00000000000000000000007000000890b47ffffffff0a01010244048927440c4191640101000000007f8629000000030509e6729443456ed50512d662285912b3b8fe886ca76e9e6ec8e901083e195bbff90200000000140000000000000000000000010000000000010000000000"], 0x1b0}, 0x4000000) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000080)='FREEZING\x00', 0x9) (async) ioctl$PERF_EVENT_IOC_RESET(r1, 0x541b, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000940)={&(0x7f0000000900)='./file0\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x4, &(0x7f00000008c0)=@raw=[@call={0x85, 0x0, 0x0, 0x8}, @ldst={0x0, 0x1, 0x3, 0xd, 0xb, 0x2, 0xfffffffffffffffc}, @map_idx={0x18, 0x1, 0x5, 0x0, 0xb}], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000000800)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000007c0)=r2, 0x4) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0x64010102}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000100)="714992a0cc0208495f1df54b975bbc97d0687cf474f8198ad421f0b9774321e3ac98628e4e430eace7ed17a929141fae31e9824b33604696951a280d7b29177c7a238d433acf9ed97eb9371485ba049d930d3ba45304186c40bb0a6b086e6f67c3989f465479f76721a72ffe4bcca1ec94091469538607de2d38731a57a06be81132ce6e19c190a205e63980ff5820a4", 0x90}, {&(0x7f00000001c0)="13264e1f853e2513a15eab11db98f0d86104870de2a0406d18387d15f8501b56567567b02fa943a5b372a75a7ed411cb7f45fc434484373dc1dfebe42d5ec2a175f9ebff2186cbc36846139657a6e821c48d787135b43a78652c7cc4f17a0c43245a56bf7babe247886a73767401538e79dac642f2107fa7dbfe6d3ae8c89ba86bebc0275516ba4c55e225fe0e94bded622a9686dbda75b1e84fa3133281f96894839a3740547a5e1482a13f8a7b390fbb6df8d7b19ce821ad50bad4bd5c37a8961cc31d53c3f7d5452c936456b4dd9b3f16de947e2fd4a154a948fa8b294578cf96bc17fda9e66d4e44777350098c", 0xef}, {&(0x7f00000002c0)="95f2938e3b915fa3e51b5f0f8fb616b8d2b78e865c54d353080e9afb08572171bd9cdc0e562b8b9a8dad4e591a2a8f7a21f51bc93166dc51d69522ab56516e128a86d83a361eb3e4d9d95a1dc3d0b2bfe004d0d869953d0afc8dd1699e0cf87b280aa3bfcad2edb65b580dfd50bf34fc4d0091327feaacdab6f5ae3e", 0x7c}, {&(0x7f0000000340)="8f6d95531daa672c1ef5b57b3312ccd2f34e5a26b740adda7d4edb467a9167f8138fea780111c046220d940b5aec570e83b0075422fe92998f1dfc071c29955057541996b0da146423169be55841c594ae3c79a9063204cf7b174b4507eed77598250d7c71b9436ca1e82a34bf31d210383068689f208d1897ca2ca7238bd3c713a469ffeac08f96636426a4398cd8db6dc32b88adb7490d89ba6295839cd2f0e656ab3647bd70da8d57a6a1a837adab268a29dd9818c233fa0af471e7f8607f09728816c3f930b1a9f2c3292bbfbfa5f51a69b311ad5075534fc1ea8cec31ea734f830ab711e994952ba145fa58b133469bae49c8d36c3099c736f1fd", 0xfd}, {&(0x7f0000000440)="bc0930a1d29f98222af0ae45c995d59f65409d3f97c25dd9d37973898dfe9211ce3693de5ef4028cc6627b3a081b0660e412b07144c5790759b9643bf47bb0e587f5e5bb8f9a63bf16540e7613604ef0a616d0c479f8637fd79a8b9d39e7ba9f5bf12f8929ae0d033db5ff13e0b059c336c07b2336bd0f25929ff7bff2ac94fca6be0b43de5108dcbcaafcada08b1f57614be5be7a49d51237a3eea1dd494845d44474c770cf6599c75d78becd2c33eeb403aa6f2e1c039d6ef2ae5b7f4377c389ba08", 0xc3}], 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x1b0}, 0x4000000) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xe}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb}, 0x20) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0x9, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @jmp={0x5, 0x0, 0x2, 0x7, 0x6, 0x10, 0x4}], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000100), 0x40f00, 0xb, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0xd, 0x3f, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x0, &(0x7f0000004880), &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r6, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x5, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}, @ldst={0x1, 0x0, 0x5, 0x1, 0x4, 0x50, 0x6}], &(0x7f00000000c0)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0xe, 0x5, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, r1, r2, r3, r5, r7, 0x1, 0x1]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r8, 0x541b, 0x0) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200), 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async, rerun: 64) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) (async, rerun: 64) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) (async, rerun: 64) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) (rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async, rerun: 32) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r5}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x0, &(0x7f0000004880), &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r6, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x5, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}, @ldst={0x1, 0x0, 0x5, 0x1, 0x4, 0x50, 0x6}], &(0x7f00000000c0)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0xe, 0x5, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, r1, r2, r3, r5, r7, 0x1, 0x1]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r8, 0x541b, 0x0) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0x9, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @jmp={0x5, 0x0, 0x2, 0x7, 0x6, 0x10, 0x4}], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000100), 0x40f00, 0xb, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0xd, 0x3f, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x33, 0xcb, 0x1}, 0x20) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0x9, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @jmp={0x5, 0x0, 0x2, 0x7, 0x6, 0x10, 0x4}], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000100), 0x40f00, 0xb, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0xd, 0x3f, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x7, 0x9, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x10, 0x0, 0x0, 0x0, 0x2}, @map_fd={0x18, 0xa, 0x1, 0x0, r0}, @map_idx={0x18, 0x8, 0x5, 0x0, 0x8}, @jmp={0x5, 0x0, 0x2, 0x7, 0x6, 0x10, 0x4}], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x0, &(0x7f0000000100), 0x40f00, 0xb, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0xd, 0x3f, 0x8}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) (async) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200), 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x0, &(0x7f0000004880), &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r6, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x5, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}, @ldst={0x1, 0x0, 0x5, 0x1, 0x4, 0x50, 0x6}], &(0x7f00000000c0)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0xe, 0x5, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, r1, r2, r3, r5, r7, 0x1, 0x1]}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r8, 0x541b, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200), 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r5}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x0, &(0x7f0000004880), &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r6, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpu.stat\x00', 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x10, 0x5, &(0x7f0000000080)=@raw=[@map_val={0x18, 0x7, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4}, @map_fd={0x18, 0x6}, @ldst={0x1, 0x0, 0x5, 0x1, 0x4, 0x50, 0x6}], &(0x7f00000000c0)='syzkaller\x00', 0x40, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0xe, 0x5, 0x9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0x1, r1, r2, r3, r5, r7, 0x1, 0x1]}, 0x80) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r8, 0x541b, 0x0) (async) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:16 executing program 5: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x541b, 0x1ffff000) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000), 0xc) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x81) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002900)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000025c0)={&(0x7f0000002580)='afs_make_fs_call2\x00'}, 0x10) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0x0, 0x0}, 0x30) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001300)=""/204, 0xcc}, {&(0x7f0000000140)=""/123, 0x7b}, {&(0x7f0000002940)=""/174, 0xae}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f0000002a00)=""/4096, 0x1000}], 0x6, &(0x7f0000001400)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x10}}, @cred={{0x1c}}], 0xf0}, 0x20) r7 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xff, 0x1, 0x8, 0x3, 0x0, 0x1, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x40, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x18040, 0x7fffffffffffffff, 0x6, 0x7, 0x5, 0x4, 0xaa9, 0x0, 0x80000000, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) r8 = perf_event_open(&(0x7f0000001280)={0x3, 0x80, 0x3, 0x9, 0x7f, 0x7f, 0x0, 0x10001, 0x2000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x4}, 0x200, 0x20, 0x20, 0x5, 0xffffffffffff62c5, 0xba58, 0x8, 0x0, 0x8000, 0x0, 0x6e0ef10b}, r6, 0x0, r3, 0x8) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000002880)={0x13, 0x4, &(0x7f0000002680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@generic={0x6, 0xd, 0x0, 0x6, 0x100}]}, &(0x7f00000026c0)='syzkaller\x00', 0x81, 0xcc, &(0x7f0000002700)=""/204, 0x41100, 0x6, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000002800)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002840)={0x3, 0xb, 0x80, 0xeed}, 0x10, 0xffffffffffffffff, r4}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 5: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x541b, 0x1ffff000) (async) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000), 0xc) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x81) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002900)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000025c0)={&(0x7f0000002580)='afs_make_fs_call2\x00'}, 0x10) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0x0, 0x0}, 0x30) (async, rerun: 64) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001300)=""/204, 0xcc}, {&(0x7f0000000140)=""/123, 0x7b}, {&(0x7f0000002940)=""/174, 0xae}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f0000002a00)=""/4096, 0x1000}], 0x6, &(0x7f0000001400)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x10}}, @cred={{0x1c}}], 0xf0}, 0x20) (rerun: 64) r7 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xff, 0x1, 0x8, 0x3, 0x0, 0x1, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x40, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x18040, 0x7fffffffffffffff, 0x6, 0x7, 0x5, 0x4, 0xaa9, 0x0, 0x80000000, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x8) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async, rerun: 64) r8 = perf_event_open(&(0x7f0000001280)={0x3, 0x80, 0x3, 0x9, 0x7f, 0x7f, 0x0, 0x10001, 0x2000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x4}, 0x200, 0x20, 0x20, 0x5, 0xffffffffffff62c5, 0xba58, 0x8, 0x0, 0x8000, 0x0, 0x6e0ef10b}, r6, 0x0, r3, 0x8) (rerun: 64) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000002880)={0x13, 0x4, &(0x7f0000002680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@generic={0x6, 0xd, 0x0, 0x6, 0x100}]}, &(0x7f00000026c0)='syzkaller\x00', 0x81, 0xcc, &(0x7f0000002700)=""/204, 0x41100, 0x6, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000002800)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002840)={0x3, 0xb, 0x80, 0xeed}, 0x10, 0xffffffffffffffff, r4}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2d, 'freezer'}]}, 0x9) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x35, 0x0, 0x1}, 0x20) 11:51:16 executing program 5: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x541b, 0x1ffff000) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000), 0xc) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x81) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000002900)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x2) (async, rerun: 32) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000025c0)={&(0x7f0000002580)='afs_make_fs_call2\x00'}, 0x10) (async) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, r2, 0x0, 0x0, 0x0}, 0x30) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002540)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001300)=""/204, 0xcc}, {&(0x7f0000000140)=""/123, 0x7b}, {&(0x7f0000002940)=""/174, 0xae}, {&(0x7f0000000080)=""/2, 0x2}, {&(0x7f0000002a00)=""/4096, 0x1000}], 0x6, &(0x7f0000001400)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x10}}, @cred={{0x1c}}], 0xf0}, 0x20) (async) r7 = perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0xff, 0x1, 0x8, 0x3, 0x0, 0x1, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x40, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x18040, 0x7fffffffffffffff, 0x6, 0x7, 0x5, 0x4, 0xaa9, 0x0, 0x80000000, 0x0, 0x5}, r1, 0x3, 0xffffffffffffffff, 0x5) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x8) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) (async) r8 = perf_event_open(&(0x7f0000001280)={0x3, 0x80, 0x3, 0x9, 0x7f, 0x7f, 0x0, 0x10001, 0x2000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x0, 0x4}, 0x200, 0x20, 0x20, 0x5, 0xffffffffffff62c5, 0xba58, 0x8, 0x0, 0x8000, 0x0, 0x6e0ef10b}, r6, 0x0, r3, 0x8) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000002880)={0x13, 0x4, &(0x7f0000002680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@generic={0x6, 0xd, 0x0, 0x6, 0x100}]}, &(0x7f00000026c0)='syzkaller\x00', 0x81, 0xcc, &(0x7f0000002700)=""/204, 0x41100, 0x6, '\x00', 0x0, 0x0, r5, 0x8, &(0x7f0000002800)={0x3, 0x2}, 0x8, 0x10, &(0x7f0000002840)={0x3, 0xb, 0x80, 0xeed}, 0x10, 0xffffffffffffffff, r4}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2d, 'freezer'}]}, 0x9) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2d, 'freezer'}]}, 0x9) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) (async) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x35, 0x0, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x35, 0x0, 0x1}, 0x20) 11:51:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2d, 'freezer'}]}, 0x9) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2d, 'freezer'}]}, 0x9) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) (async) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='svcrdma_dma_map_rw_err\x00'}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000000080)=0x1) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000000080)=0x1) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='svcrdma_dma_map_rw_err\x00'}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='svcrdma_dma_map_rw_err\x00'}, 0x10) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) (async) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETVNETBE(r1, 0x800454df, &(0x7f0000000080)=0x1) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xba95d7d76b8aac3f) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000080)=""/140, 0x4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)=0xd0001b55) ioctl$PERF_EVENT_IOC_RESET(r2, 0x541b, 0x0) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xba95d7d76b8aac3f) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000080)=""/140, 0x4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)=0xd0001b55) (async) ioctl$PERF_EVENT_IOC_RESET(r2, 0x541b, 0x0) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='svcrdma_dma_map_rw_err\x00'}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='svcrdma_dma_map_rw_err\x00'}, 0x10) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) (async) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xba95d7d76b8aac3f) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000140)={r0, &(0x7f0000000000), &(0x7f0000000080)=""/140, 0x4}, 0x20) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000000)=0xd0001b55) (async) ioctl$PERF_EVENT_IOC_RESET(r2, 0x541b, 0x0) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x33, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) 11:51:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:16 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000240)="abee624f33918cf31b7355a100708ed0b5bb61ffc4e40d7fa78335ce8641888b4c69c33b03bc4e0e28f848dc1b5d0f39fce555ed1b3ca3b5ed"}, 0x20) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'bond_slave_0\x00'}) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x1, 0x2, 0x1}, @ldst={0x1, 0x3, 0x6, 0x8, 0x3, 0x2, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xae, &(0x7f0000000140)=""/174, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x5, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) openat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) sendmsg$sock(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="fb631671c11265bdb36afb4a8dd8a6865f483ec5500272470ed0c76b3e888a475d1ac439d6248476886ac0446d3cdf93a8552b55e3b30c9f9afc6e23f784e48f92b148aaec472f456891ab0cf2726ab1d54d29a97b5edad7b3970887ebbb760445ada95c32dbf9606ac568e2c8409a7ca98dddd98fa917b3a864a362c81964339760f9419b9624437aa6ab8fd0b3339b5b2099e46bdef9404c74490d6f0916ce8b63f48ad233308c65986ca47705bcb1364b6a900aaa7e26848db65f563e6a6a7ca968784ebb951f03510e26a169ef4eda81ff94888593d6f2ad420e9a422a8549d509aa68f4b13001", 0xe9}], 0x1, &(0x7f0000000180)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x6340}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff9}}], 0x78}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='rpcgss_svc_seqno_low\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000300)={'wg0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) sendmsg$sock(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="fb631671c11265bdb36afb4a8dd8a6865f483ec5500272470ed0c76b3e888a475d1ac439d6248476886ac0446d3cdf93a8552b55e3b30c9f9afc6e23f784e48f92b148aaec472f456891ab0cf2726ab1d54d29a97b5edad7b3970887ebbb760445ada95c32dbf9606ac568e2c8409a7ca98dddd98fa917b3a864a362c81964339760f9419b9624437aa6ab8fd0b3339b5b2099e46bdef9404c74490d6f0916ce8b63f48ad233308c65986ca47705bcb1364b6a900aaa7e26848db65f563e6a6a7ca968784ebb951f03510e26a169ef4eda81ff94888593d6f2ad420e9a422a8549d509aa68f4b13001", 0xe9}], 0x1, &(0x7f0000000180)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x6340}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff9}}], 0x78}, 0x8800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='rpcgss_svc_seqno_low\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000300)={'wg0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) (async) sendmsg$sock(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="fb631671c11265bdb36afb4a8dd8a6865f483ec5500272470ed0c76b3e888a475d1ac439d6248476886ac0446d3cdf93a8552b55e3b30c9f9afc6e23f784e48f92b148aaec472f456891ab0cf2726ab1d54d29a97b5edad7b3970887ebbb760445ada95c32dbf9606ac568e2c8409a7ca98dddd98fa917b3a864a362c81964339760f9419b9624437aa6ab8fd0b3339b5b2099e46bdef9404c74490d6f0916ce8b63f48ad233308c65986ca47705bcb1364b6a900aaa7e26848db65f563e6a6a7ca968784ebb951f03510e26a169ef4eda81ff94888593d6f2ad420e9a422a8549d509aa68f4b13001", 0xe9}], 0x1, &(0x7f0000000180)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x6340}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff9}}], 0x78}, 0x8800) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='rpcgss_svc_seqno_low\x00'}, 0x10) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000300)={'wg0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}) (async) 11:51:16 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000240)="abee624f33918cf31b7355a100708ed0b5bb61ffc4e40d7fa78335ce8641888b4c69c33b03bc4e0e28f848dc1b5d0f39fce555ed1b3ca3b5ed"}, 0x20) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'bond_slave_0\x00'}) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x1, 0x2, 0x1}, @ldst={0x1, 0x3, 0x6, 0x8, 0x3, 0x2, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xae, &(0x7f0000000140)=""/174, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x5, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) openat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) (async) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000240)="abee624f33918cf31b7355a100708ed0b5bb61ffc4e40d7fa78335ce8641888b4c69c33b03bc4e0e28f848dc1b5d0f39fce555ed1b3ca3b5ed"}, 0x20) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'bond_slave_0\x00'}) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x1, 0x2, 0x1}, @ldst={0x1, 0x3, 0x6, 0x8, 0x3, 0x2, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xae, &(0x7f0000000140)=""/174, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x5, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) openat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) (async) sendmsg$sock(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="fb631671c11265bdb36afb4a8dd8a6865f483ec5500272470ed0c76b3e888a475d1ac439d6248476886ac0446d3cdf93a8552b55e3b30c9f9afc6e23f784e48f92b148aaec472f456891ab0cf2726ab1d54d29a97b5edad7b3970887ebbb760445ada95c32dbf9606ac568e2c8409a7ca98dddd98fa917b3a864a362c81964339760f9419b9624437aa6ab8fd0b3339b5b2099e46bdef9404c74490d6f0916ce8b63f48ad233308c65986ca47705bcb1364b6a900aaa7e26848db65f563e6a6a7ca968784ebb951f03510e26a169ef4eda81ff94888593d6f2ad420e9a422a8549d509aa68f4b13001", 0xe9}], 0x1, &(0x7f0000000180)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x6340}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffff9}}], 0x78}, 0x8800) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='rpcgss_svc_seqno_low\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.current\x00', 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000300)={'wg0\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x19}}) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 4: openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000240)="abee624f33918cf31b7355a100708ed0b5bb61ffc4e40d7fa78335ce8641888b4c69c33b03bc4e0e28f848dc1b5d0f39fce555ed1b3ca3b5ed"}, 0x20) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'bond_slave_0\x00'}) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x1, 0x2, 0x1}, @ldst={0x1, 0x3, 0x6, 0x8, 0x3, 0x2, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xae, &(0x7f0000000140)=""/174, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x5, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) openat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x0) (async) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000240)="abee624f33918cf31b7355a100708ed0b5bb61ffc4e40d7fa78335ce8641888b4c69c33b03bc4e0e28f848dc1b5d0f39fce555ed1b3ca3b5ed"}, 0x20) (async) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f00000000c0)={'bond_slave_0\x00'}) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x9, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x78000000, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x1, 0x2, 0x1}, @ldst={0x1, 0x3, 0x6, 0x8, 0x3, 0x2, 0x1}]}, &(0x7f0000000200)='syzkaller\x00', 0x9, 0xae, &(0x7f0000000140)=""/174, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x5, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) openat$cgroup(r3, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) 11:51:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x8, 0x8, 0x9, 0x7f, 0x1000, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_int(r0, &(0x7f0000000100)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x1, 0x1, 0xfff, &(0x7f0000000140)=[0x0], 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x541b, 0x0) 11:51:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x8, 0x8, 0x9, 0x7f, 0x1000, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_int(r0, &(0x7f0000000100)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x1, 0x1, 0xfff, &(0x7f0000000140)=[0x0], 0x1}, 0x20) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x541b, 0x0) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x8, 0x8, 0x9, 0x7f, 0x1000, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) openat$cgroup_int(r0, &(0x7f0000000100)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x1, 0x1, 0xfff, &(0x7f0000000140)=[0x0], 0x1}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x541b, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x8, 0x8, 0x9, 0x7f, 0x1000, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x5}, 0x48) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) openat$cgroup_int(r0, &(0x7f0000000100)='blkio.throttle.write_bps_device\x00', 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r1, 0x1, 0x1, 0xfff, &(0x7f0000000140)=[0x0], 0x1}, 0x20) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) (async) ioctl$PERF_EVENT_IOC_RESET(r3, 0x541b, 0x0) (async) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x33, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x0, 0x30bcf357}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x1, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xe}]}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x34, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x33, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000180)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000180)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000180)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x1c, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000000180)=""/203, 0x32, 0xcb}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 11:51:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x5, [@union={0x1, 0x4, 0x0, 0x5, 0x1, 0x0, [{0xe, 0x5, 0x30bcf357}, {0x7, 0x5, 0x2}, {0x9, 0x2, 0x9}, {0xd, 0x2, 0x6}]}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x59, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) r1 = syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x34, 0x38, 0x3f, 0x0, 0x2, 0x88, 0xb, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x480c, 0x38, 0x8, 0x0, 0x1f, 0x6, 0x80, 0x0, 0x6, 0x0, 0x2}, r1, 0xb, 0xffffffffffffffff, 0x13) 11:51:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={0x0, &(0x7f0000000180)=""/203, 0x0, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb}, 0x20) 11:51:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) r1 = syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x34, 0x38, 0x3f, 0x0, 0x2, 0x88, 0xb, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x480c, 0x38, 0x8, 0x0, 0x1f, 0x6, 0x80, 0x0, 0x6, 0x0, 0x2}, r1, 0xb, 0xffffffffffffffff, 0x13) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x0, 0x1, 0x0, 0x5, 0x1, 0x0, [{0xe}]}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) r1 = syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x34, 0x38, 0x3f, 0x0, 0x2, 0x88, 0xb, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x480c, 0x38, 0x8, 0x0, 0x1f, 0x6, 0x80, 0x0, 0x6, 0x0, 0x2}, r1, 0xb, 0xffffffffffffffff, 0x13) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x5}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x1d, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@union={0x1, 0x1, 0x0, 0x5, 0x0, 0x0, [{0xe}]}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x35, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x30]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x0]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x0, 0x0, 0x0, 0x5, 0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:18 executing program 1: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x0, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x1}]}}, &(0x7f0000000180)=""/203, 0x26, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:18 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, 0x0, 0x28, 0x0, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x0]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: syz_clone(0x0, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 11:51:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 0: syz_clone(0x0, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb}, 0x20) 11:51:18 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x0, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb}, 0x20) 11:51:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 1) 11:51:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) 11:51:18 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x0) 11:51:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb}, 0x20) [ 1524.384080][T22334] FAULT_INJECTION: forcing a failure. [ 1524.384080][T22334] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1524.418210][T22334] CPU: 1 PID: 22334 Comm: syz-executor.5 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1524.428286][T22334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1524.438181][T22334] Call Trace: [ 1524.441303][T22334] [ 1524.444082][T22334] dump_stack_lvl+0x151/0x1b7 [ 1524.448597][T22334] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1524.453888][T22334] dump_stack+0x15/0x17 [ 1524.457882][T22334] should_fail+0x3c0/0x510 [ 1524.462133][T22334] should_fail_usercopy+0x1a/0x20 [ 1524.466992][T22334] _copy_from_user+0x20/0xd0 [ 1524.471419][T22334] __sys_bpf+0x1f6/0x750 [ 1524.475499][T22334] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1524.480707][T22334] ? debug_smp_processor_id+0x17/0x20 [ 1524.485917][T22334] __x64_sys_bpf+0x7c/0x90 [ 1524.490182][T22334] do_syscall_64+0x44/0xd0 [ 1524.494428][T22334] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1524.500155][T22334] RIP: 0033:0x7fd5baa1f5a9 [ 1524.504403][T22334] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1524.523845][T22334] RSP: 002b:00007fd5b9b93168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1524.532091][T22334] RAX: ffffffffffffffda RBX: 00007fd5bab3ff80 RCX: 00007fd5baa1f5a9 [ 1524.539988][T22334] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1524.547800][T22334] RBP: 00007fd5b9b931d0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.555612][T22334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1524.563422][T22334] R13: 00007ffff9d22fff R14: 00007fd5b9b93300 R15: 0000000000022000 [ 1524.571238][T22334] 11:51:19 executing program 0: syz_clone(0x0, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 1) 11:51:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x0) 11:51:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x28, 0xcb, 0x1}, 0x20) 11:51:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 2) 11:51:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x0) 11:51:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1524.583107][T22346] FAULT_INJECTION: forcing a failure. [ 1524.583107][T22346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1524.613248][T22350] FAULT_INJECTION: forcing a failure. [ 1524.613248][T22350] name failslab, interval 1, probability 0, space 0, times 0 [ 1524.648234][T22350] CPU: 1 PID: 22350 Comm: syz-executor.5 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1524.658312][T22350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1524.668206][T22350] Call Trace: [ 1524.671331][T22350] [ 1524.674106][T22350] dump_stack_lvl+0x151/0x1b7 [ 1524.678620][T22350] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1524.683917][T22350] ? cred_has_capability+0x2ca/0x420 [ 1524.689036][T22350] dump_stack+0x15/0x17 [ 1524.693027][T22350] should_fail+0x3c0/0x510 [ 1524.697287][T22350] ? btf_new_fd+0x11b/0x900 [ 1524.701628][T22350] __should_failslab+0x9f/0xe0 [ 1524.706220][T22350] should_failslab+0x9/0x20 [ 1524.710558][T22350] kmem_cache_alloc_trace+0x4a/0x310 [ 1524.715683][T22350] btf_new_fd+0x11b/0x900 [ 1524.719858][T22350] bpf_btf_load+0x6f/0x90 [ 1524.724011][T22350] __sys_bpf+0x514/0x750 [ 1524.728092][T22350] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1524.733307][T22350] ? debug_smp_processor_id+0x17/0x20 [ 1524.738506][T22350] __x64_sys_bpf+0x7c/0x90 [ 1524.742762][T22350] do_syscall_64+0x44/0xd0 [ 1524.747014][T22350] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1524.752742][T22350] RIP: 0033:0x7fd5baa1f5a9 [ 1524.756994][T22350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1524.776437][T22350] RSP: 002b:00007fd5b9b93168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1524.784681][T22350] RAX: ffffffffffffffda RBX: 00007fd5bab3ff80 RCX: 00007fd5baa1f5a9 [ 1524.792490][T22350] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1524.800303][T22350] RBP: 00007fd5b9b931d0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.808113][T22350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1524.815924][T22350] R13: 00007ffff9d22fff R14: 00007fd5b9b93300 R15: 0000000000022000 [ 1524.823739][T22350] [ 1524.826604][T22346] CPU: 0 PID: 22346 Comm: syz-executor.4 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1524.836670][T22346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1524.846567][T22346] Call Trace: [ 1524.849689][T22346] [ 1524.852468][T22346] dump_stack_lvl+0x151/0x1b7 [ 1524.856981][T22346] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1524.862278][T22346] dump_stack+0x15/0x17 [ 1524.866268][T22346] should_fail+0x3c0/0x510 [ 1524.870521][T22346] should_fail_usercopy+0x1a/0x20 [ 1524.875381][T22346] _copy_from_user+0x20/0xd0 [ 1524.879811][T22346] __sys_bpf+0x1f6/0x750 [ 1524.883888][T22346] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1524.889097][T22346] ? debug_smp_processor_id+0x17/0x20 [ 1524.894307][T22346] __x64_sys_bpf+0x7c/0x90 11:51:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (fail_nth: 1) [ 1524.898555][T22346] do_syscall_64+0x44/0xd0 [ 1524.902812][T22346] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1524.908536][T22346] RIP: 0033:0x7f85720d55a9 [ 1524.912791][T22346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1524.932236][T22346] RSP: 002b:00007f8571249168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1524.940474][T22346] RAX: ffffffffffffffda RBX: 00007f85721f5f80 RCX: 00007f85720d55a9 11:51:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000600)={&(0x7f0000000340)="b89788b4f629bae5425743d3786c9ac8f6ffe23e0a66a43ea26ee87c812394c6676d9f1726e302e3c4fc170cf5660be3c297c4f3d4c2b2b22c45e5f753c7f202007ffac537c03b9bcffbe648ccabce37c5068d1b9598bdca20d5f3778fc00e7c0cf637012cabb5ebfb0b8bf252a63aa43b", &(0x7f00000003c0)=""/72, &(0x7f0000000440)="03c0c6f12e212216f7a20d9cc35a4d8e3a9a9dc1e244f1e3b40d39cf7bc5de3bbf2c0d5251b41a27fcebba471ea9a2dc94785a1afc32f01ddd014c3336f54af8c025610552e949353efc798b086ae79510789a393825b40ce810dca902f65e5269aa9d95634aac69e4ddd691b522e52efc1e1ba3069d0c66f743d251540141f4b1492e", &(0x7f0000000500)="04b51b3dbde9a6af69f7076b2ce59d3070069a1bc5dc0c7860338a63c5288e4172ba95ef64adee75c0d5303d19b0e6c43176606a44c680fff552c7cc1b6611002e1f8db19975f8bc462fa58b207d4bbd8ec3f06612e8c0f6a582364c4152bf7d7936a3deba068d8e702aa615d4715529ecdcda2b504ab939e014f3f8caa17019dfc261c444ade84776e62adbdab60c59d5c76cf64f252b22690ac19839ec5c71ea7ee09808c1796952ec030624359ecfcfa5280edfa93f48c4bfe1e9221216cffd5beabda5ac2bdf078728a9e73a6180949451a7ed4e7735d68b9a2d7fc2f7ccce4817235f00bb7bf0241bdbfab87400f216a0e39d3bd9", 0xdc6, 0x1, 0x4}, 0x38) syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:19 executing program 0: syz_clone(0x10820000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") [ 1524.948286][T22346] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1524.956098][T22346] RBP: 00007f85712491d0 R08: 0000000000000000 R09: 0000000000000000 [ 1524.963914][T22346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1524.971725][T22346] R13: 00007fffb86243ff R14: 00007f8571249300 R15: 0000000000022000 [ 1524.979536][T22346] 11:51:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 3) [ 1524.999238][T22364] FAULT_INJECTION: forcing a failure. [ 1524.999238][T22364] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1525.012588][T22368] FAULT_INJECTION: forcing a failure. [ 1525.012588][T22368] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.040374][T22368] CPU: 0 PID: 22368 Comm: syz-executor.5 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1525.050542][T22368] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1525.060440][T22368] Call Trace: [ 1525.063564][T22368] [ 1525.066337][T22368] dump_stack_lvl+0x151/0x1b7 [ 1525.070853][T22368] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1525.076149][T22368] dump_stack+0x15/0x17 [ 1525.080138][T22368] should_fail+0x3c0/0x510 [ 1525.084394][T22368] ? btf_new_fd+0x28f/0x900 [ 1525.088743][T22368] __should_failslab+0x9f/0xe0 [ 1525.093337][T22368] should_failslab+0x9/0x20 [ 1525.097669][T22368] kmem_cache_alloc_trace+0x4a/0x310 [ 1525.102795][T22368] ? btf_new_fd+0x11b/0x900 [ 1525.107135][T22368] btf_new_fd+0x28f/0x900 [ 1525.111298][T22368] bpf_btf_load+0x6f/0x90 [ 1525.115463][T22368] __sys_bpf+0x514/0x750 [ 1525.119542][T22368] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1525.124838][T22368] ? debug_smp_processor_id+0x17/0x20 [ 1525.130046][T22368] __x64_sys_bpf+0x7c/0x90 [ 1525.134301][T22368] do_syscall_64+0x44/0xd0 [ 1525.138552][T22368] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1525.144277][T22368] RIP: 0033:0x7fd5baa1f5a9 [ 1525.148535][T22368] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1525.167975][T22368] RSP: 002b:00007fd5b9b93168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1525.176223][T22368] RAX: ffffffffffffffda RBX: 00007fd5bab3ff80 RCX: 00007fd5baa1f5a9 [ 1525.184031][T22368] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1525.191845][T22368] RBP: 00007fd5b9b931d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.199656][T22368] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1525.207466][T22368] R13: 00007ffff9d22fff R14: 00007fd5b9b93300 R15: 0000000000022000 [ 1525.215281][T22368] [ 1525.218162][T22364] CPU: 1 PID: 22364 Comm: syz-executor.1 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1525.228209][T22364] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1525.238108][T22364] Call Trace: [ 1525.241229][T22364] [ 1525.244024][T22364] dump_stack_lvl+0x151/0x1b7 [ 1525.248520][T22364] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1525.253815][T22364] ? __get_user_nocheck_8+0x10/0x13 [ 1525.258850][T22364] dump_stack+0x15/0x17 [ 1525.262837][T22364] should_fail+0x3c0/0x510 [ 1525.267094][T22364] should_fail_usercopy+0x1a/0x20 [ 1525.271955][T22364] _copy_to_user+0x20/0x90 [ 1525.276208][T22364] simple_read_from_buffer+0xdd/0x160 [ 1525.281415][T22364] proc_fail_nth_read+0x1af/0x220 [ 1525.286278][T22364] ? proc_fault_inject_write+0x3a0/0x3a0 [ 1525.291744][T22364] ? security_file_permission+0x497/0x5f0 [ 1525.297296][T22364] ? proc_fault_inject_write+0x3a0/0x3a0 [ 1525.302769][T22364] vfs_read+0x299/0xd80 [ 1525.306759][T22364] ? match_file+0x140/0x140 [ 1525.311098][T22364] ? kernel_read+0x1f0/0x1f0 [ 1525.315522][T22364] ? __kasan_check_write+0x14/0x20 [ 1525.320475][T22364] ? mutex_lock+0xb6/0x130 [ 1525.324724][T22364] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1525.331151][T22364] ? __fdget_pos+0x26d/0x310 [ 1525.335577][T22364] ? ksys_read+0x77/0x2c0 [ 1525.339739][T22364] ksys_read+0x198/0x2c0 [ 1525.343821][T22364] ? vfs_write+0x1050/0x1050 [ 1525.348247][T22364] ? debug_smp_processor_id+0x17/0x20 [ 1525.353453][T22364] __x64_sys_read+0x7b/0x90 [ 1525.357792][T22364] do_syscall_64+0x44/0xd0 [ 1525.362044][T22364] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1525.367771][T22364] RIP: 0033:0x7f08600542ec [ 1525.372028][T22364] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 11:51:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 2) 11:51:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x0, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:19 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 4) [ 1525.391467][T22364] RSP: 002b:00007f085f216160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1525.399713][T22364] RAX: ffffffffffffffda RBX: 00007f08601c2f80 RCX: 00007f08600542ec [ 1525.407524][T22364] RDX: 000000000000000f RSI: 00007f085f2161e0 RDI: 0000000000000005 [ 1525.415333][T22364] RBP: 00007f085f2161d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.423143][T22364] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1525.430954][T22364] R13: 00007fff4a7b3ecf R14: 00007f085f216300 R15: 0000000000022000 [ 1525.438773][T22364] 11:51:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 11:51:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:19 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:19 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:19 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2, 0x1ffff000) [ 1525.459535][T22380] FAULT_INJECTION: forcing a failure. [ 1525.459535][T22380] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.482368][T22379] FAULT_INJECTION: forcing a failure. [ 1525.482368][T22379] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.499191][T22379] CPU: 1 PID: 22379 Comm: syz-executor.4 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 11:51:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 11:51:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, 0x0, 0x29, 0x0, 0x1}, 0x20) 11:51:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x4b47, 0x1ffff000) [ 1525.509258][T22379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1525.519155][T22379] Call Trace: [ 1525.522281][T22379] [ 1525.525057][T22379] dump_stack_lvl+0x151/0x1b7 [ 1525.529570][T22379] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1525.534863][T22379] ? cred_has_capability+0x2ca/0x420 [ 1525.539988][T22379] dump_stack+0x15/0x17 [ 1525.543975][T22379] should_fail+0x3c0/0x510 [ 1525.548232][T22379] ? btf_new_fd+0x11b/0x900 [ 1525.552571][T22379] __should_failslab+0x9f/0xe0 [ 1525.557173][T22379] should_failslab+0x9/0x20 [ 1525.561510][T22379] kmem_cache_alloc_trace+0x4a/0x310 [ 1525.566733][T22379] btf_new_fd+0x11b/0x900 [ 1525.570904][T22379] bpf_btf_load+0x6f/0x90 [ 1525.575064][T22379] __sys_bpf+0x514/0x750 [ 1525.579142][T22379] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1525.584357][T22379] ? debug_smp_processor_id+0x17/0x20 [ 1525.589556][T22379] __x64_sys_bpf+0x7c/0x90 [ 1525.593814][T22379] do_syscall_64+0x44/0xd0 [ 1525.598063][T22379] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1525.603792][T22379] RIP: 0033:0x7f85720d55a9 [ 1525.608044][T22379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1525.627489][T22379] RSP: 002b:00007f8571249168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1525.635732][T22379] RAX: ffffffffffffffda RBX: 00007f85721f5f80 RCX: 00007f85720d55a9 [ 1525.643541][T22379] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1525.651355][T22379] RBP: 00007f85712491d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.659163][T22379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1525.666979][T22379] R13: 00007fffb86243ff R14: 00007f8571249300 R15: 0000000000022000 [ 1525.674795][T22379] [ 1525.677657][T22380] CPU: 0 PID: 22380 Comm: syz-executor.5 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1525.687723][T22380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1525.697619][T22380] Call Trace: [ 1525.700742][T22380] [ 1525.703521][T22380] dump_stack_lvl+0x151/0x1b7 [ 1525.708031][T22380] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1525.713411][T22380] dump_stack+0x15/0x17 [ 1525.717403][T22380] should_fail+0x3c0/0x510 [ 1525.721657][T22380] ? kvmalloc_node+0x82/0x130 [ 1525.726171][T22380] __should_failslab+0x9f/0xe0 [ 1525.730769][T22380] should_failslab+0x9/0x20 [ 1525.735110][T22380] __kmalloc+0x6d/0x350 [ 1525.739102][T22380] ? __kasan_kmalloc+0x9/0x10 [ 1525.743614][T22380] kvmalloc_node+0x82/0x130 [ 1525.747958][T22380] btf_new_fd+0x2cb/0x900 [ 1525.752130][T22380] bpf_btf_load+0x6f/0x90 [ 1525.756291][T22380] __sys_bpf+0x514/0x750 [ 1525.760368][T22380] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1525.765588][T22380] ? debug_smp_processor_id+0x17/0x20 [ 1525.770781][T22380] __x64_sys_bpf+0x7c/0x90 [ 1525.775041][T22380] do_syscall_64+0x44/0xd0 [ 1525.779289][T22380] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1525.785014][T22380] RIP: 0033:0x7fd5baa1f5a9 [ 1525.789296][T22380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 3) 11:51:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb}, 0x20) 11:51:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x4b49, 0x1ffff000) 11:51:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 5) 11:51:20 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb}, 0x20) [ 1525.808708][T22380] RSP: 002b:00007fd5b9b93168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1525.816953][T22380] RAX: ffffffffffffffda RBX: 00007fd5bab3ff80 RCX: 00007fd5baa1f5a9 [ 1525.824767][T22380] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1525.832587][T22380] RBP: 00007fd5b9b931d0 R08: 0000000000000000 R09: 0000000000000000 [ 1525.840390][T22380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1525.848202][T22380] R13: 00007ffff9d22fff R14: 00007fd5b9b93300 R15: 0000000000022000 [ 1525.856012][T22380] 11:51:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x541b, 0x1ffff000) [ 1525.879024][T22408] FAULT_INJECTION: forcing a failure. [ 1525.879024][T22408] name failslab, interval 1, probability 0, space 0, times 0 [ 1525.898294][T22408] CPU: 0 PID: 22408 Comm: syz-executor.4 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1525.908364][T22408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1525.911611][T22413] FAULT_INJECTION: forcing a failure. [ 1525.911611][T22413] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1525.918258][T22408] Call Trace: [ 1525.918270][T22408] [ 1525.918276][T22408] dump_stack_lvl+0x151/0x1b7 [ 1525.941518][T22408] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1525.946816][T22408] dump_stack+0x15/0x17 [ 1525.950804][T22408] should_fail+0x3c0/0x510 [ 1525.955080][T22408] ? btf_new_fd+0x28f/0x900 [ 1525.959395][T22408] __should_failslab+0x9f/0xe0 [ 1525.963995][T22408] should_failslab+0x9/0x20 [ 1525.968336][T22408] kmem_cache_alloc_trace+0x4a/0x310 [ 1525.973456][T22408] ? btf_new_fd+0x11b/0x900 [ 1525.977794][T22408] btf_new_fd+0x28f/0x900 [ 1525.981970][T22408] bpf_btf_load+0x6f/0x90 [ 1525.986131][T22408] __sys_bpf+0x514/0x750 [ 1525.990207][T22408] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1525.995418][T22408] ? debug_smp_processor_id+0x17/0x20 [ 1526.000624][T22408] __x64_sys_bpf+0x7c/0x90 [ 1526.004877][T22408] do_syscall_64+0x44/0xd0 [ 1526.009129][T22408] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1526.014866][T22408] RIP: 0033:0x7f85720d55a9 [ 1526.019110][T22408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1526.038553][T22408] RSP: 002b:00007f8571249168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1526.046797][T22408] RAX: ffffffffffffffda RBX: 00007f85721f5f80 RCX: 00007f85720d55a9 [ 1526.054607][T22408] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1526.062417][T22408] RBP: 00007f85712491d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.070230][T22408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.078040][T22408] R13: 00007fffb86243ff R14: 00007f8571249300 R15: 0000000000022000 [ 1526.085856][T22408] [ 1526.088718][T22413] CPU: 1 PID: 22413 Comm: syz-executor.5 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1526.098788][T22413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1526.108694][T22413] Call Trace: [ 1526.111810][T22413] [ 1526.114584][T22413] dump_stack_lvl+0x151/0x1b7 [ 1526.119097][T22413] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1526.124391][T22413] dump_stack+0x15/0x17 [ 1526.128382][T22413] should_fail+0x3c0/0x510 [ 1526.132722][T22413] should_fail_usercopy+0x1a/0x20 [ 1526.137583][T22413] _copy_from_user+0x20/0xd0 [ 1526.142013][T22413] btf_new_fd+0x35b/0x900 [ 1526.146181][T22413] bpf_btf_load+0x6f/0x90 [ 1526.150340][T22413] __sys_bpf+0x514/0x750 [ 1526.154421][T22413] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1526.159632][T22413] ? debug_smp_processor_id+0x17/0x20 [ 1526.164845][T22413] __x64_sys_bpf+0x7c/0x90 [ 1526.169095][T22413] do_syscall_64+0x44/0xd0 [ 1526.173347][T22413] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1526.179071][T22413] RIP: 0033:0x7fd5baa1f5a9 [ 1526.183325][T22413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1526.202778][T22413] RSP: 002b:00007fd5b9b93168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1526.211184][T22413] RAX: ffffffffffffffda RBX: 00007fd5bab3ff80 RCX: 00007fd5baa1f5a9 [ 1526.218993][T22413] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 11:51:20 executing program 3: syz_clone(0x10820000, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:20 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x4b47, 0x1ffff000) 11:51:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 4) 11:51:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb}, 0x20) [ 1526.226808][T22413] RBP: 00007fd5b9b931d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.234618][T22413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.242429][T22413] R13: 00007ffff9d22fff R14: 00007fd5b9b93300 R15: 0000000000022000 [ 1526.250243][T22413] [ 1526.269435][T22421] FAULT_INJECTION: forcing a failure. 11:51:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 6) 11:51:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5450, 0x1ffff000) 11:51:20 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 11:51:20 executing program 3: syz_clone(0x0, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 1) [ 1526.269435][T22421] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.285370][T22428] FAULT_INJECTION: forcing a failure. [ 1526.285370][T22428] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1526.312653][T22431] FAULT_INJECTION: forcing a failure. [ 1526.312653][T22431] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.314391][T22433] FAULT_INJECTION: forcing a failure. [ 1526.314391][T22433] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1526.338274][T22421] CPU: 0 PID: 22421 Comm: syz-executor.4 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1526.348337][T22421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1526.358232][T22421] Call Trace: [ 1526.361412][T22421] [ 1526.364135][T22421] dump_stack_lvl+0x151/0x1b7 [ 1526.368649][T22421] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1526.373942][T22421] dump_stack+0x15/0x17 [ 1526.377936][T22421] should_fail+0x3c0/0x510 [ 1526.382188][T22421] ? kvmalloc_node+0x82/0x130 [ 1526.386699][T22421] __should_failslab+0x9f/0xe0 [ 1526.391301][T22421] should_failslab+0x9/0x20 [ 1526.395639][T22421] __kmalloc+0x6d/0x350 [ 1526.399634][T22421] ? __kasan_kmalloc+0x9/0x10 [ 1526.404147][T22421] kvmalloc_node+0x82/0x130 [ 1526.408487][T22421] btf_new_fd+0x2cb/0x900 [ 1526.412658][T22421] bpf_btf_load+0x6f/0x90 [ 1526.416819][T22421] __sys_bpf+0x514/0x750 [ 1526.420895][T22421] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1526.426106][T22421] ? debug_smp_processor_id+0x17/0x20 [ 1526.431320][T22421] __x64_sys_bpf+0x7c/0x90 [ 1526.435564][T22421] do_syscall_64+0x44/0xd0 [ 1526.439827][T22421] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1526.445543][T22421] RIP: 0033:0x7f85720d55a9 [ 1526.449800][T22421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1526.469239][T22421] RSP: 002b:00007f8571249168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1526.477486][T22421] RAX: ffffffffffffffda RBX: 00007f85721f5f80 RCX: 00007f85720d55a9 [ 1526.485299][T22421] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1526.493109][T22421] RBP: 00007f85712491d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.500920][T22421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.508730][T22421] R13: 00007fffb86243ff R14: 00007f8571249300 R15: 0000000000022000 [ 1526.516548][T22421] [ 1526.519407][T22433] CPU: 1 PID: 22433 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1526.529481][T22433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1526.539374][T22433] Call Trace: [ 1526.542497][T22433] [ 1526.545273][T22433] dump_stack_lvl+0x151/0x1b7 [ 1526.549788][T22433] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1526.555090][T22433] dump_stack+0x15/0x17 [ 1526.559074][T22433] should_fail+0x3c0/0x510 [ 1526.563327][T22433] should_fail_usercopy+0x1a/0x20 [ 1526.568190][T22433] _copy_from_user+0x20/0xd0 [ 1526.572624][T22433] __sys_bpf+0x1f6/0x750 [ 1526.576692][T22433] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1526.581904][T22433] ? debug_smp_processor_id+0x17/0x20 [ 1526.587114][T22433] __x64_sys_bpf+0x7c/0x90 [ 1526.591362][T22433] do_syscall_64+0x44/0xd0 [ 1526.595612][T22433] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1526.601341][T22433] RIP: 0033:0x7fb6db8a15a9 [ 1526.605594][T22433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1526.625124][T22433] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1526.633366][T22433] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1526.641182][T22433] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1526.648991][T22433] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.656800][T22433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1526.664618][T22433] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1526.672429][T22433] [ 1526.675288][T22431] CPU: 0 PID: 22431 Comm: syz-executor.0 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1526.685357][T22431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1526.695254][T22431] Call Trace: [ 1526.698375][T22431] [ 1526.701154][T22431] dump_stack_lvl+0x151/0x1b7 [ 1526.705672][T22431] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1526.710977][T22431] ? do_handle_mm_fault+0x142f/0x2370 [ 1526.716171][T22431] dump_stack+0x15/0x17 [ 1526.720159][T22431] should_fail+0x3c0/0x510 [ 1526.724418][T22431] __should_failslab+0x9f/0xe0 [ 1526.729012][T22431] should_failslab+0x9/0x20 [ 1526.733394][T22431] kmem_cache_alloc+0x4f/0x2f0 [ 1526.737952][T22431] ? dup_task_struct+0x53/0xa60 [ 1526.742641][T22431] ? __kasan_check_write+0x14/0x20 [ 1526.747676][T22431] dup_task_struct+0x53/0xa60 [ 1526.752187][T22431] ? __kasan_check_write+0x14/0x20 [ 1526.757135][T22431] copy_process+0x579/0x3250 [ 1526.761565][T22431] ? __kasan_check_write+0x14/0x20 [ 1526.766506][T22431] ? proc_fail_nth_write+0x213/0x290 [ 1526.771631][T22431] ? proc_fail_nth_read+0x220/0x220 [ 1526.776669][T22431] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1526.781609][T22431] ? vfs_write+0x9af/0x1050 [ 1526.786037][T22431] ? vmacache_update+0xb7/0x120 [ 1526.790724][T22431] kernel_clone+0x22d/0x990 [ 1526.795063][T22431] ? file_end_write+0x1b0/0x1b0 [ 1526.799750][T22431] ? __kasan_check_write+0x14/0x20 [ 1526.804699][T22431] ? create_io_thread+0x1e0/0x1e0 [ 1526.809559][T22431] ? __mutex_lock_slowpath+0x10/0x10 [ 1526.814681][T22431] __x64_sys_clone+0x289/0x310 [ 1526.819281][T22431] ? __do_sys_vfork+0x130/0x130 [ 1526.823967][T22431] ? debug_smp_processor_id+0x17/0x20 [ 1526.829177][T22431] do_syscall_64+0x44/0xd0 [ 1526.833515][T22431] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1526.839244][T22431] RIP: 0033:0x7f7940de95a9 [ 1526.843502][T22431] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1526.862938][T22431] RSP: 002b:00007f793ff5d118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1526.871183][T22431] RAX: ffffffffffffffda RBX: 00007f7940f09f80 RCX: 00007f7940de95a9 [ 1526.876446][T22440] FAULT_INJECTION: forcing a failure. [ 1526.876446][T22440] name failslab, interval 1, probability 0, space 0, times 0 [ 1526.878991][T22431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1526.879008][T22431] RBP: 00007f793ff5d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1526.879019][T22431] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1526.879029][T22431] R13: 00007fff0883edef R14: 00007f793ff5d300 R15: 0000000000022000 [ 1526.879046][T22431] 11:51:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 2) [ 1526.925516][T22440] CPU: 1 PID: 22440 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1526.935586][T22440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1526.945479][T22440] Call Trace: [ 1526.948603][T22440] [ 1526.951382][T22440] dump_stack_lvl+0x151/0x1b7 [ 1526.955895][T22440] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1526.961201][T22440] ? cred_has_capability+0x2ca/0x420 [ 1526.966309][T22440] dump_stack+0x15/0x17 [ 1526.970306][T22440] should_fail+0x3c0/0x510 [ 1526.974554][T22440] ? btf_new_fd+0x11b/0x900 [ 1526.978894][T22440] __should_failslab+0x9f/0xe0 [ 1526.983497][T22440] should_failslab+0x9/0x20 [ 1526.987834][T22440] kmem_cache_alloc_trace+0x4a/0x310 [ 1526.992957][T22440] btf_new_fd+0x11b/0x900 [ 1526.997124][T22440] bpf_btf_load+0x6f/0x90 [ 1527.001291][T22440] __sys_bpf+0x514/0x750 [ 1527.005369][T22440] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1527.010576][T22440] ? debug_smp_processor_id+0x17/0x20 [ 1527.015778][T22440] __x64_sys_bpf+0x7c/0x90 [ 1527.020030][T22440] do_syscall_64+0x44/0xd0 [ 1527.024284][T22440] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1527.030011][T22440] RIP: 0033:0x7fb6db8a15a9 [ 1527.034266][T22440] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1527.053708][T22440] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1527.061954][T22440] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1527.069764][T22440] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 11:51:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5451, 0x1ffff000) 11:51:21 executing program 3: syz_clone(0x0, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) (fail_nth: 5) 11:51:21 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) [ 1527.077584][T22440] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1527.085386][T22440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1527.093309][T22440] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1527.101163][T22440] 11:51:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 3) [ 1527.132495][T22445] FAULT_INJECTION: forcing a failure. [ 1527.132495][T22445] name failslab, interval 1, probability 0, space 0, times 0 [ 1527.141072][T22428] CPU: 1 PID: 22428 Comm: syz-executor.5 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1527.148223][T22446] FAULT_INJECTION: forcing a failure. [ 1527.148223][T22446] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1527.154984][T22428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1527.154999][T22428] Call Trace: [ 1527.155006][T22428] [ 1527.155014][T22428] dump_stack_lvl+0x151/0x1b7 [ 1527.188141][T22428] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1527.193437][T22428] dump_stack+0x15/0x17 [ 1527.197420][T22428] should_fail+0x3c0/0x510 [ 1527.201679][T22428] should_fail_usercopy+0x1a/0x20 [ 1527.206533][T22428] _copy_from_user+0x20/0xd0 [ 1527.210963][T22428] btf_new_fd+0x35b/0x900 [ 1527.215131][T22428] bpf_btf_load+0x6f/0x90 [ 1527.219306][T22428] __sys_bpf+0x514/0x750 [ 1527.223373][T22428] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1527.228583][T22428] ? debug_smp_processor_id+0x17/0x20 [ 1527.233788][T22428] __x64_sys_bpf+0x7c/0x90 [ 1527.238041][T22428] do_syscall_64+0x44/0xd0 [ 1527.242293][T22428] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1527.248031][T22428] RIP: 0033:0x7fd5baa1f5a9 [ 1527.252279][T22428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1527.271720][T22428] RSP: 002b:00007fd5b9b93168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1527.280743][T22428] RAX: ffffffffffffffda RBX: 00007fd5bab3ff80 RCX: 00007fd5baa1f5a9 [ 1527.288554][T22428] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1527.296364][T22428] RBP: 00007fd5b9b931d0 R08: 0000000000000000 R09: 0000000000000000 [ 1527.304262][T22428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1527.312075][T22428] R13: 00007ffff9d22fff R14: 00007fd5b9b93300 R15: 0000000000022000 [ 1527.319892][T22428] [ 1527.322751][T22445] CPU: 0 PID: 22445 Comm: syz-executor.0 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1527.332861][T22452] FAULT_INJECTION: forcing a failure. [ 1527.332861][T22452] name failslab, interval 1, probability 0, space 0, times 0 [ 1527.332908][T22445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1527.355307][T22445] Call Trace: [ 1527.358425][T22445] [ 1527.361204][T22445] dump_stack_lvl+0x151/0x1b7 [ 1527.365715][T22445] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1527.371008][T22445] ? __kasan_slab_alloc+0xc4/0xe0 [ 1527.375867][T22445] ? kmem_cache_alloc+0x189/0x2f0 [ 1527.380729][T22445] dump_stack+0x15/0x17 [ 1527.384723][T22445] should_fail+0x3c0/0x510 [ 1527.388975][T22445] ? __get_vm_area_node+0x13a/0x380 [ 1527.394182][T22445] __should_failslab+0x9f/0xe0 [ 1527.398783][T22445] should_failslab+0x9/0x20 [ 1527.403120][T22445] kmem_cache_alloc_trace+0x4a/0x310 [ 1527.408244][T22445] __get_vm_area_node+0x13a/0x380 [ 1527.413103][T22445] __vmalloc_node_range+0xda/0x800 [ 1527.418054][T22445] ? copy_process+0x579/0x3250 [ 1527.422653][T22445] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1527.427511][T22445] ? dup_task_struct+0x53/0xa60 [ 1527.432197][T22445] dup_task_struct+0x61f/0xa60 [ 1527.436796][T22445] ? copy_process+0x579/0x3250 [ 1527.441397][T22445] ? __kasan_check_write+0x14/0x20 [ 1527.446346][T22445] copy_process+0x579/0x3250 [ 1527.450773][T22445] ? __kasan_check_write+0x14/0x20 [ 1527.455727][T22445] ? proc_fail_nth_write+0x213/0x290 [ 1527.460842][T22445] ? proc_fail_nth_read+0x220/0x220 [ 1527.465879][T22445] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1527.470820][T22445] ? vfs_write+0x9af/0x1050 [ 1527.475160][T22445] ? vmacache_update+0xb7/0x120 [ 1527.479849][T22445] kernel_clone+0x22d/0x990 [ 1527.484195][T22445] ? file_end_write+0x1b0/0x1b0 [ 1527.488876][T22445] ? __kasan_check_write+0x14/0x20 [ 1527.493821][T22445] ? create_io_thread+0x1e0/0x1e0 [ 1527.498681][T22445] ? __mutex_lock_slowpath+0x10/0x10 [ 1527.503804][T22445] __x64_sys_clone+0x289/0x310 [ 1527.508403][T22445] ? __do_sys_vfork+0x130/0x130 [ 1527.513090][T22445] ? debug_smp_processor_id+0x17/0x20 [ 1527.518299][T22445] do_syscall_64+0x44/0xd0 [ 1527.522549][T22445] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1527.528282][T22445] RIP: 0033:0x7f7940de95a9 [ 1527.532545][T22445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1527.551978][T22445] RSP: 002b:00007f793ff5d118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1527.560232][T22445] RAX: ffffffffffffffda RBX: 00007f7940f09f80 RCX: 00007f7940de95a9 [ 1527.568057][T22445] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1527.575840][T22445] RBP: 00007f793ff5d1d0 R08: 0000000000000000 R09: 0000000000000000 11:51:21 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5452, 0x1ffff000) [ 1527.583652][T22445] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1527.591464][T22445] R13: 00007fff0883edef R14: 00007f793ff5d300 R15: 0000000000022000 [ 1527.599288][T22445] [ 1527.602141][T22452] CPU: 1 PID: 22452 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1527.612210][T22452] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1527.622102][T22452] Call Trace: [ 1527.625225][T22452] [ 1527.628002][T22452] dump_stack_lvl+0x151/0x1b7 [ 1527.632517][T22452] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1527.637814][T22452] dump_stack+0x15/0x17 [ 1527.641809][T22452] should_fail+0x3c0/0x510 [ 1527.646058][T22452] ? btf_new_fd+0x28f/0x900 [ 1527.650394][T22452] __should_failslab+0x9f/0xe0 [ 1527.654995][T22452] should_failslab+0x9/0x20 [ 1527.659334][T22452] kmem_cache_alloc_trace+0x4a/0x310 [ 1527.664455][T22452] ? btf_new_fd+0x11b/0x900 [ 1527.668795][T22452] btf_new_fd+0x28f/0x900 [ 1527.672965][T22452] bpf_btf_load+0x6f/0x90 [ 1527.677259][T22452] __sys_bpf+0x514/0x750 [ 1527.681331][T22452] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1527.686545][T22452] ? debug_smp_processor_id+0x17/0x20 [ 1527.691747][T22452] __x64_sys_bpf+0x7c/0x90 [ 1527.696006][T22452] do_syscall_64+0x44/0xd0 [ 1527.700256][T22452] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1527.705983][T22452] RIP: 0033:0x7fb6db8a15a9 [ 1527.710239][T22452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1527.729684][T22452] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1527.737918][T22452] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1527.745736][T22452] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1527.753545][T22452] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1527.761352][T22452] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1527.769165][T22452] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1527.776978][T22452] [ 1527.786660][T22445] syz-executor.0: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 1527.801979][T22446] CPU: 1 PID: 22446 Comm: syz-executor.4 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1527.812029][T22446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1527.821921][T22446] Call Trace: [ 1527.825044][T22446] [ 1527.827828][T22446] dump_stack_lvl+0x151/0x1b7 [ 1527.832345][T22446] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1527.837629][T22446] dump_stack+0x15/0x17 [ 1527.841632][T22446] should_fail+0x3c0/0x510 [ 1527.845876][T22446] should_fail_usercopy+0x1a/0x20 [ 1527.850735][T22446] _copy_from_user+0x20/0xd0 [ 1527.855163][T22446] btf_new_fd+0x35b/0x900 [ 1527.859328][T22446] bpf_btf_load+0x6f/0x90 [ 1527.863504][T22446] __sys_bpf+0x514/0x750 [ 1527.867583][T22446] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1527.872783][T22446] ? debug_smp_processor_id+0x17/0x20 [ 1527.877988][T22446] __x64_sys_bpf+0x7c/0x90 [ 1527.882250][T22446] do_syscall_64+0x44/0xd0 [ 1527.886495][T22446] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1527.892262][T22446] RIP: 0033:0x7f85720d55a9 [ 1527.896476][T22446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1527.915918][T22446] RSP: 002b:00007f8571249168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1527.924173][T22446] RAX: ffffffffffffffda RBX: 00007f85721f5f80 RCX: 00007f85720d55a9 11:51:22 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:22 executing program 3: syz_clone(0x0, &(0x7f0000000100)="98454af63a42ae332bb6f965d1411b5dcb3985e676886965fc727654649d5f0ed74473b79fe064ade474d092ede78e4236f868e731c67cf4d492a7ba308816af351beba90d4584c36a0ad07e83d14a6df94dfa276dae0b37b56f8bfe7741fd48af53cca3dc58e1e8cf6fc4e95669f9f439b881cdd6dd34c8716cf3d9f43765c53afbfe641268c6316ec1fab07156d835ac", 0x91, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5460, 0x1ffff000) [ 1527.931996][T22446] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1527.939795][T22446] RBP: 00007f85712491d0 R08: 0000000000000000 R09: 0000000000000000 [ 1527.947596][T22446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1527.955411][T22446] R13: 00007fffb86243ff R14: 00007f8571249300 R15: 0000000000022000 [ 1527.963222][T22446] [ 1527.971828][T22445] CPU: 1 PID: 22445 Comm: syz-executor.0 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1527.981898][T22445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1527.991795][T22445] Call Trace: [ 1527.994926][T22445] [ 1527.997694][T22445] dump_stack_lvl+0x151/0x1b7 [ 1528.002212][T22445] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1528.007502][T22445] ? pr_cont_kernfs_name+0xe6/0x100 [ 1528.012537][T22445] dump_stack+0x15/0x17 [ 1528.016528][T22445] warn_alloc+0x242/0x3d0 [ 1528.020696][T22445] ? zone_watermark_ok_safe+0x280/0x280 [ 1528.026079][T22445] ? __get_vm_area_node+0x36a/0x380 [ 1528.031120][T22445] __vmalloc_node_range+0x2be/0x800 [ 1528.036146][T22445] ? dup_task_struct+0x53/0xa60 [ 1528.040921][T22445] dup_task_struct+0x61f/0xa60 [ 1528.045518][T22445] ? copy_process+0x579/0x3250 [ 1528.050117][T22445] ? __kasan_check_write+0x14/0x20 [ 1528.055062][T22445] copy_process+0x579/0x3250 [ 1528.059488][T22445] ? __kasan_check_write+0x14/0x20 [ 1528.064435][T22445] ? proc_fail_nth_write+0x213/0x290 [ 1528.069555][T22445] ? proc_fail_nth_read+0x220/0x220 [ 1528.074677][T22445] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1528.079626][T22445] ? vfs_write+0x9af/0x1050 [ 1528.083963][T22445] ? vmacache_update+0xb7/0x120 [ 1528.088653][T22445] kernel_clone+0x22d/0x990 [ 1528.092989][T22445] ? file_end_write+0x1b0/0x1b0 [ 1528.097678][T22445] ? __kasan_check_write+0x14/0x20 [ 1528.102627][T22445] ? create_io_thread+0x1e0/0x1e0 [ 1528.107484][T22445] ? __mutex_lock_slowpath+0x10/0x10 [ 1528.112606][T22445] __x64_sys_clone+0x289/0x310 [ 1528.117207][T22445] ? __do_sys_vfork+0x130/0x130 [ 1528.121900][T22445] ? debug_smp_processor_id+0x17/0x20 [ 1528.127102][T22445] do_syscall_64+0x44/0xd0 [ 1528.131355][T22445] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1528.137081][T22445] RIP: 0033:0x7f7940de95a9 [ 1528.141338][T22445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1528.160775][T22445] RSP: 002b:00007f793ff5d118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1528.169020][T22445] RAX: ffffffffffffffda RBX: 00007f7940f09f80 RCX: 00007f7940de95a9 [ 1528.176834][T22445] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 4) 11:51:22 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x40049409, 0x1ffff000) [ 1528.184645][T22445] RBP: 00007f793ff5d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.192454][T22445] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1528.200268][T22445] R13: 00007fff0883edef R14: 00007f793ff5d300 R15: 0000000000022000 [ 1528.208081][T22445] 11:51:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:22 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:22 executing program 4: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1528.230293][T22445] Mem-Info: [ 1528.233346][T22445] active_anon:9416 inactive_anon:13012 isolated_anon:0 [ 1528.233346][T22445] active_file:5408 inactive_file:9995 isolated_file:0 [ 1528.233346][T22445] unevictable:0 dirty:27 writeback:0 [ 1528.233346][T22445] slab_reclaimable:15696 slab_unreclaimable:74063 [ 1528.233346][T22445] mapped:28585 shmem:9483 pagetables:609 bounce:0 [ 1528.233346][T22445] kernel_misc_reclaimable:0 [ 1528.233346][T22445] free:1541428 free_pcp:22682 free_cma:0 [ 1528.274931][T22471] FAULT_INJECTION: forcing a failure. [ 1528.274931][T22471] name failslab, interval 1, probability 0, space 0, times 0 [ 1528.290172][T22471] CPU: 1 PID: 22471 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1528.300244][T22471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1528.310139][T22471] Call Trace: [ 1528.313268][T22471] [ 1528.316045][T22471] dump_stack_lvl+0x151/0x1b7 [ 1528.320553][T22471] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1528.325847][T22471] dump_stack+0x15/0x17 [ 1528.329837][T22471] should_fail+0x3c0/0x510 [ 1528.334106][T22471] ? kvmalloc_node+0x82/0x130 [ 1528.338605][T22471] __should_failslab+0x9f/0xe0 [ 1528.343209][T22471] should_failslab+0x9/0x20 [ 1528.347543][T22471] __kmalloc+0x6d/0x350 [ 1528.348240][T22445] Node 0 active_anon:37664kB inactive_anon:52148kB active_file:21632kB inactive_file:39880kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:118340kB dirty:4608kB writeback:0kB shmem:37932kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4524kB pagetables:2436kB all_unreclaimable? no [ 1528.351532][T22471] ? __kasan_kmalloc+0x9/0x10 [ 1528.351553][T22471] kvmalloc_node+0x82/0x130 [ 1528.391120][T22471] btf_new_fd+0x2cb/0x900 [ 1528.395284][T22471] bpf_btf_load+0x6f/0x90 [ 1528.397433][T22445] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2982432kB mlocked:0kB bounce:0kB free_pcp:5708kB local_pcp:3880kB free_cma:0kB [ 1528.399444][T22471] __sys_bpf+0x514/0x750 [ 1528.399464][T22471] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1528.399481][T22471] ? debug_smp_processor_id+0x17/0x20 [ 1528.426949][T22445] lowmem_reserve[]: [ 1528.430601][T22471] __x64_sys_bpf+0x7c/0x90 [ 1528.430622][T22471] do_syscall_64+0x44/0xd0 [ 1528.436020][T22445] 0 [ 1528.441015][T22471] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1528.441038][T22471] RIP: 0033:0x7fb6db8a15a9 [ 1528.441052][T22471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1528.441082][T22471] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 [ 1528.444932][T22445] 3941 [ 1528.449100][T22471] ORIG_RAX: 0000000000000141 [ 1528.449116][T22471] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1528.449129][T22471] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1528.453614][T22445] 3941 [ 1528.455692][T22471] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1528.455706][T22471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1528.461632][T22445] [ 1528.465663][T22471] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1528.465683][T22471] [ 1528.485371][T22445] Normal free:3188964kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:37664kB inactive_anon:52048kB active_file:21632kB inactive_file:39980kB unevictable:0kB writepending:4640kB present:5242880kB managed:4035848kB mlocked:0kB bounce:0kB free_pcp:85032kB local_pcp:32244kB free_cma:0kB [ 1528.574227][T22445] lowmem_reserve[]: 0 0 0 [ 1528.578678][T22445] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 1528.594013][T22445] Normal: 3180*4kB (UME) 5541*8kB (UME) 3213*16kB (UME) 1267*32kB (UME) 385*64kB (UME) 47*128kB (UME) 4*256kB (ME) 5*512kB (E) 1*1024kB (M) 2*2048kB (UM) 734*4096kB (M) = 3194824kB [ 1528.611903][T22445] 23756 total pagecache pages [ 1528.616430][T22445] 0 pages in swap cache [ 1528.620594][T22445] Swap cache stats: add 0, delete 0, find 0/0 [ 1528.626484][T22445] Free swap = 0kB 11:51:23 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:23 executing program 3: syz_clone(0x10820000, 0x0, 0x0, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x40086602, 0x1ffff000) 11:51:23 executing program 4: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 5) 11:51:23 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x40087602, 0x1ffff000) 11:51:23 executing program 4: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1528.630091][T22445] Total swap = 0kB [ 1528.633573][T22445] 2097051 pages RAM [ 1528.637220][T22445] 0 pages HighMem/MovableOnly [ 1528.641800][T22445] 342481 pages reserved [ 1528.645723][T22445] 0 pages cma reserved [ 1528.669500][T22485] FAULT_INJECTION: forcing a failure. [ 1528.669500][T22485] name fail_usercopy, interval 1, probability 0, space 0, times 0 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x401c5820, 0x1ffff000) 11:51:23 executing program 4: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1528.694797][T22485] CPU: 0 PID: 22485 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1528.705398][T22485] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1528.715301][T22485] Call Trace: [ 1528.718417][T22485] [ 1528.721195][T22485] dump_stack_lvl+0x151/0x1b7 [ 1528.725710][T22485] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1528.731001][T22485] dump_stack+0x15/0x17 [ 1528.735002][T22485] should_fail+0x3c0/0x510 [ 1528.739247][T22485] should_fail_usercopy+0x1a/0x20 11:51:23 executing program 4: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x4020940d, 0x1ffff000) 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 0: syz_clone(0x10820002, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1528.744105][T22485] _copy_from_user+0x20/0xd0 [ 1528.748533][T22485] btf_new_fd+0x35b/0x900 [ 1528.752744][T22485] bpf_btf_load+0x6f/0x90 [ 1528.756880][T22485] __sys_bpf+0x514/0x750 [ 1528.760947][T22485] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1528.766158][T22485] ? debug_smp_processor_id+0x17/0x20 [ 1528.771360][T22485] __x64_sys_bpf+0x7c/0x90 [ 1528.775618][T22485] do_syscall_64+0x44/0xd0 [ 1528.779870][T22485] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1528.785590][T22485] RIP: 0033:0x7fb6db8a15a9 [ 1528.789846][T22485] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1528.809286][T22485] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1528.817533][T22485] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1528.825480][T22485] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1528.833287][T22485] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 11:51:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 6) 11:51:23 executing program 0: syz_clone(0x10820004, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:23 executing program 4: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x80086601, 0x1ffff000) 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 0: syz_clone(0x10820007, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:23 executing program 4: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1528.841145][T22485] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1528.848909][T22485] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1528.856723][T22485] [ 1528.883104][T22522] FAULT_INJECTION: forcing a failure. 