last executing test programs: 7m11.821738548s ago: executing program 1 (id=6076): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000016a000000", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/180, 0xb4}, {0x0}, {&(0x7f0000000280)=""/111, 0x6f}, {&(0x7f0000000580)=""/164, 0xa4}, {&(0x7f0000000400)=""/63, 0x3f}], 0x5, &(0x7f0000000780)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x90}, 0x2041) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x105c34}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x5452, 0x20001412) r5 = perf_event_open$cgroup(&(0x7f0000000880)={0x2, 0x80, 0x88, 0x6, 0x3, 0x5, 0x0, 0xc01, 0x1, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f0000000840), 0xd}, 0x13028, 0x7, 0xff, 0x5, 0x0, 0x9, 0x1, 0x0, 0x200, 0x0, 0x10001}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000900)='sched_switch\x00') ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x1a) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x1) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 7m11.693090099s ago: executing program 4 (id=6079): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b703000000000083"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x9a, 0x0, 0x0, 0x0, 0x0, 0x7, 0x10490, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000680)={0xffffffffffffffff, 0x58, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0xf, &(0x7f0000000840)=ANY=[@ANYBLOB="058030000100000018000000070000000000000001000000186200000900000000000008080000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000085100000080000008500000030000000"], &(0x7f0000000400)='GPL\x00', 0x8, 0xb9, &(0x7f00000004c0)=""/185, 0x41000, 0x10, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000006c0)={0x0, 0x6, 0x0, 0x9062d06}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000040000000800000040100000", @ANYRES32, @ANYBLOB="000000000000000000000000000000008f3ce9cc", @ANYRES32=r1, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="1b2a6262074a9b1d5e738a95da125f28000000000000000000000000800000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r1, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRES64=0x0, @ANYRES64=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0xce9, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0xfffffffeffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="b40000000000000061115c00000000009600f8ff0000000095007400000036a89b309c70e54b747026b63bdfe69fa9bc864f0599127bf5ffc750d747db6b7ea0e3c5025967d257b2fb2de4873a504f8f519ccfb75bcebdc41073521116254c183c3f0658a8f8fea0c1d2504040737458473165373635336af20320c2ed49bf8f8f3043b5c4b873f1f3c252c3da7a3b3fc9b41b88b962b313d98159121d25a0349021683e4eafc76222"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r4, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, 0x0, 0x8, 0x0, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r8, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 7m11.330400562s ago: executing program 4 (id=6081): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb5, 0x0, 0xfe, 0x2, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1d, 0x2, 0x2, 0x0) 7m11.174843986s ago: executing program 1 (id=6082): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001f40)={&(0x7f0000001d80)=ANY=[], &(0x7f0000001e40)=""/240, 0x2f, 0xf0, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800082}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r4, 0x40047451, 0x2000000c) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[], 0xfffffdef) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x20000992) 7m10.899794831s ago: executing program 3 (id=6083): bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(0x3) 7m10.702168369s ago: executing program 3 (id=6084): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\"\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 7m10.456858751s ago: executing program 4 (id=6088): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000020000008500000086000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r3, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r5}, 0x10) unlink(0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r7, &(0x7f00000005c0)=ANY=[@ANYBLOB="2b6370759833f5e17e05f0d105608b0422202b706964732067475b2e4995faba5635e104008bdee9f080ea7780c347b978198ea00566caf90000000000000098ddbcd0ce9ad9d1614b23"], 0xb) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1888, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e74424f", 0xb0, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f0000000080)) 7m10.346051601s ago: executing program 3 (id=6089): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000010000000000000000000000000000000000000000000568a79fca213e6705170de8a35fe31f7b70ff4e693f62bd43fdbee6e4ee32bff61af48ddedaf98bc96ab14113668e57a2339776b450e3ffbd7bdc4c571a591d8dc289e58be733df6584355fabe1130da067c2ef4d57d77885284248615ecfe009093f9771825c794e0e7fefd5a8d700d0be06c35dd220a16e103a975546b1933160281f5e7bd54dce40954763e03830d3a0e6ceaaebe9e002d57db5c53660fac4ce7aac8893a8e599e7d19d2a8fa6f8c291e766016f453db8fb4fab7c8123a23c8e023e7c9dc65d8de5881f0a0021946020b31ff19a03dda"], 0x48) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000070000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r1}, 0x10) close(r4) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x15) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='afs_make_fs_calli\x00', r10}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r11 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000080)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="b60a0000000000196111a40000000000180000000000000000000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc42, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x58) openat$cgroup_ro(r11, &(0x7f0000000280)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) 7m10.228377512s ago: executing program 4 (id=6090): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='freezer.parent_freezing\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000880)={0x9}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1200000004000000080000000100bff732469c89544c7496cd10d90a8113c3f244b93009882c07ee59c3a6842e9f6b03341819ccf4ec83ddc749388bab5efda3311b1ca4ee3ff260f35f355af171c208441379886b9e514f", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0e00000004000000000000f00000b11ff9767b77dfa79bfbf9f96966dffc237530ebebd134", @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) 7m10.208976504s ago: executing program 3 (id=6091): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70200001400a685b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$ITER_CREATE(0x21, &(0x7f0000000540), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x15, 0x9, 0xe000000, 0x9, 0x1081, 0xffffffffffffffff, 0x3f, '\x00', 0x0, r7, 0x4, 0x1, 0x4, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xb, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x7, 0x6, 0x1, 0x8, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, @ldst={0x3, 0x3, 0x4, 0xa, 0x2, 0x2, 0x1}, @call={0x85, 0x0, 0x0, 0x63}, @exit, @ldst={0x0, 0x1, 0x3, 0x4, 0x4, 0x30, 0x10}]}, &(0x7f00000001c0)='GPL\x00', 0x1f9a4282, 0x21, &(0x7f0000000200)=""/33, 0x40f00, 0x2, '\x00', 0x0, 0x0, r7, 0x8, &(0x7f0000000300)={0x2, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xc, 0x10000, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000500)=[0xffffffffffffffff], &(0x7f0000000540)=[{0x5, 0x4, 0xf, 0x2}, {0x0, 0x2, 0x3, 0x3}, {0x4, 0x1, 0x4, 0x9}, {0x4, 0x3, 0x4, 0xa}, {0x0, 0x5, 0x9, 0x6}, {0x1, 0x4, 0x1, 0x7}], 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x4, 0x8, 0xffffffff, 0x0, 0x2030, r6, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102032900fc08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xe24}, {0x0, 0x4000}, {0x0}, {0x0}, {&(0x7f00000020c0), 0x500}], 0x5}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) 7m10.13885294s ago: executing program 2 (id=6092): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000016a000000", @ANYRES32=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000180)=""/180, 0xb4}, {0x0}, {&(0x7f0000000280)=""/111, 0x6f}, {&(0x7f0000000580)=""/164, 0xa4}, {&(0x7f0000000400)=""/63, 0x3f}], 0x5, &(0x7f0000000780)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x90}, 0x2041) perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x105c34}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x5452, 0x20001412) r5 = perf_event_open$cgroup(&(0x7f0000000880)={0x2, 0x80, 0x88, 0x6, 0x3, 0x5, 0x0, 0xc01, 0x1, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff, 0x1, @perf_bp={&(0x7f0000000840), 0xd}, 0x13028, 0x7, 0xff, 0x5, 0x0, 0x9, 0x1, 0x0, 0x200, 0x0, 0x10001}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000900)='sched_switch\x00') ioctl$TUNSETOFFLOAD(r4, 0x400454d0, 0x1a) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x1) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 7m9.969765025s ago: executing program 1 (id=6093): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000"], 0x18}, 0x0) recvmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0x0) 7m9.854694696s ago: executing program 3 (id=6094): setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f1e7f2aa3d9b18ed81c0c869b51ec6c0af4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b07080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289e01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5465a932b77e74e802a0d42bc6099ad2300000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb0767192302000000b0eea24492a660583eecb42cbcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf5af51d564beb6d952aab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca005ace1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed85b980680b00002b435ac15fc0288d9b2a169cdcacc413038dafb7a2c8cb482bac0ac502d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff729433282830689da6b53b263339863297771429d120000003341bf4abacac95900fca0493cf29b33dcc9ffffffffffffffd39fec2271ff01589646efd1cf870cd7bb2366fde41f94290c2a5ff870ce41fd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f76161d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2ae582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3546c1c776da64fb5abee0acfd235f2f4632c9062ece84c99a061887a20639b41c8c12ee86c50804042b3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acf37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f45f90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff0700000000cc9d8046c216c1f895778cb25122a2a9f9b444aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250ddc8674152f94e3a409e2a3bce109b60000000000000000d6d5210d7503000000a87a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e873f8703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e6c257a45319f18101288d139bd3da20fed05a8fe64680b0a3fc22dd70400000000946912d6c98cd1a9fbe1e7d58c08acaf30235b918a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009556237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854352cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66418d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466a53f1c96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a42010082008df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7eaa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945ecefa26b8471d42645288d7226bbd9ccd628ab84875f2c50ba891cea592b0430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7daac4be290159f6bcd75f0dda9de5532e71ae9e48b0ed0254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b0fdf9743af932cd6db49a47613808bad959710300000000000000832d0a45fa4242e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6cafa86966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e30393cd7a4d67ff2a49c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bf3194fef97dcecc467ace45feeb685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4e064c98e494198276eb2df7766411bef0ebb5000000000006065d635b0b7a00ee767221d8af9753387e0cd8d718f54a29df6eba3bd4c440e6e2172e3fcc01b8babb757b5c59217b80d0db3ba582814a604e4ef7a803e9ca7c85b35c9b93a9e0885e238b44ae1c2e64cce3b27083b8246829e64056000302bffff15405bd5f2eba20000000000000000000000000000000000009a9823fd8fbc5aa16509945ed032b48ea12d8e0588dc52702e4084913a06d468d0928bad76d697e1f85ab030e788d38788ee5b5428d4a971cc97db9fd231088e570735ce129e7e77fc2777692664a1488fd8d6dff4dad618fd54f529d4555c6507009ee69dd1bc55258789b24052137e9637f3efbab71720f88c3c44b3b7486f979e8a3174b531f573fe0e5239c000be2733c49546f6e8a9175ec6f14dbf72cac91643b2fd99c29eca28a3c2e60d5e5b8795fae16a7c3ea57e728eca35eaf0155a39f97580e079175426c088a0208040982a0000000000000000000000000051ceaaf0159fe61f2eade7603d0a7a56fb09cd119ac06adb6597155ae47846892bb423c024d8cbe9240b71ec6dc2124d3a19e2d714b273d95d1d3aa737cb04a33615ff2a730e51067d5d675d7122361c37c61a43b5afd865b60d4cae891b73220f17d25985a7f76834995e53a93a1c7b9eef267df691ca983a0b15bda7f6c5c1ca7aa50261a3089a1ebf0734c9b07e8951ff023263ad5aed8cfb49b49e128c697724c057d22c5df5aef27ce3db11d5ad5527d149d076e1a87e2df27c0cb8a67ad026bf953e88f10447e125c2c0f1aebee1f3390a9e3ddad4e2a6e0f6e4569fdefa19e870e04acf9493b963f98e23cfc665e4f465fa3f801e1957c399e45f61d3459b1c606204368bb931345af2823c487d2fd99db6ea6e008e7ffa06ca861551189d155bd077a79fe2c7e961352e56824f727d21d41eae78bfec4a2d7a7edbc8ef958c5ea599f7c25bf71c2340558aa12fdd24a88aaad5921aee7dae6a2f3009d9cb43ab4898d0f0aa565431b6abe585d75db04d1c9ba0b9de4ae8b0d3132bc6810cc9a693979f55174a72e1df9fdef35bc470f9e6e591982757f45c52c645d891bf63bb21fb66926ebe1a8525611fc3e8bb8795c36dc2a86b5ab46ff33cc74f61751b2dae92676db85c8d0c721b7ea4544bf51c95c86fcac1f434d09d1ee4928aafe23de66fed972e0dddfb33f64e48701b049239e7f552d816441d11c4c2647c014462344359198d97c4b6e9ed31ca18987b64de079b2bed641e8a92f13ca70844c65cb423d01950b0ebf44bd28e09c05d9ae5dd689fb880fb18d042219f5ac60c3a03b085abf3e8e3efc842a8d328733461f04c99607061c65ed14c61322a5ac2d371a95b8ad867ec92d13a4fa4ae033a09673866cd77f4bcdaaa05207166b19a8758d8855400d8c6a7242dc207251e8797eca24ea4f487663e60f2f5e1f1424958fd148f846830e88a42d93e1fe9c0b4a4a268921738938aa9f3cb3811ac87c54c8ebc8bcfb4613cc3a997ff1579edbd4ade8020e3ad001b072b1a751b588ac4639f35a58e00a50c0270608c7a7f10132b1c25b9ea81232fbef665f6212f875b2a0000000000000000000000000000cf7b6c4ba9bec153d6834bfef080df374703a8ff56a63ec1fe5f2e05a79e3cace7283dd68d41e94420c325fe4dae144fde5ec25a87d625cab20753a77b323fa3783c8b675859b9012647885a242adfee2fe812ecbe5191e0a15142f7349e7627cc39d724e2e34e7a24154f26ae3125b36d0504965295d0453902ac7079b11a3a1e655e482331e3dc35b2e7e4e3ea99064fe5b9c8ae0ca3e5fd653f3286a99d81ce4eba765c38d097391ad4babac38ce5b4344e24a361cd54e5"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb5, 0x0, 0xfe, 0x2, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x9000, 0x0, 0x0, 0x5, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRES32], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 7m9.854096446s ago: executing program 4 (id=6095): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3000000, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) syz_clone(0xc4000000, 0x0, 0x0, 0x0, 0x0, 0x0) 7m9.638807325s ago: executing program 1 (id=6096): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan1\x00'}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb3cd2005d6d9be5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x0, &(0x7f0000000f80), 0x0, &(0x7f0000000080), &(0x7f0000000200), &(0x7f0000000280)="9878b2c002e3d71ac2106b20d581fa5718bb8704934d") bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000340)=0xffffffffffffffff, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000380), 0x4) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) close(0xffffffffffffffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYRES32=0x0, @ANYBLOB, @ANYBLOB="00000000000000000000000000000000bc6b086f4d2f3f9700000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xc, &(0x7f0000000a40)=ANY=[@ANYRESDEC=r1, @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x5, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x4004743d, 0x5333578052521f3b) 7m9.553456633s ago: executing program 2 (id=6097): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000280)="ca", &(0x7f0000000000)=""/10, 0x2}, 0x20) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100), 0x4) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xc, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000e9ff0000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b70300002bb91a008500000008000000bc0900000000000045080100002000009500000000000000b7020000000000007b9af8ff00000000b5090000000000007baaf0ff00000000bf2700000000000007080000fffdffffbfa400000000000007040000f0ffffffc40200000800000018220000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7050000080000004608efff76000000bf9800000000000056090000000000008500000000000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000240)={r0, &(0x7f0000000140), &(0x7f0000000000)=""/6, 0x2}, 0x20) (async) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000ac0)={{r0}, &(0x7f0000000780), &(0x7f0000000940)=r2}, 0x20) 7m9.486715289s ago: executing program 2 (id=6098): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\"\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 7m9.434600943s ago: executing program 1 (id=6099): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000007000000008000000100", @ANYRES32, @ANYBLOB="000800000000b5a89a53d4be988a7ad6ac5b0fad1b3d846eb715f0a7b7c6ab", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, 