7f0000000e80)=""/141, 0x8d}}, 0x10) (async)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000f80)={r2, 0x20, &(0x7f0000000f40)={&(0x7f0000000dc0)=""/143, 0x8f, 0x0, &(0x7f0000000e80)=""/141, 0x8d}}, 0x10)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20) (async)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r7, &(0x7f0000000180)}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48) (async)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x14, 0x4, 0x4, 0x15}, 0x48)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r8, &(0x7f0000000180)}, 0x20)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.freeze\x00', 0x0, 0x0)
r9 = openat$cgroup_ro(r2, &(0x7f0000001400)='io.stat\x00', 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000014c0)={0x1a, 0xf, &(0x7f0000001180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x20}, [@jmp={0x5, 0x1, 0x4, 0x8, 0x8, 0x20, 0x18}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xc}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x0, 0x1f}, @map_val={0x18, 0x9, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x569}, @exit, @map_idx={0x18, 0x6, 0x5, 0x0, 0x5}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xc0d4}]}, &(0x7f0000001200)='GPL\x00', 0x1ff, 0xc1, &(0x7f0000001240)=""/193, 0x41100, 0x40, '\x00', r3, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000001380)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000013c0)={0x5, 0xf, 0x3, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x1, &(0x7f0000001440)=[r7, r7, r9, 0xffffffffffffffff], &(0x7f0000001480)=[{0x1, 0x3, 0xe, 0x7}], 0x10, 0x7fffffff}, 0x90)
bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, &(0x7f0000000180)}, 0x20)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x5)
bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x5, 0x11, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @call={0x85, 0x0, 0x0, 0x11}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @generic={0xc1, 0xc, 0x6, 0x4, 0x3}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0x8}, @jmp={0x5, 0x0, 0xa, 0x7, 0x7, 0xffffffffffffff9c, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @generic={0x20, 0x3, 0x4, 0x101, 0x401}]}, &(0x7f0000000cc0)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', r3, 0x22, r5, 0x8, &(0x7f0000000d40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000d80)={0x3, 0x6, 0xffffffff, 0x7ff}, 0x10, r6, r1, 0x4, &(0x7f0000000fc0)=[r4, r2, r4, r7, r4, r8, 0xffffffffffffffff], &(0x7f0000001000)=[{0x4, 0x5, 0xf, 0x5}, {0x4, 0x4, 0x8, 0x2}, {0x3, 0x3, 0x1, 0x6}, {0x0, 0x4, 0x9, 0x5}], 0x10, 0x3}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x5, 0x11, &(0x7f0000000c00)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x7f}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0xa}, @call={0x85, 0x0, 0x0, 0x11}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4}, @generic={0xc1, 0xc, 0x6, 0x4, 0x3}, @cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffffc}, @map_idx={0x18, 0x8}, @jmp={0x5, 0x0, 0xa, 0x7, 0x7, 0xffffffffffffff9c, 0xfffffffffffffffc}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x2}, @generic={0x20, 0x3, 0x4, 0x101, 0x401}]}, &(0x7f0000000cc0)='GPL\x00', 0x7, 0x0, 0x0, 0x41100, 0x40, '\x00', r3, 0x22, r5, 0x8, &(0x7f0000000d40)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000d80)={0x3, 0x6, 0xffffffff, 0x7ff}, 0x10, r6, r1, 0x4, &(0x7f0000000fc0)=[r4, r2, r4, r7, r4, r8, 0xffffffffffffffff], &(0x7f0000001000)=[{0x4, 0x5, 0xf, 0x5}, {0x4, 0x4, 0x8, 0x2}, {0x3, 0x3, 0x1, 0x6}, {0x0, 0x4, 0x9, 0x5}], 0x10, 0x3}, 0x90)
openat$cgroup(r2, &(0x7f0000000980)='syz0\x00', 0x200002, 0x0)
openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='cpuset.memory_pressure\x00', 0x0, 0x0)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={0xffffffffffffffff, 0x58, &(0x7f0000000100)}, 0x10)
[ 3234.450193][ T5399] RAX: ffffffffffffffda RBX: 00007f024b67bf80 RCX: 00007f024b55cae9
[ 3234.457999][ T5399] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[ 3234.465811][ T5399] RBP: 00007f024a2df120 R08: 0000000000000000 R09: 0000000000000000
[ 3234.473623][ T5399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[ 3234.481434][ T5399] R13: 000000000000000b R14: 00007f024b67bf80 R15: 00007ffc0104bd78
[ 32