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x80087601, 0x1ffff000) 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 0: syz_clone(0x10820008, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x801c581f, 0x1ffff000) [ 1528.883104][T22522] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1528.900480][T22522] CPU: 0 PID: 22522 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1528.910553][T22522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1528.920446][T22522] Call Trace: [ 1528.923575][T22522] [ 1528.926350][T22522] dump_stack_lvl+0x151/0x1b7 [ 1528.930864][T22522] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1528.936159][T22522] dump_stack+0x15/0x17 [ 1528.940149][T22522] should_fail+0x3c0/0x510 [ 1528.944408][T22522] should_fail_usercopy+0x1a/0x20 [ 1528.949267][T22522] _copy_to_user+0x20/0x90 [ 1528.953515][T22522] bpf_verifier_vlog+0x1a1/0x330 [ 1528.958291][T22522] __btf_verifier_log+0xd1/0x120 [ 1528.963066][T22522] ? btf_parse_hdr+0x2c7/0x7e0 [ 1528.967664][T22522] ? btf_check_sec_info+0x500/0x500 [ 1528.972696][T22522] ? btf_parse_hdr+0x1e9/0x7e0 [ 1528.977292][T22522] ? memcpy+0x56/0x70 [ 1528.981111][T22522] btf_parse_hdr+0x31d/0x7e0 [ 1528.985538][T22522] btf_new_fd+0x3e8/0x900 [ 1528.989818][T22522] bpf_btf_load+0x6f/0x90 [ 1528.993995][T22522] __sys_bpf+0x514/0x750 [ 1528.998076][T22522] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1529.003284][T22522] ? debug_smp_processor_id+0x17/0x20 [ 1529.008489][T22522] __x64_sys_bpf+0x7c/0x90 [ 1529.012742][T22522] do_syscall_64+0x44/0xd0 [ 1529.016996][T22522] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1529.022724][T22522] RIP: 0033:0x7fb6db8a15a9 [ 1529.027106][T22522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1529.046796][T22522] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1529.055039][T22522] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1529.062850][T22522] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1529.070668][T22522] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.078475][T22522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1529.086296][T22522] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 11:51:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 7) 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 0: syz_clone(0x10820009, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:23 executing program 4: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 3: syz_clone(0x10820002, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0xc0045878, 0x1ffff000) 11:51:23 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0xc0045878, 0x1ffff000) [ 1529.094100][T22522] [ 1529.112882][T22545] FAULT_INJECTION: forcing a failure. [ 1529.112882][T22545] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1529.127175][T22545] CPU: 0 PID: 22545 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 4: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000240)="a7f400ff72da91e84ab39b62b25d1bcbae44538138b4683d0dce96e4268c1c271f0921b1ff8e22a7d81af01b2ab3a455ffac178e5e0fbd325d9e4f9a8fa68dfde4fb88aaee8c0dc746f7284c7e1a8a0112f4eef8291b1c0455aab7fbd2ca6bcde0a35ff8a8123c2fe9c2d95c2daa4b1c68f0d4eb2d6ba3041c0628be94a8940a3a4f241178fac6c971501bdf9ca76a36ffbf6548b030c0ea9f7964cf0a5e3bc9bfdc7d7961ec008b9b2939eb2028be712cf78ac3f1a9bdc22847931cc79d19a26653c2339b7044cb5348ede0305ef760084bbce8") 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:23 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) [ 1529.137242][T22545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1529.147143][T22545] Call Trace: [ 1529.150264][T22545] [ 1529.153044][T22545] dump_stack_lvl+0x151/0x1b7 [ 1529.157554][T22545] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1529.162852][T22545] dump_stack+0x15/0x17 [ 1529.166841][T22545] should_fail+0x3c0/0x510 [ 1529.171095][T22545] should_fail_usercopy+0x1a/0x20 [ 1529.175962][T22545] _copy_to_user+0x20/0x90 [ 1529.180212][T22545] bpf_verifier_vlog+0x1a1/0x330 [ 1529.184984][T22545] __btf_verifier_log+0xd1/0x120 [ 1529.189756][T22545] ? bpf_verifier_vlog+0x1ae/0x330 [ 1529.194704][T22545] ? btf_check_sec_info+0x500/0x500 [ 1529.198670][T22567] FAULT_INJECTION: forcing a failure. [ 1529.198670][T22567] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.199735][T22545] ? btf_parse_hdr+0x1e9/0x7e0 [ 1529.199761][T22545] ? memcpy+0x56/0x70 [ 1529.220568][T22545] btf_parse_hdr+0x349/0x7e0 [ 1529.225000][T22545] btf_new_fd+0x3e8/0x900 [ 1529.229158][T22545] bpf_btf_load+0x6f/0x90 [ 1529.233325][T22545] __sys_bpf+0x514/0x750 [ 1529.237405][T22545] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1529.242610][T22545] ? debug_smp_processor_id+0x17/0x20 [ 1529.247815][T22545] __x64_sys_bpf+0x7c/0x90 [ 1529.252069][T22545] do_syscall_64+0x44/0xd0 [ 1529.256322][T22545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1529.262049][T22545] RIP: 0033:0x7fb6db8a15a9 [ 1529.266303][T22545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1529.285745][T22545] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1529.293992][T22545] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1529.301801][T22545] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1529.309612][T22545] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.317451][T22545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1529.325242][T22545] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1529.333051][T22545] [ 1529.335912][T22567] CPU: 1 PID: 22567 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1529.345983][T22567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1529.355878][T22567] Call Trace: [ 1529.356422][T22572] FAULT_INJECTION: forcing a failure. [ 1529.356422][T22572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1529.358998][T22567] [ 1529.359008][T22567] dump_stack_lvl+0x151/0x1b7 [ 1529.359032][T22567] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1529.359050][T22567] ? do_handle_mm_fault+0x142f/0x2370 [ 1529.389642][T22567] dump_stack+0x15/0x17 [ 1529.393630][T22567] should_fail+0x3c0/0x510 [ 1529.397886][T22567] __should_failslab+0x9f/0xe0 [ 1529.402482][T22567] should_failslab+0x9/0x20 [ 1529.406821][T22567] kmem_cache_alloc+0x4f/0x2f0 [ 1529.411422][T22567] ? dup_task_struct+0x53/0xa60 [ 1529.416109][T22567] ? __kasan_check_write+0x14/0x20 [ 1529.421058][T22567] dup_task_struct+0x53/0xa60 [ 1529.425573][T22567] ? __kasan_check_write+0x14/0x20 [ 1529.430518][T22567] copy_process+0x579/0x3250 [ 1529.434942][T22567] ? __kasan_check_write+0x14/0x20 [ 1529.439891][T22567] ? proc_fail_nth_write+0x213/0x290 [ 1529.445013][T22567] ? proc_fail_nth_read+0x220/0x220 [ 1529.450047][T22567] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1529.454994][T22567] ? vfs_write+0x9af/0x1050 [ 1529.459333][T22567] ? vmacache_update+0xb7/0x120 [ 1529.464021][T22567] kernel_clone+0x22d/0x990 [ 1529.468381][T22567] ? file_end_write+0x1b0/0x1b0 [ 1529.473047][T22567] ? __kasan_check_write+0x14/0x20 [ 1529.477992][T22567] ? create_io_thread+0x1e0/0x1e0 [ 1529.482855][T22567] ? __mutex_lock_slowpath+0x10/0x10 [ 1529.487977][T22567] __x64_sys_clone+0x289/0x310 [ 1529.492583][T22567] ? __do_sys_vfork+0x130/0x130 11:51:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 8) 11:51:23 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1529.497261][T22567] ? debug_smp_processor_id+0x17/0x20 [ 1529.502468][T22567] do_syscall_64+0x44/0xd0 [ 1529.506731][T22567] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1529.512451][T22567] RIP: 0033:0x7f65e6eb55a9 [ 1529.516702][T22567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1529.536147][T22567] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1529.544393][T22567] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1529.552200][T22567] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1529.560019][T22567] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.567825][T22567] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1529.575633][T22567] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1529.583449][T22567] [ 1529.586311][T22572] CPU: 0 PID: 22572 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1529.596383][T22572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1529.606273][T22572] Call Trace: [ 1529.609396][T22572] [ 1529.612193][T22572] dump_stack_lvl+0x151/0x1b7 [ 1529.616690][T22572] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1529.621982][T22572] dump_stack+0x15/0x17 [ 1529.625975][T22572] should_fail+0x3c0/0x510 [ 1529.630230][T22572] should_fail_usercopy+0x1a/0x20 [ 1529.635090][T22572] _copy_to_user+0x20/0x90 [ 1529.639340][T22572] bpf_verifier_vlog+0x1a1/0x330 [ 1529.644113][T22572] __btf_verifier_log+0xd1/0x120 [ 1529.648887][T22572] ? bpf_verifier_vlog+0x1ae/0x330 [ 1529.653835][T22572] ? btf_check_sec_info+0x500/0x500 [ 1529.658869][T22572] ? btf_parse_hdr+0x1e9/0x7e0 [ 1529.663469][T22572] ? memcpy+0x56/0x70 [ 1529.667287][T22572] btf_parse_hdr+0x375/0x7e0 [ 1529.671716][T22572] btf_new_fd+0x3e8/0x900 [ 1529.675882][T22572] bpf_btf_load+0x6f/0x90 [ 1529.680049][T22572] __sys_bpf+0x514/0x750 [ 1529.684128][T22572] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1529.689337][T22572] ? debug_smp_processor_id+0x17/0x20 [ 1529.694542][T22572] __x64_sys_bpf+0x7c/0x90 [ 1529.698882][T22572] do_syscall_64+0x44/0xd0 [ 1529.703135][T22572] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1529.708896][T22572] RIP: 0033:0x7fb6db8a15a9 [ 1529.713116][T22572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1529.732569][T22572] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1529.740803][T22572] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 11:51:24 executing program 0: syz_clone(0x1082000f, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:24 executing program 4: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:24 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 9) 11:51:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0xc0189436, 0x1ffff000) 11:51:24 executing program 4: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0xc020660b, 0x1ffff000) 11:51:24 executing program 0: syz_clone(0x10820041, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:24 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1529.748611][T22572] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1529.756425][T22572] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1529.764235][T22572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1529.772049][T22572] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1529.779870][T22572] 11:51:24 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 2) 11:51:24 executing program 4: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff010) 11:51:24 executing program 0: syz_clone(0x10820700, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:24 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1529.846156][T22587] FAULT_INJECTION: forcing a failure. [ 1529.846156][T22587] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1529.859493][T22587] CPU: 0 PID: 22587 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1529.869555][T22587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1529.877707][T22600] FAULT_INJECTION: forcing a failure. [ 1529.877707][T22600] name failslab, interval 1, probability 0, space 0, times 0 [ 1529.879448][T22587] Call Trace: [ 1529.879459][T22587] [ 1529.879465][T22587] dump_stack_lvl+0x151/0x1b7 [ 1529.879492][T22587] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1529.907572][T22587] dump_stack+0x15/0x17 [ 1529.911557][T22587] should_fail+0x3c0/0x510 [ 1529.915812][T22587] should_fail_usercopy+0x1a/0x20 [ 1529.920673][T22587] _copy_to_user+0x20/0x90 [ 1529.924924][T22587] bpf_verifier_vlog+0x1a1/0x330 [ 1529.929697][T22587] __btf_verifier_log+0xd1/0x120 [ 1529.934472][T22587] ? bpf_verifier_vlog+0x1ae/0x330 [ 1529.939421][T22587] ? btf_check_sec_info+0x500/0x500 [ 1529.944456][T22587] ? btf_parse_hdr+0x1e9/0x7e0 [ 1529.949053][T22587] ? memcpy+0x56/0x70 [ 1529.952873][T22587] btf_parse_hdr+0x3a4/0x7e0 [ 1529.957303][T22587] btf_new_fd+0x3e8/0x900 [ 1529.961465][T22587] bpf_btf_load+0x6f/0x90 [ 1529.965632][T22587] __sys_bpf+0x514/0x750 [ 1529.969712][T22587] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1529.974919][T22587] ? debug_smp_processor_id+0x17/0x20 [ 1529.980125][T22587] __x64_sys_bpf+0x7c/0x90 [ 1529.984378][T22587] do_syscall_64+0x44/0xd0 [ 1529.988633][T22587] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1529.994362][T22587] RIP: 0033:0x7fb6db8a15a9 [ 1529.998612][T22587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1530.018054][T22587] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1530.026299][T22587] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1530.034112][T22587] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1530.041923][T22587] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.049733][T22587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1530.057546][T22587] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1530.065358][T22587] [ 1530.068223][T22600] CPU: 1 PID: 22600 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1530.078293][T22600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1530.088187][T22600] Call Trace: [ 1530.091310][T22600] 11:51:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x20000000) [ 1530.094091][T22600] dump_stack_lvl+0x151/0x1b7 [ 1530.098602][T22600] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1530.103902][T22600] ? __kasan_slab_alloc+0xc4/0xe0 [ 1530.108756][T22600] ? kmem_cache_alloc+0x189/0x2f0 [ 1530.113616][T22600] dump_stack+0x15/0x17 [ 1530.117609][T22600] should_fail+0x3c0/0x510 [ 1530.121861][T22600] ? __get_vm_area_node+0x13a/0x380 [ 1530.126891][T22600] __should_failslab+0x9f/0xe0 [ 1530.131492][T22600] should_failslab+0x9/0x20 [ 1530.135831][T22600] kmem_cache_alloc_trace+0x4a/0x310 [ 1530.140974][T22600] __get_vm_area_node+0x13a/0x380 [ 1530.145813][T22600] __vmalloc_node_range+0xda/0x800 [ 1530.150760][T22600] ? copy_process+0x579/0x3250 [ 1530.155363][T22600] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1530.160229][T22600] ? dup_task_struct+0x53/0xa60 [ 1530.164908][T22600] dup_task_struct+0x61f/0xa60 [ 1530.169505][T22600] ? copy_process+0x579/0x3250 [ 1530.174108][T22600] ? __kasan_check_write+0x14/0x20 [ 1530.179054][T22600] copy_process+0x579/0x3250 [ 1530.183490][T22600] ? __kasan_check_write+0x14/0x20 [ 1530.188445][T22600] ? proc_fail_nth_write+0x213/0x290 [ 1530.193551][T22600] ? proc_fail_nth_read+0x220/0x220 [ 1530.198596][T22600] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1530.203532][T22600] ? vfs_write+0x9af/0x1050 [ 1530.207874][T22600] ? vmacache_update+0xb7/0x120 [ 1530.212557][T22600] kernel_clone+0x22d/0x990 [ 1530.216906][T22600] ? file_end_write+0x1b0/0x1b0 [ 1530.221583][T22600] ? __kasan_check_write+0x14/0x20 [ 1530.226544][T22600] ? create_io_thread+0x1e0/0x1e0 [ 1530.231392][T22600] ? __mutex_lock_slowpath+0x10/0x10 [ 1530.236517][T22600] __x64_sys_clone+0x289/0x310 [ 1530.241116][T22600] ? __do_sys_vfork+0x130/0x130 [ 1530.245801][T22600] ? debug_smp_processor_id+0x17/0x20 [ 1530.251016][T22600] do_syscall_64+0x44/0xd0 [ 1530.255261][T22600] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1530.260985][T22600] RIP: 0033:0x7f65e6eb55a9 [ 1530.265259][T22600] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1530.284680][T22600] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 10) 11:51:24 executing program 4: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x21000000) 11:51:24 executing program 0: syz_clone(0x10820900, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1530.292925][T22600] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1530.300739][T22600] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1530.308548][T22600] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.316363][T22600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1530.324172][T22600] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1530.332015][T22600] 11:51:24 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:24 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 3) 11:51:24 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0xff600000) 11:51:24 executing program 0: syz_clone(0x10820f00, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:24 executing program 4: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1530.357831][T22615] FAULT_INJECTION: forcing a failure. [ 1530.357831][T22615] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1530.377399][T22615] CPU: 1 PID: 22615 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1530.387472][T22615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1530.397320][T22618] FAULT_INJECTION: forcing a failure. 11:51:24 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1530.397320][T22618] name failslab, interval 1, probability 0, space 0, times 0 [ 1530.397362][T22615] Call Trace: [ 1530.412901][T22615] [ 1530.415677][T22615] dump_stack_lvl+0x151/0x1b7 [ 1530.420191][T22615] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1530.425489][T22615] dump_stack+0x15/0x17 [ 1530.429569][T22615] should_fail+0x3c0/0x510 [ 1530.433817][T22615] should_fail_usercopy+0x1a/0x20 [ 1530.438673][T22615] _copy_to_user+0x20/0x90 [ 1530.442927][T22615] bpf_verifier_vlog+0x1a1/0x330 [ 1530.447702][T22615] __btf_verifier_log+0xd1/0x120 [ 1530.452476][T22615] ? bpf_verifier_vlog+0x1ae/0x330 [ 1530.457423][T22615] ? btf_check_sec_info+0x500/0x500 [ 1530.462458][T22615] ? btf_parse_hdr+0x1e9/0x7e0 [ 1530.467057][T22615] ? memcpy+0x56/0x70 [ 1530.470877][T22615] btf_parse_hdr+0x3cf/0x7e0 [ 1530.475304][T22615] btf_new_fd+0x3e8/0x900 [ 1530.479469][T22615] bpf_btf_load+0x6f/0x90 [ 1530.483642][T22615] __sys_bpf+0x514/0x750 [ 1530.487715][T22615] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1530.492926][T22615] ? debug_smp_processor_id+0x17/0x20 [ 1530.498130][T22615] __x64_sys_bpf+0x7c/0x90 [ 1530.502383][T22615] do_syscall_64+0x44/0xd0 [ 1530.506635][T22615] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1530.512364][T22615] RIP: 0033:0x7fb6db8a15a9 [ 1530.516616][T22615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1530.536056][T22615] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1530.544302][T22615] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1530.552115][T22615] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1530.559933][T22615] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.567738][T22615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1530.575553][T22615] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1530.583363][T22615] [ 1530.586227][T22618] CPU: 0 PID: 22618 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1530.596296][T22618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1530.606279][T22618] Call Trace: [ 1530.609403][T22618] [ 1530.612178][T22618] dump_stack_lvl+0x151/0x1b7 [ 1530.616693][T22618] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1530.621995][T22618] ? __get_vm_area_node+0x13a/0x380 [ 1530.624771][T22631] FAULT_INJECTION: forcing a failure. [ 1530.624771][T22631] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1530.627017][T22618] ? ____kasan_kmalloc+0xee/0x110 [ 1530.627042][T22618] ? ____kasan_kmalloc+0xdc/0x110 [ 1530.649586][T22618] dump_stack+0x15/0x17 [ 1530.653577][T22618] should_fail+0x3c0/0x510 11:51:25 executing program 0: syz_clone(0x10821f00, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 11) [ 1530.657832][T22618] __should_failslab+0x9f/0xe0 [ 1530.662432][T22618] should_failslab+0x9/0x20 [ 1530.666771][T22618] kmem_cache_alloc+0x4f/0x2f0 [ 1530.671373][T22618] ? alloc_vmap_area+0x19a/0x1a90 [ 1530.676229][T22618] alloc_vmap_area+0x19a/0x1a90 [ 1530.680927][T22618] ? vm_map_ram+0xa80/0xa80 [ 1530.685254][T22618] ? __kasan_kmalloc+0x9/0x10 [ 1530.689788][T22618] ? __get_vm_area_node+0x13a/0x380 [ 1530.694805][T22618] __get_vm_area_node+0x17b/0x380 [ 1530.699665][T22618] __vmalloc_node_range+0xda/0x800 [ 1530.704614][T22618] ? copy_process+0x579/0x3250 [ 1530.709219][T22618] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1530.714070][T22618] ? dup_task_struct+0x53/0xa60 [ 1530.718760][T22618] dup_task_struct+0x61f/0xa60 [ 1530.723363][T22618] ? copy_process+0x579/0x3250 [ 1530.727960][T22618] ? __kasan_check_write+0x14/0x20 [ 1530.732910][T22618] copy_process+0x579/0x3250 [ 1530.737338][T22618] ? __kasan_check_write+0x14/0x20 [ 1530.742280][T22618] ? proc_fail_nth_write+0x213/0x290 [ 1530.747403][T22618] ? proc_fail_nth_read+0x220/0x220 [ 1530.752437][T22618] ? pidfd_show_fdinfo+0x2b0/0x2b0 11:51:25 executing program 0: syz_clone(0x10822000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1530.757381][T22618] ? vfs_write+0x9af/0x1050 [ 1530.761723][T22618] ? vmacache_update+0xb7/0x120 [ 1530.766409][T22618] kernel_clone+0x22d/0x990 [ 1530.770748][T22618] ? file_end_write+0x1b0/0x1b0 [ 1530.775456][T22618] ? __kasan_check_write+0x14/0x20 [ 1530.780381][T22618] ? create_io_thread+0x1e0/0x1e0 [ 1530.785242][T22618] ? __mutex_lock_slowpath+0x10/0x10 [ 1530.790366][T22618] __x64_sys_clone+0x289/0x310 [ 1530.794968][T22618] ? __do_sys_vfork+0x130/0x130 [ 1530.799655][T22618] ? debug_smp_processor_id+0x17/0x20 [ 1530.804862][T22618] do_syscall_64+0x44/0xd0 11:51:25 executing program 0: syz_clone(0x10823f00, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1530.809113][T22618] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1530.814841][T22618] RIP: 0033:0x7f65e6eb55a9 [ 1530.819092][T22618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1530.838536][T22618] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1530.846778][T22618] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:25 executing program 0: syz_clone(0x10824000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1530.854593][T22618] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1530.862403][T22618] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1530.870214][T22618] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1530.878027][T22618] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1530.885838][T22618] [ 1530.888700][T22631] CPU: 1 PID: 22631 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1530.898773][T22631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1530.908667][T22631] Call Trace: [ 1530.911787][T22631] [ 1530.914562][T22631] dump_stack_lvl+0x151/0x1b7 [ 1530.919079][T22631] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1530.924374][T22631] dump_stack+0x15/0x17 [ 1530.928362][T22631] should_fail+0x3c0/0x510 [ 1530.932616][T22631] should_fail_usercopy+0x1a/0x20 [ 1530.937475][T22631] _copy_to_user+0x20/0x90 [ 1530.941732][T22631] bpf_verifier_vlog+0x1a1/0x330 [ 1530.946505][T22631] __btf_verifier_log+0xd1/0x120 [ 1530.951277][T22631] ? bpf_verifier_vlog+0x1ae/0x330 [ 1530.956226][T22631] ? btf_check_sec_info+0x500/0x500 [ 1530.961259][T22631] ? btf_parse_hdr+0x1e9/0x7e0 [ 1530.965863][T22631] ? memcpy+0x56/0x70 [ 1530.969678][T22631] btf_parse_hdr+0x3fa/0x7e0 [ 1530.974105][T22631] btf_new_fd+0x3e8/0x900 [ 1530.978271][T22631] bpf_btf_load+0x6f/0x90 [ 1530.982435][T22631] __sys_bpf+0x514/0x750 [ 1530.986515][T22631] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1530.991727][T22631] ? debug_smp_processor_id+0x17/0x20 [ 1530.996931][T22631] __x64_sys_bpf+0x7c/0x90 [ 1531.001183][T22631] do_syscall_64+0x44/0xd0 [ 1531.005436][T22631] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1531.011163][T22631] RIP: 0033:0x7fb6db8a15a9 [ 1531.015418][T22631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1531.034860][T22631] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1531.043103][T22631] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1531.050915][T22631] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 11:51:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x7f085f617000) 11:51:25 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:25 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 4) 11:51:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x7f085f817000) 11:51:25 executing program 4: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1531.058726][T22631] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1531.066540][T22631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1531.074351][T22631] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1531.082164][T22631] 11:51:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0xffffffffff600000) 11:51:25 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 12) 11:51:25 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:25 executing program 0: syz_clone(0x10824100, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:25 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:25 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1531.105753][T22648] FAULT_INJECTION: forcing a failure. [ 1531.105753][T22648] name failslab, interval 1, probability 0, space 0, times 0 [ 1531.127627][T22656] FAULT_INJECTION: forcing a failure. [ 1531.127627][T22656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1531.138971][T22648] CPU: 1 PID: 22648 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 11:51:25 executing program 4: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:25 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1531.150546][T22648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1531.160442][T22648] Call Trace: [ 1531.163565][T22648] [ 1531.166343][T22648] dump_stack_lvl+0x151/0x1b7 [ 1531.170857][T22648] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1531.176151][T22648] ? _raw_spin_lock+0xa3/0x1b0 [ 1531.180752][T22648] ? mntput+0x5c/0xc0 [ 1531.184569][T22648] dump_stack+0x15/0x17 [ 1531.188562][T22648] should_fail+0x3c0/0x510 [ 1531.192814][T22648] __should_failslab+0x9f/0xe0 [ 1531.197417][T22648] should_failslab+0x9/0x20 [ 1531.201754][T22648] kmem_cache_alloc+0x4f/0x2f0 [ 1531.206352][T22648] ? create_user_ns+0x59f/0x19b0 [ 1531.211129][T22648] create_user_ns+0x59f/0x19b0 [ 1531.215727][T22648] ? utsns_owner+0x40/0x40 [ 1531.219977][T22648] ? security_prepare_creds+0x149/0x160 [ 1531.225358][T22648] ? prepare_creds+0x485/0x690 [ 1531.229959][T22648] copy_creds+0x200/0x640 [ 1531.234127][T22648] copy_process+0x775/0x3250 [ 1531.238554][T22648] ? __kasan_check_write+0x14/0x20 [ 1531.243497][T22648] ? proc_fail_nth_write+0x213/0x290 [ 1531.248621][T22648] ? proc_fail_nth_read+0x220/0x220 [ 1531.253655][T22648] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1531.258603][T22648] ? vfs_write+0x9af/0x1050 [ 1531.262945][T22648] ? vmacache_update+0xb7/0x120 [ 1531.267628][T22648] kernel_clone+0x22d/0x990 [ 1531.271968][T22648] ? file_end_write+0x1b0/0x1b0 [ 1531.276652][T22648] ? __kasan_check_write+0x14/0x20 [ 1531.281608][T22648] ? create_io_thread+0x1e0/0x1e0 [ 1531.286460][T22648] ? __mutex_lock_slowpath+0x10/0x10 [ 1531.291591][T22648] __x64_sys_clone+0x289/0x310 [ 1531.296574][T22648] ? __do_sys_vfork+0x130/0x130 [ 1531.301217][T22648] ? debug_smp_processor_id+0x17/0x20 [ 1531.306433][T22648] do_syscall_64+0x44/0xd0 [ 1531.310676][T22648] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1531.316416][T22648] RIP: 0033:0x7f65e6eb55a9 [ 1531.320659][T22648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1531.340101][T22648] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1531.348346][T22648] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1531.356157][T22648] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1531.363968][T22648] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1531.371781][T22648] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1531.379599][T22648] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1531.387407][T22648] [ 1531.390270][T22656] CPU: 0 PID: 22656 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 11:51:25 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 5) 11:51:25 executing program 4: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:25 executing program 5: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:25 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x8) 11:51:25 executing program 5: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1531.400338][T22656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1531.410234][T22656] Call Trace: [ 1531.413359][T22656] [ 1531.416136][T22656] dump_stack_lvl+0x151/0x1b7 [ 1531.420648][T22656] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1531.422261][T22676] FAULT_INJECTION: forcing a failure. [ 1531.422261][T22676] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1531.425969][T22656] dump_stack+0x15/0x17 [ 1531.425995][T22656] should_fail+0x3c0/0x510 [ 1531.447214][T22656] should_fail_usercopy+0x1a/0x20 [ 1531.452068][T22656] _copy_to_user+0x20/0x90 [ 1531.456320][T22656] bpf_verifier_vlog+0x1a1/0x330 [ 1531.461090][T22656] __btf_verifier_log+0xd1/0x120 [ 1531.465866][T22656] ? bpf_verifier_vlog+0x1ae/0x330 [ 1531.470811][T22656] ? btf_check_sec_info+0x500/0x500 [ 1531.475848][T22656] ? btf_parse_hdr+0x1e9/0x7e0 [ 1531.480447][T22656] ? memcpy+0x56/0x70 [ 1531.484271][T22656] btf_parse_hdr+0x425/0x7e0 [ 1531.488759][T22656] btf_new_fd+0x3e8/0x900 [ 1531.492856][T22656] bpf_btf_load+0x6f/0x90 [ 1531.497024][T22656] __sys_bpf+0x514/0x750 [ 1531.501103][T22656] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1531.506312][T22656] __x64_sys_bpf+0x7c/0x90 [ 1531.510565][T22656] do_syscall_64+0x44/0xd0 [ 1531.514820][T22656] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1531.520542][T22656] RIP: 0033:0x7fb6db8a15a9 [ 1531.524799][T22656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1531.544241][T22656] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1531.552487][T22656] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1531.560295][T22656] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1531.568105][T22656] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1531.575916][T22656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1531.583734][T22656] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1531.591547][T22656] [ 1531.594407][T22676] CPU: 1 PID: 22676 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1531.604567][T22676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1531.614461][T22676] Call Trace: [ 1531.617580][T22676] [ 1531.619601][T22684] FAULT_INJECTION: forcing a failure. [ 1531.619601][T22684] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1531.620356][T22676] dump_stack_lvl+0x151/0x1b7 [ 1531.637725][T22676] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1531.643015][T22676] ? stack_trace_save+0x12d/0x1f0 [ 1531.647872][T22676] ? is_bpf_text_address+0x1a2/0x1c0 [ 1531.652993][T22676] dump_stack+0x15/0x17 [ 1531.656996][T22676] should_fail+0x3c0/0x510 [ 1531.661240][T22676] should_fail_alloc_page+0x58/0x70 [ 1531.666274][T22676] __alloc_pages+0x1de/0x7c0 [ 1531.670696][T22676] ? kmem_cache_alloc+0x189/0x2f0 [ 1531.675561][T22676] ? __x64_sys_clone+0x289/0x310 [ 1531.680330][T22676] ? __count_vm_events+0x30/0x30 [ 1531.685106][T22676] __get_free_pages+0xe/0x30 [ 1531.689532][T22676] kasan_populate_vmalloc_pte+0x39/0x130 [ 1531.694999][T22676] ? __apply_to_page_range+0x8a5/0xb90 [ 1531.700296][T22676] __apply_to_page_range+0x8b8/0xb90 [ 1531.705509][T22676] ? kasan_populate_vmalloc+0x70/0x70 [ 1531.710710][T22676] ? kasan_populate_vmalloc+0x70/0x70 [ 1531.715921][T22676] apply_to_page_range+0x3b/0x50 [ 1531.720694][T22676] kasan_populate_vmalloc+0x65/0x70 [ 1531.725724][T22676] alloc_vmap_area+0x1946/0x1a90 [ 1531.730501][T22676] ? vm_map_ram+0xa80/0xa80 [ 1531.734835][T22676] ? __kasan_kmalloc+0x9/0x10 [ 1531.739359][T22676] ? __get_vm_area_node+0x13a/0x380 [ 1531.744391][T22676] __get_vm_area_node+0x17b/0x380 [ 1531.749253][T22676] __vmalloc_node_range+0xda/0x800 [ 1531.754192][T22676] ? copy_process+0x579/0x3250 [ 1531.758800][T22676] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1531.763655][T22676] ? dup_task_struct+0x53/0xa60 [ 1531.768342][T22676] dup_task_struct+0x61f/0xa60 [ 1531.772940][T22676] ? copy_process+0x579/0x3250 [ 1531.777538][T22676] ? __kasan_check_write+0x14/0x20 [ 1531.782487][T22676] copy_process+0x579/0x3250 [ 1531.786917][T22676] ? __kasan_check_write+0x14/0x20 [ 1531.791862][T22676] ? proc_fail_nth_write+0x213/0x290 [ 1531.796993][T22676] ? proc_fail_nth_read+0x220/0x220 [ 1531.802018][T22676] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1531.806962][T22676] ? vfs_write+0x9af/0x1050 [ 1531.811306][T22676] ? vmacache_update+0xb7/0x120 [ 1531.815990][T22676] kernel_clone+0x22d/0x990 [ 1531.820328][T22676] ? file_end_write+0x1b0/0x1b0 [ 1531.825015][T22676] ? __kasan_check_write+0x14/0x20 [ 1531.829963][T22676] ? create_io_thread+0x1e0/0x1e0 [ 1531.834947][T22676] ? __mutex_lock_slowpath+0x10/0x10 [ 1531.840062][T22676] __x64_sys_clone+0x289/0x310 [ 1531.844666][T22676] ? __do_sys_vfork+0x130/0x130 [ 1531.849349][T22676] ? debug_smp_processor_id+0x17/0x20 [ 1531.854560][T22676] do_syscall_64+0x44/0xd0 [ 1531.858810][T22676] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1531.864538][T22676] RIP: 0033:0x7f65e6eb55a9 [ 1531.868789][T22676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1531.888234][T22676] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1531.896474][T22676] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 13) 11:51:26 executing program 5: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1531.904288][T22676] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1531.912101][T22676] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1531.919910][T22676] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1531.927728][T22676] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1531.935538][T22676] [ 1531.938400][T22684] CPU: 0 PID: 22684 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1531.948467][T22684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1531.958361][T22684] Call Trace: [ 1531.961486][T22684] [ 1531.964263][T22684] dump_stack_lvl+0x151/0x1b7 [ 1531.968775][T22684] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1531.974070][T22684] dump_stack+0x15/0x17 [ 1531.978062][T22684] should_fail+0x3c0/0x510 [ 1531.982318][T22684] should_fail_usercopy+0x1a/0x20 [ 1531.987173][T22684] _copy_to_user+0x20/0x90 [ 1531.991429][T22684] bpf_verifier_vlog+0x1a1/0x330 [ 1531.996201][T22684] __btf_verifier_log+0xd1/0x120 [ 1532.000975][T22684] ? bpf_verifier_vlog+0x1ae/0x330 [ 1532.005922][T22684] ? btf_check_sec_info+0x500/0x500 [ 1532.010956][T22684] ? btf_parse_hdr+0x1e9/0x7e0 [ 1532.015558][T22684] ? memcpy+0x56/0x70 [ 1532.019374][T22684] btf_parse_hdr+0x450/0x7e0 [ 1532.023802][T22684] btf_new_fd+0x3e8/0x900 [ 1532.027969][T22684] bpf_btf_load+0x6f/0x90 [ 1532.032136][T22684] __sys_bpf+0x514/0x750 [ 1532.036216][T22684] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1532.041425][T22684] ? debug_smp_processor_id+0x17/0x20 [ 1532.046630][T22684] __x64_sys_bpf+0x7c/0x90 [ 1532.050883][T22684] do_syscall_64+0x44/0xd0 [ 1532.055133][T22684] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1532.060863][T22684] RIP: 0033:0x7fb6db8a15a9 [ 1532.065117][T22684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1532.084556][T22684] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1532.092806][T22684] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1532.100616][T22684] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 11:51:26 executing program 0: syz_clone(0x10820000, 0x0, 0x2, 0x0, 0x0, 0x0) 11:51:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x8) (async) 11:51:26 executing program 5: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:26 executing program 4: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:26 executing program 4: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1532.108511][T22684] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.116322][T22684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1532.124134][T22684] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1532.131952][T22684] 11:51:26 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 6) 11:51:26 executing program 0: syz_clone(0x10820000, 0x0, 0x4, 0x0, 0x0, 0x0) 11:51:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 14) 11:51:26 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x8) (async) 11:51:26 executing program 5: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:26 executing program 4: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:26 executing program 5: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:26 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x0, 0x8}, 0xc) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r6}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r7, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x9, &(0x7f0000000080)=@raw=[@ldst={0x3, 0x2, 0x3, 0x6, 0x0, 0xfffffffffffffff4, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xf}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @generic={0xfa, 0x6, 0x4, 0x1, 0x2}, @ldst={0x2, 0x2, 0x3, 0x0, 0x0, 0x40, 0xd946c0209732c6ae}], &(0x7f0000000000)='GPL\x00', 0xa6f0, 0xca, &(0x7f0000000100)=""/202, 0x41100, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x4, 0x2, 0x7e4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, r0, r2, 0xffffffffffffffff, r3, r5, r6]}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r8, 0x5421, 0x1ffff000) [ 1532.184204][T22708] FAULT_INJECTION: forcing a failure. [ 1532.184204][T22708] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1532.201817][T22708] CPU: 0 PID: 22708 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1532.210389][T22710] FAULT_INJECTION: forcing a failure. [ 1532.210389][T22710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1532.211884][T22708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1532.234633][T22708] Call Trace: [ 1532.237751][T22708] [ 1532.240528][T22708] dump_stack_lvl+0x151/0x1b7 [ 1532.245042][T22708] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1532.250336][T22708] dump_stack+0x15/0x17 [ 1532.254327][T22708] should_fail+0x3c0/0x510 [ 1532.258581][T22708] should_fail_alloc_page+0x58/0x70 [ 1532.263613][T22708] __alloc_pages+0x1de/0x7c0 [ 1532.268040][T22708] ? __count_vm_events+0x30/0x30 [ 1532.272814][T22708] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1532.278022][T22708] __get_free_pages+0xe/0x30 [ 1532.282451][T22708] kasan_populate_vmalloc_pte+0x39/0x130 [ 1532.287913][T22708] ? __apply_to_page_range+0x8a5/0xb90 [ 1532.293212][T22708] __apply_to_page_range+0x8b8/0xb90 [ 1532.298333][T22708] ? kasan_populate_vmalloc+0x70/0x70 [ 1532.303547][T22708] ? kasan_populate_vmalloc+0x70/0x70 [ 1532.308749][T22708] apply_to_page_range+0x3b/0x50 [ 1532.313521][T22708] kasan_populate_vmalloc+0x65/0x70 [ 1532.318551][T22708] alloc_vmap_area+0x1946/0x1a90 [ 1532.323330][T22708] ? vm_map_ram+0xa80/0xa80 [ 1532.327667][T22708] ? __kasan_kmalloc+0x9/0x10 [ 1532.332185][T22708] ? __get_vm_area_node+0x13a/0x380 [ 1532.337213][T22708] __get_vm_area_node+0x17b/0x380 [ 1532.342077][T22708] __vmalloc_node_range+0xda/0x800 [ 1532.347019][T22708] ? copy_process+0x579/0x3250 [ 1532.351628][T22708] ? kmem_cache_alloc+0x1c1/0x2f0 [ 1532.356480][T22708] ? dup_task_struct+0x53/0xa60 [ 1532.361183][T22708] dup_task_struct+0x61f/0xa60 [ 1532.365781][T22708] ? copy_process+0x579/0x3250 [ 1532.370368][T22708] ? __kasan_check_write+0x14/0x20 [ 1532.375316][T22708] copy_process+0x579/0x3250 [ 1532.379746][T22708] ? __kasan_check_write+0x14/0x20 11:51:26 executing program 4: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:26 executing program 0: syz_clone(0x10820000, 0x0, 0x7, 0x0, 0x0, 0x0) [ 1532.384687][T22708] ? proc_fail_nth_write+0x213/0x290 [ 1532.389812][T22708] ? proc_fail_nth_read+0x220/0x220 [ 1532.394846][T22708] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1532.399878][T22708] ? vfs_write+0x9af/0x1050 [ 1532.404219][T22708] ? vmacache_update+0xb7/0x120 [ 1532.408905][T22708] kernel_clone+0x22d/0x990 [ 1532.413244][T22708] ? file_end_write+0x1b0/0x1b0 [ 1532.417931][T22708] ? __kasan_check_write+0x14/0x20 [ 1532.422884][T22708] ? create_io_thread+0x1e0/0x1e0 [ 1532.427739][T22708] ? __mutex_lock_slowpath+0x10/0x10 11:51:26 executing program 5: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:26 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1532.432860][T22708] __x64_sys_clone+0x289/0x310 [ 1532.437634][T22708] ? __do_sys_vfork+0x130/0x130 [ 1532.442323][T22708] ? debug_smp_processor_id+0x17/0x20 [ 1532.447528][T22708] do_syscall_64+0x44/0xd0 [ 1532.451788][T22708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1532.457510][T22708] RIP: 0033:0x7f65e6eb55a9 [ 1532.461764][T22708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1532.481205][T22708] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1532.489459][T22708] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1532.497262][T22708] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1532.505096][T22708] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.512887][T22708] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1532.520695][T22708] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1532.528510][T22708] [ 1532.531374][T22710] CPU: 1 PID: 22710 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1532.541443][T22710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1532.551334][T22710] Call Trace: [ 1532.554456][T22710] [ 1532.557234][T22710] dump_stack_lvl+0x151/0x1b7 [ 1532.561748][T22710] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1532.567040][T22710] dump_stack+0x15/0x17 [ 1532.571035][T22710] should_fail+0x3c0/0x510 [ 1532.575287][T22710] should_fail_usercopy+0x1a/0x20 [ 1532.580152][T22710] _copy_to_user+0x20/0x90 [ 1532.584399][T22710] bpf_verifier_vlog+0x1a1/0x330 [ 1532.589174][T22710] __btf_verifier_log+0xd1/0x120 [ 1532.593947][T22710] ? bpf_verifier_vlog+0x1ae/0x330 [ 1532.598896][T22710] ? btf_check_sec_info+0x500/0x500 [ 1532.603928][T22710] ? btf_parse_hdr+0x1e9/0x7e0 [ 1532.608529][T22710] ? memcpy+0x56/0x70 [ 1532.612349][T22710] btf_parse_hdr+0x464/0x7e0 [ 1532.616776][T22710] btf_new_fd+0x3e8/0x900 [ 1532.620940][T22710] bpf_btf_load+0x6f/0x90 [ 1532.625111][T22710] __sys_bpf+0x514/0x750 [ 1532.629184][T22710] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1532.634396][T22710] ? debug_smp_processor_id+0x17/0x20 [ 1532.639601][T22710] __x64_sys_bpf+0x7c/0x90 [ 1532.643855][T22710] do_syscall_64+0x44/0xd0 [ 1532.648108][T22710] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1532.653841][T22710] RIP: 0033:0x7fb6db8a15a9 [ 1532.658090][T22710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1532.677535][T22710] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:27 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 7) 11:51:27 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:27 executing program 4: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:27 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x0, 0x8}, 0xc) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r6}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r7, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x9, &(0x7f0000000080)=@raw=[@ldst={0x3, 0x2, 0x3, 0x6, 0x0, 0xfffffffffffffff4, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xf}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @generic={0xfa, 0x6, 0x4, 0x1, 0x2}, @ldst={0x2, 0x2, 0x3, 0x0, 0x0, 0x40, 0xd946c0209732c6ae}], &(0x7f0000000000)='GPL\x00', 0xa6f0, 0xca, &(0x7f0000000100)=""/202, 0x41100, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x4, 0x2, 0x7e4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, r0, r2, 0xffffffffffffffff, r3, r5, r6]}, 0x80) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r8, 0x5421, 0x1ffff000) 11:51:27 executing program 0: syz_clone(0x10820000, 0x0, 0x8, 0x0, 0x0, 0x0) 11:51:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 15) [ 1532.685785][T22710] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1532.693586][T22710] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1532.701399][T22710] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1532.709209][T22710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1532.717033][T22710] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1532.724836][T22710] 11:51:27 executing program 4: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1532.752103][T22733] FAULT_INJECTION: forcing a failure. [ 1532.752103][T22733] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1532.765121][T22733] CPU: 1 PID: 22733 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1532.772288][T22737] FAULT_INJECTION: forcing a failure. [ 1532.772288][T22737] name failslab, interval 1, probability 0, space 0, times 0 [ 1532.775184][T22733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1532.775199][T22733] Call Trace: [ 1532.775206][T22733] [ 1532.775213][T22733] dump_stack_lvl+0x151/0x1b7 [ 1532.807908][T22733] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1532.813198][T22733] dump_stack+0x15/0x17 [ 1532.817196][T22733] should_fail+0x3c0/0x510 [ 1532.821443][T22733] should_fail_usercopy+0x1a/0x20 [ 1532.826304][T22733] _copy_to_user+0x20/0x90 [ 1532.830556][T22733] bpf_verifier_vlog+0x1a1/0x330 [ 1532.835329][T22733] __btf_verifier_log+0xd1/0x120 [ 1532.840105][T22733] ? is_bpf_text_address+0x1a2/0x1c0 [ 1532.845225][T22733] ? btf_check_sec_info+0x500/0x500 [ 1532.850258][T22733] ? put_dec_trunc8+0x1ad/0x3c0 [ 1532.854944][T22733] __btf_verifier_log_type+0x4f6/0x7f0 [ 1532.860242][T22733] ? pointer+0xc50/0xc50 [ 1532.864320][T22733] ? btf_struct_check_meta+0xb61/0xd60 [ 1532.869612][T22733] ? sort_r+0x1ef/0x13a0 [ 1532.873691][T22733] ? btf_int_show+0x2820/0x2820 [ 1532.878381][T22733] ? vsnprintf+0x1fa/0x1ce0 [ 1532.882718][T22733] ? memcpy+0x56/0x70 [ 1532.886540][T22733] ? vsnprintf+0x1c02/0x1ce0 [ 1532.890963][T22733] ? btf_sec_info_cmp+0x5c/0x110 [ 1532.895737][T22733] btf_struct_check_meta+0x1f8/0xd60 [ 1532.900859][T22733] btf_check_all_metas+0x398/0xad0 [ 1532.905809][T22733] btf_parse_type_sec+0x141/0x1c20 [ 1532.910757][T22733] ? __btf_verifier_log+0x120/0x120 [ 1532.915786][T22733] ? sort+0x37/0x50 [ 1532.919445][T22733] ? btf_check_sec_info+0x37d/0x500 [ 1532.924469][T22733] ? btf_verifier_log+0x2a0/0x2a0 [ 1532.929328][T22733] ? btf_parse_hdr+0x1e9/0x7e0 [ 1532.933927][T22733] ? btf_float_log+0x60/0x60 [ 1532.938354][T22733] ? btf_parse_hdr+0x601/0x7e0 [ 1532.942952][T22733] ? btf_parse_str_sec+0x224/0x2c0 [ 1532.947901][T22733] btf_new_fd+0x587/0x900 [ 1532.952078][T22733] bpf_btf_load+0x6f/0x90 [ 1532.956232][T22733] __sys_bpf+0x514/0x750 [ 1532.960314][T22733] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1532.965610][T22733] ? debug_smp_processor_id+0x17/0x20 [ 1532.970816][T22733] __x64_sys_bpf+0x7c/0x90 [ 1532.975071][T22733] do_syscall_64+0x44/0xd0 [ 1532.979320][T22733] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1532.985047][T22733] RIP: 0033:0x7fb6db8a15a9 [ 1532.989326][T22733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1533.008743][T22733] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1533.017073][T22733] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1533.024890][T22733] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1533.032698][T22733] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1533.040508][T22733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 11:51:27 executing program 4: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:27 executing program 4: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:27 executing program 4: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:27 executing program 4: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:27 executing program 4: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1533.048323][T22733] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1533.056135][T22733] [ 1533.058998][T22737] CPU: 0 PID: 22737 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1533.069155][T22737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1533.079052][T22737] Call Trace: [ 1533.082174][T22737] [ 1533.084951][T22737] dump_stack_lvl+0x151/0x1b7 [ 1533.089476][T22737] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1533.094762][T22737] dump_stack+0x15/0x17 [ 1533.098752][T22737] should_fail+0x3c0/0x510 [ 1533.103003][T22737] ? __register_sysctl_table+0xa66/0x1330 [ 1533.108565][T22737] __should_failslab+0x9f/0xe0 [ 1533.113162][T22737] should_failslab+0x9/0x20 [ 1533.117582][T22737] __kmalloc+0x6d/0x350 [ 1533.121573][T22737] ? __register_sysctl_table+0xee/0x1330 [ 1533.127047][T22737] __register_sysctl_table+0xa66/0x1330 [ 1533.132425][T22737] ? memcpy+0x56/0x70 [ 1533.136241][T22737] setup_userns_sysctls+0x2b1/0x340 [ 1533.141276][T22737] create_user_ns+0x1227/0x19b0 [ 1533.145964][T22737] ? utsns_owner+0x40/0x40 [ 1533.150217][T22737] ? security_prepare_creds+0x149/0x160 [ 1533.155598][T22737] ? prepare_creds+0x485/0x690 [ 1533.160196][T22737] copy_creds+0x200/0x640 [ 1533.164363][T22737] copy_process+0x775/0x3250 [ 1533.168788][T22737] ? __kasan_check_write+0x14/0x20 [ 1533.173735][T22737] ? proc_fail_nth_write+0x213/0x290 [ 1533.178857][T22737] ? proc_fail_nth_read+0x220/0x220 [ 1533.183892][T22737] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1533.188841][T22737] ? vfs_write+0x9af/0x1050 [ 1533.193184][T22737] ? vmacache_update+0xb7/0x120 [ 1533.197864][T22737] kernel_clone+0x22d/0x990 [ 1533.202203][T22737] ? file_end_write+0x1b0/0x1b0 [ 1533.206895][T22737] ? __kasan_check_write+0x14/0x20 [ 1533.211838][T22737] ? create_io_thread+0x1e0/0x1e0 [ 1533.216698][T22737] ? __mutex_lock_slowpath+0x10/0x10 [ 1533.221820][T22737] __x64_sys_clone+0x289/0x310 [ 1533.226420][T22737] ? __do_sys_vfork+0x130/0x130 [ 1533.231108][T22737] ? debug_smp_processor_id+0x17/0x20 [ 1533.236317][T22737] do_syscall_64+0x44/0xd0 [ 1533.240571][T22737] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1533.246304][T22737] RIP: 0033:0x7f65e6eb55a9 [ 1533.250551][T22737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1533.269992][T22737] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1533.278234][T22737] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1533.286046][T22737] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1533.293857][T22737] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1533.301669][T22737] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1533.309480][T22737] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1533.317295][T22737] [ 1533.320328][T22737] sysctl could not get directory: //user -12 [ 1533.330580][T22737] CPU: 0 PID: 22737 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1533.340632][T22737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1533.350528][T22737] Call Trace: [ 1533.353653][T22737] [ 1533.356424][T22737] dump_stack_lvl+0x151/0x1b7 [ 1533.360938][T22737] ? __kasan_slab_free+0x11/0x20 [ 1533.365713][T22737] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1533.371010][T22737] ? __register_sysctl_table+0x1293/0x1330 [ 1533.376648][T22737] ? kfree+0xc8/0x210 [ 1533.380468][T22737] dump_stack+0x15/0x17 [ 1533.384463][T22737] __register_sysctl_table+0x1298/0x1330 [ 1533.389930][T22737] ? memcpy+0x56/0x70 [ 1533.393747][T22737] setup_userns_sysctls+0x2b1/0x340 [ 1533.398783][T22737] create_user_ns+0x1227/0x19b0 [ 1533.403468][T22737] ? utsns_owner+0x40/0x40 [ 1533.407722][T22737] ? security_prepare_creds+0x149/0x160 [ 1533.413103][T22737] ? prepare_creds+0x485/0x690 [ 1533.417701][T22737] copy_creds+0x200/0x640 [ 1533.421871][T22737] copy_process+0x775/0x3250 [ 1533.426295][T22737] ? __kasan_check_write+0x14/0x20 [ 1533.431241][T22737] ? proc_fail_nth_write+0x213/0x290 [ 1533.436362][T22737] ? proc_fail_nth_read+0x220/0x220 [ 1533.441395][T22737] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1533.446343][T22737] ? vfs_write+0x9af/0x1050 [ 1533.450684][T22737] ? vmacache_update+0xb7/0x120 [ 1533.455371][T22737] kernel_clone+0x22d/0x990 [ 1533.459711][T22737] ? file_end_write+0x1b0/0x1b0 [ 1533.464397][T22737] ? __kasan_check_write+0x14/0x20 [ 1533.469343][T22737] ? create_io_thread+0x1e0/0x1e0 [ 1533.474204][T22737] ? __mutex_lock_slowpath+0x10/0x10 [ 1533.479328][T22737] __x64_sys_clone+0x289/0x310 [ 1533.483929][T22737] ? __do_sys_vfork+0x130/0x130 [ 1533.488612][T22737] ? debug_smp_processor_id+0x17/0x20 [ 1533.493823][T22737] do_syscall_64+0x44/0xd0 [ 1533.498076][T22737] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1533.503805][T22737] RIP: 0033:0x7f65e6eb55a9 [ 1533.508055][T22737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1533.527497][T22737] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1533.535741][T22737] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1533.543552][T22737] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:28 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 8) 11:51:28 executing program 4: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:28 executing program 5: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:28 executing program 0: syz_clone(0x10820000, 0x0, 0x9, 0x0, 0x0, 0x0) 11:51:28 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000340)={0x0, 0x0, 0x8}, 0xc) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r6}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r7, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x13, 0x9, &(0x7f0000000080)=@raw=[@ldst={0x3, 0x2, 0x3, 0x6, 0x0, 0xfffffffffffffff4, 0xfffffffffffffff0}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_idx={0x18, 0x3, 0x5, 0x0, 0xf}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x5}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @generic={0xfa, 0x6, 0x4, 0x1, 0x2}, @ldst={0x2, 0x2, 0x3, 0x0, 0x0, 0x40, 0xd946c0209732c6ae}], &(0x7f0000000000)='GPL\x00', 0xa6f0, 0xca, &(0x7f0000000100)=""/202, 0x41100, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0x4, 0x2, 0x7e4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0x1, 0x1, r0, r2, 0xffffffffffffffff, r3, r5, r6]}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r8, 0x5421, 0x1ffff000) 11:51:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 16) 11:51:28 executing program 4: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1533.551484][T22737] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1533.559290][T22737] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1533.567101][T22737] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1533.574919][T22737] 11:51:28 executing program 0: syz_clone(0x10820000, 0x0, 0xf, 0x0, 0x0, 0x0) [ 1533.601243][T22766] FAULT_INJECTION: forcing a failure. [ 1533.601243][T22766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1533.608552][T22768] FAULT_INJECTION: forcing a failure. [ 1533.608552][T22768] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1533.629416][T22766] CPU: 1 PID: 22766 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1533.639482][T22766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1533.649385][T22766] Call Trace: [ 1533.652502][T22766] [ 1533.655281][T22766] dump_stack_lvl+0x151/0x1b7 [ 1533.659807][T22766] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1533.665096][T22766] dump_stack+0x15/0x17 [ 1533.669077][T22766] should_fail+0x3c0/0x510 [ 1533.673332][T22766] should_fail_usercopy+0x1a/0x20 [ 1533.678191][T22766] _copy_to_user+0x20/0x90 [ 1533.682448][T22766] bpf_verifier_vlog+0x1a1/0x330 [ 1533.687218][T22766] btf_verifier_log+0x1f6/0x2a0 [ 1533.691913][T22766] ? __btf_verifier_log_type+0x52a/0x7f0 [ 1533.697378][T22766] ? bpf_btf_find_by_name_kind+0x8f0/0x8f0 [ 1533.703015][T22766] ? btf_check_sec_info+0x500/0x500 [ 1533.708075][T22766] ? put_dec_trunc8+0x1ad/0x3c0 [ 1533.712738][T22766] btf_struct_log+0x61/0xa0 [ 1533.717078][T22766] __btf_verifier_log_type+0x583/0x7f0 [ 1533.722370][T22766] ? pointer+0xc50/0xc50 [ 1533.726451][T22766] ? btf_struct_check_meta+0xb61/0xd60 [ 1533.731744][T22766] ? sort_r+0x1ef/0x13a0 [ 1533.735824][T22766] ? btf_int_show+0x2820/0x2820 [ 1533.740513][T22766] ? vsnprintf+0x1fa/0x1ce0 [ 1533.744850][T22766] ? memcpy+0x56/0x70 [ 1533.748671][T22766] ? vsnprintf+0x1c02/0x1ce0 [ 1533.753098][T22766] ? btf_sec_info_cmp+0x5c/0x110 [ 1533.757869][T22766] btf_struct_check_meta+0x1f8/0xd60 [ 1533.762991][T22766] btf_check_all_metas+0x398/0xad0 [ 1533.767938][T22766] btf_parse_type_sec+0x141/0x1c20 [ 1533.772883][T22766] ? __btf_verifier_log+0x120/0x120 [ 1533.777918][T22766] ? sort+0x37/0x50 [ 1533.781563][T22766] ? btf_check_sec_info+0x37d/0x500 [ 1533.786600][T22766] ? btf_verifier_log+0x2a0/0x2a0 [ 1533.791461][T22766] ? btf_parse_hdr+0x1e9/0x7e0 [ 1533.796058][T22766] ? btf_float_log+0x60/0x60 [ 1533.800485][T22766] ? btf_parse_hdr+0x601/0x7e0 [ 1533.805082][T22766] ? btf_parse_str_sec+0x224/0x2c0 [ 1533.810034][T22766] btf_new_fd+0x587/0x900 [ 1533.814201][T22766] bpf_btf_load+0x6f/0x90 [ 1533.818476][T22766] __sys_bpf+0x514/0x750 [ 1533.822552][T22766] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1533.827762][T22766] ? debug_smp_processor_id+0x17/0x20 [ 1533.832966][T22766] __x64_sys_bpf+0x7c/0x90 [ 1533.837219][T22766] do_syscall_64+0x44/0xd0 [ 1533.841475][T22766] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1533.847196][T22766] RIP: 0033:0x7fb6db8a15a9 [ 1533.851456][T22766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1533.870894][T22766] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1533.879137][T22766] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1533.886949][T22766] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1533.894766][T22766] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 11:51:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:28 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x430001, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000180)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, 0x0) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000040)=0x1) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x400, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000400)=0x1) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r6, 0x400454de, 0x0) ioctl$TUNSETCARRIER(r6, 0x400454e2, &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) recvmsg$unix(r0, &(0x7f00000003c0)={&(0x7f00000001c0), 0x6e, &(0x7f0000000340)=[{&(0x7f0000000240)=""/10, 0xa}, {&(0x7f0000000280)=""/189, 0xbd}], 0x2, &(0x7f0000000380)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x100) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r7, 0x400454de, &(0x7f0000000100)) 11:51:28 executing program 0: syz_clone(0x10820000, 0x0, 0x41, 0x0, 0x0, 0x0) [ 1533.902570][T22766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1533.910382][T22766] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1533.918199][T22766] [ 1533.921062][T22768] CPU: 0 PID: 22768 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1533.931132][T22768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1533.941034][T22768] Call Trace: [ 1533.944154][T22768] [ 1533.946925][T22768] dump_stack_lvl+0x151/0x1b7 [ 1533.951441][T22768] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1533.956737][T22768] dump_stack+0x15/0x17 [ 1533.960728][T22768] should_fail+0x3c0/0x510 [ 1533.964982][T22768] should_fail_alloc_page+0x58/0x70 [ 1533.970010][T22768] __alloc_pages+0x1de/0x7c0 [ 1533.974435][T22768] ? __count_vm_events+0x30/0x30 [ 1533.979211][T22768] ? __kasan_kmalloc+0x9/0x10 [ 1533.983721][T22768] ? __kmalloc+0x203/0x350 [ 1533.987976][T22768] ? __vmalloc_node_range+0x2e3/0x800 [ 1533.993184][T22768] __vmalloc_node_range+0x48f/0x800 [ 1533.998219][T22768] dup_task_struct+0x61f/0xa60 [ 1534.002818][T22768] ? copy_process+0x579/0x3250 [ 1534.007417][T22768] ? __kasan_check_write+0x14/0x20 [ 1534.012365][T22768] copy_process+0x579/0x3250 [ 1534.016792][T22768] ? __kasan_check_write+0x14/0x20 [ 1534.021740][T22768] ? proc_fail_nth_write+0x213/0x290 [ 1534.026873][T22768] ? proc_fail_nth_read+0x220/0x220 [ 1534.031895][T22768] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1534.036927][T22768] ? vfs_write+0x9af/0x1050 [ 1534.041267][T22768] ? vmacache_update+0xb7/0x120 [ 1534.045953][T22768] kernel_clone+0x22d/0x990 [ 1534.050296][T22768] ? file_end_write+0x1b0/0x1b0 [ 1534.054980][T22768] ? __kasan_check_write+0x14/0x20 [ 1534.059928][T22768] ? create_io_thread+0x1e0/0x1e0 [ 1534.064789][T22768] ? __mutex_lock_slowpath+0x10/0x10 [ 1534.069914][T22768] __x64_sys_clone+0x289/0x310 [ 1534.074510][T22768] ? __do_sys_vfork+0x130/0x130 [ 1534.079196][T22768] ? debug_smp_processor_id+0x17/0x20 [ 1534.084403][T22768] do_syscall_64+0x44/0xd0 [ 1534.088658][T22768] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1534.094387][T22768] RIP: 0033:0x7f65e6eb55a9 [ 1534.098638][T22768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1534.118082][T22768] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1534.126324][T22768] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1534.134135][T22768] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1534.141951][T22768] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 11:51:28 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 9) 11:51:28 executing program 0: syz_clone(0x10820000, 0x0, 0x700, 0x0, 0x0, 0x0) 11:51:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 17) 11:51:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1534.149758][T22768] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1534.157570][T22768] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1534.165388][T22768] [ 1534.183820][T22785] FAULT_INJECTION: forcing a failure. [ 1534.183820][T22785] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1534.188259][T22788] FAULT_INJECTION: forcing a failure. [ 1534.188259][T22788] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1534.205412][T22785] CPU: 1 PID: 22785 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1534.219766][T22785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1534.229651][T22785] Call Trace: [ 1534.232792][T22785] [ 1534.235551][T22785] dump_stack_lvl+0x151/0x1b7 [ 1534.240069][T22785] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1534.245361][T22785] dump_stack+0x15/0x17 [ 1534.249351][T22785] should_fail+0x3c0/0x510 [ 1534.253610][T22785] should_fail_usercopy+0x1a/0x20 [ 1534.258464][T22785] _copy_to_user+0x20/0x90 [ 1534.262718][T22785] bpf_verifier_vlog+0x1a1/0x330 [ 1534.267491][T22785] __btf_verifier_log+0xd1/0x120 [ 1534.272270][T22785] ? bpf_btf_find_by_name_kind+0x8f0/0x8f0 [ 1534.277942][T22785] ? bpf_verifier_vlog+0x1ae/0x330 [ 1534.282855][T22785] ? btf_check_sec_info+0x500/0x500 [ 1534.287890][T22785] ? put_dec_trunc8+0x1ad/0x3c0 [ 1534.292578][T22785] __btf_verifier_log_type+0x621/0x7f0 [ 1534.297872][T22785] ? pointer+0xc50/0xc50 [ 1534.301948][T22785] ? btf_struct_check_meta+0xb61/0xd60 [ 1534.307244][T22785] ? sort_r+0x1ef/0x13a0 [ 1534.311323][T22785] ? btf_int_show+0x2820/0x2820 [ 