0x0, &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) (fail_nth: 1) 7m8.870786195s ago: executing program 1 (id=6100): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000007000000008000000100", @ANYRES32, @ANYBLOB="000800000000b5a89a53d4be988a7ad6ac5b0fad1b3d846eb715f0a7b7c6ab", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, 0x0, &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) 7m8.825609719s ago: executing program 4 (id=6101): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) write$cgroup_pid(r0, &(0x7f0000000300), 0x20000312) 7m8.81522026s ago: executing program 2 (id=6102): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000007000000050000000700000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000004c0), 0x3f, r0}, 0x38) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r0, &(0x7f0000000000), &(0x7f0000001340)=""/4096}, 0x20) 7m8.80856974s ago: executing program 3 (id=6103): sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb5, 0x0, 0xfe, 0x2, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1d, 0x2, 0x2, 0x0) 7m8.782600283s ago: executing program 2 (id=6104): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa10000000000001d70b67bf8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x6, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r0}, 0x8) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r0}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0x14, &(0x7f00000006c0)=@framed={{}, [@ringbuf_output={{0x18, 0x5, 0x1, 0x0, r4}, {}, {0x3, 0x3, 0x3, 0xa, 0x5}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x14}}, @printk={@lli}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0xcc03, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000f40)={r5, 0x609, 0xe, 0x0, &(0x7f0000000b40)="dd80000000000002000400000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000070000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r9}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r6}, 0x10) close(r10) 7m8.675733882s ago: executing program 2 (id=6105): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffffffbfffffe, 0x12) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x9b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033300fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x14c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) 6m44.588668352s ago: executing program 32 (id=6100): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000007000000008000000100", @ANYRES32, @ANYBLOB="000800000000b5a89a53d4be988a7ad6ac5b0fad1b3d846eb715f0a7b7c6ab", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, 0x0, &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) 6m44.579351103s ago: executing program 33 (id=6105): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000200)=0xfffffffffbfffffe, 0x12) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, 0x0, 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x9b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100033300fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000000)='./file0\x00', 0x14c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) 6m44.551348735s ago: executing program 34 (id=6103): sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb5, 0x0, 0xfe, 0x2, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1d, 0x2, 0x2, 0x0) 6m44.544627656s ago: executing program 35 (id=6101): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='blkio.bfq.empty_time\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r1}, 0x10) write$cgroup_pid(r0, &(0x7f0000000300), 0x20000312) 5.573809776s ago: executing program 6 (id=10714): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401, 0x5}, 0x6200, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x100181}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x18) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fcf5082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa"], 0xfdef) (fail_nth: 4) 5.059163682s ago: executing program 6 (id=10718): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB="0000000041af0e"], 0x48) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0x1, 0x16, 0x8, 0x9, 0x89, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x7, 0x5, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r2}], {0x95, 0x0, 0x0, 0x7100}}, &(0x7f0000000040)='syzkaller\x00', 0x5, 0xee, &(0x7f0000000200)=""/249, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffd71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x22) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000001340)='sched_switch\x00', r3}, 0x18) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0x0, 0x0, 0x8}, 0xc) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1030, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1e, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000000c0)={0x0, 0xa}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 4.879657648s ago: executing program 6 (id=10726): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf723752146fce2f7, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000180)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd63fc80fc020c2f00db5b686158bbcfe8875a060300000023000000000000000000000000ac1414aa3a2008"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x100, 0xffffffab, 0x0, 0x442, 0x1, 0x300, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x3, 0x3, @void, @value, @void, @value}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f0000000200)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x2, 0x0, 0x1, 0x0, 0x5, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x80000001, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffefffffffffffff, r2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 3.983632039s ago: executing program 6 (id=10741): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0xc8, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000050000000200000000100000", @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000d00ff0000000000f9ff00"/28], 0x50) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001b000000000000000008000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000008c0)='gpio_value\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f0000000040), 0x83000) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) 3.332095409s ago: executing program 6 (id=10747): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x14, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r4}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r4}, 0x18) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r5}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000040), 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000002c0)=0x3, 0x12) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x8040, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6, 0x7, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r6}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r8) 2.744575682s ago: executing program 8 (id=10753): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000003000000000000000000003600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 2.728676223s ago: executing program 8 (id=10755): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x90a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x65, 0x9c}, [@call={0x25}], {0x95, 0x0, 0xd00}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x8, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000016bf5b5fd60ec93575350c9f26fc0a77b400372c8d33fd623e63dc14918d864dc4e11cbe6f2b78b01158e4be3bee8655ef1fc26d7ad7b3cc587603c5d247b05bb29a14b15994a7643271854b8ea5d2a5d2d12b717ef3ec73bd5a953be923701b53240428f135030ffdd305fdce1cadfd0aa92030430a69197d037549ebea848a497783092b32f9968d3bea6c665a2bf7091651f8ae07eebe4c6033ad6bf2c4bd315e789bc071e56a5eaa35464f259f96d2af3e71f5ef704915d714f43bf41e6b65813a3a00aca0f18f41ffb416660311a397e15e3a760a6931dbc52783", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x5, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000cc0), 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c00)={&(0x7f0000000a80)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@union={0x2}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000b40)=""/176, 0x28, 0xb0, 0x1, 0x0, 0x0, @void, @value}, 0x20) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[], 0x48) bpf$TOKEN_CREATE(0x24, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001340)={0x1, 0xd, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x6, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2.698037916s ago: executing program 0 (id=10757): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0xc8, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000050000000200000000100000", @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000d00ff0000000000f9ff00"/28], 0x50) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001b000000000000000008000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000008c0)='gpio_value\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f0000000040), 0x83000) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) 2.633156132s ago: executing program 6 (id=10758): ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001200000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r1, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000001c0)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000000200)=[0x0], &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xed, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xbc, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000000000100000000000000000", @ANYRES32=r2, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x7, 0x4, 0x10001, 0x1, 0x8, 0xffffffffffffffff, 0x9991, '\x00', r2, 0xffffffffffffffff, 0x2, 0x3, 0x5, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="02000000040000000100000022bf000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000004416ce2c2632f8ffffff0000000000000000000000f40000006dae576f4bc76ac5bf8ec97297cd60fc1fef00d8fabddd2b5629370e3a0b76094661a3ea1deaedb866cd9168c39b51785ada8e63cb0c4bbf77c4dc16cd5dd2dc37fa91294571770c62214dc981594b3938e47093ee406cacb0df1562379362c83efdafc5a6b6c6ccc4f2f10230ac8cb1170862f862866eeea67392c881595d85"], 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='i2c_result\x00', r0, 0x0, 0xfff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r3, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f0000000840), 0xffffd6c0, r4}, 0x38) socketpair(0x0, 0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00'}, 0x10) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r7}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 2.383520864s ago: executing program 0 (id=10761): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80ff}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffe, 0x90ff}], {0x95, 0x0, 0x0, 0x7000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) 2.110504489s ago: executing program 7 (id=10762): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000004000000008000005c00000000000000", @ANYRES32, @ANYBLOB="0000000041af0e"], 0x48) 1.983442131s ago: executing program 7 (id=10763): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, &(0x7f0000000080), 0x8) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x1e18c0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x3000000, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x300, @void, @value}, 0x80) 1.846551613s ago: executing program 7 (id=10764): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r0}, 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r2, 0xf, 0x0, 0xfffffebe, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x16, 0x4, 0x4, 0x8001, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001f4a46d4850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0xd, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r7}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0xa, 0xa}, @printk={@x={0x18, 0x9}}]}, &(0x7f0000000000)='GPL\x00', 0x5, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x36) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0x4004743d, 0x2000000b) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r9}, 0x10) recvmsg$unix(r0, &(0x7f0000000c00)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000680)=""/200, 0xc8}, {&(0x7f0000000780)=""/203, 0xcb}, {&(0x7f0000000600)=""/63, 0x3f}, {&(0x7f0000000880)=""/60, 0x3c}, {&(0x7f0000000980)=""/3, 0x3}], 0x5, &(0x7f0000000b80)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}, 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.788758018s ago: executing program 5 (id=10765): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000003000000000000000000003600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 1.720713054s ago: executing program 5 (id=10766): recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000020000838500000070000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) r2 = getpid() perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x5, 0x7, 0xfb, 0x3, 0x0, 0x3, 0x10000, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x112448, 0x81, 0xf39, 0x5, 0x39708cb2, 0xc, 0x9, 0x0, 0x80000000, 0x0, 0x7}, r2, 0xd, r1, 0x2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000040)='sys_exit\x00', r0}, 0x10) close(r3) 1.541248761s ago: executing program 7 (id=10767): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x43451) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2f, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) (fail_nth: 24) 1.469028907s ago: executing program 5 (id=10768): perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) syz_clone(0x0, &(0x7f00000008c0), 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = perf_event_open$cgroup(&(0x7f0000000200)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x300, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000107000000000000000026001811", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x20001400) syz_clone(0xc4000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.467302907s ago: executing program 0 (id=10769): r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x7, 0x1, 0x56, 0x0, 0x0, 0x2, 0x8, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0xc}, 0x10000, 0x5, 0x10000, 0x4, 0x7, 0x1, 0xfffa, 0x0, 0x2, 0x0, 0x66ea}, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) r1 = bpf$ITER_CREATE(0x21, &(0x7f00000000c0), 0x8) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)=@o_path={&(0x7f0000000100)='./file0\x00', 0x0, 0x10, r0}, 0x18) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x3, &(0x7f0000000180)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2d, 0x0, 0x0, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}], &(0x7f00000001c0)='GPL\x00', 0x1, 0x5d, &(0x7f0000000200)=""/93, 0x41100, 0x2a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0x6, 0x6, 0x3}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x1, 0x1, 0xffffffffffffffff, r0, 0xffffffffffffffff, 0x1, 0x1, 0x1, 0xffffffffffffffff, 0x1], &(0x7f0000000300)=[{0x4, 0x1, 0x2, 0x8}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000400)={r1, r2, 0x4, r3}, 0x10) r4 = syz_clone(0x22801000, &(0x7f0000000580)="691428cf80b5dcc2b78b7b310ef061b8bbb47acb1d40128b1c09505551ede7e0093538faf5561902f0735f30538bcf67907466010a2e358f2346ed6734401118", 0x40, &(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)="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") r5 = gettid() r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001840)=@bpf_lsm={0x1d, 0x1, &(0x7f0000001640)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f0000001680)='GPL\x00', 0x7, 0xae, &(0x7f00000016c0)=""/174, 0x41100, 0x1, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000001780)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000017c0)={0x2, 0x10, 0x6, 0x2}, 0x10, 0xffffffffffffffff, 0x0, 0x3, 0x0, &(0x7f0000001800)=[{0x5, 0x1, 0x3, 0x5}, {0x1, 0x4, 0x2, 0x5}, {0x3, 0x3, 0x9, 0xb}], 0x10, 0x0, @void, @value}, 0x94) sendmsg$unix(r1, &(0x7f0000001980)={&(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f00000004c0)="5b5da6a143a5da6431b63431223f768b790db639b337c4697def50abe814462de1", 0x21}, {&(0x7f0000000500)="9842", 0x2}], 0x2, &(0x7f0000001900)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r5, 0xee01, 0xee01}}}, @rights={{0x20, 0x1, 0x1, [r1, r1, r3, r6]}}], 0x80, 0x20004000}, 0x80) openat$cgroup_procs(r1, &(0x7f00000019c0)='cgroup.procs\x00', 0x2, 0x0) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001a00)={0x1b, 0x0, 0x0, 0xbb, 0x0, r1, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x1, 0x1, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001d00)={0x18, 0x15, &(0x7f0000001ac0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5}, [@call={0x85, 0x0, 0x0, 0xd0}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xf}, @map_fd={0x18, 0x1, 0x1, 0x0, r7}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x400}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_val={0x18, 0x6, 0x2, 0x0, r7, 0x0, 0x0, 0x0, 0x1}, @map_fd={0x18, 0x5, 0x1, 0x0, r1}]}, &(0x7f0000001b80)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x24, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000001bc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000001c00)={0x4, 0x0, 0x77ac, 0x1}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000001c40)=[r1, r1, r1, 0xffffffffffffffff], &(0x7f0000001c80)=[{0x3, 0x3, 0x7, 0x6}, {0x5, 0x2, 0x1, 0xb}, {0x5, 0x5, 0x4, 0x8}, {0x3, 0x4, 0x0, 0x5}, {0x2, 0x3, 0xe, 0x7}], 0x10, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001dc0)={&(0x7f0000001a80)='mm_shrink_slab_end\x00', r8, 0x0, 0x7}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001e00)) r9 = openat$cgroup_devices(r1, &(0x7f0000001e40)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r9, &(0x7f0000001e80)={'c', ' *:* ', 'w\x00'}, 0x8) socketpair(0x1a, 0xa, 0x10, &(0x7f0000001ec0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f00000023c0)={0x0, 0x0, &(0x7f0000002300)=[{&(0x7f0000001f00)=""/35, 0x23}, {&(0x7f0000001f40)=""/133, 0x85}, {&(0x7f0000002000)=""/202, 0xca}, {&(0x7f0000002100)=""/235, 0xeb}, {&(0x7f0000002200)=""/12, 0xc}, {&(0x7f0000002240)=""/105, 0x69}, {&(0x7f00000022c0)=""/6, 0x6}], 0x7, &(0x7f0000002380)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x40010040) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000002400)={0x1, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000002440)={r13}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000003800)={r2, 0xe0, &(0x7f0000003700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000003540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, &(0x7f0000003580)=[0x0], &(0x7f00000035c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xdc, &(0x7f0000003600)=[{}, {}], 0x10, 0x10, &(0x7f0000003640), &(0x7f0000003680), 0x8, 0xd6, 0x8, 0x8, &(0x7f00000036c0)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003880)={0x200, 0x0}, 0x8) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000003940)={{r1, 0xffffffffffffffff}, &(0x7f00000038c0), &(0x7f0000003900)='%pK \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000003a00)={0x1a, 0xe, &(0x7f0000002480)=@raw=[@map_fd={0x18, 0x9, 0x1, 0x0, r12}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r12}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0x5, 0x0, 0x0, 0x0, 0xb}, @alu={0x4, 0x1, 0xd, 0x6, 0x3, 0xffffffffffffffd6, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @exit, @exit, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000002500)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000002540)=""/4096, 0x41100, 0x2e, '\x00', r14, @tracing=0x1a, r12, 0x8, &(0x7f0000003840)={0x4, 0x1}, 0x8, 0x10, 0x0, 0x0, r15, r2, 0x3, &(0x7f0000003980)=[r1, r12, r11, r7, r16], &(0x7f00000039c0)=[{0x4, 0x2, 0x10, 0x1}, {0x0, 0x2, 0x0, 0x3}, {0x1, 0x2, 0xa, 0x9}], 0x10, 0x52a4f0e7, @void, @value}, 0x94) openat$cgroup_procs(r12, &(0x7f0000003ac0)='cgroup.threads\x00', 0x2, 0x0) syz_clone(0x24900080, &(0x7f0000003b00)="7fcc0058a1249e05afcf9b761d56ce98a5070a77529f845081837f32868fbc24ae48a573ad9ca9d78a7418c793dce0cf31f1dc71c041ba782abe83131eca55b0807281e82d267cdee08f4a95e56d855fc8a70b406461d8b6fe4dd605ef873f3a96f77f81f7809aa6e8d03ffe99b321dc80e6ad8b774c91", 0x77, &(0x7f0000003b80), &(0x7f0000003bc0), &(0x7f0000003c00)="9e64c9a28ce5dc9c2341ac26cfbbe8a9def1fcaf4f981b5ccc9e918bf2695135696d11de5b47f3dcc33fefc888fd92cbc84bf31fbbcd057f16c0793c74788c104a90a45e2ed60d903bf7481efc9f500088ae56fd783b405b477e5d18e6432c3e77c4106008cac67797a058a6434b448c5da72ccc2de3db2c1b8091f8fb04c74a21c120f913c8aa5331f4c9b0194e899dc005cb1ff62fe4d66c8ad08342dab5ac4adab8dbc4170cb91bf99185c04350a73b6efaa570a4deb75e56fc29043dc522f44f06ccffbdf81caf6d1fbc79b2326266751c0188f314e8e6f3f4") bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003d00)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffff, '\x00', r14, r1, 0x1, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003d80)='./cgroup.net/syz0\x00', 0x1ff) close(r8) 1.138076157s ago: executing program 0 (id=10770): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r0}, 0x10) syz_clone(0x640c7000, 0x0, 0x2f, 0x0, 0x0, 0x0) 1.10736677s ago: executing program 8 (id=10771): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}, 0x0, 0xc8, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)=@generic={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000050000000200000000100000", @ANYRES32=r0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000d00ff0000000000f9ff00"/28], 0x50) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="180000001b000000000000000008000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000008c0)='gpio_value\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f0000000040), 0x83000) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) 1.034281456s ago: executing program 7 (id=10772): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000200)='sys_enter\x00', r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000280)='module_request\x00', r3, 0x0, 0xfffffffffffffffe}, 0x18) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x20000000, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000880), 0x12) 981.653311ms ago: executing program 5 (id=10773): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$ITER_CREATE(0x21, &(0x7f0000000180), 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001000)) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="000000000000000000000000000000000000cc00", @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402000000000000, 0x8404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x100009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) sendmsg$tipc(r2, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) 905.202468ms ago: executing program 0 (id=10774): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000200)='sys_enter\x00', r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000280)='module_request\x00', r3, 0x0, 0xfffffffffffffffe}, 0x18) socketpair(0x0, 0x0, 0x0, &(0x7f00000006c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x20000000, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_procs(r4, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r7, &(0x7f0000000880), 0x12) 862.052332ms ago: executing program 7 (id=10775): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800003f000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bc8900000000000035090100000000009500000004000400b7020000001ac81b7baaf8ff00000000b5090000000000007baaf0fd00000000bf8300000000000007080000fffdffffbca400000000000007040000f0ffffff940200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000002f9800000000000056080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000040), &(0x7f0000000440)=""/183}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000971400", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) mkdirat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x1ff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x3e1c01, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x3f00000000000000) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[@ANYBLOB='1-2:', @ANYRESOCT], 0x31) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 821.378916ms ago: executing program 8 (id=10776): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000003000000000000000000003600", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000f40)=[{&(0x7f00000042c0)="86", 0xff0f}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 695.373077ms ago: executing program 8 (id=10777): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x21000000, 0x18, 0x18, 0x2, [@func_proto={0x0, 0x0, 0x0, 0xd, 0x2}, @struct]}}, &(0x7f00000009c0)=""/4096, 0x32, 0x1000, 0x1, 0x0, 0x0, @void, @value}, 0x28) 680.447448ms ago: executing program 8 (id=10778): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000140), 0x2, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000700)=0xfffffffffffffff2) (async) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000700)=0xfffffffffffffff2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4e, 0x1, 0x0, 0x0, 0x0, 0x610e, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7fff, 0xaea}, 0x110104, 0x32, 0x0, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000094000000000000d6d4632b65008046000000000000", @ANYRES32, @ANYBLOB="0500"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="040000000100"/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1}, &(0x7f0000000100), &(0x7f0000000140)=r2}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000140)=r2}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r3, 0x58, &(0x7f0000000340)}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xc) (async) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, r5, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'bridge_slave_0\x00'}) 680.015718ms ago: executing program 5 (id=10779): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x8, 0x9}, 0x20, 0x200, 0xfffffff9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r3, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r5}, 0x10) unlink(0x0) openat$cgroup_ro(r4, &(0x7f0000000200)='pids.current\x00', 0x275a, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r7, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r7, &(0x7f00000005c0)=ANY=[@ANYBLOB="2b6370759833f5e17e05f0d105608b0422202b706964732067475b2e4995faba5635e104008bdee9f080ea7780c347b978198ea00566caf90000000000000098ddbcd0ce9ad9d1614b23"], 0xb) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1888, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) syz_clone(0x2a020600, &(0x7f0000000300)="4e159d92ce4e466744ae3704fbcbecdf6d177309d6887a9d4f6083f01ff4b38bc7e0302ffc3a39d616b8f204f4e6067102b40bf64b442dedd91fed311fefd48b50ae9b46d11c86ae78e3f153dacb1199b2571171df725d2ec1048be9f8fdf137cdd907342f06a2943b9338ccc1477223fd60082c2fa879c1b419eb567cfc2d6b1cbef6b22c9ad3910b62a564ca93c66b38d442893508c6daf8a3537fe54b130ec3d9d6ea10aba5b7f5c2d4205e74424f", 0xb0, &(0x7f0000000280), &(0x7f00000003c0), &(0x7f00000004c0)="df2239a5abfe7f736463aa3ae5541525d85b9df771aae02a28043c0e57aead8f2a4b3a139507dd43ac6862d4dca5877e23f4111791863277a703b41bea7d69d3a8a7ca074f8c3f27cffde6d291cb265ddfc009e96d29") ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89a0, &(0x7f0000000080)) 655.128361ms ago: executing program 0 (id=10780): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="180800003f000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bc8900000000000035090100000000009500000004000400b7020000001ac81b7baaf8ff00000000b5090000000000007baaf0fd00000000bf8300000000000007080000fffdffffbca400000000000007040000f0ffffff940200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff760000002f9800000000000056080000000000008500000005000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000040), &(0x7f0000000440)=""/183}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000971400", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x2b, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) mkdirat$cgroup(r2, &(0x7f00000002c0)='syz1\x00', 0x1ff) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x3e1c01, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x3f00000000000000) write$cgroup_subtree(r6, &(0x7f0000000140)=ANY=[@ANYBLOB='1-2:', @ANYRESOCT], 0x31) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 0s ago: executing program 5 (id=10781): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x4b) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0900000007000000008000000100", @ANYRES32, @ANYBLOB="000800000000b5a89a53d4be988a7ad6ac5b0fad1b3d846eb715f0a7b7c6ab", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016f100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"/28], 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0}, 0x0, &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000010040)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000a8d3a5da50ac9f6eff00000000bfa100000000000007010000f8ffffffb702000008000010b7030000000000008500000071000000950000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r3}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x4105}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) kernel console output (not intermixed with test programs): 1652][T25945] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 894.789461][T25945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 894.797273][T25945] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 894.991371][T25968] syz.8.9524[25968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 894.991430][T25968] syz.8.9524[25968] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 895.814800][T25990] device pim6reg1 entered promiscuous mode [ 897.320109][T26060] FAULT_INJECTION: forcing a failure. [ 897.320109][T26060] name failslab, interval 1, probability 0, space 0, times 0 [ 897.354688][T26060] CPU: 1 PID: 26060 Comm: syz.7.9557 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 897.365880][T26060] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 897.375786][T26060] Call Trace: [ 897.378902][T26060] dump_stack_lvl+0x1e2/0x24b [ 897.383412][T26060] ? panic+0x812/0x812 [ 897.387321][T26060] ? bfq_pos_tree_add_move+0x43b/0x43b [ 897.392617][T26060] dump_stack+0x15/0x17 [ 897.396601][T26060] should_fail+0x3c6/0x510 [ 897.400885][T26060] ? __alloc_file+0x29/0x330 [ 897.405293][T26060] __should_failslab+0xa4/0xe0 [ 897.409886][T26060] should_failslab+0x9/0x20 [ 897.414229][T26060] kmem_cache_alloc+0x3d/0x2e0 [ 897.418839][T26060] ? _raw_spin_lock+0xa4/0x1b0 [ 897.423471][T26060] __alloc_file+0x29/0x330 [ 897.427673][T26060] ? alloc_empty_file+0x42/0x180 [ 897.432448][T26060] alloc_empty_file+0x95/0x180 [ 897.437052][T26060] alloc_file+0x5a/0x4e0 [ 897.441132][T26060] alloc_file_pseudo+0x259/0x2f0 [ 897.445900][T26060] ? __kasan_check_write+0x14/0x20 [ 897.450854][T26060] ? alloc_empty_file_noaccount+0x80/0x80 [ 897.456405][T26060] anon_inode_getfile+0xa7/0x180 [ 897.461180][T26060] __se_sys_perf_event_open+0xfe4/0x3c30 [ 897.466656][T26060] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 897.472122][T26060] ? __ia32_sys_read+0x90/0x90 [ 897.476719][T26060] ? __bpf_trace_sys_enter+0x62/0x70 [ 897.481841][T26060] __x64_sys_perf_event_open+0xbf/0xd0 [ 897.487129][T26060] do_syscall_64+0x34/0x70 [ 897.491384][T26060] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 897.497109][T26060] RIP: 0033:0x7ff909198719 [ 897.501361][T26060] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 897.520802][T26060] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 897.529046][T26060] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 897.536860][T26060] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00000000200012c0 [ 897.544671][T26060] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 897.552496][T26060] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 897.560295][T26060] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 898.299439][T26082] device pim6reg1 entered promiscuous mode [ 898.305499][T26084] FAULT_INJECTION: forcing a failure. [ 898.305499][T26084] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 898.347457][T26084] CPU: 1 PID: 26084 Comm: syz.8.9566 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 898.358651][T26084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 898.368626][T26084] Call Trace: [ 898.371762][T26084] dump_stack_lvl+0x1e2/0x24b [ 898.376269][T26084] ? bfq_pos_tree_add_move+0x43b/0x43b [ 898.381578][T26084] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 898.387991][T26084] ? proc_fail_nth_write+0x20b/0x290 [ 898.393112][T26084] dump_stack+0x15/0x17 [ 898.397093][T26084] should_fail+0x3c6/0x510 [ 898.401355][T26084] should_fail_usercopy+0x1a/0x20 [ 898.406210][T26084] _copy_from_user+0x20/0xd0 [ 898.410646][T26084] sock_do_ioctl+0x20e/0x3a0 [ 898.415071][T26084] ? sock_show_fdinfo+0xa0/0xa0 [ 898.419753][T26084] ? kernel_write+0x3d0/0x3d0 [ 898.424269][T26084] ? selinux_file_ioctl+0x3cc/0x540 [ 898.429300][T26084] sock_ioctl+0x4a6/0x760 [ 898.433466][T26084] ? sock_poll+0x340/0x340 [ 898.437726][T26084] ? security_file_ioctl+0x84/0xb0 [ 898.442673][T26084] ? sock_poll+0x340/0x340 [ 898.446932][T26084] __se_sys_ioctl+0x114/0x190 [ 898.451437][T26084] __x64_sys_ioctl+0x7b/0x90 [ 898.455858][T26084] do_syscall_64+0x34/0x70 [ 898.460113][T26084] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 898.465836][T26084] RIP: 0033:0x7f05927a7719 [ 898.470098][T26084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 898.489533][T26084] RSP: 002b:00007f0591420038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 898.497777][T26084] RAX: ffffffffffffffda RBX: 00007f059295ef80 RCX: 00007f05927a7719 [ 898.505593][T26084] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 898.513404][T26084] RBP: 00007f0591420090 R08: 0000000000000000 R09: 0000000000000000 [ 898.521209][T26084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.529021][T26084] R13: 0000000000000000 R14: 00007f059295ef80 R15: 00007ffda6ea0db8 [ 899.071429][T26114] device veth0_vlan left promiscuous mode [ 899.078910][T26114] device veth0_vlan entered promiscuous mode [ 899.549069][T26127] device wg2 entered promiscuous mode [ 900.363049][T26161] device pim6reg1 entered promiscuous mode [ 902.344569][T26208] device syzkaller0 entered promiscuous mode [ 902.756625][T26208] device bridge0 entered promiscuous mode [ 903.935576][T26255] tap0: tun_chr_ioctl cmd 1074025677 [ 