1534.316011][T22785] ? vsnprintf+0x1fa/0x1ce0 [ 1534.320350][T22785] ? memcpy+0x56/0x70 [ 1534.324173][T22785] ? vsnprintf+0x1c02/0x1ce0 [ 1534.328594][T22785] ? btf_sec_info_cmp+0x5c/0x110 [ 1534.333368][T22785] btf_struct_check_meta+0x1f8/0xd60 [ 1534.338490][T22785] btf_check_all_metas+0x398/0xad0 [ 1534.343440][T22785] btf_parse_type_sec+0x141/0x1c20 [ 1534.348383][T22785] ? __btf_verifier_log+0x120/0x120 [ 1534.353417][T22785] ? sort+0x37/0x50 [ 1534.357061][T22785] ? btf_check_sec_info+0x37d/0x500 [ 1534.362098][T22785] ? btf_verifier_log+0x2a0/0x2a0 [ 1534.366958][T22785] ? btf_parse_hdr+0x1e9/0x7e0 [ 1534.371559][T22785] ? btf_float_log+0x60/0x60 [ 1534.375984][T22785] ? btf_parse_hdr+0x601/0x7e0 [ 1534.380583][T22785] ? btf_parse_str_sec+0x224/0x2c0 [ 1534.385532][T22785] btf_new_fd+0x587/0x900 [ 1534.389697][T22785] bpf_btf_load+0x6f/0x90 [ 1534.393864][T22785] __sys_bpf+0x514/0x750 [ 1534.397947][T22785] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1534.403153][T22785] ? debug_smp_processor_id+0x17/0x20 [ 1534.408360][T22785] __x64_sys_bpf+0x7c/0x90 [ 1534.412615][T22785] do_syscall_64+0x44/0xd0 [ 1534.416865][T22785] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1534.422592][T22785] RIP: 0033:0x7fb6db8a15a9 [ 1534.426847][T22785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1534.446288][T22785] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1534.454533][T22785] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1534.462342][T22785] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1534.470154][T22785] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1534.477967][T22785] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1534.485776][T22785] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1534.493591][T22785] 11:51:29 executing program 0: syz_clone(0x10820000, 0x0, 0x900, 0x0, 0x0, 0x0) [ 1534.496482][T22788] CPU: 0 PID: 22788 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1534.506529][T22788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1534.516427][T22788] Call Trace: [ 1534.519545][T22788] [ 1534.522321][T22788] dump_stack_lvl+0x151/0x1b7 [ 1534.526837][T22788] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1534.532130][T22788] dump_stack+0x15/0x17 [ 1534.536124][T22788] should_fail+0x3c0/0x510 [ 1534.540377][T22788] should_fail_alloc_page+0x58/0x70 [ 1534.545411][T22788] __alloc_pages+0x1de/0x7c0 [ 1534.550442][T22788] ? __count_vm_events+0x30/0x30 11:51:29 executing program 0: syz_clone(0x10820000, 0x0, 0xf00, 0x0, 0x0, 0x0) 11:51:29 executing program 0: syz_clone(0x10820000, 0x0, 0x1f00, 0x0, 0x0, 0x0) [ 1534.555217][T22788] ? __kasan_kmalloc+0x9/0x10 [ 1534.559734][T22788] ? __kmalloc+0x203/0x350 [ 1534.563980][T22788] ? __vmalloc_node_range+0x2e3/0x800 [ 1534.569190][T22788] __vmalloc_node_range+0x48f/0x800 [ 1534.574225][T22788] dup_task_struct+0x61f/0xa60 [ 1534.578825][T22788] ? copy_process+0x579/0x3250 [ 1534.583434][T22788] ? __kasan_check_write+0x14/0x20 [ 1534.588374][T22788] copy_process+0x579/0x3250 [ 1534.592797][T22788] ? __kasan_check_write+0x14/0x20 [ 1534.597745][T22788] ? proc_fail_nth_write+0x213/0x290 11:51:29 executing program 0: syz_clone(0x10820000, 0x0, 0x2000, 0x0, 0x0, 0x0) [ 1534.602865][T22788] ? proc_fail_nth_read+0x220/0x220 [ 1534.607947][T22788] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1534.612847][T22788] ? vfs_write+0x9af/0x1050 [ 1534.617184][T22788] ? vmacache_update+0xb7/0x120 [ 1534.621873][T22788] kernel_clone+0x22d/0x990 [ 1534.626211][T22788] ? file_end_write+0x1b0/0x1b0 [ 1534.630902][T22788] ? __kasan_check_write+0x14/0x20 [ 1534.635846][T22788] ? create_io_thread+0x1e0/0x1e0 [ 1534.640711][T22788] ? __mutex_lock_slowpath+0x10/0x10 [ 1534.645827][T22788] __x64_sys_clone+0x289/0x310 [ 1534.650430][T22788] ? __do_sys_vfork+0x130/0x130 [ 1534.655116][T22788] ? debug_smp_processor_id+0x17/0x20 [ 1534.660323][T22788] do_syscall_64+0x44/0xd0 [ 1534.664577][T22788] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1534.670302][T22788] RIP: 0033:0x7f65e6eb55a9 [ 1534.674558][T22788] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1534.693998][T22788] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1534.702239][T22788] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1534.710050][T22788] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1534.717870][T22788] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1534.725763][T22788] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 1534.733572][T22788] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1534.741391][T22788] 11:51:29 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x430001, 0x0) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000180)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, 0x0) (async) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000040)=0x1) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) (async) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x400, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000400)=0x1) (async) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r6, 0x400454de, 0x0) ioctl$TUNSETCARRIER(r6, 0x400454e2, &(0x7f00000000c0)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) (async) recvmsg$unix(r0, &(0x7f00000003c0)={&(0x7f00000001c0), 0x6e, &(0x7f0000000340)=[{&(0x7f0000000240)=""/10, 0xa}, {&(0x7f0000000280)=""/189, 0xbd}], 0x2, &(0x7f0000000380)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x100) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r7, 0x400454de, &(0x7f0000000100)) 11:51:29 executing program 0: syz_clone(0x10820000, 0x0, 0x3f00, 0x0, 0x0, 0x0) 11:51:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 18) 11:51:29 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 10) 11:51:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x18, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1534.801574][T22817] FAULT_INJECTION: forcing a failure. [ 1534.801574][T22817] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1534.857715][T22817] CPU: 1 PID: 22817 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1534.867798][T22817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1534.877692][T22817] Call Trace: [ 1534.880818][T22817] [ 1534.883593][T22817] dump_stack_lvl+0x151/0x1b7 [ 1534.888106][T22817] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1534.893404][T22817] dump_stack+0x15/0x17 [ 1534.897394][T22817] should_fail+0x3c0/0x510 [ 1534.901649][T22817] should_fail_alloc_page+0x58/0x70 [ 1534.906684][T22817] __alloc_pages+0x1de/0x7c0 [ 1534.911198][T22817] ? __count_vm_events+0x30/0x30 [ 1534.915970][T22817] ? __kasan_kmalloc+0x9/0x10 [ 1534.920482][T22817] ? __kmalloc+0x203/0x350 [ 1534.924734][T22817] ? __vmalloc_node_range+0x2e3/0x800 [ 1534.929942][T22817] __vmalloc_node_range+0x48f/0x800 [ 1534.934981][T22817] dup_task_struct+0x61f/0xa60 [ 1534.939578][T22817] ? copy_process+0x579/0x3250 [ 1534.944176][T22817] ? __kasan_check_write+0x14/0x20 [ 1534.949125][T22817] copy_process+0x579/0x3250 [ 1534.953552][T22817] ? __kasan_check_write+0x14/0x20 [ 1534.955225][T22837] FAULT_INJECTION: forcing a failure. [ 1534.955225][T22837] name failslab, interval 1, probability 0, space 0, times 0 [ 1534.958496][T22817] ? proc_fail_nth_write+0x213/0x290 [ 1534.958525][T22817] ? proc_fail_nth_read+0x220/0x220 [ 1534.958544][T22817] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1534.986011][T22817] ? vfs_write+0x9af/0x1050 [ 1534.990357][T22817] ? vmacache_update+0xb7/0x120 [ 1534.995040][T22817] kernel_clone+0x22d/0x990 [ 1534.999399][T22817] ? file_end_write+0x1b0/0x1b0 [ 1535.004063][T22817] ? __kasan_check_write+0x14/0x20 [ 1535.009010][T22817] ? create_io_thread+0x1e0/0x1e0 [ 1535.013877][T22817] ? __mutex_lock_slowpath+0x10/0x10 [ 1535.018995][T22817] __x64_sys_clone+0x289/0x310 [ 1535.023593][T22817] ? __do_sys_vfork+0x130/0x130 [ 1535.028280][T22817] ? debug_smp_processor_id+0x17/0x20 [ 1535.033485][T22817] do_syscall_64+0x44/0xd0 [ 1535.037736][T22817] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1535.043465][T22817] RIP: 0033:0x7f65e6eb55a9 [ 1535.047716][T22817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1535.067159][T22817] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1535.075405][T22817] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1535.083215][T22817] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1535.091031][T22817] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1535.098839][T22817] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1535.106647][T22817] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1535.114468][T22817] [ 1535.117329][T22837] CPU: 0 PID: 22837 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1535.127400][T22837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1535.137295][T22837] Call Trace: [ 1535.140423][T22837] [ 1535.143196][T22837] dump_stack_lvl+0x151/0x1b7 [ 1535.147711][T22837] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1535.153005][T22837] ? pointer+0xc50/0xc50 [ 1535.157076][T22837] dump_stack+0x15/0x17 [ 1535.161192][T22837] should_fail+0x3c0/0x510 [ 1535.165444][T22837] ? kvmalloc_node+0x82/0x130 [ 1535.169961][T22837] __should_failslab+0x9f/0xe0 [ 1535.174555][T22837] should_failslab+0x9/0x20 [ 1535.178893][T22837] __kmalloc+0x6d/0x350 [ 1535.182888][T22837] ? btf_struct_check_meta+0xb12/0xd60 [ 1535.188183][T22837] kvmalloc_node+0x82/0x130 [ 1535.192530][T22837] btf_check_all_metas+0x4f2/0xad0 [ 1535.197469][T22837] btf_parse_type_sec+0x141/0x1c20 [ 1535.202418][T22837] ? __btf_verifier_log+0x120/0x120 [ 1535.207448][T22837] ? sort+0x37/0x50 [ 1535.211095][T22837] ? btf_check_sec_info+0x37d/0x500 [ 1535.216131][T22837] ? btf_verifier_log+0x2a0/0x2a0 [ 1535.220989][T22837] ? btf_parse_hdr+0x1e9/0x7e0 [ 1535.225591][T22837] ? btf_float_log+0x60/0x60 [ 1535.230017][T22837] ? btf_parse_hdr+0x601/0x7e0 [ 1535.234616][T22837] ? btf_parse_str_sec+0x224/0x2c0 [ 1535.239562][T22837] btf_new_fd+0x587/0x900 [ 1535.243732][T22837] bpf_btf_load+0x6f/0x90 [ 1535.247983][T22837] __sys_bpf+0x514/0x750 [ 1535.252067][T22837] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1535.257269][T22837] ? debug_smp_processor_id+0x17/0x20 [ 1535.262476][T22837] __x64_sys_bpf+0x7c/0x90 [ 1535.266731][T22837] do_syscall_64+0x44/0xd0 [ 1535.270981][T22837] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1535.276708][T22837] RIP: 0033:0x7fb6db8a15a9 [ 1535.280965][T22837] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1535.300404][T22837] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1535.308651][T22837] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1535.316461][T22837] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1535.324274][T22837] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1535.332083][T22837] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1535.339894][T22837] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1535.347710][T22837] 11:51:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, 0x0) (async, rerun: 32) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x430001, 0x0) (rerun: 32) ioctl$TUNGETFEATURES(r2, 0x800454cf, &(0x7f0000000180)) (async) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, 0x0) (async, rerun: 64) ioctl$TUNSETCARRIER(r3, 0x400454e2, &(0x7f0000000040)=0x1) (rerun: 64) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x400, 0x0) ioctl$TUNSETVNETBE(r5, 0x400454de, &(0x7f0000000400)=0x1) (async, rerun: 64) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) (rerun: 64) ioctl$TUNSETVNETBE(r6, 0x400454de, 0x0) (async) ioctl$TUNSETCARRIER(r6, 0x400454e2, &(0x7f00000000c0)) (async) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) (async, rerun: 32) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) (async, rerun: 32) recvmsg$unix(r0, &(0x7f00000003c0)={&(0x7f00000001c0), 0x6e, &(0x7f0000000340)=[{&(0x7f0000000240)=""/10, 0xa}, {&(0x7f0000000280)=""/189, 0xbd}], 0x2, &(0x7f0000000380)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x100) (async) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r7, 0x400454de, &(0x7f0000000100)) 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3e, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x18, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 0: syz_clone(0x10820000, 0x0, 0x4000, 0x0, 0x0, 0x0) 11:51:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 19) 11:51:30 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 11) 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xaa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1535.644731][T22841] FAULT_INJECTION: forcing a failure. [ 1535.644731][T22841] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1535.645632][T22843] FAULT_INJECTION: forcing a failure. [ 1535.645632][T22843] name failslab, interval 1, probability 0, space 0, times 0 [ 1535.662400][T22841] CPU: 0 PID: 22841 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1535.680230][T22841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1535.690128][T22841] Call Trace: 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1535.693251][T22841] [ 1535.696026][T22841] dump_stack_lvl+0x151/0x1b7 [ 1535.700560][T22841] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1535.705839][T22841] dump_stack+0x15/0x17 [ 1535.709832][T22841] should_fail+0x3c0/0x510 [ 1535.714080][T22841] should_fail_alloc_page+0x58/0x70 [ 1535.719111][T22841] __alloc_pages+0x1de/0x7c0 [ 1535.723540][T22841] ? __count_vm_events+0x30/0x30 [ 1535.728318][T22841] ? __kasan_kmalloc+0x9/0x10 [ 1535.732842][T22841] ? __kmalloc+0x203/0x350 [ 1535.737085][T22841] ? __vmalloc_node_range+0x2e3/0x800 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1535.742289][T22841] __vmalloc_node_range+0x48f/0x800 [ 1535.747327][T22841] dup_task_struct+0x61f/0xa60 [ 1535.751922][T22841] ? copy_process+0x579/0x3250 [ 1535.756522][T22841] ? __kasan_check_write+0x14/0x20 [ 1535.761468][T22841] copy_process+0x579/0x3250 [ 1535.765894][T22841] ? __kasan_check_write+0x14/0x20 [ 1535.770848][T22841] ? proc_fail_nth_write+0x213/0x290 [ 1535.775965][T22841] ? proc_fail_nth_read+0x220/0x220 [ 1535.780999][T22841] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1535.785944][T22841] ? vfs_write+0x9af/0x1050 [ 1535.790284][T22841] ? vmacache_update+0xb7/0x120 [ 1535.794972][T22841] kernel_clone+0x22d/0x990 [ 1535.799310][T22841] ? file_end_write+0x1b0/0x1b0 [ 1535.804122][T22841] ? __kasan_check_write+0x14/0x20 [ 1535.809065][T22841] ? create_io_thread+0x1e0/0x1e0 [ 1535.813929][T22841] ? __mutex_lock_slowpath+0x10/0x10 [ 1535.819046][T22841] __x64_sys_clone+0x289/0x310 [ 1535.823651][T22841] ? __do_sys_vfork+0x130/0x130 [ 1535.828424][T22841] ? debug_smp_processor_id+0x17/0x20 [ 1535.833718][T22841] do_syscall_64+0x44/0xd0 [ 1535.837967][T22841] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1535.843698][T22841] RIP: 0033:0x7f65e6eb55a9 [ 1535.847949][T22841] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1535.867393][T22841] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1535.875634][T22841] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1535.883447][T22841] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1535.891255][T22841] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1535.899068][T22841] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1535.906878][T22841] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1535.914700][T22841] [ 1535.917557][T22843] CPU: 1 PID: 22843 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1535.927629][T22843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1535.937527][T22843] Call Trace: [ 1535.940645][T22843] [ 1535.943423][T22843] dump_stack_lvl+0x151/0x1b7 [ 1535.947936][T22843] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1535.953236][T22843] dump_stack+0x15/0x17 [ 1535.957221][T22843] should_fail+0x3c0/0x510 [ 1535.961474][T22843] ? kvmalloc_node+0x82/0x130 [ 1535.965990][T22843] __should_failslab+0x9f/0xe0 [ 1535.970594][T22843] should_failslab+0x9/0x20 [ 1535.974933][T22843] __kmalloc+0x6d/0x350 [ 1535.978931][T22843] ? btf_check_all_metas+0x9d8/0xad0 [ 1535.984041][T22843] kvmalloc_node+0x82/0x130 [ 1535.988383][T22843] btf_parse_type_sec+0x1c2/0x1c20 [ 1535.993332][T22843] ? __btf_verifier_log+0x120/0x120 [ 1535.998360][T22843] ? btf_verifier_log+0x2a0/0x2a0 [ 1536.003223][T22843] ? btf_parse_hdr+0x1e9/0x7e0 [ 1536.007828][T22843] ? btf_float_log+0x60/0x60 [ 1536.012248][T22843] ? btf_parse_hdr+0x601/0x7e0 [ 1536.016844][T22843] ? btf_parse_str_sec+0x224/0x2c0 [ 1536.021794][T22843] btf_new_fd+0x587/0x900 [ 1536.025959][T22843] bpf_btf_load+0x6f/0x90 [ 1536.030124][T22843] __sys_bpf+0x514/0x750 [ 1536.034203][T22843] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1536.039414][T22843] ? debug_smp_processor_id+0x17/0x20 [ 1536.044621][T22843] __x64_sys_bpf+0x7c/0x90 [ 1536.048874][T22843] do_syscall_64+0x44/0xd0 [ 1536.053127][T22843] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1536.058853][T22843] RIP: 0033:0x7fb6db8a15a9 [ 1536.063177][T22843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1536.082550][T22843] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000700)={r2, 0xffffffffffffffff, 0x22}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000740)=r3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) recvmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000080), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000100)=""/157, 0x9d}, {&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000280)=""/252, 0xfc}, {&(0x7f0000000380)=""/157, 0x9d}, {&(0x7f0000000440)=""/36, 0x24}, {&(0x7f0000000480)=""/87, 0x57}, {&(0x7f0000000500)=""/253, 0xfd}], 0x8, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x40000010) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000780)) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3e, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 0: syz_clone(0x10820000, 0x0, 0x4100, 0x0, 0x0, 0x0) 11:51:30 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 12) 11:51:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 20) 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000700)={r2, 0xffffffffffffffff, 0x22}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000740)=r3, 0x4) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) recvmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000080), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000100)=""/157, 0x9d}, {&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000280)=""/252, 0xfc}, {&(0x7f0000000380)=""/157, 0x9d}, {&(0x7f0000000440)=""/36, 0x24}, {&(0x7f0000000480)=""/87, 0x57}, {&(0x7f0000000500)=""/253, 0xfd}], 0x8, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x40000010) (async) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000780)) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) [ 1536.090793][T22843] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1536.098606][T22843] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1536.106526][T22843] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1536.114334][T22843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1536.122147][T22843] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1536.129968][T22843] 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1536.171263][T22876] FAULT_INJECTION: forcing a failure. [ 1536.171263][T22876] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1536.186398][T22878] FAULT_INJECTION: forcing a failure. [ 1536.186398][T22878] name failslab, interval 1, probability 0, space 0, times 0 [ 1536.201343][T22876] CPU: 0 PID: 22876 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1536.211414][T22876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 11:51:30 executing program 0: syz_clone(0x10820000, 0x0, 0x3ffff, 0x0, 0x0, 0x0) 11:51:30 executing program 0: syz_clone(0x10820000, 0x0, 0x40000, 0x0, 0x0, 0x0) [ 1536.221314][T22876] Call Trace: [ 1536.224434][T22876] [ 1536.227219][T22876] dump_stack_lvl+0x151/0x1b7 [ 1536.231723][T22876] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1536.237019][T22876] dump_stack+0x15/0x17 [ 1536.241009][T22876] should_fail+0x3c0/0x510 [ 1536.245262][T22876] should_fail_alloc_page+0x58/0x70 [ 1536.250295][T22876] __alloc_pages+0x1de/0x7c0 [ 1536.254720][T22876] ? __count_vm_events+0x30/0x30 [ 1536.259496][T22876] ? __kasan_kmalloc+0x9/0x10 [ 1536.264005][T22876] ? __kmalloc+0x203/0x350 [ 1536.268262][T22876] ? __vmalloc_node_range+0x2e3/0x800 [ 1536.273469][T22876] __vmalloc_node_range+0x48f/0x800 [ 1536.278503][T22876] dup_task_struct+0x61f/0xa60 [ 1536.283100][T22876] ? copy_process+0x579/0x3250 [ 1536.287702][T22876] ? __kasan_check_write+0x14/0x20 [ 1536.292653][T22876] copy_process+0x579/0x3250 [ 1536.297076][T22876] ? __kasan_check_write+0x14/0x20 [ 1536.302024][T22876] ? proc_fail_nth_write+0x213/0x290 [ 1536.307143][T22876] ? proc_fail_nth_read+0x220/0x220 [ 1536.312180][T22876] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1536.317125][T22876] ? vfs_write+0x9af/0x1050 [ 1536.321467][T22876] ? vmacache_update+0xb7/0x120 [ 1536.326151][T22876] kernel_clone+0x22d/0x990 [ 1536.330489][T22876] ? file_end_write+0x1b0/0x1b0 [ 1536.335178][T22876] ? __kasan_check_write+0x14/0x20 [ 1536.340124][T22876] ? create_io_thread+0x1e0/0x1e0 [ 1536.344987][T22876] ? __mutex_lock_slowpath+0x10/0x10 [ 1536.350109][T22876] __x64_sys_clone+0x289/0x310 [ 1536.354708][T22876] ? __do_sys_vfork+0x130/0x130 [ 1536.359396][T22876] ? debug_smp_processor_id+0x17/0x20 [ 1536.364603][T22876] do_syscall_64+0x44/0xd0 11:51:30 executing program 0: syz_clone(0x10820000, 0x0, 0x80000, 0x0, 0x0, 0x0) 11:51:30 executing program 0: syz_clone(0x10820000, 0x0, 0x101000, 0x0, 0x0, 0x0) [ 1536.368856][T22876] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1536.374581][T22876] RIP: 0033:0x7f65e6eb55a9 [ 1536.378838][T22876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1536.398278][T22876] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1536.406525][T22876] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1536.414340][T22876] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:30 executing program 0: syz_clone(0x10820000, 0x0, 0xf0ff1f, 0x0, 0x0, 0x0) [ 1536.422148][T22876] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1536.429958][T22876] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1536.437770][T22876] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1536.445585][T22876] [ 1536.450319][T22878] CPU: 1 PID: 22878 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1536.460386][T22878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1536.470280][T22878] Call Trace: [ 1536.473404][T22878] [ 1536.476177][T22878] dump_stack_lvl+0x151/0x1b7 [ 1536.480868][T22878] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1536.486163][T22878] dump_stack+0x15/0x17 [ 1536.490154][T22878] should_fail+0x3c0/0x510 [ 1536.494404][T22878] ? kvmalloc_node+0x82/0x130 [ 1536.498918][T22878] __should_failslab+0x9f/0xe0 [ 1536.503520][T22878] should_failslab+0x9/0x20 [ 1536.507949][T22878] __kmalloc+0x6d/0x350 [ 1536.511936][T22878] ? kvmalloc_node+0x82/0x130 [ 1536.516453][T22878] kvmalloc_node+0x82/0x130 [ 1536.520797][T22878] btf_parse_type_sec+0x1e0/0x1c20 [ 1536.525738][T22878] ? __btf_verifier_log+0x120/0x120 [ 1536.530775][T22878] ? btf_verifier_log+0x2a0/0x2a0 [ 1536.535635][T22878] ? btf_parse_hdr+0x1e9/0x7e0 [ 1536.540232][T22878] ? btf_float_log+0x60/0x60 [ 1536.544662][T22878] ? btf_parse_hdr+0x601/0x7e0 [ 1536.549261][T22878] ? btf_parse_str_sec+0x224/0x2c0 [ 1536.554205][T22878] btf_new_fd+0x587/0x900 [ 1536.558376][T22878] bpf_btf_load+0x6f/0x90 [ 1536.562547][T22878] __sys_bpf+0x514/0x750 [ 1536.566619][T22878] ? bpf_link_show_fdinfo+0x2d0/0x2d0 11:51:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xab, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1536.571954][T22878] ? debug_smp_processor_id+0x17/0x20 [ 1536.577157][T22878] __x64_sys_bpf+0x7c/0x90 [ 1536.581409][T22878] do_syscall_64+0x44/0xd0 [ 1536.585663][T22878] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1536.591385][T22878] RIP: 0033:0x7fb6db8a15a9 [ 1536.595641][T22878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1536.615078][T22878] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 11:51:31 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 13) [ 1536.623410][T22878] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1536.631223][T22878] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1536.639032][T22878] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1536.646844][T22878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1536.654656][T22878] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1536.662469][T22878] 11:51:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 21) 11:51:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000700)={r2, 0xffffffffffffffff, 0x22}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000740)=r3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) recvmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000080), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000100)=""/157, 0x9d}, {&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000280)=""/252, 0xfc}, {&(0x7f0000000380)=""/157, 0x9d}, {&(0x7f0000000440)=""/36, 0x24}, {&(0x7f0000000480)=""/87, 0x57}, {&(0x7f0000000500)=""/253, 0xfd}], 0x8, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x40000010) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000780)) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000700)={r2, 0xffffffffffffffff, 0x22}, 0x10) (async) bpf$LINK_DETACH(0x22, &(0x7f0000000740)=r3, 0x4) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) recvmsg$unix(r2, &(0x7f00000006c0)={&(0x7f0000000080), 0x6e, &(0x7f0000000600)=[{&(0x7f0000000100)=""/157, 0x9d}, {&(0x7f00000001c0)=""/128, 0x80}, {&(0x7f0000000240)=""/42, 0x2a}, {&(0x7f0000000280)=""/252, 0xfc}, {&(0x7f0000000380)=""/157, 0x9d}, {&(0x7f0000000440)=""/36, 0x24}, {&(0x7f0000000480)=""/87, 0x57}, {&(0x7f0000000500)=""/253, 0xfd}], 0x8, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x40000010) (async) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000780)) (async) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:31 executing program 0: syz_clone(0x10820000, 0x0, 0x1000000, 0x0, 0x0, 0x0) 11:51:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1536.683319][T22913] FAULT_INJECTION: forcing a failure. [ 1536.683319][T22913] name failslab, interval 1, probability 0, space 0, times 0 [ 1536.706268][T22916] FAULT_INJECTION: forcing a failure. [ 1536.706268][T22916] name failslab, interval 1, probability 0, space 0, times 0 11:51:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ipvlan1\x00', 0x20}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:31 executing program 0: syz_clone(0x10820000, 0x0, 0x2000000, 0x0, 0x0, 0x0) 11:51:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ipvlan1\x00', 0x20}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x2) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) [ 1536.726367][T22916] CPU: 1 PID: 22916 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1536.736438][T22916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1536.746333][T22916] Call Trace: [ 1536.749457][T22916] [ 1536.752238][T22916] dump_stack_lvl+0x151/0x1b7 [ 1536.756746][T22916] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1536.762040][T22916] dump_stack+0x15/0x17 [ 1536.766033][T22916] should_fail+0x3c0/0x510 [ 1536.770286][T22916] ? kvmalloc_node+0x82/0x130 [ 1536.774803][T22916] __should_failslab+0x9f/0xe0 [ 1536.779402][T22916] should_failslab+0x9/0x20 [ 1536.783740][T22916] __kmalloc+0x6d/0x350 [ 1536.787732][T22916] ? kvmalloc_node+0x82/0x130 [ 1536.792246][T22916] kvmalloc_node+0x82/0x130 [ 1536.796584][T22916] btf_parse_type_sec+0x1fe/0x1c20 [ 1536.801533][T22916] ? __btf_verifier_log+0x120/0x120 [ 1536.806571][T22916] ? btf_verifier_log+0x2a0/0x2a0 [ 1536.811426][T22916] ? btf_parse_hdr+0x1e9/0x7e0 [ 1536.816026][T22916] ? btf_float_log+0x60/0x60 [ 1536.820469][T22916] ? btf_parse_hdr+0x601/0x7e0 [ 1536.825053][T22916] ? btf_parse_str_sec+0x224/0x2c0 [ 1536.830000][T22916] btf_new_fd+0x587/0x900 [ 1536.834165][T22916] bpf_btf_load+0x6f/0x90 [ 1536.838331][T22916] __sys_bpf+0x514/0x750 [ 1536.842413][T22916] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1536.847621][T22916] ? debug_smp_processor_id+0x17/0x20 [ 1536.852825][T22916] __x64_sys_bpf+0x7c/0x90 [ 1536.857080][T22916] do_syscall_64+0x44/0xd0 [ 1536.861332][T22916] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1536.867061][T22916] RIP: 0033:0x7fb6db8a15a9 [ 1536.871311][T22916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1536.890754][T22916] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1536.898996][T22916] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1536.906808][T22916] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1536.914618][T22916] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1536.922430][T22916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1536.930242][T22916] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1536.938056][T22916] [ 1536.940921][T22913] CPU: 0 PID: 22913 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1536.950990][T22913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1536.960884][T22913] Call Trace: [ 1536.964004][T22913] [ 1536.966783][T22913] dump_stack_lvl+0x151/0x1b7 [ 1536.971295][T22913] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1536.976589][T22913] ? _raw_spin_lock+0xa3/0x1b0 [ 1536.981189][T22913] ? dup_fd+0x51f/0xa40 [ 1536.985183][T22913] dump_stack+0x15/0x17 [ 1536.989176][T22913] should_fail+0x3c0/0x510 [ 1536.993439][T22913] __should_failslab+0x9f/0xe0 [ 1536.998027][T22913] should_failslab+0x9/0x20 [ 1537.002368][T22913] kmem_cache_alloc+0x4f/0x2f0 [ 1537.006968][T22913] ? copy_fs_struct+0x4e/0x230 [ 1537.011567][T22913] copy_fs_struct+0x4e/0x230 [ 1537.015994][T22913] copy_fs+0x72/0x140 [ 1537.019812][T22913] copy_process+0x1214/0x3250 [ 1537.024325][T22913] ? proc_fail_nth_write+0x213/0x290 [ 1537.029446][T22913] ? proc_fail_nth_read+0x220/0x220 [ 1537.034589][T22913] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1537.039533][T22913] ? vfs_write+0x9af/0x1050 [ 1537.043872][T22913] ? vmacache_update+0xb7/0x120 [ 1537.048563][T22913] kernel_clone+0x22d/0x990 [ 1537.052899][T22913] ? file_end_write+0x1b0/0x1b0 [ 1537.057587][T22913] ? __kasan_check_write+0x14/0x20 [ 1537.062536][T22913] ? create_io_thread+0x1e0/0x1e0 [ 1537.067394][T22913] ? __mutex_lock_slowpath+0x10/0x10 [ 1537.072605][T22913] __x64_sys_clone+0x289/0x310 [ 1537.077209][T22913] ? __do_sys_vfork+0x130/0x130 [ 1537.081890][T22913] ? debug_smp_processor_id+0x17/0x20 [ 1537.087098][T22913] do_syscall_64+0x44/0xd0 [ 1537.091350][T22913] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1537.097078][T22913] RIP: 0033:0x7f65e6eb55a9 [ 1537.101330][T22913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1537.120772][T22913] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:31 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 14) 11:51:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:31 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'ipvlan1\x00', 0x20}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000080)=0x2) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:31 executing program 0: syz_clone(0x10820000, 0x0, 0x4000000, 0x0, 0x0, 0x0) 11:51:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 22) 11:51:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1537.129018][T22913] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1537.136827][T22913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1537.144642][T22913] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1537.152457][T22913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1537.160264][T22913] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1537.168079][T22913] 11:51:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:31 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xf, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1537.188781][T22964] FAULT_INJECTION: forcing a failure. [ 1537.188781][T22964] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.201231][T22964] CPU: 0 PID: 22964 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1537.211270][T22964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1537.221162][T22964] Call Trace: [ 1537.224281][T22964] [ 1537.227066][T22964] dump_stack_lvl+0x151/0x1b7 [ 1537.231578][T22964] ? bfq_pos_tree_add_move+0x43e/0x43e 11:51:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1537.236875][T22964] dump_stack+0x15/0x17 [ 1537.240863][T22964] should_fail+0x3c0/0x510 [ 1537.245118][T22964] __should_failslab+0x9f/0xe0 [ 1537.249717][T22964] should_failslab+0x9/0x20 [ 1537.254056][T22964] kmem_cache_alloc+0x4f/0x2f0 [ 1537.258657][T22964] ? radix_tree_node_alloc+0x80/0x3c0 [ 1537.263868][T22964] ? kasan_set_track+0x5e/0x70 [ 1537.268466][T22964] radix_tree_node_alloc+0x80/0x3c0 [ 1537.270101][T22974] FAULT_INJECTION: forcing a failure. [ 1537.270101][T22974] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.273494][T22964] ? __sys_bpf+0x514/0x750 [ 1537.290166][T22964] ? __x64_sys_bpf+0x7c/0x90 [ 1537.294589][T22964] ? do_syscall_64+0x44/0xd0 [ 1537.299021][T22964] radix_tree_extend+0x14a/0x5c0 [ 1537.303877][T22964] idr_get_free+0x1e8/0xb00 [ 1537.308217][T22964] idr_alloc_cyclic+0x1ef/0x5d0 [ 1537.312911][T22964] ? idr_alloc+0x2f0/0x2f0 [ 1537.317149][T22964] ? ____kasan_slab_free+0x131/0x160 [ 1537.322272][T22964] ? __kasan_check_write+0x14/0x20 [ 1537.327221][T22964] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 1537.332082][T22964] ? __radix_tree_preload+0x361/0x3e0 [ 1537.337291][T22964] ? btf_new_fd+0x65e/0x900 [ 1537.341636][T22964] btf_alloc_id+0x46/0x150 [ 1537.345882][T22964] btf_new_fd+0x6a4/0x900 [ 1537.350049][T22964] bpf_btf_load+0x6f/0x90 [ 1537.354214][T22964] __sys_bpf+0x514/0x750 [ 1537.358290][T22964] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1537.363500][T22964] ? debug_smp_processor_id+0x17/0x20 [ 1537.368707][T22964] __x64_sys_bpf+0x7c/0x90 [ 1537.372960][T22964] do_syscall_64+0x44/0xd0 [ 1537.377211][T22964] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1537.382942][T22964] RIP: 0033:0x7fb6db8a15a9 [ 1537.387194][T22964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1537.406638][T22964] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1537.414905][T22964] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1537.422696][T22964] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1537.430502][T22964] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1537.438314][T22964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1537.446126][T22964] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1537.453944][T22964] [ 1537.458263][T22974] CPU: 1 PID: 22974 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1537.468333][T22974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1537.478217][T22974] Call Trace: [ 1537.481342][T22974] [ 1537.484125][T22974] dump_stack_lvl+0x151/0x1b7 [ 1537.488630][T22974] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1537.493927][T22974] dump_stack+0x15/0x17 [ 1537.497918][T22974] should_fail+0x3c0/0x510 [ 1537.502170][T22974] __should_failslab+0x9f/0xe0 [ 1537.506773][T22974] should_failslab+0x9/0x20 [ 1537.511110][T22974] kmem_cache_alloc+0x4f/0x2f0 [ 1537.515707][T22974] ? copy_sighand+0x54/0x250 [ 1537.520133][T22974] ? _raw_spin_unlock+0x4d/0x70 [ 1537.524820][T22974] copy_sighand+0x54/0x250 [ 1537.529073][T22974] copy_process+0x123f/0x3250 [ 1537.533848][T22974] ? proc_fail_nth_write+0x213/0x290 [ 1537.538967][T22974] ? proc_fail_nth_read+0x220/0x220 [ 1537.544001][T22974] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1537.548949][T22974] ? vfs_write+0x9af/0x1050 [ 1537.553293][T22974] ? vmacache_update+0xb7/0x120 [ 1537.557974][T22974] kernel_clone+0x22d/0x990 [ 1537.562327][T22974] ? file_end_write+0x1b0/0x1b0 [ 1537.567005][T22974] ? __kasan_check_write+0x14/0x20 [ 1537.571948][T22974] ? create_io_thread+0x1e0/0x1e0 [ 1537.576810][T22974] ? __mutex_lock_slowpath+0x10/0x10 [ 1537.581930][T22974] __x64_sys_clone+0x289/0x310 [ 1537.586533][T22974] ? __do_sys_vfork+0x130/0x130 [ 1537.591218][T22974] ? debug_smp_processor_id+0x17/0x20 [ 1537.596426][T22974] do_syscall_64+0x44/0xd0 [ 1537.600676][T22974] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1537.606404][T22974] RIP: 0033:0x7f65e6eb55a9 [ 1537.610659][T22974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1537.630104][T22974] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:32 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 15) 11:51:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:32 executing program 0: syz_clone(0x10820000, 0x0, 0x7000000, 0x0, 0x0, 0x0) 11:51:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 23) [ 1537.638349][T22974] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1537.646155][T22974] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1537.653969][T22974] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1537.661780][T22974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1537.669589][T22974] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1537.677404][T22974] 11:51:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000080)='./file0/file0\x00'}, 0x10) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) [ 1537.704657][T22985] FAULT_INJECTION: forcing a failure. [ 1537.704657][T22985] name failslab, interval 1, probability 0, space 0, times 0 [ 1537.717119][T22985] CPU: 0 PID: 22985 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1537.727145][T22985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1537.730949][T22996] FAULT_INJECTION: forcing a failure. [ 1537.730949][T22996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1537.737038][T22985] Call Trace: 11:51:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000005c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000500)=""/118, 0x76}], 0x2}, 0x40010021) socketpair(0x22, 0x9d7b29ef0196db9c, 0x24, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000240)=[{&(0x7f00000000c0)="a5a5f311a1f4a241ba92d436054e1af2458dc043e3fe54c89156a60a0fc2b8f3b5b12a93dfcee1a0a76e08c3d273105ff478c3fd400c9076a526b13f5f", 0x3d}, {&(0x7f0000000100)="8f6cdedbed64893814302a3cd5972bd408114eb21c4aafc20cbb44aaee77420bc7ef3d5891fb2547327a1c0a", 0x2c}, {&(0x7f0000000140)="b6c6dbcc0211bf381592bb776b2c3b6fc675fc8336351faed04e8318794be1138c225d88715ac52836e0d7607194139e5640b79322a1ec0815c812c9755f8405b2b43bf31b80ae6878676489d69c938bf24cd201d4d30ad07b03133a0931c85b305b3acc835a0a29fd85d69d928e18e3eb4338627193f32e99b0690c93fe666f907452f3675b851d24699a3477c33a52e52012de1bb8", 0x96}, {&(0x7f0000000200)="96de846184c7ffdc232fc63d3c08d6e24fd771f66ff3fed6b0cbc6424631e3beb1d2df59a237c62008a592d2af7e6ba13b2837a7ee82", 0x36}], 0x4, &(0x7f0000000280)=[@ip_retopts={{0x20, 0x0, 0x7, {[@lsrr={0x83, 0xf, 0x38, [@remote, @local, @empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x13f0}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @local}}}], 0x88}, 0x854) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000005c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000500)=""/118, 0x76}], 0x2}, 0x40010021) (async) socketpair(0x22, 0x9d7b29ef0196db9c, 0x24, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000240)=[{&(0x7f00000000c0)="a5a5f311a1f4a241ba92d436054e1af2458dc043e3fe54c89156a60a0fc2b8f3b5b12a93dfcee1a0a76e08c3d273105ff478c3fd400c9076a526b13f5f", 0x3d}, {&(0x7f0000000100)="8f6cdedbed64893814302a3cd5972bd408114eb21c4aafc20cbb44aaee77420bc7ef3d5891fb2547327a1c0a", 0x2c}, {&(0x7f0000000140)="b6c6dbcc0211bf381592bb776b2c3b6fc675fc8336351faed04e8318794be1138c225d88715ac52836e0d7607194139e5640b79322a1ec0815c812c9755f8405b2b43bf31b80ae6878676489d69c938bf24cd201d4d30ad07b03133a0931c85b305b3acc835a0a29fd85d69d928e18e3eb4338627193f32e99b0690c93fe666f907452f3675b851d24699a3477c33a52e52012de1bb8", 0x96}, {&(0x7f0000000200)="96de846184c7ffdc232fc63d3c08d6e24fd771f66ff3fed6b0cbc6424631e3beb1d2df59a237c62008a592d2af7e6ba13b2837a7ee82", 0x36}], 0x4, &(0x7f0000000280)=[@ip_retopts={{0x20, 0x0, 0x7, {[@lsrr={0x83, 0xf, 0x38, [@remote, @local, @empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x13f0}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @local}}}], 0x88}, 0x854) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f00000005c0)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000440)=""/171, 0xab}, {&(0x7f0000000500)=""/118, 0x76}], 0x2}, 0x40010021) socketpair(0x22, 0x9d7b29ef0196db9c, 0x24, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000000240)=[{&(0x7f00000000c0)="a5a5f311a1f4a241ba92d436054e1af2458dc043e3fe54c89156a60a0fc2b8f3b5b12a93dfcee1a0a76e08c3d273105ff478c3fd400c9076a526b13f5f", 0x3d}, {&(0x7f0000000100)="8f6cdedbed64893814302a3cd5972bd408114eb21c4aafc20cbb44aaee77420bc7ef3d5891fb2547327a1c0a", 0x2c}, {&(0x7f0000000140)="b6c6dbcc0211bf381592bb776b2c3b6fc675fc8336351faed04e8318794be1138c225d88715ac52836e0d7607194139e5640b79322a1ec0815c812c9755f8405b2b43bf31b80ae6878676489d69c938bf24cd201d4d30ad07b03133a0931c85b305b3acc835a0a29fd85d69d928e18e3eb4338627193f32e99b0690c93fe666f907452f3675b851d24699a3477c33a52e52012de1bb8", 0x96}, {&(0x7f0000000200)="96de846184c7ffdc232fc63d3c08d6e24fd771f66ff3fed6b0cbc6424631e3beb1d2df59a237c62008a592d2af7e6ba13b2837a7ee82", 0x36}], 0x4, &(0x7f0000000280)=[@ip_retopts={{0x20, 0x0, 0x7, {[@lsrr={0x83, 0xf, 0x38, [@remote, @local, @empty]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x13f0}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x20}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @local}}}], 0x88}, 0x854) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x80, 0x27, 0x694, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4, 0xc}, 0x48) close(r1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0xd, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x64}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f00000001c0)='GPL\x00', 0x7f, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0xb, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000001240)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001280)={0x3, 0xf, 0x8, 0x4f}, 0x10}, 0x80) [ 1537.737049][T22985] [ 1537.737058][T22985] dump_stack_lvl+0x151/0x1b7 [ 1537.760478][T22985] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1537.765775][T22985] dump_stack+0x15/0x17 [ 1537.769770][T22985] should_fail+0x3c0/0x510 [ 1537.774018][T22985] __should_failslab+0x9f/0xe0 [ 1537.778616][T22985] should_failslab+0x9/0x20 [ 1537.782951][T22985] kmem_cache_alloc+0x4f/0x2f0 [ 1537.787555][T22985] ? radix_tree_node_alloc+0x80/0x3c0 [ 1537.792765][T22985] radix_tree_node_alloc+0x80/0x3c0 [ 1537.797797][T22985] idr_get_free+0x2fb/0xb00 11:51:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1537.802144][T22985] idr_alloc_cyclic+0x1ef/0x5d0 [ 1537.806826][T22985] ? idr_alloc+0x2f0/0x2f0 [ 1537.811073][T22985] ? ____kasan_slab_free+0x131/0x160 [ 1537.816198][T22985] ? __kasan_check_write+0x14/0x20 [ 1537.821141][T22985] ? _raw_spin_lock_bh+0xa3/0x1b0 [ 1537.826007][T22985] ? __radix_tree_preload+0x361/0x3e0 [ 1537.831211][T22985] ? btf_new_fd+0x65e/0x900 [ 1537.835550][T22985] btf_alloc_id+0x46/0x150 [ 1537.839806][T22985] btf_new_fd+0x6a4/0x900 [ 1537.843971][T22985] bpf_btf_load+0x6f/0x90 [ 1537.848134][T22985] __sys_bpf+0x514/0x750 [ 1537.852215][T22985] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1537.857422][T22985] ? debug_smp_processor_id+0x17/0x20 [ 1537.862628][T22985] __x64_sys_bpf+0x7c/0x90 [ 1537.866884][T22985] do_syscall_64+0x44/0xd0 [ 1537.871134][T22985] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1537.876860][T22985] RIP: 0033:0x7fb6db8a15a9 [ 1537.881117][T22985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1537.900555][T22985] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1537.908802][T22985] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1537.916614][T22985] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1537.924422][T22985] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1537.932237][T22985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1537.940048][T22985] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1537.947864][T22985] [ 1537.950727][T22996] CPU: 1 PID: 22996 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1537.960798][T22996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1537.970692][T22996] Call Trace: [ 1537.973813][T22996] [ 1537.976594][T22996] dump_stack_lvl+0x151/0x1b7 [ 1537.981104][T22996] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1537.986401][T22996] dump_stack+0x15/0x17 [ 1537.990389][T22996] should_fail+0x3c0/0x510 [ 1537.994645][T22996] should_fail_alloc_page+0x58/0x70 [ 1537.999675][T22996] __alloc_pages+0x1de/0x7c0 [ 1538.004103][T22996] ? __count_vm_events+0x30/0x30 [ 1538.008877][T22996] ? __kasan_kmalloc+0x9/0x10 [ 1538.013397][T22996] ? __kmalloc+0x203/0x350 [ 1538.017642][T22996] ? __vmalloc_node_range+0x2e3/0x800 [ 1538.022849][T22996] __vmalloc_node_range+0x48f/0x800 [ 1538.027882][T22996] dup_task_struct+0x61f/0xa60 [ 1538.032479][T22996] ? copy_process+0x579/0x3250 [ 1538.037081][T22996] ? __kasan_check_write+0x14/0x20 [ 1538.042026][T22996] copy_process+0x579/0x3250 [ 1538.046455][T22996] ? __kasan_check_write+0x14/0x20 [ 1538.051401][T22996] ? proc_fail_nth_write+0x213/0x290 [ 1538.056528][T22996] ? proc_fail_nth_read+0x220/0x220 [ 1538.061558][T22996] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1538.066504][T22996] ? vfs_write+0x9af/0x1050 [ 1538.070844][T22996] ? vmacache_update+0xb7/0x120 [ 1538.075529][T22996] kernel_clone+0x22d/0x990 [ 1538.079871][T22996] ? file_end_write+0x1b0/0x1b0 [ 1538.084557][T22996] ? __kasan_check_write+0x14/0x20 [ 1538.089503][T22996] ? create_io_thread+0x1e0/0x1e0 [ 1538.094366][T22996] ? __mutex_lock_slowpath+0x10/0x10 [ 1538.099484][T22996] __x64_sys_clone+0x289/0x310 [ 1538.104087][T22996] ? __do_sys_vfork+0x130/0x130 [ 1538.108774][T22996] ? debug_smp_processor_id+0x17/0x20 [ 1538.113981][T22996] do_syscall_64+0x44/0xd0 [ 1538.118241][T22996] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1538.123960][T22996] RIP: 0033:0x7f65e6eb55a9 [ 1538.128215][T22996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1538.147655][T22996] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:32 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 16) 11:51:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x80, 0x27, 0x694, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4, 0xc}, 0x48) close(r1) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0xd, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x64}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f00000001c0)='GPL\x00', 0x7f, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0xb, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000001240)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001280)={0x3, 0xf, 0x8, 0x4f}, 0x10}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x80, 0x27, 0x694, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4, 0xc}, 0x48) (async) close(r1) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200), 0x4) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0xd, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x64}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f00000001c0)='GPL\x00', 0x7f, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0xb, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000001240)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001280)={0x3, 0xf, 0x8, 0x4f}, 0x10}, 0x80) (async) 11:51:32 executing program 0: syz_clone(0x10820000, 0x0, 0x9000000, 0x0, 0x0, 0x0) 11:51:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 24) [ 1538.155899][T22996] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1538.163713][T22996] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1538.171522][T22996] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1538.179335][T22996] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1538.187145][T22996] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1538.194960][T22996] 11:51:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x21, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:32 executing program 0: syz_clone(0x10820000, 0x0, 0xf000000, 0x0, 0x0, 0x0) 11:51:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x80, 0x27, 0x694, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x4, 0xc}, 0x48) close(r1) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.controllers\x00', 0x0, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r4 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001200), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x18, 0xd, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x64}, @cb_func={0x18, 0x3, 0x4, 0x0, 0x8}, @map_fd={0x18, 0x0, 0x1, 0x0, r2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @cb_func={0x18, 0x3, 0x4, 0x0, 0xfffffffffffffffb}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}]}, &(0x7f00000001c0)='GPL\x00', 0x7f, 0x1000, &(0x7f0000000200)=""/4096, 0x41000, 0xb, '\x00', r3, 0x0, r4, 0x8, &(0x7f0000001240)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000001280)={0x3, 0xf, 0x8, 0x4f}, 0x10}, 0x80) [ 1538.219758][T23017] FAULT_INJECTION: forcing a failure. [ 1538.219758][T23017] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.247064][T23017] CPU: 0 PID: 23017 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1538.257135][T23017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 11:51:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1538.267033][T23017] Call Trace: [ 1538.270155][T23017] [ 1538.272931][T23017] dump_stack_lvl+0x151/0x1b7 [ 1538.277447][T23017] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1538.282743][T23017] dump_stack+0x15/0x17 [ 1538.286739][T23017] should_fail+0x3c0/0x510 [ 1538.290987][T23017] __should_failslab+0x9f/0xe0 [ 1538.295588][T23017] should_failslab+0x9/0x20 [ 1538.299925][T23017] kmem_cache_alloc+0x4f/0x2f0 [ 1538.304527][T23017] ? _raw_spin_lock+0xa3/0x1b0 [ 1538.309125][T23017] ? __alloc_file+0x29/0x2a0 [ 1538.313550][T23017] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1538.318758][T23017] __alloc_file+0x29/0x2a0 [ 1538.323012][T23017] alloc_empty_file+0xac/0x1b0 [ 1538.327618][T23017] alloc_file+0x5b/0x4e0 [ 1538.331692][T23017] alloc_file_pseudo+0x260/0x300 [ 1538.336466][T23017] ? alloc_empty_file_noaccount+0x80/0x80 [ 1538.342024][T23017] __anon_inode_getfd+0x2a8/0x430 [ 1538.346881][T23017] ? anon_inode_getfd+0x40/0x40 [ 1538.351565][T23017] ? __radix_tree_preload+0x361/0x3e0 [ 1538.356777][T23017] anon_inode_getfd+0x33/0x40 [ 1538.361286][T23017] btf_new_fd+0x766/0x900 [ 1538.365464][T23017] bpf_btf_load+0x6f/0x90 [ 1538.369624][T23017] __sys_bpf+0x514/0x750 [ 1538.373698][T23017] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1538.378909][T23017] ? debug_smp_processor_id+0x17/0x20 [ 1538.380366][T23048] FAULT_INJECTION: forcing a failure. [ 1538.380366][T23048] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.384112][T23017] __x64_sys_bpf+0x7c/0x90 [ 1538.384136][T23017] do_syscall_64+0x44/0xd0 [ 1538.405040][T23017] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1538.410757][T23017] RIP: 0033:0x7fb6db8a15a9 [ 1538.415011][T23017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1538.434449][T23017] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1538.442698][T23017] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1538.450525][T23017] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1538.458319][T23017] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1538.466143][T23017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1538.473941][T23017] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1538.481756][T23017] [ 1538.484620][T23048] CPU: 1 PID: 23048 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1538.494691][T23048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1538.504585][T23048] Call Trace: [ 1538.507721][T23048] [ 1538.510483][T23048] dump_stack_lvl+0x151/0x1b7 [ 1538.514994][T23048] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1538.520288][T23048] dump_stack+0x15/0x17 [ 1538.524281][T23048] should_fail+0x3c0/0x510 [ 1538.528533][T23048] __should_failslab+0x9f/0xe0 [ 1538.533133][T23048] should_failslab+0x9/0x20 [ 1538.537558][T23048] kmem_cache_alloc+0x4f/0x2f0 [ 1538.542170][T23048] ? dup_mm+0x29/0x330 [ 1538.546066][T23048] dup_mm+0x29/0x330 [ 1538.549797][T23048] copy_mm+0x108/0x1b0 [ 1538.553718][T23048] copy_process+0x1295/0x3250 [ 1538.558225][T23048] ? proc_fail_nth_write+0x213/0x290 [ 1538.563343][T23048] ? proc_fail_nth_read+0x220/0x220 [ 1538.568373][T23048] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1538.573322][T23048] ? vfs_write+0x9af/0x1050 [ 1538.577659][T23048] ? vmacache_update+0xb7/0x120 [ 1538.582350][T23048] kernel_clone+0x22d/0x990 [ 1538.586687][T23048] ? file_end_write+0x1b0/0x1b0 [ 1538.591374][T23048] ? __kasan_check_write+0x14/0x20 [ 1538.596319][T23048] ? create_io_thread+0x1e0/0x1e0 [ 1538.601182][T23048] ? __mutex_lock_slowpath+0x10/0x10 [ 1538.606302][T23048] __x64_sys_clone+0x289/0x310 [ 1538.610902][T23048] ? __do_sys_vfork+0x130/0x130 [ 1538.615590][T23048] ? debug_smp_processor_id+0x17/0x20 [ 1538.620796][T23048] do_syscall_64+0x44/0xd0 [ 1538.625136][T23048] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1538.630862][T23048] RIP: 0033:0x7f65e6eb55a9 [ 1538.635117][T23048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1538.654557][T23048] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1538.662806][T23048] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:33 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 17) 11:51:33 executing program 0: syz_clone(0x10820000, 0x0, 0x1f000000, 0x0, 0x0, 0x0) 11:51:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 11:51:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 25) 11:51:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) [ 1538.670616][T23048] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1538.678426][T23048] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1538.686249][T23048] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1538.694050][T23048] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1538.701866][T23048] 11:51:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:33 executing program 0: syz_clone(0x10820000, 0x0, 0x1ffff000, 0x0, 0x0, 0x0) [ 1538.740568][T23064] FAULT_INJECTION: forcing a failure. [ 1538.740568][T23064] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.759766][T23065] FAULT_INJECTION: forcing a failure. [ 1538.759766][T23065] name failslab, interval 1, probability 0, space 0, times 0 [ 1538.788092][T23065] CPU: 1 PID: 23065 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1538.798171][T23065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1538.808082][T23065] Call Trace: [ 1538.811194][T23065] [ 1538.813969][T23065] dump_stack_lvl+0x151/0x1b7 [ 1538.818482][T23065] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1538.823773][T23065] dump_stack+0x15/0x17 [ 1538.827764][T23065] should_fail+0x3c0/0x510 [ 1538.832019][T23065] ? mm_init+0x392/0x960 [ 1538.836446][T23065] __should_failslab+0x9f/0xe0 [ 1538.841044][T23065] should_failslab+0x9/0x20 [ 1538.845382][T23065] kmem_cache_alloc_trace+0x4a/0x310 [ 1538.850508][T23065] mm_init+0x392/0x960 [ 1538.854415][T23065] dup_mm+0x7d/0x330 [ 1538.858145][T23065] copy_mm+0x108/0x1b0 [ 1538.862048][T23065] copy_process+0x1295/0x3250 [ 1538.866565][T23065] ? proc_fail_nth_write+0x213/0x290 [ 1538.871691][T23065] ? proc_fail_nth_read+0x220/0x220 [ 1538.876717][T23065] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1538.881672][T23065] ? vfs_write+0x9af/0x1050 [ 1538.886175][T23065] ? vmacache_update+0xb7/0x120 [ 1538.890864][T23065] kernel_clone+0x22d/0x990 [ 1538.895204][T23065] ? file_end_write+0x1b0/0x1b0 [ 1538.899889][T23065] ? __kasan_check_write+0x14/0x20 [ 1538.904837][T23065] ? create_io_thread+0x1e0/0x1e0 [ 1538.909697][T23065] ? __mutex_lock_slowpath+0x10/0x10 [ 1538.914820][T23065] __x64_sys_clone+0x289/0x310 [ 1538.919424][T23065] ? __do_sys_vfork+0x130/0x130 [ 1538.924111][T23065] ? debug_smp_processor_id+0x17/0x20 [ 1538.929315][T23065] do_syscall_64+0x44/0xd0 [ 1538.933571][T23065] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1538.939294][T23065] RIP: 0033:0x7f65e6eb55a9 [ 1538.943550][T23065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1538.962988][T23065] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1538.971233][T23065] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1538.979045][T23065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1538.986857][T23065] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1538.994668][T23065] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1539.002577][T23065] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1539.010391][T23065] [ 1539.013252][T23064] CPU: 0 PID: 23064 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1539.023322][T23064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1539.033225][T23064] Call Trace: [ 1539.036341][T23064] [ 1539.039117][T23064] dump_stack_lvl+0x151/0x1b7 [ 1539.043633][T23064] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1539.048928][T23064] dump_stack+0x15/0x17 [ 1539.052917][T23064] should_fail+0x3c0/0x510 [ 1539.057172][T23064] __should_failslab+0x9f/0xe0 [ 1539.061768][T23064] should_failslab+0x9/0x20 [ 1539.066109][T23064] kmem_cache_alloc+0x4f/0x2f0 [ 1539.070710][T23064] ? _raw_spin_lock+0xa3/0x1b0 [ 1539.075310][T23064] ? __alloc_file+0x29/0x2a0 [ 1539.079733][T23064] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1539.084940][T23064] __alloc_file+0x29/0x2a0 [ 1539.089195][T23064] alloc_empty_file+0xac/0x1b0 [ 1539.093795][T23064] alloc_file+0x5b/0x4e0 [ 1539.097875][T23064] alloc_file_pseudo+0x260/0x300 [ 1539.102651][T23064] ? alloc_empty_file_noaccount+0x80/0x80 [ 1539.108201][T23064] __anon_inode_getfd+0x2a8/0x430 [ 1539.113061][T23064] ? anon_inode_getfd+0x40/0x40 [ 1539.117749][T23064] ? __radix_tree_preload+0x361/0x3e0 [ 1539.122958][T23064] anon_inode_getfd+0x33/0x40 [ 1539.127468][T23064] btf_new_fd+0x766/0x900 [ 1539.131634][T23064] bpf_btf_load+0x6f/0x90 [ 1539.135799][T23064] __sys_bpf+0x514/0x750 [ 1539.139879][T23064] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1539.145091][T23064] ? debug_smp_processor_id+0x17/0x20 [ 1539.150294][T23064] __x64_sys_bpf+0x7c/0x90 [ 1539.154553][T23064] do_syscall_64+0x44/0xd0 [ 1539.158801][T23064] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1539.164530][T23064] RIP: 0033:0x7fb6db8a15a9 [ 1539.168787][T23064] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:33 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 18) 11:51:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) 11:51:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:33 executing program 0: syz_clone(0x10820000, 0x0, 0x20000000, 0x0, 0x0, 0x0) [ 1539.188225][T23064] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1539.196663][T23064] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1539.204477][T23064] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1539.212286][T23064] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1539.220102][T23064] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1539.227910][T23064] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1539.235725][T23064] 11:51:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 26) 11:51:33 executing program 0: syz_clone(0x10820000, 0x0, 0x3f000000, 0x0, 0x0, 0x0) 11:51:33 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000780)={&(0x7f00000002c0)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)=""/195, 0xc3}, {&(0x7f0000000440)=""/169, 0xa9}, {&(0x7f0000000500)=""/181, 0xb5}, {&(0x7f00000005c0)=""/66, 0x42}], 0x4, &(0x7f0000000680)=""/209, 0xd1}, 0x40010000) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x25, 0x4}, 0x10) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000240)={r5, 0xffffffffffffffff, 0x79d389e961b3eb1, r6}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000fece061f54c100", @ANYRES8=r1, @ANYRESOCT=r0, @ANYRES8=r4], &(0x7f00000000c0)=""/178, 0x87, 0xb2, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 11:51:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1539.261826][T23080] FAULT_INJECTION: forcing a failure. [ 1539.261826][T23080] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1539.301369][T23091] FAULT_INJECTION: forcing a failure. 