904.016149][T26255] tap0: linktype set to 778 [ 904.827366][T26287] FAULT_INJECTION: forcing a failure. [ 904.827366][T26287] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 904.928071][T26287] CPU: 0 PID: 26287 Comm: syz.0.9639 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 904.939258][T26287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 904.949157][T26287] Call Trace: [ 904.952280][T26287] dump_stack_lvl+0x1e2/0x24b [ 904.956787][T26287] ? bfq_pos_tree_add_move+0x43b/0x43b [ 904.962097][T26287] ? __alloc_skb+0x37c/0x510 [ 904.966506][T26287] dump_stack+0x15/0x17 [ 904.970495][T26287] should_fail+0x3c6/0x510 [ 904.974752][T26287] should_fail_usercopy+0x1a/0x20 [ 904.979612][T26287] _copy_from_iter+0x22c/0xd10 [ 904.984212][T26287] ? sock_alloc_send_pskb+0x936/0xa50 [ 904.989426][T26287] ? copyout_mc+0x90/0x90 [ 904.993587][T26287] ? __check_object_size+0x2e6/0x3c0 [ 904.998708][T26287] skb_copy_datagram_from_iter+0x100/0x6d0 [ 905.004349][T26287] tun_get_user+0x1904/0x38f0 [ 905.008865][T26287] ? _kstrtoull+0x3a0/0x4a0 [ 905.013211][T26287] ? tun_do_read+0x1f60/0x1f60 [ 905.017799][T26287] ? kstrtouint_from_user+0x20a/0x2a0 [ 905.023009][T26287] ? kstrtol_from_user+0x310/0x310 [ 905.027953][T26287] ? htab_map_hash+0x356/0x7e0 [ 905.032561][T26287] ? avc_policy_seqno+0x1b/0x70 [ 905.037333][T26287] ? selinux_file_permission+0x2bb/0x560 [ 905.042799][T26287] ? fsnotify_perm+0x67/0x4e0 [ 905.047313][T26287] tun_chr_write_iter+0x1a8/0x250 [ 905.052171][T26287] vfs_write+0xb4c/0xe70 [ 905.056252][T26287] ? kernel_write+0x3d0/0x3d0 [ 905.060789][T26287] ? __fdget_pos+0x209/0x3a0 [ 905.065204][T26287] ? ksys_write+0x77/0x2c0 [ 905.069452][T26287] ksys_write+0x199/0x2c0 [ 905.073616][T26287] ? __ia32_sys_read+0x90/0x90 [ 905.078216][T26287] ? debug_smp_processor_id+0x17/0x20 [ 905.083418][T26287] __x64_sys_write+0x7b/0x90 [ 905.087846][T26287] do_syscall_64+0x34/0x70 [ 905.092100][T26287] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 905.097856][T26287] RIP: 0033:0x7ff6e69b4719 [ 905.102080][T26287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 905.121696][T26287] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 905.129936][T26287] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 905.137744][T26287] RDX: 000000000000fdef RSI: 0000000020000200 RDI: 00000000000000c8 [ 905.145554][T26287] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 905.153369][T26287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 905.161206][T26287] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 908.698902][T26406] device veth1_macvtap left promiscuous mode [ 908.704706][T26406] device macsec0 entered promiscuous mode [ 909.012100][T26418] FAULT_INJECTION: forcing a failure. [ 909.012100][T26418] name failslab, interval 1, probability 0, space 0, times 0 [ 909.024555][T26418] CPU: 0 PID: 26418 Comm: syz.0.9692 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 909.035697][T26418] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 909.045593][T26418] Call Trace: [ 909.048737][T26418] dump_stack_lvl+0x1e2/0x24b [ 909.053245][T26418] ? bfq_pos_tree_add_move+0x43b/0x43b [ 909.058540][T26418] dump_stack+0x15/0x17 [ 909.062527][T26418] should_fail+0x3c6/0x510 [ 909.066802][T26418] ? fdb_notify+0x77/0x120 [ 909.071028][T26418] __should_failslab+0xa4/0xe0 [ 909.075625][T26418] should_failslab+0x9/0x20 [ 909.079971][T26418] __kmalloc_track_caller+0x5f/0x320 [ 909.085091][T26418] ? kmem_cache_alloc+0x168/0x2e0 [ 909.089953][T26418] ? __alloc_skb+0x80/0x510 [ 909.094302][T26418] ? fdb_notify+0x77/0x120 [ 909.098554][T26418] __alloc_skb+0xbc/0x510 [ 909.102716][T26418] ? __kasan_check_read+0x11/0x20 [ 909.107576][T26418] fdb_notify+0x77/0x120 [ 909.111653][T26418] fdb_insert+0x16f/0x270 [ 909.115835][T26418] br_fdb_changeaddr+0x18f/0x1c0 [ 909.120598][T26418] br_device_event+0x3c6/0x7c0 [ 909.125282][T26418] ? br_boolopt_multi_get+0xc0/0xc0 [ 909.130309][T26418] ? packet_notifier+0x8af/0x8c0 [ 909.135091][T26418] ? ipv6_mc_netdev_event+0x91/0x2f0 [ 909.140207][T26418] raw_notifier_call_chain+0x8c/0xf0 [ 909.145326][T26418] dev_set_mac_address+0x325/0x470 [ 909.150273][T26418] ? dev_pre_changeaddr_notify+0x220/0x220 [ 909.155920][T26418] dev_set_mac_address_user+0x31/0x50 [ 909.161131][T26418] dev_ifsioc+0x657/0xae0 [ 909.165285][T26418] ? dev_ioctl+0xb40/0xb40 [ 909.169540][T26418] ? dev_get_by_name_rcu+0xc5/0xf0 [ 909.174490][T26418] dev_ioctl+0x526/0xb40 [ 909.178575][T26418] sock_do_ioctl+0x295/0x3a0 [ 909.182999][T26418] ? sock_show_fdinfo+0xa0/0xa0 [ 909.187683][T26418] ? kernel_write+0x3d0/0x3d0 [ 909.192198][T26418] ? selinux_file_ioctl+0x3cc/0x540 [ 909.197232][T26418] sock_ioctl+0x4a6/0x760 [ 909.201399][T26418] ? sock_poll+0x340/0x340 [ 909.205649][T26418] ? security_file_ioctl+0x84/0xb0 [ 909.210591][T26418] ? sock_poll+0x340/0x340 [ 909.214846][T26418] __se_sys_ioctl+0x114/0x190 [ 909.219377][T26418] __x64_sys_ioctl+0x7b/0x90 [ 909.223781][T26418] do_syscall_64+0x34/0x70 [ 909.228036][T26418] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 909.233760][T26418] RIP: 0033:0x7ff6e69b4719 [ 909.238012][T26418] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 909.257454][T26418] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 909.265714][T26418] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 909.273505][T26418] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 909.281316][T26418] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 909.289129][T26418] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 909.296939][T26418] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 909.590852][T26442] pim6reg0: tun_chr_ioctl cmd 1074025698 [ 909.880899][T26451] FAULT_INJECTION: forcing a failure. [ 909.880899][T26451] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 909.893847][T26451] CPU: 0 PID: 26451 Comm: syz.0.9704 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 909.904945][T26451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 909.914917][T26451] Call Trace: [ 909.918052][T26451] dump_stack_lvl+0x1e2/0x24b [ 909.922646][T26451] ? bfq_pos_tree_add_move+0x43b/0x43b [ 909.927955][T26451] ? shmem_getpage_gfp+0x2230/0x2480 [ 909.933069][T26451] dump_stack+0x15/0x17 [ 909.937084][T26451] should_fail+0x3c6/0x510 [ 909.941315][T26451] should_fail_usercopy+0x1a/0x20 [ 909.946184][T26451] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 909.952075][T26451] ? shmem_getpage+0xa0/0xa0 [ 909.956496][T26451] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 909.962228][T26451] ? memzero_page+0x100/0x100 [ 909.966744][T26451] generic_perform_write+0x34c/0x570 [ 909.971878][T26451] ? grab_cache_page_write_begin+0xa0/0xa0 [ 909.977498][T26451] ? file_remove_privs+0x570/0x570 [ 909.982448][T26451] ? __kasan_check_write+0x14/0x20 [ 909.987394][T26451] __generic_file_write_iter+0x23c/0x560 [ 909.992858][T26451] ? generic_write_checks+0x3b9/0x470 [ 909.998074][T26451] generic_file_write_iter+0xaf/0x1c0 [ 910.003277][T26451] vfs_write+0xb4c/0xe70 [ 910.007362][T26451] ? kernel_write+0x3d0/0x3d0 [ 910.011880][T26451] ? mutex_trylock+0xa0/0xa0 [ 910.016295][T26451] ? __fdget_pos+0x2e7/0x3a0 [ 910.020718][T26451] ? ksys_write+0x77/0x2c0 [ 910.024972][T26451] ksys_write+0x199/0x2c0 [ 910.029143][T26451] ? __ia32_sys_read+0x90/0x90 [ 910.033741][T26451] ? debug_smp_processor_id+0x17/0x20 [ 910.038953][T26451] __x64_sys_write+0x7b/0x90 [ 910.043374][T26451] do_syscall_64+0x34/0x70 [ 910.047636][T26451] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 910.053360][T26451] RIP: 0033:0x7ff6e69b4719 [ 910.057611][T26451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 910.077052][T26451] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 910.085516][T26451] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 910.093322][T26451] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 000000000000000b [ 910.101330][T26451] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 910.109135][T26451] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 910.116944][T26451] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 910.900938][T26483] bridge0: port 2(bridge_slave_1) entered blocking state [ 910.908023][T26483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 910.917926][T26483] bridge0: port 1(bridge_slave_0) entered blocking state [ 910.925645][T26483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 910.936441][T26483] device bridge0 entered promiscuous mode [ 911.487834][ T306] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 912.330922][T26545] FAULT_INJECTION: forcing a failure. [ 912.330922][T26545] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 912.476834][T26545] CPU: 1 PID: 26545 Comm: syz.0.9738 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 912.488028][T26545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 912.497919][T26545] Call Trace: [ 912.501056][T26545] dump_stack_lvl+0x1e2/0x24b [ 912.505646][T26545] ? bfq_pos_tree_add_move+0x43b/0x43b [ 912.510946][T26545] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 912.516582][T26545] dump_stack+0x15/0x17 [ 912.520576][T26545] should_fail+0x3c6/0x510 [ 912.524828][T26545] should_fail_usercopy+0x1a/0x20 [ 912.529691][T26545] _copy_from_user+0x20/0xd0 [ 912.534120][T26545] br_ioctl_deviceless_stub+0x19a/0x7b0 [ 912.539515][T26545] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 912.545489][T26545] ? br_handle_local_finish+0x1f0/0x1f0 [ 912.550964][T26545] ? __kasan_check_write+0x14/0x20 [ 912.555902][T26545] ? mutex_lock+0xa5/0x110 [ 912.560151][T26545] ? mutex_trylock+0xa0/0xa0 [ 912.564579][T26545] ? selinux_file_ioctl+0x3cc/0x540 [ 912.569612][T26545] ? __irq_exit_rcu+0x40/0x150 [ 912.574218][T26545] ? br_handle_local_finish+0x1f0/0x1f0 [ 912.579595][T26545] sock_ioctl+0x2f7/0x760 [ 912.583761][T26545] ? sock_poll+0x340/0x340 [ 912.588021][T26545] ? security_file_ioctl+0x84/0xb0 [ 912.592967][T26545] ? sock_poll+0x340/0x340 [ 912.597212][T26545] __se_sys_ioctl+0x114/0x190 [ 912.601733][T26545] __x64_sys_ioctl+0x7b/0x90 [ 912.606162][T26545] do_syscall_64+0x34/0x70 [ 912.610414][T26545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 912.616135][T26545] RIP: 0033:0x7ff6e69b4719 [ 912.620388][T26545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 912.639837][T26545] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 912.648068][T26545] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 912.655877][T26545] RDX: 0000000020000080 RSI: 00000000000089a0 RDI: 0000000000000011 [ 912.663690][T26545] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 912.671508][T26545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 912.679329][T26545] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 912.696424][T26568] FAULT_INJECTION: forcing a failure. [ 912.696424][T26568] name failslab, interval 1, probability 0, space 0, times 0 [ 912.709008][T26568] CPU: 1 PID: 26568 Comm: syz.5.9745 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 912.720183][T26568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 912.730082][T26568] Call Trace: [ 912.733208][T26568] dump_stack_lvl+0x1e2/0x24b [ 912.737717][T26568] ? panic+0x812/0x812 [ 912.741624][T26568] ? slab_post_alloc_hook+0x80/0x2f0 [ 912.746759][T26568] ? bfq_pos_tree_add_move+0x43b/0x43b [ 912.752049][T26568] ? __kasan_check_write+0x14/0x20 [ 912.756996][T26568] dump_stack+0x15/0x17 [ 912.760976][T26568] should_fail+0x3c6/0x510 [ 912.765237][T26568] ? skb_clone+0x1de/0x370 [ 912.769497][T26568] __should_failslab+0xa4/0xe0 [ 912.774082][T26568] should_failslab+0x9/0x20 [ 912.778420][T26568] kmem_cache_alloc+0x3d/0x2e0 [ 912.783015][T26568] ? __bpf_redirect+0x673/0xde0 [ 912.787708][T26568] skb_clone+0x1de/0x370 [ 912.791785][T26568] bpf_clone_redirect+0xa6/0x390 [ 912.796562][T26568] bpf_prog_6893982b85ceadf7+0x56/0x790 [ 912.801934][T26568] ? __kasan_slab_alloc+0xc3/0xe0 [ 912.806795][T26568] ? __kasan_slab_alloc+0xb1/0xe0 [ 912.811655][T26568] ? slab_post_alloc_hook+0x61/0x2f0 [ 912.816779][T26568] ? kmem_cache_alloc+0x168/0x2e0 [ 912.821634][T26568] ? __build_skb+0x2a/0x300 [ 912.825971][T26568] ? build_skb+0x25/0x1e0 [ 912.830139][T26568] ? bpf_prog_test_run_skb+0x388/0x1410 [ 912.835521][T26568] ? __se_sys_bpf+0x5235/0x11cb0 [ 912.840294][T26568] ? __x64_sys_bpf+0x7b/0x90 [ 912.844720][T26568] ? do_syscall_64+0x34/0x70 [ 912.849151][T26568] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 912.855063][T26568] ? __kasan_check_read+0x11/0x20 [ 912.859911][T26568] ? bpf_test_timer_continue+0x140/0x440 [ 912.865900][T26568] bpf_test_run+0x40b/0xc20 [ 912.870246][T26568] ? convert___skb_to_skb+0x570/0x570 [ 912.875447][T26568] ? eth_type_trans+0x2e4/0x620 [ 912.880135][T26568] ? eth_get_headlen+0x240/0x240 [ 912.884908][T26568] ? convert___skb_to_skb+0x44/0x570 [ 912.890028][T26568] bpf_prog_test_run_skb+0xb6e/0x1410 [ 912.895243][T26568] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 912.901066][T26568] ? __kasan_check_write+0x14/0x20 [ 912.906184][T26568] ? fput_many+0x160/0x1b0 [ 912.910447][T26568] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 912.916167][T26568] __se_sys_bpf+0x5235/0x11cb0 [ 912.920771][T26568] ? stack_trace_save+0x113/0x1c0 [ 912.925627][T26568] ? terminate_walk+0x407/0x4f0 [ 912.930314][T26568] ? stack_trace_snprint+0xf0/0xf0 [ 912.935264][T26568] ? kmem_cache_free+0xa9/0x1e0 [ 912.939949][T26568] ? kmem_cache_free+0xa9/0x1e0 [ 912.944633][T26568] ? kasan_set_track+0x5d/0x70 [ 912.949236][T26568] ? __x64_sys_bpf+0x90/0x90 [ 912.953658][T26568] ? __kasan_slab_free+0x11/0x20 [ 912.958436][T26568] ? slab_free_freelist_hook+0xc0/0x190 [ 912.963815][T26568] ? kmem_cache_free+0xa9/0x1e0 [ 912.968502][T26568] ? putname+0xe7/0x140 [ 912.972492][T26568] ? do_sys_openat2+0x1fc/0x710 [ 912.977181][T26568] ? __x64_sys_openat+0x243/0x290 [ 912.982053][T26568] ? do_syscall_64+0x34/0x70 [ 912.986473][T26568] ? _kstrtoull+0x3a0/0x4a0 [ 912.990807][T26568] ? prepare_signal+0x85b/0xa60 [ 912.995526][T26568] ? send_sigqueue+0x610/0x610 [ 913.000099][T26568] ? __send_signal+0x8b5/0xb90 [ 913.004696][T26568] ? send_signal+0x4c1/0x5e0 [ 913.009116][T26568] ? proc_fail_nth_read+0x210/0x210 [ 913.014151][T26568] ? security_file_permission+0x86/0xb0 [ 913.019535][T26568] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 913.025174][T26568] ? do_send_sig_info+0xfb/0x230 [ 913.029953][T26568] ? group_send_sig_info+0x1b0/0x320 [ 913.035070][T26568] ? __lock_task_sighand+0x100/0x100 [ 913.040278][T26568] ? kernel_write+0x3d0/0x3d0 [ 913.044796][T26568] ? __check_object_size+0x94/0x3c0 [ 913.049826][T26568] ? copy_from_user_nofault+0xce/0x130 [ 913.055208][T26568] ? bpf_probe_read_compat+0x10b/0x180 [ 913.060528][T26568] ? bpf_trace_run2+0xf4/0x280 [ 913.065117][T26568] ? __bpf_trace_sys_enter+0x62/0x70 [ 913.070233][T26568] __x64_sys_bpf+0x7b/0x90 [ 913.074479][T26568] do_syscall_64+0x34/0x70 [ 913.078735][T26568] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 913.084456][T26568] RIP: 0033:0x7fe68f265719 [ 913.088713][T26568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 913.108151][T26568] RSP: 002b:00007fe68dede038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 913.116515][T26568] RAX: ffffffffffffffda RBX: 00007fe68f41cf80 RCX: 00007fe68f265719 [ 913.124335][T26568] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 913.132135][T26568] RBP: 00007fe68dede090 R08: 0000000000000000 R09: 0000000000000000 [ 913.139946][T26568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 913.147764][T26568] R13: 0000000000000000 R14: 00007fe68f41cf80 R15: 00007ffc72c570e8 [ 913.687230][T26606] FAULT_INJECTION: forcing a failure. [ 913.687230][T26606] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 913.701384][T26606] CPU: 0 PID: 26606 Comm: syz.6.9761 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 913.712557][T26606] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 913.722453][T26606] Call Trace: [ 913.725603][T26606] dump_stack_lvl+0x1e2/0x24b [ 913.730103][T26606] ? bfq_pos_tree_add_move+0x43b/0x43b [ 913.735392][T26606] dump_stack+0x15/0x17 [ 913.739383][T26606] should_fail+0x3c6/0x510 [ 913.743641][T26606] should_fail_alloc_page+0x52/0x60 [ 913.748673][T26606] __alloc_pages_nodemask+0x1b3/0xaf0 [ 913.753900][T26606] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 913.759268][T26606] kmalloc_order+0x4c/0x170 [ 913.763602][T26606] kmalloc_order_trace+0x18/0x90 [ 913.768375][T26606] ? alloc_skb_with_frags+0xa1/0x570 [ 913.773495][T26606] __kmalloc_track_caller+0x1dd/0x320 [ 913.778700][T26606] ? __alloc_skb+0x80/0x510 [ 913.783040][T26606] ? alloc_skb_with_frags+0xa1/0x570 [ 913.788160][T26606] __alloc_skb+0xbc/0x510 [ 913.792333][T26606] alloc_skb_with_frags+0xa1/0x570 [ 913.797283][T26606] ? is_bpf_text_address+0x172/0x190 [ 913.802401][T26606] sock_alloc_send_pskb+0x915/0xa50 [ 913.807438][T26606] ? sock_kzfree_s+0x60/0x60 [ 913.811856][T26606] ? sched_clock+0x3a/0x40 [ 913.816107][T26606] ? sched_clock_cpu+0x1b/0x3b0 [ 913.820791][T26606] ? sched_clock+0x3a/0x40 [ 913.825045][T26606] ? debug_smp_processor_id+0x17/0x20 [ 913.830253][T26606] tun_get_user+0xe90/0x38f0 [ 913.834678][T26606] ? _kstrtoull+0x3a0/0x4a0 [ 913.839019][T26606] ? tun_do_read+0x1f60/0x1f60 [ 913.843614][T26606] ? kstrtouint_from_user+0x20a/0x2a0 [ 913.848827][T26606] ? kstrtol_from_user+0x310/0x310 [ 913.853770][T26606] ? arch_irq_work_raise+0xc7/0xd0 [ 913.858719][T26606] ? __irq_work_queue_local+0x111/0x180 [ 913.864102][T26606] ? avc_policy_seqno+0x1b/0x70 [ 913.868786][T26606] ? selinux_file_permission+0x2bb/0x560 [ 913.874398][T26606] ? fsnotify_perm+0x67/0x4e0 [ 913.878895][T26606] tun_chr_write_iter+0x1a8/0x250 [ 913.883751][T26606] vfs_write+0xb4c/0xe70 [ 913.887962][T26606] ? kernel_write+0x3d0/0x3d0 [ 913.892477][T26606] ? __fdget_pos+0x209/0x3a0 [ 913.896889][T26606] ? ksys_write+0x77/0x2c0 [ 913.901145][T26606] ksys_write+0x199/0x2c0 [ 913.905310][T26606] ? __ia32_sys_read+0x90/0x90 [ 913.909925][T26606] ? debug_smp_processor_id+0x17/0x20 [ 913.915114][T26606] __x64_sys_write+0x7b/0x90 [ 913.919539][T26606] do_syscall_64+0x34/0x70 [ 913.923793][T26606] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 913.929521][T26606] RIP: 0033:0x7f4759128719 [ 913.933773][T26606] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 913.953216][T26606] RSP: 002b:00007f4757da1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 913.961464][T26606] RAX: ffffffffffffffda RBX: 00007f47592dff80 RCX: 00007f4759128719 [ 913.969269][T26606] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 913.977090][T26606] RBP: 00007f4757da1090 R08: 0000000000000000 R09: 0000000000000000 [ 913.984890][T26606] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 913.992700][T26606] R13: 0000000000000000 R14: 00007f47592dff80 R15: 00007ffc4ed03c68 [ 914.069706][T26609] ÿÿÿÿÿÿ: renamed from vlan1 [ 914.195675][T26614] FAULT_INJECTION: forcing a failure. [ 914.195675][T26614] name failslab, interval 1, probability 0, space 0, times 0 [ 914.323412][T26614] CPU: 1 PID: 26614 Comm: syz.6.9763 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 914.334702][T26614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 914.344593][T26614] Call Trace: [ 914.347727][T26614] dump_stack_lvl+0x1e2/0x24b [ 914.352235][T26614] ? panic+0x812/0x812 [ 914.356141][T26614] ? bfq_pos_tree_add_move+0x43b/0x43b [ 914.361439][T26614] ? avc_has_perm+0x14d/0x400 [ 914.365952][T26614] ? memcpy+0x56/0x70 [ 914.369773][T26614] dump_stack+0x15/0x17 [ 914.373759][T26614] should_fail+0x3c6/0x510 [ 914.378022][T26614] ? __alloc_skb+0x80/0x510 [ 914.382358][T26614] __should_failslab+0xa4/0xe0 [ 914.386960][T26614] should_failslab+0x9/0x20 [ 914.391299][T26614] kmem_cache_alloc+0x3d/0x2e0 [ 914.395900][T26614] __alloc_skb+0x80/0x510 [ 914.400065][T26614] alloc_skb_with_frags+0xa1/0x570 [ 914.405017][T26614] ? is_bpf_text_address+0x172/0x190 [ 914.410128][T26614] sock_alloc_send_pskb+0x915/0xa50 [ 914.415161][T26614] ? sock_kzfree_s+0x60/0x60 [ 914.419581][T26614] ? stack_trace_save+0x113/0x1c0 [ 914.424443][T26614] ? terminate_walk+0x407/0x4f0 [ 914.429141][T26614] ? stack_trace_snprint+0xf0/0xf0 [ 914.434087][T26614] tun_get_user+0xe90/0x38f0 [ 914.438516][T26614] ? _kstrtoull+0x3a0/0x4a0 [ 914.442848][T26614] ? tun_do_read+0x1f60/0x1f60 [ 914.447443][T26614] ? kstrtouint_from_user+0x20a/0x2a0 [ 914.452651][T26614] ? kstrtol_from_user+0x310/0x310 [ 914.457600][T26614] ? avc_policy_seqno+0x1b/0x70 [ 914.462287][T26614] ? selinux_file_permission+0x2bb/0x560 [ 914.467756][T26614] ? fsnotify_perm+0x67/0x4e0 [ 914.472270][T26614] tun_chr_write_iter+0x1a8/0x250 [ 914.477130][T26614] vfs_write+0xb4c/0xe70 [ 914.481208][T26614] ? putname+0xe7/0x140 [ 914.485198][T26614] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 914.490842][T26614] ? kernel_write+0x3d0/0x3d0 [ 914.495359][T26614] ? __fdget_pos+0x209/0x3a0 [ 914.499774][T26614] ? ksys_write+0x77/0x2c0 [ 914.504030][T26614] ksys_write+0x199/0x2c0 [ 914.508205][T26614] ? __ia32_sys_read+0x90/0x90 [ 914.512797][T26614] ? debug_smp_processor_id+0x17/0x20 [ 914.518005][T26614] __x64_sys_write+0x7b/0x90 [ 914.522435][T26614] do_syscall_64+0x34/0x70 [ 914.526687][T26614] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 914.532422][T26614] RIP: 0033:0x7f4759128719 [ 914.536667][T26614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 914.556115][T26614] RSP: 002b:00007f4757da1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 914.564348][T26614] RAX: ffffffffffffffda RBX: 00007f47592dff80 RCX: 00007f4759128719 [ 914.572162][T26614] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 914.579973][T26614] RBP: 00007f4757da1090 R08: 0000000000000000 R09: 0000000000000000 [ 914.587782][T26614] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.595596][T26614] R13: 0000000000000000 R14: 00007f47592dff80 R15: 00007ffc4ed03c68 [ 915.054690][T26630] bridge0: port 2(bridge_slave_1) entered disabled state [ 915.063889][T26630] bridge0: port 1(bridge_slave_0) entered disabled state [ 915.074222][T26630] device bridge0 left promiscuous mode [ 915.561497][T26664] device veth1_macvtap left promiscuous mode [ 915.567947][T26664] device macsec0 entered promiscuous mode [ 915.934844][T26680] device veth0_vlan left promiscuous mode [ 915.942132][T26680] device veth0_vlan entered promiscuous mode [ 916.662820][T26704] FAULT_INJECTION: forcing a failure. [ 916.662820][T26704] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 916.675832][T26704] CPU: 0 PID: 26704 Comm: syz.0.9796 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 916.687025][T26704] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 916.696899][T26704] Call Trace: [ 916.700034][T26704] dump_stack_lvl+0x1e2/0x24b [ 916.704549][T26704] ? bfq_pos_tree_add_move+0x43b/0x43b [ 916.709841][T26704] ? shmem_getpage_gfp+0x2230/0x2480 [ 916.714963][T26704] dump_stack+0x15/0x17 [ 916.718941][T26704] should_fail+0x3c6/0x510 [ 916.723195][T26704] should_fail_usercopy+0x1a/0x20 [ 916.728054][T26704] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 916.733971][T26704] ? shmem_getpage+0xa0/0xa0 [ 916.738381][T26704] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 916.744108][T26704] ? memzero_page+0x100/0x100 [ 916.748627][T26704] generic_perform_write+0x34c/0x570 [ 916.753750][T26704] ? grab_cache_page_write_begin+0xa0/0xa0 [ 916.759385][T26704] ? file_remove_privs+0x570/0x570 [ 916.764333][T26704] ? __kasan_check_write+0x14/0x20 [ 916.769281][T26704] __generic_file_write_iter+0x23c/0x560 [ 916.774755][T26704] ? generic_write_checks+0x3b9/0x470 [ 916.779956][T26704] generic_file_write_iter+0xaf/0x1c0 [ 916.785159][T26704] vfs_write+0xb4c/0xe70 [ 916.789240][T26704] ? __hrtimer_run_queues+0x438/0xa50 [ 916.794537][T26704] ? kernel_write+0x3d0/0x3d0 [ 916.799053][T26704] ? mutex_trylock+0xa0/0xa0 [ 916.803479][T26704] ? __fdget_pos+0x2e7/0x3a0 [ 916.807899][T26704] ? ksys_write+0x77/0x2c0 [ 916.812153][T26704] ksys_write+0x199/0x2c0 [ 916.816318][T26704] ? kvm_sched_clock_read+0x18/0x40 [ 916.821355][T26704] ? __ia32_sys_read+0x90/0x90 [ 916.825953][T26704] ? debug_smp_processor_id+0x17/0x20 [ 916.831163][T26704] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 916.837067][T26704] __x64_sys_write+0x7b/0x90 [ 916.841489][T26704] do_syscall_64+0x34/0x70 [ 916.845744][T26704] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 916.851469][T26704] RIP: 0033:0x7ff6e69b4719 [ 916.855724][T26704] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 916.875163][T26704] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 916.883407][T26704] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 916.891220][T26704] RDX: 0000000000040001 RSI: 0000000020000180 RDI: 0000000000000007 [ 916.899030][T26704] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 916.906958][T26704] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 916.914767][T26704] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 916.942423][T26709] FAULT_INJECTION: forcing a failure. [ 916.942423][T26709] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 916.955369][T26709] CPU: 0 PID: 26709 Comm: syz.5.9798 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 916.966461][T26709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 916.976354][T26709] Call Trace: [ 916.979487][T26709] dump_stack_lvl+0x1e2/0x24b [ 916.983993][T26709] ? bfq_pos_tree_add_move+0x43b/0x43b [ 916.989286][T26709] ? shmem_getpage_gfp+0x2226/0x2480 [ 916.994408][T26709] dump_stack+0x15/0x17 [ 916.998425][T26709] should_fail+0x3c6/0x510 [ 917.002658][T26709] should_fail_usercopy+0x1a/0x20 [ 917.007625][T26709] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 917.013529][T26709] ? shmem_getpage+0xa0/0xa0 [ 917.017944][T26709] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 917.023670][T26709] ? memzero_page+0x100/0x100 [ 917.028191][T26709] generic_perform_write+0x34c/0x570 [ 917.033309][T26709] ? grab_cache_page_write_begin+0xa0/0xa0 [ 917.039056][T26709] ? file_remove_privs+0x570/0x570 [ 917.044001][T26709] ? __kasan_check_write+0x14/0x20 [ 917.048945][T26709] __generic_file_write_iter+0x23c/0x560 [ 917.054417][T26709] ? generic_write_checks+0x3b9/0x470 [ 917.059638][T26709] generic_file_write_iter+0xaf/0x1c0 [ 917.064828][T26709] vfs_write+0xb4c/0xe70 [ 917.068907][T26709] ? kernel_write+0x3d0/0x3d0 [ 917.073421][T26709] ? mutex_trylock+0xa0/0xa0 [ 917.077863][T26709] ? __fdget_pos+0x2e7/0x3a0 [ 917.082275][T26709] ? ksys_write+0x77/0x2c0 [ 917.086531][T26709] ksys_write+0x199/0x2c0 [ 917.090700][T26709] ? __ia32_sys_read+0x90/0x90 [ 917.095298][T26709] ? debug_smp_processor_id+0x17/0x20 [ 917.100500][T26709] __x64_sys_write+0x7b/0x90 [ 917.104928][T26709] do_syscall_64+0x34/0x70 [ 917.109181][T26709] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 917.114904][T26709] RIP: 0033:0x7fe68f265719 [ 917.119159][T26709] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 917.138596][T26709] RSP: 002b:00007fe68dede038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 917.146840][T26709] RAX: ffffffffffffffda RBX: 00007fe68f41cf80 RCX: 00007fe68f265719 [ 917.154652][T26709] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000006 [ 917.162470][T26709] RBP: 00007fe68dede090 R08: 0000000000000000 R09: 0000000000000000 [ 917.170275][T26709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 917.178089][T26709] R13: 0000000000000000 R14: 00007fe68f41cf80 R15: 00007ffc72c570e8 [ 918.647165][T26761] device syzkaller0 entered promiscuous mode [ 919.840533][T26780] device syzkaller0 entered promiscuous mode [ 921.296090][T26812] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 922.360733][T26846] FAULT_INJECTION: forcing a failure. [ 922.360733][T26846] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 922.373658][T26846] CPU: 0 PID: 26846 Comm: syz.7.9851 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 922.384853][T26846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 922.394753][T26846] Call Trace: [ 922.397883][T26846] dump_stack_lvl+0x1e2/0x24b [ 922.402389][T26846] ? bfq_pos_tree_add_move+0x43b/0x43b [ 922.407699][T26846] ? shmem_getpage_gfp+0x2230/0x2480 [ 922.412809][T26846] dump_stack+0x15/0x17 [ 922.417163][T26846] should_fail+0x3c6/0x510 [ 922.421423][T26846] should_fail_usercopy+0x1a/0x20 [ 922.426288][T26846] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 922.432268][T26846] ? shmem_getpage+0xa0/0xa0 [ 922.436697][T26846] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 922.442417][T26846] ? memzero_page+0x100/0x100 [ 922.447027][T26846] generic_perform_write+0x34c/0x570 [ 922.452149][T26846] ? grab_cache_page_write_begin+0xa0/0xa0 [ 922.457963][T26846] ? file_remove_privs+0x570/0x570 [ 922.462915][T26846] ? __kasan_check_write+0x14/0x20 [ 922.467996][T26846] __generic_file_write_iter+0x23c/0x560 [ 922.473526][T26846] ? generic_write_checks+0x3b9/0x470 [ 922.478740][T26846] generic_file_write_iter+0xaf/0x1c0 [ 922.483942][T26846] vfs_write+0xb4c/0xe70 [ 922.488148][T26846] ? kernel_write+0x3d0/0x3d0 [ 922.492660][T26846] ? mutex_trylock+0xa0/0xa0 [ 922.497087][T26846] ? __fdget_pos+0x2e7/0x3a0 [ 922.501507][T26846] ? ksys_write+0x77/0x2c0 [ 922.505767][T26846] ksys_write+0x199/0x2c0 [ 922.509941][T26846] ? bpf_trace_run1+0x210/0x210 [ 922.514623][T26846] ? __ia32_sys_read+0x90/0x90 [ 922.519225][T26846] ? __bpf_trace_sys_enter+0x62/0x70 [ 922.524335][T26846] __x64_sys_write+0x7b/0x90 [ 922.528764][T26846] do_syscall_64+0x34/0x70 [ 922.533279][T26846] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 922.539010][T26846] RIP: 0033:0x7ff909198719 [ 922.543259][T26846] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 922.562965][T26846] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 922.571202][T26846] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 922.579011][T26846] RDX: 000000000004000c RSI: 0000000020000180 RDI: 0000000000000007 [ 922.586833][T26846] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 922.594641][T26846] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 922.602455][T26846] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 922.847806][T26853] device veth0_vlan left promiscuous mode [ 922.881662][T26856] FAULT_INJECTION: forcing a failure. [ 922.881662][T26856] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 922.938755][T26853] device veth0_vlan entered promiscuous mode [ 923.067252][T26856] CPU: 0 PID: 26856 Comm: syz.5.9856 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 923.078451][T26856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 923.088517][T26856] Call Trace: [ 923.091834][T26856] dump_stack_lvl+0x1e2/0x24b [ 923.096514][T26856] ? panic+0x812/0x812 [ 923.100489][T26856] ? bfq_pos_tree_add_move+0x43b/0x43b [ 923.105781][T26856] ? vsnprintf+0x1b96/0x1c70 [ 923.110213][T26856] dump_stack+0x15/0x17 [ 923.114199][T26856] should_fail+0x3c6/0x510 [ 923.118457][T26856] should_fail_usercopy+0x1a/0x20 [ 923.123400][T26856] _copy_to_user+0x20/0x90 [ 923.127657][T26856] bpf_verifier_vlog+0x1ab/0x330 [ 923.132427][T26856] __btf_verifier_log+0xd1/0x120 [ 923.137294][T26856] ? bpf_verifier_vlog+0x1b8/0x330 [ 923.142248][T26856] ? btf_check_sec_info+0x4f0/0x4f0 [ 923.147283][T26856] ? btf_parse_hdr+0x1d5/0x770 [ 923.151974][T26856] ? memcpy+0x56/0x70 [ 923.155875][T26856] btf_parse_hdr+0x43e/0x770 [ 923.160393][T26856] btf_new_fd+0x487/0x9c0 [ 923.164558][T26856] __se_sys_bpf+0x1aed/0x11cb0 [ 923.169159][T26856] ? stack_trace_save+0x113/0x1c0 [ 923.174044][T26856] ? terminate_walk+0x407/0x4f0 [ 923.178706][T26856] ? stack_trace_snprint+0xf0/0xf0 [ 923.183663][T26856] ? kmem_cache_free+0xa9/0x1e0 [ 923.188341][T26856] ? kmem_cache_free+0xa9/0x1e0 [ 923.193114][T26856] ? kasan_set_track+0x5d/0x70 [ 923.197815][T26856] ? __x64_sys_bpf+0x90/0x90 [ 923.202230][T26856] ? __kasan_slab_free+0x11/0x20 [ 923.207010][T26856] ? slab_free_freelist_hook+0xc0/0x190 [ 923.212389][T26856] ? kmem_cache_free+0xa9/0x1e0 [ 923.217075][T26856] ? putname+0xe7/0x140 [ 923.221065][T26856] ? do_sys_openat2+0x1fc/0x710 [ 923.225766][T26856] ? __x64_sys_openat+0x243/0x290 [ 923.230615][T26856] ? do_syscall_64+0x34/0x70 [ 923.235051][T26856] ? _kstrtoull+0x3a0/0x4a0 [ 923.239386][T26856] ? kstrtouint_from_user+0x20a/0x2a0 [ 923.244589][T26856] ? kstrtol_from_user+0x310/0x310 [ 923.249601][T26856] ? memset+0x35/0x40 [ 923.253443][T26856] ? __fsnotify_parent+0x4b9/0x6c0 [ 923.258394][T26856] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 923.264812][T26856] ? proc_fail_nth_write+0x20b/0x290 [ 923.270005][T26856] ? proc_fail_nth_read+0x210/0x210 [ 923.274964][T26856] ? security_file_permission+0x86/0xb0 [ 923.280445][T26856] ? rw_verify_area+0x1c3/0x360 [ 923.285135][T26856] ? preempt_count_add+0x92/0x1a0 [ 923.289989][T26856] ? vfs_write+0x852/0xe70 [ 923.294245][T26856] ? kmem_cache_free+0xa9/0x1e0 [ 923.299023][T26856] ? kernel_write+0x3d0/0x3d0 [ 923.303545][T26856] ? __check_object_size+0x94/0x3c0 [ 923.308574][T26856] ? copy_from_user_nofault+0xce/0x130 [ 923.313859][T26856] ? bpf_probe_read_compat+0x10b/0x180 [ 923.319158][T26856] ? bpf_trace_run2+0xf4/0x280 [ 923.323759][T26856] ? __bpf_trace_sys_enter+0x62/0x70 [ 923.328875][T26856] __x64_sys_bpf+0x7b/0x90 [ 923.333130][T26856] do_syscall_64+0x34/0x70 [ 923.337379][T26856] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 923.343105][T26856] RIP: 0033:0x7fe68f265719 [ 923.347361][T26856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 923.366886][T26856] RSP: 002b:00007fe68dede038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 923.375127][T26856] RAX: ffffffffffffffda RBX: 00007fe68f41cf80 RCX: 00007fe68f265719 [ 923.383034][T26856] RDX: 0000000000000028 RSI: 0000000020000580 RDI: 0000000000000012 [ 923.390939][T26856] RBP: 00007fe68dede090 R08: 0000000000000000 R09: 0000000000000000 [ 923.398741][T26856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 923.406570][T26856] R13: 0000000000000000 R14: 00007fe68f41cf80 R15: 00007ffc72c570e8 [ 923.465241][T26862] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.472184][T26862] bridge0: port 1(bridge_slave_0) entered disabled state [ 923.481740][T26862] device bridge0 left promiscuous mode [ 924.923380][T26911] device syzkaller0 entered promiscuous mode [ 926.805949][T26966] syz.6.9897[26966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.806010][T26966] syz.6.9897[26966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.840896][T26966] syz.6.9897[26966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 926.891430][T26966] syz.6.9897[26966] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 