11:51:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:33 executing program 0: syz_clone(0x10820000, 0x0, 0x40000000, 0x0, 0x0, 0x0) 11:51:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1539.301369][T23091] name failslab, interval 1, probability 0, space 0, times 0 [ 1539.346751][T23091] CPU: 1 PID: 23091 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1539.356828][T23091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1539.366730][T23091] Call Trace: [ 1539.369849][T23091] [ 1539.372629][T23091] dump_stack_lvl+0x151/0x1b7 [ 1539.377141][T23091] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1539.382435][T23091] dump_stack+0x15/0x17 [ 1539.386425][T23091] should_fail+0x3c0/0x510 [ 1539.390682][T23091] __should_failslab+0x9f/0xe0 [ 1539.395279][T23091] should_failslab+0x9/0x20 [ 1539.399621][T23091] kmem_cache_alloc+0x4f/0x2f0 [ 1539.404220][T23091] ? security_file_alloc+0x29/0x140 [ 1539.409252][T23091] security_file_alloc+0x29/0x140 [ 1539.414113][T23091] __alloc_file+0xb1/0x2a0 [ 1539.418367][T23091] alloc_empty_file+0xac/0x1b0 [ 1539.422963][T23091] alloc_file+0x5b/0x4e0 [ 1539.427042][T23091] alloc_file_pseudo+0x260/0x300 [ 1539.431819][T23091] ? alloc_empty_file_noaccount+0x80/0x80 [ 1539.437373][T23091] __anon_inode_getfd+0x2a8/0x430 [ 1539.442229][T23091] ? anon_inode_getfd+0x40/0x40 [ 1539.446917][T23091] ? __radix_tree_preload+0x361/0x3e0 [ 1539.452127][T23091] anon_inode_getfd+0x33/0x40 [ 1539.456637][T23091] btf_new_fd+0x766/0x900 [ 1539.460806][T23091] bpf_btf_load+0x6f/0x90 [ 1539.464971][T23091] __sys_bpf+0x514/0x750 [ 1539.469049][T23091] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1539.474261][T23091] ? debug_smp_processor_id+0x17/0x20 [ 1539.479465][T23091] __x64_sys_bpf+0x7c/0x90 [ 1539.483718][T23091] do_syscall_64+0x44/0xd0 [ 1539.487971][T23091] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1539.493698][T23091] RIP: 0033:0x7fb6db8a15a9 [ 1539.497952][T23091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1539.517392][T23091] RSP: 002b:00007fb6daa15168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1539.525639][T23091] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8a15a9 [ 1539.533450][T23091] RDX: 0000000000000020 RSI: 0000000020000000 RDI: 0000000000000012 [ 1539.541265][T23091] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 [ 1539.549072][T23091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1539.556885][T23091] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1539.564702][T23091] [ 1539.567562][T23080] CPU: 0 PID: 23080 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1539.577636][T23080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1539.587530][T23080] Call Trace: [ 1539.590653][T23080] [ 1539.593428][T23080] dump_stack_lvl+0x151/0x1b7 [ 1539.597942][T23080] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1539.603233][T23080] ? pcpu_block_update_hint_alloc+0x972/0xd00 [ 1539.609138][T23080] dump_stack+0x15/0x17 [ 1539.613128][T23080] should_fail+0x3c0/0x510 [ 1539.617384][T23080] should_fail_alloc_page+0x58/0x70 [ 1539.622415][T23080] __alloc_pages+0x1de/0x7c0 [ 1539.626839][T23080] ? __count_vm_events+0x30/0x30 [ 1539.631614][T23080] __get_free_pages+0xe/0x30 [ 1539.636038][T23080] pgd_alloc+0x22/0x2c0 [ 1539.640031][T23080] mm_init+0x5bf/0x960 [ 1539.643938][T23080] dup_mm+0x7d/0x330 [ 1539.647668][T23080] copy_mm+0x108/0x1b0 [ 1539.651575][T23080] copy_process+0x1295/0x3250 [ 1539.656094][T23080] ? proc_fail_nth_write+0x213/0x290 [ 1539.661208][T23080] ? proc_fail_nth_read+0x220/0x220 [ 1539.666243][T23080] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1539.671194][T23080] ? vfs_write+0x9af/0x1050 [ 1539.675530][T23080] ? vmacache_update+0xb7/0x120 [ 1539.680316][T23080] kernel_clone+0x22d/0x990 [ 1539.684645][T23080] ? file_end_write+0x1b0/0x1b0 [ 1539.689330][T23080] ? __kasan_check_write+0x14/0x20 [ 1539.694277][T23080] ? create_io_thread+0x1e0/0x1e0 [ 1539.699139][T23080] ? __mutex_lock_slowpath+0x10/0x10 [ 1539.704265][T23080] __x64_sys_clone+0x289/0x310 [ 1539.708863][T23080] ? __do_sys_vfork+0x130/0x130 [ 1539.713553][T23080] ? debug_smp_processor_id+0x17/0x20 [ 1539.718754][T23080] do_syscall_64+0x44/0xd0 [ 1539.723008][T23080] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1539.728753][T23080] RIP: 0033:0x7f65e6eb55a9 [ 1539.733061][T23080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1539.752430][T23080] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1539.760676][T23080] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1539.768487][T23080] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1539.776297][T23080] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1539.784109][T23080] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:34 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 19) 11:51:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xf, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:34 executing program 0: syz_clone(0x10820000, 0x0, 0x41000000, 0x0, 0x0, 0x0) 11:51:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) (fail_nth: 27) [ 1539.791922][T23080] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1539.799734][T23080] 11:51:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xca, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1539.881716][T23118] FAULT_INJECTION: forcing a failure. [ 1539.881716][T23118] name failslab, interval 1, probability 0, space 0, times 0 [ 1539.881767][T23120] FAULT_INJECTION: forcing a failure. [ 1539.881767][T23120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1539.900187][T23118] CPU: 1 PID: 23118 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1539.917050][T23118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1539.927090][T23118] Call Trace: [ 1539.930147][T23118] [ 1539.932926][T23118] dump_stack_lvl+0x151/0x1b7 [ 1539.937441][T23118] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1539.942733][T23118] ? xas_nomem+0x19e/0x1e0 [ 1539.946986][T23118] dump_stack+0x15/0x17 [ 1539.950977][T23118] should_fail+0x3c0/0x510 [ 1539.955235][T23118] ? setup_userns_sysctls+0x55/0x340 [ 1539.960351][T23118] __should_failslab+0x9f/0xe0 [ 1539.964954][T23118] should_failslab+0x9/0x20 [ 1539.969290][T23118] __kmalloc_track_caller+0x6c/0x350 [ 1539.974411][T23118] ? setup_userns_sysctls+0x340/0x340 [ 1539.979620][T23118] kmemdup+0x24/0x50 [ 1539.983354][T23118] setup_userns_sysctls+0x55/0x340 [ 1539.988299][T23118] create_user_ns+0x1227/0x19b0 [ 1539.992985][T23118] ? utsns_owner+0x40/0x40 [ 1539.997238][T23118] ? security_prepare_creds+0x149/0x160 [ 1540.002622][T23118] ? prepare_creds+0x485/0x690 [ 1540.007219][T23118] copy_creds+0x200/0x640 [ 1540.011390][T23118] copy_process+0x775/0x3250 [ 1540.015814][T23118] ? __kasan_check_write+0x14/0x20 [ 1540.020760][T23118] ? proc_fail_nth_write+0x213/0x290 [ 1540.025883][T23118] ? proc_fail_nth_read+0x220/0x220 [ 1540.030917][T23118] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1540.035861][T23118] ? vfs_write+0x9af/0x1050 [ 1540.040204][T23118] ? vmacache_update+0xb7/0x120 [ 1540.044890][T23118] kernel_clone+0x22d/0x990 [ 1540.049234][T23118] ? file_end_write+0x1b0/0x1b0 [ 1540.053914][T23118] ? __kasan_check_write+0x14/0x20 [ 1540.058861][T23118] ? create_io_thread+0x1e0/0x1e0 [ 1540.063721][T23118] ? __mutex_lock_slowpath+0x10/0x10 [ 1540.068847][T23118] __x64_sys_clone+0x289/0x310 [ 1540.073445][T23118] ? __do_sys_vfork+0x130/0x130 [ 1540.078132][T23118] ? debug_smp_processor_id+0x17/0x20 [ 1540.083339][T23118] do_syscall_64+0x44/0xd0 [ 1540.087597][T23118] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1540.093318][T23118] RIP: 0033:0x7f65e6eb55a9 [ 1540.097572][T23118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1540.117020][T23118] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:34 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) (async, rerun: 32) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) (rerun: 32) recvmsg(r2, &(0x7f0000000780)={&(0x7f00000002c0)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)=""/195, 0xc3}, {&(0x7f0000000440)=""/169, 0xa9}, {&(0x7f0000000500)=""/181, 0xb5}, {&(0x7f00000005c0)=""/66, 0x42}], 0x4, &(0x7f0000000680)=""/209, 0xd1}, 0x40010000) (async, rerun: 64) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async, rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x25, 0x4}, 0x10) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000240)={r5, 0xffffffffffffffff, 0x79d389e961b3eb1, r6}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000fece061f54c100", @ANYRES8=r1, @ANYRESOCT=r0, @ANYRES8=r4], &(0x7f00000000c0)=""/178, 0x87, 0xb2, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x4) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 11:51:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:34 executing program 0: syz_clone(0x10820000, 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) [ 1540.125261][T23118] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1540.133075][T23118] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1540.140888][T23118] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1540.148693][T23118] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1540.156504][T23118] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1540.164317][T23118] [ 1540.167184][T23120] CPU: 0 PID: 23120 Comm: syz-executor.2 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 11:51:34 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 20) [ 1540.177254][T23120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1540.187149][T23120] Call Trace: [ 1540.190281][T23120] [ 1540.193049][T23120] dump_stack_lvl+0x151/0x1b7 [ 1540.197563][T23120] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1540.202860][T23120] ? alloc_file+0x84/0x4e0 [ 1540.204738][T23127] FAULT_INJECTION: forcing a failure. [ 1540.204738][T23127] name failslab, interval 1, probability 0, space 0, times 0 [ 1540.207107][T23120] dump_stack+0x15/0x17 [ 1540.207134][T23120] should_fail+0x3c0/0x510 [ 1540.227772][T23120] should_fail_usercopy+0x1a/0x20 [ 1540.232625][T23120] _copy_to_user+0x20/0x90 [ 1540.236878][T23120] simple_read_from_buffer+0xdd/0x160 [ 1540.242084][T23120] proc_fail_nth_read+0x1af/0x220 [ 1540.246944][T23120] ? proc_fault_inject_write+0x3a0/0x3a0 [ 1540.252416][T23120] ? security_file_permission+0x497/0x5f0 [ 1540.257974][T23120] ? proc_fault_inject_write+0x3a0/0x3a0 [ 1540.263437][T23120] vfs_read+0x299/0xd80 [ 1540.267431][T23120] ? kernel_read+0x1f0/0x1f0 [ 1540.271854][T23120] ? __kasan_check_write+0x14/0x20 [ 1540.276805][T23120] ? mutex_lock+0xb6/0x130 [ 1540.281057][T23120] ? wait_for_completion_killable_timeout+0x10/0x10 [ 1540.287481][T23120] ? __fdget_pos+0x26d/0x310 [ 1540.291903][T23120] ? ksys_read+0x77/0x2c0 [ 1540.296071][T23120] ksys_read+0x198/0x2c0 [ 1540.300151][T23120] ? vfs_write+0x1050/0x1050 [ 1540.304578][T23120] ? debug_smp_processor_id+0x17/0x20 [ 1540.309783][T23120] __x64_sys_read+0x7b/0x90 [ 1540.314126][T23120] do_syscall_64+0x44/0xd0 [ 1540.318379][T23120] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1540.324102][T23120] RIP: 0033:0x7fb6db8532ec [ 1540.328358][T23120] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1540.347797][T23120] RSP: 002b:00007fb6daa15160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1540.356129][T23120] RAX: ffffffffffffffda RBX: 00007fb6db9c1f80 RCX: 00007fb6db8532ec [ 1540.363940][T23120] RDX: 000000000000000f RSI: 00007fb6daa151e0 RDI: 0000000000000003 [ 1540.371751][T23120] RBP: 00007fb6daa151d0 R08: 0000000000000000 R09: 0000000000000000 11:51:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x27, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1540.379563][T23120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1540.387377][T23120] R13: 00007fff6effefcf R14: 00007fb6daa15300 R15: 0000000000022000 [ 1540.395190][T23120] [ 1540.401472][T23127] CPU: 0 PID: 23127 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1540.411550][T23127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1540.421442][T23127] Call Trace: [ 1540.424567][T23127] [ 1540.427348][T23127] dump_stack_lvl+0x151/0x1b7 11:51:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1540.431862][T23127] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1540.437154][T23127] dump_stack+0x15/0x17 [ 1540.441144][T23127] should_fail+0x3c0/0x510 [ 1540.445397][T23127] ? __register_sysctl_table+0xee/0x1330 [ 1540.450867][T23127] __should_failslab+0x9f/0xe0 [ 1540.455467][T23127] should_failslab+0x9/0x20 [ 1540.459809][T23127] __kmalloc+0x6d/0x350 [ 1540.463799][T23127] __register_sysctl_table+0xee/0x1330 [ 1540.469094][T23127] ? __kmalloc_track_caller+0x202/0x350 [ 1540.474475][T23127] ? kmemdup+0x3f/0x50 [ 1540.478379][T23127] ? memcpy+0x56/0x70 [ 1540.482203][T23127] setup_userns_sysctls+0x2b1/0x340 [ 1540.487233][T23127] create_user_ns+0x1227/0x19b0 [ 1540.491915][T23127] ? utsns_owner+0x40/0x40 [ 1540.496167][T23127] ? security_prepare_creds+0x149/0x160 [ 1540.501551][T23127] ? prepare_creds+0x485/0x690 [ 1540.506148][T23127] copy_creds+0x200/0x640 [ 1540.510319][T23127] copy_process+0x775/0x3250 [ 1540.514743][T23127] ? __kasan_check_write+0x14/0x20 [ 1540.519687][T23127] ? proc_fail_nth_write+0x213/0x290 [ 1540.524809][T23127] ? proc_fail_nth_read+0x220/0x220 [ 1540.529851][T23127] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1540.534789][T23127] ? vfs_write+0x9af/0x1050 [ 1540.539147][T23127] ? vmacache_update+0xb7/0x120 [ 1540.543820][T23127] kernel_clone+0x22d/0x990 [ 1540.548162][T23127] ? file_end_write+0x1b0/0x1b0 [ 1540.552861][T23127] ? __kasan_check_write+0x14/0x20 [ 1540.557790][T23127] ? create_io_thread+0x1e0/0x1e0 [ 1540.562651][T23127] ? __mutex_lock_slowpath+0x10/0x10 [ 1540.567771][T23127] __x64_sys_clone+0x289/0x310 [ 1540.572372][T23127] ? __do_sys_vfork+0x130/0x130 [ 1540.577071][T23127] ? debug_smp_processor_id+0x17/0x20 [ 1540.582270][T23127] do_syscall_64+0x44/0xd0 [ 1540.586523][T23127] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1540.592255][T23127] RIP: 0033:0x7f65e6eb55a9 [ 1540.596501][T23127] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1540.615944][T23127] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1540.624188][T23127] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1540.631998][T23127] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1540.639810][T23127] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1540.647620][T23127] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1540.655447][T23127] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1540.663246][T23127] 11:51:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000780)={&(0x7f00000002c0)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)=""/195, 0xc3}, {&(0x7f0000000440)=""/169, 0xa9}, {&(0x7f0000000500)=""/181, 0xb5}, {&(0x7f00000005c0)=""/66, 0x42}], 0x4, &(0x7f0000000680)=""/209, 0xd1}, 0x40010000) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x25, 0x4}, 0x10) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000240)={r5, 0xffffffffffffffff, 0x79d389e961b3eb1, r6}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000fece061f54c100", @ANYRES8=r1, @ANYRESOCT=r0, @ANYRES8=r4], &(0x7f00000000c0)=""/178, 0x87, 0xb2, 0x1}, 0x20) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) (async) recvmsg(r2, &(0x7f0000000780)={&(0x7f00000002c0)=@ethernet={0x0, @multicast}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000340)=""/195, 0xc3}, {&(0x7f0000000440)=""/169, 0xa9}, {&(0x7f0000000500)=""/181, 0xb5}, {&(0x7f00000005c0)=""/66, 0x42}], 0x4, &(0x7f0000000680)=""/209, 0xd1}, 0x40010000) (async) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)) (async) sendmsg$inet(r3, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)) (async) sendmsg$inet(r4, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x25, 0x4}, 0x10) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000200), 0x4) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000240)={r5, 0xffffffffffffffff, 0x79d389e961b3eb1, r6}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100180000000000fece061f54c100", @ANYRES8=r1, @ANYRESOCT=r0, @ANYRES8=r4], &(0x7f00000000c0)=""/178, 0x87, 0xb2, 0x1}, 0x20) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x4) (async) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) (async) 11:51:35 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 21) 11:51:35 executing program 0: syz_clone(0x10820000, 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 11:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x21, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 0: syz_clone(0x10820000, 0x0, 0xfeffffff, 0x0, 0x0, 0x0) 11:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1541.127200][T23153] FAULT_INJECTION: forcing a failure. [ 1541.127200][T23153] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.165505][T23153] CPU: 1 PID: 23153 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1541.175580][T23153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1541.185472][T23153] Call Trace: [ 1541.188593][T23153] [ 1541.191371][T23153] dump_stack_lvl+0x151/0x1b7 [ 1541.195882][T23153] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1541.201177][T23153] ? __register_sysctl_table+0x1264/0x1330 [ 1541.206821][T23153] dump_stack+0x15/0x17 [ 1541.210812][T23153] should_fail+0x3c0/0x510 [ 1541.215068][T23153] ? alloc_ucounts+0x161/0x4e0 [ 1541.219664][T23153] __should_failslab+0x9f/0xe0 [ 1541.224265][T23153] should_failslab+0x9/0x20 [ 1541.228606][T23153] kmem_cache_alloc_trace+0x4a/0x310 [ 1541.233724][T23153] ? utsns_owner+0x40/0x40 [ 1541.237978][T23153] alloc_ucounts+0x161/0x4e0 [ 1541.242407][T23153] copy_creds+0x345/0x640 [ 1541.246571][T23153] copy_process+0x775/0x3250 [ 1541.250998][T23153] ? __kasan_check_write+0x14/0x20 [ 1541.255944][T23153] ? proc_fail_nth_write+0x213/0x290 [ 1541.261064][T23153] ? proc_fail_nth_read+0x220/0x220 [ 1541.266098][T23153] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1541.271044][T23153] ? vfs_write+0x9af/0x1050 [ 1541.275390][T23153] ? vmacache_update+0xb7/0x120 [ 1541.280080][T23153] kernel_clone+0x22d/0x990 [ 1541.284417][T23153] ? file_end_write+0x1b0/0x1b0 [ 1541.289101][T23153] ? __kasan_check_write+0x14/0x20 [ 1541.294050][T23153] ? create_io_thread+0x1e0/0x1e0 [ 1541.298912][T23153] ? __mutex_lock_slowpath+0x10/0x10 [ 1541.304119][T23153] __x64_sys_clone+0x289/0x310 [ 1541.308717][T23153] ? __do_sys_vfork+0x130/0x130 [ 1541.313401][T23153] ? debug_smp_processor_id+0x17/0x20 [ 1541.318702][T23153] do_syscall_64+0x44/0xd0 [ 1541.322958][T23153] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1541.328685][T23153] RIP: 0033:0x7f65e6eb55a9 [ 1541.332942][T23153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1541.352466][T23153] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1541.360710][T23153] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1541.368522][T23153] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 0: syz_clone(0x10820000, 0x0, 0xffff0300, 0x0, 0x0, 0x0) 11:51:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) recvmsg$unix(r0, &(0x7f00000023c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000002300)=[{&(0x7f00000001c0)=""/94, 0x5e}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/169, 0xa9}], 0x4, &(0x7f0000002340)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x2001) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) r2 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x0, 0x7, 0x20, 0xf9, 0x0, 0x0, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x4408, 0x1, 0x80000001, 0x1, 0xffffffffffffffff, 0x2, 0x84e7, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) [ 1541.376337][T23153] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1541.384152][T23153] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1541.391956][T23153] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1541.399786][T23153] 11:51:35 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 22) 11:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) recvmsg$unix(r0, &(0x7f00000023c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000002300)=[{&(0x7f00000001c0)=""/94, 0x5e}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/169, 0xa9}], 0x4, &(0x7f0000002340)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x2001) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) r2 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x0, 0x7, 0x20, 0xf9, 0x0, 0x0, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x4408, 0x1, 0x80000001, 0x1, 0xffffffffffffffff, 0x2, 0x84e7, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) recvmsg$unix(r0, &(0x7f00000023c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000002300)=[{&(0x7f00000001c0)=""/94, 0x5e}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/169, 0xa9}], 0x4, &(0x7f0000002340)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x2001) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) (async) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x0, 0x7, 0x20, 0xf9, 0x0, 0x0, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x4408, 0x1, 0x80000001, 0x1, 0xffffffffffffffff, 0x2, 0x84e7, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) (async) 11:51:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 0: syz_clone(0x10820000, 0x0, 0xfffffff5, 0x0, 0x0, 0x0) 11:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) recvmsg$unix(r0, &(0x7f00000023c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000002300)=[{&(0x7f00000001c0)=""/94, 0x5e}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/169, 0xa9}], 0x4, &(0x7f0000002340)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x2001) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) r2 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x0, 0x7, 0x20, 0xf9, 0x0, 0x0, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x4408, 0x1, 0x80000001, 0x1, 0xffffffffffffffff, 0x2, 0x84e7, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) recvmsg$unix(r0, &(0x7f00000023c0)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000002300)=[{&(0x7f00000001c0)=""/94, 0x5e}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/169, 0xa9}], 0x4, &(0x7f0000002340)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x80}, 0x2001) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) (async) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x0, 0x7, 0x20, 0xf9, 0x0, 0x0, 0x10, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x100, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x4408, 0x1, 0x80000001, 0x1, 0xffffffffffffffff, 0x2, 0x84e7, 0x0, 0x5, 0x0, 0x8}, 0x0, 0xb, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_ID(r2, 0x80082407, &(0x7f0000000100)) (async) 11:51:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:35 executing program 2: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1541.584020][T23234] FAULT_INJECTION: forcing a failure. [ 1541.584020][T23234] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.596653][T23234] CPU: 0 PID: 23234 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1541.606711][T23234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1541.616605][T23234] Call Trace: [ 1541.619727][T23234] [ 1541.622501][T23234] dump_stack_lvl+0x151/0x1b7 [ 1541.627015][T23234] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1541.632309][T23234] dump_stack+0x15/0x17 [ 1541.636300][T23234] should_fail+0x3c0/0x510 [ 1541.640557][T23234] __should_failslab+0x9f/0xe0 [ 1541.645157][T23234] should_failslab+0x9/0x20 [ 1541.649493][T23234] kmem_cache_alloc+0x4f/0x2f0 [ 1541.654093][T23234] ? vm_area_dup+0x26/0x1d0 [ 1541.658520][T23234] vm_area_dup+0x26/0x1d0 [ 1541.663119][T23234] dup_mmap+0x6b8/0xea0 [ 1541.667116][T23234] ? __delayed_free_task+0x20/0x20 [ 1541.672064][T23234] ? mm_init+0x807/0x960 [ 1541.676140][T23234] dup_mm+0x91/0x330 [ 1541.679872][T23234] copy_mm+0x108/0x1b0 [ 1541.683779][T23234] copy_process+0x1295/0x3250 [ 1541.688289][T23234] ? proc_fail_nth_write+0x213/0x290 [ 1541.693424][T23234] ? proc_fail_nth_read+0x220/0x220 [ 1541.698455][T23234] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1541.703396][T23234] ? vfs_write+0x9af/0x1050 [ 1541.707734][T23234] ? vmacache_update+0xb7/0x120 [ 1541.712423][T23234] kernel_clone+0x22d/0x990 [ 1541.716761][T23234] ? file_end_write+0x1b0/0x1b0 [ 1541.721456][T23234] ? __kasan_check_write+0x14/0x20 [ 1541.726404][T23234] ? create_io_thread+0x1e0/0x1e0 [ 1541.731268][T23234] ? __mutex_lock_slowpath+0x10/0x10 [ 1541.736400][T23234] __x64_sys_clone+0x289/0x310 [ 1541.740979][T23234] ? __do_sys_vfork+0x130/0x130 [ 1541.745664][T23234] ? debug_smp_processor_id+0x17/0x20 [ 1541.750872][T23234] do_syscall_64+0x44/0xd0 [ 1541.755123][T23234] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1541.760850][T23234] RIP: 0033:0x7f65e6eb55a9 [ 1541.765107][T23234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:36 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 23) 11:51:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) write$cgroup_pressure(r0, &(0x7f0000000000)={'some', 0x20, 0x1, 0x20, 0x5a99}, 0x2f) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x4) 11:51:36 executing program 0: syz_clone(0x10820000, 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 11:51:36 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1541.784545][T23234] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1541.792792][T23234] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1541.800600][T23234] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1541.808415][T23234] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1541.816225][T23234] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1541.824035][T23234] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1541.831849][T23234] 11:51:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) write$cgroup_pressure(r0, &(0x7f0000000000)={'some', 0x20, 0x1, 0x20, 0x5a99}, 0x2f) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x4) 11:51:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1541.886135][T23249] FAULT_INJECTION: forcing a failure. [ 1541.886135][T23249] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.914750][T23249] CPU: 0 PID: 23249 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1541.924831][T23249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1541.934730][T23249] Call Trace: [ 1541.937847][T23249] [ 1541.940629][T23249] dump_stack_lvl+0x151/0x1b7 [ 1541.945143][T23249] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1541.950435][T23249] dump_stack+0x15/0x17 [ 1541.954436][T23249] should_fail+0x3c0/0x510 [ 1541.958682][T23249] ? alloc_fdtable+0xaf/0x2b0 [ 1541.963194][T23249] __should_failslab+0x9f/0xe0 [ 1541.967795][T23249] should_failslab+0x9/0x20 [ 1541.972132][T23249] kmem_cache_alloc_trace+0x4a/0x310 [ 1541.977255][T23249] ? __kasan_check_write+0x14/0x20 [ 1541.982202][T23249] ? _raw_spin_lock+0xa3/0x1b0 [ 1541.986804][T23249] alloc_fdtable+0xaf/0x2b0 [ 1541.991145][T23249] dup_fd+0x781/0xa40 [ 1541.994959][T23249] ? avc_has_perm+0x16d/0x260 [ 1541.999476][T23249] copy_files+0xe6/0x200 [ 1542.003553][T23249] ? perf_event_attrs+0x30/0x30 [ 1542.008238][T23249] ? dup_task_struct+0xa60/0xa60 [ 1542.013010][T23249] ? security_task_alloc+0x132/0x150 [ 1542.018134][T23249] copy_process+0x11e9/0x3250 [ 1542.022652][T23249] ? proc_fail_nth_write+0x213/0x290 [ 1542.027771][T23249] ? proc_fail_nth_read+0x220/0x220 [ 1542.032802][T23249] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1542.037745][T23249] ? vfs_write+0x9af/0x1050 [ 1542.042083][T23249] ? vmacache_update+0xb7/0x120 [ 1542.046773][T23249] kernel_clone+0x22d/0x990 [ 1542.051115][T23249] ? file_end_write+0x1b0/0x1b0 [ 1542.055800][T23249] ? __kasan_check_write+0x14/0x20 [ 1542.060743][T23249] ? create_io_thread+0x1e0/0x1e0 [ 1542.065613][T23249] ? __mutex_lock_slowpath+0x10/0x10 [ 1542.070725][T23249] __x64_sys_clone+0x289/0x310 [ 1542.075336][T23249] ? __do_sys_vfork+0x130/0x130 [ 1542.080023][T23249] ? debug_smp_processor_id+0x17/0x20 [ 1542.085319][T23249] do_syscall_64+0x44/0xd0 [ 1542.089575][T23249] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1542.095302][T23249] RIP: 0033:0x7f65e6eb55a9 [ 1542.099553][T23249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1542.118994][T23249] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1542.127245][T23249] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:36 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 24) 11:51:36 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) write$cgroup_pressure(r0, &(0x7f0000000000)={'some', 0x20, 0x1, 0x20, 0x5a99}, 0x2f) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000080), 0x9) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x4) 11:51:36 executing program 0: syz_clone(0x10820000, 0x0, 0xfffffffe, 0x0, 0x0, 0x0) 11:51:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xca, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1542.135053][T23249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1542.142865][T23249] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.150673][T23249] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1542.158485][T23249] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1542.166302][T23249] 11:51:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000000)=@raw=[@exit, @generic={0x3, 0x2, 0x8, 0x3, 0x7ff}, @call={0x85, 0x0, 0x0, 0x3c}], &(0x7f0000000080)='syzkaller\x00', 0xd6f1, 0x33, &(0x7f00000000c0)=""/51, 0x40f00, 0x1, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x7fff, 0x6}, 0x10, 0xe47a, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0x1]}, 0x80) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)=r1) 11:51:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1542.196725][T23273] FAULT_INJECTION: forcing a failure. [ 1542.196725][T23273] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.252351][T23273] CPU: 0 PID: 23273 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1542.262423][T23273] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1542.272321][T23273] Call Trace: [ 1542.275444][T23273] [ 1542.278223][T23273] dump_stack_lvl+0x151/0x1b7 [ 1542.282733][T23273] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1542.288029][T23273] dump_stack+0x15/0x17 [ 1542.292024][T23273] should_fail+0x3c0/0x510 [ 1542.296272][T23273] ? kvmalloc_node+0x82/0x130 [ 1542.300785][T23273] __should_failslab+0x9f/0xe0 [ 1542.305389][T23273] should_failslab+0x9/0x20 [ 1542.309727][T23273] __kmalloc+0x6d/0x350 [ 1542.313717][T23273] ? __kasan_kmalloc+0x9/0x10 [ 1542.318229][T23273] kvmalloc_node+0x82/0x130 [ 1542.322568][T23273] alloc_fdtable+0xea/0x2b0 [ 1542.326905][T23273] dup_fd+0x781/0xa40 [ 1542.330734][T23273] ? avc_has_perm+0x16d/0x260 [ 1542.335246][T23273] copy_files+0xe6/0x200 [ 1542.339342][T23273] ? perf_event_attrs+0x30/0x30 [ 1542.344004][T23273] ? dup_task_struct+0xa60/0xa60 [ 1542.348780][T23273] ? security_task_alloc+0x132/0x150 [ 1542.353899][T23273] copy_process+0x11e9/0x3250 [ 1542.358415][T23273] ? proc_fail_nth_write+0x213/0x290 [ 1542.363533][T23273] ? proc_fail_nth_read+0x220/0x220 [ 1542.368566][T23273] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1542.373513][T23273] ? vfs_write+0x9af/0x1050 [ 1542.377855][T23273] ? vmacache_update+0xb7/0x120 [ 1542.382540][T23273] kernel_clone+0x22d/0x990 [ 1542.386882][T23273] ? file_end_write+0x1b0/0x1b0 [ 1542.391571][T23273] ? __kasan_check_write+0x14/0x20 [ 1542.396515][T23273] ? create_io_thread+0x1e0/0x1e0 [ 1542.401382][T23273] ? __mutex_lock_slowpath+0x10/0x10 [ 1542.406497][T23273] __x64_sys_clone+0x289/0x310 [ 1542.411103][T23273] ? __do_sys_vfork+0x130/0x130 [ 1542.415783][T23273] ? debug_smp_processor_id+0x17/0x20 [ 1542.420990][T23273] do_syscall_64+0x44/0xd0 [ 1542.425254][T23273] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1542.430974][T23273] RIP: 0033:0x7f65e6eb55a9 [ 1542.435225][T23273] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1542.454668][T23273] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1542.462911][T23273] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1542.470727][T23273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1542.478538][T23273] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.486348][T23273] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1542.494159][T23273] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 11:51:36 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 25) 11:51:36 executing program 0: syz_clone(0x10820000, 0x0, 0x1b0c61f000, 0x0, 0x0, 0x0) 11:51:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x0) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000000)=@raw=[@exit, @generic={0x3, 0x2, 0x8, 0x3, 0x7ff}, @call={0x85, 0x0, 0x0, 0x3c}], &(0x7f0000000080)='syzkaller\x00', 0xd6f1, 0x33, &(0x7f00000000c0)=""/51, 0x40f00, 0x1, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x7fff, 0x6}, 0x10, 0xe47a, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0x1]}, 0x80) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)=r1) 11:51:36 executing program 2: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x27, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:36 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x0) (async) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x3, &(0x7f0000000000)=@raw=[@exit, @generic={0x3, 0x2, 0x8, 0x3, 0x7ff}, @call={0x85, 0x0, 0x0, 0x3c}], &(0x7f0000000080)='syzkaller\x00', 0xd6f1, 0x33, &(0x7f00000000c0)=""/51, 0x40f00, 0x1, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000140)={0x1, 0x1, 0x7fff, 0x6}, 0x10, 0xe47a, 0xffffffffffffffff, 0x0, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0x1]}, 0x80) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)=r1) 11:51:37 executing program 2: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1542.501976][T23273] 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 0: syz_clone(0x10820000, 0x0, 0x2a23ea29a000, 0x0, 0x0, 0x0) [ 1542.563884][T23306] FAULT_INJECTION: forcing a failure. [ 1542.563884][T23306] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.591475][T23306] CPU: 0 PID: 23306 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1542.601555][T23306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1542.611452][T23306] Call Trace: [ 1542.614571][T23306] [ 1542.617354][T23306] dump_stack_lvl+0x151/0x1b7 [ 1542.621864][T23306] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1542.627161][T23306] dump_stack+0x15/0x17 [ 1542.631152][T23306] should_fail+0x3c0/0x510 [ 1542.635424][T23306] ? kvmalloc_node+0x82/0x130 [ 1542.639916][T23306] __should_failslab+0x9f/0xe0 [ 1542.644518][T23306] should_failslab+0x9/0x20 [ 1542.648857][T23306] __kmalloc+0x6d/0x350 [ 1542.652858][T23306] ? kvmalloc_node+0x82/0x130 [ 1542.657371][T23306] kvmalloc_node+0x82/0x130 [ 1542.661705][T23306] alloc_fdtable+0x173/0x2b0 [ 1542.666129][T23306] dup_fd+0x781/0xa40 [ 1542.669944][T23306] ? avc_has_perm+0x16d/0x260 [ 1542.674461][T23306] copy_files+0xe6/0x200 [ 1542.678549][T23306] ? perf_event_attrs+0x30/0x30 [ 1542.683226][T23306] ? dup_task_struct+0xa60/0xa60 [ 1542.688001][T23306] ? security_task_alloc+0x132/0x150 [ 1542.693122][T23306] copy_process+0x11e9/0x3250 [ 1542.697634][T23306] ? proc_fail_nth_write+0x213/0x290 [ 1542.702769][T23306] ? proc_fail_nth_read+0x220/0x220 [ 1542.707784][T23306] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1542.712749][T23306] ? vfs_write+0x9af/0x1050 [ 1542.717075][T23306] ? vmacache_update+0xb7/0x120 [ 1542.721761][T23306] kernel_clone+0x22d/0x990 [ 1542.726102][T23306] ? file_end_write+0x1b0/0x1b0 [ 1542.730790][T23306] ? __kasan_check_write+0x14/0x20 [ 1542.735739][T23306] ? create_io_thread+0x1e0/0x1e0 [ 1542.740594][T23306] ? __mutex_lock_slowpath+0x10/0x10 [ 1542.745714][T23306] __x64_sys_clone+0x289/0x310 [ 1542.750313][T23306] ? __do_sys_vfork+0x130/0x130 [ 1542.755351][T23306] ? debug_smp_processor_id+0x17/0x20 [ 1542.760554][T23306] do_syscall_64+0x44/0xd0 [ 1542.764809][T23306] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1542.770534][T23306] RIP: 0033:0x7f65e6eb55a9 [ 1542.774876][T23306] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1542.794322][T23306] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1542.802563][T23306] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:37 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 26) 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x7fb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 11:51:37 executing program 0: syz_clone(0x10820000, 0x0, 0x553a27861000, 0x0, 0x0, 0x0) [ 1542.810375][T23306] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1542.818188][T23306] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1542.825996][T23306] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1542.833810][T23306] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1542.841626][T23306] 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 2: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x7fb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1542.871456][T23325] FAULT_INJECTION: forcing a failure. [ 1542.871456][T23325] name failslab, interval 1, probability 0, space 0, times 0 [ 1542.896167][T23325] CPU: 0 PID: 23325 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1542.906236][T23325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1542.916132][T23325] Call Trace: [ 1542.919256][T23325] 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1542.922034][T23325] dump_stack_lvl+0x151/0x1b7 [ 1542.926549][T23325] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1542.931843][T23325] dump_stack+0x15/0x17 [ 1542.935832][T23325] should_fail+0x3c0/0x510 [ 1542.940088][T23325] __should_failslab+0x9f/0xe0 [ 1542.944687][T23325] should_failslab+0x9/0x20 [ 1542.949026][T23325] kmem_cache_alloc+0x4f/0x2f0 [ 1542.953624][T23325] ? anon_vma_clone+0xa1/0x4f0 [ 1542.958228][T23325] anon_vma_clone+0xa1/0x4f0 [ 1542.962653][T23325] anon_vma_fork+0x91/0x4f0 [ 1542.966990][T23325] ? anon_vma_name+0x4c/0x70 [ 1542.971419][T23325] dup_mmap+0x750/0xea0 [ 1542.975411][T23325] ? __delayed_free_task+0x20/0x20 [ 1542.980362][T23325] ? mm_init+0x807/0x960 [ 1542.984438][T23325] dup_mm+0x91/0x330 [ 1542.988169][T23325] copy_mm+0x108/0x1b0 [ 1542.992077][T23325] copy_process+0x1295/0x3250 [ 1542.996587][T23325] ? proc_fail_nth_write+0x213/0x290 [ 1543.001709][T23325] ? proc_fail_nth_read+0x220/0x220 [ 1543.006743][T23325] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1543.011694][T23325] ? vfs_write+0x9af/0x1050 [ 1543.016031][T23325] ? vmacache_update+0xb7/0x120 [ 1543.020718][T23325] kernel_clone+0x22d/0x990 [ 1543.025054][T23325] ? file_end_write+0x1b0/0x1b0 [ 1543.029743][T23325] ? __kasan_check_write+0x14/0x20 [ 1543.034692][T23325] ? create_io_thread+0x1e0/0x1e0 [ 1543.039555][T23325] ? __mutex_lock_slowpath+0x10/0x10 [ 1543.044670][T23325] __x64_sys_clone+0x289/0x310 [ 1543.049268][T23325] ? __do_sys_vfork+0x130/0x130 [ 1543.053953][T23325] ? debug_smp_processor_id+0x17/0x20 [ 1543.059165][T23325] do_syscall_64+0x44/0xd0 [ 1543.063414][T23325] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1543.069143][T23325] RIP: 0033:0x7f65e6eb55a9 [ 1543.073398][T23325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1543.092840][T23325] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1543.101085][T23325] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1543.108898][T23325] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:37 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 27) 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 0: syz_clone(0x10820000, 0x0, 0x4000000000000, 0x0, 0x0, 0x0) 11:51:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x7fb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 11:51:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xf, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1543.116710][T23325] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.124522][T23325] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1543.132329][T23325] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1543.140150][T23325] 11:51:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$sock(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="c37c4d634ff776602a388b79810cbad32e5a32751b45546441a11342019a47", 0x1f}, {&(0x7f0000000140)="5863a80c425ceed1a18e40dc0bdbca978bdf32818d22846fd51bed3a55135be922e81756484f9991cbc53bf73f6a461d15d4", 0x32}, {&(0x7f0000000180)="04d481dc5eaf75822fa4f889c16b5f8c", 0x10}], 0x3, &(0x7f0000000200)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x2eeccf32}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x3f}}], 0xc0}, 0x8805) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r1, 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xb0, &(0x7f0000001500)=""/176, 0x41000, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000000340)="39dc9297b252ac20a3f848377573fea799b334099f856a085f57d4b94a691f41ec569ba342aef9dff597d337a8020a6c8928755ac963a7838a706cf009f1bf1992e5477c5f2ee8bd9ab7f7b903699a12fac968bbc50e0b20346e49141c3c6aa379232acf79358c992370b82512785e212c49fa8177568259878118fccd822c368f", &(0x7f0000000400)=""/12, &(0x7f0000000440)="409c12366b9aa1422dbe45c160fd01a1a3a87e3ba783bcc8faa967e75e8d5da83954f873b3ddc548c7accdde5bb88f0a2972b32419d3beea52dd9922a72ccc2532a8e4c2373dc4e83915c1aeba167f", &(0x7f00000004c0)="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", 0x35, r2}, 0x38) 11:51:37 executing program 0: syz_clone(0x10820000, 0x0, 0x8000000000000, 0x0, 0x0, 0x0) [ 1543.180653][T23357] FAULT_INJECTION: forcing a failure. [ 1543.180653][T23357] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.208185][T23357] CPU: 0 PID: 23357 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1543.218257][T23357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1543.228157][T23357] Call Trace: [ 1543.231278][T23357] [ 1543.234055][T23357] dump_stack_lvl+0x151/0x1b7 [ 1543.238569][T23357] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1543.243861][T23357] ? _raw_spin_lock+0xa3/0x1b0 [ 1543.248463][T23357] ? dup_fd+0x51f/0xa40 [ 1543.252454][T23357] dump_stack+0x15/0x17 [ 1543.256448][T23357] should_fail+0x3c0/0x510 [ 1543.260699][T23357] __should_failslab+0x9f/0xe0 [ 1543.265299][T23357] should_failslab+0x9/0x20 [ 1543.269647][T23357] kmem_cache_alloc+0x4f/0x2f0 [ 1543.274247][T23357] ? copy_fs_struct+0x4e/0x230 [ 1543.278841][T23357] copy_fs_struct+0x4e/0x230 [ 1543.283270][T23357] copy_fs+0x72/0x140 [ 1543.287088][T23357] copy_process+0x1214/0x3250 [ 1543.291600][T23357] ? proc_fail_nth_write+0x213/0x290 [ 1543.296721][T23357] ? proc_fail_nth_read+0x220/0x220 [ 1543.301755][T23357] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1543.306703][T23357] ? vfs_write+0x9af/0x1050 [ 1543.311040][T23357] ? vmacache_update+0xb7/0x120 [ 1543.315728][T23357] kernel_clone+0x22d/0x990 [ 1543.320067][T23357] ? file_end_write+0x1b0/0x1b0 [ 1543.324754][T23357] ? __kasan_check_write+0x14/0x20 [ 1543.329700][T23357] ? create_io_thread+0x1e0/0x1e0 [ 1543.334567][T23357] ? __mutex_lock_slowpath+0x10/0x10 [ 1543.339685][T23357] __x64_sys_clone+0x289/0x310 [ 1543.344283][T23357] ? __do_sys_vfork+0x130/0x130 [ 1543.348970][T23357] ? debug_smp_processor_id+0x17/0x20 [ 1543.354178][T23357] do_syscall_64+0x44/0xd0 [ 1543.358428][T23357] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1543.364162][T23357] RIP: 0033:0x7f65e6eb55a9 [ 1543.368415][T23357] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1543.387852][T23357] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1543.396095][T23357] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1543.403905][T23357] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1543.411717][T23357] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.419528][T23357] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:37 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 28) 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 2: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:37 executing program 0: syz_clone(0x10820000, 0x0, 0x10100000000000, 0x0, 0x0, 0x0) 11:51:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$sock(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="c37c4d634ff776602a388b79810cbad32e5a32751b45546441a11342019a47", 0x1f}, {&(0x7f0000000140)="5863a80c425ceed1a18e40dc0bdbca978bdf32818d22846fd51bed3a55135be922e81756484f9991cbc53bf73f6a461d15d4", 0x32}, {&(0x7f0000000180)="04d481dc5eaf75822fa4f889c16b5f8c", 0x10}], 0x3, &(0x7f0000000200)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x2eeccf32}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x3f}}], 0xc0}, 0x8805) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r1, 0x4) (async, rerun: 64) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xb0, &(0x7f0000001500)=""/176, 0x41000, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000000340)="39dc9297b252ac20a3f848377573fea799b334099f856a085f57d4b94a691f41ec569ba342aef9dff597d337a8020a6c8928755ac963a7838a706cf009f1bf1992e5477c5f2ee8bd9ab7f7b903699a12fac968bbc50e0b20346e49141c3c6aa379232acf79358c992370b82512785e212c49fa8177568259878118fccd822c368f", &(0x7f0000000400)=""/12, &(0x7f0000000440)="409c12366b9aa1422dbe45c160fd01a1a3a87e3ba783bcc8faa967e75e8d5da83954f873b3ddc548c7accdde5bb88f0a2972b32419d3beea52dd9922a72ccc2532a8e4c2373dc4e83915c1aeba167f", &(0x7f00000004c0)="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", 0x35, r2}, 0x38) 11:51:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$sock(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="c37c4d634ff776602a388b79810cbad32e5a32751b45546441a11342019a47", 0x1f}, {&(0x7f0000000140)="5863a80c425ceed1a18e40dc0bdbca978bdf32818d22846fd51bed3a55135be922e81756484f9991cbc53bf73f6a461d15d4", 0x32}, {&(0x7f0000000180)="04d481dc5eaf75822fa4f889c16b5f8c", 0x10}], 0x3, &(0x7f0000000200)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x2eeccf32}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x3f}}], 0xc0}, 0x8805) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r1, 0x4) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xb0, &(0x7f0000001500)=""/176, 0x41000, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000000340)="39dc9297b252ac20a3f848377573fea799b334099f856a085f57d4b94a691f41ec569ba342aef9dff597d337a8020a6c8928755ac963a7838a706cf009f1bf1992e5477c5f2ee8bd9ab7f7b903699a12fac968bbc50e0b20346e49141c3c6aa379232acf79358c992370b82512785e212c49fa8177568259878118fccd822c368f", &(0x7f0000000400)=""/12, &(0x7f0000000440)="409c12366b9aa1422dbe45c160fd01a1a3a87e3ba783bcc8faa967e75e8d5da83954f873b3ddc548c7accdde5bb88f0a2972b32419d3beea52dd9922a72ccc2532a8e4c2373dc4e83915c1aeba167f", &(0x7f00000004c0)="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", 0x35, r2}, 0x38) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) sendmsg$sock(r1, &(0x7f00000002c0)={&(0x7f0000000080)=@un=@abs={0x1, 0x0, 0x4e20}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)="c37c4d634ff776602a388b79810cbad32e5a32751b45546441a11342019a47", 0x1f}, {&(0x7f0000000140)="5863a80c425ceed1a18e40dc0bdbca978bdf32818d22846fd51bed3a55135be922e81756484f9991cbc53bf73f6a461d15d4", 0x32}, {&(0x7f0000000180)="04d481dc5eaf75822fa4f889c16b5f8c", 0x10}], 0x3, &(0x7f0000000200)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x2eeccf32}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}, @txtime={{0x18, 0x1, 0x3d, 0x3f}}], 0xc0}, 0x8805) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000300)=r1, 0x4) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xb0, &(0x7f0000001500)=""/176, 0x41000, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000014c0)={&(0x7f0000000340)="39dc9297b252ac20a3f848377573fea799b334099f856a085f57d4b94a691f41ec569ba342aef9dff597d337a8020a6c8928755ac963a7838a706cf009f1bf1992e5477c5f2ee8bd9ab7f7b903699a12fac968bbc50e0b20346e49141c3c6aa379232acf79358c992370b82512785e212c49fa8177568259878118fccd822c368f", &(0x7f0000000400)=""/12, &(0x7f0000000440)="409c12366b9aa1422dbe45c160fd01a1a3a87e3ba783bcc8faa967e75e8d5da83954f873b3ddc548c7accdde5bb88f0a2972b32419d3beea52dd9922a72ccc2532a8e4c2373dc4e83915c1aeba167f", &(0x7f00000004c0)="be8035e73d24eff34034266774b4c2392bf27a00dd907cf2f1e17b479b6feccf04b0956011affe575c12e086d73813e068c437d0671d7013b0b528380e6cb3cdbf2eb3e1dc54e242d7f22a126898c89dcdb88fe024cfa9c779c44ed7847141545ed431e92fad528817eea52108e94df39b634696402c9a49a64f66ef318d8e3b078d29e36beadfaf19badaef90dc94607ea9f9208b90f3d3a73572461b8273a42b5557ceeaaf39d8159a355cc96178e65abebc0aa6bd548518c7a8024e9217a569927ee3b965bf7a2194b8d65d2cd92e2200476257eb232d1e822cb3f29e4a4d96fa0efa004f7a201076eb9d147ddccb00f40125ae8981debdcba3344f519507c3d1fd8c511fd15cfdd8040365189539b1fa777451834205c8a373366c49359e97db67fc30828806b45c4008449897d9fe634d09dac1b9eccc26fc0150a22d3f4ba530e8f1d8f118aed7a405f8ad5f804909fdc91ec5dac4b04dc1c541ec866974e6bda9c4b8cbdf4cb89ae1b5f77c1c85add95ad5a66d240a9b1c6f1a5d8548754cc5a935c16577dc3d02b99b523087843e039de2138392e4235a605a983beb3538f36340cc7c496e4a78203ffa780b7763fd5ad85638624e706399044cebe8534bc8adc9bf503acd9427d6eb0c2dce9d2396e87ecc5f89e2dd5ac6e27e604878371c83ccfa644657edfc62408cc2ba05bb0c8659217bc41a91ed41206e055de4fdc18451e519c020ca9401838feda73e2f6b9ecf7ede171d5ed606a409c11474587d343c4c2caaec2731d0dfa59d2d124ab92d45f72e56e40f14cf136e0b4afd18360bf32d9e530f7352c826834a120183e2f5d12bedb3c768ee240a66991d017ff03aee0db81bf9d6b5357a0325b25befe79b3941abbcc0c8ff3551a1c681cc1a0eea09d3fec937ea21f4a72e3eee0dac1c2cc6a6d5152c057610254f1fefb63820dff2c5555b850f35c3f8223509a4c4191732e993f60ebd21fc91814fd6dfa84c2d072bdf5050f3916c83513f874c9ae108d96309f689338459637a48355cc70702d25d7c7844bdcdeaa376dfdff17157a713c0ce0c7cc93418e5b430ee0f5d8af73592fa915e50eeb6a39954601ba0076742a66a3188c8cde2949b35573abd1225038ff800acd53534327e37e315bbbbd41f60794a2c18db236e2af334282145b97cbf173ecccfad294def390b3eff3ee595750b5c1fb2a8a119bb8b0de3ff0f3415a387eb8ccb6c543da09f4b1779f442be311281be6c0d217eafa2bd8dc3ec171dc2485f1801d044cee87ac5e41a23e9abc3c0caef33ec7296d56d89933e940e04b8bf83edd10a6ebe85cf69f8b4023ea4cd8a06a946d576af7f8caaf0616eded0fec9dfaea99ed6f30e9dd484b80222d47550e9eb6d62abc9099ab5d3114317c93edae5348bed1fab9401cc745f65ea1556ef619c9f1d2783df621417e4d49874900a3d56f5ea73135ebfa7510db7634d6ef44801c2eaf2028e82a8abe34dd12692e037c6af9fb8eec169d37ad0a590f16218dbdd069c17b292c6af1a313f88cf84a7d138297b1baf31e4f8f034a79edbf88332cfb911cd97534c1e09ff8390caae352c26b3b32c310762c93c4e9edfb2f4baa44a62d2105dffb414a495ae318eeadbfea9ef3cedc71cddb50746f0310f4c182c6f2dd1e3b2d93278de1a2517164a16cf3e42fc12f5e0e76f0d76336639f26c86ecdbf515d557a2d1e8e8eef14c5de883dd5e7c4f7ad431e899d7fda7207cba89a8aedfef78ba8f6aee92a30cf6d23f87d40c610ada07f7a861f03d0abd9f5407eaab9c136fca83b705943e58b06bb17570d262164ab9e806d931fc0781078618fa78f17cf462349e4f9e3abf8f2cbe453c922e6d444216ce428dec273430896a6b4a08033336f6c59b82d278ed6edb5d99abf1408e9171b72172d953489e90249b6c4161cfe01ff3557a2cdd31d58ae283bd70b467ecb368be1166c63735dfbdf5f39547c7665e9c874f73a26eabf4667a7f96048f95e2c9cf5f6acd91073508178412ab17ba5005d64dff6df0278ae5fb1c571fd3ebe570781c00ba8c22a63582e7e416ce80eecb6f1caa4809c0ddf852583033b574a3ba4adc2aac225edfa6efeb80fafe1c91beab85ef1b6968dcd38b79f2add8f27f7384127c4ecfb79d2fbbc07ef7e048918be6f6fe42c37c2242d8f51a5b983e337c6b07d3e3253a715abc45491196d663d868470fcd054ae735c2994ee58b9237b95652c00f34df16a9b29f3ef877dff7e9df86a4b6650f15bdf6586ab39734036a24006ce7ceddcf78fcb7d27420f1a5899cf60a4de353dbe71985e055bf8e8770000ddd7a4b251e8ba46db07243e9955f4b0ce28d58176da66c95ac84093139d96d2ddf65058686d26c179749975645fdfb0fe73a5238d86d3193a0c2dcfcb3403a7debdb66745a5a9f0deaef721f09ee70fbadcb69c24fcce83613151d314a2b190dfc5c3cc364285b24698d326a884750f90eb997fd5d88952cd94816dcd199059cb6ff6782944c015d5da4860a6b5e8eaa2a9299e587dc71b8d374d8c8b79e02195c37342f030f1ece0aefb33a101c655af81f410ebe4eb93895c3e6c7bffdb065ef3049c0d48fe3a188c69f1afd264bf95eb7e27367eab613aa18ff6e8759d91d906255ba170069936bd97e1beb08ff63591d537f533f4a5ecd1d2e08f77fbb99fe8b556a6bd65f0a02d5b7f32cd70f3bcc6da70a6a5b1ed2dbf4b459b7d7ec373317bee282d8f07598dfba00f7d55b3fa5cdd3e1e41f7d5d5725da090e676fd56230d9e25c74da73f470a2fcef09ba665b1db1f056dd180fc151dc2687c800d7c2e400497f44c07e7ddb7c7cced17a8daf6a08312adea7f229f823153358a6bac69fc0cc05750da8d7f10366e1a8e6050aa726f2689068587c30906b7be37a8f65b7b5401a09c355cea2f4c69327bbac6266f7122855674e02c06356f55bf990071b7e20b4ae3a393294e078866b829f81599826935f08d64e61b91f8e8238c8482d6e7fa223aa350a8a6091fa6d50d75f54df78fceff683ee0318b2985710d2477e58c4d90f85947064f492e160c6cb6603d63d9f2d6fadf08d68eeac8329cf4a004dbdb41dfb5cca52d3ac43975d91ee9926d39f79315a293013be6a1bd5c82774aba359e0d650d277178093ab5d7a234583b4c975f9bbc8b3fe2a6cf01698e0a742d07cfb4ac982053a7185d3d5e2651afc6eefecd96c02870db6553bff5af3b4f18e0396f53e3bc14e68122f678ef519d7993a3708ad6bb4edb7a61c26d2e0701c804d089d5347ef4f9a5aecdf285acf79040d033fd76becd33ff1ad34b7099f295b3a837ad0dc352aec9d455407499e18dba94ada13824970b2128c07399fe8dc2d7294bc667bd46c257e1c2d635ae213f55b14db7eaae3521830fc86ad0e9383e2871abe0172a13e28cefdb108f1888c161392481b57572cb38f92c6b5fbb0c3aacd83cef87490a86515f87c88872d74b4a76b30a575cac05a061cb4eef343543dd4090c9d34a74bffc6697f2ee57af3fee2a43ea46d01800fff4e445b0678b0ef8b2980fc9080a62b017b2ce30587b2ad2b9bcd25bd375ef248710b08fa23fc7e47df61724bbc87048bb17ba428c795d5ae81f44d6415cb5dcf8204cabecefc340d14abfc1d0eb0dcc0618381ef9161735e66175fa42415d7635ac3a10c5b18f949cd81bdb3e768a2116c3ae42211d0533ae175a3c8ff4a5e4443001aa60a6b1e51b6f3b20485af525af89112e1c5da44bedbed39960c40e708f9ab921a10222dff1f6aa9209ea9e640eca9e91305a6ab38ee69c1c1d6f73383c78eb8236fa941c54dcc7baf38cfb21f1232470e94d6570ad55a1d592eb036e84dc0c5b5f5ac17d852a03b30d65cbbc756f41342d3bb502dcb8cfaa14c59e456d63cc7ad3d3fcd0e6838af096193626fc51aaa5fdcb5501dfad67189f86f53ae2b4b76e3524566cb27f8987791e3a189a602f9a221f79cf8783a8aa25e7af2206079a318d36aefb685d1c7c57c955e082dfd270f4183c5aa07d074af1c381dcdd7fa64293261dd6ea82f9964df959aaa383d29bc08c907e523398345c09dbdde10c72e9914a0d4ea2f20b06417685d8dacd1f5347ea4a55559645e67f13c566f80cb7182fe46284c5c2e3528e5a79ad4e821066194142f303ff6d596f4de9b9374a4b2883d61e02fb2bf45f6ecc39478d7ced8573c4b538c9f614ec420eae13f274cd12feac248ebc73cd5f1c5532e5315b11ba7c8eb082bb3d14a1e83ef8cb74e0403a7c6b6436beccdff9be07427e207df2d503a54536056849006351522f4357b155b238782d3ebf34b01315e844c2bb3d3a45807ecd1fbcd6d6338ebeabe3e95f63df65fcca504166f32ee5d415ca08f5f1e0cd24d93f52a3fc8458b94ad4c8903a0c0300eee2b0360f456483999f9ba00ecdbe08d793ccdedd1c3d2dd0bb641384cb88710e747958440ccc4286e59b5eff62ee94f56df7d85c62f7437df927690c430b3b2ba0056826c18cefdb8f202bb03e471a48e64bcd3593dbd0af5978a2d617a8d5efcb2fcaabcfe96ef07ce59c6c459919bc2a4558845404a08d879f275e2c25a9c097f5265d3747345dad0392d970a2f8024d800d2e232ad5c27ffa8cc2bc9f6eb27955df1e9c8692f78613818084d71ee32d4ad8fd59313f8ef70c0039df97c19a12dd233c8d6e83435277c8aa9317a91582e084c7ab26847d20cf069c8506fe03f7237fd44bff3b341b252d7caf9478d9732ffb7bb8bd3b41898673d9d5edae1b6cba433a05ba8fa5ac7f7e8e056104d09c59c8d5964aaf765e5709e533142abb471d5457eb4655b840eafe35943557f8922d238e3babee489e8fdcec3601e9fd527a742015b8e7c65ddb986d147f65db98a74069fa4369bd5b2572bed64c2e04dbefe20b2eed8684333c146352b8273813635426a5abc7500cefcf2da652e7ccbe355ba9fad9dd7b4aa6e26f48767b0f66eddba5710cbe3c5a642bb2cdd327cdc520d28b889cd824448050a6040f9272a1e6bf3e6c763fca41c13c1556a2ea1a0f11aa47b98278cd0be491740e94c08b9027b9654b2b8275b81f8ac746b7a66589403fa12cde0bb5d84289832b4599b9310bd5581334cab0245b5f99d803cb37964319b9830b3b5bbf7c6b778f2b13b383a5bab68b67e9d2fd5dd520b67d9e439fc119ebfb7e8f62218b814f65a1e13a781de387d6a9f239a1905ecdab80ffb839f91042741fc1b8418481bdb96aeb194ff666f888cf03cc9eee05a460256e488bdea695de7decf958fb24307cdf13b1c1babcfe485cce41e846b0dffbc3b69ba17bb750e2f822bceb5bef220c4b4845b48681bea14e57d692b3a3256a73921b14cf04ad2250d83d5c861459f9d82c1e1982567667594c31acf766785ee9ef6d927c827f27db76acbfde3d81ae605f046f6795fe4c5a10005c2342cda9a8656870c674f0ac8f892f894af8fb6a4ec9e3e5867e62cc02a08ba0550536228a08130f102a61eeb63c50c3a5dbe470f6e6e8827f3072eac28a3267cfb64b0f40b52680a6e248150eab3c4ac5f878486f8321242498b5027ffbb0313828165663b5d85de7f23f8711de0d6ecf0cfe62145a72d83574d90faf514b3ec56e579b577647d393307cb30874a03c0d6c1b057505faa244b44ce07de43b5052e05744979a6acf260298449e050f2ce68c551553cc58c8d4f9f30cd130b13cc8381533e6489ab028b697779914a5a23b20c7a4c04f2ac26528fee09c1e2362df44faa627dcf7fdfb9d8553eddd7f6db", 0x35, r2}, 0x38) (async) [ 1543.427339][T23357] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1543.435157][T23357] 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x21, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1543.514263][T23392] FAULT_INJECTION: forcing a failure. [ 1543.514263][T23392] name failslab, interval 1, probability 0, space 0, times 0 [ 1543.536932][T23392] CPU: 0 PID: 23392 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1543.547122][T23392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1543.557017][T23392] Call Trace: [ 1543.560141][T23392] [ 1543.562917][T23392] dump_stack_lvl+0x151/0x1b7 [ 1543.567431][T23392] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1543.572731][T23392] dump_stack+0x15/0x17 [ 1543.576713][T23392] should_fail+0x3c0/0x510 [ 1543.580974][T23392] __should_failslab+0x9f/0xe0 [ 1543.585567][T23392] should_failslab+0x9/0x20 [ 1543.589907][T23392] kmem_cache_alloc+0x4f/0x2f0 [ 1543.594507][T23392] ? copy_sighand+0x54/0x250 [ 1543.598934][T23392] ? _raw_spin_unlock+0x4d/0x70 [ 1543.603621][T23392] copy_sighand+0x54/0x250 [ 1543.607877][T23392] copy_process+0x123f/0x3250 [ 1543.612392][T23392] ? proc_fail_nth_write+0x213/0x290 [ 1543.617507][T23392] ? proc_fail_nth_read+0x220/0x220 [ 1543.622543][T23392] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1543.627493][T23392] ? vfs_write+0x9af/0x1050 [ 1543.631826][T23392] ? vmacache_update+0xb7/0x120 [ 1543.636524][T23392] kernel_clone+0x22d/0x990 [ 1543.640854][T23392] ? file_end_write+0x1b0/0x1b0 [ 1543.645542][T23392] ? __kasan_check_write+0x14/0x20 [ 1543.650487][T23392] ? create_io_thread+0x1e0/0x1e0 [ 1543.655344][T23392] ? __mutex_lock_slowpath+0x10/0x10 [ 1543.660466][T23392] __x64_sys_clone+0x289/0x310 [ 1543.665067][T23392] ? __do_sys_vfork+0x130/0x130 [ 1543.669755][T23392] ? debug_smp_processor_id+0x17/0x20 [ 1543.674971][T23392] do_syscall_64+0x44/0xd0 [ 1543.679213][T23392] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1543.684941][T23392] RIP: 0033:0x7f65e6eb55a9 [ 1543.689195][T23392] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:38 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 29) 11:51:38 executing program 2: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:38 executing program 0: syz_clone(0x10820000, 0x0, 0x1086273a550000, 0x0, 0x0, 0x0) 11:51:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="100000000000000000000000982036d5"], 0x10}, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 2: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1543.708639][T23392] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1543.716882][T23392] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1543.724693][T23392] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1543.732505][T23392] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1543.740474][T23392] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1543.748282][T23392] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1543.756098][T23392] 11:51:38 executing program 2: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="100000000000000000000000982036d5"], 0x10}, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) [ 1543.798683][T23420] FAULT_INJECTION: forcing a failure. [ 1543.798683][T23420] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1543.840650][T23420] CPU: 1 PID: 23420 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1543.850725][T23420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1543.860620][T23420] Call Trace: [ 1543.863745][T23420] [ 1543.866522][T23420] dump_stack_lvl+0x151/0x1b7 [ 1543.871034][T23420] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1543.876329][T23420] ? stack_trace_save+0x1f0/0x1f0 [ 1543.881191][T23420] ? __kernel_text_address+0x9a/0x110 [ 1543.886399][T23420] dump_stack+0x15/0x17 [ 1543.890390][T23420] should_fail+0x3c0/0x510 [ 1543.894643][T23420] should_fail_alloc_page+0x58/0x70 [ 1543.899676][T23420] __alloc_pages+0x1de/0x7c0 [ 1543.904106][T23420] ? stack_trace_save+0x12d/0x1f0 [ 1543.908963][T23420] ? stack_trace_snprint+0x100/0x100 [ 1543.914084][T23420] ? __count_vm_events+0x30/0x30 [ 1543.918853][T23420] ? __kasan_slab_alloc+0xc4/0xe0 [ 1543.923713][T23420] ? __kasan_slab_alloc+0xb2/0xe0 [ 1543.928572][T23420] ? kmem_cache_alloc+0x189/0x2f0 [ 1543.933435][T23420] ? anon_vma_fork+0x1b9/0x4f0 [ 1543.938034][T23420] get_zeroed_page+0x19/0x40 [ 1543.942462][T23420] __pud_alloc+0x8b/0x260 [ 1543.946628][T23420] ? do_handle_mm_fault+0x2370/0x2370 [ 1543.951837][T23420] copy_page_range+0xd9e/0x1090 [ 1543.956524][T23420] ? pfn_valid+0x1e0/0x1e0 [ 1543.960775][T23420] dup_mmap+0x99f/0xea0 [ 1543.964767][T23420] ? __delayed_free_task+0x20/0x20 [ 1543.969713][T23420] ? mm_init+0x807/0x960 [ 1543.973796][T23420] dup_mm+0x91/0x330 [ 1543.977524][T23420] copy_mm+0x108/0x1b0 [ 1543.981433][T23420] copy_process+0x1295/0x3250 [ 1543.985948][T23420] ? proc_fail_nth_write+0x213/0x290 [ 1543.991067][T23420] ? proc_fail_nth_read+0x220/0x220 [ 1543.996102][T23420] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1544.001047][T23420] ? vfs_write+0x9af/0x1050 [ 1544.005387][T23420] ? vmacache_update+0xb7/0x120 [ 1544.010074][T23420] kernel_clone+0x22d/0x990 [ 1544.014412][T23420] ? file_end_write+0x1b0/0x1b0 [ 1544.019101][T23420] ? __kasan_check_write+0x14/0x20 [ 1544.024049][T23420] ? create_io_thread+0x1e0/0x1e0 [ 1544.028908][T23420] ? __mutex_lock_slowpath+0x10/0x10 [ 1544.034030][T23420] __x64_sys_clone+0x289/0x310 [ 1544.038632][T23420] ? __do_sys_vfork+0x130/0x130 [ 1544.043316][T23420] ? debug_smp_processor_id+0x17/0x20 [ 1544.048525][T23420] do_syscall_64+0x44/0xd0 [ 1544.052775][T23420] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1544.058506][T23420] RIP: 0033:0x7f65e6eb55a9 [ 1544.062757][T23420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1544.082198][T23420] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:38 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 30) 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 0: syz_clone(0x10820000, 0x0, 0xa029ea232a0000, 0x0, 0x0, 0x0) 11:51:38 executing program 2: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f00000005c0)={&(0x7f0000000040)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x80, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="100000000000000000000000982036d5"], 0x10}, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:38 executing program 2: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'sit0\x00', 0x400}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x5) [ 1544.090446][T23420] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1544.098256][T23420] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1544.106068][T23420] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.113879][T23420] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1544.121688][T23420] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1544.129504][T23420] 11:51:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'sit0\x00', 0x400}) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x5) 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1544.166373][T23445] FAULT_INJECTION: forcing a failure. [ 1544.166373][T23445] name failslab, interval 1, probability 0, space 0, times 0 [ 1544.208202][T23445] CPU: 1 PID: 23445 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1544.218276][T23445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1544.228171][T23445] Call Trace: [ 1544.231293][T23445] [ 1544.234074][T23445] dump_stack_lvl+0x151/0x1b7 [ 1544.238592][T23445] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1544.243881][T23445] dump_stack+0x15/0x17 [ 1544.247872][T23445] should_fail+0x3c0/0x510 [ 1544.252126][T23445] ? mm_init+0x392/0x960 [ 1544.256204][T23445] __should_failslab+0x9f/0xe0 [ 1544.260805][T23445] should_failslab+0x9/0x20 [ 1544.265145][T23445] kmem_cache_alloc_trace+0x4a/0x310 [ 1544.270266][T23445] mm_init+0x392/0x960 [ 1544.274172][T23445] dup_mm+0x7d/0x330 [ 1544.277904][T23445] copy_mm+0x108/0x1b0 [ 1544.281812][T23445] copy_process+0x1295/0x3250 [ 1544.286327][T23445] ? proc_fail_nth_write+0x213/0x290 [ 1544.291445][T23445] ? proc_fail_nth_read+0x220/0x220 [ 1544.296474][T23445] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1544.301422][T23445] ? vfs_write+0x9af/0x1050 [ 1544.305758][T23445] ? vmacache_update+0xb7/0x120 [ 1544.310445][T23445] kernel_clone+0x22d/0x990 [ 1544.314783][T23445] ? file_end_write+0x1b0/0x1b0 [ 1544.319472][T23445] ? __kasan_check_write+0x14/0x20 [ 1544.324418][T23445] ? create_io_thread+0x1e0/0x1e0 [ 1544.329279][T23445] ? __mutex_lock_slowpath+0x10/0x10 [ 1544.334401][T23445] __x64_sys_clone+0x289/0x310 [ 1544.339001][T23445] ? __do_sys_vfork+0x130/0x130 [ 1544.343689][T23445] ? debug_smp_processor_id+0x17/0x20 [ 1544.348897][T23445] do_syscall_64+0x44/0xd0 [ 1544.353148][T23445] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1544.358875][T23445] RIP: 0033:0x7f65e6eb55a9 [ 1544.363133][T23445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1544.382572][T23445] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1544.390815][T23445] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1544.398628][T23445] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:38 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 31) 11:51:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 2: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:38 executing program 0: syz_clone(0x10820000, 0x0, 0xf0610c1b000000, 0x0, 0x0, 0x0) 11:51:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'sit0\x00', 0x400}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) (async) ioctl$TUNSETVNETBE(r1, 0x400454de, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'sit0\x00', 0x400}) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x5) (async) 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 2: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xf, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1544.406438][T23445] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.414250][T23445] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1544.422063][T23445] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1544.429874][T23445] [ 1544.462240][T23477] FAULT_INJECTION: forcing a failure. [ 1544.462240][T23477] name failslab, interval 1, probability 0, space 0, times 0 [ 1544.476277][T23477] CPU: 1 PID: 23477 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1544.486350][T23477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1544.496242][T23477] Call Trace: [ 1544.499365][T23477] [ 1544.502144][T23477] dump_stack_lvl+0x151/0x1b7 [ 1544.506659][T23477] ? bfq_pos_tree_add_move+0x43e/0x43e 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) recvmsg$unix(r0, &(0x7f0000000180)={&(0x7f0000000080), 0x6e, &(0x7f0000000000), 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x2121) 11:51:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xca, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1544.511954][T23477] dump_stack+0x15/0x17 [ 1544.515946][T23477] should_fail+0x3c0/0x510 [ 1544.520199][T23477] ? mm_init+0x392/0x960 [ 1544.524277][T23477] __should_failslab+0x9f/0xe0 [ 1544.528874][T23477] should_failslab+0x9/0x20 [ 1544.533214][T23477] kmem_cache_alloc_trace+0x4a/0x310 [ 1544.538336][T23477] mm_init+0x392/0x960 [ 1544.542244][T23477] dup_mm+0x7d/0x330 [ 1544.545976][T23477] copy_mm+0x108/0x1b0 [ 1544.549880][T23477] copy_process+0x1295/0x3250 [ 1544.554393][T23477] ? proc_fail_nth_write+0x213/0x290 [ 1544.559513][T23477] ? proc_fail_nth_read+0x220/0x220 [ 1544.564548][T23477] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1544.569490][T23477] ? vfs_write+0x9af/0x1050 [ 1544.573831][T23477] ? vmacache_update+0xb7/0x120 [ 1544.578516][T23477] kernel_clone+0x22d/0x990 [ 1544.582855][T23477] ? file_end_write+0x1b0/0x1b0 [ 1544.587543][T23477] ? __kasan_check_write+0x14/0x20 [ 1544.592506][T23477] ? create_io_thread+0x1e0/0x1e0 [ 1544.597355][T23477] ? __mutex_lock_slowpath+0x10/0x10 [ 1544.602473][T23477] __x64_sys_clone+0x289/0x310 [ 1544.607078][T23477] ? __do_sys_vfork+0x130/0x130 [ 1544.611757][T23477] ? debug_smp_processor_id+0x17/0x20 [ 1544.616967][T23477] do_syscall_64+0x44/0xd0 [ 1544.621222][T23477] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1544.626946][T23477] RIP: 0033:0x7f65e6eb55a9 [ 1544.631200][T23477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1544.650663][T23477] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:39 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 32) 11:51:39 executing program 2: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) recvmsg$unix(r0, &(0x7f0000000180)={&(0x7f0000000080), 0x6e, &(0x7f0000000000), 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x2121) 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 0: syz_clone(0x10820000, 0x0, 0xf0ff1f00000000, 0x0, 0x0, 0x0) 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1544.658888][T23477] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1544.666699][T23477] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1544.674510][T23477] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.682319][T23477] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1544.690134][T23477] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1544.697946][T23477] 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 2: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:39 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) recvmsg$unix(r0, &(0x7f0000000180)={&(0x7f0000000080), 0x6e, &(0x7f0000000000), 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}, 0x2121) 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1544.724481][T23503] FAULT_INJECTION: forcing a failure. [ 1544.724481][T23503] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1544.769307][T23503] CPU: 1 PID: 23503 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1544.779384][T23503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1544.789285][T23503] Call Trace: [ 1544.792489][T23503] [ 1544.795268][T23503] dump_stack_lvl+0x151/0x1b7 [ 1544.799782][T23503] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1544.805078][T23503] ? pcpu_block_update_hint_alloc+0x972/0xd00 [ 1544.810989][T23503] dump_stack+0x15/0x17 [ 1544.814975][T23503] should_fail+0x3c0/0x510 [ 1544.819222][T23503] should_fail_alloc_page+0x58/0x70 [ 1544.824257][T23503] __alloc_pages+0x1de/0x7c0 [ 1544.828684][T23503] ? __count_vm_events+0x30/0x30 [ 1544.833463][T23503] __get_free_pages+0xe/0x30 [ 1544.837882][T23503] pgd_alloc+0x22/0x2c0 [ 1544.841875][T23503] mm_init+0x5bf/0x960 [ 1544.845777][T23503] dup_mm+0x7d/0x330 [ 1544.849508][T23503] copy_mm+0x108/0x1b0 [ 1544.853415][T23503] copy_process+0x1295/0x3250 [ 1544.857931][T23503] ? proc_fail_nth_write+0x213/0x290 [ 1544.863050][T23503] ? proc_fail_nth_read+0x220/0x220 [ 1544.868083][T23503] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1544.873032][T23503] ? vfs_write+0x9af/0x1050 [ 1544.877370][T23503] ? vmacache_update+0xb7/0x120 [ 1544.882058][T23503] kernel_clone+0x22d/0x990 [ 1544.886397][T23503] ? file_end_write+0x1b0/0x1b0 [ 1544.891085][T23503] ? __kasan_check_write+0x14/0x20 [ 1544.896030][T23503] ? create_io_thread+0x1e0/0x1e0 [ 1544.900892][T23503] ? __mutex_lock_slowpath+0x10/0x10 [ 1544.906013][T23503] __x64_sys_clone+0x289/0x310 [ 1544.910615][T23503] ? __do_sys_vfork+0x130/0x130 [ 1544.915301][T23503] ? debug_smp_processor_id+0x17/0x20 [ 1544.920509][T23503] do_syscall_64+0x44/0xd0 [ 1544.924758][T23503] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1544.930497][T23503] RIP: 0033:0x7f65e6eb55a9 [ 1544.934750][T23503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1544.954183][T23503] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1544.962426][T23503] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:39 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 33) 11:51:39 executing program 2: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 0: syz_clone(0x10820000, 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 11:51:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x21, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1544.970246][T23503] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1544.978074][T23503] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1544.985863][T23503] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1544.993674][T23503] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1545.001489][T23503] 11:51:39 executing program 2: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1545.098616][T23543] FAULT_INJECTION: forcing a failure. [ 1545.098616][T23543] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.111167][T23543] CPU: 1 PID: 23543 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1545.121231][T23543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1545.131138][T23543] Call Trace: [ 1545.134247][T23543] [ 1545.137022][T23543] dump_stack_lvl+0x151/0x1b7 [ 1545.141535][T23543] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1545.146929][T23543] dump_stack+0x15/0x17 [ 1545.150916][T23543] should_fail+0x3c0/0x510 [ 1545.155168][T23543] __should_failslab+0x9f/0xe0 [ 1545.159766][T23543] should_failslab+0x9/0x20 [ 1545.164108][T23543] kmem_cache_alloc+0x4f/0x2f0 [ 1545.168707][T23543] ? vm_area_dup+0x26/0x1d0 [ 1545.173046][T23543] ? __kasan_check_read+0x11/0x20 [ 1545.177908][T23543] vm_area_dup+0x26/0x1d0 [ 1545.182075][T23543] dup_mmap+0x6b8/0xea0 [ 1545.186067][T23543] ? __delayed_free_task+0x20/0x20 [ 1545.191012][T23543] ? mm_init+0x807/0x960 [ 1545.195092][T23543] dup_mm+0x91/0x330 [ 1545.198827][T23543] copy_mm+0x108/0x1b0 [ 1545.202732][T23543] copy_process+0x1295/0x3250 [ 1545.207244][T23543] ? proc_fail_nth_write+0x213/0x290 [ 1545.212365][T23543] ? proc_fail_nth_read+0x220/0x220 [ 1545.217399][T23543] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1545.222347][T23543] ? vfs_write+0x9af/0x1050 [ 1545.226684][T23543] ? vmacache_update+0xb7/0x120 [ 1545.231371][T23543] kernel_clone+0x22d/0x990 [ 1545.235711][T23543] ? file_end_write+0x1b0/0x1b0 [ 1545.240400][T23543] ? __kasan_check_write+0x14/0x20 [ 1545.245346][T23543] ? create_io_thread+0x1e0/0x1e0 [ 1545.250211][T23543] ? __mutex_lock_slowpath+0x10/0x10 [ 1545.255327][T23543] __x64_sys_clone+0x289/0x310 [ 1545.259928][T23543] ? __do_sys_vfork+0x130/0x130 [ 1545.264615][T23543] ? debug_smp_processor_id+0x17/0x20 [ 1545.269824][T23543] do_syscall_64+0x44/0xd0 [ 1545.274075][T23543] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1545.279802][T23543] RIP: 0033:0x7f65e6eb55a9 [ 1545.284058][T23543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1545.303506][T23543] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1545.312794][T23543] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1545.320596][T23543] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1545.328413][T23543] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.336225][T23543] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:39 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 34) 11:51:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:39 executing program 2: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 0: syz_clone(0x10820000, 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 11:51:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0x10, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1545.344030][T23543] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1545.351847][T23543] 11:51:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000100000000000000010001001830000003000000000000000000000018500000070000000000000000000d00140902ba95accf1a084aea0000000000514d9cbae39c56d9d08557e9051019b8e1c5481663b5ab2bdd4115141f105c1d45135b6b4f0326c400000000000000a6435bb79d5bd4c524715b931a2e24aabb140ce26cf55017f520c1359d10038710dd3c9e76a882044047fb3ae7ff795a326f1cfb0b6804832d680bf0c836438aeefd3c546aba7f1ceec867534d33adb46acfaf7909660dbaf758e9"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) recvmsg$unix(r1, &(0x7f0000001200)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000001240)=""/4109, 0x100d}, {&(0x7f0000001100)=""/115, 0x73}], 0x2, &(0x7f00000011c0)=[@cred={{0x1c}}], 0x20}, 0x40000000) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x0, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000100000000000000010001001830000003000000000000000000000018500000070000000000000000000d00140902ba95accf1a084aea0000000000514d9cbae39c56d9d08557e9051019b8e1c5481663b5ab2bdd4115141f105c1d45135b6b4f0326c400000000000000a6435bb79d5bd4c524715b931a2e24aabb140ce26cf55017f520c1359d10038710dd3c9e76a882044047fb3ae7ff795a326f1cfb0b6804832d680bf0c836438aeefd3c546aba7f1ceec867534d33adb46acfaf7909660dbaf758e9"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) recvmsg$unix(r1, &(0x7f0000001200)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000001240)=""/4109, 0x100d}, {&(0x7f0000001100)=""/115, 0x73}], 0x2, &(0x7f00000011c0)=[@cred={{0x1c}}], 0x20}, 0x40000000) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) [ 1545.403758][T23564] FAULT_INJECTION: forcing a failure. [ 1545.403758][T23564] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.446319][T23564] CPU: 0 PID: 23564 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1545.456409][T23564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1545.466297][T23564] Call Trace: [ 1545.469417][T23564] [ 1545.472194][T23564] dump_stack_lvl+0x151/0x1b7 [ 1545.476707][T23564] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1545.481999][T23564] ? do_syscall_64+0x44/0xd0 [ 1545.486428][T23564] dump_stack+0x15/0x17 [ 1545.490418][T23564] should_fail+0x3c0/0x510 [ 1545.494685][T23564] __should_failslab+0x9f/0xe0 [ 1545.499272][T23564] should_failslab+0x9/0x20 [ 1545.503619][T23564] kmem_cache_alloc+0x4f/0x2f0 [ 1545.508210][T23564] ? anon_vma_clone+0xa1/0x4f0 [ 1545.512810][T23564] anon_vma_clone+0xa1/0x4f0 [ 1545.517416][T23564] anon_vma_fork+0x91/0x4f0 [ 1545.521753][T23564] ? anon_vma_name+0x4c/0x70 [ 1545.526178][T23564] dup_mmap+0x750/0xea0 [ 1545.530291][T23564] ? __delayed_free_task+0x20/0x20 [ 1545.535234][T23564] ? mm_init+0x807/0x960 [ 1545.539310][T23564] dup_mm+0x91/0x330 [ 1545.543043][T23564] copy_mm+0x108/0x1b0 [ 1545.546976][T23564] copy_process+0x1295/0x3250 [ 1545.551465][T23564] ? proc_fail_nth_write+0x213/0x290 [ 1545.556583][T23564] ? proc_fail_nth_read+0x220/0x220 [ 1545.561616][T23564] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1545.566565][T23564] ? vfs_write+0x9af/0x1050 [ 1545.570906][T23564] ? vmacache_update+0xb7/0x120 [ 1545.575588][T23564] kernel_clone+0x22d/0x990 [ 1545.579928][T23564] ? file_end_write+0x1b0/0x1b0 [ 1545.584614][T23564] ? __kasan_check_write+0x14/0x20 [ 1545.589563][T23564] ? create_io_thread+0x1e0/0x1e0 [ 1545.594430][T23564] ? __mutex_lock_slowpath+0x10/0x10 [ 1545.599558][T23564] __x64_sys_clone+0x289/0x310 [ 1545.604145][T23564] ? __do_sys_vfork+0x130/0x130 [ 1545.608835][T23564] ? debug_smp_processor_id+0x17/0x20 [ 1545.614039][T23564] do_syscall_64+0x44/0xd0 [ 1545.618292][T23564] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1545.624106][T23564] RIP: 0033:0x7f65e6eb55a9 [ 1545.628550][T23564] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1545.647998][T23564] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1545.656245][T23564] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1545.664055][T23564] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1545.671862][T23564] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1545.679673][T23564] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1545.687575][T23564] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 11:51:40 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 35) 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 0: syz_clone(0x10820000, 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 11:51:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000100000000000000010001001830000003000000000000000000000018500000070000000000000000000d00140902ba95accf1a084aea0000000000514d9cbae39c56d9d08557e9051019b8e1c5481663b5ab2bdd4115141f105c1d45135b6b4f0326c400000000000000a6435bb79d5bd4c524715b931a2e24aabb140ce26cf55017f520c1359d10038710dd3c9e76a882044047fb3ae7ff795a326f1cfb0b6804832d680bf0c836438aeefd3c546aba7f1ceec867534d33adb46acfaf7909660dbaf758e9"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) recvmsg$unix(r1, &(0x7f0000001200)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000001240)=""/4109, 0x100d}, {&(0x7f0000001100)=""/115, 0x73}], 0x2, &(0x7f00000011c0)=[@cred={{0x1c}}], 0x20}, 0x40000000) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000100000000000000010001001830000003000000000000000000000018500000070000000000000000000d00140902ba95accf1a084aea0000000000514d9cbae39c56d9d08557e9051019b8e1c5481663b5ab2bdd4115141f105c1d45135b6b4f0326c400000000000000a6435bb79d5bd4c524715b931a2e24aabb140ce26cf55017f520c1359d10038710dd3c9e76a882044047fb3ae7ff795a326f1cfb0b6804832d680bf0c836438aeefd3c546aba7f1ceec867534d33adb46acfaf7909660dbaf758e9"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) recvmsg$unix(r1, &(0x7f0000001200)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000001180)=[{&(0x7f0000001240)=""/4109, 0x100d}, {&(0x7f0000001100)=""/115, 0x73}], 0x2, &(0x7f00000011c0)=[@cred={{0x1c}}], 0x20}, 0x40000000) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x5, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1545.695386][T23564] 11:51:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x8, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1545.741975][T23591] FAULT_INJECTION: forcing a failure. [ 1545.741975][T23591] name failslab, interval 1, probability 0, space 0, times 0 [ 1545.776775][T23591] CPU: 1 PID: 23591 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1545.786941][T23591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1545.796924][T23591] Call Trace: [ 1545.800046][T23591] [ 1545.802822][T23591] dump_stack_lvl+0x151/0x1b7 [ 1545.807335][T23591] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1545.812632][T23591] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 1545.818876][T23591] dump_stack+0x15/0x17 [ 1545.822892][T23591] should_fail+0x3c0/0x510 [ 1545.827125][T23591] __should_failslab+0x9f/0xe0 [ 1545.831721][T23591] should_failslab+0x9/0x20 [ 1545.836061][T23591] kmem_cache_alloc+0x4f/0x2f0 [ 1545.840659][T23591] ? anon_vma_fork+0xf7/0x4f0 [ 1545.845173][T23591] anon_vma_fork+0xf7/0x4f0 [ 1545.849513][T23591] ? anon_vma_name+0x4c/0x70 [ 1545.853939][T23591] dup_mmap+0x750/0xea0 [ 1545.857932][T23591] ? __delayed_free_task+0x20/0x20 [ 1545.862883][T23591] ? mm_init+0x807/0x960 [ 1545.866958][T23591] dup_mm+0x91/0x330 [ 1545.870698][T23591] copy_mm+0x108/0x1b0 [ 1545.874595][T23591] copy_process+0x1295/0x3250 [ 1545.879108][T23591] ? proc_fail_nth_write+0x213/0x290 [ 1545.884231][T23591] ? proc_fail_nth_read+0x220/0x220 [ 1545.889265][T23591] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1545.894360][T23591] ? vfs_write+0x9af/0x1050 [ 1545.898750][T23591] ? vmacache_update+0xb7/0x120 [ 1545.903436][T23591] kernel_clone+0x22d/0x990 [ 1545.907775][T23591] ? file_end_write+0x1b0/0x1b0 [ 1545.912466][T23591] ? __kasan_check_write+0x14/0x20 [ 1545.917413][T23591] ? create_io_thread+0x1e0/0x1e0 [ 1545.922273][T23591] ? __mutex_lock_slowpath+0x10/0x10 [ 1545.927392][T23591] __x64_sys_clone+0x289/0x310 [ 1545.932003][T23591] ? __do_sys_vfork+0x130/0x130 [ 1545.936770][T23591] ? debug_smp_processor_id+0x17/0x20 [ 1545.941989][T23591] do_syscall_64+0x44/0xd0 [ 1545.946246][T23591] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1545.951968][T23591] RIP: 0033:0x7f65e6eb55a9 [ 1545.956224][T23591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1545.975750][T23591] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1545.983992][T23591] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:40 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 11:51:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffffffffb937c07d) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000000)={'netdevsim0\x00'}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) 11:51:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 0: syz_clone(0x10820000, 0x0, 0x700000000000000, 0x0, 0x0, 0x0) [ 1545.991897][T23591] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1545.999710][T23591] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1546.007513][T23591] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1546.015325][T23591] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1546.023139][T23591] 11:51:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffffffffb937c07d) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000000)={'netdevsim0\x00'}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffffffffb937c07d) (async) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000000)={'netdevsim0\x00'}) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) (async) [ 1546.052701][T23611] FAULT_INJECTION: forcing a failure. [ 1546.052701][T23611] name failslab, interval 1, probability 0, space 0, times 0 [ 1546.068606][T23611] CPU: 1 PID: 23611 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1546.078673][T23611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1546.088567][T23611] Call Trace: [ 1546.091698][T23611] [ 1546.094555][T23611] dump_stack_lvl+0x151/0x1b7 [ 1546.099072][T23611] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1546.104363][T23611] dump_stack+0x15/0x17 [ 1546.108356][T23611] should_fail+0x3c0/0x510 [ 1546.112609][T23611] __should_failslab+0x9f/0xe0 [ 1546.117209][T23611] should_failslab+0x9/0x20 [ 1546.121549][T23611] kmem_cache_alloc+0x4f/0x2f0 [ 1546.126147][T23611] ? vm_area_dup+0x26/0x1d0 [ 1546.130489][T23611] vm_area_dup+0x26/0x1d0 [ 1546.134656][T23611] dup_mmap+0x6b8/0xea0 [ 1546.138648][T23611] ? __delayed_free_task+0x20/0x20 [ 1546.143596][T23611] ? mm_init+0x807/0x960 [ 1546.147674][T23611] dup_mm+0x91/0x330 11:51:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xca, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x18, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xf00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 0: syz_clone(0x10820000, 0x0, 0x900000000000000, 0x0, 0x0, 0x0) [ 1546.151403][T23611] copy_mm+0x108/0x1b0 [ 1546.155311][T23611] copy_process+0x1295/0x3250 [ 1546.159827][T23611] ? proc_fail_nth_write+0x213/0x290 [ 1546.164946][T23611] ? proc_fail_nth_read+0x220/0x220 [ 1546.169980][T23611] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1546.174925][T23611] ? vfs_write+0x9af/0x1050 [ 1546.179265][T23611] ? vmacache_update+0xb7/0x120 [ 1546.184045][T23611] kernel_clone+0x22d/0x990 [ 1546.188380][T23611] ? file_end_write+0x1b0/0x1b0 [ 1546.193067][T23611] ? __kasan_check_write+0x14/0x20 [ 1546.198015][T23611] ? create_io_thread+0x1e0/0x1e0 [ 1546.202876][T23611] ? __mutex_lock_slowpath+0x10/0x10 [ 1546.207997][T23611] __x64_sys_clone+0x289/0x310 [ 1546.212593][T23611] ? __do_sys_vfork+0x130/0x130 [ 1546.217282][T23611] ? debug_smp_processor_id+0x17/0x20 [ 1546.222488][T23611] do_syscall_64+0x44/0xd0 [ 1546.226742][T23611] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1546.232467][T23611] RIP: 0033:0x7f65e6eb55a9 [ 1546.236718][T23611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1546.256159][T23611] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1546.264406][T23611] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1546.272216][T23611] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1546.280026][T23611] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1546.287839][T23611] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1546.295650][T23611] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 11:51:40 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 37) 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 0: syz_clone(0x10820000, 0x0, 0xf00000000000000, 0x0, 0x0, 0x0) 11:51:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x3c, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0xffffffffb937c07d) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000000)={'netdevsim0\x00'}) (async) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x1) 11:51:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0xbf, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1546.303466][T23611] 11:51:40 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) recvmsg$unix(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000100)=""/175, 0xaf}, {&(0x7f00000001c0)=""/189, 0xbd}, {&(0x7f0000000600)=""/160, 0xa0}, {&(0x7f0000000340)=""/87, 0x57}, {&(0x7f0000000280)=""/180, 0xb4}, {&(0x7f0000000000)=""/5, 0x5}], 0x6, &(0x7f00000006c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}, 0x10001) [ 1546.336330][T23643] FAULT_INJECTION: forcing a failure. [ 1546.336330][T23643] name failslab, interval 1, probability 0, space 0, times 0 [ 1546.365683][T23643] CPU: 0 PID: 23643 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1546.375763][T23643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 11:51:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1546.385658][T23643] Call Trace: [ 1546.388783][T23643] [ 1546.391559][T23643] dump_stack_lvl+0x151/0x1b7 [ 1546.396074][T23643] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1546.401366][T23643] dump_stack+0x15/0x17 [ 1546.405356][T23643] should_fail+0x3c0/0x510 [ 1546.409611][T23643] __should_failslab+0x9f/0xe0 [ 1546.414214][T23643] should_failslab+0x9/0x20 [ 1546.418547][T23643] kmem_cache_alloc+0x4f/0x2f0 [ 1546.423149][T23643] ? vm_area_dup+0x26/0x1d0 [ 1546.427497][T23643] ? __kasan_check_read+0x11/0x20 [ 1546.432353][T23643] vm_area_dup+0x26/0x1d0 [ 1546.436515][T23643] dup_mmap+0x6b8/0xea0 [ 1546.440508][T23643] ? __delayed_free_task+0x20/0x20 [ 1546.445457][T23643] ? mm_init+0x807/0x960 [ 1546.449534][T23643] dup_mm+0x91/0x330 [ 1546.453266][T23643] copy_mm+0x108/0x1b0 [ 1546.457176][T23643] copy_process+0x1295/0x3250 [ 1546.461691][T23643] ? proc_fail_nth_write+0x213/0x290 [ 1546.466807][T23643] ? proc_fail_nth_read+0x220/0x220 [ 1546.471842][T23643] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1546.476788][T23643] ? vfs_write+0x9af/0x1050 [ 1546.481125][T23643] ? vmacache_update+0xb7/0x120 [ 1546.485811][T23643] kernel_clone+0x22d/0x990 [ 1546.490251][T23643] ? file_end_write+0x1b0/0x1b0 [ 1546.494933][T23643] ? __kasan_check_write+0x14/0x20 [ 1546.499888][T23643] ? create_io_thread+0x1e0/0x1e0 [ 1546.504739][T23643] ? __mutex_lock_slowpath+0x10/0x10 [ 1546.509863][T23643] __x64_sys_clone+0x289/0x310 [ 1546.514464][T23643] ? __do_sys_vfork+0x130/0x130 [ 1546.519149][T23643] ? debug_smp_processor_id+0x17/0x20 [ 1546.524365][T23643] do_syscall_64+0x44/0xd0 [ 1546.528611][T23643] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1546.534427][T23643] RIP: 0033:0x7f65e6eb55a9 [ 1546.538678][T23643] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1546.558128][T23643] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1546.566365][T23643] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1546.574176][T23643] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:41 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 38) 11:51:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) recvmsg$unix(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000100)=""/175, 0xaf}, {&(0x7f00000001c0)=""/189, 0xbd}, {&(0x7f0000000600)=""/160, 0xa0}, {&(0x7f0000000340)=""/87, 0x57}, {&(0x7f0000000280)=""/180, 0xb4}, {&(0x7f0000000000)=""/5, 0x5}], 0x6, &(0x7f00000006c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}, 0x10001) 11:51:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2100, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 0: syz_clone(0x10820000, 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) 11:51:41 executing program 0: syz_clone(0x10820000, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) [ 1546.581989][T23643] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1546.589798][T23643] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1546.597628][T23643] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1546.605423][T23643] 11:51:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) recvmsg$unix(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000480)=[{&(0x7f0000000100)=""/175, 0xaf}, {&(0x7f00000001c0)=""/189, 0xbd}, {&(0x7f0000000600)=""/160, 0xa0}, {&(0x7f0000000340)=""/87, 0x57}, {&(0x7f0000000280)=""/180, 0xb4}, {&(0x7f0000000000)=""/5, 0x5}], 0x6, &(0x7f00000006c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}, 0x10001) 11:51:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1546.629672][T23671] FAULT_INJECTION: forcing a failure. [ 1546.629672][T23671] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1546.682150][T23671] CPU: 1 PID: 23671 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1546.692233][T23671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1546.702122][T23671] Call Trace: [ 1546.705242][T23671] [ 1546.708022][T23671] dump_stack_lvl+0x151/0x1b7 [ 1546.712532][T23671] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1546.717827][T23671] ? stack_trace_save+0x12d/0x1f0 [ 1546.722691][T23671] ? stack_trace_snprint+0x100/0x100 [ 1546.727811][T23671] dump_stack+0x15/0x17 [ 1546.731800][T23671] should_fail+0x3c0/0x510 [ 1546.736055][T23671] should_fail_alloc_page+0x58/0x70 [ 1546.741096][T23671] __alloc_pages+0x1de/0x7c0 [ 1546.745517][T23671] ? vm_area_dup+0x26/0x1d0 [ 1546.749962][T23671] ? copy_mm+0x108/0x1b0 [ 1546.754040][T23671] ? __count_vm_events+0x30/0x30 [ 1546.758818][T23671] ? avc_denied+0x1b0/0x1b0 [ 1546.763151][T23671] allocate_slab+0x62/0x580 [ 1546.767491][T23671] ___slab_alloc+0x2e2/0x6f0 [ 1546.771917][T23671] ? vm_area_dup+0x26/0x1d0 [ 1546.776259][T23671] ? vm_area_dup+0x26/0x1d0 [ 1546.780595][T23671] __slab_alloc+0x4a/0x90 [ 1546.784762][T23671] kmem_cache_alloc+0x205/0x2f0 [ 1546.789448][T23671] ? vm_area_dup+0x26/0x1d0 [ 1546.793787][T23671] vm_area_dup+0x26/0x1d0 [ 1546.797956][T23671] dup_mmap+0x6b8/0xea0 [ 1546.801949][T23671] ? __delayed_free_task+0x20/0x20 [ 1546.806896][T23671] ? mm_init+0x807/0x960 [ 1546.810977][T23671] dup_mm+0x91/0x330 [ 1546.814706][T23671] copy_mm+0x108/0x1b0 [ 1546.818610][T23671] copy_process+0x1295/0x3250 [ 1546.823125][T23671] ? proc_fail_nth_write+0x213/0x290 [ 1546.828248][T23671] ? proc_fail_nth_read+0x220/0x220 [ 1546.833280][T23671] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1546.838230][T23671] ? vfs_write+0x9af/0x1050 [ 1546.842566][T23671] ? vmacache_update+0xb7/0x120 [ 1546.847256][T23671] kernel_clone+0x22d/0x990 [ 1546.851594][T23671] ? file_end_write+0x1b0/0x1b0 [ 1546.856283][T23671] ? __kasan_check_write+0x14/0x20 [ 1546.861230][T23671] ? create_io_thread+0x1e0/0x1e0 [ 1546.866090][T23671] ? __mutex_lock_slowpath+0x10/0x10 [ 1546.871212][T23671] __x64_sys_clone+0x289/0x310 [ 1546.875814][T23671] ? __do_sys_vfork+0x130/0x130 [ 1546.880496][T23671] ? debug_smp_processor_id+0x17/0x20 [ 1546.885796][T23671] do_syscall_64+0x44/0xd0 [ 1546.890044][T23671] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1546.895773][T23671] RIP: 0033:0x7f65e6eb55a9 [ 1546.900027][T23671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1546.919470][T23671] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:41 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 39) 11:51:41 executing program 0: syz_clone(0x10820000, 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 11:51:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:41 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000000100)=""/150, 0x96}, {&(0x7f00000001c0)=""/213, 0xd5}], 0x3, &(0x7f0000000300)=""/190, 0xbe}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1546.927709][T23671] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1546.935526][T23671] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1546.943334][T23671] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1546.951150][T23671] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1546.958956][T23671] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1546.966773][T23671] 11:51:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1547.019538][T23700] FAULT_INJECTION: forcing a failure. [ 1547.019538][T23700] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1547.041164][T23700] CPU: 0 PID: 23700 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1547.051233][T23700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1547.061129][T23700] Call Trace: [ 1547.064252][T23700] [ 1547.067030][T23700] dump_stack_lvl+0x151/0x1b7 [ 1547.071546][T23700] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1547.076840][T23700] dump_stack+0x15/0x17 [ 1547.080832][T23700] should_fail+0x3c0/0x510 [ 1547.085082][T23700] should_fail_alloc_page+0x58/0x70 [ 1547.090118][T23700] __alloc_pages+0x1de/0x7c0 [ 1547.094545][T23700] ? __count_vm_events+0x30/0x30 [ 1547.099317][T23700] ? dup_mm+0x91/0x330 [ 1547.103222][T23700] ? copy_mm+0x108/0x1b0 [ 1547.107301][T23700] ? copy_process+0x1295/0x3250 [ 1547.111986][T23700] ? kernel_clone+0x22d/0x990 [ 1547.116499][T23700] ? __x64_sys_clone+0x289/0x310 [ 1547.121278][T23700] pte_alloc_one+0x73/0x1b0 [ 1547.125612][T23700] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1547.130653][T23700] ? __kasan_check_write+0x14/0x20 [ 1547.135595][T23700] ? __set_page_owner+0x2ee/0x310 [ 1547.140454][T23700] __pte_alloc+0x86/0x350 [ 1547.144621][T23700] ? post_alloc_hook+0x1ab/0x1b0 [ 1547.149391][T23700] ? free_pgtables+0x210/0x210 [ 1547.153994][T23700] ? get_page_from_freelist+0x38b/0x400 [ 1547.159373][T23700] copy_pte_range+0x1b1f/0x20b0 [ 1547.164062][T23700] ? __kunmap_atomic+0x80/0x80 [ 1547.168664][T23700] ? __pud_alloc+0x260/0x260 [ 1547.173085][T23700] ? __pud_alloc+0x218/0x260 [ 1547.177513][T23700] ? do_handle_mm_fault+0x2370/0x2370 [ 1547.182722][T23700] copy_page_range+0xc1e/0x1090 [ 1547.187411][T23700] ? pfn_valid+0x1e0/0x1e0 [ 1547.191661][T23700] dup_mmap+0x99f/0xea0 [ 1547.195654][T23700] ? __delayed_free_task+0x20/0x20 [ 1547.200599][T23700] ? mm_init+0x807/0x960 [ 1547.204680][T23700] dup_mm+0x91/0x330 [ 1547.208412][T23700] copy_mm+0x108/0x1b0 [ 1547.212319][T23700] copy_process+0x1295/0x3250 [ 1547.216833][T23700] ? proc_fail_nth_write+0x213/0x290 [ 1547.221963][T23700] ? proc_fail_nth_read+0x220/0x220 [ 1547.226986][T23700] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1547.231933][T23700] ? vfs_write+0x9af/0x1050 [ 1547.236275][T23700] ? vmacache_update+0xb7/0x120 [ 1547.240958][T23700] kernel_clone+0x22d/0x990 [ 1547.245306][T23700] ? file_end_write+0x1b0/0x1b0 [ 1547.249985][T23700] ? __kasan_check_write+0x14/0x20 [ 1547.254932][T23700] ? create_io_thread+0x1e0/0x1e0 [ 1547.259794][T23700] ? __mutex_lock_slowpath+0x10/0x10 [ 1547.264913][T23700] __x64_sys_clone+0x289/0x310 [ 1547.269516][T23700] ? __do_sys_vfork+0x130/0x130 [ 1547.274202][T23700] ? debug_smp_processor_id+0x17/0x20 [ 1547.279409][T23700] do_syscall_64+0x44/0xd0 [ 1547.283664][T23700] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1547.289389][T23700] RIP: 0033:0x7f65e6eb55a9 [ 1547.293648][T23700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:41 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 40) 11:51:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:41 executing program 0: syz_clone(0x10820000, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 11:51:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1547.313085][T23700] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1547.321416][T23700] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1547.329228][T23700] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1547.337045][T23700] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1547.344852][T23700] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1547.352663][T23700] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1547.360476][T23700] [ 1547.382832][T23723] FAULT_INJECTION: forcing a failure. [ 1547.382832][T23723] name failslab, interval 1, probability 0, space 0, times 0 [ 1547.399015][T23723] CPU: 0 PID: 23723 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1547.409087][T23723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1547.418983][T23723] Call Trace: [ 1547.422104][T23723] [ 1547.424881][T23723] dump_stack_lvl+0x151/0x1b7 [ 1547.429395][T23723] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1547.434694][T23723] dump_stack+0x15/0x17 [ 1547.438683][T23723] should_fail+0x3c0/0x510 [ 1547.442934][T23723] __should_failslab+0x9f/0xe0 [ 1547.447540][T23723] should_failslab+0x9/0x20 [ 1547.451872][T23723] kmem_cache_alloc+0x4f/0x2f0 [ 1547.456476][T23723] ? anon_vma_clone+0xa1/0x4f0 [ 1547.461075][T23723] anon_vma_clone+0xa1/0x4f0 [ 1547.465504][T23723] anon_vma_fork+0x91/0x4f0 [ 1547.469842][T23723] ? anon_vma_name+0x4c/0x70 [ 1547.474271][T23723] dup_mmap+0x750/0xea0 [ 1547.478259][T23723] ? __delayed_free_task+0x20/0x20 [ 1547.483207][T23723] ? mm_init+0x807/0x960 [ 1547.487285][T23723] dup_mm+0x91/0x330 [ 1547.491014][T23723] copy_mm+0x108/0x1b0 [ 1547.494920][T23723] copy_process+0x1295/0x3250 [ 1547.499435][T23723] ? proc_fail_nth_write+0x213/0x290 [ 1547.504557][T23723] ? proc_fail_nth_read+0x220/0x220 [ 1547.509677][T23723] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1547.514625][T23723] ? vfs_write+0x9af/0x1050 [ 1547.519120][T23723] ? vmacache_update+0xb7/0x120 [ 1547.523737][T23723] kernel_clone+0x22d/0x990 [ 1547.528078][T23723] ? file_end_write+0x1b0/0x1b0 [ 1547.532764][T23723] ? __kasan_check_write+0x14/0x20 [ 1547.537708][T23723] ? create_io_thread+0x1e0/0x1e0 [ 1547.542569][T23723] ? __mutex_lock_slowpath+0x10/0x10 [ 1547.547700][T23723] __x64_sys_clone+0x289/0x310 [ 1547.552292][T23723] ? __do_sys_vfork+0x130/0x130 [ 1547.556978][T23723] ? debug_smp_processor_id+0x17/0x20 [ 1547.562184][T23723] do_syscall_64+0x44/0xd0 [ 1547.566444][T23723] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1547.572165][T23723] RIP: 0033:0x7f65e6eb55a9 [ 1547.576420][T23723] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1547.595865][T23723] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1547.604110][T23723] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1547.612008][T23723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1547.619816][T23723] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1547.627631][T23723] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1547.635441][T23723] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1547.643254][T23723] 11:51:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000000100)=""/150, 0x96}, {&(0x7f00000001c0)=""/213, 0xd5}], 0x3, &(0x7f0000000300)=""/190, 0xbe}, 0x30) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)) (async) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000000100)=""/150, 0x96}, {&(0x7f00000001c0)=""/213, 0xd5}], 0x3, &(0x7f0000000300)=""/190, 0xbe}, 0x30) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:42 executing program 0: syz_clone(0x10820000, 0x0, 0x4100000000000000, 0x0, 0x0, 0x0) 11:51:42 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 41) 11:51:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x8, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xf00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x9, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:42 executing program 0: syz_clone(0x10820000, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 11:51:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1547.860476][T23742] FAULT_INJECTION: forcing a failure. [ 1547.860476][T23742] name failslab, interval 1, probability 0, space 0, times 0 [ 1547.900741][T23742] CPU: 1 PID: 23742 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1547.910823][T23742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1547.920725][T23742] Call Trace: [ 1547.923842][T23742] [ 1547.926620][T23742] dump_stack_lvl+0x151/0x1b7 [ 1547.931262][T23742] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1547.936554][T23742] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 1547.942798][T23742] dump_stack+0x15/0x17 [ 1547.946789][T23742] should_fail+0x3c0/0x510 [ 1547.951043][T23742] __should_failslab+0x9f/0xe0 [ 1547.955645][T23742] should_failslab+0x9/0x20 [ 1547.959990][T23742] kmem_cache_alloc+0x4f/0x2f0 [ 1547.964583][T23742] ? anon_vma_fork+0xf7/0x4f0 [ 1547.969096][T23742] anon_vma_fork+0xf7/0x4f0 [ 1547.973434][T23742] ? anon_vma_name+0x4c/0x70 [ 1547.977864][T23742] dup_mmap+0x750/0xea0 [ 1547.981859][T23742] ? __delayed_free_task+0x20/0x20 [ 1547.986806][T23742] ? mm_init+0x807/0x960 [ 1547.990879][T23742] dup_mm+0x91/0x330 [ 1547.994613][T23742] copy_mm+0x108/0x1b0 [ 1547.998517][T23742] copy_process+0x1295/0x3250 [ 1548.003031][T23742] ? proc_fail_nth_write+0x213/0x290 [ 1548.008152][T23742] ? proc_fail_nth_read+0x220/0x220 [ 1548.013194][T23742] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1548.018130][T23742] ? vfs_write+0x9af/0x1050 [ 1548.022470][T23742] ? vmacache_update+0xb7/0x120 [ 1548.027158][T23742] kernel_clone+0x22d/0x990 [ 1548.031500][T23742] ? file_end_write+0x1b0/0x1b0 [ 1548.036182][T23742] ? __kasan_check_write+0x14/0x20 [ 1548.041131][T23742] ? create_io_thread+0x1e0/0x1e0 [ 1548.045989][T23742] ? __mutex_lock_slowpath+0x10/0x10 [ 1548.051111][T23742] __x64_sys_clone+0x289/0x310 [ 1548.055714][T23742] ? __do_sys_vfork+0x130/0x130 [ 1548.060407][T23742] ? debug_smp_processor_id+0x17/0x20 [ 1548.065607][T23742] do_syscall_64+0x44/0xd0 [ 1548.069860][T23742] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1548.075589][T23742] RIP: 0033:0x7f65e6eb55a9 [ 1548.079843][T23742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1548.099283][T23742] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1548.107526][T23742] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1548.115337][T23742] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1548.123152][T23742] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1548.130962][T23742] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1548.138773][T23742] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1548.146588][T23742] 11:51:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) recvmsg(r1, &(0x7f00000003c0)={&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/58, 0x3a}, {&(0x7f0000000100)=""/150, 0x96}, {&(0x7f00000001c0)=""/213, 0xd5}], 0x3, &(0x7f0000000300)=""/190, 0xbe}, 0x30) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xca00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:43 executing program 0: syz_clone(0x10820000, 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 11:51:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:43 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 42) 11:51:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xb, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1548.701075][T23766] FAULT_INJECTION: forcing a failure. [ 1548.701075][T23766] name failslab, interval 1, probability 0, space 0, times 0 [ 1548.720122][T23766] CPU: 1 PID: 23766 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1548.730198][T23766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1548.740095][T23766] Call Trace: [ 1548.743217][T23766] [ 1548.745992][T23766] dump_stack_lvl+0x151/0x1b7 11:51:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1548.750510][T23766] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1548.755807][T23766] dump_stack+0x15/0x17 [ 1548.759804][T23766] should_fail+0x3c0/0x510 [ 1548.764051][T23766] __should_failslab+0x9f/0xe0 [ 1548.768653][T23766] should_failslab+0x9/0x20 [ 1548.772989][T23766] kmem_cache_alloc+0x4f/0x2f0 [ 1548.777590][T23766] ? vm_area_dup+0x26/0x1d0 [ 1548.781925][T23766] vm_area_dup+0x26/0x1d0 [ 1548.786093][T23766] dup_mmap+0x6b8/0xea0 [ 1548.790085][T23766] ? __delayed_free_task+0x20/0x20 [ 1548.795037][T23766] ? mm_init+0x807/0x960 [ 1548.799114][T23766] dup_mm+0x91/0x330 [ 1548.802948][T23766] copy_mm+0x108/0x1b0 [ 1548.806851][T23766] copy_process+0x1295/0x3250 [ 1548.811361][T23766] ? proc_fail_nth_write+0x213/0x290 [ 1548.816481][T23766] ? proc_fail_nth_read+0x220/0x220 [ 1548.821516][T23766] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1548.826466][T23766] ? vfs_write+0x9af/0x1050 [ 1548.830802][T23766] ? vmacache_update+0xb7/0x120 [ 1548.835495][T23766] kernel_clone+0x22d/0x990 [ 1548.839827][T23766] ? file_end_write+0x1b0/0x1b0 [ 1548.844514][T23766] ? __kasan_check_write+0x14/0x20 [ 1548.849465][T23766] ? create_io_thread+0x1e0/0x1e0 [ 1548.854324][T23766] ? __mutex_lock_slowpath+0x10/0x10 [ 1548.859446][T23766] __x64_sys_clone+0x289/0x310 [ 1548.864046][T23766] ? __do_sys_vfork+0x130/0x130 [ 1548.868733][T23766] ? debug_smp_processor_id+0x17/0x20 [ 1548.873940][T23766] do_syscall_64+0x44/0xd0 [ 1548.878190][T23766] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1548.884022][T23766] RIP: 0033:0x7f65e6eb55a9 [ 1548.888275][T23766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1548.907747][T23766] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1548.915963][T23766] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1548.923949][T23766] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1548.931761][T23766] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1548.939572][T23766] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1548.947380][T23766] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1548.955194][T23766] 11:51:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xd, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x80ffff, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 0: syz_clone(0x10820000, 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0) 11:51:44 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 43) 11:51:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2100, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 0: syz_clone(0x10820000, 0x0, 0xffff030000000000, 0x0, 0x0, 0x0) 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xe, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1549.595347][T23806] FAULT_INJECTION: forcing a failure. [ 1549.595347][T23806] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1549.612795][T23806] CPU: 0 PID: 23806 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1549.622983][T23806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1549.632877][T23806] Call Trace: [ 1549.636000][T23806] [ 1549.638774][T23806] dump_stack_lvl+0x151/0x1b7 11:51:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:44 executing program 0: syz_clone(0x10820000, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1549.643291][T23806] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1549.648587][T23806] dump_stack+0x15/0x17 [ 1549.652576][T23806] should_fail+0x3c0/0x510 [ 1549.656829][T23806] should_fail_alloc_page+0x58/0x70 [ 1549.661863][T23806] __alloc_pages+0x1de/0x7c0 [ 1549.666288][T23806] ? __count_vm_events+0x30/0x30 [ 1549.671062][T23806] ? __this_cpu_preempt_check+0x13/0x20 [ 1549.676442][T23806] ? __mod_node_page_state+0xac/0xf0 [ 1549.681567][T23806] pte_alloc_one+0x73/0x1b0 [ 1549.685906][T23806] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1549.690935][T23806] __pte_alloc+0x86/0x350 [ 1549.695102][T23806] ? free_pgtables+0x210/0x210 [ 1549.699699][T23806] ? _raw_spin_lock+0xa3/0x1b0 [ 1549.704297][T23806] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1549.709505][T23806] ? __kernel_text_address+0x9a/0x110 [ 1549.714716][T23806] copy_pte_range+0x1b1f/0x20b0 [ 1549.719402][T23806] ? __kunmap_atomic+0x80/0x80 [ 1549.724000][T23806] ? __kasan_slab_alloc+0xc4/0xe0 [ 1549.728861][T23806] ? __kasan_slab_alloc+0xb2/0xe0 [ 1549.733720][T23806] ? kmem_cache_alloc+0x189/0x2f0 [ 1549.738581][T23806] ? vm_area_dup+0x26/0x1d0 [ 1549.742922][T23806] ? dup_mmap+0x6b8/0xea0 [ 1549.747228][T23806] ? dup_mm+0x91/0x330 [ 1549.751129][T23806] ? copy_mm+0x108/0x1b0 [ 1549.755218][T23806] ? copy_process+0x1295/0x3250 [ 1549.759896][T23806] ? kernel_clone+0x22d/0x990 [ 1549.764409][T23806] ? __x64_sys_clone+0x289/0x310 [ 1549.769185][T23806] ? do_syscall_64+0x44/0xd0 [ 1549.773611][T23806] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1549.779518][T23806] copy_page_range+0xc1e/0x1090 [ 1549.784200][T23806] ? pfn_valid+0x1e0/0x1e0 [ 1549.788452][T23806] dup_mmap+0x99f/0xea0 [ 1549.792444][T23806] ? __delayed_free_task+0x20/0x20 [ 1549.797390][T23806] ? mm_init+0x807/0x960 [ 1549.801469][T23806] dup_mm+0x91/0x330 [ 1549.805200][T23806] copy_mm+0x108/0x1b0 [ 1549.809106][T23806] copy_process+0x1295/0x3250 [ 1549.813620][T23806] ? proc_fail_nth_write+0x213/0x290 [ 1549.818745][T23806] ? proc_fail_nth_read+0x220/0x220 [ 1549.823811][T23806] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1549.828822][T23806] ? vfs_write+0x9af/0x1050 [ 1549.833159][T23806] ? vmacache_update+0xb7/0x120 [ 1549.837843][T23806] kernel_clone+0x22d/0x990 [ 1549.842183][T23806] ? file_end_write+0x1b0/0x1b0 [ 1549.846874][T23806] ? __kasan_check_write+0x14/0x20 [ 1549.851814][T23806] ? create_io_thread+0x1e0/0x1e0 [ 1549.856676][T23806] ? __mutex_lock_slowpath+0x10/0x10 [ 1549.861797][T23806] __x64_sys_clone+0x289/0x310 [ 1549.866400][T23806] ? __do_sys_vfork+0x130/0x130 [ 1549.871088][T23806] ? debug_smp_processor_id+0x17/0x20 [ 1549.876292][T23806] do_syscall_64+0x44/0xd0 [ 1549.880546][T23806] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1549.886273][T23806] RIP: 0033:0x7f65e6eb55a9 [ 1549.890531][T23806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1549.909967][T23806] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1549.918211][T23806] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1549.926025][T23806] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1549.933833][T23806] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 11:51:44 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 44) 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) r1 = getpid() r2 = perf_event_open$cgroup(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0x7f, 0x7f, 0xff, 0x0, 0x0, 0x90000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000380), 0xa}, 0x8020, 0x18, 0x20, 0x0, 0x4, 0x6c, 0x1, 0x0, 0x5, 0x0, 0xfffffffffffffffc}, r0, 0x10, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r1, r2, 0x0, 0x1, &(0x7f0000000440)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000000)=""/18, 0x12}, {&(0x7f0000000100)=""/200, 0xc8}], 0x2, &(0x7f0000000240)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}, 0x12000) ioctl$PERF_EVENT_IOC_RESET(r4, 0x5421, 0x1ffff000) 11:51:44 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x10800080, &(0x7f0000000000)="300155f88d", 0x5, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="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") r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, r1, 0x0, 0x2, &(0x7f00000001c0)='}\x00'}, 0x30) 11:51:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x11, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) r1 = getpid() (async) r2 = perf_event_open$cgroup(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0x7f, 0x7f, 0xff, 0x0, 0x0, 0x90000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000380), 0xa}, 0x8020, 0x18, 0x20, 0x0, 0x4, 0x6c, 0x1, 0x0, 0x5, 0x0, 0xfffffffffffffffc}, r0, 0x10, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r1, r2, 0x0, 0x1, &(0x7f0000000440)='\x00'}, 0x30) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000010000000000000001000100183000000300000000000000000000001050000007000067000000000000000014090200010000009500000000000000f2515634f6823e9c152856d8bf0302cfdd336deb31b6aa174bd303589ac8dbdf9a2572e119fdd055142e307e39e2ef5300d50e8b84bc91e669ccc73816b8159c158b05835c24656bf8c071769906ffa3d739fcba81c9f22d57cd913244d5b31a0a05c8acf46a9c60032cf85b84ec8c0d6d3417bbad1e6100f5ba8435b6069f23cc2c53daeee167dde4ae91c9cf22d3c88919944add148719b43c2aaeddffea5dd120dc8a74c6cae29a29912ec45bc66fd42ab8e5ae065dcb5440872a05f0f3704c7d9260f66a8b0dac2bae6a38bf2b47605f4ee982ccbb64a23fd3885a76787d1da720d40019dd0053898c77942b0baf1e015248719ad5127f4a4391617cc1487a0d6314c077386c95295f79bf189bcf838d1606dacea3a7a4416ba8ec9e4073d1759ed527ddbcc63683de2a0207a818492d9ff817d0b0839c9abb05fbe6d9b9c0dbb5be2274eb706fc8050db9bce1166ec3a16276d650d0d7406e00205abe518a4da9d364cd7802f37d37b8921c14e66fe5b99705055de6d47bd945f27726b266031d18215739293a98695d9022f4abb7a7d810a43704c444424b3fe77076545060c08c444f8aa3c9efaeb675e3dca970d8359784761f7646f14c8b0afab0d58a07a327b4d17a17f4c1a0b3"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async, rerun: 64) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) (rerun: 64) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000000)=""/18, 0x12}, {&(0x7f0000000100)=""/200, 0xc8}], 0x2, &(0x7f0000000240)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}, 0x12000) (async, rerun: 32) ioctl$PERF_EVENT_IOC_RESET(r4, 0x5421, 0x1ffff000) (rerun: 32) [ 1549.941647][T23806] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1549.949457][T23806] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1549.957273][T23806] [ 1549.985306][T23838] FAULT_INJECTION: forcing a failure. 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x12, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = syz_clone(0x10800080, &(0x7f0000000000)="300155f88d", 0x5, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="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") (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, r1, 0x0, 0x2, &(0x7f00000001c0)='}\x00'}, 0x30) [ 1549.985306][T23838] name fail_page_alloc, interval 1, probability 0, space 0, times 0 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1550.018889][T23838] CPU: 0 PID: 23838 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1550.028962][T23838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1550.038861][T23838] Call Trace: [ 1550.041980][T23838] [ 1550.044758][T23838] dump_stack_lvl+0x151/0x1b7 [ 1550.049270][T23838] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1550.054570][T23838] dump_stack+0x15/0x17 [ 1550.058558][T23838] should_fail+0x3c0/0x510 [ 1550.062817][T23838] should_fail_alloc_page+0x58/0x70 [ 1550.067847][T23838] __alloc_pages+0x1de/0x7c0 [ 1550.072274][T23838] ? __count_vm_events+0x30/0x30 [ 1550.077048][T23838] ? dup_mm+0x91/0x330 [ 1550.080949][T23838] ? copy_mm+0x108/0x1b0 [ 1550.085028][T23838] ? copy_process+0x1295/0x3250 [ 1550.089717][T23838] ? kernel_clone+0x22d/0x990 [ 1550.094226][T23838] ? __x64_sys_clone+0x289/0x310 [ 1550.099004][T23838] pte_alloc_one+0x73/0x1b0 [ 1550.103345][T23838] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1550.108375][T23838] ? __kasan_check_write+0x14/0x20 [ 1550.113321][T23838] ? __set_page_owner+0x2ee/0x310 [ 1550.118270][T23838] __pte_alloc+0x86/0x350 [ 1550.122434][T23838] ? post_alloc_hook+0x1ab/0x1b0 [ 1550.127207][T23838] ? free_pgtables+0x210/0x210 [ 1550.131808][T23838] ? get_page_from_freelist+0x38b/0x400 [ 1550.137189][T23838] copy_pte_range+0x1b1f/0x20b0 [ 1550.141879][T23838] ? __kunmap_atomic+0x80/0x80 [ 1550.146475][T23838] ? __pud_alloc+0x260/0x260 [ 1550.150908][T23838] ? __pud_alloc+0x218/0x260 [ 1550.155332][T23838] ? do_handle_mm_fault+0x2370/0x2370 [ 1550.160540][T23838] copy_page_range+0xc1e/0x1090 [ 1550.165224][T23838] ? pfn_valid+0x1e0/0x1e0 [ 1550.169483][T23838] dup_mmap+0x99f/0xea0 [ 1550.173468][T23838] ? __delayed_free_task+0x20/0x20 [ 1550.178423][T23838] ? mm_init+0x807/0x960 [ 1550.182496][T23838] dup_mm+0x91/0x330 [ 1550.186239][T23838] copy_mm+0x108/0x1b0 [ 1550.190133][T23838] copy_process+0x1295/0x3250 [ 1550.194651][T23838] ? proc_fail_nth_write+0x213/0x290 [ 1550.199769][T23838] ? proc_fail_nth_read+0x220/0x220 [ 1550.204800][T23838] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1550.209746][T23838] ? vfs_write+0x9af/0x1050 [ 1550.214088][T23838] ? vmacache_update+0xb7/0x120 [ 1550.218776][T23838] kernel_clone+0x22d/0x990 [ 1550.223117][T23838] ? file_end_write+0x1b0/0x1b0 [ 1550.227801][T23838] ? __kasan_check_write+0x14/0x20 [ 1550.232751][T23838] ? create_io_thread+0x1e0/0x1e0 [ 1550.237606][T23838] ? __mutex_lock_slowpath+0x10/0x10 [ 1550.242736][T23838] __x64_sys_clone+0x289/0x310 [ 1550.247328][T23838] ? __do_sys_vfork+0x130/0x130 [ 1550.252017][T23838] ? debug_smp_processor_id+0x17/0x20 [ 1550.257223][T23838] do_syscall_64+0x44/0xd0 [ 1550.261479][T23838] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1550.267205][T23838] RIP: 0033:0x7f65e6eb55a9 [ 1550.271460][T23838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1550.290898][T23838] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1550.299143][T23838] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1550.306958][T23838] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:44 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 45) 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x10800080, &(0x7f0000000000)="300155f88d", 0x5, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="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") (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async, rerun: 64) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r0, r1, 0x0, 0x2, &(0x7f00000001c0)='}\x00'}, 0x30) 11:51:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:44 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) r1 = getpid() (async) r2 = perf_event_open$cgroup(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0x7f, 0x7f, 0xff, 0x0, 0x0, 0x90000, 0x7, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x80000000, 0x2, @perf_bp={&(0x7f0000000380), 0xa}, 0x8020, 0x18, 0x20, 0x0, 0x4, 0x6c, 0x1, 0x0, 0x5, 0x0, 0xfffffffffffffffc}, r0, 0x10, 0xffffffffffffffff, 0x6) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r1, r2, 0x0, 0x1, &(0x7f0000000440)='\x00'}, 0x30) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000010000000000000001000100183000000300000000000000000000001050000007000067000000000000000014090200010000009500000000000000f2515634f6823e9c152856d8bf0302cfdd336deb31b6aa174bd303589ac8dbdf9a2572e119fdd055142e307e39e2ef5300d50e8b84bc91e669ccc73816b8159c158b05835c24656bf8c071769906ffa3d739fcba81c9f22d57cd913244d5b31a0a05c8acf46a9c60032cf85b84ec8c0d6d3417bbad1e6100f5ba8435b6069f23cc2c53daeee167dde4ae91c9cf22d3c88919944add148719b43c2aaeddffea5dd120dc8a74c6cae29a29912ec45bc66fd42ab8e5ae065dcb5440872a05f0f3704c7d9260f66a8b0dac2bae6a38bf2b47605f4ee982ccbb64a23fd3885a76787d1da720d40019dd0053898c77942b0baf1e015248719ad5127f4a4391617cc1487a0d6314c077386c95295f79bf189bcf838d1606dacea3a7a4416ba8ec9e4073d1759ed527ddbcc63683de2a0207a818492d9ff817d0b0839c9abb05fbe6d9b9c0dbb5be2274eb706fc8050db9bce1166ec3a16276d650d0d7406e00205abe518a4da9d364cd7802f37d37b8921c14e66fe5b99705055de6d47bd945f27726b266031d18215739293a98695d9022f4abb7a7d810a43704c444424b3fe77076545060c08c444f8aa3c9efaeb675e3dca970d8359784761f7646f14c8b0afab0d58a07a327b4d17a17f4c1a0b3"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000340), 0x2, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080), 0x6e, &(0x7f0000000200)=[{&(0x7f0000000000)=""/18, 0x12}, {&(0x7f0000000100)=""/200, 0xc8}], 0x2, &(0x7f0000000240)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x88}, 0x12000) (async) ioctl$PERF_EVENT_IOC_RESET(r4, 0x5421, 0x1ffff000) 11:51:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1550.314769][T23838] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1550.322581][T23838] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1550.330393][T23838] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1550.338205][T23838] [ 1550.350586][T23862] FAULT_INJECTION: forcing a failure. [ 1550.350586][T23862] name failslab, interval 1, probability 0, space 0, times 0 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x21, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:44 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) openat$cgroup_ro(r1, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x10001ffff003) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x3, 0x5, 0x1, 0x40, 0x0, 0x10001, 0x480, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x42200, 0x0, 0x8, 0x1, 0x8001, 0x0, 0x67, 0x0, 0x0, 0x0, 0x57b4}, r0, 0x2, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x25, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1550.370068][T23862] CPU: 0 PID: 23862 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1550.380140][T23862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1550.390033][T23862] Call Trace: [ 1550.393157][T23862] [ 1550.395932][T23862] dump_stack_lvl+0x151/0x1b7 [ 1550.400445][T23862] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1550.405740][T23862] dump_stack+0x15/0x17 [ 1550.409734][T23862] should_fail+0x3c0/0x510 [ 1550.413987][T23862] __should_failslab+0x9f/0xe0 11:51:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x43, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1550.418588][T23862] should_failslab+0x9/0x20 [ 1550.422925][T23862] kmem_cache_alloc+0x4f/0x2f0 [ 1550.427529][T23862] ? vm_area_dup+0x26/0x1d0 [ 1550.431867][T23862] vm_area_dup+0x26/0x1d0 [ 1550.436036][T23862] dup_mmap+0x6b8/0xea0 [ 1550.440028][T23862] ? __delayed_free_task+0x20/0x20 [ 1550.444972][T23862] ? mm_init+0x807/0x960 [ 1550.449049][T23862] dup_mm+0x91/0x330 [ 1550.452791][T23862] copy_mm+0x108/0x1b0 [ 1550.456692][T23862] copy_process+0x1295/0x3250 [ 1550.461204][T23862] ? proc_fail_nth_write+0x213/0x290 [ 1550.466332][T23862] ? proc_fail_nth_read+0x220/0x220 [ 1550.471356][T23862] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1550.476340][T23862] ? vfs_write+0x9af/0x1050 [ 1550.480642][T23862] ? vmacache_update+0xb7/0x120 [ 1550.485332][T23862] kernel_clone+0x22d/0x990 [ 1550.489669][T23862] ? file_end_write+0x1b0/0x1b0 [ 1550.494360][T23862] ? __kasan_check_write+0x14/0x20 [ 1550.499305][T23862] ? create_io_thread+0x1e0/0x1e0 [ 1550.504163][T23862] ? __mutex_lock_slowpath+0x10/0x10 [ 1550.509284][T23862] __x64_sys_clone+0x289/0x310 [ 1550.513883][T23862] ? __do_sys_vfork+0x130/0x130 [ 1550.518590][T23862] ? debug_smp_processor_id+0x17/0x20 [ 1550.523795][T23862] do_syscall_64+0x44/0xd0 [ 1550.528027][T23862] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1550.533758][T23862] RIP: 0033:0x7f65e6eb55a9 [ 1550.538019][T23862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1550.557452][T23862] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:45 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 46) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0xa, &(0x7f0000000000)='\\-^.::-\xfd:\x00'}, 0x30) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) openat$cgroup_ro(r1, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x10001ffff003) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x3, 0x5, 0x1, 0x40, 0x0, 0x10001, 0x480, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x42200, 0x0, 0x8, 0x1, 0x8001, 0x0, 0x67, 0x0, 0x0, 0x0, 0x57b4}, r0, 0x2, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) openat$cgroup_ro(r1, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x10001ffff003) (async) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x3, 0x5, 0x1, 0x40, 0x0, 0x10001, 0x480, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x42200, 0x0, 0x8, 0x1, 0x8001, 0x0, 0x67, 0x0, 0x0, 0x0, 0x57b4}, r0, 0x2, 0xffffffffffffffff, 0x9) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) (async) [ 1550.565698][T23862] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1550.573515][T23862] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1550.581321][T23862] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1550.589138][T23862] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1550.596946][T23862] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1550.604768][T23862] 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0xa, &(0x7f0000000000)='\\-^.::-\xfd:\x00'}, 0x30) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1550.617859][T23893] FAULT_INJECTION: forcing a failure. [ 1550.617859][T23893] name failslab, interval 1, probability 0, space 0, times 0 [ 1550.639735][T23893] CPU: 0 PID: 23893 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1550.649809][T23893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1550.659709][T23893] Call Trace: [ 1550.662830][T23893] [ 1550.665606][T23893] dump_stack_lvl+0x151/0x1b7 11:51:45 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, r1, 0x0, 0xa, &(0x7f0000000000)='\\-^.::-\xfd:\x00'}, 0x30) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r3, 0xe0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000140)=[{}], 0x8, 0x10, &(0x7f0000000180), &(0x7f00000001c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000200)}}, 0x10) [ 1550.670122][T23893] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1550.675415][T23893] dump_stack+0x15/0x17 [ 1550.679408][T23893] should_fail+0x3c0/0x510 [ 1550.683660][T23893] __should_failslab+0x9f/0xe0 [ 1550.688260][T23893] should_failslab+0x9/0x20 [ 1550.692604][T23893] kmem_cache_alloc+0x4f/0x2f0 [ 1550.697198][T23893] ? vm_area_dup+0x26/0x1d0 [ 1550.701538][T23893] ? __kasan_check_read+0x11/0x20 [ 1550.706404][T23893] vm_area_dup+0x26/0x1d0 [ 1550.710566][T23893] dup_mmap+0x6b8/0xea0 [ 1550.714560][T23893] ? __delayed_free_task+0x20/0x20 [ 1550.719503][T23893] ? mm_init+0x807/0x960 [ 1550.723581][T23893] dup_mm+0x91/0x330 [ 1550.727313][T23893] copy_mm+0x108/0x1b0 [ 1550.731221][T23893] copy_process+0x1295/0x3250 [ 1550.735736][T23893] ? proc_fail_nth_write+0x213/0x290 [ 1550.740852][T23893] ? proc_fail_nth_read+0x220/0x220 [ 1550.745885][T23893] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1550.750831][T23893] ? vfs_write+0x9af/0x1050 [ 1550.755172][T23893] ? vmacache_update+0xb7/0x120 [ 1550.759857][T23893] kernel_clone+0x22d/0x990 [ 1550.764201][T23893] ? file_end_write+0x1b0/0x1b0 [ 1550.768886][T23893] ? __kasan_check_write+0x14/0x20 [ 1550.773834][T23893] ? create_io_thread+0x1e0/0x1e0 [ 1550.778694][T23893] ? __mutex_lock_slowpath+0x10/0x10 [ 1550.783816][T23893] __x64_sys_clone+0x289/0x310 [ 1550.788415][T23893] ? __do_sys_vfork+0x130/0x130 [ 1550.793102][T23893] ? debug_smp_processor_id+0x17/0x20 [ 1550.798310][T23893] do_syscall_64+0x44/0xd0 [ 1550.802562][T23893] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1550.808302][T23893] RIP: 0033:0x7f65e6eb55a9 [ 1550.812543][T23893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1550.832334][T23893] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1550.840815][T23893] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1550.848618][T23893] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1550.856440][T23893] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1550.864239][T23893] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:45 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 47) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000140)={0x0, r2}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) openat$cgroup_ro(r1, &(0x7f0000000100)='freezer.parent_freezing\x00', 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x10001ffff003) (async) r5 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x3, 0x5, 0x1, 0x40, 0x0, 0x10001, 0x480, 0xc, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x101, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x42200, 0x0, 0x8, 0x1, 0x8001, 0x0, 0x67, 0x0, 0x0, 0x0, 0x57b4}, r0, 0x2, 0xffffffffffffffff, 0x9) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0x40042409, 0x0) 11:51:45 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f00000002c0)=""/218, 0xda}], 0x4, &(0x7f0000000400)=""/22, 0x16}, 0x40010020) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x4e, 0x6, 0x9, 0x0, 0x5, 0x8e001, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp, 0x103, 0x8, 0x8, 0x5, 0x400, 0xff, 0x83, 0x0, 0x8001, 0x0, 0x6}, r0, 0x8, 0xffffffffffffffff, 0x9) 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xca00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=ANY=[@ANYBLOB="1800000001000000000000000100010018f000000300d1cb00000000000000001850000007000000000000000000000014090200010000009500000000000000"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'rlimit'}, {0x2b, 'cpuset'}, {0x2b, 'rlimit'}]}, 0x18) [ 1550.872047][T23893] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1550.879862][T23893] [ 1550.893092][T23941] FAULT_INJECTION: forcing a failure. [ 1550.893092][T23941] name failslab, interval 1, probability 0, space 0, times 0 [ 1550.912902][T23941] CPU: 0 PID: 23941 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1550.923069][T23941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1550.932958][T23941] Call Trace: [ 1550.936082][T23941] [ 1550.938856][T23941] dump_stack_lvl+0x151/0x1b7 [ 1550.943373][T23941] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1550.948663][T23941] ? do_syscall_64+0x44/0xd0 [ 1550.953094][T23941] dump_stack+0x15/0x17 [ 1550.957081][T23941] should_fail+0x3c0/0x510 [ 1550.961443][T23941] __should_failslab+0x9f/0xe0 [ 1550.966041][T23941] should_failslab+0x9/0x20 [ 1550.970381][T23941] kmem_cache_alloc+0x4f/0x2f0 [ 1550.974980][T23941] ? anon_vma_clone+0xa1/0x4f0 [ 1550.979585][T23941] anon_vma_clone+0xa1/0x4f0 [ 1550.984015][T23941] anon_vma_fork+0x91/0x4f0 [ 1550.988346][T23941] ? anon_vma_name+0x4c/0x70 [ 1550.992774][T23941] dup_mmap+0x750/0xea0 [ 1550.996764][T23941] ? __delayed_free_task+0x20/0x20 [ 1551.001712][T23941] ? mm_init+0x807/0x960 [ 1551.005797][T23941] dup_mm+0x91/0x330 [ 1551.009606][T23941] copy_mm+0x108/0x1b0 [ 1551.013509][T23941] copy_process+0x1295/0x3250 [ 1551.018025][T23941] ? proc_fail_nth_write+0x213/0x290 [ 1551.023146][T23941] ? proc_fail_nth_read+0x220/0x220 [ 1551.028181][T23941] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1551.033125][T23941] ? vfs_write+0x9af/0x1050 [ 1551.037465][T23941] ? vmacache_update+0xb7/0x120 [ 1551.042154][T23941] kernel_clone+0x22d/0x990 [ 1551.046491][T23941] ? file_end_write+0x1b0/0x1b0 [ 1551.051179][T23941] ? __kasan_check_write+0x14/0x20 [ 1551.056131][T23941] ? create_io_thread+0x1e0/0x1e0 [ 1551.060993][T23941] ? __mutex_lock_slowpath+0x10/0x10 [ 1551.066109][T23941] __x64_sys_clone+0x289/0x310 [ 1551.070710][T23941] ? __do_sys_vfork+0x130/0x130 [ 1551.075397][T23941] ? debug_smp_processor_id+0x17/0x20 [ 1551.080603][T23941] do_syscall_64+0x44/0xd0 [ 1551.084856][T23941] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1551.090584][T23941] RIP: 0033:0x7f65e6eb55a9 [ 1551.094877][T23941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1551.114281][T23941] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:45 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 48) 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=ANY=[@ANYBLOB="1800000001000000000000000100010018f000000300d1cb00000000000000001850000007000000000000000000000014090200010000009500000000000000"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'rlimit'}, {0x2b, 'cpuset'}, {0x2b, 'rlimit'}]}, 0x18) 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f00000002c0)=""/218, 0xda}], 0x4, &(0x7f0000000400)=""/22, 0x16}, 0x40010020) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x4e, 0x6, 0x9, 0x0, 0x5, 0x8e001, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp, 0x103, 0x8, 0x8, 0x5, 0x400, 0xff, 0x83, 0x0, 0x8001, 0x0, 0x6}, r0, 0x8, 0xffffffffffffffff, 0x9) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0xca, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/29, 0x1d}, {&(0x7f0000000180)=""/170, 0xaa}, {&(0x7f0000000240)=""/101, 0x65}, {&(0x7f00000002c0)=""/218, 0xda}], 0x4, &(0x7f0000000400)=""/22, 0x16}, 0x40010020) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x8, 0x4e, 0x6, 0x9, 0x0, 0x5, 0x8e001, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_bp, 0x103, 0x8, 0x8, 0x5, 0x400, 0xff, 0x83, 0x0, 0x8001, 0x0, 0x6}, r0, 0x8, 0xffffffffffffffff, 0x9) [ 1551.122524][T23941] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1551.130337][T23941] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1551.138154][T23941] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.145959][T23941] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1551.153779][T23941] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1551.161585][T23941] 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xf000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=ANY=[@ANYBLOB="1800000001000000000000000100010018f000000300d1cb00000000000000001850000007000000000000000000000014090200010000009500000000000000"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'rlimit'}, {0x2b, 'cpuset'}, {0x2b, 'rlimit'}]}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=ANY=[@ANYBLOB="1800000001000000000000000100010018f000000300d1cb00000000000000001850000007000000000000000000000014090200010000009500000000000000"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x2b, 'rlimit'}, {0x2b, 'cpuset'}, {0x2b, 'rlimit'}]}, 0x18) (async) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x80ffff, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1551.196586][T23981] FAULT_INJECTION: forcing a failure. [ 1551.196586][T23981] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.216170][T23981] CPU: 0 PID: 23981 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1551.226246][T23981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1551.236312][T23981] Call Trace: [ 1551.239438][T23981] [ 1551.242212][T23981] dump_stack_lvl+0x151/0x1b7 [ 1551.246730][T23981] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1551.252024][T23981] dump_stack+0x15/0x17 [ 1551.256015][T23981] should_fail+0x3c0/0x510 [ 1551.260266][T23981] __should_failslab+0x9f/0xe0 [ 1551.264862][T23981] should_failslab+0x9/0x20 [ 1551.269200][T23981] kmem_cache_alloc+0x4f/0x2f0 [ 1551.273799][T23981] ? vm_area_dup+0x26/0x1d0 [ 1551.278142][T23981] vm_area_dup+0x26/0x1d0 [ 1551.282308][T23981] dup_mmap+0x6b8/0xea0 [ 1551.286298][T23981] ? __delayed_free_task+0x20/0x20 [ 1551.291246][T23981] ? mm_init+0x807/0x960 [ 1551.295326][T23981] dup_mm+0x91/0x330 [ 1551.299058][T23981] copy_mm+0x108/0x1b0 [ 1551.302963][T23981] copy_process+0x1295/0x3250 [ 1551.307478][T23981] ? proc_fail_nth_write+0x213/0x290 [ 1551.312598][T23981] ? proc_fail_nth_read+0x220/0x220 [ 1551.317634][T23981] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1551.322581][T23981] ? vfs_write+0x9af/0x1050 [ 1551.326918][T23981] ? vmacache_update+0xb7/0x120 [ 1551.331606][T23981] kernel_clone+0x22d/0x990 [ 1551.335944][T23981] ? file_end_write+0x1b0/0x1b0 [ 1551.340630][T23981] ? __kasan_check_write+0x14/0x20 [ 1551.345578][T23981] ? create_io_thread+0x1e0/0x1e0 [ 1551.350439][T23981] ? __mutex_lock_slowpath+0x10/0x10 [ 1551.355562][T23981] __x64_sys_clone+0x289/0x310 [ 1551.360163][T23981] ? __do_sys_vfork+0x130/0x130 [ 1551.364849][T23981] ? debug_smp_processor_id+0x17/0x20 [ 1551.370055][T23981] do_syscall_64+0x44/0xd0 [ 1551.374307][T23981] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1551.380039][T23981] RIP: 0033:0x7f65e6eb55a9 [ 1551.384293][T23981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1551.403735][T23981] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1551.411976][T23981] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1551.420047][T23981] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1551.427859][T23981] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.435669][T23981] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:45 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 49) 11:51:45 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200)={'bond_slave_1', 0x32, 0x37}, 0xf) r5 = syz_clone(0x80000, &(0x7f0000000040)="109e60d8d3c63e9dcea7c791fb23efc95f475ac44c42c81e662698f11138010d57cb2750cd1d08c9e1f3576935e9106926711209a3e13a2db6f837611e85a657ab13653a8527c39e709bd83b18300b312eab9887a94a7bc6972dd965c15d4bf793605cf2436c536722c2d96fe479dc8218b873177dccb54768aa3571d09f100f44e13ec59306672ad382c9134672fdd06c76f77f3889640b1f2cec42695354cd7ddf482bd511399bc0e526e2991f64405b", 0xb1, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="6fb4cd45c2b1f9a14c5dfd8dd2d9cb6eea3f1dde8115021a3a7bf16485527b3ecc8252a5ac9f7d05a2477df36912f7b75b0ac934") write$cgroup_pid(r0, &(0x7f00000001c0)=r5, 0x12) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000000)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000100)=""/171, 0xab}, {&(0x7f00000001c0)=""/136, 0x88}, {&(0x7f0000000280)=""/182, 0xb6}, {&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000540)=""/49, 0x31}], 0x5, &(0x7f0000000540)}, 0x40000101) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000500)={0x3, 0x0, [0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:45 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000000)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000100)=""/171, 0xab}, {&(0x7f00000001c0)=""/136, 0x88}, {&(0x7f0000000280)=""/182, 0xb6}, {&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000540)=""/49, 0x31}], 0x5, &(0x7f0000000540)}, 0x40000101) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000500)={0x3, 0x0, [0x0, 0x0, 0x0]}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)) (async) recvmsg$unix(r1, &(0x7f0000000000)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000100)=""/171, 0xab}, {&(0x7f00000001c0)=""/136, 0x88}, {&(0x7f0000000280)=""/182, 0xb6}, {&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000540)=""/49, 0x31}], 0x5, &(0x7f0000000540)}, 0x40000101) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000500)={0x3, 0x0, [0x0, 0x0, 0x0]}) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) [ 1551.443483][T23981] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1551.451298][T23981] [ 1551.486851][T24017] FAULT_INJECTION: forcing a failure. 11:51:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x64, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1551.486851][T24017] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.505535][T24017] CPU: 0 PID: 24017 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1551.515604][T24017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1551.525498][T24017] Call Trace: [ 1551.528722][T24017] [ 1551.531489][T24017] dump_stack_lvl+0x151/0x1b7 [ 1551.536002][T24017] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1551.541299][T24017] dump_stack+0x15/0x17 [ 1551.545288][T24017] should_fail+0x3c0/0x510 [ 1551.549541][T24017] __should_failslab+0x9f/0xe0 [ 1551.554145][T24017] should_failslab+0x9/0x20 [ 1551.558480][T24017] kmem_cache_alloc+0x4f/0x2f0 [ 1551.563079][T24017] ? anon_vma_fork+0x1b9/0x4f0 [ 1551.567679][T24017] anon_vma_fork+0x1b9/0x4f0 [ 1551.572105][T24017] dup_mmap+0x750/0xea0 [ 1551.576099][T24017] ? __delayed_free_task+0x20/0x20 [ 1551.581049][T24017] ? mm_init+0x807/0x960 [ 1551.585129][T24017] dup_mm+0x91/0x330 [ 1551.588857][T24017] copy_mm+0x108/0x1b0 [ 1551.592764][T24017] copy_process+0x1295/0x3250 [ 1551.597276][T24017] ? proc_fail_nth_write+0x213/0x290 [ 1551.602397][T24017] ? proc_fail_nth_read+0x220/0x220 [ 1551.607431][T24017] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1551.612377][T24017] ? vfs_write+0x9af/0x1050 [ 1551.616719][T24017] ? vmacache_update+0xb7/0x120 [ 1551.621409][T24017] kernel_clone+0x22d/0x990 [ 1551.625748][T24017] ? file_end_write+0x1b0/0x1b0 [ 1551.630429][T24017] ? __kasan_check_write+0x14/0x20 [ 1551.635379][T24017] ? create_io_thread+0x1e0/0x1e0 [ 1551.640238][T24017] ? __mutex_lock_slowpath+0x10/0x10 [ 1551.645355][T24017] __x64_sys_clone+0x289/0x310 [ 1551.649957][T24017] ? __do_sys_vfork+0x130/0x130 [ 1551.654641][T24017] ? debug_smp_processor_id+0x17/0x20 [ 1551.659849][T24017] do_syscall_64+0x44/0xd0 [ 1551.664102][T24017] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1551.669831][T24017] RIP: 0033:0x7f65e6eb55a9 [ 1551.674084][T24017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:46 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 50) 11:51:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:46 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 32) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) (rerun: 32) recvmsg$unix(r1, &(0x7f0000000000)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000100)=""/171, 0xab}, {&(0x7f00000001c0)=""/136, 0x88}, {&(0x7f0000000280)=""/182, 0xb6}, {&(0x7f0000000340)=""/251, 0xfb}, {&(0x7f0000000540)=""/49, 0x31}], 0x5, &(0x7f0000000540)}, 0x40000101) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000500)={0x3, 0x0, [0x0, 0x0, 0x0]}) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:46 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async, rerun: 32) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (rerun: 32) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async, rerun: 64) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async, rerun: 64) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) (rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200)={'bond_slave_1', 0x32, 0x37}, 0xf) r5 = syz_clone(0x80000, &(0x7f0000000040)="109e60d8d3c63e9dcea7c791fb23efc95f475ac44c42c81e662698f11138010d57cb2750cd1d08c9e1f3576935e9106926711209a3e13a2db6f837611e85a657ab13653a8527c39e709bd83b18300b312eab9887a94a7bc6972dd965c15d4bf793605cf2436c536722c2d96fe479dc8218b873177dccb54768aa3571d09f100f44e13ec59306672ad382c9134672fdd06c76f77f3889640b1f2cec42695354cd7ddf482bd511399bc0e526e2991f64405b", 0xb1, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="6fb4cd45c2b1f9a14c5dfd8dd2d9cb6eea3f1dde8115021a3a7bf16485527b3ecc8252a5ac9f7d05a2477df36912f7b75b0ac934") write$cgroup_pid(r0, &(0x7f00000001c0)=r5, 0x12) (async, rerun: 64) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) 11:51:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1551.693529][T24017] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1551.701771][T24017] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1551.709582][T24017] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1551.717394][T24017] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1551.725203][T24017] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1551.733016][T24017] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1551.740835][T24017] 11:51:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1551.777617][T24049] FAULT_INJECTION: forcing a failure. [ 1551.777617][T24049] name failslab, interval 1, probability 0, space 0, times 0 [ 1551.858242][T24049] CPU: 1 PID: 24049 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1551.868314][T24049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1551.878209][T24049] Call Trace: [ 1551.881335][T24049] [ 1551.884109][T24049] dump_stack_lvl+0x151/0x1b7 [ 1551.888623][T24049] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1551.893917][T24049] dump_stack+0x15/0x17 [ 1551.897919][T24049] should_fail+0x3c0/0x510 [ 1551.902163][T24049] __should_failslab+0x9f/0xe0 [ 1551.907022][T24049] should_failslab+0x9/0x20 [ 1551.911363][T24049] kmem_cache_alloc+0x4f/0x2f0 [ 1551.915964][T24049] ? vm_area_dup+0x26/0x1d0 [ 1551.920304][T24049] vm_area_dup+0x26/0x1d0 [ 1551.924469][T24049] dup_mmap+0x6b8/0xea0 [ 1551.928460][T24049] ? __delayed_free_task+0x20/0x20 [ 1551.933409][T24049] ? mm_init+0x807/0x960 [ 1551.937488][T24049] dup_mm+0x91/0x330 [ 1551.941223][T24049] copy_mm+0x108/0x1b0 [ 1551.945135][T24049] copy_process+0x1295/0x3250 [ 1551.949641][T24049] ? proc_fail_nth_write+0x213/0x290 [ 1551.954763][T24049] ? proc_fail_nth_read+0x220/0x220 [ 1551.959795][T24049] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1551.964746][T24049] ? vfs_write+0x9af/0x1050 [ 1551.969086][T24049] ? vmacache_update+0xb7/0x120 [ 1551.973769][T24049] kernel_clone+0x22d/0x990 [ 1551.978107][T24049] ? file_end_write+0x1b0/0x1b0 [ 1551.982799][T24049] ? __kasan_check_write+0x14/0x20 [ 1551.987745][T24049] ? create_io_thread+0x1e0/0x1e0 [ 1551.992610][T24049] ? __mutex_lock_slowpath+0x10/0x10 [ 1551.997734][T24049] __x64_sys_clone+0x289/0x310 [ 1552.002328][T24049] ? __do_sys_vfork+0x130/0x130 [ 1552.007015][T24049] ? debug_smp_processor_id+0x17/0x20 [ 1552.012223][T24049] do_syscall_64+0x44/0xd0 [ 1552.016476][T24049] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1552.022201][T24049] RIP: 0033:0x7f65e6eb55a9 [ 1552.026457][T24049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1552.045894][T24049] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:46 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 51) 11:51:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_devices(r1, &(0x7f0000000000)={'b', ' *:* ', 'rwm\x00'}, 0xa) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1552.054137][T24049] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1552.061950][T24049] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1552.069761][T24049] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1552.077576][T24049] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1552.085382][T24049] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1552.093283][T24049] [ 1552.142967][T24100] FAULT_INJECTION: forcing a failure. [ 1552.142967][T24100] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1552.156136][T24100] CPU: 0 PID: 24100 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1552.166192][T24100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1552.176110][T24100] Call Trace: [ 1552.179208][T24100] [ 1552.181985][T24100] dump_stack_lvl+0x151/0x1b7 [ 1552.186499][T24100] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1552.191799][T24100] dump_stack+0x15/0x17 [ 1552.195897][T24100] should_fail+0x3c0/0x510 [ 1552.200149][T24100] should_fail_alloc_page+0x58/0x70 [ 1552.205182][T24100] __alloc_pages+0x1de/0x7c0 [ 1552.209607][T24100] ? __kasan_check_write+0x14/0x20 [ 1552.214569][T24100] ? __count_vm_events+0x30/0x30 [ 1552.219331][T24100] ? __this_cpu_preempt_check+0x13/0x20 [ 1552.224709][T24100] ? __mod_node_page_state+0xac/0xf0 [ 1552.229830][T24100] pte_alloc_one+0x73/0x1b0 [ 1552.234173][T24100] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1552.239206][T24100] __pte_alloc+0x86/0x350 [ 1552.243370][T24100] ? free_pgtables+0x210/0x210 [ 1552.247969][T24100] ? _raw_spin_lock+0xa3/0x1b0 [ 1552.252571][T24100] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1552.257785][T24100] ? __kernel_text_address+0x9a/0x110 [ 1552.262988][T24100] copy_pte_range+0x1b1f/0x20b0 [ 1552.267674][T24100] ? __kunmap_atomic+0x80/0x80 [ 1552.272283][T24100] ? __kasan_slab_alloc+0xc4/0xe0 [ 1552.277132][T24100] ? __kasan_slab_alloc+0xb2/0xe0 [ 1552.282253][T24100] ? kmem_cache_alloc+0x189/0x2f0 [ 1552.287113][T24100] ? vm_area_dup+0x26/0x1d0 [ 1552.291466][T24100] ? dup_mmap+0x6b8/0xea0 [ 1552.295630][T24100] ? dup_mm+0x91/0x330 [ 1552.299523][T24100] ? copy_mm+0x108/0x1b0 [ 1552.303605][T24100] ? copy_process+0x1295/0x3250 [ 1552.308290][T24100] ? kernel_clone+0x22d/0x990 [ 1552.312812][T24100] ? __x64_sys_clone+0x289/0x310 [ 1552.317580][T24100] ? do_syscall_64+0x44/0xd0 [ 1552.322004][T24100] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1552.327910][T24100] copy_page_range+0xc1e/0x1090 [ 1552.332598][T24100] ? pfn_valid+0x1e0/0x1e0 [ 1552.336848][T24100] dup_mmap+0x99f/0xea0 [ 1552.340840][T24100] ? __delayed_free_task+0x20/0x20 [ 1552.345787][T24100] ? mm_init+0x807/0x960 [ 1552.349871][T24100] dup_mm+0x91/0x330 [ 1552.353600][T24100] copy_mm+0x108/0x1b0 [ 1552.357503][T24100] copy_process+0x1295/0x3250 [ 1552.362019][T24100] ? proc_fail_nth_write+0x213/0x290 [ 1552.367138][T24100] ? proc_fail_nth_read+0x220/0x220 [ 1552.372180][T24100] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1552.377118][T24100] ? vfs_write+0x9af/0x1050 [ 1552.381460][T24100] ? vmacache_update+0xb7/0x120 [ 1552.386145][T24100] kernel_clone+0x22d/0x990 [ 1552.390486][T24100] ? file_end_write+0x1b0/0x1b0 [ 1552.395172][T24100] ? __kasan_check_write+0x14/0x20 [ 1552.400118][T24100] ? create_io_thread+0x1e0/0x1e0 [ 1552.404982][T24100] ? __mutex_lock_slowpath+0x10/0x10 [ 1552.410100][T24100] __x64_sys_clone+0x289/0x310 [ 1552.414701][T24100] ? __do_sys_vfork+0x130/0x130 [ 1552.419388][T24100] ? debug_smp_processor_id+0x17/0x20 [ 1552.424595][T24100] do_syscall_64+0x44/0xd0 [ 1552.428849][T24100] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1552.434575][T24100] RIP: 0033:0x7f65e6eb55a9 [ 1552.438831][T24100] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1552.458274][T24100] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1552.466515][T24100] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1552.474328][T24100] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1552.482137][T24100] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1552.491599][T24100] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1552.499410][T24100] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1552.507225][T24100] 11:51:47 executing program 0: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x9) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r4, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_netprio_ifpriomap(r1, &(0x7f0000000200)={'bond_slave_1', 0x32, 0x37}, 0xf) r5 = syz_clone(0x80000, &(0x7f0000000040)="109e60d8d3c63e9dcea7c791fb23efc95f475ac44c42c81e662698f11138010d57cb2750cd1d08c9e1f3576935e9106926711209a3e13a2db6f837611e85a657ab13653a8527c39e709bd83b18300b312eab9887a94a7bc6972dd965c15d4bf793605cf2436c536722c2d96fe479dc8218b873177dccb54768aa3571d09f100f44e13ec59306672ad382c9134672fdd06c76f77f3889640b1f2cec42695354cd7ddf482bd511399bc0e526e2991f64405b", 0xb1, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="6fb4cd45c2b1f9a14c5dfd8dd2d9cb6eea3f1dde8115021a3a7bf16485527b3ecc8252a5ac9f7d05a2477df36912f7b75b0ac934") write$cgroup_pid(r0, &(0x7f00000001c0)=r5, 0x12) (async) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x21000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_devices(r1, &(0x7f0000000000)={'b', ' *:* ', 'rwm\x00'}, 0xa) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 52) 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_devices(r1, &(0x7f0000000000)={'b', ' *:* ', 'rwm\x00'}, 0xa) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_devices(r1, &(0x7f0000000000)={'b', ' *:* ', 'rwm\x00'}, 0xa) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:47 executing program 0: syz_clone(0x10830000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1552.621822][T24149] FAULT_INJECTION: forcing a failure. [ 1552.621822][T24149] name fail_page_alloc, interval 1, probability 0, space 0, times 0 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/212, 0xd4}, {&(0x7f0000000300)=""/106, 0x6a}, {&(0x7f0000000140)=""/5, 0x5}, {&(0x7f0000000500)=""/127, 0x7f}, {&(0x7f0000000580)=""/101, 0x65}], 0x5, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x3) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000080)={'lo', 0x32, 0x37}, 0x5) r3 = openat$cgroup_ro(r2, &(0x7f0000000380)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xe}], &(0x7f0000000100)='GPL\x00', 0xc5, 0x3d, &(0x7f00000000c0)=""/61, 0x41100, 0x3, '\x00', 0x0, 0x1a, r2, 0x8, &(0x7f0000000180)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x1, 0x4586}, 0x10, 0x2af55, r2, 0x0, &(0x7f0000000200)=[r2, r2]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x9) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={r2, r4, 0x4, r2}, 0x10) [ 1552.709221][T24149] CPU: 0 PID: 24149 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1552.719311][T24149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1552.729197][T24149] Call Trace: [ 1552.732317][T24149] [ 1552.735101][T24149] dump_stack_lvl+0x151/0x1b7 [ 1552.739609][T24149] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1552.744904][T24149] dump_stack+0x15/0x17 [ 1552.748896][T24149] should_fail+0x3c0/0x510 [ 1552.753151][T24149] should_fail_alloc_page+0x58/0x70 [ 1552.758200][T24149] __alloc_pages+0x1de/0x7c0 [ 1552.762611][T24149] ? __count_vm_events+0x30/0x30 [ 1552.767387][T24149] ? __this_cpu_preempt_check+0x13/0x20 [ 1552.772769][T24149] ? __mod_node_page_state+0xac/0xf0 [ 1552.777887][T24149] pte_alloc_one+0x73/0x1b0 [ 1552.782224][T24149] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1552.787259][T24149] __pte_alloc+0x86/0x350 [ 1552.791427][T24149] ? free_pgtables+0x210/0x210 [ 1552.796025][T24149] ? _raw_spin_lock+0xa3/0x1b0 [ 1552.800624][T24149] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1552.805833][T24149] ? __kernel_text_address+0x9a/0x110 [ 1552.811041][T24149] copy_pte_range+0x1b1f/0x20b0 [ 1552.815729][T24149] ? __kunmap_atomic+0x80/0x80 [ 1552.820327][T24149] ? __kasan_slab_alloc+0xc4/0xe0 [ 1552.825188][T24149] ? __kasan_slab_alloc+0xb2/0xe0 [ 1552.830061][T24149] ? kmem_cache_alloc+0x189/0x2f0 [ 1552.834919][T24149] ? vm_area_dup+0x26/0x1d0 [ 1552.839250][T24149] ? dup_mmap+0x6b8/0xea0 [ 1552.843413][T24149] ? dup_mm+0x91/0x330 [ 1552.847319][T24149] ? copy_mm+0x108/0x1b0 [ 1552.851404][T24149] ? copy_process+0x1295/0x3250 [ 1552.856086][T24149] ? kernel_clone+0x22d/0x990 [ 1552.860599][T24149] ? __x64_sys_clone+0x289/0x310 [ 1552.865378][T24149] ? do_syscall_64+0x44/0xd0 [ 1552.869803][T24149] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1552.875703][T24149] copy_page_range+0xc1e/0x1090 [ 1552.880393][T24149] ? pfn_valid+0x1e0/0x1e0 [ 1552.884643][T24149] dup_mmap+0x99f/0xea0 [ 1552.888635][T24149] ? __delayed_free_task+0x20/0x20 [ 1552.893584][T24149] ? mm_init+0x807/0x960 [ 1552.897660][T24149] dup_mm+0x91/0x330 [ 1552.901393][T24149] copy_mm+0x108/0x1b0 [ 1552.905302][T24149] copy_process+0x1295/0x3250 [ 1552.909819][T24149] ? proc_fail_nth_write+0x213/0x290 [ 1552.914944][T24149] ? proc_fail_nth_read+0x220/0x220 [ 1552.919969][T24149] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1552.924921][T24149] ? vfs_write+0x9af/0x1050 [ 1552.929253][T24149] ? vmacache_update+0xb7/0x120 [ 1552.933943][T24149] kernel_clone+0x22d/0x990 [ 1552.938282][T24149] ? file_end_write+0x1b0/0x1b0 [ 1552.942967][T24149] ? __kasan_check_write+0x14/0x20 [ 1552.947915][T24149] ? create_io_thread+0x1e0/0x1e0 [ 1552.952773][T24149] ? __mutex_lock_slowpath+0x10/0x10 [ 1552.957899][T24149] __x64_sys_clone+0x289/0x310 [ 1552.962504][T24149] ? __do_sys_vfork+0x130/0x130 [ 1552.967183][T24149] ? debug_smp_processor_id+0x17/0x20 [ 1552.972392][T24149] do_syscall_64+0x44/0xd0 [ 1552.976648][T24149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1552.982372][T24149] RIP: 0033:0x7f65e6eb55a9 [ 1552.986625][T24149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:47 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 53) 11:51:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 0: syz_clone(0x10830000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x10830000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 11:51:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) recvmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/212, 0xd4}, {&(0x7f0000000300)=""/106, 0x6a}, {&(0x7f0000000140)=""/5, 0x5}, {&(0x7f0000000500)=""/127, 0x7f}, {&(0x7f0000000580)=""/101, 0x65}], 0x5, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x3) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000080)={'lo', 0x32, 0x37}, 0x5) (async) r3 = openat$cgroup_ro(r2, &(0x7f0000000380)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xe}], &(0x7f0000000100)='GPL\x00', 0xc5, 0x3d, &(0x7f00000000c0)=""/61, 0x41100, 0x3, '\x00', 0x0, 0x1a, r2, 0x8, &(0x7f0000000180)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x1, 0x4586}, 0x10, 0x2af55, r2, 0x0, &(0x7f0000000200)=[r2, r2]}, 0x80) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x9) (async) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={r2, r4, 0x4, r2}, 0x10) 11:51:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:47 executing program 0: syz_clone(0x10830000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x10830000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) [ 1553.006066][T24149] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1553.014311][T24149] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1553.022123][T24149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1553.029933][T24149] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1553.037745][T24149] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1553.045555][T24149] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1553.053464][T24149] 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xf000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000400)=""/212, 0xd4}, {&(0x7f0000000300)=""/106, 0x6a}, {&(0x7f0000000140)=""/5, 0x5}, {&(0x7f0000000500)=""/127, 0x7f}, {&(0x7f0000000580)=""/101, 0x65}], 0x5, &(0x7f0000000680)=[@cred={{0x1c}}], 0x20}, 0x3) write$cgroup_netprio_ifpriomap(r2, &(0x7f0000000080)={'lo', 0x32, 0x37}, 0x5) (async) r3 = openat$cgroup_ro(r2, &(0x7f0000000380)='blkio.bfq.sectors_recursive\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x7) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_tracing={0x1a, 0xe, &(0x7f0000000700)=@raw=[@map_idx={0x18, 0x0, 0x5, 0x0, 0x8}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x6}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xe}], &(0x7f0000000100)='GPL\x00', 0xc5, 0x3d, &(0x7f00000000c0)=""/61, 0x41100, 0x3, '\x00', 0x0, 0x1a, r2, 0x8, &(0x7f0000000180)={0x7, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x2, 0x1, 0x4586}, 0x10, 0x2af55, r2, 0x0, &(0x7f0000000200)=[r2, r2]}, 0x80) (async) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x9) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000002c0)={r2, r4, 0x4, r2}, 0x10) [ 1553.096748][T24203] FAULT_INJECTION: forcing a failure. [ 1553.096748][T24203] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1553.115418][T24203] CPU: 1 PID: 24203 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1553.125492][T24203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1553.135390][T24203] Call Trace: [ 1553.138510][T24203] [ 1553.141287][T24203] dump_stack_lvl+0x151/0x1b7 [ 1553.145818][T24203] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1553.151093][T24203] dump_stack+0x15/0x17 [ 1553.155082][T24203] should_fail+0x3c0/0x510 [ 1553.159339][T24203] should_fail_alloc_page+0x58/0x70 [ 1553.164371][T24203] __alloc_pages+0x1de/0x7c0 [ 1553.168798][T24203] ? __count_vm_events+0x30/0x30 [ 1553.173568][T24203] ? __this_cpu_preempt_check+0x13/0x20 [ 1553.178950][T24203] ? __mod_node_page_state+0xac/0xf0 [ 1553.184072][T24203] pte_alloc_one+0x73/0x1b0 [ 1553.188410][T24203] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1553.193444][T24203] __pte_alloc+0x86/0x350 [ 1553.197611][T24203] ? free_pgtables+0x210/0x210 [ 1553.202211][T24203] ? _raw_spin_lock+0xa3/0x1b0 [ 1553.206809][T24203] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1553.212020][T24203] ? __kernel_text_address+0x9a/0x110 [ 1553.217227][T24203] copy_pte_range+0x1b1f/0x20b0 [ 1553.221915][T24203] ? __kunmap_atomic+0x80/0x80 [ 1553.226512][T24203] ? __kasan_slab_alloc+0xc4/0xe0 [ 1553.231376][T24203] ? __kasan_slab_alloc+0xb2/0xe0 [ 1553.236235][T24203] ? kmem_cache_alloc+0x189/0x2f0 [ 1553.241094][T24203] ? vm_area_dup+0x26/0x1d0 [ 1553.245436][T24203] ? dup_mmap+0x6b8/0xea0 [ 1553.249601][T24203] ? dup_mm+0x91/0x330 [ 1553.253506][T24203] ? copy_mm+0x108/0x1b0 [ 1553.257585][T24203] ? copy_process+0x1295/0x3250 [ 1553.262273][T24203] ? kernel_clone+0x22d/0x990 [ 1553.266787][T24203] ? __x64_sys_clone+0x289/0x310 [ 1553.271557][T24203] ? do_syscall_64+0x44/0xd0 [ 1553.275984][T24203] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1553.281892][T24203] copy_page_range+0xc1e/0x1090 [ 1553.286576][T24203] ? pfn_valid+0x1e0/0x1e0 [ 1553.290829][T24203] dup_mmap+0x99f/0xea0 [ 1553.294819][T24203] ? __delayed_free_task+0x20/0x20 [ 1553.299768][T24203] ? mm_init+0x807/0x960 [ 1553.303847][T24203] dup_mm+0x91/0x330 [ 1553.307579][T24203] copy_mm+0x108/0x1b0 [ 1553.311484][T24203] copy_process+0x1295/0x3250 [ 1553.315997][T24203] ? proc_fail_nth_write+0x213/0x290 [ 1553.321118][T24203] ? proc_fail_nth_read+0x220/0x220 [ 1553.326152][T24203] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1553.331102][T24203] ? vfs_write+0x9af/0x1050 [ 1553.335440][T24203] ? vmacache_update+0xb7/0x120 [ 1553.340125][T24203] kernel_clone+0x22d/0x990 [ 1553.344465][T24203] ? file_end_write+0x1b0/0x1b0 [ 1553.349152][T24203] ? __kasan_check_write+0x14/0x20 [ 1553.354100][T24203] ? create_io_thread+0x1e0/0x1e0 [ 1553.358964][T24203] ? __mutex_lock_slowpath+0x10/0x10 [ 1553.364083][T24203] __x64_sys_clone+0x289/0x310 [ 1553.368683][T24203] ? __do_sys_vfork+0x130/0x130 [ 1553.373370][T24203] ? debug_smp_processor_id+0x17/0x20 [ 1553.378578][T24203] do_syscall_64+0x44/0xd0 [ 1553.382829][T24203] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1553.388558][T24203] RIP: 0033:0x7f65e6eb55a9 [ 1553.392811][T24203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1553.412254][T24203] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1553.420495][T24203] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1553.428308][T24203] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1553.436119][T24203] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 11:51:47 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 54) 11:51:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 0: syz_clone(0x9b828b80, 0x0, 0xfffffffffffffc4e, 0x0, 0x0, 0x0) syz_clone(0x800, &(0x7f0000000000)="e5adb1b31ac151be6f8dc7854bbf2000becfbb41554c84b372f48b373ec1c4f0042818723ab90164f8598db8dbc9b922885361de783913f4fed49ff8fa2c8322529d8d7e365933aff580", 0x4a, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="f5c493cc3f0146c55a0000a0085fc583d7271cfbffffffffffffffb23c6a07000000fff70c160e0295893d2a") 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="30725ccea3066546605704472809b5a6925340d41b49fd83d2f5b3ffcac5058669b3a871b2a7f687adfe5374b5901af4dbaaac813a2a1c38b8c5ece7c321495d4d9bfed5c20fba", 0x47}, {&(0x7f0000000100)="6b1741687c1de4f363dfcf23f9f59a05310218c671c58655d9cc844a33111b30aa9a0462582b0caf145578b9a53c4d5d3d09a693fbbb318ec2560c527c7c0d0e3b8b0718bc7ba1f0e6de1d6bc8a60625c974ab6c0623dd8bf7d6bc84b87629a87026bcdd6a5a3960163dec7ebd4ac722862af2e0b60b562d7be2fd7b7b7dbfafa4cacfa35c60f02e651c9ff6b5b6a5d7a7ec77c5f756413cee5655f9e9f7a2e5cd03fa4801919c7097c2ce6192b6d3c37a009ec59e5f935c66b6b833d9cc3c0c479a4996f0ed52285c028700973be461e72090b557bcff7ec28d407846c81085050955", 0xe3}, {}, {&(0x7f0000000200)="4f9917bca6e959375651ccbaa0cbc81270d1df6be312a827b38443990fb27c19800487f8296d", 0x26}], 0x4, &(0x7f0000000280)=[{0xa8, 0x29, 0x40, "ca0d1c0c97e758f503fd6519d6c3a6a2a61f1e7966986d421e641e01798d32ce58ca5d5df77c8ce3182c858a436fa0f1454ce3029168eb15660f4c9f0f78567d97b73ba660671ab42089b684e344b128fec6944edd58fd23588265bd0df9c434f69e8a73942a1a2f7804cdc809a41e1e763caf8965694f05aaf25609cc14aa15183b0cedc453290c30ef2e991c082bc870"}, {0x58, 0x102, 0x56e4, "88c7b7ebc0f114c1a5dd0025becaf1b136f320768b4c2206df1b8eabd4596370d60f1c06b013d5337d34c83bc7ac0ef151124b7693acff5dd6cff18f7437f04b46769da5"}, {0xb8, 0x101, 0xa58, "0043f386e91f8bca810e4bbd866acd5980711ba084ba3c5b537ff2b910ace6ea877d0de7d19c6dc1a8ab6e18c1cd4b54a0f994d30a818c49edcae6592b95c5ea9345b2217e40d9da7e16024899fdb89fd5b063256b0d86cf08c9ef1cc2086ef083c8b9536dd22da009fa553bcf1656cc59a86099b135840ad26cd7dd76b335119134a831068fe54bbd3a5bd91b85212b2cb1c7b6a121e5f1f691d1747595bab03ae2"}, {0xe8, 0x111, 0x0, "7e5571e087d2a3f8132bdeacb771fb15580caa4ee1dea1a81f17d358e3223a466f70e598eb462fa883f70d80ab4bca0e1a16adb7087e750a2b74ba221e91c196059336df4f71dbae91fa4666b35ed5c9a71f09f19d43002e082a75bc2e238ee489d8af47dd3d1dda0dddf2dd10d2bd1ea5b2ba6891ab55dc773bda150c33325774f76f8c8762c5ff0c74eccffb08307e7435add750e6a0c4215812ff3ab7389678d893bbf83664184f8c56979706cf922625734c2b68ba350dc5eea7919e7eda9a38fe9fd5503ac6c7309d6e142bff76b8fcec7722"}, {0x80, 0x103, 0x8, "a9828edcef919fad9272fe7743c49e48bb77667710b4581f8d374b004230e0eccb1251677589111f747f97904faca92ecffd7d1b062e652ba01b6cad4369c56abf494eab35c27608bbd7971ba021ecc65864e6ad942150b07fae2dea648a785f75243252baa4cdd19e175c"}, {0x60, 0x10d, 0x1, "a5dc2acd2c2674cae30b6b1a526fd7f5b28f58c2d4e52b9a7bf9153f1a7df926d3296023b9286c9eb16a352ef4b4cec118a580885aac0316ddb94124a88742e620336122d6db667c4332f87b"}, {0x88, 0x10f, 0x1000, "d07c5a4574d439791b8741e256f0e3d09aa2541e709deba7968eecaf23f7906144e161a24a65c521b50b87a6eda88770db0c86d6f94bca59f5804b2c47be68656d554999e6319315d38e1010df876df115798b5e9c005b4c17db351f66a55d4015f05ff3e95bbc951a21c9f6e34d148892e58a7cbf849c"}], 0x408}, 0x480c4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) sendmsg$tipc(r3, &(0x7f0000000980)={&(0x7f0000000880)=@name={0x1e, 0x2, 0x1, {{0x0, 0x3}, 0x4}}, 0x10, &(0x7f00000008c0), 0x0, &(0x7f0000000900)="23a9988c0d4ca88aa23b4e8d029ebabe2938fcbb872161a025bc78941704819ea032c24e33e9a8086f448a0d5a30403d72fdc867ebdd0ffe98da053548996187126fca563ba44a7b00bf1b9a70af9778970847979dc18f2d335a487bbab72745305a4705", 0x64}, 0x0) sendmsg$inet(r2, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) sendmsg$tipc(r2, &(0x7f0000000840)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x6, {0x41, 0x4}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000700)="edf4f67d1db65b015df3d07a69b8c0dfa780549a82aea57e2b2819e6cb6745adfd08a809804f96beb6f9169837e85edd7ed94d79a4d9cb090a1ce3acbebbc4767759ecd0ed496c17bc8adf6d334be98b2165acb9d35bf9398bc651a4e1e9867451546ecaa44209f5ae25fe6df05755e0ac02cffd8a8ed110f196d644171010f6b15418968f4104ea5a1196b7019d0413a709b9c0654b0b9ae9656c9e800ae52612b6ff57d813b6bafdb4c70623c34b8a6c47f90ee2b65979c6d9a34209192aa2896c45a5fcbadda1c3abbe261986aa9e8834dcc235a0931f43c0b5eafc7eb60a095f90592fb85b6060a9f996643404678d6e56ef", 0xf4}], 0x1, 0x0, 0x0, 0x1}, 0x20008004) 11:51:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 0: syz_clone(0x9b828b80, 0x0, 0xfffffffffffffc4e, 0x0, 0x0, 0x0) syz_clone(0x800, &(0x7f0000000000)="e5adb1b31ac151be6f8dc7854bbf2000becfbb41554c84b372f48b373ec1c4f0042818723ab90164f8598db8dbc9b922885361de783913f4fed49ff8fa2c8322529d8d7e365933aff580", 0x4a, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="f5c493cc3f0146c55a0000a0085fc583d7271cfbffffffffffffffb23c6a07000000fff70c160e0295893d2a") syz_clone(0x9b828b80, 0x0, 0xfffffffffffffc4e, 0x0, 0x0, 0x0) (async) syz_clone(0x800, &(0x7f0000000000)="e5adb1b31ac151be6f8dc7854bbf2000becfbb41554c84b372f48b373ec1c4f0042818723ab90164f8598db8dbc9b922885361de783913f4fed49ff8fa2c8322529d8d7e365933aff580", 0x4a, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="f5c493cc3f0146c55a0000a0085fc583d7271cfbffffffffffffffb23c6a07000000fff70c160e0295893d2a") (async) 11:51:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1553.443931][T24203] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1553.451742][T24203] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1553.459557][T24203] [ 1553.482562][T24223] FAULT_INJECTION: forcing a failure. [ 1553.482562][T24223] name failslab, interval 1, probability 0, space 0, times 0 11:51:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:47 executing program 0: syz_clone(0x9b828b80, 0x0, 0xfffffffffffffc4e, 0x0, 0x0, 0x0) (async) syz_clone(0x800, &(0x7f0000000000)="e5adb1b31ac151be6f8dc7854bbf2000becfbb41554c84b372f48b373ec1c4f0042818723ab90164f8598db8dbc9b922885361de783913f4fed49ff8fa2c8322529d8d7e365933aff580", 0x4a, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)="f5c493cc3f0146c55a0000a0085fc583d7271cfbffffffffffffffb23c6a07000000fff70c160e0295893d2a") 11:51:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1553.495446][T24223] CPU: 1 PID: 24223 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1553.505515][T24223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1553.515412][T24223] Call Trace: [ 1553.518535][T24223] [ 1553.521314][T24223] dump_stack_lvl+0x151/0x1b7 [ 1553.525825][T24223] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1553.531120][T24223] dump_stack+0x15/0x17 [ 1553.535109][T24223] should_fail+0x3c0/0x510 [ 1553.539367][T24223] __should_failslab+0x9f/0xe0 [ 1553.543966][T24223] should_failslab+0x9/0x20 [ 1553.548303][T24223] kmem_cache_alloc+0x4f/0x2f0 [ 1553.552903][T24223] ? vm_area_dup+0x26/0x1d0 [ 1553.557245][T24223] vm_area_dup+0x26/0x1d0 [ 1553.561411][T24223] dup_mmap+0x6b8/0xea0 [ 1553.565403][T24223] ? __delayed_free_task+0x20/0x20 [ 1553.570364][T24223] ? mm_init+0x807/0x960 [ 1553.574427][T24223] dup_mm+0x91/0x330 [ 1553.578157][T24223] copy_mm+0x108/0x1b0 [ 1553.582068][T24223] copy_process+0x1295/0x3250 [ 1553.586583][T24223] ? proc_fail_nth_write+0x213/0x290 [ 1553.591703][T24223] ? proc_fail_nth_read+0x220/0x220 [ 1553.596730][T24223] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1553.601677][T24223] ? vfs_write+0x9af/0x1050 [ 1553.606017][T24223] ? vmacache_update+0xb7/0x120 [ 1553.610703][T24223] kernel_clone+0x22d/0x990 [ 1553.615042][T24223] ? file_end_write+0x1b0/0x1b0 [ 1553.619731][T24223] ? __kasan_check_write+0x14/0x20 [ 1553.624685][T24223] ? create_io_thread+0x1e0/0x1e0 [ 1553.629537][T24223] ? __mutex_lock_slowpath+0x10/0x10 [ 1553.634659][T24223] __x64_sys_clone+0x289/0x310 [ 1553.639258][T24223] ? __do_sys_vfork+0x130/0x130 [ 1553.643948][T24223] ? debug_smp_processor_id+0x17/0x20 [ 1553.649152][T24223] do_syscall_64+0x44/0xd0 [ 1553.653407][T24223] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1553.659132][T24223] RIP: 0033:0x7f65e6eb55a9 [ 1553.663387][T24223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1553.683176][T24223] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1553.691418][T24223] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:48 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 55) 11:51:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rtc_alarm_irq_enable\x00'}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, r2, 0x0, 0x15, &(0x7f0000000140)='rtc_alarm_irq_enable\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x6, 0x6, 0x0, 0x0, 0x9, 0x8637653d3490b757, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x19068, 0x3, 0x3, 0x0, 0x6f02, 0x771, 0x6e, 0x0, 0x8, 0x0, 0x37cf}, 0x0, 0xf, r1, 0x0) 11:51:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="30725ccea3066546605704472809b5a6925340d41b49fd83d2f5b3ffcac5058669b3a871b2a7f687adfe5374b5901af4dbaaac813a2a1c38b8c5ece7c321495d4d9bfed5c20fba", 0x47}, {&(0x7f0000000100)="6b1741687c1de4f363dfcf23f9f59a05310218c671c58655d9cc844a33111b30aa9a0462582b0caf145578b9a53c4d5d3d09a693fbbb318ec2560c527c7c0d0e3b8b0718bc7ba1f0e6de1d6bc8a60625c974ab6c0623dd8bf7d6bc84b87629a87026bcdd6a5a3960163dec7ebd4ac722862af2e0b60b562d7be2fd7b7b7dbfafa4cacfa35c60f02e651c9ff6b5b6a5d7a7ec77c5f756413cee5655f9e9f7a2e5cd03fa4801919c7097c2ce6192b6d3c37a009ec59e5f935c66b6b833d9cc3c0c479a4996f0ed52285c028700973be461e72090b557bcff7ec28d407846c81085050955", 0xe3}, {}, {&(0x7f0000000200)="4f9917bca6e959375651ccbaa0cbc81270d1df6be312a827b38443990fb27c19800487f8296d", 0x26}], 0x4, &(0x7f0000000280)=[{0xa8, 0x29, 0x40, "ca0d1c0c97e758f503fd6519d6c3a6a2a61f1e7966986d421e641e01798d32ce58ca5d5df77c8ce3182c858a436fa0f1454ce3029168eb15660f4c9f0f78567d97b73ba660671ab42089b684e344b128fec6944edd58fd23588265bd0df9c434f69e8a73942a1a2f7804cdc809a41e1e763caf8965694f05aaf25609cc14aa15183b0cedc453290c30ef2e991c082bc870"}, {0x58, 0x102, 0x56e4, "88c7b7ebc0f114c1a5dd0025becaf1b136f320768b4c2206df1b8eabd4596370d60f1c06b013d5337d34c83bc7ac0ef151124b7693acff5dd6cff18f7437f04b46769da5"}, {0xb8, 0x101, 0xa58, "0043f386e91f8bca810e4bbd866acd5980711ba084ba3c5b537ff2b910ace6ea877d0de7d19c6dc1a8ab6e18c1cd4b54a0f994d30a818c49edcae6592b95c5ea9345b2217e40d9da7e16024899fdb89fd5b063256b0d86cf08c9ef1cc2086ef083c8b9536dd22da009fa553bcf1656cc59a86099b135840ad26cd7dd76b335119134a831068fe54bbd3a5bd91b85212b2cb1c7b6a121e5f1f691d1747595bab03ae2"}, {0xe8, 0x111, 0x0, "7e5571e087d2a3f8132bdeacb771fb15580caa4ee1dea1a81f17d358e3223a466f70e598eb462fa883f70d80ab4bca0e1a16adb7087e750a2b74ba221e91c196059336df4f71dbae91fa4666b35ed5c9a71f09f19d43002e082a75bc2e238ee489d8af47dd3d1dda0dddf2dd10d2bd1ea5b2ba6891ab55dc773bda150c33325774f76f8c8762c5ff0c74eccffb08307e7435add750e6a0c4215812ff3ab7389678d893bbf83664184f8c56979706cf922625734c2b68ba350dc5eea7919e7eda9a38fe9fd5503ac6c7309d6e142bff76b8fcec7722"}, {0x80, 0x103, 0x8, "a9828edcef919fad9272fe7743c49e48bb77667710b4581f8d374b004230e0eccb1251677589111f747f97904faca92ecffd7d1b062e652ba01b6cad4369c56abf494eab35c27608bbd7971ba021ecc65864e6ad942150b07fae2dea648a785f75243252baa4cdd19e175c"}, {0x60, 0x10d, 0x1, "a5dc2acd2c2674cae30b6b1a526fd7f5b28f58c2d4e52b9a7bf9153f1a7df926d3296023b9286c9eb16a352ef4b4cec118a580885aac0316ddb94124a88742e620336122d6db667c4332f87b"}, {0x88, 0x10f, 0x1000, "d07c5a4574d439791b8741e256f0e3d09aa2541e709deba7968eecaf23f7906144e161a24a65c521b50b87a6eda88770db0c86d6f94bca59f5804b2c47be68656d554999e6319315d38e1010df876df115798b5e9c005b4c17db351f66a55d4015f05ff3e95bbc951a21c9f6e34d148892e58a7cbf849c"}], 0x408}, 0x480c4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) sendmsg$tipc(r3, &(0x7f0000000980)={&(0x7f0000000880)=@name={0x1e, 0x2, 0x1, {{0x0, 0x3}, 0x4}}, 0x10, &(0x7f00000008c0), 0x0, &(0x7f0000000900)="23a9988c0d4ca88aa23b4e8d029ebabe2938fcbb872161a025bc78941704819ea032c24e33e9a8086f448a0d5a30403d72fdc867ebdd0ffe98da053548996187126fca563ba44a7b00bf1b9a70af9778970847979dc18f2d335a487bbab72745305a4705", 0x64}, 0x0) sendmsg$inet(r2, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) sendmsg$tipc(r2, &(0x7f0000000840)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x6, {0x41, 0x4}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000700)="edf4f67d1db65b015df3d07a69b8c0dfa780549a82aea57e2b2819e6cb6745adfd08a809804f96beb6f9169837e85edd7ed94d79a4d9cb090a1ce3acbebbc4767759ecd0ed496c17bc8adf6d334be98b2165acb9d35bf9398bc651a4e1e9867451546ecaa44209f5ae25fe6df05755e0ac02cffd8a8ed110f196d644171010f6b15418968f4104ea5a1196b7019d0413a709b9c0654b0b9ae9656c9e800ae52612b6ff57d813b6bafdb4c70623c34b8a6c47f90ee2b65979c6d9a34209192aa2896c45a5fcbadda1c3abbe261986aa9e8834dcc235a0931f43c0b5eafc7eb60a095f90592fb85b6060a9f996643404678d6e56ef", 0xf4}], 0x1, 0x0, 0x0, 0x1}, 0x20008004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)) (async) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="30725ccea3066546605704472809b5a6925340d41b49fd83d2f5b3ffcac5058669b3a871b2a7f687adfe5374b5901af4dbaaac813a2a1c38b8c5ece7c321495d4d9bfed5c20fba", 0x47}, {&(0x7f0000000100)="6b1741687c1de4f363dfcf23f9f59a05310218c671c58655d9cc844a33111b30aa9a0462582b0caf145578b9a53c4d5d3d09a693fbbb318ec2560c527c7c0d0e3b8b0718bc7ba1f0e6de1d6bc8a60625c974ab6c0623dd8bf7d6bc84b87629a87026bcdd6a5a3960163dec7ebd4ac722862af2e0b60b562d7be2fd7b7b7dbfafa4cacfa35c60f02e651c9ff6b5b6a5d7a7ec77c5f756413cee5655f9e9f7a2e5cd03fa4801919c7097c2ce6192b6d3c37a009ec59e5f935c66b6b833d9cc3c0c479a4996f0ed52285c028700973be461e72090b557bcff7ec28d407846c81085050955", 0xe3}, {}, {&(0x7f0000000200)="4f9917bca6e959375651ccbaa0cbc81270d1df6be312a827b38443990fb27c19800487f8296d", 0x26}], 0x4, &(0x7f0000000280)=[{0xa8, 0x29, 0x40, "ca0d1c0c97e758f503fd6519d6c3a6a2a61f1e7966986d421e641e01798d32ce58ca5d5df77c8ce3182c858a436fa0f1454ce3029168eb15660f4c9f0f78567d97b73ba660671ab42089b684e344b128fec6944edd58fd23588265bd0df9c434f69e8a73942a1a2f7804cdc809a41e1e763caf8965694f05aaf25609cc14aa15183b0cedc453290c30ef2e991c082bc870"}, {0x58, 0x102, 0x56e4, "88c7b7ebc0f114c1a5dd0025becaf1b136f320768b4c2206df1b8eabd4596370d60f1c06b013d5337d34c83bc7ac0ef151124b7693acff5dd6cff18f7437f04b46769da5"}, {0xb8, 0x101, 0xa58, "0043f386e91f8bca810e4bbd866acd5980711ba084ba3c5b537ff2b910ace6ea877d0de7d19c6dc1a8ab6e18c1cd4b54a0f994d30a818c49edcae6592b95c5ea9345b2217e40d9da7e16024899fdb89fd5b063256b0d86cf08c9ef1cc2086ef083c8b9536dd22da009fa553bcf1656cc59a86099b135840ad26cd7dd76b335119134a831068fe54bbd3a5bd91b85212b2cb1c7b6a121e5f1f691d1747595bab03ae2"}, {0xe8, 0x111, 0x0, "7e5571e087d2a3f8132bdeacb771fb15580caa4ee1dea1a81f17d358e3223a466f70e598eb462fa883f70d80ab4bca0e1a16adb7087e750a2b74ba221e91c196059336df4f71dbae91fa4666b35ed5c9a71f09f19d43002e082a75bc2e238ee489d8af47dd3d1dda0dddf2dd10d2bd1ea5b2ba6891ab55dc773bda150c33325774f76f8c8762c5ff0c74eccffb08307e7435add750e6a0c4215812ff3ab7389678d893bbf83664184f8c56979706cf922625734c2b68ba350dc5eea7919e7eda9a38fe9fd5503ac6c7309d6e142bff76b8fcec7722"}, {0x80, 0x103, 0x8, "a9828edcef919fad9272fe7743c49e48bb77667710b4581f8d374b004230e0eccb1251677589111f747f97904faca92ecffd7d1b062e652ba01b6cad4369c56abf494eab35c27608bbd7971ba021ecc65864e6ad942150b07fae2dea648a785f75243252baa4cdd19e175c"}, {0x60, 0x10d, 0x1, "a5dc2acd2c2674cae30b6b1a526fd7f5b28f58c2d4e52b9a7bf9153f1a7df926d3296023b9286c9eb16a352ef4b4cec118a580885aac0316ddb94124a88742e620336122d6db667c4332f87b"}, {0x88, 0x10f, 0x1000, "d07c5a4574d439791b8741e256f0e3d09aa2541e709deba7968eecaf23f7906144e161a24a65c521b50b87a6eda88770db0c86d6f94bca59f5804b2c47be68656d554999e6319315d38e1010df876df115798b5e9c005b4c17db351f66a55d4015f05ff3e95bbc951a21c9f6e34d148892e58a7cbf849c"}], 0x408}, 0x480c4) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)) (async) sendmsg$inet(r3, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) sendmsg$tipc(r3, &(0x7f0000000980)={&(0x7f0000000880)=@name={0x1e, 0x2, 0x1, {{0x0, 0x3}, 0x4}}, 0x10, &(0x7f00000008c0), 0x0, &(0x7f0000000900)="23a9988c0d4ca88aa23b4e8d029ebabe2938fcbb872161a025bc78941704819ea032c24e33e9a8086f448a0d5a30403d72fdc867ebdd0ffe98da053548996187126fca563ba44a7b00bf1b9a70af9778970847979dc18f2d335a487bbab72745305a4705", 0x64}, 0x0) (async) sendmsg$inet(r2, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) sendmsg$tipc(r2, &(0x7f0000000840)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x6, {0x41, 0x4}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000700)="edf4f67d1db65b015df3d07a69b8c0dfa780549a82aea57e2b2819e6cb6745adfd08a809804f96beb6f9169837e85edd7ed94d79a4d9cb090a1ce3acbebbc4767759ecd0ed496c17bc8adf6d334be98b2165acb9d35bf9398bc651a4e1e9867451546ecaa44209f5ae25fe6df05755e0ac02cffd8a8ed110f196d644171010f6b15418968f4104ea5a1196b7019d0413a709b9c0654b0b9ae9656c9e800ae52612b6ff57d813b6bafdb4c70623c34b8a6c47f90ee2b65979c6d9a34209192aa2896c45a5fcbadda1c3abbe261986aa9e8834dcc235a0931f43c0b5eafc7eb60a095f90592fb85b6060a9f996643404678d6e56ef", 0xf4}], 0x1, 0x0, 0x0, 0x1}, 0x20008004) (async) 11:51:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1553.699259][T24223] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1553.707160][T24223] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1553.714941][T24223] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1553.722751][T24223] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1553.730581][T24223] 11:51:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) sendmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="30725ccea3066546605704472809b5a6925340d41b49fd83d2f5b3ffcac5058669b3a871b2a7f687adfe5374b5901af4dbaaac813a2a1c38b8c5ece7c321495d4d9bfed5c20fba", 0x47}, {&(0x7f0000000100)="6b1741687c1de4f363dfcf23f9f59a05310218c671c58655d9cc844a33111b30aa9a0462582b0caf145578b9a53c4d5d3d09a693fbbb318ec2560c527c7c0d0e3b8b0718bc7ba1f0e6de1d6bc8a60625c974ab6c0623dd8bf7d6bc84b87629a87026bcdd6a5a3960163dec7ebd4ac722862af2e0b60b562d7be2fd7b7b7dbfafa4cacfa35c60f02e651c9ff6b5b6a5d7a7ec77c5f756413cee5655f9e9f7a2e5cd03fa4801919c7097c2ce6192b6d3c37a009ec59e5f935c66b6b833d9cc3c0c479a4996f0ed52285c028700973be461e72090b557bcff7ec28d407846c81085050955", 0xe3}, {}, {&(0x7f0000000200)="4f9917bca6e959375651ccbaa0cbc81270d1df6be312a827b38443990fb27c19800487f8296d", 0x26}], 0x4, &(0x7f0000000280)=[{0xa8, 0x29, 0x40, "ca0d1c0c97e758f503fd6519d6c3a6a2a61f1e7966986d421e641e01798d32ce58ca5d5df77c8ce3182c858a436fa0f1454ce3029168eb15660f4c9f0f78567d97b73ba660671ab42089b684e344b128fec6944edd58fd23588265bd0df9c434f69e8a73942a1a2f7804cdc809a41e1e763caf8965694f05aaf25609cc14aa15183b0cedc453290c30ef2e991c082bc870"}, {0x58, 0x102, 0x56e4, "88c7b7ebc0f114c1a5dd0025becaf1b136f320768b4c2206df1b8eabd4596370d60f1c06b013d5337d34c83bc7ac0ef151124b7693acff5dd6cff18f7437f04b46769da5"}, {0xb8, 0x101, 0xa58, "0043f386e91f8bca810e4bbd866acd5980711ba084ba3c5b537ff2b910ace6ea877d0de7d19c6dc1a8ab6e18c1cd4b54a0f994d30a818c49edcae6592b95c5ea9345b2217e40d9da7e16024899fdb89fd5b063256b0d86cf08c9ef1cc2086ef083c8b9536dd22da009fa553bcf1656cc59a86099b135840ad26cd7dd76b335119134a831068fe54bbd3a5bd91b85212b2cb1c7b6a121e5f1f691d1747595bab03ae2"}, {0xe8, 0x111, 0x0, "7e5571e087d2a3f8132bdeacb771fb15580caa4ee1dea1a81f17d358e3223a466f70e598eb462fa883f70d80ab4bca0e1a16adb7087e750a2b74ba221e91c196059336df4f71dbae91fa4666b35ed5c9a71f09f19d43002e082a75bc2e238ee489d8af47dd3d1dda0dddf2dd10d2bd1ea5b2ba6891ab55dc773bda150c33325774f76f8c8762c5ff0c74eccffb08307e7435add750e6a0c4215812ff3ab7389678d893bbf83664184f8c56979706cf922625734c2b68ba350dc5eea7919e7eda9a38fe9fd5503ac6c7309d6e142bff76b8fcec7722"}, {0x80, 0x103, 0x8, "a9828edcef919fad9272fe7743c49e48bb77667710b4581f8d374b004230e0eccb1251677589111f747f97904faca92ecffd7d1b062e652ba01b6cad4369c56abf494eab35c27608bbd7971ba021ecc65864e6ad942150b07fae2dea648a785f75243252baa4cdd19e175c"}, {0x60, 0x10d, 0x1, "a5dc2acd2c2674cae30b6b1a526fd7f5b28f58c2d4e52b9a7bf9153f1a7df926d3296023b9286c9eb16a352ef4b4cec118a580885aac0316ddb94124a88742e620336122d6db667c4332f87b"}, {0x88, 0x10f, 0x1000, "d07c5a4574d439791b8741e256f0e3d09aa2541e709deba7968eecaf23f7906144e161a24a65c521b50b87a6eda88770db0c86d6f94bca59f5804b2c47be68656d554999e6319315d38e1010df876df115798b5e9c005b4c17db351f66a55d4015f05ff3e95bbc951a21c9f6e34d148892e58a7cbf849c"}], 0x408}, 0x480c4) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) (async) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) sendmsg$tipc(r3, &(0x7f0000000980)={&(0x7f0000000880)=@name={0x1e, 0x2, 0x1, {{0x0, 0x3}, 0x4}}, 0x10, &(0x7f00000008c0), 0x0, &(0x7f0000000900)="23a9988c0d4ca88aa23b4e8d029ebabe2938fcbb872161a025bc78941704819ea032c24e33e9a8086f448a0d5a30403d72fdc867ebdd0ffe98da053548996187126fca563ba44a7b00bf1b9a70af9778970847979dc18f2d335a487bbab72745305a4705", 0x64}, 0x0) (async) sendmsg$inet(r2, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) (async) sendmsg$tipc(r2, &(0x7f0000000840)={&(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x6, {0x41, 0x4}}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000700)="edf4f67d1db65b015df3d07a69b8c0dfa780549a82aea57e2b2819e6cb6745adfd08a809804f96beb6f9169837e85edd7ed94d79a4d9cb090a1ce3acbebbc4767759ecd0ed496c17bc8adf6d334be98b2165acb9d35bf9398bc651a4e1e9867451546ecaa44209f5ae25fe6df05755e0ac02cffd8a8ed110f196d644171010f6b15418968f4104ea5a1196b7019d0413a709b9c0654b0b9ae9656c9e800ae52612b6ff57d813b6bafdb4c70623c34b8a6c47f90ee2b65979c6d9a34209192aa2896c45a5fcbadda1c3abbe261986aa9e8834dcc235a0931f43c0b5eafc7eb60a095f90592fb85b6060a9f996643404678d6e56ef", 0xf4}], 0x1, 0x0, 0x0, 0x1}, 0x20008004) 11:51:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rtc_alarm_irq_enable\x00'}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, r2, 0x0, 0x15, &(0x7f0000000140)='rtc_alarm_irq_enable\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x6, 0x6, 0x0, 0x0, 0x9, 0x8637653d3490b757, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x19068, 0x3, 0x3, 0x0, 0x6f02, 0x771, 0x6e, 0x0, 0x8, 0x0, 0x37cf}, 0x0, 0xf, r1, 0x0) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rtc_alarm_irq_enable\x00'}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, r2, 0x0, 0x15, &(0x7f0000000140)='rtc_alarm_irq_enable\x00'}, 0x30) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x6, 0x6, 0x0, 0x0, 0x9, 0x8637653d3490b757, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x19068, 0x3, 0x3, 0x0, 0x6f02, 0x771, 0x6e, 0x0, 0x8, 0x0, 0x37cf}, 0x0, 0xf, r1, 0x0) (async) [ 1553.770219][T24266] FAULT_INJECTION: forcing a failure. [ 1553.770219][T24266] name failslab, interval 1, probability 0, space 0, times 0 [ 1553.802596][T24266] CPU: 1 PID: 24266 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1553.812668][T24266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1553.822563][T24266] Call Trace: [ 1553.825687][T24266] [ 1553.828463][T24266] dump_stack_lvl+0x151/0x1b7 [ 1553.832977][T24266] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1553.838270][T24266] dump_stack+0x15/0x17 [ 1553.842264][T24266] should_fail+0x3c0/0x510 [ 1553.846633][T24266] __should_failslab+0x9f/0xe0 [ 1553.851224][T24266] should_failslab+0x9/0x20 [ 1553.855573][T24266] kmem_cache_alloc+0x4f/0x2f0 [ 1553.860164][T24266] ? vm_area_dup+0x26/0x1d0 [ 1553.864503][T24266] vm_area_dup+0x26/0x1d0 [ 1553.868675][T24266] dup_mmap+0x6b8/0xea0 [ 1553.872662][T24266] ? __delayed_free_task+0x20/0x20 [ 1553.877621][T24266] ? mm_init+0x807/0x960 [ 1553.881686][T24266] dup_mm+0x91/0x330 [ 1553.885419][T24266] copy_mm+0x108/0x1b0 [ 1553.889327][T24266] copy_process+0x1295/0x3250 [ 1553.893838][T24266] ? proc_fail_nth_write+0x213/0x290 [ 1553.898957][T24266] ? proc_fail_nth_read+0x220/0x220 [ 1553.903995][T24266] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1553.908945][T24266] ? vfs_write+0x9af/0x1050 [ 1553.913279][T24266] ? vmacache_update+0xb7/0x120 [ 1553.917964][T24266] kernel_clone+0x22d/0x990 [ 1553.922306][T24266] ? file_end_write+0x1b0/0x1b0 [ 1553.927008][T24266] ? __kasan_check_write+0x14/0x20 [ 1553.931938][T24266] ? create_io_thread+0x1e0/0x1e0 [ 1553.936799][T24266] ? __mutex_lock_slowpath+0x10/0x10 [ 1553.941924][T24266] __x64_sys_clone+0x289/0x310 [ 1553.946523][T24266] ? __do_sys_vfork+0x130/0x130 [ 1553.951217][T24266] ? debug_smp_processor_id+0x17/0x20 [ 1553.956415][T24266] do_syscall_64+0x44/0xd0 [ 1553.960675][T24266] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1553.966395][T24266] RIP: 0033:0x7f65e6eb55a9 [ 1553.970651][T24266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1553.990092][T24266] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1553.998340][T24266] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1554.006150][T24266] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:48 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 56) 11:51:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x21000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xca000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rtc_alarm_irq_enable\x00'}, 0x10) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, r2, 0x0, 0x15, &(0x7f0000000140)='rtc_alarm_irq_enable\x00'}, 0x30) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x6, 0x6, 0x0, 0x0, 0x9, 0x8637653d3490b757, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x19068, 0x3, 0x3, 0x0, 0x6f02, 0x771, 0x6e, 0x0, 0x8, 0x0, 0x37cf}, 0x0, 0xf, r1, 0x0) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='rtc_alarm_irq_enable\x00'}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, r2, 0x0, 0x15, &(0x7f0000000140)='rtc_alarm_irq_enable\x00'}, 0x30) (async) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x6, 0x6, 0x0, 0x0, 0x9, 0x8637653d3490b757, 0xb, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0xb}, 0x19068, 0x3, 0x3, 0x0, 0x6f02, 0x771, 0x6e, 0x0, 0x8, 0x0, 0x37cf}, 0x0, 0xf, r1, 0x0) (async) 11:51:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) [ 1554.014076][T24266] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1554.021879][T24266] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1554.029693][T24266] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1554.037507][T24266] 11:51:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x11, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff8000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1554.079655][T24304] FAULT_INJECTION: forcing a failure. [ 1554.079655][T24304] name failslab, interval 1, probability 0, space 0, times 0 [ 1554.112407][T24304] CPU: 1 PID: 24304 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1554.122490][T24304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1554.132468][T24304] Call Trace: [ 1554.135591][T24304] [ 1554.138366][T24304] dump_stack_lvl+0x151/0x1b7 [ 1554.142878][T24304] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1554.148175][T24304] dump_stack+0x15/0x17 [ 1554.152165][T24304] should_fail+0x3c0/0x510 [ 1554.156417][T24304] __should_failslab+0x9f/0xe0 [ 1554.161015][T24304] should_failslab+0x9/0x20 [ 1554.165356][T24304] kmem_cache_alloc+0x4f/0x2f0 [ 1554.169955][T24304] ? vm_area_dup+0x26/0x1d0 [ 1554.174295][T24304] vm_area_dup+0x26/0x1d0 [ 1554.178472][T24304] dup_mmap+0x6b8/0xea0 [ 1554.182573][T24304] ? __delayed_free_task+0x20/0x20 [ 1554.187514][T24304] ? mm_init+0x807/0x960 [ 1554.191594][T24304] dup_mm+0x91/0x330 [ 1554.195326][T24304] copy_mm+0x108/0x1b0 [ 1554.199232][T24304] copy_process+0x1295/0x3250 [ 1554.203746][T24304] ? proc_fail_nth_write+0x213/0x290 [ 1554.208867][T24304] ? proc_fail_nth_read+0x220/0x220 [ 1554.213900][T24304] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1554.218959][T24304] ? vfs_write+0x9af/0x1050 [ 1554.223384][T24304] ? vmacache_update+0xb7/0x120 [ 1554.228509][T24304] kernel_clone+0x22d/0x990 [ 1554.232933][T24304] ? file_end_write+0x1b0/0x1b0 [ 1554.237620][T24304] ? __kasan_check_write+0x14/0x20 [ 1554.242565][T24304] ? create_io_thread+0x1e0/0x1e0 [ 1554.247717][T24304] ? __mutex_lock_slowpath+0x10/0x10 [ 1554.252838][T24304] __x64_sys_clone+0x289/0x310 [ 1554.257440][T24304] ? __do_sys_vfork+0x130/0x130 [ 1554.262125][T24304] ? debug_smp_processor_id+0x17/0x20 [ 1554.267419][T24304] do_syscall_64+0x44/0xd0 [ 1554.271679][T24304] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1554.277409][T24304] RIP: 0033:0x7f65e6eb55a9 [ 1554.281657][T24304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1554.301618][T24304] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1554.309871][T24304] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1554.317759][T24304] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:48 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 57) 11:51:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:48 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(r2, &(0x7f0000000200)='ns/pid\x00') r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r3, 0x20, &(0x7f0000000180)={&(0x7f0000000000)=""/182, 0xb6, 0x0, &(0x7f00000000c0)=""/187, 0xbb}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xc5) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x12, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1554.325572][T24304] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1554.333389][T24304] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1554.341368][T24304] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1554.349442][T24304] 11:51:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x21, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:48 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0xf34, 0x2, 0x3, 0x2, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0x6}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xc, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000}, [@alu={0x4, 0x1, 0x1, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7, 0x6, 0x0, 0x5, 0xe0000000}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6658}, @alu={0x4, 0x0, 0xd, 0x4, 0x7, 0x1, 0x4}]}, &(0x7f0000000140)='syzkaller\x00', 0xff, 0xd0, &(0x7f0000000180)=""/208, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x1, 0x101, 0x3ffc00}, 0x10, 0xdf49, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0x1]}, 0x80) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x5421, 0x1ffff000) 11:51:48 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async, rerun: 32) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 32) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async, rerun: 64) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(r2, &(0x7f0000000200)='ns/pid\x00') (async) r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r3, 0x20, &(0x7f0000000180)={&(0x7f0000000000)=""/182, 0xb6, 0x0, &(0x7f00000000c0)=""/187, 0xbb}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xc5) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 1554.397216][T24338] FAULT_INJECTION: forcing a failure. [ 1554.397216][T24338] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1554.429951][T24338] CPU: 1 PID: 24338 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1554.440028][T24338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1554.449927][T24338] Call Trace: [ 1554.453048][T24338] [ 1554.455826][T24338] dump_stack_lvl+0x151/0x1b7 [ 1554.460340][T24338] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1554.465637][T24338] dump_stack+0x15/0x17 [ 1554.469623][T24338] should_fail+0x3c0/0x510 [ 1554.473879][T24338] should_fail_alloc_page+0x58/0x70 [ 1554.478920][T24338] __alloc_pages+0x1de/0x7c0 [ 1554.483348][T24338] ? __count_vm_events+0x30/0x30 [ 1554.488115][T24338] ? __this_cpu_preempt_check+0x13/0x20 [ 1554.493496][T24338] ? __mod_node_page_state+0xac/0xf0 [ 1554.498616][T24338] pte_alloc_one+0x73/0x1b0 [ 1554.502957][T24338] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1554.507993][T24338] __pte_alloc+0x86/0x350 [ 1554.512154][T24338] ? free_pgtables+0x210/0x210 [ 1554.516753][T24338] ? _raw_spin_lock+0xa3/0x1b0 [ 1554.521350][T24338] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1554.526557][T24338] ? __kernel_text_address+0x9a/0x110 [ 1554.532028][T24338] copy_pte_range+0x1b1f/0x20b0 [ 1554.536713][T24338] ? __kunmap_atomic+0x80/0x80 [ 1554.541311][T24338] ? __kasan_slab_alloc+0xc4/0xe0 [ 1554.546173][T24338] ? __kasan_slab_alloc+0xb2/0xe0 [ 1554.551036][T24338] ? kmem_cache_alloc+0x189/0x2f0 [ 1554.555895][T24338] ? vm_area_dup+0x26/0x1d0 [ 1554.560233][T24338] ? dup_mmap+0x6b8/0xea0 [ 1554.564398][T24338] ? dup_mm+0x91/0x330 [ 1554.568306][T24338] ? copy_mm+0x108/0x1b0 [ 1554.572385][T24338] ? copy_process+0x1295/0x3250 [ 1554.577073][T24338] ? kernel_clone+0x22d/0x990 [ 1554.581583][T24338] ? __x64_sys_clone+0x289/0x310 [ 1554.586356][T24338] ? do_syscall_64+0x44/0xd0 [ 1554.590787][T24338] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1554.596689][T24338] copy_page_range+0xc1e/0x1090 [ 1554.601386][T24338] ? pfn_valid+0x1e0/0x1e0 [ 1554.605633][T24338] dup_mmap+0x99f/0xea0 [ 1554.609624][T24338] ? __delayed_free_task+0x20/0x20 [ 1554.614574][T24338] ? mm_init+0x807/0x960 [ 1554.618647][T24338] dup_mm+0x91/0x330 [ 1554.622380][T24338] copy_mm+0x108/0x1b0 [ 1554.626289][T24338] copy_process+0x1295/0x3250 [ 1554.630800][T24338] ? proc_fail_nth_write+0x213/0x290 [ 1554.635919][T24338] ? proc_fail_nth_read+0x220/0x220 [ 1554.641045][T24338] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1554.645990][T24338] ? vfs_write+0x9af/0x1050 [ 1554.650326][T24338] ? vmacache_update+0xb7/0x120 [ 1554.655201][T24338] kernel_clone+0x22d/0x990 [ 1554.659542][T24338] ? file_end_write+0x1b0/0x1b0 [ 1554.664221][T24338] ? __kasan_check_write+0x14/0x20 [ 1554.669612][T24338] ? create_io_thread+0x1e0/0x1e0 [ 1554.674467][T24338] ? __mutex_lock_slowpath+0x10/0x10 [ 1554.679598][T24338] __x64_sys_clone+0x289/0x310 [ 1554.684195][T24338] ? __do_sys_vfork+0x130/0x130 [ 1554.688874][T24338] ? debug_smp_processor_id+0x17/0x20 [ 1554.694081][T24338] do_syscall_64+0x44/0xd0 [ 1554.698332][T24338] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1554.704060][T24338] RIP: 0033:0x7f65e6eb55a9 [ 1554.708317][T24338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1554.727756][T24338] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1554.736000][T24338] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:49 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 58) 11:51:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x57, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0xf34, 0x2, 0x3, 0x2, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0x6}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xc, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000}, [@alu={0x4, 0x1, 0x1, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7, 0x6, 0x0, 0x5, 0xe0000000}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6658}, @alu={0x4, 0x0, 0xd, 0x4, 0x7, 0x1, 0x4}]}, &(0x7f0000000140)='syzkaller\x00', 0xff, 0xd0, &(0x7f0000000180)=""/208, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x1, 0x101, 0x3ffc00}, 0x10, 0xdf49, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0x1]}, 0x80) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x5421, 0x1ffff000) 11:51:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x25, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:49 executing program 0: r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) syz_open_procfs$namespace(r2, &(0x7f0000000200)='ns/pid\x00') r3 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r3, 0x20, &(0x7f0000000180)={&(0x7f0000000000)=""/182, 0xb6, 0x0, &(0x7f00000000c0)=""/187, 0xbb}}, 0x10) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xc5) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r1, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r2, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) (async) syz_open_procfs$namespace(r2, &(0x7f0000000200)='ns/pid\x00') (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r3}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0xf3) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', 0x0, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r3, 0x20, &(0x7f0000000180)={&(0x7f0000000000)=""/182, 0xb6, 0x0, &(0x7f00000000c0)=""/187, 0xbb}}, 0x10) (async) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xc5) (async) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 11:51:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x43, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:49 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000100010018300000030000000000000000000000185a000007000000000000000000cd000014090200010000009500000000000000acf575f6ada2854e65cfbaf4c668829e888ed929b64b7ebd4793324bb2ecef97c760b3b4cf2ccb0ad1a2bbad2c8aa0ddd3272336e472cab5bf0116b14953c598d2074a240d11421552d521ae5ccde8fa42b7a00217ff87680e27a41988d528d6492363e70b4effa66ba5f1e99922f6d61a5784ba3badc07259407d91419ae46ccccf425a686dac82a492647df9153f6c9d869f58f5df02b6676d9fb3547c07ffdb04d78edc9e7a3a66cc7594f00c61e4aa23865835fb0fb952e1f5804f29c631c759f587759a4d633cea90a176b951d077c51a2d6469c8be2837e741507fce84"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0xf34, 0x2, 0x3, 0x2, 0xffffffffffffffff, 0x1000, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x2, 0x6}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_ext={0x1c, 0xc, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x80000000}, [@alu={0x4, 0x1, 0x1, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffffffffffc}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffffa}, @generic={0x7, 0x6, 0x0, 0x5, 0xe0000000}, @exit, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x2, 0x0, 0x0, 0x0, 0x6658}, @alu={0x4, 0x0, 0xd, 0x4, 0x7, 0x1, 0x4}]}, &(0x7f0000000140)='syzkaller\x00', 0xff, 0xd0, &(0x7f0000000180)=""/208, 0x41000, 0x1, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x1, 0x101, 0x3ffc00}, 0x10, 0xdf49, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, 0x1]}, 0x80) (async, rerun: 64) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) (rerun: 64) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r3, 0x5421, 0x1ffff000) [ 1554.743811][T24338] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1554.751622][T24338] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1554.759434][T24338] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1554.767331][T24338] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1554.775148][T24338] 11:51:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:49 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/210, 0xd2}], 0x1, &(0x7f0000000200)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x150}, 0x40000000) [ 1554.820639][T24495] FAULT_INJECTION: forcing a failure. [ 1554.820639][T24495] name failslab, interval 1, probability 0, space 0, times 0 [ 1554.867382][T24495] CPU: 1 PID: 24495 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1554.877552][T24495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1554.887964][T24495] Call Trace: [ 1554.891088][T24495] [ 1554.893962][T24495] dump_stack_lvl+0x151/0x1b7 [ 1554.898467][T24495] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1554.903853][T24495] ? do_syscall_64+0x44/0xd0 [ 1554.908274][T24495] dump_stack+0x15/0x17 [ 1554.912265][T24495] should_fail+0x3c0/0x510 [ 1554.916520][T24495] __should_failslab+0x9f/0xe0 [ 1554.921119][T24495] should_failslab+0x9/0x20 [ 1554.925459][T24495] kmem_cache_alloc+0x4f/0x2f0 [ 1554.930067][T24495] ? anon_vma_clone+0xa1/0x4f0 [ 1554.934658][T24495] anon_vma_clone+0xa1/0x4f0 [ 1554.939213][T24495] anon_vma_fork+0x91/0x4f0 [ 1554.943554][T24495] ? anon_vma_name+0x43/0x70 [ 1554.947964][T24495] dup_mmap+0x750/0xea0 [ 1554.951969][T24495] ? __delayed_free_task+0x20/0x20 [ 1554.957046][T24495] ? mm_init+0x807/0x960 [ 1554.961129][T24495] dup_mm+0x91/0x330 [ 1554.964862][T24495] copy_mm+0x108/0x1b0 [ 1554.968757][T24495] copy_process+0x1295/0x3250 [ 1554.973272][T24495] ? proc_fail_nth_write+0x213/0x290 [ 1554.978393][T24495] ? proc_fail_nth_read+0x220/0x220 [ 1554.983426][T24495] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1554.988681][T24495] ? vfs_write+0x9af/0x1050 [ 1554.993104][T24495] ? vmacache_update+0xb7/0x120 [ 1554.997790][T24495] kernel_clone+0x22d/0x990 [ 1555.002133][T24495] ? file_end_write+0x1b0/0x1b0 [ 1555.006814][T24495] ? __kasan_check_write+0x14/0x20 [ 1555.011886][T24495] ? create_io_thread+0x1e0/0x1e0 [ 1555.016752][T24495] ? __mutex_lock_slowpath+0x10/0x10 [ 1555.021868][T24495] __x64_sys_clone+0x289/0x310 [ 1555.026580][T24495] ? __do_sys_vfork+0x130/0x130 [ 1555.031255][T24495] ? debug_smp_processor_id+0x17/0x20 [ 1555.036460][T24495] do_syscall_64+0x44/0xd0 [ 1555.040713][T24495] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1555.046443][T24495] RIP: 0033:0x7f65e6eb55a9 [ 1555.050696][T24495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1555.070236][T24495] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1555.078568][T24495] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1555.086516][T24495] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1555.094318][T24495] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.102244][T24495] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1555.110054][T24495] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 11:51:49 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 59) 11:51:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9a, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='objagg_destroy\x00', r4}, 0x10) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r6, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_RESET(r5, 0x5421, 0x80000004000005c1) 11:51:49 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/210, 0xd2}], 0x1, &(0x7f0000000200)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x150}, 0x40000000) [ 1555.117882][T24495] 11:51:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa6, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1555.141733][T24540] FAULT_INJECTION: forcing a failure. [ 1555.141733][T24540] name failslab, interval 1, probability 0, space 0, times 0 [ 1555.160354][T24540] CPU: 0 PID: 24540 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1555.170429][T24540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1555.180326][T24540] Call Trace: [ 1555.183449][T24540] [ 1555.186242][T24540] dump_stack_lvl+0x151/0x1b7 11:51:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:49 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) recvmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/210, 0xd2}], 0x1, &(0x7f0000000200)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x150}, 0x40000000) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) recvmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/210, 0xd2}], 0x1, &(0x7f0000000200)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x150}, 0x40000000) (async) 11:51:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async, rerun: 32) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='objagg_destroy\x00', r4}, 0x10) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r5}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r6, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_RESET(r5, 0x5421, 0x80000004000005c1) [ 1555.190741][T24540] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1555.196038][T24540] dump_stack+0x15/0x17 [ 1555.200028][T24540] should_fail+0x3c0/0x510 [ 1555.204366][T24540] __should_failslab+0x9f/0xe0 [ 1555.208966][T24540] should_failslab+0x9/0x20 [ 1555.213307][T24540] kmem_cache_alloc+0x4f/0x2f0 [ 1555.217914][T24540] ? vm_area_dup+0x26/0x1d0 [ 1555.222247][T24540] vm_area_dup+0x26/0x1d0 [ 1555.226412][T24540] dup_mmap+0x6b8/0xea0 [ 1555.230493][T24540] ? __delayed_free_task+0x20/0x20 [ 1555.235445][T24540] ? mm_init+0x807/0x960 [ 1555.239514][T24540] dup_mm+0x91/0x330 [ 1555.243343][T24540] copy_mm+0x108/0x1b0 [ 1555.247241][T24540] copy_process+0x1295/0x3250 [ 1555.251862][T24540] ? proc_fail_nth_write+0x213/0x290 [ 1555.256960][T24540] ? proc_fail_nth_read+0x220/0x220 [ 1555.262022][T24540] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1555.266940][T24540] ? vfs_write+0x9af/0x1050 [ 1555.271279][T24540] ? vmacache_update+0xb7/0x120 [ 1555.275964][T24540] kernel_clone+0x22d/0x990 [ 1555.280311][T24540] ? file_end_write+0x1b0/0x1b0 [ 1555.284989][T24540] ? __kasan_check_write+0x14/0x20 [ 1555.289937][T24540] ? create_io_thread+0x1e0/0x1e0 [ 1555.294796][T24540] ? __mutex_lock_slowpath+0x10/0x10 [ 1555.299919][T24540] __x64_sys_clone+0x289/0x310 [ 1555.304521][T24540] ? __do_sys_vfork+0x130/0x130 [ 1555.309225][T24540] ? debug_smp_processor_id+0x17/0x20 [ 1555.314413][T24540] do_syscall_64+0x44/0xd0 [ 1555.318776][T24540] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1555.324508][T24540] RIP: 0033:0x7f65e6eb55a9 [ 1555.328760][T24540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1555.348201][T24540] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1555.356449][T24540] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1555.364260][T24540] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1555.372069][T24540] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.379893][T24540] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:49 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 60) 11:51:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000080)=""/143, 0x8f}, {&(0x7f0000000140)=""/96, 0x60}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/249, 0xf9}, {&(0x7f0000000300)=""/156, 0x9c}, {&(0x7f00000003c0)=""/52, 0x34}, {&(0x7f0000000400)=""/130, 0x82}, {&(0x7f00000004c0)=""/168, 0xa8}], 0x8}, 0x40000100) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000001880)={&(0x7f0000000680), 0x6e, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}, 0x1) 11:51:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:49 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) r0 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r0}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r1, 0x0, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='objagg_destroy\x00', r4}, 0x10) (async) r5 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r5}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r6, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_RESET(r5, 0x5421, 0x80000004000005c1) 11:51:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xca000000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1555.387690][T24540] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1555.395506][T24540] [ 1555.421178][T24580] FAULT_INJECTION: forcing a failure. [ 1555.421178][T24580] name failslab, interval 1, probability 0, space 0, times 0 11:51:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:49 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@x25, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x9f}}, @txtime={{0x18, 0x1, 0x3d, 0x5a}}], 0x60}, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) [ 1555.442944][T24580] CPU: 0 PID: 24580 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1555.453203][T24580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1555.463092][T24580] Call Trace: [ 1555.466217][T24580] [ 1555.468991][T24580] dump_stack_lvl+0x151/0x1b7 [ 1555.473516][T24580] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1555.478800][T24580] dump_stack+0x15/0x17 [ 1555.482791][T24580] should_fail+0x3c0/0x510 [ 1555.487046][T24580] __should_failslab+0x9f/0xe0 [ 1555.491645][T24580] should_failslab+0x9/0x20 [ 1555.496089][T24580] kmem_cache_alloc+0x4f/0x2f0 [ 1555.500686][T24580] ? vm_area_dup+0x26/0x1d0 [ 1555.505031][T24580] vm_area_dup+0x26/0x1d0 [ 1555.509281][T24580] dup_mmap+0x6b8/0xea0 [ 1555.513277][T24580] ? __delayed_free_task+0x20/0x20 [ 1555.518220][T24580] ? mm_init+0x807/0x960 [ 1555.522297][T24580] dup_mm+0x91/0x330 [ 1555.526024][T24580] copy_mm+0x108/0x1b0 [ 1555.529931][T24580] copy_process+0x1295/0x3250 [ 1555.534444][T24580] ? proc_fail_nth_write+0x213/0x290 [ 1555.539565][T24580] ? proc_fail_nth_read+0x220/0x220 [ 1555.544598][T24580] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1555.549546][T24580] ? vfs_write+0x9af/0x1050 [ 1555.553883][T24580] ? vmacache_update+0xb7/0x120 [ 1555.558574][T24580] kernel_clone+0x22d/0x990 [ 1555.562912][T24580] ? file_end_write+0x1b0/0x1b0 [ 1555.567606][T24580] ? __kasan_check_write+0x14/0x20 [ 1555.572546][T24580] ? create_io_thread+0x1e0/0x1e0 [ 1555.577508][T24580] ? __mutex_lock_slowpath+0x10/0x10 [ 1555.582631][T24580] __x64_sys_clone+0x289/0x310 [ 1555.587231][T24580] ? __do_sys_vfork+0x130/0x130 [ 1555.591916][T24580] ? debug_smp_processor_id+0x17/0x20 [ 1555.597135][T24580] do_syscall_64+0x44/0xd0 [ 1555.601429][T24580] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1555.607105][T24580] RIP: 0033:0x7f65e6eb55a9 [ 1555.611359][T24580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1555.630800][T24580] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:50 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 61) 11:51:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2000019a, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000080)=""/143, 0x8f}, {&(0x7f0000000140)=""/96, 0x60}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/249, 0xf9}, {&(0x7f0000000300)=""/156, 0x9c}, {&(0x7f00000003c0)=""/52, 0x34}, {&(0x7f0000000400)=""/130, 0x82}, {&(0x7f00000004c0)=""/168, 0xa8}], 0x8}, 0x40000100) (async, rerun: 64) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) (rerun: 64) recvmsg$unix(r0, &(0x7f0000001880)={&(0x7f0000000680), 0x6e, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}, 0x1) 11:51:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff8000, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xca, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@x25, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x9f}}, @txtime={{0x18, 0x1, 0x3d, 0x5a}}], 0x60}, 0x4) (async, rerun: 32) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) [ 1555.639049][T24580] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1555.646856][T24580] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1555.654666][T24580] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1555.662482][T24580] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1555.670289][T24580] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1555.678107][T24580] 11:51:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200001a5, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:50 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000080)=""/143, 0x8f}, {&(0x7f0000000140)=""/96, 0x60}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/249, 0xf9}, {&(0x7f0000000300)=""/156, 0x9c}, {&(0x7f00000003c0)=""/52, 0x34}, {&(0x7f0000000400)=""/130, 0x82}, {&(0x7f00000004c0)=""/168, 0xa8}], 0x8}, 0x40000100) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000001880)={&(0x7f0000000680), 0x6e, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}, 0x1) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000580)=[{&(0x7f0000000080)=""/143, 0x8f}, {&(0x7f0000000140)=""/96, 0x60}, {&(0x7f00000001c0)=""/55, 0x37}, {&(0x7f0000000200)=""/249, 0xf9}, {&(0x7f0000000300)=""/156, 0x9c}, {&(0x7f00000003c0)=""/52, 0x34}, {&(0x7f0000000400)=""/130, 0x82}, {&(0x7f00000004c0)=""/168, 0xa8}], 0x8}, 0x40000100) (async) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000640)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) (async) recvmsg$unix(r0, &(0x7f0000001880)={&(0x7f0000000680), 0x6e, &(0x7f0000001700)=[{&(0x7f0000000700)=""/4096, 0x1000}], 0x1, &(0x7f0000001740)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x140}, 0x1) (async) 11:51:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1555.693889][T24599] FAULT_INJECTION: forcing a failure. [ 1555.693889][T24599] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1555.707758][T24599] CPU: 0 PID: 24599 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1555.717825][T24599] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1555.727719][T24599] Call Trace: [ 1555.730843][T24599] [ 1555.733619][T24599] dump_stack_lvl+0x151/0x1b7 [ 1555.738133][T24599] ? bfq_pos_tree_add_move+0x43e/0x43e 11:51:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:50 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) sendmsg$sock(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@x25, 0x80, &(0x7f0000000300), 0x0, &(0x7f0000000400)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x9f}}, @txtime={{0x18, 0x1, 0x3d, 0x5a}}], 0x60}, 0x4) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) [ 1555.743425][T24599] dump_stack+0x15/0x17 [ 1555.747503][T24599] should_fail+0x3c0/0x510 [ 