927.276756][T26986] FAULT_INJECTION: forcing a failure. [ 927.276756][T26986] name failslab, interval 1, probability 0, space 0, times 0 [ 927.337020][T26986] CPU: 1 PID: 26986 Comm: syz.7.9906 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 927.348213][T26986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 927.358107][T26986] Call Trace: [ 927.361235][T26986] dump_stack_lvl+0x1e2/0x24b [ 927.365919][T26986] ? panic+0x812/0x812 [ 927.369823][T26986] ? bfq_pos_tree_add_move+0x43b/0x43b [ 927.375123][T26986] ? __kasan_check_write+0x14/0x20 [ 927.380069][T26986] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 927.385372][T26986] dump_stack+0x15/0x17 [ 927.389359][T26986] should_fail+0x3c6/0x510 [ 927.393611][T26986] ? __alloc_skb+0x80/0x510 [ 927.397947][T26986] __should_failslab+0xa4/0xe0 [ 927.402556][T26986] should_failslab+0x9/0x20 [ 927.406885][T26986] kmem_cache_alloc+0x3d/0x2e0 [ 927.411488][T26986] __alloc_skb+0x80/0x510 [ 927.415652][T26986] ? if_nlmsg_size+0x59c/0x5f0 [ 927.420253][T26986] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 927.425376][T26986] rtnetlink_event+0xf3/0x1b0 [ 927.429889][T26986] raw_notifier_call_chain+0x8c/0xf0 [ 927.435005][T26986] dev_set_mac_address+0x325/0x470 [ 927.439953][T26986] ? dev_pre_changeaddr_notify+0x220/0x220 [ 927.445597][T26986] dev_set_mac_address_user+0x31/0x50 [ 927.450802][T26986] dev_ifsioc+0x657/0xae0 [ 927.454964][T26986] ? dev_ioctl+0xb40/0xb40 [ 927.459221][T26986] ? dev_get_by_name_rcu+0xc5/0xf0 [ 927.464164][T26986] dev_ioctl+0x526/0xb40 [ 927.468251][T26986] sock_do_ioctl+0x295/0x3a0 [ 927.472673][T26986] ? sock_show_fdinfo+0xa0/0xa0 [ 927.477362][T26986] ? kernel_write+0x3d0/0x3d0 [ 927.481876][T26986] ? selinux_file_ioctl+0x3cc/0x540 [ 927.486920][T26986] sock_ioctl+0x4a6/0x760 [ 927.491074][T26986] ? sock_poll+0x340/0x340 [ 927.495333][T26986] ? security_file_ioctl+0x84/0xb0 [ 927.500271][T26986] ? sock_poll+0x340/0x340 [ 927.504530][T26986] __se_sys_ioctl+0x114/0x190 [ 927.509045][T26986] __x64_sys_ioctl+0x7b/0x90 [ 927.513493][T26986] do_syscall_64+0x34/0x70 [ 927.517721][T26986] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 927.523448][T26986] RIP: 0033:0x7ff909198719 [ 927.527700][T26986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 927.547139][T26986] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 927.555376][T26986] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 927.563188][T26986] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 927.570996][T26986] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 927.578806][T26986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 927.586634][T26986] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 928.690113][T27007] device wg2 entered promiscuous mode [ 928.798198][T27018] FAULT_INJECTION: forcing a failure. [ 928.798198][T27018] name failslab, interval 1, probability 0, space 0, times 0 [ 928.859020][T27018] CPU: 1 PID: 27018 Comm: syz.6.9917 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 928.870301][T27018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 928.880189][T27018] Call Trace: [ 928.883326][T27018] dump_stack_lvl+0x1e2/0x24b [ 928.887832][T27018] ? bfq_pos_tree_add_move+0x43b/0x43b [ 928.893128][T27018] dump_stack+0x15/0x17 [ 928.897117][T27018] should_fail+0x3c6/0x510 [ 928.901370][T27018] ? security_prepare_creds+0x4d/0x140 [ 928.906672][T27018] __should_failslab+0xa4/0xe0 [ 928.911270][T27018] should_failslab+0x9/0x20 [ 928.915602][T27018] __kmalloc+0x60/0x330 [ 928.919600][T27018] security_prepare_creds+0x4d/0x140 [ 928.924716][T27018] prepare_creds+0x3f8/0x5f0 [ 928.929142][T27018] copy_creds+0xe7/0x480 [ 928.933234][T27018] copy_process+0x93f/0x3340 [ 928.937663][T27018] ? kvm_sched_clock_read+0x18/0x40 [ 928.942686][T27018] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 928.947638][T27018] ? sched_clock+0x3a/0x40 [ 928.951887][T27018] kernel_clone+0x21e/0x9e0 [ 928.956225][T27018] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 928.961860][T27018] ? create_io_thread+0x1e0/0x1e0 [ 928.966728][T27018] __x64_sys_clone+0x23f/0x290 [ 928.971324][T27018] ? __do_sys_vfork+0x130/0x130 [ 928.976013][T27018] ? debug_smp_processor_id+0x17/0x20 [ 928.981305][T27018] do_syscall_64+0x34/0x70 [ 928.985555][T27018] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 928.991282][T27018] RIP: 0033:0x7f4759128719 [ 928.995538][T27018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 929.014978][T27018] RSP: 002b:00007f4757da0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 929.023307][T27018] RAX: ffffffffffffffda RBX: 00007f47592dff80 RCX: 00007f4759128719 [ 929.031119][T27018] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000004d100000 [ 929.038928][T27018] RBP: 00007f4757da1090 R08: 0000000000000000 R09: 0000000000000000 [ 929.046737][T27018] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 929.054548][T27018] R13: 0000000000000000 R14: 00007f47592dff80 R15: 00007ffc4ed03c68 [ 929.526182][T27042] FAULT_INJECTION: forcing a failure. [ 929.526182][T27042] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 929.646821][T27042] CPU: 1 PID: 27042 Comm: syz.5.9927 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 929.658105][T27042] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 929.667991][T27042] Call Trace: [ 929.671126][T27042] dump_stack_lvl+0x1e2/0x24b [ 929.675635][T27042] ? bfq_pos_tree_add_move+0x43b/0x43b [ 929.680937][T27042] ? search_extable+0xaf/0xf0 [ 929.685443][T27042] ? visit_groups_merge+0x24b0/0x24b0 [ 929.690647][T27042] dump_stack+0x15/0x17 [ 929.694634][T27042] should_fail+0x3c6/0x510 [ 929.699040][T27042] should_fail_usercopy+0x1a/0x20 [ 929.703978][T27042] _copy_from_user+0x20/0xd0 [ 929.708413][T27042] __se_sys_bpf+0x232/0x11cb0 [ 929.712915][T27042] ? no_context+0x107/0xd20 [ 929.717278][T27042] ? kvm_sched_clock_read+0x18/0x40 [ 929.722288][T27042] ? __x64_sys_bpf+0x90/0x90 [ 929.726716][T27042] ? sched_clock_cpu+0x1b/0x3b0 [ 929.731410][T27042] ? sched_clock+0x3a/0x40 [ 929.735741][T27042] ? _kstrtoull+0x3a0/0x4a0 [ 929.740093][T27042] ? kstrtouint_from_user+0x20a/0x2a0 [ 929.745296][T27042] ? kstrtol_from_user+0x310/0x310 [ 929.750238][T27042] ? memset+0x35/0x40 [ 929.754053][T27042] ? __fsnotify_parent+0x4b9/0x6c0 [ 929.759013][T27042] ? kvm_sched_clock_read+0x18/0x40 [ 929.764034][T27042] ? sched_clock+0x3a/0x40 [ 929.768285][T27042] ? sched_clock_cpu+0x1b/0x3b0 [ 929.772976][T27042] ? sched_clock+0x3a/0x40 [ 929.777232][T27042] ? __irq_exit_rcu+0x40/0x150 [ 929.781831][T27042] ? irq_exit_rcu+0x9/0x10 [ 929.786080][T27042] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 929.791726][T27042] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 929.797720][T27042] ? __kasan_check_write+0x14/0x20 [ 929.802654][T27042] ? fput_many+0x160/0x1b0 [ 929.806923][T27042] ? debug_smp_processor_id+0x17/0x20 [ 929.812123][T27042] __x64_sys_bpf+0x7b/0x90 [ 929.816458][T27042] do_syscall_64+0x34/0x70 [ 929.820717][T27042] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 929.826435][T27042] RIP: 0033:0x7fe68f265719 [ 929.830696][T27042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 929.850132][T27042] RSP: 002b:00007fe68dede038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 929.858378][T27042] RAX: ffffffffffffffda RBX: 00007fe68f41cf80 RCX: 00007fe68f265719 [ 929.866185][T27042] RDX: 0000000000000010 RSI: 0000000020000500 RDI: 0000000000000011 [ 929.873997][T27042] RBP: 00007fe68dede090 R08: 0000000000000000 R09: 0000000000000000 [ 929.881813][T27042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 929.889624][T27042] R13: 0000000000000000 R14: 00007fe68f41cf80 R15: 00007ffc72c570e8 [ 931.230546][T27103] device macsec0 entered promiscuous mode [ 931.556121][T27115] FAULT_INJECTION: forcing a failure. [ 931.556121][T27115] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 931.620391][T27115] CPU: 0 PID: 27115 Comm: syz.5.9956 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 931.631579][T27115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 931.641470][T27115] Call Trace: [ 931.644607][T27115] dump_stack_lvl+0x1e2/0x24b [ 931.649204][T27115] ? bfq_pos_tree_add_move+0x43b/0x43b [ 931.654495][T27115] dump_stack+0x15/0x17 [ 931.658485][T27115] should_fail+0x3c6/0x510 [ 931.662739][T27115] should_fail_alloc_page+0x52/0x60 [ 931.667779][T27115] __alloc_pages_nodemask+0x1b3/0xaf0 [ 931.672978][T27115] ? __kernel_text_address+0x9b/0x110 [ 931.678187][T27115] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 931.683565][T27115] ? stack_trace_save+0x113/0x1c0 [ 931.688423][T27115] ? terminate_walk+0x407/0x4f0 [ 931.693110][T27115] ? stack_trace_snprint+0xf0/0xf0 [ 931.698061][T27115] skb_page_frag_refill+0x21b/0x410 [ 931.703093][T27115] tun_get_user+0x6cb/0x38f0 [ 931.707526][T27115] ? __kasan_check_write+0x14/0x20 [ 931.712471][T27115] ? _kstrtoull+0x3a0/0x4a0 [ 931.716806][T27115] ? tun_do_read+0x1f60/0x1f60 [ 931.721403][T27115] ? kstrtouint_from_user+0x20a/0x2a0 [ 931.726613][T27115] ? kstrtol_from_user+0x310/0x310 [ 931.731559][T27115] ? queue_map_peek_elem+0x280/0x280 [ 931.736687][T27115] ? avc_policy_seqno+0x1b/0x70 [ 931.741366][T27115] ? selinux_file_permission+0x2bb/0x560 [ 931.746835][T27115] ? fsnotify_perm+0x67/0x4e0 [ 931.751352][T27115] tun_chr_write_iter+0x1a8/0x250 [ 931.756207][T27115] vfs_write+0xb4c/0xe70 [ 931.760286][T27115] ? putname+0xe7/0x140 [ 931.764279][T27115] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 931.769943][T27115] ? kernel_write+0x3d0/0x3d0 [ 931.774442][T27115] ? __fdget_pos+0x209/0x3a0 [ 931.778879][T27115] ? ksys_write+0x77/0x2c0 [ 931.783113][T27115] ksys_write+0x199/0x2c0 [ 931.787280][T27115] ? __ia32_sys_read+0x90/0x90 [ 931.791882][T27115] ? debug_smp_processor_id+0x17/0x20 [ 931.797084][T27115] __x64_sys_write+0x7b/0x90 [ 931.801514][T27115] do_syscall_64+0x34/0x70 [ 931.805769][T27115] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 931.811495][T27115] RIP: 0033:0x7fe68f265719 [ 931.815750][T27115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 931.835185][T27115] RSP: 002b:00007fe68dede038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 931.843445][T27115] RAX: ffffffffffffffda RBX: 00007fe68f41cf80 RCX: 00007fe68f265719 [ 931.851246][T27115] RDX: 0000000000000012 RSI: 0000000020000080 RDI: 00000000000000c8 [ 931.859053][T27115] RBP: 00007fe68dede090 R08: 0000000000000000 R09: 0000000000000000 [ 931.866864][T27115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 931.874869][T27115] R13: 0000000000000000 R14: 00007fe68f41cf80 R15: 00007ffc72c570e8 [ 933.367825][T27199] FAULT_INJECTION: forcing a failure. [ 933.367825][T27199] name failslab, interval 1, probability 0, space 0, times 0 [ 933.401726][T27199] CPU: 1 PID: 27199 Comm: syz.0.9990 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 933.412919][T27199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 933.422803][T27199] Call Trace: [ 933.426042][T27199] dump_stack_lvl+0x1e2/0x24b [ 933.430548][T27199] ? bfq_pos_tree_add_move+0x43b/0x43b [ 933.435951][T27199] dump_stack+0x15/0x17 [ 933.440027][T27199] should_fail+0x3c6/0x510 [ 933.444281][T27199] ? security_file_alloc+0x29/0x120 [ 933.449434][T27199] __should_failslab+0xa4/0xe0 [ 933.454032][T27199] should_failslab+0x9/0x20 [ 933.458370][T27199] kmem_cache_alloc+0x3d/0x2e0 [ 933.462969][T27199] ? __alloc_file+0x29/0x330 [ 933.467398][T27199] security_file_alloc+0x29/0x120 [ 933.472262][T27199] __alloc_file+0xbf/0x330 [ 933.476513][T27199] alloc_empty_file+0x95/0x180 [ 933.481109][T27199] alloc_file+0x5a/0x4e0 [ 933.485191][T27199] alloc_file_pseudo+0x259/0x2f0 [ 933.489962][T27199] ? __kasan_check_write+0x14/0x20 [ 933.494911][T27199] ? alloc_empty_file_noaccount+0x80/0x80 [ 933.500475][T27199] anon_inode_getfile+0xa7/0x180 [ 933.505239][T27199] __se_sys_perf_event_open+0xfe4/0x3c30 [ 933.510714][T27199] ? bpf_ringbuf_query+0xdd/0x130 [ 933.515569][T27199] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 933.521040][T27199] ? __ia32_sys_read+0x90/0x90 [ 933.525640][T27199] ? __bpf_trace_sys_enter+0x62/0x70 [ 933.530762][T27199] __x64_sys_perf_event_open+0xbf/0xd0 [ 933.536053][T27199] do_syscall_64+0x34/0x70 [ 933.540304][T27199] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 933.546032][T27199] RIP: 0033:0x7ff6e69b4719 [ 933.550285][T27199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 933.569735][T27199] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 933.577972][T27199] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 933.585780][T27199] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 00000000200012c0 [ 933.593588][T27199] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 933.601414][T27199] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 933.609221][T27199] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 934.050554][T27231] FAULT_INJECTION: forcing a failure. [ 934.050554][T27231] name failslab, interval 1, probability 0, space 0, times 0 [ 934.068325][T27231] CPU: 1 PID: 27231 Comm: syz.0.10005 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 934.079601][T27231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 934.089524][T27231] Call Trace: [ 934.092623][T27231] dump_stack_lvl+0x1e2/0x24b [ 934.097131][T27231] ? panic+0x812/0x812 [ 934.101041][T27231] ? bfq_pos_tree_add_move+0x43b/0x43b [ 934.106341][T27231] dump_stack+0x15/0x17 [ 934.110327][T27231] should_fail+0x3c6/0x510 [ 934.114602][T27231] ? qdisc_alloc+0x76/0x750 [ 934.118918][T27231] __should_failslab+0xa4/0xe0 [ 934.123510][T27231] should_failslab+0x9/0x20 [ 934.127852][T27231] __kmalloc+0x60/0x330 [ 934.131850][T27231] ? __kasan_check_write+0x14/0x20 [ 934.136797][T27231] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 934.142082][T27231] qdisc_alloc+0x76/0x750 [ 934.146247][T27231] ? mutex_lock+0xa5/0x110 [ 934.150502][T27231] qdisc_create_dflt+0x6b/0x3d0 [ 934.155186][T27231] ? _raw_spin_lock+0xa4/0x1b0 [ 934.159788][T27231] dev_activate+0x2e0/0x1310 [ 934.164217][T27231] __dev_open+0x3bf/0x4e0 [ 934.168389][T27231] ? dev_open+0x260/0x260 [ 934.172548][T27231] ? _raw_spin_unlock_bh+0x51/0x60 [ 934.177492][T27231] ? dev_set_rx_mode+0x245/0x2e0 [ 934.182279][T27231] ? __kasan_check_read+0x11/0x20 [ 934.187125][T27231] __dev_change_flags+0x1db/0x6e0 [ 934.192080][T27231] ? dev_get_flags+0x1e0/0x1e0 [ 934.196678][T27231] ? selinux_capable+0x2f1/0x430 [ 934.201457][T27231] ? selinux_capset+0xf0/0xf0 [ 934.205960][T27231] dev_change_flags+0x8c/0x1a0 [ 934.210559][T27231] dev_ifsioc+0x115/0xae0 [ 934.214722][T27231] ? dev_ioctl+0xb40/0xb40 [ 934.218977][T27231] ? dev_get_by_name_rcu+0xc5/0xf0 [ 934.223929][T27231] dev_ioctl+0x526/0xb40 [ 934.228095][T27231] sock_do_ioctl+0x295/0x3a0 [ 934.232520][T27231] ? sock_show_fdinfo+0xa0/0xa0 [ 934.237204][T27231] ? kernel_write+0x3d0/0x3d0 [ 934.241723][T27231] ? selinux_file_ioctl+0x3cc/0x540 [ 934.246752][T27231] sock_ioctl+0x4a6/0x760 [ 934.250918][T27231] ? sock_poll+0x340/0x340 [ 934.255174][T27231] ? security_file_ioctl+0x84/0xb0 [ 934.260120][T27231] ? sock_poll+0x340/0x340 [ 934.264368][T27231] __se_sys_ioctl+0x114/0x190 [ 934.268887][T27231] __x64_sys_ioctl+0x7b/0x90 [ 934.273309][T27231] do_syscall_64+0x34/0x70 [ 934.277566][T27231] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 934.283286][T27231] RIP: 0033:0x7ff6e69b4719 [ 934.287544][T27231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 934.306987][T27231] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 934.315227][T27231] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 934.323039][T27231] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 934.331195][T27231] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 934.339004][T27231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 934.346990][T27231] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 934.381964][T27231] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 934.404159][T27231] device pim6reg1 entered promiscuous mode [ 934.781312][T27259] FAULT_INJECTION: forcing a failure. [ 934.781312][T27259] name failslab, interval 1, probability 0, space 0, times 0 [ 934.910082][T27259] CPU: 1 PID: 27259 Comm: syz.7.10018 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 934.921365][T27259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 934.931247][T27259] Call Trace: [ 934.934386][T27259] dump_stack_lvl+0x1e2/0x24b [ 934.938909][T27259] ? bfq_pos_tree_add_move+0x43b/0x43b [ 934.944192][T27259] dump_stack+0x15/0x17 [ 934.948182][T27259] should_fail+0x3c6/0x510 [ 934.952436][T27259] ? sk_prot_alloc+0xbe/0x370 [ 934.956949][T27259] __should_failslab+0xa4/0xe0 [ 934.961549][T27259] should_failslab+0x9/0x20 [ 934.965883][T27259] __kmalloc+0x60/0x330 [ 934.969885][T27259] sk_prot_alloc+0xbe/0x370 [ 934.974219][T27259] ? __kasan_check_write+0x14/0x20 [ 934.979165][T27259] sk_alloc+0x38/0x4d0 [ 934.983070][T27259] can_create+0x2c3/0x590 [ 934.987236][T27259] __sock_create+0x3a6/0x760 [ 934.991667][T27259] __sys_socketpair+0x29f/0x6e0 [ 934.996351][T27259] ? __ia32_sys_socket+0x90/0x90 [ 935.001124][T27259] ? __ia32_sys_read+0x90/0x90 [ 935.005816][T27259] __x64_sys_socketpair+0x9b/0xb0 [ 935.010675][T27259] do_syscall_64+0x34/0x70 [ 935.014925][T27259] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 