1555.751762][T24599] should_fail_alloc_page+0x58/0x70 [ 1555.756956][T24599] __alloc_pages+0x1de/0x7c0 [ 1555.761358][T24599] ? __count_vm_events+0x30/0x30 [ 1555.766123][T24599] ? __this_cpu_preempt_check+0x13/0x20 [ 1555.771505][T24599] ? __mod_node_page_state+0xac/0xf0 [ 1555.776628][T24599] pte_alloc_one+0x73/0x1b0 [ 1555.780964][T24599] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1555.785996][T24599] __pte_alloc+0x86/0x350 [ 1555.790181][T24599] ? free_pgtables+0x210/0x210 [ 1555.794777][T24599] ? _raw_spin_lock+0xa3/0x1b0 [ 1555.799363][T24599] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1555.804580][T24599] ? __kernel_text_address+0x9a/0x110 [ 1555.809887][T24599] copy_pte_range+0x1b1f/0x20b0 [ 1555.814557][T24599] ? __kunmap_atomic+0x80/0x80 [ 1555.819241][T24599] ? __kasan_slab_alloc+0xc4/0xe0 [ 1555.824101][T24599] ? __kasan_slab_alloc+0xb2/0xe0 [ 1555.828961][T24599] ? kmem_cache_alloc+0x189/0x2f0 [ 1555.833825][T24599] ? vm_area_dup+0x26/0x1d0 [ 1555.838170][T24599] ? dup_mmap+0x6b8/0xea0 [ 1555.842336][T24599] ? dup_mm+0x91/0x330 [ 1555.846234][T24599] ? copy_mm+0x108/0x1b0 [ 1555.850312][T24599] ? copy_process+0x1295/0x3250 [ 1555.855018][T24599] ? kernel_clone+0x22d/0x990 [ 1555.859510][T24599] ? __x64_sys_clone+0x289/0x310 [ 1555.864279][T24599] ? do_syscall_64+0x44/0xd0 [ 1555.868709][T24599] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1555.874610][T24599] copy_page_range+0xc1e/0x1090 [ 1555.879295][T24599] ? pfn_valid+0x1e0/0x1e0 [ 1555.883554][T24599] dup_mmap+0x99f/0xea0 [ 1555.887543][T24599] ? __delayed_free_task+0x20/0x20 [ 1555.892591][T24599] ? mm_init+0x807/0x960 [ 1555.896668][T24599] dup_mm+0x91/0x330 [ 1555.900418][T24599] copy_mm+0x108/0x1b0 [ 1555.904310][T24599] copy_process+0x1295/0x3250 [ 1555.908935][T24599] ? proc_fail_nth_write+0x213/0x290 [ 1555.914188][T24599] ? proc_fail_nth_read+0x220/0x220 [ 1555.919210][T24599] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1555.924157][T24599] ? vfs_write+0x9af/0x1050 [ 1555.928492][T24599] ? vmacache_update+0xb7/0x120 [ 1555.933179][T24599] kernel_clone+0x22d/0x990 [ 1555.937520][T24599] ? file_end_write+0x1b0/0x1b0 [ 1555.942211][T24599] ? __kasan_check_write+0x14/0x20 [ 1555.947156][T24599] ? create_io_thread+0x1e0/0x1e0 [ 1555.952449][T24599] ? __mutex_lock_slowpath+0x10/0x10 [ 1555.957568][T24599] __x64_sys_clone+0x289/0x310 [ 1555.962169][T24599] ? __do_sys_vfork+0x130/0x130 [ 1555.967731][T24599] ? debug_smp_processor_id+0x17/0x20 [ 1555.972930][T24599] do_syscall_64+0x44/0xd0 [ 1555.977184][T24599] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1555.982912][T24599] RIP: 0033:0x7f65e6eb55a9 [ 1555.987776][T24599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1556.007218][T24599] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1556.015460][T24599] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1556.023271][T24599] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1556.031089][T24599] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 11:51:50 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 62) 11:51:50 executing program 1: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x2, {{0x1, 0x1}, 0x2}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="8650a10a2e136f4f000ec589d61513c1f900b6cc4d97add1ae21ef9f4378cf46a7088b723eb5eb61bb7f8831e10bb9345102b2f9d540f6a6c491388b2530594612dac06f2b809f02f697f0f106bf3139aadb91b945f1a9fc33367d0ea4ba1ec33b9081eb2e8db93030688dd014b674efbeec3f1ffe71602c485e378e524d61773d22f44ee44e79b3d2a9c8fce10e7a49f45bbebdd1e03b9b86597c1447766173b0c7170179a7504f3ee4509db5e9b6cdaef57dda385b9f2913b5e78fe39bcb90a769ac374d7174b32ec4757433b57ee4281de66b14ab8737e1b14d2aa6293d45248fa917434c600336791095f8b18a2d", 0xf0}, {&(0x7f0000000140)="a26f6617a9bbc8e6a6b8f50ff7a49113c72d806ad9d875ea3cab11c090b08178fc63f0a28a081b8956bc1aa30f0bba6ab1968cb4a06c076faf9d3189ca", 0x3d}, {&(0x7f0000000180)="6ce4792b6f9f7dc1a2b059744d4d927e18fb2ba5bc9547fb7d50033e25d9659b0380d13b02fe9f24cd94e0c67820a9d0cf2ba3238ff723fabc15abfec7380acc918e0f882079ce775aca1f941a735b43913c80895e091799f425000f9dc026b1b43822c4df06153386e6dce0d49082e4c7e17075fa706b3c0eb54c2f543e5fc8bf68ed2d6f3c44d6ea84515ba76fbf87237eac5597c451fee8206e9c7d94d99c6c2cc7d69b80ebae0c7e1d4b1e5e5e9c1a6ec56a18d97f4bb0de0fb7b0700e7ac6cc6d592909cd9a0503ef27dc7c76fcff1e3bda4d90f0e331b80f66c3", 0xdd}], 0x3, 0x0, 0x0, 0x140400c1}, 0x8c0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)="760cfcf22d7b3c20d5bd66fee76255a5fec8d64a90f3c4767b70ca17ef203c10c328fbe3a7a2bf79d7751e66d974d1b1e6c23e34e5f2a6cfc47c", 0x3a}, {&(0x7f0000000340)="71439f01ff58668453e61c265419d133264eef41a3be247f4721778195dc34d825bb77f606394517168aaf213c2ab88a6ca931ee79e1c8d40f6be5bf4bf64c211d5dd7ca14eba0f9411993afdf8695dfd99ef5fcdf513582e6daa0892780baa57aa84449e7901af9673f7a1d1c6dfbaa61f171569393273f82", 0x79}, {&(0x7f00000003c0)="0ff46d1dbc970e596b50efb9bcd5d2fa51355abd64ee037780c6cc849f0e2ce33290042de1b414cf74b73acd3f83193420b168033421d6b36e07aee7e09e8b02fdce2a9f446f65eb677cfe557b8ec8ed19f39e199643e8201dc4f2012520ce339debe769c03acb8f3b74e70a20a445ee77d4bab97929579a19e51586b6ad79e3880bab1b7ae0d820", 0x88}, {&(0x7f0000000480)="bdafbafcad30618473e911c060a3afb2dad1a0799b3e504477efbc95ebbff3c263a52087128515ae70da245a9cc49b1a0b8f373480f167cedc1a64cc2baa8f8cc79b4875b151d906d541962c4e25df0a3413b475d6411c061e3ee2b58ef00551441fa600513e60a37e8580bd77cfcd", 0x6f}, {&(0x7f0000000500)="f7c15fe4fdde70a5d25cae6448df5694c1c6404777e19a8cf9dbe543efa14b612c955a1ecfe1b0542940015fa135680134e7c84f5e58dbc962a0c3dbf2d586ec9ee1b54f8e77d21c0ea022634c17669850ac06c9c93b84c94d3cfff16a6b2532f805c5ed372e78672634cc51d5d358c45b1b12c655196db91a3a50148acf42066e58e2aaf3d0fadedf6cb91fc4808f82109305c1c74ce40755b25c6d61ade6395f317fe4334d0c932487cd5d96dd2d17f17636013d37a6cd95bb5dc10983b6271b9cf8dc9c05cfacebe78297a7", 0xcd}], 0x5, &(0x7f0000000680)=[@txtime={{0x18, 0x1, 0x3d, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1da54d63}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}], 0x78}, 0x40) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x7) 11:51:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200001e1, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.time\x00', 0x0, 0x0) r1 = gettid() write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) r2 = syz_clone(0x41185100, &(0x7f0000000200)="39462508f16a411f297626c45044afabb6aa3ee3c4f0efb8faa171530a0bce688df568da96cd2422983fa7f40178db208ca986abb9d641b10a40677b296e7ac1159f958148385ef28f44656be713f3980a4b834298c91715b7b25b682da130980663f591c79e5f0bb48c82517ad75733d3121f78d2a01f284897f114a74da94fbaa2e4507f77483af619d33ab7bb4bec56f68c313fa10a717dfb09bff704eb369d8c28f8ad9d04a2938b56eba296994ac29868e2159bafcf32af", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000002c0)="295701008a04c8832c15d38e48532cccd297105ef88e5e22ec54312efff1d82c883dfe6e5d4af0f7a788b342f438f87d7f6ea1836bbf648005afba350000000000000000001f77df1f942089e3f61fcf8a6f16cf699a618f951d250e0c") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r2, 0xfffffffffffffdb8) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180)=r2, 0x12) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 11:51:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 1: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x2, {{0x1, 0x1}, 0x2}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="8650a10a2e136f4f000ec589d61513c1f900b6cc4d97add1ae21ef9f4378cf46a7088b723eb5eb61bb7f8831e10bb9345102b2f9d540f6a6c491388b2530594612dac06f2b809f02f697f0f106bf3139aadb91b945f1a9fc33367d0ea4ba1ec33b9081eb2e8db93030688dd014b674efbeec3f1ffe71602c485e378e524d61773d22f44ee44e79b3d2a9c8fce10e7a49f45bbebdd1e03b9b86597c1447766173b0c7170179a7504f3ee4509db5e9b6cdaef57dda385b9f2913b5e78fe39bcb90a769ac374d7174b32ec4757433b57ee4281de66b14ab8737e1b14d2aa6293d45248fa917434c600336791095f8b18a2d", 0xf0}, {&(0x7f0000000140)="a26f6617a9bbc8e6a6b8f50ff7a49113c72d806ad9d875ea3cab11c090b08178fc63f0a28a081b8956bc1aa30f0bba6ab1968cb4a06c076faf9d3189ca", 0x3d}, {&(0x7f0000000180)="6ce4792b6f9f7dc1a2b059744d4d927e18fb2ba5bc9547fb7d50033e25d9659b0380d13b02fe9f24cd94e0c67820a9d0cf2ba3238ff723fabc15abfec7380acc918e0f882079ce775aca1f941a735b43913c80895e091799f425000f9dc026b1b43822c4df06153386e6dce0d49082e4c7e17075fa706b3c0eb54c2f543e5fc8bf68ed2d6f3c44d6ea84515ba76fbf87237eac5597c451fee8206e9c7d94d99c6c2cc7d69b80ebae0c7e1d4b1e5e5e9c1a6ec56a18d97f4bb0de0fb7b0700e7ac6cc6d592909cd9a0503ef27dc7c76fcff1e3bda4d90f0e331b80f66c3", 0xdd}], 0x3, 0x0, 0x0, 0x140400c1}, 0x8c0) (async) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)="760cfcf22d7b3c20d5bd66fee76255a5fec8d64a90f3c4767b70ca17ef203c10c328fbe3a7a2bf79d7751e66d974d1b1e6c23e34e5f2a6cfc47c", 0x3a}, {&(0x7f0000000340)="71439f01ff58668453e61c265419d133264eef41a3be247f4721778195dc34d825bb77f606394517168aaf213c2ab88a6ca931ee79e1c8d40f6be5bf4bf64c211d5dd7ca14eba0f9411993afdf8695dfd99ef5fcdf513582e6daa0892780baa57aa84449e7901af9673f7a1d1c6dfbaa61f171569393273f82", 0x79}, {&(0x7f00000003c0)="0ff46d1dbc970e596b50efb9bcd5d2fa51355abd64ee037780c6cc849f0e2ce33290042de1b414cf74b73acd3f83193420b168033421d6b36e07aee7e09e8b02fdce2a9f446f65eb677cfe557b8ec8ed19f39e199643e8201dc4f2012520ce339debe769c03acb8f3b74e70a20a445ee77d4bab97929579a19e51586b6ad79e3880bab1b7ae0d820", 0x88}, {&(0x7f0000000480)="bdafbafcad30618473e911c060a3afb2dad1a0799b3e504477efbc95ebbff3c263a52087128515ae70da245a9cc49b1a0b8f373480f167cedc1a64cc2baa8f8cc79b4875b151d906d541962c4e25df0a3413b475d6411c061e3ee2b58ef00551441fa600513e60a37e8580bd77cfcd", 0x6f}, {&(0x7f0000000500)="f7c15fe4fdde70a5d25cae6448df5694c1c6404777e19a8cf9dbe543efa14b612c955a1ecfe1b0542940015fa135680134e7c84f5e58dbc962a0c3dbf2d586ec9ee1b54f8e77d21c0ea022634c17669850ac06c9c93b84c94d3cfff16a6b2532f805c5ed372e78672634cc51d5d358c45b1b12c655196db91a3a50148acf42066e58e2aaf3d0fadedf6cb91fc4808f82109305c1c74ce40755b25c6d61ade6395f317fe4334d0c932487cd5d96dd2d17f17636013d37a6cd95bb5dc10983b6271b9cf8dc9c05cfacebe78297a7", 0xcd}], 0x5, &(0x7f0000000680)=[@txtime={{0x18, 0x1, 0x3d, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1da54d63}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}], 0x78}, 0x40) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x7) [ 1556.038905][T24599] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1556.046705][T24599] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1556.054521][T24599] [ 1556.076063][T24640] FAULT_INJECTION: forcing a failure. [ 1556.076063][T24640] name failslab, interval 1, probability 0, space 0, times 0 11:51:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x900, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xf, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1556.092542][T24640] CPU: 0 PID: 24640 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1556.103340][T24640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1556.113242][T24640] Call Trace: [ 1556.116424][T24640] [ 1556.119139][T24640] dump_stack_lvl+0x151/0x1b7 [ 1556.123736][T24640] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1556.129034][T24640] dump_stack+0x15/0x17 [ 1556.133652][T24640] should_fail+0x3c0/0x510 [ 1556.137903][T24640] __should_failslab+0x9f/0xe0 [ 1556.142503][T24640] should_failslab+0x9/0x20 [ 1556.146839][T24640] kmem_cache_alloc+0x4f/0x2f0 [ 1556.151527][T24640] ? anon_vma_fork+0x1b9/0x4f0 [ 1556.156126][T24640] anon_vma_fork+0x1b9/0x4f0 [ 1556.160557][T24640] dup_mmap+0x750/0xea0 [ 1556.164561][T24640] ? __delayed_free_task+0x20/0x20 [ 1556.169492][T24640] ? mm_init+0x807/0x960 [ 1556.173572][T24640] dup_mm+0x91/0x330 [ 1556.177310][T24640] copy_mm+0x108/0x1b0 [ 1556.181212][T24640] copy_process+0x1295/0x3250 [ 1556.185724][T24640] ? proc_fail_nth_write+0x213/0x290 [ 1556.190843][T24640] ? proc_fail_nth_read+0x220/0x220 [ 1556.195877][T24640] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1556.200824][T24640] ? vfs_write+0x9af/0x1050 [ 1556.205192][T24640] ? vmacache_update+0xb7/0x120 [ 1556.209874][T24640] kernel_clone+0x22d/0x990 [ 1556.214191][T24640] ? file_end_write+0x1b0/0x1b0 [ 1556.218877][T24640] ? __kasan_check_write+0x14/0x20 [ 1556.223912][T24640] ? create_io_thread+0x1e0/0x1e0 [ 1556.228770][T24640] ? __mutex_lock_slowpath+0x10/0x10 [ 1556.233891][T24640] __x64_sys_clone+0x289/0x310 [ 1556.238493][T24640] ? __do_sys_vfork+0x130/0x130 [ 1556.243188][T24640] ? debug_smp_processor_id+0x17/0x20 [ 1556.248396][T24640] do_syscall_64+0x44/0xd0 [ 1556.252640][T24640] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1556.258366][T24640] RIP: 0033:0x7f65e6eb55a9 [ 1556.262624][T24640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1556.282074][T24640] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:50 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 63) 11:51:50 executing program 1: ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x5421, 0x1ffff000) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@name={0x1e, 0x2, 0x2, {{0x1, 0x1}, 0x2}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000040)="8650a10a2e136f4f000ec589d61513c1f900b6cc4d97add1ae21ef9f4378cf46a7088b723eb5eb61bb7f8831e10bb9345102b2f9d540f6a6c491388b2530594612dac06f2b809f02f697f0f106bf3139aadb91b945f1a9fc33367d0ea4ba1ec33b9081eb2e8db93030688dd014b674efbeec3f1ffe71602c485e378e524d61773d22f44ee44e79b3d2a9c8fce10e7a49f45bbebdd1e03b9b86597c1447766173b0c7170179a7504f3ee4509db5e9b6cdaef57dda385b9f2913b5e78fe39bcb90a769ac374d7174b32ec4757433b57ee4281de66b14ab8737e1b14d2aa6293d45248fa917434c600336791095f8b18a2d", 0xf0}, {&(0x7f0000000140)="a26f6617a9bbc8e6a6b8f50ff7a49113c72d806ad9d875ea3cab11c090b08178fc63f0a28a081b8956bc1aa30f0bba6ab1968cb4a06c076faf9d3189ca", 0x3d}, {&(0x7f0000000180)="6ce4792b6f9f7dc1a2b059744d4d927e18fb2ba5bc9547fb7d50033e25d9659b0380d13b02fe9f24cd94e0c67820a9d0cf2ba3238ff723fabc15abfec7380acc918e0f882079ce775aca1f941a735b43913c80895e091799f425000f9dc026b1b43822c4df06153386e6dce0d49082e4c7e17075fa706b3c0eb54c2f543e5fc8bf68ed2d6f3c44d6ea84515ba76fbf87237eac5597c451fee8206e9c7d94d99c6c2cc7d69b80ebae0c7e1d4b1e5e5e9c1a6ec56a18d97f4bb0de0fb7b0700e7ac6cc6d592909cd9a0503ef27dc7c76fcff1e3bda4d90f0e331b80f66c3", 0xdd}], 0x3, 0x0, 0x0, 0x140400c1}, 0x8c0) (async) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000300)="760cfcf22d7b3c20d5bd66fee76255a5fec8d64a90f3c4767b70ca17ef203c10c328fbe3a7a2bf79d7751e66d974d1b1e6c23e34e5f2a6cfc47c", 0x3a}, {&(0x7f0000000340)="71439f01ff58668453e61c265419d133264eef41a3be247f4721778195dc34d825bb77f606394517168aaf213c2ab88a6ca931ee79e1c8d40f6be5bf4bf64c211d5dd7ca14eba0f9411993afdf8695dfd99ef5fcdf513582e6daa0892780baa57aa84449e7901af9673f7a1d1c6dfbaa61f171569393273f82", 0x79}, {&(0x7f00000003c0)="0ff46d1dbc970e596b50efb9bcd5d2fa51355abd64ee037780c6cc849f0e2ce33290042de1b414cf74b73acd3f83193420b168033421d6b36e07aee7e09e8b02fdce2a9f446f65eb677cfe557b8ec8ed19f39e199643e8201dc4f2012520ce339debe769c03acb8f3b74e70a20a445ee77d4bab97929579a19e51586b6ad79e3880bab1b7ae0d820", 0x88}, {&(0x7f0000000480)="bdafbafcad30618473e911c060a3afb2dad1a0799b3e504477efbc95ebbff3c263a52087128515ae70da245a9cc49b1a0b8f373480f167cedc1a64cc2baa8f8cc79b4875b151d906d541962c4e25df0a3413b475d6411c061e3ee2b58ef00551441fa600513e60a37e8580bd77cfcd", 0x6f}, {&(0x7f0000000500)="f7c15fe4fdde70a5d25cae6448df5694c1c6404777e19a8cf9dbe543efa14b612c955a1ecfe1b0542940015fa135680134e7c84f5e58dbc962a0c3dbf2d586ec9ee1b54f8e77d21c0ea022634c17669850ac06c9c93b84c94d3cfff16a6b2532f805c5ed372e78672634cc51d5d358c45b1b12c655196db91a3a50148acf42066e58e2aaf3d0fadedf6cb91fc4808f82109305c1c74ce40755b25c6d61ade6395f317fe4334d0c932487cd5d96dd2d17f17636013d37a6cd95bb5dc10983b6271b9cf8dc9c05cfacebe78297a7", 0xcd}], 0x5, &(0x7f0000000680)=[@txtime={{0x18, 0x1, 0x3d, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x1da54d63}}, @mark={{0x14, 0x1, 0x24, 0x5}}, @timestamping={{0x14, 0x1, 0x25, 0x1f}}], 0x78}, 0x40) (async) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x7) 11:51:50 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.time\x00', 0x0, 0x0) (async) r1 = gettid() write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) (async, rerun: 64) r2 = syz_clone(0x41185100, &(0x7f0000000200)="39462508f16a411f297626c45044afabb6aa3ee3c4f0efb8faa171530a0bce688df568da96cd2422983fa7f40178db208ca986abb9d641b10a40677b296e7ac1159f958148385ef28f44656be713f3980a4b834298c91715b7b25b682da130980663f591c79e5f0bb48c82517ad75733d3121f78d2a01f284897f114a74da94fbaa2e4507f77483af619d33ab7bb4bec56f68c313fa10a717dfb09bff704eb369d8c28f8ad9d04a2938b56eba296994ac29868e2159bafcf32af", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000002c0)="295701008a04c8832c15d38e48532cccd297105ef88e5e22ec54312efff1d82c883dfe6e5d4af0f7a788b342f438f87d7f6ea1836bbf648005afba350000000000000000001f77df1f942089e3f61fcf8a6f16cf699a618f951d250e0c") (rerun: 64) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r2, 0xfffffffffffffdb8) (async) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180)=r2, 0x12) (async) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 11:51:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x57, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x57, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1556.290308][T24640] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1556.298123][T24640] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1556.305932][T24640] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1556.313838][T24640] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1556.321642][T24640] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1556.329455][T24640] 11:51:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1556.401008][T24675] FAULT_INJECTION: forcing a failure. [ 1556.401008][T24675] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1556.420582][T24675] CPU: 0 PID: 24675 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1556.430657][T24675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1556.440813][T24675] Call Trace: [ 1556.443934][T24675] [ 1556.446711][T24675] dump_stack_lvl+0x151/0x1b7 [ 1556.451227][T24675] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1556.456520][T24675] dump_stack+0x15/0x17 [ 1556.460518][T24675] should_fail+0x3c0/0x510 [ 1556.464763][T24675] should_fail_alloc_page+0x58/0x70 [ 1556.469802][T24675] __alloc_pages+0x1de/0x7c0 [ 1556.474225][T24675] ? __count_vm_events+0x30/0x30 [ 1556.479014][T24675] ? __this_cpu_preempt_check+0x13/0x20 [ 1556.484380][T24675] ? __mod_node_page_state+0xac/0xf0 [ 1556.489499][T24675] pte_alloc_one+0x73/0x1b0 [ 1556.493842][T24675] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1556.498873][T24675] __pte_alloc+0x86/0x350 [ 1556.503039][T24675] ? free_pgtables+0x210/0x210 [ 1556.507640][T24675] ? _raw_spin_lock+0xa3/0x1b0 [ 1556.512243][T24675] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1556.517451][T24675] ? __kernel_text_address+0x9a/0x110 [ 1556.522656][T24675] copy_pte_range+0x1b1f/0x20b0 [ 1556.527355][T24675] ? __kunmap_atomic+0x80/0x80 [ 1556.531939][T24675] ? __kasan_slab_alloc+0xc4/0xe0 [ 1556.536880][T24675] ? __kasan_slab_alloc+0xb2/0xe0 [ 1556.541665][T24675] ? kmem_cache_alloc+0x189/0x2f0 [ 1556.546527][T24675] ? vm_area_dup+0x26/0x1d0 [ 1556.550871][T24675] ? dup_mmap+0x6b8/0xea0 [ 1556.555034][T24675] ? dup_mm+0x91/0x330 [ 1556.558937][T24675] ? copy_mm+0x108/0x1b0 [ 1556.563017][T24675] ? copy_process+0x1295/0x3250 [ 1556.567706][T24675] ? kernel_clone+0x22d/0x990 [ 1556.572232][T24675] ? __x64_sys_clone+0x289/0x310 [ 1556.576994][T24675] ? do_syscall_64+0x44/0xd0 [ 1556.581423][T24675] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1556.587350][T24675] copy_page_range+0xc1e/0x1090 [ 1556.592005][T24675] ? pfn_valid+0x1e0/0x1e0 [ 1556.596263][T24675] dup_mmap+0x99f/0xea0 [ 1556.600251][T24675] ? __delayed_free_task+0x20/0x20 [ 1556.605201][T24675] ? mm_init+0x807/0x960 [ 1556.609275][T24675] dup_mm+0x91/0x330 [ 1556.613013][T24675] copy_mm+0x108/0x1b0 [ 1556.616915][T24675] copy_process+0x1295/0x3250 [ 1556.621431][T24675] ? proc_fail_nth_write+0x213/0x290 [ 1556.626675][T24675] ? proc_fail_nth_read+0x220/0x220 [ 1556.631702][T24675] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1556.636646][T24675] ? vfs_write+0x9af/0x1050 [ 1556.641011][T24675] ? vmacache_update+0xb7/0x120 [ 1556.645685][T24675] kernel_clone+0x22d/0x990 [ 1556.650008][T24675] ? file_end_write+0x1b0/0x1b0 [ 1556.654695][T24675] ? __kasan_check_write+0x14/0x20 [ 1556.659651][T24675] ? create_io_thread+0x1e0/0x1e0 [ 1556.664504][T24675] ? __mutex_lock_slowpath+0x10/0x10 [ 1556.669623][T24675] __x64_sys_clone+0x289/0x310 [ 1556.674222][T24675] ? __do_sys_vfork+0x130/0x130 [ 1556.678914][T24675] ? debug_smp_processor_id+0x17/0x20 [ 1556.684122][T24675] do_syscall_64+0x44/0xd0 [ 1556.688374][T24675] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1556.694102][T24675] RIP: 0033:0x7f65e6eb55a9 [ 1556.698356][T24675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1556.717799][T24675] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1556.726038][T24675] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1556.733881][T24675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1556.741663][T24675] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 11:51:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000080)=@raw=[@generic={0x6, 0x6, 0x8, 0x800, 0x1}, @func, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @call={0x85, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x4, 0x6, 0x7, 0x2, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2317e10d}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x2, 0x9, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000030000000000000000000000185a000007000000000000004000000010290200010000009500000000000000ee1a556ab7c9237f665078424eed2cf7a579ce9526b3b38cd6028aefd2926a0935561bb08281d1904dbefd670c6b93ed56e0e0a36ccdf23b9637de2147d480000000000000000e2634473ce0eeda19ca86e65ab1ed9566fe4c408989d42193255b62e03258b484906c0ebecbbdada6c72e111b498bf8e65286f7752825462a40341f34d1a197e08e63249672cb6fc8ee9743ae2ea5d1f0d92c1dc96319"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='xprtrdma_nomrs_err\x00', r2}, 0x10) close(r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x1, &(0x7f0000000480)=@raw=[@generic={0x3, 0x9, 0x2, 0x800, 0xef}], &(0x7f00000004c0)='GPL\x00', 0x8000, 0xf, &(0x7f0000000500)=""/15, 0x41100, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x3, 0xffffff81, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x25, 0x14}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r2, 0xffffffffffffffff, 0x4}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, r1, 0x20, 0x0, r2}, 0x14) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9a, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:51 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.time\x00', 0x0, 0x0) (async) r1 = gettid() write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) (async) r2 = syz_clone(0x41185100, &(0x7f0000000200)="39462508f16a411f297626c45044afabb6aa3ee3c4f0efb8faa171530a0bce688df568da96cd2422983fa7f40178db208ca986abb9d641b10a40677b296e7ac1159f958148385ef28f44656be713f3980a4b834298c91715b7b25b682da130980663f591c79e5f0bb48c82517ad75733d3121f78d2a01f284897f114a74da94fbaa2e4507f77483af619d33ab7bb4bec56f68c313fa10a717dfb09bff704eb369d8c28f8ad9d04a2938b56eba296994ac29868e2159bafcf32af", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000002c0)="295701008a04c8832c15d38e48532cccd297105ef88e5e22ec54312efff1d82c883dfe6e5d4af0f7a788b342f438f87d7f6ea1836bbf648005afba350000000000000000001f77df1f942089e3f61fcf8a6f16cf699a618f951d250e0c") write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0)=r2, 0xfffffffffffffdb8) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180)=r2, 0x12) (async) openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0) 11:51:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x64, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1556.749477][T24675] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1556.757287][T24675] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1556.765098][T24675] 11:51:51 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 64) 11:51:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'hsr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x0, 0x1, 0x40, 0x0, 0x3872, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0x14170, 0x7, 0x80000000, 0x6, 0x4, 0x2, 0x1, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x2) 11:51:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa6, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9a, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000080)=@raw=[@generic={0x6, 0x6, 0x8, 0x800, 0x1}, @func, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @call={0x85, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x4, 0x6, 0x7, 0x2, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2317e10d}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x2, 0x9, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000030000000000000000000000185a000007000000000000004000000010290200010000009500000000000000ee1a556ab7c9237f665078424eed2cf7a579ce9526b3b38cd6028aefd2926a0935561bb08281d1904dbefd670c6b93ed56e0e0a36ccdf23b9637de2147d480000000000000000e2634473ce0eeda19ca86e65ab1ed9566fe4c408989d42193255b62e03258b484906c0ebecbbdada6c72e111b498bf8e65286f7752825462a40341f34d1a197e08e63249672cb6fc8ee9743ae2ea5d1f0d92c1dc96319"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='xprtrdma_nomrs_err\x00', r2}, 0x10) close(r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x1, &(0x7f0000000480)=@raw=[@generic={0x3, 0x9, 0x2, 0x800, 0xef}], &(0x7f00000004c0)='GPL\x00', 0x8000, 0xf, &(0x7f0000000500)=""/15, 0x41100, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x3, 0xffffff81, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x25, 0x14}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r2, 0xffffffffffffffff, 0x4}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, r1, 0x20, 0x0, r2}, 0x14) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000080)=@raw=[@generic={0x6, 0x6, 0x8, 0x800, 0x1}, @func, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @call={0x85, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x4, 0x6, 0x7, 0x2, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2317e10d}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x2, 0x9, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000030000000000000000000000185a000007000000000000004000000010290200010000009500000000000000ee1a556ab7c9237f665078424eed2cf7a579ce9526b3b38cd6028aefd2926a0935561bb08281d1904dbefd670c6b93ed56e0e0a36ccdf23b9637de2147d480000000000000000e2634473ce0eeda19ca86e65ab1ed9566fe4c408989d42193255b62e03258b484906c0ebecbbdada6c72e111b498bf8e65286f7752825462a40341f34d1a197e08e63249672cb6fc8ee9743ae2ea5d1f0d92c1dc96319"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='xprtrdma_nomrs_err\x00', r2}, 0x10) (async) close(r3) (async) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x1, &(0x7f0000000480)=@raw=[@generic={0x3, 0x9, 0x2, 0x800, 0xef}], &(0x7f00000004c0)='GPL\x00', 0x8000, 0xf, &(0x7f0000000500)=""/15, 0x41100, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x3, 0xffffff81, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x25, 0x14}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r2, 0xffffffffffffffff, 0x4}, 0x10) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, r1, 0x20, 0x0, r2}, 0x14) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa6, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000080)=@raw=[@generic={0x6, 0x6, 0x8, 0x800, 0x1}, @func, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @call={0x85, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x4, 0x6, 0x7, 0x2, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2317e10d}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x2, 0x9, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000030000000000000000000000185a000007000000000000004000000010290200010000009500000000000000ee1a556ab7c9237f665078424eed2cf7a579ce9526b3b38cd6028aefd2926a0935561bb08281d1904dbefd670c6b93ed56e0e0a36ccdf23b9637de2147d480000000000000000e2634473ce0eeda19ca86e65ab1ed9566fe4c408989d42193255b62e03258b484906c0ebecbbdada6c72e111b498bf8e65286f7752825462a40341f34d1a197e08e63249672cb6fc8ee9743ae2ea5d1f0d92c1dc96319"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='xprtrdma_nomrs_err\x00', r2}, 0x10) close(r3) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x1, &(0x7f0000000480)=@raw=[@generic={0x3, 0x9, 0x2, 0x800, 0xef}], &(0x7f00000004c0)='GPL\x00', 0x8000, 0xf, &(0x7f0000000500)=""/15, 0x41100, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x3, 0xffffff81, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) r5 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x25, 0x14}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r2, 0xffffffffffffffff, 0x4}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, r1, 0x20, 0x0, r2}, 0x14) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000080)=@raw=[@generic={0x6, 0x6, 0x8, 0x800, 0x1}, @func, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @call={0x85, 0x0, 0x0, 0x4}, @jmp={0x5, 0x0, 0x4, 0x6, 0x7, 0x2, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0xb, 0x4, 0x0, 0x6}, @map_fd={0x18, 0x5, 0x1, 0x0, 0x1}, @map_val={0x18, 0x5, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2317e10d}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1f, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000100)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000140)={0x2, 0x2, 0x9, 0x3}, 0x10, 0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)=[0x1, 0xffffffffffffffff, 0x1, 0x1]}, 0x80) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000030000000000000000000000185a000007000000000000004000000010290200010000009500000000000000ee1a556ab7c9237f665078424eed2cf7a579ce9526b3b38cd6028aefd2926a0935561bb08281d1904dbefd670c6b93ed56e0e0a36ccdf23b9637de2147d480000000000000000e2634473ce0eeda19ca86e65ab1ed9566fe4c408989d42193255b62e03258b484906c0ebecbbdada6c72e111b498bf8e65286f7752825462a40341f34d1a197e08e63249672cb6fc8ee9743ae2ea5d1f0d92c1dc96319"], &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='xprtrdma_nomrs_err\x00', r2}, 0x10) (async) close(r3) (async) bpf$ITER_CREATE(0x21, &(0x7f00000005c0), 0x8) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x1, &(0x7f0000000480)=@raw=[@generic={0x3, 0x9, 0x2, 0x800, 0xef}], &(0x7f00000004c0)='GPL\x00', 0x8000, 0xf, &(0x7f0000000500)=""/15, 0x41100, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000540)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000580)={0x5, 0x3, 0xffffff81, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, r4, 0xffffffffffffffff]}, 0x80) (async) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x25, 0x14}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f00000002c0)={r5}, 0x8) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r2, 0xffffffffffffffff, 0x4}, 0x10) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000240)={@cgroup, r1, 0x20, 0x0, r2}, 0x14) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1100, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1556.824104][T24698] FAULT_INJECTION: forcing a failure. [ 1556.824104][T24698] name failslab, interval 1, probability 0, space 0, times 0 [ 1556.861208][T24698] CPU: 1 PID: 24698 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 11:51:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'hsr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x0, 0x1, 0x40, 0x0, 0x3872, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0x14170, 0x7, 0x80000000, 0x6, 0x4, 0x2, 0x1, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x2) [ 1556.871285][T24698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1556.881179][T24698] Call Trace: [ 1556.884304][T24698] [ 1556.887081][T24698] dump_stack_lvl+0x151/0x1b7 [ 1556.891593][T24698] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1556.896904][T24698] dump_stack+0x15/0x17 [ 1556.900880][T24698] should_fail+0x3c0/0x510 [ 1556.905138][T24698] __should_failslab+0x9f/0xe0 [ 1556.909732][T24698] should_failslab+0x9/0x20 [ 1556.914070][T24698] kmem_cache_alloc+0x4f/0x2f0 [ 1556.918669][T24698] ? vm_area_dup+0x26/0x1d0 [ 1556.923015][T24698] vm_area_dup+0x26/0x1d0 [ 1556.927179][T24698] dup_mmap+0x6b8/0xea0 [ 1556.931174][T24698] ? __delayed_free_task+0x20/0x20 [ 1556.936117][T24698] ? mm_init+0x807/0x960 [ 1556.940192][T24698] dup_mm+0x91/0x330 [ 1556.943928][T24698] copy_mm+0x108/0x1b0 [ 1556.947831][T24698] copy_process+0x1295/0x3250 [ 1556.952343][T24698] ? proc_fail_nth_write+0x213/0x290 [ 1556.957470][T24698] ? proc_fail_nth_read+0x220/0x220 [ 1556.962498][T24698] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1556.967445][T24698] ? vfs_write+0x9af/0x1050 [ 1556.971792][T24698] ? vmacache_update+0xb7/0x120 [ 1556.976472][T24698] kernel_clone+0x22d/0x990 [ 1556.980812][T24698] ? file_end_write+0x1b0/0x1b0 [ 1556.985499][T24698] ? __kasan_check_write+0x14/0x20 [ 1556.990446][T24698] ? create_io_thread+0x1e0/0x1e0 [ 1556.995305][T24698] ? __mutex_lock_slowpath+0x10/0x10 [ 1557.000555][T24698] __x64_sys_clone+0x289/0x310 [ 1557.005149][T24698] ? __do_sys_vfork+0x130/0x130 [ 1557.009834][T24698] ? debug_smp_processor_id+0x17/0x20 [ 1557.015043][T24698] do_syscall_64+0x44/0xd0 [ 1557.019298][T24698] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1557.025025][T24698] RIP: 0033:0x7f65e6eb55a9 [ 1557.029283][T24698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1557.048724][T24698] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1557.056965][T24698] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1557.064778][T24698] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:51 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 65) 11:51:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'hsr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x0, 0x1, 0x40, 0x0, 0x3872, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0x14170, 0x7, 0x80000000, 0x6, 0x4, 0x2, 0x1, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x2) openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) (async) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000100)={'hsr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) (async) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) (async) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) (async) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x0, 0x1, 0x40, 0x0, 0x3872, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0x14170, 0x7, 0x80000000, 0x6, 0x4, 0x2, 0x1, 0x0, 0x5, 0x0, 0x7}, 0x0, 0x7, 0xffffffffffffffff, 0x2) (async) 11:51:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1200, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1557.072589][T24698] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1557.080400][T24698] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1557.088210][T24698] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1557.096024][T24698] [ 1557.113008][T24745] FAULT_INJECTION: forcing a failure. 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2000019a, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1557.113008][T24745] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1557.128500][T24745] CPU: 1 PID: 24745 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1557.138570][T24745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1557.148464][T24745] Call Trace: [ 1557.151585][T24745] [ 1557.154367][T24745] dump_stack_lvl+0x151/0x1b7 [ 1557.158883][T24745] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1557.164171][T24745] ? __switch_to+0x617/0x1170 [ 1557.168683][T24745] ? native_set_ldt+0x360/0x360 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200001a5, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:51 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200001e1, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1557.173376][T24745] dump_stack+0x15/0x17 [ 1557.177370][T24745] should_fail+0x3c0/0x510 [ 1557.181621][T24745] should_fail_alloc_page+0x58/0x70 [ 1557.186655][T24745] __alloc_pages+0x1de/0x7c0 [ 1557.191084][T24745] ? __count_vm_events+0x30/0x30 [ 1557.195853][T24745] ? __this_cpu_preempt_check+0x13/0x20 [ 1557.201234][T24745] pte_alloc_one+0x73/0x1b0 [ 1557.205576][T24745] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1557.210607][T24745] ? preempt_schedule+0xd9/0xe0 [ 1557.215290][T24745] ? preempt_schedule_common+0xcb/0x100 [ 1557.220678][T24745] __pte_alloc+0x86/0x350 [ 1557.224844][T24745] ? free_pgtables+0x210/0x210 [ 1557.229441][T24745] ? _raw_spin_lock+0xa3/0x1b0 [ 1557.234039][T24745] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1557.239246][T24745] ? preempt_schedule_thunk+0x16/0x18 [ 1557.244452][T24745] copy_pte_range+0x1b1f/0x20b0 [ 1557.249141][T24745] ? __kunmap_atomic+0x80/0x80 [ 1557.253743][T24745] ? __kasan_slab_alloc+0xc4/0xe0 [ 1557.258599][T24745] ? __kasan_slab_alloc+0xb2/0xe0 [ 1557.263459][T24745] ? kmem_cache_alloc+0x189/0x2f0 [ 1557.268319][T24745] ? vm_area_dup+0x26/0x1d0 [ 1557.272660][T24745] ? dup_mmap+0x6b8/0xea0 [ 1557.276825][T24745] ? dup_mm+0x91/0x330 [ 1557.280733][T24745] ? copy_mm+0x108/0x1b0 [ 1557.284808][T24745] ? copy_process+0x1295/0x3250 [ 1557.289496][T24745] ? kernel_clone+0x22d/0x990 [ 1557.294013][T24745] ? __x64_sys_clone+0x289/0x310 [ 1557.298783][T24745] ? do_syscall_64+0x44/0xd0 [ 1557.303212][T24745] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1557.309115][T24745] copy_page_range+0xc1e/0x1090 [ 1557.313803][T24745] ? pfn_valid+0x1e0/0x1e0 [ 1557.318054][T24745] dup_mmap+0x99f/0xea0 [ 1557.322046][T24745] ? __delayed_free_task+0x20/0x20 [ 1557.326991][T24745] ? mm_init+0x807/0x960 [ 1557.331073][T24745] dup_mm+0x91/0x330 [ 1557.334804][T24745] copy_mm+0x108/0x1b0 [ 1557.338709][T24745] copy_process+0x1295/0x3250 [ 1557.343226][T24745] ? proc_fail_nth_write+0x213/0x290 [ 1557.348342][T24745] ? proc_fail_nth_read+0x220/0x220 [ 1557.353378][T24745] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1557.358327][T24745] ? vfs_write+0x9af/0x1050 [ 1557.362664][T24745] ? vmacache_update+0xb7/0x120 [ 1557.367352][T24745] kernel_clone+0x22d/0x990 [ 1557.371695][T24745] ? file_end_write+0x1b0/0x1b0 [ 1557.376382][T24745] ? __kasan_check_write+0x14/0x20 [ 1557.381326][T24745] ? create_io_thread+0x1e0/0x1e0 [ 1557.386183][T24745] ? __mutex_lock_slowpath+0x10/0x10 [ 1557.391306][T24745] __x64_sys_clone+0x289/0x310 [ 1557.395907][T24745] ? __do_sys_vfork+0x130/0x130 [ 1557.400593][T24745] ? debug_smp_processor_id+0x17/0x20 [ 1557.405801][T24745] do_syscall_64+0x44/0xd0 [ 1557.410056][T24745] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1557.415781][T24745] RIP: 0033:0x7f65e6eb55a9 [ 1557.420037][T24745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1557.439478][T24745] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1557.447722][T24745] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1557.455538][T24745] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1557.463346][T24745] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 11:51:51 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 66) 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x2000019a, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:51 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') 11:51:51 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) 11:51:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200001a5, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1557.471157][T24745] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1557.478969][T24745] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1557.486783][T24745] [ 1557.505706][T24776] FAULT_INJECTION: forcing a failure. [ 1557.505706][T24776] name failslab, interval 1, probability 0, space 0, times 0 11:51:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xf, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) (async) 11:51:52 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') 11:51:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2100, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1557.527437][T24776] CPU: 1 PID: 24776 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1557.537516][T24776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1557.547408][T24776] Call Trace: [ 1557.550527][T24776] [ 1557.553307][T24776] dump_stack_lvl+0x151/0x1b7 [ 1557.557816][T24776] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1557.563120][T24776] dump_stack+0x15/0x17 [ 1557.567108][T24776] should_fail+0x3c0/0x510 [ 1557.571361][T24776] __should_failslab+0x9f/0xe0 [ 1557.575968][T24776] should_failslab+0x9/0x20 [ 1557.580302][T24776] kmem_cache_alloc+0x4f/0x2f0 [ 1557.584901][T24776] ? vm_area_dup+0x26/0x1d0 [ 1557.589244][T24776] vm_area_dup+0x26/0x1d0 [ 1557.593404][T24776] dup_mmap+0x6b8/0xea0 [ 1557.597401][T24776] ? __delayed_free_task+0x20/0x20 [ 1557.602347][T24776] ? mm_init+0x807/0x960 [ 1557.606427][T24776] dup_mm+0x91/0x330 [ 1557.610154][T24776] copy_mm+0x108/0x1b0 [ 1557.614058][T24776] copy_process+0x1295/0x3250 [ 1557.618573][T24776] ? proc_fail_nth_write+0x213/0x290 [ 1557.623698][T24776] ? proc_fail_nth_read+0x220/0x220 [ 1557.628731][T24776] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1557.633680][T24776] ? vfs_write+0x9af/0x1050 [ 1557.638016][T24776] ? vmacache_update+0xb7/0x120 [ 1557.642705][T24776] kernel_clone+0x22d/0x990 [ 1557.647041][T24776] ? file_end_write+0x1b0/0x1b0 [ 1557.651728][T24776] ? __kasan_check_write+0x14/0x20 [ 1557.656758][T24776] ? create_io_thread+0x1e0/0x1e0 [ 1557.661621][T24776] ? __mutex_lock_slowpath+0x10/0x10 [ 1557.666740][T24776] __x64_sys_clone+0x289/0x310 [ 1557.671341][T24776] ? __do_sys_vfork+0x130/0x130 [ 1557.676029][T24776] ? debug_smp_processor_id+0x17/0x20 [ 1557.681237][T24776] do_syscall_64+0x44/0xd0 [ 1557.685489][T24776] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1557.691225][T24776] RIP: 0033:0x7f65e6eb55a9 [ 1557.695473][T24776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1557.714913][T24776] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:52 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 67) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200001e1, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x57, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2500, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:52 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = gettid() syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/pid_for_children\x00') 11:51:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000000)=0x5) (async) [ 1557.723251][T24776] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1557.731060][T24776] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1557.738870][T24776] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1557.746680][T24776] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1557.754489][T24776] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1557.762304][T24776] 11:51:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000100)="454b1f1faa1716a2325b1c2201c0a8db9bf2698dc36269daeb8ef1cc4ad542e87a1fa9a531938ea53e4520cd9e3d602b558cda73da0085afc54bf301aae481da26ac65f00aafd626830d068eb4e77ac4a9284d9d31c3ebca9f7fb369bd304f03d0ace1201062a1b86f1b30e8235f870824ab08055290", &(0x7f0000000180)=""/169}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x7a, 0x4, 0xff, 0x0, 0x1000, 0x40200, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000280), 0x9}, 0x6003, 0x6, 0xf, 0x5, 0x4, 0x36, 0x9f0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000340)={0x3, 0x80, 0x1, 0x80, 0x8e, 0x0, 0x0, 0x80, 0x10020, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x200, 0x10001}, 0x401, 0x1, 0x7f, 0x9, 0x3, 0xffffffff, 0xfff7, 0x0, 0x7, 0x0, 0x100000001}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0)={r2}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000080)={0x1, 0x80, 0x9, 0xff, 0x8, 0xcf, 0x0, 0x3, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfee3, 0x0, @perf_config_ext={0x8361, 0x80}, 0xc14aa8ef8b83bc0f, 0x10000, 0xfffffffe, 0x6, 0x6, 0x41, 0xfff8, 0x0, 0x8000, 0x0, 0x2}) 11:51:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x64, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x1}, 0x10) r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/8, 0x8}, {&(0x7f00000002c0)=""/110, 0x6e}], 0x2, &(0x7f0000000380)=""/221, 0xdd}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='*(@\'\x00'}, 0x30) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x7f, 0x9, 0x27, 0x8, 0x0, 0x6b, 0x30209, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x200, 0x3}, 0x2, 0x3, 0x6000000, 0x223b64824bd531b3, 0x4, 0x10001, 0x9, 0x0, 0x8, 0x0, 0x7fffffffffffffff}, r0, 0x8, r1, 0xd) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x1e}, 0x10) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x18, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1557.787037][T24811] FAULT_INJECTION: forcing a failure. [ 1557.787037][T24811] name failslab, interval 1, probability 0, space 0, times 0 [ 1557.810050][T24811] CPU: 1 PID: 24811 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1557.820121][T24811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1557.830016][T24811] Call Trace: [ 1557.833140][T24811] [ 1557.835922][T24811] dump_stack_lvl+0x151/0x1b7 [ 1557.840431][T24811] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1557.845728][T24811] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 1557.851977][T24811] dump_stack+0x15/0x17 [ 1557.855971][T24811] should_fail+0x3c0/0x510 [ 1557.860217][T24811] __should_failslab+0x9f/0xe0 [ 1557.864813][T24811] should_failslab+0x9/0x20 [ 1557.869154][T24811] kmem_cache_alloc+0x4f/0x2f0 [ 1557.873753][T24811] ? anon_vma_fork+0xf7/0x4f0 [ 1557.878270][T24811] anon_vma_fork+0xf7/0x4f0 [ 1557.882612][T24811] ? anon_vma_name+0x43/0x70 [ 1557.887038][T24811] dup_mmap+0x750/0xea0 [ 1557.891027][T24811] ? __delayed_free_task+0x20/0x20 [ 1557.895973][T24811] ? mm_init+0x807/0x960 [ 1557.900053][T24811] dup_mm+0x91/0x330 [ 1557.903786][T24811] copy_mm+0x108/0x1b0 [ 1557.907693][T24811] copy_process+0x1295/0x3250 [ 1557.912207][T24811] ? proc_fail_nth_write+0x213/0x290 [ 1557.917325][T24811] ? proc_fail_nth_read+0x220/0x220 [ 1557.922359][T24811] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1557.927305][T24811] ? vfs_write+0x9af/0x1050 [ 1557.931645][T24811] ? vmacache_update+0xb7/0x120 [ 1557.936332][T24811] kernel_clone+0x22d/0x990 [ 1557.940671][T24811] ? file_end_write+0x1b0/0x1b0 [ 1557.945359][T24811] ? __kasan_check_write+0x14/0x20 [ 1557.950307][T24811] ? create_io_thread+0x1e0/0x1e0 [ 1557.955173][T24811] ? __mutex_lock_slowpath+0x10/0x10 [ 1557.960289][T24811] __x64_sys_clone+0x289/0x310 [ 1557.964907][T24811] ? __do_sys_vfork+0x130/0x130 [ 1557.969585][T24811] ? debug_smp_processor_id+0x17/0x20 [ 1557.974786][T24811] do_syscall_64+0x44/0xd0 [ 1557.979038][T24811] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1557.984765][T24811] RIP: 0033:0x7f65e6eb55a9 [ 1557.989018][T24811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1558.008488][T24811] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1558.016704][T24811] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1558.024515][T24811] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:52 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 68) 11:51:52 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x1}, 0x10) (async) r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/8, 0x8}, {&(0x7f00000002c0)=""/110, 0x6e}], 0x2, &(0x7f0000000380)=""/221, 0xdd}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='*(@\'\x00'}, 0x30) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x7f, 0x9, 0x27, 0x8, 0x0, 0x6b, 0x30209, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x200, 0x3}, 0x2, 0x3, 0x6000000, 0x223b64824bd531b3, 0x4, 0x10001, 0x9, 0x0, 0x8, 0x0, 0x7fffffffffffffff}, r0, 0x8, r1, 0xd) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x1e}, 0x10) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000100)="454b1f1faa1716a2325b1c2201c0a8db9bf2698dc36269daeb8ef1cc4ad542e87a1fa9a531938ea53e4520cd9e3d602b558cda73da0085afc54bf301aae481da26ac65f00aafd626830d068eb4e77ac4a9284d9d31c3ebca9f7fb369bd304f03d0ace1201062a1b86f1b30e8235f870824ab08055290", &(0x7f0000000180)=""/169}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x7a, 0x4, 0xff, 0x0, 0x1000, 0x40200, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000280), 0x9}, 0x6003, 0x6, 0xf, 0x5, 0x4, 0x36, 0x9f0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000340)={0x3, 0x80, 0x1, 0x80, 0x8e, 0x0, 0x0, 0x80, 0x10020, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x200, 0x10001}, 0x401, 0x1, 0x7f, 0x9, 0x3, 0xffffffff, 0xfff7, 0x0, 0x7, 0x0, 0x100000001}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0)={r2}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000080)={0x1, 0x80, 0x9, 0xff, 0x8, 0xcf, 0x0, 0x3, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfee3, 0x0, @perf_config_ext={0x8361, 0x80}, 0xc14aa8ef8b83bc0f, 0x10000, 0xfffffffe, 0x6, 0x6, 0x41, 0xfff8, 0x0, 0x8000, 0x0, 0x2}) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000100)="454b1f1faa1716a2325b1c2201c0a8db9bf2698dc36269daeb8ef1cc4ad542e87a1fa9a531938ea53e4520cd9e3d602b558cda73da0085afc54bf301aae481da26ac65f00aafd626830d068eb4e77ac4a9284d9d31c3ebca9f7fb369bd304f03d0ace1201062a1b86f1b30e8235f870824ab08055290", &(0x7f0000000180)=""/169}, 0x20) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x7a, 0x4, 0xff, 0x0, 0x1000, 0x40200, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000280), 0x9}, 0x6003, 0x6, 0xf, 0x5, 0x4, 0x36, 0x9f0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000340)={0x3, 0x80, 0x1, 0x80, 0x8e, 0x0, 0x0, 0x80, 0x10020, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x200, 0x10001}, 0x401, 0x1, 0x7f, 0x9, 0x3, 0xffffffff, 0xfff7, 0x0, 0x7, 0x0, 0x100000001}) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0)={r2}, 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r4}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000080)={0x1, 0x80, 0x9, 0xff, 0x8, 0xcf, 0x0, 0x3, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfee3, 0x0, @perf_config_ext={0x8361, 0x80}, 0xc14aa8ef8b83bc0f, 0x10000, 0xfffffffe, 0x6, 0x6, 0x41, 0xfff8, 0x0, 0x8000, 0x0, 0x2}) (async) 11:51:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9a, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa6, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4300, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1558.032325][T24811] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1558.040138][T24811] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1558.047952][T24811] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1558.055765][T24811] 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 0: bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x1}, 0x10) r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/8, 0x8}, {&(0x7f00000002c0)=""/110, 0x6e}], 0x2, &(0x7f0000000380)=""/221, 0xdd}, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='*(@\'\x00'}, 0x30) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x7f, 0x9, 0x27, 0x8, 0x0, 0x6b, 0x30209, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x200, 0x3}, 0x2, 0x3, 0x6000000, 0x223b64824bd531b3, 0x4, 0x10001, 0x9, 0x0, 0x8, 0x0, 0x7fffffffffffffff}, r0, 0x8, r1, 0xd) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x1e}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x1}, 0x10) (async) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000280)=""/8, 0x8}, {&(0x7f00000002c0)=""/110, 0x6e}], 0x2, &(0x7f0000000380)=""/221, 0xdd}, 0x20) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000080)='*(@\'\x00'}, 0x30) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r2, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x7f, 0x9, 0x27, 0x8, 0x0, 0x6b, 0x30209, 0x9, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x200, 0x3}, 0x2, 0x3, 0x6000000, 0x223b64824bd531b3, 0x4, 0x10001, 0x9, 0x0, 0x8, 0x0, 0x7fffffffffffffff}, r0, 0x8, r1, 0xd) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000100), 0x8) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000140)={0xffffffffffffffff, r3, 0x1e}, 0x10) (async) 11:51:52 executing program 1: r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000100)="454b1f1faa1716a2325b1c2201c0a8db9bf2698dc36269daeb8ef1cc4ad542e87a1fa9a531938ea53e4520cd9e3d602b558cda73da0085afc54bf301aae481da26ac65f00aafd626830d068eb4e77ac4a9284d9d31c3ebca9f7fb369bd304f03d0ace1201062a1b86f1b30e8235f870824ab08055290", &(0x7f0000000180)=""/169}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) r3 = perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x7a, 0x4, 0xff, 0x0, 0x1000, 0x40200, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000280), 0x9}, 0x6003, 0x6, 0xf, 0x5, 0x4, 0x36, 0x9f0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000340)={0x3, 0x80, 0x1, 0x80, 0x8e, 0x0, 0x0, 0x80, 0x10020, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x200, 0x10001}, 0x401, 0x1, 0x7f, 0x9, 0x3, 0xffffffff, 0xfff7, 0x0, 0x7, 0x0, 0x100000001}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0)={r2}, 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000080)={0x1, 0x80, 0x9, 0xff, 0x8, 0xcf, 0x0, 0x3, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfee3, 0x0, @perf_config_ext={0x8361, 0x80}, 0xc14aa8ef8b83bc0f, 0x10000, 0xfffffffe, 0x6, 0x6, 0x41, 0xfff8, 0x0, 0x8000, 0x0, 0x2}) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r0, &(0x7f0000000100)="454b1f1faa1716a2325b1c2201c0a8db9bf2698dc36269daeb8ef1cc4ad542e87a1fa9a531938ea53e4520cd9e3d602b558cda73da0085afc54bf301aae481da26ac65f00aafd626830d068eb4e77ac4a9284d9d31c3ebca9f7fb369bd304f03d0ace1201062a1b86f1b30e8235f870824ab08055290", &(0x7f0000000180)=""/169}, 0x20) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff000) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x0, 0x7a, 0x4, 0xff, 0x0, 0x1000, 0x40200, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x4, 0x4, @perf_bp={&(0x7f0000000280), 0x9}, 0x6003, 0x6, 0xf, 0x5, 0x4, 0x36, 0x9f0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000340)={0x3, 0x80, 0x1, 0x80, 0x8e, 0x0, 0x0, 0x80, 0x10020, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x200, 0x10001}, 0x401, 0x1, 0x7f, 0x9, 0x3, 0xffffffff, 0xfff7, 0x0, 0x7, 0x0, 0x100000001}) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$ITER_CREATE(0x21, &(0x7f00000041c0)={r2}, 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r4}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000080)={0x1, 0x80, 0x9, 0xff, 0x8, 0xcf, 0x0, 0x3, 0x400, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfee3, 0x0, @perf_config_ext={0x8361, 0x80}, 0xc14aa8ef8b83bc0f, 0x10000, 0xfffffffe, 0x6, 0x6, 0x41, 0xfff8, 0x0, 0x8000, 0x0, 0x2}) (async) 11:51:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1558.094940][T24860] FAULT_INJECTION: forcing a failure. [ 1558.094940][T24860] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1558.127654][T24860] CPU: 1 PID: 24860 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1558.137733][T24860] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1558.147626][T24860] Call Trace: [ 1558.150747][T24860] [ 1558.153525][T24860] dump_stack_lvl+0x151/0x1b7 [ 1558.158040][T24860] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1558.163333][T24860] dump_stack+0x15/0x17 [ 1558.167328][T24860] should_fail+0x3c0/0x510 [ 1558.171582][T24860] should_fail_alloc_page+0x58/0x70 [ 1558.176611][T24860] __alloc_pages+0x1de/0x7c0 [ 1558.181038][T24860] ? __count_vm_events+0x30/0x30 [ 1558.185809][T24860] ? __this_cpu_preempt_check+0x13/0x20 [ 1558.191308][T24860] ? __mod_node_page_state+0xac/0xf0 [ 1558.196430][T24860] pte_alloc_one+0x73/0x1b0 [ 1558.200771][T24860] ? pfn_modify_allowed+0x2e0/0x2e0 [ 1558.205804][T24860] __pte_alloc+0x86/0x350 [ 1558.209971][T24860] ? free_pgtables+0x210/0x210 [ 1558.214568][T24860] ? _raw_spin_lock+0xa3/0x1b0 [ 1558.219174][T24860] ? _raw_spin_trylock_bh+0x1d0/0x1d0 [ 1558.224379][T24860] ? __kernel_text_address+0x9a/0x110 [ 1558.229583][T24860] copy_pte_range+0x1b1f/0x20b0 [ 1558.234275][T24860] ? __kunmap_atomic+0x80/0x80 [ 1558.238890][T24860] ? __kasan_slab_alloc+0xc4/0xe0 [ 1558.243731][T24860] ? __kasan_slab_alloc+0xb2/0xe0 [ 1558.248592][T24860] ? kmem_cache_alloc+0x189/0x2f0 [ 1558.253455][T24860] ? vm_area_dup+0x26/0x1d0 [ 1558.257791][T24860] ? dup_mmap+0x6b8/0xea0 [ 1558.261957][T24860] ? dup_mm+0x91/0x330 [ 1558.265862][T24860] ? copy_mm+0x108/0x1b0 [ 1558.269944][T24860] ? copy_process+0x1295/0x3250 [ 1558.274631][T24860] ? kernel_clone+0x22d/0x990 [ 1558.279141][T24860] ? __x64_sys_clone+0x289/0x310 [ 1558.283918][T24860] ? do_syscall_64+0x44/0xd0 [ 1558.288344][T24860] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1558.294247][T24860] copy_page_range+0xc1e/0x1090 [ 1558.298940][T24860] ? pfn_valid+0x1e0/0x1e0 [ 1558.303193][T24860] dup_mmap+0x99f/0xea0 [ 1558.307177][T24860] ? __delayed_free_task+0x20/0x20 [ 1558.312130][T24860] ? mm_init+0x807/0x960 [ 1558.316206][T24860] dup_mm+0x91/0x330 [ 1558.319958][T24860] copy_mm+0x108/0x1b0 [ 1558.323840][T24860] copy_process+0x1295/0x3250 [ 1558.328361][T24860] ? proc_fail_nth_write+0x213/0x290 [ 1558.333494][T24860] ? proc_fail_nth_read+0x220/0x220 [ 1558.338514][T24860] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1558.343462][T24860] ? vfs_write+0x9af/0x1050 [ 1558.347807][T24860] ? vmacache_update+0xb7/0x120 [ 1558.352486][T24860] kernel_clone+0x22d/0x990 [ 1558.356823][T24860] ? file_end_write+0x1b0/0x1b0 [ 1558.361597][T24860] ? __kasan_check_write+0x14/0x20 [ 1558.366544][T24860] ? create_io_thread+0x1e0/0x1e0 [ 1558.371405][T24860] ? __mutex_lock_slowpath+0x10/0x10 [ 1558.376526][T24860] __x64_sys_clone+0x289/0x310 [ 1558.381128][T24860] ? __do_sys_vfork+0x130/0x130 [ 1558.385815][T24860] ? debug_smp_processor_id+0x17/0x20 [ 1558.391022][T24860] do_syscall_64+0x44/0xd0 [ 1558.395305][T24860] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1558.401008][T24860] RIP: 0033:0x7f65e6eb55a9 [ 1558.405256][T24860] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1558.424785][T24860] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1558.433026][T24860] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 11:51:52 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 69) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 0: getpid() syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) sendmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000080)="bb01e3ad", 0x4}, {&(0x7f00000000c0)="24d4bf5f0c5a64dfd2af1931f7c1de0294d448914446e1105ac53f55c478c127df8f0b6ee07a17502db8a90e569f6fc7192216106210fbb1d78c1516e7f1a1e393dc5b68d73d6858e2468011344931356e77c32e293cebd0da37e3a494f4bed7b8676e710286ff89dc4451bfbf4a9ffeeb15a84fceb76a757b21cf33f60e7ff63b8c2d2dd6e42b5d86369eecdf6da0ea1cc88bf09d071eba8a814e16ff1805497f2dc674809d8df7760a1858d2fd6797e66eb03851ddf32807a12e04b72f4b0a3ed116bfc0f657c36ae47f16c116b7bcf80a868c88efc70b73492c524ccabf312201ebab4f8d65cae280a1", 0xeb}, {&(0x7f00000001c0)="0db88a1beb80a3a39a2cf10380b3c5bd730f828328e5f8573596eb1296c3c77126ad2e586d5eec6d625b6eb8d1d6a2c5681ce981b93f3e43dc15e75075fe82e0dc326622d029660e0d43a2ba9ba8b781e675aa1a044d1e863bf4d41a30d3817be9ea6cc77040c1c1441cefd9991047917b1cddcda07eea330117add5b989950d318f950bdaacbbc72ae7f16fdd32fe82d3e5dbe5024df787d66c8164d182da65de35eb5159c316695664d1bb316b93c31ea7488cca1fde23d930e01d89d58f7491cdb7635670d8e738c3df3c52f9d29f06a53cc0df64c4bc300c", 0xda}, {&(0x7f00000002c0)="d75a7bb7747c6da47a7ff31dd57e2afde65580550c593966dc66bb", 0x1b}, {&(0x7f0000000300)="6660a70302664afdf865e1050a23a9dce733fbde4095e0dbbb0f7be988693c77481f757390905c8c2291ab28bf334fb294c25046f78b769750c95834274e1b1535fb090f5ba11da7e4bb3044ef76f2671a27671e76d5d5df65cf2ae6a95cc07b9c00b0087197e6fd191a973da2053fafd6fedd2dd0660dbf2b277c9b25a016cb080a90d1259310f1255fe5c4cc435cdded2a7d025735111fa079ba27d317589f9a7d34d16e4aec07f2f5655ef239aef8967bb8737c49711246ba31017fc239aa52cd65b5c4f98d1e0cbbf45cc9f4b468c4c11eca4d4c493426d558f7d871140831fb1144719df1bae410ae1b2e31ac2def6411e5da71f301aa9b7b5fab50", 0xfe}], 0x5, &(0x7f0000000480)=[{0x18, 0x10d, 0x6, "e48576af"}, {0xd8, 0x0, 0x3f, "6de57f92029ab4f43f06f845d77c4e8bf46058ddb171dda54cd6a4be9ace2ea3e252a27f839e3331aa8366feb483801edc5147fc33c265418847d3cf8dc31e938f0bbda9ba587308e06b412b2e60f0cbe573cd80d64dc3fc4fc66d7c811a6925ff12ef7238f0524699c64f547d94662d8a13eafd810fce9ddead563a417c91aa659d28a1e12aac52ebad5edf8a9b34efcadfc83417ba133b4334b5b8e3f4070c3f14eb99e70dc8286afc335c67b53982867bf3459bb112446315f630e1d65abf8aa6275d"}], 0xf0}, 0x40005) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 11:51:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x18}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1558.440839][T24860] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1558.448650][T24860] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1558.456548][T24860] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1558.464359][T24860] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1558.472175][T24860] 11:51:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3e}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:52 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) sendmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000080)="bb01e3ad", 0x4}, {&(0x7f00000000c0)="24d4bf5f0c5a64dfd2af1931f7c1de0294d448914446e1105ac53f55c478c127df8f0b6ee07a17502db8a90e569f6fc7192216106210fbb1d78c1516e7f1a1e393dc5b68d73d6858e2468011344931356e77c32e293cebd0da37e3a494f4bed7b8676e710286ff89dc4451bfbf4a9ffeeb15a84fceb76a757b21cf33f60e7ff63b8c2d2dd6e42b5d86369eecdf6da0ea1cc88bf09d071eba8a814e16ff1805497f2dc674809d8df7760a1858d2fd6797e66eb03851ddf32807a12e04b72f4b0a3ed116bfc0f657c36ae47f16c116b7bcf80a868c88efc70b73492c524ccabf312201ebab4f8d65cae280a1", 0xeb}, {&(0x7f00000001c0)="0db88a1beb80a3a39a2cf10380b3c5bd730f828328e5f8573596eb1296c3c77126ad2e586d5eec6d625b6eb8d1d6a2c5681ce981b93f3e43dc15e75075fe82e0dc326622d029660e0d43a2ba9ba8b781e675aa1a044d1e863bf4d41a30d3817be9ea6cc77040c1c1441cefd9991047917b1cddcda07eea330117add5b989950d318f950bdaacbbc72ae7f16fdd32fe82d3e5dbe5024df787d66c8164d182da65de35eb5159c316695664d1bb316b93c31ea7488cca1fde23d930e01d89d58f7491cdb7635670d8e738c3df3c52f9d29f06a53cc0df64c4bc300c", 0xda}, {&(0x7f00000002c0)="d75a7bb7747c6da47a7ff31dd57e2afde65580550c593966dc66bb", 0x1b}, {&(0x7f0000000300)="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", 0xfe}], 0x5, &(0x7f0000000480)=[{0x18, 0x10d, 0x6, "e48576af"}, {0xd8, 0x0, 0x3f, "6de57f92029ab4f43f06f845d77c4e8bf46058ddb171dda54cd6a4be9ace2ea3e252a27f839e3331aa8366feb483801edc5147fc33c265418847d3cf8dc31e938f0bbda9ba587308e06b412b2e60f0cbe573cd80d64dc3fc4fc66d7c811a6925ff12ef7238f0524699c64f547d94662d8a13eafd810fce9ddead563a417c91aa659d28a1e12aac52ebad5edf8a9b34efcadfc83417ba133b4334b5b8e3f4070c3f14eb99e70dc8286afc335c67b53982867bf3459bb112446315f630e1d65abf8aa6275d"}], 0xf0}, 0x40005) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 11:51:53 executing program 0: getpid() (async, rerun: 64) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) [ 1558.502929][T24913] FAULT_INJECTION: forcing a failure. [ 1558.502929][T24913] name failslab, interval 1, probability 0, space 0, times 0 [ 1558.524929][T24913] CPU: 1 PID: 24913 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1558.535011][T24913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1558.545168][T24913] Call Trace: [ 1558.548287][T24913] [ 1558.551067][T24913] dump_stack_lvl+0x151/0x1b7 [ 1558.555581][T24913] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1558.560876][T24913] dump_stack+0x15/0x17 [ 1558.564866][T24913] should_fail+0x3c0/0x510 [ 1558.569120][T24913] __should_failslab+0x9f/0xe0 [ 1558.573718][T24913] should_failslab+0x9/0x20 [ 1558.578057][T24913] kmem_cache_alloc+0x4f/0x2f0 [ 1558.582661][T24913] ? vm_area_dup+0x26/0x1d0 [ 1558.586997][T24913] ? __kasan_check_read+0x11/0x20 [ 1558.591867][T24913] vm_area_dup+0x26/0x1d0 [ 1558.596023][T24913] dup_mmap+0x6b8/0xea0 [ 1558.600017][T24913] ? __delayed_free_task+0x20/0x20 [ 1558.604968][T24913] ? mm_init+0x807/0x960 [ 1558.609044][T24913] dup_mm+0x91/0x330 [ 1558.612778][T24913] copy_mm+0x108/0x1b0 [ 1558.616682][T24913] copy_process+0x1295/0x3250 [ 1558.621198][T24913] ? proc_fail_nth_write+0x213/0x290 [ 1558.626315][T24913] ? proc_fail_nth_read+0x220/0x220 [ 1558.631346][T24913] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1558.636293][T24913] ? vfs_write+0x9af/0x1050 [ 1558.640631][T24913] ? vmacache_update+0xb7/0x120 [ 1558.645327][T24913] kernel_clone+0x22d/0x990 [ 1558.649664][T24913] ? file_end_write+0x1b0/0x1b0 [ 1558.654345][T24913] ? __kasan_check_write+0x14/0x20 [ 1558.659292][T24913] ? create_io_thread+0x1e0/0x1e0 [ 1558.664152][T24913] ? __mutex_lock_slowpath+0x10/0x10 [ 1558.669273][T24913] __x64_sys_clone+0x289/0x310 [ 1558.673974][T24913] ? __do_sys_vfork+0x130/0x130 [ 1558.678649][T24913] ? debug_smp_processor_id+0x17/0x20 [ 1558.683857][T24913] do_syscall_64+0x44/0xd0 [ 1558.688115][T24913] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1558.693836][T24913] RIP: 0033:0x7f65e6eb55a9 [ 1558.698088][T24913] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1558.717623][T24913] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1558.725906][T24913] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1558.733689][T24913] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1558.741491][T24913] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 11:51:53 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 70) 11:51:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x2000019a, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) sendmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000080)="bb01e3ad", 0x4}, {&(0x7f00000000c0)="24d4bf5f0c5a64dfd2af1931f7c1de0294d448914446e1105ac53f55c478c127df8f0b6ee07a17502db8a90e569f6fc7192216106210fbb1d78c1516e7f1a1e393dc5b68d73d6858e2468011344931356e77c32e293cebd0da37e3a494f4bed7b8676e710286ff89dc4451bfbf4a9ffeeb15a84fceb76a757b21cf33f60e7ff63b8c2d2dd6e42b5d86369eecdf6da0ea1cc88bf09d071eba8a814e16ff1805497f2dc674809d8df7760a1858d2fd6797e66eb03851ddf32807a12e04b72f4b0a3ed116bfc0f657c36ae47f16c116b7bcf80a868c88efc70b73492c524ccabf312201ebab4f8d65cae280a1", 0xeb}, {&(0x7f00000001c0)="0db88a1beb80a3a39a2cf10380b3c5bd730f828328e5f8573596eb1296c3c77126ad2e586d5eec6d625b6eb8d1d6a2c5681ce981b93f3e43dc15e75075fe82e0dc326622d029660e0d43a2ba9ba8b781e675aa1a044d1e863bf4d41a30d3817be9ea6cc77040c1c1441cefd9991047917b1cddcda07eea330117add5b989950d318f950bdaacbbc72ae7f16fdd32fe82d3e5dbe5024df787d66c8164d182da65de35eb5159c316695664d1bb316b93c31ea7488cca1fde23d930e01d89d58f7491cdb7635670d8e738c3df3c52f9d29f06a53cc0df64c4bc300c", 0xda}, {&(0x7f00000002c0)="d75a7bb7747c6da47a7ff31dd57e2afde65580550c593966dc66bb", 0x1b}, {&(0x7f0000000300)="6660a70302664afdf865e1050a23a9dce733fbde4095e0dbbb0f7be988693c77481f757390905c8c2291ab28bf334fb294c25046f78b769750c95834274e1b1535fb090f5ba11da7e4bb3044ef76f2671a27671e76d5d5df65cf2ae6a95cc07b9c00b0087197e6fd191a973da2053fafd6fedd2dd0660dbf2b277c9b25a016cb080a90d1259310f1255fe5c4cc435cdded2a7d025735111fa079ba27d317589f9a7d34d16e4aec07f2f5655ef239aef8967bb8737c49711246ba31017fc239aa52cd65b5c4f98d1e0cbbf45cc9f4b468c4c11eca4d4c493426d558f7d871140831fb1144719df1bae410ae1b2e31ac2def6411e5da71f301aa9b7b5fab50", 0xfe}], 0x5, &(0x7f0000000480)=[{0x18, 0x10d, 0x6, "e48576af"}, {0xd8, 0x0, 0x3f, "6de57f92029ab4f43f06f845d77c4e8bf46058ddb171dda54cd6a4be9ace2ea3e252a27f839e3331aa8366feb483801edc5147fc33c265418847d3cf8dc31e938f0bbda9ba587308e06b412b2e60f0cbe573cd80d64dc3fc4fc66d7c811a6925ff12ef7238f0524699c64f547d94662d8a13eafd810fce9ddead563a417c91aa659d28a1e12aac52ebad5edf8a9b34efcadfc83417ba133b4334b5b8e3f4070c3f14eb99e70dc8286afc335c67b53982867bf3459bb112446315f630e1d65abf8aa6275d"}], 0xf0}, 0x40005) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 11:51:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xaa}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200001a5, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x100) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) 11:51:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x300}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1558.749304][T24913] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1558.757118][T24913] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1558.764947][T24913] 11:51:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1558.817963][T24973] FAULT_INJECTION: forcing a failure. [ 1558.817963][T24973] name failslab, interval 1, probability 0, space 0, times 0 [ 1558.831621][T24973] CPU: 0 PID: 24973 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1558.841696][T24973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1558.851594][T24973] Call Trace: [ 1558.854717][T24973] [ 1558.857491][T24973] dump_stack_lvl+0x151/0x1b7 [ 1558.862004][T24973] ? bfq_pos_tree_add_move+0x43e/0x43e 11:51:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200001e1, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1558.867304][T24973] dump_stack+0x15/0x17 [ 1558.871378][T24973] should_fail+0x3c0/0x510 [ 1558.875632][T24973] __should_failslab+0x9f/0xe0 [ 1558.880232][T24973] should_failslab+0x9/0x20 [ 1558.884568][T24973] kmem_cache_alloc+0x4f/0x2f0 [ 1558.889168][T24973] ? vm_area_dup+0x26/0x1d0 [ 1558.893592][T24973] ? __kasan_check_read+0x11/0x20 [ 1558.898465][T24973] vm_area_dup+0x26/0x1d0 [ 1558.902651][T24973] dup_mmap+0x6b8/0xea0 [ 1558.906624][T24973] ? __delayed_free_task+0x20/0x20 [ 1558.911577][T24973] ? mm_init+0x807/0x960 [ 1558.915650][T24973] dup_mm+0x91/0x330 [ 1558.919382][T24973] copy_mm+0x108/0x1b0 [ 1558.923287][T24973] copy_process+0x1295/0x3250 [ 1558.927800][T24973] ? proc_fail_nth_write+0x213/0x290 [ 1558.932925][T24973] ? proc_fail_nth_read+0x220/0x220 [ 1558.937954][T24973] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1558.942905][T24973] ? vfs_write+0x9af/0x1050 [ 1558.947241][T24973] ? vmacache_update+0xb7/0x120 [ 1558.951932][T24973] kernel_clone+0x22d/0x990 [ 1558.956269][T24973] ? file_end_write+0x1b0/0x1b0 [ 1558.960957][T24973] ? __kasan_check_write+0x14/0x20 [ 1558.966009][T24973] ? create_io_thread+0x1e0/0x1e0 [ 1558.970871][T24973] ? __mutex_lock_slowpath+0x10/0x10 [ 1558.975991][T24973] __x64_sys_clone+0x289/0x310 [ 1558.980591][T24973] ? __do_sys_vfork+0x130/0x130 [ 1558.985279][T24973] ? debug_smp_processor_id+0x17/0x20 [ 1558.990485][T24973] do_syscall_64+0x44/0xd0 [ 1558.994738][T24973] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1559.000465][T24973] RIP: 0033:0x7f65e6eb55a9 [ 1559.004729][T24973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1559.024164][T24973] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1559.032406][T24973] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1559.040225][T24973] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1559.048031][T24973] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1559.055930][T24973] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1559.063740][T24973] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1559.071553][T24973] 11:51:53 executing program 0: getpid() (async) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x100) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) 11:51:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xca00, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3ee}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:53 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 71) 11:51:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x100) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) 11:51:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x400000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f3}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1559.175538][T25021] FAULT_INJECTION: forcing a failure. [ 1559.175538][T25021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1559.197459][T25021] CPU: 0 PID: 25021 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1559.207536][T25021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1559.217433][T25021] Call Trace: [ 1559.220602][T25021] 11:51:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x18, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1559.223331][T25021] dump_stack_lvl+0x151/0x1b7 [ 1559.227874][T25021] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1559.233146][T25021] dump_stack+0x15/0x17 [ 1559.237135][T25021] should_fail+0x3c0/0x510 [ 1559.241382][T25021] should_fail_alloc_page+0x58/0x70 [ 1559.246416][T25021] __alloc_pages+0x1de/0x7c0 [ 1559.250845][T25021] ? vm_area_dup+0x26/0x1d0 [ 1559.255284][T25021] ? copy_mm+0x108/0x1b0 [ 1559.259354][T25021] ? __count_vm_events+0x30/0x30 [ 1559.264126][T25021] ? copy_page_range+0xe48/0x1090 [ 1559.275457][T25021] allocate_slab+0x62/0x580 [ 1559.279795][T25021] ___slab_alloc+0x2e2/0x6f0 [ 1559.284226][T25021] ? vm_area_dup+0x26/0x1d0 [ 1559.288562][T25021] ? vm_area_dup+0x26/0x1d0 [ 1559.292918][T25021] __slab_alloc+0x4a/0x90 [ 1559.297061][T25021] kmem_cache_alloc+0x205/0x2f0 [ 1559.301750][T25021] ? vm_area_dup+0x26/0x1d0 [ 1559.306085][T25021] vm_area_dup+0x26/0x1d0 [ 1559.310252][T25021] dup_mmap+0x6b8/0xea0 [ 1559.314247][T25021] ? __delayed_free_task+0x20/0x20 [ 1559.319216][T25021] ? mm_init+0x807/0x960 [ 1559.323271][T25021] dup_mm+0x91/0x330 [ 1559.327001][T25021] copy_mm+0x108/0x1b0 [ 1559.330908][T25021] copy_process+0x1295/0x3250 [ 1559.335509][T25021] ? proc_fail_nth_write+0x213/0x290 [ 1559.340627][T25021] ? proc_fail_nth_read+0x220/0x220 [ 1559.345764][T25021] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1559.350712][T25021] ? vfs_write+0x9af/0x1050 [ 1559.355046][T25021] ? vmacache_update+0xb7/0x120 [ 1559.359736][T25021] kernel_clone+0x22d/0x990 [ 1559.364072][T25021] ? file_end_write+0x1b0/0x1b0 [ 1559.368851][T25021] ? __kasan_check_write+0x14/0x20 [ 1559.373794][T25021] ? create_io_thread+0x1e0/0x1e0 [ 1559.378656][T25021] ? __mutex_lock_slowpath+0x10/0x10 [ 1559.383777][T25021] __x64_sys_clone+0x289/0x310 [ 1559.388380][T25021] ? __do_sys_vfork+0x130/0x130 [ 1559.393063][T25021] ? debug_smp_processor_id+0x17/0x20 [ 1559.398271][T25021] do_syscall_64+0x44/0xd0 [ 1559.402522][T25021] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1559.408254][T25021] RIP: 0033:0x7f65e6eb55a9 [ 1559.412509][T25021] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1559.431949][T25021] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1559.440192][T25021] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1559.448002][T25021] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1559.455816][T25021] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1559.463626][T25021] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:53 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 11:51:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x80ffff, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f4}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:53 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="099435ef5fa2000000000000000000a20ce65d00c49247bd804b769c00000000000000000000ff0000000000000000000056ddbd173a9db57e9dc2448d6b3db73e3aa5e9fe7df82c821a9254cc6cbf6af085c714dbe8cf54381dd06b76268f7158d9dd872f9b815f59a4ce7794e52f0107d1015abb5926b6cb58ee010000003125d40735df5247bb38ca2b46cf1875ec0dd95d5d3176421c848e7e6364568a3bcdf5c037d0fa7c77fd2185f1d1"]) 11:51:53 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 72) 11:51:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="099435ef5fa2000000000000000000a20ce65d00c49247bd804b769c00000000000000000000ff0000000000000000000056ddbd173a9db57e9dc2448d6b3db73e3aa5e9fe7df82c821a9254cc6cbf6af085c714dbe8cf54381dd06b76268f7158d9dd872f9b815f59a4ce7794e52f0107d1015abb5926b6cb58ee010000003125d40735df5247bb38ca2b46cf1875ec0dd95d5d3176421c848e7e6364568a3bcdf5c037d0fa7c77fd2185f1d1"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="099435ef5fa2000000000000000000a20ce65d00c49247bd804b769c00000000000000000000ff0000000000000000000056ddbd173a9db57e9dc2448d6b3db73e3aa5e9fe7df82c821a9254cc6cbf6af085c714dbe8cf54381dd06b76268f7158d9dd872f9b815f59a4ce7794e52f0107d1015abb5926b6cb58ee010000003125d40735df5247bb38ca2b46cf1875ec0dd95d5d3176421c848e7e6364568a3bcdf5c037d0fa7c77fd2185f1d1"]) (async) [ 1559.471440][T25021] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1559.479254][T25021] 11:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f5}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) [ 1559.537160][T25061] FAULT_INJECTION: forcing a failure. [ 1559.537160][T25061] name failslab, interval 1, probability 0, space 0, times 0 [ 1559.563877][T25061] CPU: 1 PID: 25061 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1559.573958][T25061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1559.583855][T25061] Call Trace: 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 0: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async) 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x0, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r2, 0xffffffffffffffff, 0x4}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000002a40)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f00000028c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/217, 0xd9}, {&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/242, 0xf2}, {&(0x7f0000001640)=""/218, 0xda}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/134, 0x86}, {&(0x7f0000002800)=""/187, 0xbb}], 0x8, &(0x7f0000002940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) openat$cgroup_subtree(r4, &(0x7f0000002a80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) write$cgroup_pid(r1, &(0x7f0000000240)=r0, 0x12) syz_clone(0x40240000, &(0x7f0000000000)="e1f1ce57bf01e6eb98b3ec8f4b23dfb7be90892d2d627943023201e2a8c579034b704e3f95551c357636f82a7ef09e664e6bfae5e6556e5666f67f9894266fd9879aff9336dd7431fa85955f052334908077ed2fd17cf9450504bc4f36f8cd19ebc1715ee1882e7cf8627c62d79b409bf5dc6bd731e68c95cfe1c818b87b9b4ef7f545c60d13bb50ab936887e2001cb60455595f63c575790e7b475a6cfafb665eb15e5b23a4d910f2af58e27ea465387bee0082ddc40d2c74c4498ded9b69e960fdb843228fe5f2f094c187eaa877199dd6e5272a4e7ca07574937064ba82682ed8cf4767676c2ae956760f1b6ad9865db9dcf7b67a4b0ff5ff1e", 0xfb, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="29fa3c343d097c5b1e7ba237fbedd40d358677b00e6feb0bf21bb38d843f9eae28a32e35a9d73ee3bf3fc27469e9cce86d1dcf81198dac54da471aa06bb82b198472668fd80964b8a4c229381ba38e47683f61e10e2b99d12e8156fec73e7baeab276c52c3ef8fd72e83600f3a69ca715dc44e596dfeba60f7b4e274731e8ac8a65dcba00e906b50933dd57016161fb3583d96c142b6f9141e309cb3293d19c8e8b310572f3e3b700a9b44324d78136a3653b512178fad68") gettid() [ 1559.586993][T25061] [ 1559.589755][T25061] dump_stack_lvl+0x151/0x1b7 [ 1559.594273][T25061] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1559.599656][T25061] dump_stack+0x15/0x17 [ 1559.603652][T25061] should_fail+0x3c0/0x510 [ 1559.607914][T25061] __should_failslab+0x9f/0xe0 [ 1559.612495][T25061] should_failslab+0x9/0x20 [ 1559.616839][T25061] kmem_cache_alloc+0x4f/0x2f0 [ 1559.621439][T25061] ? anon_vma_clone+0xa1/0x4f0 [ 1559.626034][T25061] anon_vma_clone+0xa1/0x4f0 [ 1559.630460][T25061] anon_vma_fork+0x91/0x4f0 [ 1559.634801][T25061] ? anon_vma_name+0x43/0x70 [ 1559.639230][T25061] dup_mmap+0x750/0xea0 [ 1559.643221][T25061] ? __delayed_free_task+0x20/0x20 [ 1559.648164][T25061] ? mm_init+0x807/0x960 [ 1559.652241][T25061] dup_mm+0x91/0x330 [ 1559.655976][T25061] copy_mm+0x108/0x1b0 [ 1559.659881][T25061] copy_process+0x1295/0x3250 [ 1559.664390][T25061] ? proc_fail_nth_write+0x213/0x290 [ 1559.669626][T25061] ? proc_fail_nth_read+0x220/0x220 [ 1559.674656][T25061] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1559.679609][T25061] ? vfs_write+0x9af/0x1050 [ 1559.683947][T25061] ? vmacache_update+0xb7/0x120 [ 1559.688634][T25061] kernel_clone+0x22d/0x990 [ 1559.692974][T25061] ? file_end_write+0x1b0/0x1b0 [ 1559.697657][T25061] ? __kasan_check_write+0x14/0x20 [ 1559.702604][T25061] ? create_io_thread+0x1e0/0x1e0 [ 1559.707471][T25061] ? __mutex_lock_slowpath+0x10/0x10 [ 1559.712590][T25061] __x64_sys_clone+0x289/0x310 [ 1559.717190][T25061] ? __do_sys_vfork+0x130/0x130 [ 1559.721879][T25061] ? debug_smp_processor_id+0x17/0x20 [ 1559.727087][T25061] do_syscall_64+0x44/0xd0 [ 1559.731336][T25061] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1559.737069][T25061] RIP: 0033:0x7f65e6eb55a9 [ 1559.741315][T25061] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1559.760758][T25061] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1559.769006][T25061] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1559.776833][T25061] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 11:51:54 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 73) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)=ANY=[@ANYBLOB="099435ef5fa2000000000000000000a20ce65d00c49247bd804b769c00000000000000000000ff0000000000000000000056ddbd173a9db57e9dc2448d6b3db73e3aa5e9fe7df82c821a9254cc6cbf6af085c714dbe8cf54381dd06b76268f7158d9dd872f9b815f59a4ce7794e52f0107d1015abb5926b6cb58ee010000003125d40735df5247bb38ca2b46cf1875ec0dd95d5d3176421c848e7e6364568a3bcdf5c037d0fa7c77fd2185f1d1"]) 11:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f6}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/198, 0xc6}, {&(0x7f00000004c0)=""/211, 0xd3}, {&(0x7f00000005c0)=""/182, 0xb6}], 0x3, &(0x7f00000006c0)=""/145, 0x91}, 0x40000042) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x4c, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x0, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r5, 0xffffffffffffffff, 0x4}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0xffffffffffffffff, 0xfff}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x5, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xc, 0xf, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xf}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3d2}, @generic={0x8, 0x1, 0x6, 0xf81b, 0x3}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xc}, @call={0x85, 0x0, 0x0, 0x5c}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x1000, &(0x7f00000015c0)=""/4096, 0x41000, 0x4, '\x00', r4, 0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x5, 0x8, 0xfa34, 0x3}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000a40)=[r6, r7, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)=""/130, 0x82}, {&(0x7f00000001c0)=""/229, 0xe5}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x120) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x18}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1559.784621][T25061] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1559.792436][T25061] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1559.800250][T25061] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1559.808583][T25061] 11:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f7}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3e}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3fe}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1559.869909][T25104] FAULT_INJECTION: forcing a failure. [ 1559.869909][T25104] name failslab, interval 1, probability 0, space 0, times 0 [ 1559.882440][T25104] CPU: 1 PID: 25104 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1559.892501][T25104] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1559.902396][T25104] Call Trace: [ 1559.905526][T25104] [ 1559.908302][T25104] dump_stack_lvl+0x151/0x1b7 [ 1559.912812][T25104] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1559.918108][T25104] dump_stack+0x15/0x17 [ 1559.922095][T25104] should_fail+0x3c0/0x510 [ 1559.926351][T25104] __should_failslab+0x9f/0xe0 [ 1559.930945][T25104] should_failslab+0x9/0x20 [ 1559.935286][T25104] kmem_cache_alloc+0x4f/0x2f0 [ 1559.939886][T25104] ? anon_vma_clone+0xa1/0x4f0 [ 1559.944498][T25104] anon_vma_clone+0xa1/0x4f0 [ 1559.948912][T25104] anon_vma_fork+0x91/0x4f0 [ 1559.953251][T25104] ? anon_vma_name+0x43/0x70 [ 1559.957677][T25104] dup_mmap+0x750/0xea0 [ 1559.961675][T25104] ? __delayed_free_task+0x20/0x20 [ 1559.966705][T25104] ? mm_init+0x807/0x960 [ 1559.970781][T25104] dup_mm+0x91/0x330 [ 1559.974515][T25104] copy_mm+0x108/0x1b0 [ 1559.978423][T25104] copy_process+0x1295/0x3250 [ 1559.982936][T25104] ? proc_fail_nth_write+0x213/0x290 [ 1559.988058][T25104] ? proc_fail_nth_read+0x220/0x220 [ 1559.993179][T25104] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1559.998127][T25104] ? vfs_write+0x9af/0x1050 [ 1560.002479][T25104] ? vmacache_update+0xb7/0x120 [ 1560.007152][T25104] kernel_clone+0x22d/0x990 [ 1560.011492][T25104] ? file_end_write+0x1b0/0x1b0 [ 1560.016179][T25104] ? __kasan_check_write+0x14/0x20 [ 1560.021125][T25104] ? create_io_thread+0x1e0/0x1e0 [ 1560.025987][T25104] ? __mutex_lock_slowpath+0x10/0x10 [ 1560.031106][T25104] __x64_sys_clone+0x289/0x310 [ 1560.035708][T25104] ? __do_sys_vfork+0x130/0x130 [ 1560.040391][T25104] ? debug_smp_processor_id+0x17/0x20 [ 1560.045604][T25104] do_syscall_64+0x44/0xd0 [ 1560.049854][T25104] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1560.055580][T25104] RIP: 0033:0x7f65e6eb55a9 [ 1560.059833][T25104] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1560.079365][T25104] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1560.087619][T25104] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1560.095419][T25104] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1560.103230][T25104] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1560.111038][T25104] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1560.118854][T25104] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1560.126670][T25104] 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0xab}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1000000}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/198, 0xc6}, {&(0x7f00000004c0)=""/211, 0xd3}, {&(0x7f00000005c0)=""/182, 0xb6}], 0x3, &(0x7f00000006c0)=""/145, 0x91}, 0x40000042) (async) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x4c, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x0, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r5, 0xffffffffffffffff, 0x4}, 0x10) (async) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0xffffffffffffffff, 0xfff}, 0xc) (async) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x5, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xc, 0xf, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xf}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3d2}, @generic={0x8, 0x1, 0x6, 0xf81b, 0x3}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xc}, @call={0x85, 0x0, 0x0, 0x5c}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x1000, &(0x7f00000015c0)=""/4096, 0x41000, 0x4, '\x00', r4, 0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x5, 0x8, 0xfa34, 0x3}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000a40)=[r6, r7, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) (async) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)=""/130, 0x82}, {&(0x7f00000001c0)=""/229, 0xe5}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x120) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:54 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x0, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r2, 0xffffffffffffffff, 0x4}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000002a40)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f00000028c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/217, 0xd9}, {&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/242, 0xf2}, {&(0x7f0000001640)=""/218, 0xda}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/134, 0x86}, {&(0x7f0000002800)=""/187, 0xbb}], 0x8, &(0x7f0000002940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) openat$cgroup_subtree(r4, &(0x7f0000002a80), 0x2, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_pid(r1, &(0x7f0000000240)=r0, 0x12) (async) syz_clone(0x40240000, &(0x7f0000000000)="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", 0xfb, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="29fa3c343d097c5b1e7ba237fbedd40d358677b00e6feb0bf21bb38d843f9eae28a32e35a9d73ee3bf3fc27469e9cce86d1dcf81198dac54da471aa06bb82b198472668fd80964b8a4c229381ba38e47683f61e10e2b99d12e8156fec73e7baeab276c52c3ef8fd72e83600f3a69ca715dc44e596dfeba60f7b4e274731e8ac8a65dcba00e906b50933dd57016161fb3583d96c142b6f9141e309cb3293d19c8e8b310572f3e3b700a9b44324d78136a3653b512178fad68") (async) gettid() 11:51:54 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 74) 11:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000001580)={0xffffffffffffffff}) (rerun: 64) sendmsg$inet(r1, &(0x7f0000004780)={0x0, 0x0, 0x0}, 0x850) recvmsg(r1, &(0x7f0000000780)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000000680)=[{&(0x7f00000003c0)=""/198, 0xc6}, {&(0x7f00000004c0)=""/211, 0xd3}, {&(0x7f00000005c0)=""/182, 0xb6}], 0x3, &(0x7f00000006c0)=""/145, 0x91}, 0x40000042) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r2}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x4c, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000900)={0x1, 0x58, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async, rerun: 64) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x0, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r5, 0xffffffffffffffff, 0x4}, 0x10) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000009c0)={0xffffffffffffffff, 0xfff}, 0xc) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000a00)={0x0, 0x5, 0x8}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0xc, 0xf, &(0x7f00000007c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x5}, [@map_idx={0x18, 0xb, 0x5, 0x0, 0xf}, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3d2}, @generic={0x8, 0x1, 0x6, 0xf81b, 0x3}, @map_fd={0x18, 0x1, 0x1, 0x0, 0x1}, @map_val={0x18, 0x7, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xc}, @call={0x85, 0x0, 0x0, 0x5c}]}, &(0x7f0000000840)='GPL\x00', 0x0, 0x1000, &(0x7f00000015c0)=""/4096, 0x41000, 0x4, '\x00', r4, 0x26, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x5, 0x8, 0xfa34, 0x3}, 0x10, 0xffffffffffffffff, r5, 0x0, &(0x7f0000000a40)=[r6, r7, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)=""/130, 0x82}, {&(0x7f00000001c0)=""/229, 0xe5}], 0x2, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x120) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x300}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3ee}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x9000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f3}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1560.511955][T25140] FAULT_INJECTION: forcing a failure. [ 1560.511955][T25140] name failslab, interval 1, probability 0, space 0, times 0 [ 1560.545057][T25140] CPU: 1 PID: 25140 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1560.555145][T25140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1560.565139][T25140] Call Trace: [ 1560.568244][T25140] [ 1560.571021][T25140] dump_stack_lvl+0x151/0x1b7 [ 1560.575537][T25140] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1560.580834][T25140] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 1560.587082][T25140] dump_stack+0x15/0x17 [ 1560.591182][T25140] should_fail+0x3c0/0x510 [ 1560.595502][T25140] __should_failslab+0x9f/0xe0 [ 1560.600098][T25140] should_failslab+0x9/0x20 [ 1560.604441][T25140] kmem_cache_alloc+0x4f/0x2f0 [ 1560.609042][T25140] ? anon_vma_fork+0xf7/0x4f0 [ 1560.613986][T25140] anon_vma_fork+0xf7/0x4f0 [ 1560.618287][T25140] ? anon_vma_name+0x43/0x70 [ 1560.622726][T25140] dup_mmap+0x750/0xea0 [ 1560.626705][T25140] ? __delayed_free_task+0x20/0x20 [ 1560.631657][T25140] ? mm_init+0x807/0x960 [ 1560.635728][T25140] dup_mm+0x91/0x330 [ 1560.639465][T25140] copy_mm+0x108/0x1b0 [ 1560.643366][T25140] copy_process+0x1295/0x3250 [ 1560.647890][T25140] ? proc_fail_nth_write+0x213/0x290 [ 1560.653001][T25140] ? proc_fail_nth_read+0x220/0x220 [ 1560.658038][T25140] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1560.663068][T25140] ? vfs_write+0x9af/0x1050 [ 1560.667407][T25140] ? vmacache_update+0xb7/0x120 [ 1560.672096][T25140] kernel_clone+0x22d/0x990 [ 1560.676436][T25140] ? file_end_write+0x1b0/0x1b0 [ 1560.681134][T25140] ? __kasan_check_write+0x14/0x20 [ 1560.686072][T25140] ? create_io_thread+0x1e0/0x1e0 [ 1560.690931][T25140] ? __mutex_lock_slowpath+0x10/0x10 [ 1560.696065][T25140] __x64_sys_clone+0x289/0x310 [ 1560.700765][T25140] ? __do_sys_vfork+0x130/0x130 [ 1560.705426][T25140] ? debug_smp_processor_id+0x17/0x20 [ 1560.710732][T25140] do_syscall_64+0x44/0xd0 [ 1560.714985][T25140] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1560.720712][T25140] RIP: 0033:0x7f65e6eb55a9 [ 1560.724964][T25140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1560.744404][T25140] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1560.752649][T25140] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1560.760488][T25140] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1560.768393][T25140] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1560.776198][T25140] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1560.784009][T25140] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1560.791825][T25140] 11:51:55 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0xa, 0x5, 0x0, 0x7}, @alu={0x0, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000049c0)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000004a00)={0x1, 0x0, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000004b40)={r2, 0xffffffffffffffff, 0x4}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000280)='./file0\x00', r2}, 0x10) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000002a40)={&(0x7f0000000340)=@abs, 0x6e, &(0x7f00000028c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}, {&(0x7f00000013c0)=""/217, 0xd9}, {&(0x7f00000014c0)=""/71, 0x47}, {&(0x7f0000001540)=""/242, 0xf2}, {&(0x7f0000001640)=""/218, 0xda}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/134, 0x86}, {&(0x7f0000002800)=""/187, 0xbb}], 0x8, &(0x7f0000002940)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}, 0x2000) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0xf3) (async) openat$cgroup_subtree(r4, &(0x7f0000002a80), 0x2, 0x0) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) write$cgroup_pid(r1, &(0x7f0000000240)=r0, 0x12) (async) syz_clone(0x40240000, &(0x7f0000000000)="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", 0xfb, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="29fa3c343d097c5b1e7ba237fbedd40d358677b00e6feb0bf21bb38d843f9eae28a32e35a9d73ee3bf3fc27469e9cce86d1dcf81198dac54da471aa06bb82b198472668fd80964b8a4c229381ba38e47683f61e10e2b99d12e8156fec73e7baeab276c52c3ef8fd72e83600f3a69ca715dc44e596dfeba60f7b4e274731e8ac8a65dcba00e906b50933dd57016161fb3583d96c142b6f9141e309cb3293d19c8e8b310572f3e3b700a9b44324d78136a3653b512178fad68") (async) gettid() 11:51:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f4}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff001) 11:51:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xb000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:55 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 75) 11:51:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f5}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff001) (async) 11:51:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1561.374440][T25171] FAULT_INJECTION: forcing a failure. [ 1561.374440][T25171] name failslab, interval 1, probability 0, space 0, times 0 [ 1561.391095][T25171] CPU: 1 PID: 25171 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1561.401300][T25171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1561.411193][T25171] Call Trace: [ 1561.414318][T25171] [ 1561.417094][T25171] dump_stack_lvl+0x151/0x1b7 11:51:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff001) 11:51:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f6}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1561.421608][T25171] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1561.426904][T25171] dump_stack+0x15/0x17 [ 1561.430897][T25171] should_fail+0x3c0/0x510 [ 1561.435149][T25171] __should_failslab+0x9f/0xe0 [ 1561.439746][T25171] should_failslab+0x9/0x20 [ 1561.444082][T25171] kmem_cache_alloc+0x4f/0x2f0 [ 1561.448684][T25171] ? vm_area_dup+0x26/0x1d0 [ 1561.453029][T25171] vm_area_dup+0x26/0x1d0 [ 1561.457289][T25171] dup_mmap+0x6b8/0xea0 [ 1561.461276][T25171] ? __delayed_free_task+0x20/0x20 [ 1561.466220][T25171] ? mm_init+0x807/0x960 [ 1561.470306][T25171] dup_mm+0x91/0x330 [ 1561.474137][T25171] copy_mm+0x108/0x1b0 [ 1561.478045][T25171] copy_process+0x1295/0x3250 [ 1561.482557][T25171] ? proc_fail_nth_write+0x213/0x290 [ 1561.487680][T25171] ? proc_fail_nth_read+0x220/0x220 [ 1561.492726][T25171] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1561.497663][T25171] ? vfs_write+0x9af/0x1050 [ 1561.501994][T25171] ? vmacache_update+0xb7/0x120 [ 1561.506679][T25171] kernel_clone+0x22d/0x990 [ 1561.511020][T25171] ? file_end_write+0x1b0/0x1b0 [ 1561.515828][T25171] ? __kasan_check_write+0x14/0x20 [ 1561.520777][T25171] ? create_io_thread+0x1e0/0x1e0 [ 1561.525640][T25171] ? __mutex_lock_slowpath+0x10/0x10 [ 1561.530774][T25171] __x64_sys_clone+0x289/0x310 [ 1561.535359][T25171] ? __do_sys_vfork+0x130/0x130 [ 1561.540048][T25171] ? debug_smp_processor_id+0x17/0x20 [ 1561.545253][T25171] do_syscall_64+0x44/0xd0 [ 1561.549511][T25171] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1561.555237][T25171] RIP: 0033:0x7f65e6eb55a9 [ 1561.559490][T25171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1561.578932][T25171] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1561.587273][T25171] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1561.595084][T25171] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1561.602898][T25171] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1561.610705][T25171] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1561.618603][T25171] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1561.626428][T25171] 11:51:56 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x5, 0x1, 0x40, 0x0, 0x2, 0x8400, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x7, @perf_bp={&(0x7f0000000000), 0x8}, 0x8008, 0x3ff, 0x100, 0x5, 0x8e, 0x9, 0x3, 0x0, 0x4, 0x0, 0x80}, r0, 0x4, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0xe, 0x1, 0x0, 0x40, 0x0, 0x7ff, 0x11202, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffbd5, 0x6591bdb57a988d8, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x200, 0x6, 0x1, 0x100, 0x5, 0x8, 0x0, 0x10000}, r0, 0xd, 0xffffffffffffffff, 0x9) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0x3, &(0x7f00000002c0)='/\xdf\x00'}, 0x30) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r6}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r7, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r6, 0x58, &(0x7f0000000140)}, 0x10) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x78, 0x4, 0x0, 0x0, 0x9, 0xa0b, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x41d3daa1, 0x7fffffff}, 0x44, 0x401, 0x400, 0x1, 0x3, 0x100, 0x7f, 0x0, 0xbcc1, 0x0, 0x2d}, r1, 0xf, r4, 0x8) 11:51:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xd000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff002) close(r0) 11:51:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3f7}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:56 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 76) 11:51:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1562.306051][T25200] FAULT_INJECTION: forcing a failure. [ 1562.306051][T25200] name failslab, interval 1, probability 0, space 0, times 0 [ 1562.324163][T25200] CPU: 0 PID: 25200 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1562.334245][T25200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1562.344138][T25200] Call Trace: [ 1562.347261][T25200] [ 1562.350039][T25200] dump_stack_lvl+0x151/0x1b7 11:51:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff002) (async) close(r0) 11:51:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r1, 0x5421, 0x1ffff002) (async) close(r0) 11:51:56 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x5, 0x1, 0x40, 0x0, 0x2, 0x8400, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x7, @perf_bp={&(0x7f0000000000), 0x8}, 0x8008, 0x3ff, 0x100, 0x5, 0x8e, 0x9, 0x3, 0x0, 0x4, 0x0, 0x80}, r0, 0x4, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0xe, 0x1, 0x0, 0x40, 0x0, 0x7ff, 0x11202, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffbd5, 0x6591bdb57a988d8, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x200, 0x6, 0x1, 0x100, 0x5, 0x8, 0x0, 0x10000}, r0, 0xd, 0xffffffffffffffff, 0x9) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0x3, &(0x7f00000002c0)='/\xdf\x00'}, 0x30) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r6}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r7, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r6, 0x58, &(0x7f0000000140)}, 0x10) (async) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x78, 0x4, 0x0, 0x0, 0x9, 0xa0b, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x41d3daa1, 0x7fffffff}, 0x44, 0x401, 0x400, 0x1, 0x3, 0x100, 0x7f, 0x0, 0xbcc1, 0x0, 0x2d}, r1, 0xf, r4, 0x8) 11:51:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x11000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:56 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000000)) 11:51:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x3fe}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1562.354556][T25200] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1562.359847][T25200] dump_stack+0x15/0x17 [ 1562.363844][T25200] should_fail+0x3c0/0x510 [ 1562.368094][T25200] __should_failslab+0x9f/0xe0 [ 1562.372694][T25200] should_failslab+0x9/0x20 [ 1562.377031][T25200] kmem_cache_alloc+0x4f/0x2f0 [ 1562.381634][T25200] ? vm_area_dup+0x26/0x1d0 [ 1562.385970][T25200] ? __kasan_check_read+0x11/0x20 [ 1562.390839][T25200] vm_area_dup+0x26/0x1d0 [ 1562.394998][T25200] dup_mmap+0x6b8/0xea0 [ 1562.398995][T25200] ? __delayed_free_task+0x20/0x20 11:51:56 executing program 0: r0 = syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x5, 0x5, 0x1, 0x40, 0x0, 0x2, 0x8400, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x7, @perf_bp={&(0x7f0000000000), 0x8}, 0x8008, 0x3ff, 0x100, 0x5, 0x8e, 0x9, 0x3, 0x0, 0x4, 0x0, 0x80}, r0, 0x4, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0xe, 0x1, 0x0, 0x40, 0x0, 0x7ff, 0x11202, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xfffffbd5, 0x6591bdb57a988d8, @perf_bp={&(0x7f0000000200), 0x8}, 0x0, 0x200, 0x6, 0x1, 0x100, 0x5, 0x8, 0x0, 0x10000}, r0, 0xd, 0xffffffffffffffff, 0x9) (async) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r1}, 0x10) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r3, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0x3, &(0x7f00000002c0)='/\xdf\x00'}, 0x30) (async) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r4}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0xf3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r5, 0x0, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) r6 = bpf$ITER_CREATE(0x21, &(0x7f00000041c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000004200)={0x0, r6}, 0x10) (async) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0xf3) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000004640)={0xffffffffffffffff, 0x58, &(0x7f00000045c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000004a80)={0x18, 0x8, &(0x7f0000004880)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x10001}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x3}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x7}, @alu={0x4, 0x0, 0x1, 0x9, 0x0, 0x2, 0x1}]}, &(0x7f00000048c0)='syzkaller\x00', 0x9, 0xa0, &(0x7f0000004900)=""/160, 0x40f00, 0x0, '\x00', r7, 0x0, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000004a00)={0x1, 0x7, 0x7, 0xff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000004a40)=[0xffffffffffffffff]}, 0x80) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={r6, 0x58, &(0x7f0000000140)}, 0x10) (async, rerun: 32) perf_event_open$cgroup(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x78, 0x4, 0x0, 0x0, 0x9, 0xa0b, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x41d3daa1, 0x7fffffff}, 0x44, 0x401, 0x400, 0x1, 0x3, 0x100, 0x7f, 0x0, 0xbcc1, 0x0, 0x2d}, r1, 0xf, r4, 0x8) [ 1562.403942][T25200] ? mm_init+0x807/0x960 [ 1562.408016][T25200] dup_mm+0x91/0x330 [ 1562.411748][T25200] copy_mm+0x108/0x1b0 [ 1562.415656][T25200] copy_process+0x1295/0x3250 [ 1562.420172][T25200] ? proc_fail_nth_write+0x213/0x290 [ 1562.425288][T25200] ? proc_fail_nth_read+0x220/0x220 [ 1562.430328][T25200] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1562.435270][T25200] ? vfs_write+0x9af/0x1050 [ 1562.439610][T25200] ? vmacache_update+0xb7/0x120 [ 1562.444300][T25200] kernel_clone+0x22d/0x990 [ 1562.448637][T25200] ? file_end_write+0x1b0/0x1b0 [ 1562.453413][T25200] ? __kasan_check_write+0x14/0x20 [ 1562.458359][T25200] ? create_io_thread+0x1e0/0x1e0 [ 1562.463218][T25200] ? __mutex_lock_slowpath+0x10/0x10 [ 1562.468450][T25200] __x64_sys_clone+0x289/0x310 [ 1562.473066][T25200] ? __do_sys_vfork+0x130/0x130 [ 1562.477757][T25200] ? debug_smp_processor_id+0x17/0x20 [ 1562.482958][T25200] do_syscall_64+0x44/0xd0 [ 1562.487211][T25200] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1562.493085][T25200] RIP: 0033:0x7f65e6eb55a9 [ 1562.497333][T25200] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1562.516778][T25200] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1562.525019][T25200] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1562.532831][T25200] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1562.540644][T25200] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1562.548453][T25200] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:57 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 77) 11:51:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000000)) 11:51:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x9}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x12000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1000000}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1562.556391][T25200] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1562.564201][T25200] 11:51:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xb}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) (async, rerun: 64) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)) (async, rerun: 64) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x2}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1562.606532][T25255] FAULT_INJECTION: forcing a failure. [ 1562.606532][T25255] name failslab, interval 1, probability 0, space 0, times 0 [ 1562.641566][T25255] CPU: 1 PID: 25255 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1562.651647][T25255] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1562.661536][T25255] Call Trace: [ 1562.664657][T25255] [ 1562.667436][T25255] dump_stack_lvl+0x151/0x1b7 [ 1562.671949][T25255] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1562.677247][T25255] ? do_syscall_64+0x44/0xd0 [ 1562.681678][T25255] dump_stack+0x15/0x17 [ 1562.685660][T25255] should_fail+0x3c0/0x510 [ 1562.689916][T25255] __should_failslab+0x9f/0xe0 [ 1562.694514][T25255] should_failslab+0x9/0x20 [ 1562.698856][T25255] kmem_cache_alloc+0x4f/0x2f0 [ 1562.703455][T25255] ? anon_vma_clone+0xa1/0x4f0 [ 1562.708063][T25255] anon_vma_clone+0xa1/0x4f0 [ 1562.712481][T25255] anon_vma_fork+0x91/0x4f0 [ 1562.716821][T25255] ? anon_vma_name+0x43/0x70 [ 1562.721251][T25255] dup_mmap+0x750/0xea0 [ 1562.725240][T25255] ? __delayed_free_task+0x20/0x20 [ 1562.730192][T25255] ? mm_init+0x807/0x960 [ 1562.734267][T25255] dup_mm+0x91/0x330 [ 1562.737998][T25255] copy_mm+0x108/0x1b0 [ 1562.741907][T25255] copy_process+0x1295/0x3250 [ 1562.746415][T25255] ? proc_fail_nth_write+0x213/0x290 [ 1562.751542][T25255] ? proc_fail_nth_read+0x220/0x220 [ 1562.756574][T25255] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1562.761521][T25255] ? vfs_write+0x9af/0x1050 [ 1562.765878][T25255] ? vmacache_update+0xb7/0x120 [ 1562.770548][T25255] kernel_clone+0x22d/0x990 [ 1562.774885][T25255] ? file_end_write+0x1b0/0x1b0 [ 1562.779573][T25255] ? __kasan_check_write+0x14/0x20 [ 1562.784519][T25255] ? create_io_thread+0x1e0/0x1e0 [ 1562.789381][T25255] ? __mutex_lock_slowpath+0x10/0x10 [ 1562.794502][T25255] __x64_sys_clone+0x289/0x310 [ 1562.799102][T25255] ? __do_sys_vfork+0x130/0x130 [ 1562.803792][T25255] ? debug_smp_processor_id+0x17/0x20 [ 1562.809004][T25255] do_syscall_64+0x44/0xd0 [ 1562.813250][T25255] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1562.818981][T25255] RIP: 0033:0x7f65e6eb55a9 [ 1562.823233][T25255] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1562.842671][T25255] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 11:51:57 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 78) 11:51:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000000)) (async) 11:51:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xc}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x3}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000004c00), 0x0, 0x0) (async) ioctl$TUNSETVNETBE(r0, 0x400454de, 0x0) (async) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000000)) (async) syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (async) 11:51:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x21000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x4}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)={'a', ' *:* ', 'rwm\x00'}, 0xa) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x5}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1562.850918][T25255] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1562.858726][T25255] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1562.866541][T25255] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1562.874351][T25255] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1562.882164][T25255] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1562.890121][T25255] 11:51:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x25000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1562.970797][T25300] FAULT_INJECTION: forcing a failure. [ 1562.970797][T25300] name failslab, interval 1, probability 0, space 0, times 0 [ 1562.983308][T25300] CPU: 0 PID: 25300 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1562.993291][T25300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1563.003181][T25300] Call Trace: [ 1563.006305][T25300] [ 1563.009083][T25300] dump_stack_lvl+0x151/0x1b7 [ 1563.013595][T25300] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1563.018898][T25300] dump_stack+0x15/0x17 [ 1563.022883][T25300] should_fail+0x3c0/0x510 [ 1563.027136][T25300] __should_failslab+0x9f/0xe0 [ 1563.031738][T25300] should_failslab+0x9/0x20 [ 1563.036076][T25300] kmem_cache_alloc+0x4f/0x2f0 [ 1563.040678][T25300] ? anon_vma_clone+0xa1/0x4f0 [ 1563.045391][T25300] anon_vma_clone+0xa1/0x4f0 [ 1563.049828][T25300] anon_vma_fork+0x91/0x4f0 [ 1563.054157][T25300] ? anon_vma_name+0x4c/0x70 [ 1563.058582][T25300] dup_mmap+0x750/0xea0 [ 1563.062575][T25300] ? __delayed_free_task+0x20/0x20 [ 1563.067529][T25300] ? mm_init+0x807/0x960 [ 1563.071602][T25300] dup_mm+0x91/0x330 [ 1563.075344][T25300] copy_mm+0x108/0x1b0 [ 1563.079241][T25300] copy_process+0x1295/0x3250 [ 1563.083755][T25300] ? proc_fail_nth_write+0x213/0x290 [ 1563.088962][T25300] ? proc_fail_nth_read+0x220/0x220 [ 1563.093994][T25300] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1563.098951][T25300] ? vfs_write+0x9af/0x1050 [ 1563.103282][T25300] ? vmacache_update+0xb7/0x120 [ 1563.107969][T25300] kernel_clone+0x22d/0x990 [ 1563.112310][T25300] ? file_end_write+0x1b0/0x1b0 [ 1563.117445][T25300] ? __kasan_check_write+0x14/0x20 [ 1563.122375][T25300] ? create_io_thread+0x1e0/0x1e0 [ 1563.127240][T25300] ? __mutex_lock_slowpath+0x10/0x10 [ 1563.132364][T25300] __x64_sys_clone+0x289/0x310 [ 1563.136957][T25300] ? __do_sys_vfork+0x130/0x130 [ 1563.141648][T25300] ? debug_smp_processor_id+0x17/0x20 [ 1563.146852][T25300] do_syscall_64+0x44/0xd0 [ 1563.151107][T25300] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1563.156831][T25300] RIP: 0033:0x7f65e6eb55a9 [ 1563.161087][T25300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1563.180617][T25300] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1563.188861][T25300] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1563.196672][T25300] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1563.204483][T25300] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1563.212294][T25300] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 11:51:57 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 79) 11:51:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)={'a', ' *:* ', 'rwm\x00'}, 0xa) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:57 executing program 0: syz_clone(0xa120000, 0x0, 0x16, 0x0, 0x0, 0x0) syz_clone(0x120c0000, &(0x7f0000000000)="26187cf4027304f2906ab4c267ad745b97f6", 0x12, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="fe981068cf12adb52a4d1de3dc04f7363408c3979dea6681d8fd") r0 = gettid() perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3, 0x7f, 0x5, 0x3, 0x0, 0x101, 0x44760, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfb5, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x20, 0x8000, 0x6, 0x8, 0x0, 0xfffffff8, 0x40, 0x0, 0x8ad, 0x0, 0x1f}, r0, 0x3, 0xffffffffffffffff, 0x0) 11:51:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xe}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x6}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x40000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xf}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x43000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x7}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000000)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000080)={'a', ' *:* ', 'rwm\x00'}, 0xa) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) [ 1563.220220][T25300] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1563.228014][T25300] 11:51:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x10}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x8}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1563.280875][T25321] FAULT_INJECTION: forcing a failure. [ 1563.280875][T25321] name failslab, interval 1, probability 0, space 0, times 0 [ 1563.328314][T25321] CPU: 0 PID: 25321 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1563.338408][T25321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1563.348308][T25321] Call Trace: [ 1563.351419][T25321] [ 1563.354197][T25321] dump_stack_lvl+0x151/0x1b7 [ 1563.358712][T25321] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1563.364007][T25321] dump_stack+0x15/0x17 [ 1563.367999][T25321] should_fail+0x3c0/0x510 [ 1563.372253][T25321] __should_failslab+0x9f/0xe0 [ 1563.376853][T25321] should_failslab+0x9/0x20 [ 1563.381190][T25321] kmem_cache_alloc+0x4f/0x2f0 [ 1563.385789][T25321] ? anon_vma_clone+0xa1/0x4f0 [ 1563.390395][T25321] anon_vma_clone+0xa1/0x4f0 [ 1563.394812][T25321] anon_vma_fork+0x91/0x4f0 [ 1563.399149][T25321] ? anon_vma_name+0x4c/0x70 [ 1563.403579][T25321] dup_mmap+0x750/0xea0 [ 1563.407582][T25321] ? __delayed_free_task+0x20/0x20 [ 1563.412515][T25321] ? mm_init+0x807/0x960 [ 1563.416596][T25321] dup_mm+0x91/0x330 [ 1563.420330][T25321] copy_mm+0x108/0x1b0 [ 1563.424245][T25321] copy_process+0x1295/0x3250 [ 1563.428750][T25321] ? proc_fail_nth_write+0x213/0x290 [ 1563.433867][T25321] ? proc_fail_nth_read+0x220/0x220 [ 1563.438904][T25321] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1563.443847][T25321] ? vfs_write+0x9af/0x1050 [ 1563.448194][T25321] ? vmacache_update+0xb7/0x120 [ 1563.452966][T25321] kernel_clone+0x22d/0x990 [ 1563.457302][T25321] ? file_end_write+0x1b0/0x1b0 [ 1563.461990][T25321] ? __kasan_check_write+0x14/0x20 [ 1563.466935][T25321] ? create_io_thread+0x1e0/0x1e0 [ 1563.471801][T25321] ? __mutex_lock_slowpath+0x10/0x10 [ 1563.476917][T25321] __x64_sys_clone+0x289/0x310 [ 1563.481520][T25321] ? __do_sys_vfork+0x130/0x130 [ 1563.486327][T25321] ? debug_smp_processor_id+0x17/0x20 [ 1563.491532][T25321] do_syscall_64+0x44/0xd0 [ 1563.495788][T25321] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1563.501517][T25321] RIP: 0033:0x7f65e6eb55a9 [ 1563.505767][T25321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 11:51:58 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 80) 11:51:58 executing program 0: syz_clone(0xa120000, 0x0, 0x16, 0x0, 0x0, 0x0) syz_clone(0x120c0000, &(0x7f0000000000)="26187cf4027304f2906ab4c267ad745b97f6", 0x12, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="fe981068cf12adb52a4d1de3dc04f7363408c3979dea6681d8fd") r0 = gettid() perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3, 0x7f, 0x5, 0x3, 0x0, 0x101, 0x44760, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfb5, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x20, 0x8000, 0x6, 0x8, 0x0, 0xfffffff8, 0x40, 0x0, 0x8ad, 0x0, 0x1f}, r0, 0x3, 0xffffffffffffffff, 0x0) syz_clone(0xa120000, 0x0, 0x16, 0x0, 0x0, 0x0) (async) syz_clone(0x120c0000, &(0x7f0000000000)="26187cf4027304f2906ab4c267ad745b97f6", 0x12, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="fe981068cf12adb52a4d1de3dc04f7363408c3979dea6681d8fd") (async) gettid() (async) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3, 0x7f, 0x5, 0x3, 0x0, 0x101, 0x44760, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfb5, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x20, 0x8000, 0x6, 0x8, 0x0, 0xfffffff8, 0x40, 0x0, 0x8ad, 0x0, 0x1f}, r0, 0x3, 0xffffffffffffffff, 0x0) (async) 11:51:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:58 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x81) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x11}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x9}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1563.525219][T25321] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1563.533557][T25321] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1563.541362][T25321] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1563.549177][T25321] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1563.556988][T25321] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1563.564798][T25321] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1563.572616][T25321] 11:51:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:58 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x81) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) 11:51:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xa}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x12}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x18}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xb}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) [ 1563.586482][T25335] FAULT_INJECTION: forcing a failure. [ 1563.586482][T25335] name failslab, interval 1, probability 0, space 0, times 0 [ 1563.614985][T25335] CPU: 0 PID: 25335 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1563.625064][T25335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1563.634959][T25335] Call Trace: [ 1563.638086][T25335] [ 1563.640858][T25335] dump_stack_lvl+0x151/0x1b7 [ 1563.645377][T25335] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1563.650667][T25335] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 1563.656920][T25335] dump_stack+0x15/0x17 [ 1563.660909][T25335] should_fail+0x3c0/0x510 [ 1563.665162][T25335] __should_failslab+0x9f/0xe0 [ 1563.669762][T25335] should_failslab+0x9/0x20 [ 1563.674098][T25335] kmem_cache_alloc+0x4f/0x2f0 [ 1563.678713][T25335] ? anon_vma_fork+0xf7/0x4f0 [ 1563.683214][T25335] anon_vma_fork+0xf7/0x4f0 [ 1563.687556][T25335] ? anon_vma_name+0x43/0x70 [ 1563.691988][T25335] dup_mmap+0x750/0xea0 [ 1563.695977][T25335] ? __delayed_free_task+0x20/0x20 [ 1563.700923][T25335] ? mm_init+0x807/0x960 [ 1563.705012][T25335] dup_mm+0x91/0x330 [ 1563.708734][T25335] copy_mm+0x108/0x1b0 [ 1563.712646][T25335] copy_process+0x1295/0x3250 [ 1563.717154][T25335] ? proc_fail_nth_write+0x213/0x290 [ 1563.722273][T25335] ? proc_fail_nth_read+0x220/0x220 [ 1563.727307][T25335] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1563.733141][T25335] ? vfs_write+0x9af/0x1050 [ 1563.737489][T25335] ? vmacache_update+0xb7/0x120 [ 1563.742164][T25335] kernel_clone+0x22d/0x990 [ 1563.746504][T25335] ? file_end_write+0x1b0/0x1b0 [ 1563.751187][T25335] ? __kasan_check_write+0x14/0x20 [ 1563.756133][T25335] ? create_io_thread+0x1e0/0x1e0 [ 1563.761014][T25335] ? __mutex_lock_slowpath+0x10/0x10 [ 1563.766132][T25335] __x64_sys_clone+0x289/0x310 [ 1563.770720][T25335] ? __do_sys_vfork+0x130/0x130 [ 1563.775407][T25335] ? debug_smp_processor_id+0x17/0x20 [ 1563.780611][T25335] do_syscall_64+0x44/0xd0 [ 1563.784865][T25335] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1563.790592][T25335] RIP: 0033:0x7f65e6eb55a9 [ 1563.794848][T25335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1563.814289][T25335] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1563.822536][T25335] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1563.830473][T25335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1563.838244][T25335] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1563.846056][T25335] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1563.853865][T25335] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1563.861680][T25335] [ 1563.871387][T25335] ================================================================== [ 1563.879285][T25335] BUG: KASAN: use-after-free in vm_area_free+0x7e/0x230 [ 1563.886050][T25335] Write of size 4 at addr ffff888113b37748 by task syz-executor.3/25335 [ 1563.894203][T25335] [ 1563.896373][T25335] CPU: 0 PID: 25335 Comm: syz-executor.3 Not tainted 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1563.906441][T25335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1563.916338][T25335] Call Trace: [ 1563.919467][T25335] [ 1563.922239][T25335] dump_stack_lvl+0x151/0x1b7 [ 1563.926753][T25335] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1563.932047][T25335] ? panic+0x727/0x727 [ 1563.935957][T25335] ? slab_free_freelist_hook+0xc9/0x1a0 [ 1563.941331][T25335] print_address_description+0x87/0x3d0 [ 1563.946715][T25335] kasan_report+0x1a6/0x1f0 [ 1563.951053][T25335] ? vm_area_free+0x7e/0x230 [ 1563.955482][T25335] ? vm_area_free+0x7e/0x230 [ 1563.959906][T25335] kasan_check_range+0x2aa/0x2e0 [ 1563.964681][T25335] __kasan_check_write+0x14/0x20 [ 1563.969453][T25335] vm_area_free+0x7e/0x230 [ 1563.973707][T25335] dup_mmap+0xbcd/0xea0 [ 1563.977698][T25335] ? __delayed_free_task+0x20/0x20 [ 1563.982645][T25335] ? mm_init+0x807/0x960 [ 1563.986724][T25335] dup_mm+0x91/0x330 [ 1563.990460][T25335] copy_mm+0x108/0x1b0 [ 1563.994366][T25335] copy_process+0x1295/0x3250 [ 1563.998878][T25335] ? proc_fail_nth_write+0x213/0x290 [ 1564.003997][T25335] ? proc_fail_nth_read+0x220/0x220 [ 1564.009033][T25335] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1564.013980][T25335] ? vfs_write+0x9af/0x1050 [ 1564.018327][T25335] ? vmacache_update+0xb7/0x120 [ 1564.023084][T25335] kernel_clone+0x22d/0x990 [ 1564.027347][T25335] ? file_end_write+0x1b0/0x1b0 [ 1564.032033][T25335] ? __kasan_check_write+0x14/0x20 [ 1564.036979][T25335] ? create_io_thread+0x1e0/0x1e0 [ 1564.041839][T25335] ? __mutex_lock_slowpath+0x10/0x10 [ 1564.046961][T25335] __x64_sys_clone+0x289/0x310 [ 1564.051561][T25335] ? __do_sys_vfork+0x130/0x130 [ 1564.056252][T25335] ? debug_smp_processor_id+0x17/0x20 [ 1564.061457][T25335] do_syscall_64+0x44/0xd0 [ 1564.065713][T25335] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1564.071438][T25335] RIP: 0033:0x7f65e6eb55a9 [ 1564.075691][T25335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1564.095131][T25335] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1564.103377][T25335] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1564.111188][T25335] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1564.118999][T25335] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1564.126811][T25335] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1564.134629][T25335] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1564.142435][T25335] [ 1564.145297][T25335] [ 1564.147474][T25335] Allocated by task 25321: [ 1564.151719][T25335] __kasan_slab_alloc+0xb2/0xe0 [ 1564.156406][T25335] kmem_cache_alloc+0x189/0x2f0 [ 1564.161441][T25335] vm_area_dup+0x26/0x1d0 [ 1564.165613][T25335] dup_mmap+0x6b8/0xea0 [ 1564.169598][T25335] dup_mm+0x91/0x330 [ 1564.173333][T25335] copy_mm+0x108/0x1b0 [ 1564.177237][T25335] copy_process+0x1295/0x3250 [ 1564.181750][T25335] kernel_clone+0x22d/0x990 [ 1564.186091][T25335] __x64_sys_clone+0x289/0x310 [ 1564.190688][T25335] do_syscall_64+0x44/0xd0 [ 1564.194944][T25335] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1564.200671][T25335] [ 1564.203015][T25335] Freed by task 25331: [ 1564.206920][T25335] kasan_set_track+0x4c/0x70 [ 1564.211346][T25335] kasan_set_free_info+0x23/0x40 [ 1564.221095][T25335] ____kasan_slab_free+0x126/0x160 [ 1564.226015][T25335] __kasan_slab_free+0x11/0x20 [ 1564.230615][T25335] slab_free_freelist_hook+0xc9/0x1a0 [ 1564.235822][T25335] kmem_cache_free+0x11a/0x2e0 [ 1564.240422][T25335] vm_area_free+0x1ae/0x230 [ 1564.244765][T25335] exit_mmap+0x5dd/0x7a0 [ 1564.248843][T25335] __mmput+0x95/0x300 [ 1564.252681][T25335] mmput+0x50/0x60 [ 1564.256228][T25335] exit_mm+0x50d/0x760 [ 1564.260125][T25335] do_exit+0x63c/0x24d0 [ 1564.264135][T25335] __ia32_sys_exit+0x0/0x40 [ 1564.268456][T25335] do_syscall_64+0x44/0xd0 [ 1564.272718][T25335] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1564.278439][T25335] [ 1564.280609][T25335] The buggy address belongs to the object at ffff888113b376f0 [ 1564.280609][T25335] which belongs to the cache vm_area_struct of size 232 [ 1564.294757][T25335] The buggy address is located 88 bytes inside of [ 1564.294757][T25335] 232-byte region [ffff888113b376f0, ffff888113b377d8) [ 1564.307783][T25335] The buggy address belongs to the page: [ 1564.313244][T25335] page:ffffea00044ecdc0 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x113b37 [ 1564.323311][T25335] flags: 0x4000000000000200(slab|zone=1) [ 1564.328788][T25335] raw: 4000000000000200 0000000000000000 0000000a00000001 ffff888100274000 [ 1564.337206][T25335] raw: 0000000000000000 00000000000d000d 00000001ffffffff 0000000000000000 [ 1564.345617][T25335] page dumped because: kasan: bad access detected [ 1564.351868][T25335] page_owner tracks the page as allocated [ 1564.357429][T25335] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 424, ts 860571427580, free_ts 860550766578 [ 1564.373305][T25335] post_alloc_hook+0x1ab/0x1b0 [ 1564.377902][T25335] get_page_from_freelist+0x38b/0x400 [ 1564.383124][T25335] __alloc_pages+0x3a8/0x7c0 [ 1564.387642][T25335] allocate_slab+0x62/0x580 [ 1564.391977][T25335] ___slab_alloc+0x2e2/0x6f0 [ 1564.396391][T25335] __slab_alloc+0x4a/0x90 [ 1564.400568][T25335] kmem_cache_alloc+0x205/0x2f0 [ 1564.405243][T25335] vm_area_dup+0x26/0x1d0 [ 1564.409419][T25335] dup_mmap+0x6b8/0xea0 [ 1564.413403][T25335] dup_mm+0x91/0x330 [ 1564.417143][T25335] copy_mm+0x108/0x1b0 [ 1564.421047][T25335] copy_process+0x1295/0x3250 [ 1564.425553][T25335] kernel_clone+0x22d/0x990 [ 1564.429892][T25335] __x64_sys_clone+0x289/0x310 [ 1564.434498][T25335] do_syscall_64+0x44/0xd0 [ 1564.438746][T25335] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1564.444486][T25335] page last free stack trace: [ 1564.448986][T25335] free_pcp_prepare+0x448/0x450 [ 1564.453673][T25335] free_unref_page_list+0x16a/0xad0 [ 1564.458710][T25335] release_pages+0xf3e/0xf90 [ 1564.463135][T25335] free_pages_and_swap_cache+0x97/0xb0 [ 1564.468429][T25335] tlb_flush_mmu+0x860/0xa00 [ 1564.472957][T25335] tlb_finish_mmu+0xd2/0x1f0 [ 1564.477371][T25335] exit_mmap+0x46e/0x7a0 [ 1564.481449][T25335] __mmput+0x95/0x300 [ 1564.485272][T25335] mmput+0x50/0x60 [ 1564.488825][T25335] exit_mm+0x50d/0x760 [ 1564.492743][T25335] do_exit+0x63c/0x24d0 [ 1564.496728][T25335] do_group_exit+0x13a/0x300 [ 1564.501151][T25335] get_signal+0x77e/0x1600 [ 1564.505410][T25335] arch_do_signal_or_restart+0x9f/0x670 [ 1564.510783][T25335] exit_to_user_mode_loop+0xd4/0x110 [ 1564.515906][T25335] syscall_exit_to_user_mode+0x79/0xc0 [ 1564.521205][T25335] [ 1564.523369][T25335] Memory state around the buggy address: [ 1564.528860][T25335] ffff888113b37600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 11:51:59 executing program 3: syz_clone(0x10820000, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 81) 11:51:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xc}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:59 executing program 1: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x81) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x81) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) (async) 11:51:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x21}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:59 executing program 0: syz_clone(0xa120000, 0x0, 0x16, 0x0, 0x0, 0x0) syz_clone(0x120c0000, &(0x7f0000000000)="26187cf4027304f2906ab4c267ad745b97f6", 0x12, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="fe981068cf12adb52a4d1de3dc04f7363408c3979dea6681d8fd") r0 = gettid() perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3, 0x7f, 0x5, 0x3, 0x0, 0x101, 0x44760, 0x8, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfb5, 0x4, @perf_bp={&(0x7f0000000100), 0x2}, 0x20, 0x8000, 0x6, 0x8, 0x0, 0xfffffff8, 0x40, 0x0, 0x8ad, 0x0, 0x1f}, r0, 0x3, 0xffffffffffffffff, 0x0) [ 1564.536836][T25335] ffff888113b37680: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fa fb [ 1564.544733][T25335] >ffff888113b37700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1564.552632][T25335] ^ [ 1564.558882][T25335] ffff888113b37780: fb fb fb fb fb fb fb fb fb fb fb fc fc fc fc fc [ 1564.566774][T25335] ffff888113b37800: fc fc fc fa fb fb fb fb fb fb fb fb fb fb fb fb [ 1564.574665][T25335] ================================================================== [ 1564.582565][T25335] Disabling lock debugging due to kernel taint 11:51:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x25}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0xd}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) 11:51:59 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x5421, 0x1ffff000) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000000)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) 11:51:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@union={0x1, 0x43}]}, {0x0, [0x5f]}}, &(0x7f0000000180)=""/203, 0x27, 0xcb, 0x1}, 0x20) 11:51:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x5, [@union={0x1}]}, {0x0, [0x5f, 0x30, 0x61]}}, &(0x7f0000000180)=""/203, 0x29, 0xcb, 0x1}, 0x20) [ 1564.614970][T25372] FAULT_INJECTION: forcing a failure. [ 1564.614970][T25372] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.664624][T25372] CPU: 0 PID: 25372 Comm: syz-executor.3 Tainted: G B 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1564.676098][T25372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1564.685993][T25372] Call Trace: [ 1564.689124][T25372] [ 1564.692002][T25372] dump_stack_lvl+0x151/0x1b7 [ 1564.696498][T25372] ? bfq_pos_tree_add_move+0x43e/0x43e [ 1564.701797][T25372] ? vma_interval_tree_augment_rotate+0x210/0x210 [ 1564.708040][T25372] dump_stack+0x15/0x17 [ 1564.712035][T25372] should_fail+0x3c0/0x510 [ 1564.716281][T25372] __should_failslab+0x9f/0xe0 [ 1564.721094][T25372] should_failslab+0x9/0x20 [ 1564.725447][T25372] kmem_cache_alloc+0x4f/0x2f0 [ 1564.730031][T25372] ? anon_vma_fork+0xf7/0x4f0 [ 1564.734542][T25372] anon_vma_fork+0xf7/0x4f0 [ 1564.738904][T25372] ? anon_vma_name+0x43/0x70 [ 1564.743318][T25372] dup_mmap+0x750/0xea0 [ 1564.747310][T25372] ? __delayed_free_task+0x20/0x20 [ 1564.752252][T25372] ? mm_init+0x807/0x960 [ 1564.756332][T25372] dup_mm+0x91/0x330 [ 1564.760071][T25372] copy_mm+0x108/0x1b0 [ 1564.763969][T25372] copy_process+0x1295/0x3250 [ 1564.768483][T25372] ? proc_fail_nth_write+0x213/0x290 [ 1564.773714][T25372] ? proc_fail_nth_read+0x220/0x220 [ 1564.778849][T25372] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 1564.783783][T25372] ? vfs_write+0x9af/0x1050 [ 1564.788122][T25372] ? vmacache_update+0xb7/0x120 [ 1564.792935][T25372] kernel_clone+0x22d/0x990 [ 1564.797252][T25372] ? file_end_write+0x1b0/0x1b0 [ 1564.801922][T25372] ? __kasan_check_write+0x14/0x20 [ 1564.806867][T25372] ? create_io_thread+0x1e0/0x1e0 [ 1564.811729][T25372] ? __mutex_lock_slowpath+0x10/0x10 [ 1564.816859][T25372] __x64_sys_clone+0x289/0x310 [ 1564.821453][T25372] ? __do_sys_vfork+0x130/0x130 [ 1564.826148][T25372] ? debug_smp_processor_id+0x17/0x20 [ 1564.831344][T25372] do_syscall_64+0x44/0xd0 [ 1564.835773][T25372] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1564.841501][T25372] RIP: 0033:0x7f65e6eb55a9 [ 1564.845755][T25372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 1564.865206][T25372] RSP: 002b:00007f65e6029118 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1564.873443][T25372] RAX: ffffffffffffffda RBX: 00007f65e6fd5f80 RCX: 00007f65e6eb55a9 [ 1564.881250][T25372] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010820000 [ 1564.889061][T25372] RBP: 00007f65e60291d0 R08: 0000000000000000 R09: 0000000000000000 [ 1564.896876][T25372] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1564.904694][T25372] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1564.912505][T25372] [ 1564.922479][T25372] general protection fault, probably for non-canonical address 0xe4db380b1ffff110: 0000 [#1] PREEMPT SMP KASAN [ 1564.934000][T25372] KASAN: maybe wild-memory-access in range [0x26d9e058ffff8880-0x26d9e058ffff8887] [ 1564.943116][T25372] CPU: 0 PID: 25372 Comm: syz-executor.3 Tainted: G B 5.15.73-syzkaller-04348-g44b8b2ac1d96 #0 [ 1564.954570][T25372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 [ 1564.964464][T25372] RIP: 0010:__rb_erase_color+0x6c/0xb60 [ 1564.969849][T25372] Code: e8 09 05 2d ff 4c 8b 23 4d 39 e6 4c 89 6d c8 0f 84 79 01 00 00 48 89 5d c0 4c 89 e3 48 c1 eb 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 03 00 74 08 4c 89 e7 e8 d6 04 2d ff 41 f6 04 24 01 4c 89 7d [ 1564.989287][T25372] RSP: 0018:ffffc90008107728 EFLAGS: 00010202 [ 1564.995188][T25372] RAX: dffffc0000000000 RBX: 04db3c0b1ffff110 RCX: dffffc0000000000 [ 1565.002999][T25372] RDX: ffffffff81a6fa00 RSI: ffff88810995daf0 RDI: ffff888126d9e058 [ 1565.010811][T25372] RBP: ffffc90008107788 R08: ffffffff81a6db99 R09: ffffed102132bb62 [ 1565.018623][T25372] R10: ffffed102132bb62 R11: 1ffff1102132bb61 R12: 26d9e058ffff8881 [ 1565.026437][T25372] R13: ffff88812aa334f4 R14: ffff888126d9e058 R15: 1ffff1102554669f [ 1565.034252][T25372] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1565.043012][T25372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1565.049438][T25372] CR2: 00007f65e6fd2000 CR3: 000000012aa32000 CR4: 00000000003506b0 [ 1565.057248][T25372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1565.065060][T25372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1565.072870][T25372] Call Trace: [ 1565.076000][T25372] [ 1565.078781][T25372] ? anon_vma_interval_tree_iter_next+0x3b0/0x3b0 [ 1565.085023][T25372] ? down_write+0xdd/0x140 [ 1565.089272][T25372] vma_interval_tree_remove+0xa66/0xa80 [ 1565.094658][T25372] unlink_file_vma+0xd9/0xf0 [ 1565.099088][T25372] free_pgtables+0x13b/0x210 [ 1565.103510][T25372] exit_mmap+0x466/0x7a0 [ 1565.107587][T25372] ? exit_aio+0x270/0x3b0 [ 1565.111756][T25372] ? vm_brk+0x30/0x30 [ 1565.115571][T25372] ? mutex_unlock+0xa2/0x110 [ 1565.120090][T25372] ? uprobe_clear_state+0x2c2/0x320 [ 1565.125126][T25372] __mmput+0x95/0x300 [ 1565.128938][T25372] mmput+0x50/0x60 [ 1565.132496][T25372] exit_mm+0x50d/0x760 [ 1565.136407][T25372] ? exit_itimers+0x694/0x6e0 [ 1565.140915][T25372] ? do_exit+0x24d0/0x24d0 [ 1565.145168][T25372] ? taskstats_exit+0x3a0/0xa20 [ 1565.149856][T25372] do_exit+0x63c/0x24d0 [ 1565.153849][T25372] ? get_task_struct+0x80/0x80 [ 1565.158449][T25372] ? _raw_spin_lock_irqsave+0x210/0x210 [ 1565.163829][T25372] do_group_exit+0x13a/0x300 [ 1565.168255][T25372] ? __kasan_check_write+0x14/0x20 [ 1565.173215][T25372] get_signal+0x77e/0x1600 [ 1565.177457][T25372] arch_do_signal_or_restart+0x9f/0x670 [ 1565.182839][T25372] ? get_sigframe_size+0x10/0x10 [ 1565.187610][T25372] exit_to_user_mode_loop+0xd4/0x110 [ 1565.192733][T25372] syscall_exit_to_user_mode+0x79/0xc0 [ 1565.198026][T25372] do_syscall_64+0x50/0xd0 [ 1565.202280][T25372] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1565.208006][T25372] RIP: 0033:0x7f65e6eb55a9 [ 1565.212259][T25372] Code: Unable to access opcode bytes at RIP 0x7f65e6eb557f. [ 1565.219469][T25372] RSP: 002b:00007f65e6029218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 1565.227707][T25372] RAX: fffffffffffffe00 RBX: 00007f65e6fd5f88 RCX: 00007f65e6eb55a9 [ 1565.235547][T25372] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f65e6fd5f88 [ 1565.243340][T25372] RBP: 00007f65e6fd5f80 R08: 0000000000000000 R09: 0000000000000000 [ 1565.251154][T25372] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f65e6fd5f8c [ 1565.259042][T25372] R13: 00007ffda747a73f R14: 00007f65e6029300 R15: 0000000000022000 [ 1565.266857][T25372] [ 1565.269717][T25372] Modules linked in: [ 1565.273624][T25372] ---[ end trace 2d994cec142d6614 ]--- [ 1565.279003][T25372] RIP: 0010:__rb_erase_color+0x6c/0xb60 [ 1565.284469][T25372] Code: e8 09 05 2d ff 4c 8b 23 4d 39 e6 4c 89 6d c8 0f 84 79 01 00 00 48 89 5d c0 4c 89 e3 48 c1 eb 03 48 b8 00 00 00 00 00 fc ff df <80> 3c 03 00 74 08 4c 89 e7 e8 d6 04 2d ff 41 f6 04 24 01 4c 89 7d [ 1565.304014][T25372] RSP: 0018:ffffc90008107728 EFLAGS: 00010202 [ 1565.309962][T25372] RAX: dffffc0000000000 RBX: 04db3c0b1ffff110 RCX: dffffc0000000000 [ 1565.317739][T25372] RDX: ffffffff81a6fa00 RSI: ffff88810995daf0 RDI: ffff888126d9e058 [ 1565.325594][T25372] RBP: ffffc90008107788 R08: ffffffff81a6db99 R09: ffffed102132bb62 [ 1565.333407][T25372] R10: ffffed102132bb62 R11: 1ffff1102132bb61 R12: 26d9e058ffff8881 [ 1565.341281][T25372] R13: ffff88812aa334f4 R14: ffff888126d9e058 R15: 1ffff1102554669f [ 1565.349124][T25372] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1565.357904][T25372] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1565.364349][T25372] CR2: 00007f65e6fd2000 CR3: 000000012aa32000 CR4: 00000000003506b0 [ 1565.372184][T25372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1565.380067][T25372] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1565.387929][T25372] Kernel panic - not syncing: Fatal exception [ 1565.393943][T25372] Kernel Offset: disabled [ 1565.398070][T25372] Rebooting in 86400 seconds..