935.020646][T27259] RIP: 0033:0x7ff909198719 [ 935.024901][T27259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 935.044440][T27259] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 935.052684][T27259] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 935.060492][T27259] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 935.068304][T27259] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 935.076125][T27259] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.083935][T27259] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 935.235258][T27264] device pim6reg1 entered promiscuous mode [ 935.337644][T27268] bridge0: port 2(bridge_slave_1) entered disabled state [ 935.347802][T27268] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.788998][T27372] FAULT_INJECTION: forcing a failure. [ 938.788998][T27372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 938.856554][T27372] CPU: 0 PID: 27372 Comm: syz.8.10062 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 938.867917][T27372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 938.877808][T27372] Call Trace: [ 938.880945][T27372] dump_stack_lvl+0x1e2/0x24b [ 938.885456][T27372] ? bfq_pos_tree_add_move+0x43b/0x43b [ 938.890747][T27372] ? memset+0x35/0x40 [ 938.894560][T27372] dump_stack+0x15/0x17 [ 938.898558][T27372] should_fail+0x3c6/0x510 [ 938.902822][T27372] should_fail_usercopy+0x1a/0x20 [ 938.907673][T27372] _copy_from_user+0x20/0xd0 [ 938.912106][T27372] ___sys_recvmsg+0x150/0x690 [ 938.916622][T27372] ? __sys_recvmsg+0x270/0x270 [ 938.921225][T27372] ? __fdget+0x1bc/0x240 [ 938.925290][T27372] __x64_sys_recvmsg+0x1ee/0x2c0 [ 938.930063][T27372] ? ___sys_recvmsg+0x690/0x690 [ 938.934752][T27372] ? debug_smp_processor_id+0x17/0x20 [ 938.939964][T27372] do_syscall_64+0x34/0x70 [ 938.944212][T27372] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 938.949939][T27372] RIP: 0033:0x7f05927a7719 [ 938.954187][T27372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 938.973631][T27372] RSP: 002b:00007f0591420038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 938.981876][T27372] RAX: ffffffffffffffda RBX: 00007f059295ef80 RCX: 00007f05927a7719 [ 938.989685][T27372] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 [ 938.997496][T27372] RBP: 00007f0591420090 R08: 0000000000000000 R09: 0000000000000000 [ 939.005386][T27372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 939.013200][T27372] R13: 0000000000000000 R14: 00007f059295ef80 R15: 00007ffda6ea0db8 [ 943.531660][T27565] FAULT_INJECTION: forcing a failure. [ 943.531660][T27565] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 943.601004][T27565] CPU: 1 PID: 27565 Comm: syz.7.10140 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 943.612287][T27565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 943.622182][T27565] Call Trace: [ 943.625307][T27565] dump_stack_lvl+0x1e2/0x24b [ 943.629832][T27565] ? bfq_pos_tree_add_move+0x43b/0x43b [ 943.635116][T27565] dump_stack+0x15/0x17 [ 943.639103][T27565] should_fail+0x3c6/0x510 [ 943.643359][T27565] should_fail_alloc_page+0x52/0x60 [ 943.648401][T27565] __alloc_pages_nodemask+0x1b3/0xaf0 [ 943.653616][T27565] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 943.658982][T27565] ? _raw_spin_trylock_bh+0x190/0x190 [ 943.664182][T27565] ? _raw_spin_lock+0xa4/0x1b0 [ 943.668783][T27565] ? _raw_spin_trylock_bh+0x190/0x190 [ 943.673986][T27565] ? _raw_spin_unlock+0x4d/0x70 [ 943.678674][T27565] pte_alloc_one+0x1f/0xc0 [ 943.683014][T27565] __pte_alloc+0x75/0x2c0 [ 943.687180][T27565] ? free_pgtables+0x3c0/0x3c0 [ 943.691780][T27565] ? native_set_ldt+0x360/0x360 [ 943.696467][T27565] copy_page_range+0x29d8/0x3020 [ 943.701239][T27565] ? _raw_spin_unlock_irq+0x4e/0x70 [ 943.706280][T27565] ? release_firmware_map_entry+0x18d/0x18d [ 943.712009][T27565] ? preempt_schedule_irq+0xe7/0x140 [ 943.717122][T27565] ? pfn_valid+0x1e0/0x1e0 [ 943.721374][T27565] ? irqentry_exit+0x4f/0x60 [ 943.725804][T27565] ? __kasan_check_write+0x14/0x20 [ 943.730752][T27565] ? _raw_write_lock+0xa4/0x170 [ 943.735434][T27565] ? _raw_write_trylock+0x1a0/0x1a0 [ 943.740473][T27565] ? _raw_write_unlock+0x2e/0x60 [ 943.745264][T27565] copy_mm+0xc4a/0x13a0 [ 943.749247][T27565] ? copy_signal+0x610/0x610 [ 943.753679][T27565] ? __init_rwsem+0xd6/0x1c0 [ 943.758095][T27565] ? copy_signal+0x4e3/0x610 [ 943.762517][T27565] copy_process+0x1175/0x3340 [ 943.767036][T27565] ? __irq_exit_rcu+0x40/0x150 [ 943.771631][T27565] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 943.776580][T27565] kernel_clone+0x21e/0x9e0 [ 943.780920][T27565] ? ktime_get+0x10e/0x140 [ 943.785168][T27565] ? create_io_thread+0x1e0/0x1e0 [ 943.790026][T27565] ? kvm_sched_clock_read+0x18/0x40 [ 943.795062][T27565] ? sched_clock+0x3a/0x40 [ 943.799315][T27565] __x64_sys_clone+0x23f/0x290 [ 943.803919][T27565] ? __do_sys_vfork+0x130/0x130 [ 943.808667][T27565] do_syscall_64+0x34/0x70 [ 943.812863][T27565] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 943.818584][T27565] RIP: 0033:0x7ff909198719 [ 943.822844][T27565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 943.842294][T27565] RSP: 002b:00007ff907e10fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 943.850528][T27565] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 943.858351][T27565] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c000000 [ 943.866148][T27565] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 943.873966][T27565] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 943.881772][T27565] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 944.051190][T27571] device pim6reg1 entered promiscuous mode [ 946.505139][T27630] device syzkaller0 entered promiscuous mode [ 946.974903][T27645] pim6reg0: tun_chr_ioctl cmd 1074025698 [ 947.192825][T27662] FAULT_INJECTION: forcing a failure. [ 947.192825][T27662] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 947.296676][T27662] CPU: 1 PID: 27662 Comm: syz.8.10177 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 947.308316][T27662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 947.318197][T27662] Call Trace: [ 947.321338][T27662] dump_stack_lvl+0x1e2/0x24b [ 947.325849][T27662] ? bfq_pos_tree_add_move+0x43b/0x43b [ 947.331139][T27662] dump_stack+0x15/0x17 [ 947.335127][T27662] should_fail+0x3c6/0x510 [ 947.339403][T27662] should_fail_alloc_page+0x52/0x60 [ 947.344418][T27662] __alloc_pages_nodemask+0x1b3/0xaf0 [ 947.349629][T27662] ? do_syscall_64+0x34/0x70 [ 947.354051][T27662] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 947.359961][T27662] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 947.365341][T27662] ? avc_has_perm_noaudit+0x117/0x240 [ 947.370548][T27662] shmem_alloc_page+0x257/0x420 [ 947.375234][T27662] ? put_page+0xd0/0xd0 [ 947.379218][T27662] ? slab_post_alloc_hook+0x61/0x2f0 [ 947.384352][T27662] ? percpu_counter_add_batch+0x13d/0x160 [ 947.389903][T27662] shmem_alloc_and_acct_page+0x395/0x8e0 [ 947.395371][T27662] ? shmem_swapin_page+0x1950/0x1950 [ 947.400488][T27662] ? find_get_entry+0x44c/0x4c0 [ 947.405174][T27662] ? page_cache_prev_miss+0x410/0x410 [ 947.410388][T27662] ? down_read_trylock+0x179/0x1d0 [ 947.415329][T27662] ? find_lock_entry+0x1df/0x200 [ 947.420100][T27662] shmem_getpage_gfp+0x891/0x2480 [ 947.424963][T27662] ? __kasan_check_write+0x14/0x20 [ 947.429920][T27662] ? shmem_getpage+0xa0/0xa0 [ 947.434335][T27662] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 947.440072][T27662] shmem_write_begin+0xca/0x1b0 [ 947.444751][T27662] generic_perform_write+0x2cd/0x570 [ 947.449876][T27662] ? grab_cache_page_write_begin+0xa0/0xa0 [ 947.455520][T27662] ? file_remove_privs+0x570/0x570 [ 947.460461][T27662] ? __kasan_check_write+0x14/0x20 [ 947.465409][T27662] __generic_file_write_iter+0x23c/0x560 [ 947.470877][T27662] ? generic_write_checks+0x3b9/0x470 [ 947.476313][T27662] generic_file_write_iter+0xaf/0x1c0 [ 947.481518][T27662] vfs_write+0xb4c/0xe70 [ 947.485612][T27662] ? kernel_write+0x3d0/0x3d0 [ 947.490108][T27662] ? mutex_trylock+0xa0/0xa0 [ 947.494537][T27662] ? __fdget_pos+0x2e7/0x3a0 [ 947.498955][T27662] ? ksys_write+0x77/0x2c0 [ 947.503214][T27662] ksys_write+0x199/0x2c0 [ 947.507384][T27662] ? __ia32_sys_read+0x90/0x90 [ 947.511988][T27662] ? debug_smp_processor_id+0x17/0x20 [ 947.517190][T27662] __x64_sys_write+0x7b/0x90 [ 947.521618][T27662] do_syscall_64+0x34/0x70 [ 947.525954][T27662] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 947.531768][T27662] RIP: 0033:0x7f05927a7719 [ 947.536111][T27662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 947.555548][T27662] RSP: 002b:00007f0591420038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 947.563878][T27662] RAX: ffffffffffffffda RBX: 00007f059295ef80 RCX: 00007f05927a7719 [ 947.571690][T27662] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 000000000000000b [ 947.579498][T27662] RBP: 00007f0591420090 R08: 0000000000000000 R09: 0000000000000000 [ 947.587396][T27662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 947.595209][T27662] R13: 0000000000000000 R14: 00007f059295ef80 R15: 00007ffda6ea0db8 [ 947.926129][T27672] FAULT_INJECTION: forcing a failure. [ 947.926129][T27672] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 947.939181][T27672] CPU: 0 PID: 27672 Comm: syz.8.10182 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 947.950630][T27672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 947.960518][T27672] Call Trace: [ 947.963651][T27672] dump_stack_lvl+0x1e2/0x24b [ 947.968304][T27672] ? bfq_pos_tree_add_move+0x43b/0x43b [ 947.973594][T27672] ? shmem_getpage_gfp+0x2230/0x2480 [ 947.978717][T27672] dump_stack+0x15/0x17 [ 947.982703][T27672] should_fail+0x3c6/0x510 [ 947.986959][T27672] should_fail_usercopy+0x1a/0x20 [ 947.991819][T27672] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 947.997723][T27672] ? shmem_getpage+0xa0/0xa0 [ 948.002138][T27672] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 948.008043][T27672] ? memzero_page+0x100/0x100 [ 948.012569][T27672] generic_perform_write+0x34c/0x570 [ 948.017685][T27672] ? grab_cache_page_write_begin+0xa0/0xa0 [ 948.023330][T27672] ? file_remove_privs+0x570/0x570 [ 948.028272][T27672] ? __kasan_check_write+0x14/0x20 [ 948.033218][T27672] __generic_file_write_iter+0x23c/0x560 [ 948.038682][T27672] ? generic_write_checks+0x3b9/0x470 [ 948.043896][T27672] generic_file_write_iter+0xaf/0x1c0 [ 948.049096][T27672] vfs_write+0xb4c/0xe70 [ 948.053265][T27672] ? kernel_write+0x3d0/0x3d0 [ 948.057768][T27672] ? mutex_trylock+0xa0/0xa0 [ 948.062194][T27672] ? __fdget_pos+0x2e7/0x3a0 [ 948.066628][T27672] ? ksys_write+0x77/0x2c0 [ 948.070886][T27672] ksys_write+0x199/0x2c0 [ 948.075046][T27672] ? __ia32_sys_read+0x90/0x90 [ 948.079857][T27672] ? debug_smp_processor_id+0x17/0x20 [ 948.085034][T27672] __x64_sys_write+0x7b/0x90 [ 948.089468][T27672] do_syscall_64+0x34/0x70 [ 948.093714][T27672] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 948.099428][T27672] RIP: 0033:0x7f05927a7719 [ 948.103682][T27672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 948.123127][T27672] RSP: 002b:00007f0591420038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 948.131455][T27672] RAX: ffffffffffffffda RBX: 00007f059295ef80 RCX: 00007f05927a7719 [ 948.139261][T27672] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 948.147086][T27672] RBP: 00007f0591420090 R08: 0000000000000000 R09: 0000000000000000 [ 948.154884][T27672] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 948.162698][T27672] R13: 0000000000000000 R14: 00007f059295ef80 R15: 00007ffda6ea0db8 [ 949.812450][T27731] €Â0: renamed from pim6reg1 [ 950.693275][T27768] device veth0_vlan left promiscuous mode [ 950.786499][T27768] device veth0_vlan entered promiscuous mode [ 951.620953][T27789] device wg2 entered promiscuous mode [ 951.742751][T27795] bridge0: port 2(bridge_slave_1) entered disabled state [ 951.749834][T27795] bridge0: port 1(bridge_slave_0) entered disabled state [ 951.904891][T27795] device bridge0 left promiscuous mode [ 952.302652][T27811] device macsec0 entered promiscuous mode [ 952.493000][T27822] FAULT_INJECTION: forcing a failure. [ 952.493000][T27822] name failslab, interval 1, probability 0, space 0, times 0 [ 952.505476][T27822] CPU: 1 PID: 27822 Comm: syz.0.10238 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 952.516694][T27822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 952.526587][T27822] Call Trace: [ 952.529729][T27822] dump_stack_lvl+0x1e2/0x24b [ 952.534232][T27822] ? bfq_pos_tree_add_move+0x43b/0x43b [ 952.539527][T27822] dump_stack+0x15/0x17 [ 952.543509][T27822] should_fail+0x3c6/0x510 [ 952.547870][T27822] ? skb_ensure_writable+0x2d0/0x440 [ 952.552971][T27822] __should_failslab+0xa4/0xe0 [ 952.557573][T27822] should_failslab+0x9/0x20 [ 952.561911][T27822] __kmalloc_track_caller+0x5f/0x320 [ 952.567032][T27822] ? skb_ensure_writable+0x2d0/0x440 [ 952.572157][T27822] pskb_expand_head+0x12b/0x1180 [ 952.576924][T27822] ? __kasan_check_write+0x14/0x20 [ 952.581876][T27822] skb_ensure_writable+0x2d0/0x440 [ 952.586821][T27822] bpf_clone_redirect+0x117/0x390 [ 952.591687][T27822] bpf_prog_6893982b85ceadf7+0x56/0xc0c [ 952.597064][T27822] ? __kasan_slab_alloc+0xc3/0xe0 [ 952.601920][T27822] ? __kasan_slab_alloc+0xb1/0xe0 [ 952.606782][T27822] ? slab_post_alloc_hook+0x61/0x2f0 [ 952.611903][T27822] ? kmem_cache_alloc+0x168/0x2e0 [ 952.616766][T27822] ? __build_skb+0x2a/0x300 [ 952.621098][T27822] ? build_skb+0x25/0x1e0 [ 952.625267][T27822] ? bpf_prog_test_run_skb+0x388/0x1410 [ 952.630645][T27822] ? __se_sys_bpf+0x5235/0x11cb0 [ 952.635419][T27822] ? __x64_sys_bpf+0x7b/0x90 [ 952.639847][T27822] ? do_syscall_64+0x34/0x70 [ 952.644278][T27822] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 952.650189][T27822] ? __kasan_check_read+0x11/0x20 [ 952.655036][T27822] ? bpf_test_timer_continue+0x140/0x440 [ 952.660508][T27822] bpf_test_run+0x40b/0xc20 [ 952.664851][T27822] ? convert___skb_to_skb+0x570/0x570 [ 952.670051][T27822] ? eth_type_trans+0x2e4/0x620 [ 952.674738][T27822] ? eth_get_headlen+0x240/0x240 [ 952.679514][T27822] ? convert___skb_to_skb+0x44/0x570 [ 952.684635][T27822] bpf_prog_test_run_skb+0xb6e/0x1410 [ 952.689850][T27822] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 952.695675][T27822] ? __kasan_check_write+0x14/0x20 [ 952.700733][T27822] ? fput_many+0x160/0x1b0 [ 952.704986][T27822] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 952.710715][T27822] __se_sys_bpf+0x5235/0x11cb0 [ 952.715319][T27822] ? stack_trace_save+0x113/0x1c0 [ 952.720268][T27822] ? terminate_walk+0x407/0x4f0 [ 952.724947][T27822] ? stack_trace_snprint+0xf0/0xf0 [ 952.729901][T27822] ? kmem_cache_free+0xa9/0x1e0 [ 952.734582][T27822] ? kmem_cache_free+0xa9/0x1e0 [ 952.739377][T27822] ? kasan_set_track+0x5d/0x70 [ 952.743961][T27822] ? __x64_sys_bpf+0x90/0x90 [ 952.748391][T27822] ? __kasan_slab_free+0x11/0x20 [ 952.753162][T27822] ? slab_free_freelist_hook+0xc0/0x190 [ 952.758538][T27822] ? kmem_cache_free+0xa9/0x1e0 [ 952.763221][T27822] ? putname+0xe7/0x140 [ 952.767214][T27822] ? do_sys_openat2+0x1fc/0x710 [ 952.771898][T27822] ? __x64_sys_openat+0x243/0x290 [ 952.776758][T27822] ? do_syscall_64+0x34/0x70 [ 952.781192][T27822] ? _kstrtoull+0x3a0/0x4a0 [ 952.785530][T27822] ? kstrtouint_from_user+0x20a/0x2a0 [ 952.790735][T27822] ? kstrtol_from_user+0x310/0x310 [ 952.795684][T27822] ? memset+0x35/0x40 [ 952.799503][T27822] ? __fsnotify_parent+0x4b9/0x6c0 [ 952.804458][T27822] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 952.810875][T27822] ? proc_fail_nth_write+0x20b/0x290 [ 952.815991][T27822] ? proc_fail_nth_read+0x210/0x210 [ 952.821049][T27822] ? security_file_permission+0x86/0xb0 [ 952.826627][T27822] ? rw_verify_area+0x1c3/0x360 [ 952.832613][T27822] ? preempt_count_add+0x92/0x1a0 [ 952.837465][T27822] ? vfs_write+0x852/0xe70 [ 952.841719][T27822] ? kmem_cache_free+0xa9/0x1e0 [ 952.846407][T27822] ? kernel_write+0x3d0/0x3d0 [ 952.850942][T27822] ? __check_object_size+0x94/0x3c0 [ 952.855954][T27822] ? copy_from_user_nofault+0xce/0x130 [ 952.861248][T27822] ? bpf_probe_read_compat+0x10b/0x180 [ 952.866553][T27822] ? bpf_trace_run2+0xf4/0x280 [ 952.871152][T27822] ? __bpf_trace_sys_enter+0x62/0x70 [ 952.876259][T27822] __x64_sys_bpf+0x7b/0x90 [ 952.880514][T27822] do_syscall_64+0x34/0x70 [ 952.884767][T27822] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 952.890492][T27822] RIP: 0033:0x7ff6e69b4719 [ 952.894748][T27822] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 952.914186][T27822] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 952.922462][T27822] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 952.930427][T27822] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 952.938232][T27822] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 952.946045][T27822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 952.953850][T27822] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 954.241514][T27869] FAULT_INJECTION: forcing a failure. [ 954.241514][T27869] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 954.254593][T27869] CPU: 1 PID: 27869 Comm: syz.7.10258 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 954.265855][T27869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 954.275750][T27869] Call Trace: [ 954.278884][T27869] dump_stack_lvl+0x1e2/0x24b [ 954.283394][T27869] ? bfq_pos_tree_add_move+0x43b/0x43b [ 954.288689][T27869] ? __alloc_skb+0x37c/0x510 [ 954.293117][T27869] dump_stack+0x15/0x17 [ 954.297104][T27869] should_fail+0x3c6/0x510 [ 954.301361][T27869] should_fail_usercopy+0x1a/0x20 [ 954.306220][T27869] _copy_from_iter+0x22c/0xd10 [ 954.310819][T27869] ? sock_alloc_send_pskb+0x936/0xa50 [ 954.316027][T27869] ? copyout_mc+0x90/0x90 [ 954.320192][T27869] ? __check_object_size+0x2e6/0x3c0 [ 954.325311][T27869] skb_copy_datagram_from_iter+0x100/0x6d0 [ 954.330958][T27869] ? debug_smp_processor_id+0x17/0x20 [ 954.336256][T27869] tun_get_user+0x1904/0x38f0 [ 954.340761][T27869] ? _kstrtoull+0x3a0/0x4a0 [ 954.345117][T27869] ? tun_do_read+0x1f60/0x1f60 [ 954.349697][T27869] ? kstrtouint_from_user+0x20a/0x2a0 [ 954.354901][T27869] ? kstrtol_from_user+0x310/0x310 [ 954.359857][T27869] ? arch_irq_work_raise+0xc7/0xd0 [ 954.364805][T27869] ? __irq_work_queue_local+0x111/0x180 [ 954.370182][T27869] ? avc_policy_seqno+0x1b/0x70 [ 954.374866][T27869] ? selinux_file_permission+0x2bb/0x560 [ 954.380333][T27869] ? fsnotify_perm+0x67/0x4e0 [ 954.384847][T27869] tun_chr_write_iter+0x1a8/0x250 [ 954.389707][T27869] vfs_write+0xb4c/0xe70 [ 954.393787][T27869] ? kernel_write+0x3d0/0x3d0 [ 954.398313][T27869] ? __fdget_pos+0x209/0x3a0 [ 954.402721][T27869] ? ksys_write+0x77/0x2c0 [ 954.406988][T27869] ksys_write+0x199/0x2c0 [ 954.411145][T27869] ? __ia32_sys_read+0x90/0x90 [ 954.415748][T27869] ? debug_smp_processor_id+0x17/0x20 [ 954.420949][T27869] __x64_sys_write+0x7b/0x90 [ 954.425375][T27869] do_syscall_64+0x34/0x70 [ 954.429631][T27869] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 954.435355][T27869] RIP: 0033:0x7ff909198719 [ 954.439615][T27869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 954.459048][T27869] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 954.467294][T27869] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 954.475105][T27869] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 954.482915][T27869] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 954.490727][T27869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 954.498537][T27869] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 957.049689][T27926] device bridge_slave_1 left promiscuous mode [ 957.058960][T27926] bridge0: port 2(bridge_slave_1) entered disabled state [ 957.086118][T27926] device bridge_slave_0 left promiscuous mode [ 957.094721][T27926] bridge0: port 1(bridge_slave_0) entered disabled state [ 957.287385][T27936] device veth0_vlan left promiscuous mode [ 957.473036][T27936] device veth0_vlan entered promiscuous mode [ 959.496787][T28005] device syzkaller0 entered promiscuous mode [ 960.008419][T28020] ªªªªªª: renamed from vlan0 [ 960.903179][T28065] FAULT_INJECTION: forcing a failure. [ 960.903179][T28065] name failslab, interval 1, probability 0, space 0, times 0 [ 960.915683][T28065] CPU: 0 PID: 28065 Comm: syz.7.10333 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 960.926886][T28065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 960.936862][T28065] Call Trace: [ 960.939984][T28065] dump_stack_lvl+0x1e2/0x24b [ 960.944575][T28065] ? panic+0x812/0x812 [ 960.948668][T28065] ? bfq_pos_tree_add_move+0x43b/0x43b [ 960.953955][T28065] dump_stack+0x15/0x17 [ 960.957949][T28065] should_fail+0x3c6/0x510 [ 960.962326][T28065] ? __d_alloc+0x2d/0x6c0 [ 960.966490][T28065] __should_failslab+0xa4/0xe0 [ 960.971091][T28065] should_failslab+0x9/0x20 [ 960.975427][T28065] kmem_cache_alloc+0x3d/0x2e0 [ 960.980032][T28065] __d_alloc+0x2d/0x6c0 [ 960.984025][T28065] d_alloc+0x4b/0x1d0 [ 960.987970][T28065] __lookup_hash+0xe7/0x290 [ 960.992312][T28065] filename_create+0x202/0x750 [ 960.996908][T28065] ? __check_object_size+0x2e6/0x3c0 [ 961.002030][T28065] ? kern_path_create+0x40/0x40 [ 961.006721][T28065] do_mkdirat+0xcc/0x2c0 [ 961.010792][T28065] ? do_mknodat+0x450/0x450 [ 961.015139][T28065] ? debug_smp_processor_id+0x17/0x20 [ 961.020349][T28065] __x64_sys_mkdirat+0x7b/0x90 [ 961.024945][T28065] do_syscall_64+0x34/0x70 [ 961.029197][T28065] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 961.034946][T28065] RIP: 0033:0x7ff909198719 [ 961.039206][T28065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 961.058622][T28065] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 961.066861][T28065] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 961.074670][T28065] RDX: 00000000000001ff RSI: 0000000020000340 RDI: 0000000000000003 [ 961.082487][T28065] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 961.090295][T28065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 961.098107][T28065] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 961.220994][T28074] FAULT_INJECTION: forcing a failure. [ 961.220994][T28074] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 961.240478][T28074] CPU: 1 PID: 28074 Comm: syz.7.10337 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 961.251761][T28074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 961.261644][T28074] Call Trace: [ 961.264781][T28074] dump_stack_lvl+0x1e2/0x24b [ 961.269288][T28074] ? bfq_pos_tree_add_move+0x43b/0x43b [ 961.274590][T28074] dump_stack+0x15/0x17 [ 961.278575][T28074] should_fail+0x3c6/0x510 [ 961.282830][T28074] should_fail_alloc_page+0x52/0x60 [ 961.287863][T28074] __alloc_pages_nodemask+0x1b3/0xaf0 [ 961.293075][T28074] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 961.298464][T28074] ? debug_smp_processor_id+0x17/0x20 [ 961.303660][T28074] ? __irq_exit_rcu+0x40/0x150 [ 961.308259][T28074] ? avc_has_perm_noaudit+0x117/0x240 [ 961.313469][T28074] shmem_alloc_page+0x257/0x420 [ 961.318154][T28074] ? put_page+0xd0/0xd0 [ 961.322164][T28074] ? percpu_counter_add_batch+0x13d/0x160 [ 961.327706][T28074] shmem_alloc_and_acct_page+0x395/0x8e0 [ 961.333173][T28074] ? shmem_swapin_page+0x1950/0x1950 [ 961.338295][T28074] ? find_get_entry+0x44c/0x4c0 [ 961.342982][T28074] ? page_cache_prev_miss+0x410/0x410 [ 961.348191][T28074] ? kvm_sched_clock_read+0x18/0x40 [ 961.353221][T28074] ? find_lock_entry+0x1df/0x200 [ 961.357995][T28074] shmem_getpage_gfp+0x891/0x2480 [ 961.362857][T28074] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 961.368500][T28074] ? shmem_getpage+0xa0/0xa0 [ 961.372917][T28074] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 961.378655][T28074] shmem_write_begin+0xca/0x1b0 [ 961.383339][T28074] generic_perform_write+0x2cd/0x570 [ 961.388463][T28074] ? grab_cache_page_write_begin+0xa0/0xa0 [ 961.394095][T28074] ? file_remove_privs+0x570/0x570 [ 961.399048][T28074] ? generic_file_write_iter+0x9f/0x1c0 [ 961.404432][T28074] __generic_file_write_iter+0x23c/0x560 [ 961.409894][T28074] ? generic_write_checks+0x3b9/0x470 [ 961.415111][T28074] generic_file_write_iter+0xaf/0x1c0 [ 961.420312][T28074] vfs_write+0xb4c/0xe70 [ 961.424390][T28074] ? kernel_write+0x3d0/0x3d0 [ 961.428900][T28074] ? __irq_exit_rcu+0x40/0x150 [ 961.433508][T28074] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 961.439515][T28074] ? ksys_write+0x8f/0x2c0 [ 961.443745][T28074] ksys_write+0x199/0x2c0 [ 961.447909][T28074] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 961.453554][T28074] ? __ia32_sys_read+0x90/0x90 [ 961.458154][T28074] ? debug_smp_processor_id+0x17/0x20 [ 961.463357][T28074] __x64_sys_write+0x7b/0x90 [ 961.467781][T28074] do_syscall_64+0x34/0x70 [ 961.472037][T28074] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 961.477765][T28074] RIP: 0033:0x7ff909198719 [ 961.482015][T28074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 961.501457][T28074] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 961.509699][T28074] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 961.517509][T28074] RDX: 0000000000040001 RSI: 0000000020000180 RDI: 0000000000000008 [ 961.525321][T28074] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 961.533131][T28074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 961.540947][T28074] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 961.564852][T28072] device veth1_macvtap entered promiscuous mode [ 961.663788][ T423] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 961.740050][T28085] FAULT_INJECTION: forcing a failure. [ 961.740050][T28085] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 961.808413][T28085] CPU: 1 PID: 28085 Comm: syz.6.10341 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 961.819690][T28085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 961.829581][T28085] Call Trace: [ 961.832716][T28085] dump_stack_lvl+0x1e2/0x24b [ 961.837235][T28085] ? bfq_pos_tree_add_move+0x43b/0x43b [ 961.842526][T28085] dump_stack+0x15/0x17 [ 961.846512][T28085] should_fail+0x3c6/0x510 [ 961.850867][T28085] should_fail_alloc_page+0x52/0x60 [ 961.855894][T28085] __alloc_pages_nodemask+0x1b3/0xaf0 [ 961.861118][T28085] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 961.866480][T28085] ? sched_clock+0x3a/0x40 [ 961.871359][T28085] ? sched_clock_cpu+0x1b/0x3b0 [ 961.876381][T28085] ? sched_clock+0x3a/0x40 [ 961.880635][T28085] ? avc_has_perm_noaudit+0x117/0x240 [ 961.885844][T28085] shmem_alloc_page+0x257/0x420 [ 961.890547][T28085] ? put_page+0xd0/0xd0 [ 961.894545][T28085] ? percpu_counter_add_batch+0x13d/0x160 [ 961.900101][T28085] shmem_alloc_and_acct_page+0x395/0x8e0 [ 961.905557][T28085] ? shmem_swapin_page+0x1950/0x1950 [ 961.910677][T28085] ? find_get_entry+0x44c/0x4c0 [ 961.915369][T28085] ? page_cache_prev_miss+0x410/0x410 [ 961.920650][T28085] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 961.926385][T28085] ? __kasan_check_write+0x14/0x20 [ 961.931326][T28085] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 961.936279][T28085] ? _raw_spin_lock_irqsave+0x210/0x210 [ 961.941667][T28085] ? find_lock_entry+0x1df/0x200 [ 961.946424][T28085] shmem_getpage_gfp+0x891/0x2480 [ 961.951299][T28085] ? shmem_getpage+0xa0/0xa0 [ 961.955713][T28085] ? __kasan_check_write+0x14/0x20 [ 961.960663][T28085] ? __set_page_dirty_no_writeback+0xf1/0x120 [ 961.966563][T28085] shmem_fallocate+0x9a5/0xe90 [ 961.971161][T28085] ? sched_clock+0x3a/0x40 [ 961.975420][T28085] ? shmem_mmap+0x270/0x270 [ 961.979765][T28085] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 961.985778][T28085] ? vfs_fallocate+0x308/0x570 [ 961.990347][T28085] ? file_start_write+0xc7/0x180 [ 961.995214][T28085] ? file_start_write+0xce/0x180 [ 962.000068][T28085] vfs_fallocate+0x492/0x570 [ 962.004578][T28085] do_vfs_ioctl+0x1686/0x1a30 [ 962.009187][T28085] ? ioctl_has_perm+0x3f0/0x560 [ 962.013862][T28085] ? sched_clock+0x3a/0x40 [ 962.018211][T28085] ? __x32_compat_sys_ioctl+0x90/0x90 [ 962.023413][T28085] ? has_cap_mac_admin+0x3c0/0x3c0 [ 962.028370][T28085] ? __irq_exit_rcu+0x40/0x150 [ 962.032963][T28085] ? selinux_file_ioctl+0x3cc/0x540 [ 962.037992][T28085] ? selinux_file_alloc_security+0x120/0x120 [ 962.043804][T28085] ? __fget_files+0x31e/0x380 [ 962.048321][T28085] ? security_file_ioctl+0x84/0xb0 [ 962.053266][T28085] __se_sys_ioctl+0x99/0x190 [ 962.057693][T28085] __x64_sys_ioctl+0x7b/0x90 [ 962.062118][T28085] do_syscall_64+0x34/0x70 [ 962.066372][T28085] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 962.072101][T28085] RIP: 0033:0x7f4759128719 [ 962.076351][T28085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 962.095929][T28085] RSP: 002b:00007f4757da1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 962.104330][T28085] RAX: ffffffffffffffda RBX: 00007f47592dff80 RCX: 00007f4759128719 [ 962.112077][T28085] RDX: 0000000020000040 RSI: 000000004030582a RDI: 0000000000000007 [ 962.119871][T28085] RBP: 00007f4757da1090 R08: 0000000000000000 R09: 0000000000000000 [ 962.127693][T28085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 962.135498][T28085] R13: 0000000000000000 R14: 00007f47592dff80 R15: 00007ffc4ed03c68 [ 962.260381][T28104] device pim6reg1 entered promiscuous mode [ 962.401243][T28115] FAULT_INJECTION: forcing a failure. [ 962.401243][T28115] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 962.414249][T28115] CPU: 1 PID: 28115 Comm: syz.6.10352 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 962.425610][T28115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 962.435500][T28115] Call Trace: [ 962.438637][T28115] dump_stack_lvl+0x1e2/0x24b [ 962.443143][T28115] ? bfq_pos_tree_add_move+0x43b/0x43b [ 962.448443][T28115] ? shmem_getpage_gfp+0x2230/0x2480 [ 962.453743][T28115] dump_stack+0x15/0x17 [ 962.457728][T28115] should_fail+0x3c6/0x510 [ 962.461984][T28115] should_fail_usercopy+0x1a/0x20 [ 962.466852][T28115] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 962.472748][T28115] ? shmem_getpage+0xa0/0xa0 [ 962.477167][T28115] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 962.482985][T28115] ? memzero_page+0x100/0x100 [ 962.487504][T28115] generic_perform_write+0x34c/0x570 [ 962.492621][T28115] ? grab_cache_page_write_begin+0xa0/0xa0 [ 962.498346][T28115] ? file_remove_privs+0x570/0x570 [ 962.503290][T28115] ? __kasan_check_write+0x14/0x20 [ 962.508252][T28115] __generic_file_write_iter+0x23c/0x560 [ 962.513705][T28115] ? generic_write_checks+0x3b9/0x470 [ 962.519014][T28115] generic_file_write_iter+0xaf/0x1c0 [ 962.524220][T28115] vfs_write+0xb4c/0xe70 [ 962.528302][T28115] ? kernel_write+0x3d0/0x3d0 [ 962.532810][T28115] ? mutex_trylock+0xa0/0xa0 [ 962.537240][T28115] ? __fdget_pos+0x2e7/0x3a0 [ 962.541660][T28115] ? ksys_write+0x77/0x2c0 [ 962.545917][T28115] ksys_write+0x199/0x2c0 [ 962.550179][T28115] ? __ia32_sys_read+0x90/0x90 [ 962.554961][T28115] ? debug_smp_processor_id+0x17/0x20 [ 962.560144][T28115] __x64_sys_write+0x7b/0x90 [ 962.564563][T28115] do_syscall_64+0x34/0x70 [ 962.568820][T28115] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 962.574542][T28115] RIP: 0033:0x7f4759128719 [ 962.578799][T28115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 962.598419][T28115] RSP: 002b:00007f4757da1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 962.606667][T28115] RAX: ffffffffffffffda RBX: 00007f47592dff80 RCX: 00007f4759128719 [ 962.614482][T28115] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 962.622290][T28115] RBP: 00007f4757da1090 R08: 0000000000000000 R09: 0000000000000000 [ 962.630096][T28115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 962.637906][T28115] R13: 0000000000000000 R14: 00007f47592dff80 R15: 00007ffc4ed03c68 [ 962.661238][T28120] device veth0_vlan left promiscuous mode [ 962.667575][T28120] device veth0_vlan entered promiscuous mode [ 962.692158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 962.702706][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 962.753683][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 963.264365][T28150] device veth0_vlan left promiscuous mode [ 963.301227][T28150] device veth0_vlan entered promiscuous mode [ 963.344024][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 963.355160][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 963.371315][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 963.856515][T28166] device syzkaller0 entered promiscuous mode [ 964.994077][T28219] FAULT_INJECTION: forcing a failure. [ 964.994077][T28219] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 965.070720][T28219] CPU: 1 PID: 28219 Comm: syz.0.10393 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 965.081999][T28219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 965.091885][T28219] Call Trace: [ 965.095026][T28219] dump_stack_lvl+0x1e2/0x24b [ 965.099527][T28219] ? panic+0x812/0x812 [ 965.103706][T28219] ? bfq_pos_tree_add_move+0x43b/0x43b [ 965.108989][T28219] ? vsnprintf+0x1b96/0x1c70 [ 965.113435][T28219] dump_stack+0x15/0x17 [ 965.117413][T28219] should_fail+0x3c6/0x510 [ 965.121765][T28219] should_fail_usercopy+0x1a/0x20 [ 965.126607][T28219] _copy_to_user+0x20/0x90 [ 965.130951][T28219] bpf_verifier_vlog+0x1ab/0x330 [ 965.135727][T28219] __btf_verifier_log+0xd1/0x120 [ 965.140496][T28219] ? bpf_verifier_vlog+0x1b8/0x330 [ 965.145447][T28219] ? btf_check_sec_info+0x4f0/0x4f0 [ 965.150477][T28219] ? btf_parse_hdr+0x1d5/0x770 [ 965.155082][T28219] ? memcpy+0x56/0x70 [ 965.158899][T28219] btf_parse_hdr+0x450/0x770 [ 965.163323][T28219] btf_new_fd+0x487/0x9c0 [ 965.167496][T28219] __se_sys_bpf+0x1aed/0x11cb0 [ 965.172175][T28219] ? stack_trace_save+0x113/0x1c0 [ 965.177033][T28219] ? terminate_walk+0x407/0x4f0 [ 965.181724][T28219] ? stack_trace_snprint+0xf0/0xf0 [ 965.186674][T28219] ? kmem_cache_free+0xa9/0x1e0 [ 965.191357][T28219] ? kmem_cache_free+0xa9/0x1e0 [ 965.196040][T28219] ? kasan_set_track+0x5d/0x70 [ 965.200638][T28219] ? __x64_sys_bpf+0x90/0x90 [ 965.205076][T28219] ? __kasan_slab_free+0x11/0x20 [ 965.209850][T28219] ? slab_free_freelist_hook+0xc0/0x190 [ 965.215223][T28219] ? kmem_cache_free+0xa9/0x1e0 [ 965.219909][T28219] ? putname+0xe7/0x140 [ 965.223911][T28219] ? do_sys_openat2+0x1fc/0x710 [ 965.228590][T28219] ? __x64_sys_openat+0x243/0x290 [ 965.233454][T28219] ? do_syscall_64+0x34/0x70 [ 965.237882][T28219] ? _kstrtoull+0x3a0/0x4a0 [ 965.242222][T28219] ? kstrtouint_from_user+0x20a/0x2a0 [ 965.247514][T28219] ? kstrtol_from_user+0x310/0x310 [ 965.252459][T28219] ? memset+0x35/0x40 [ 965.256279][T28219] ? __fsnotify_parent+0x4b9/0x6c0 [ 965.261233][T28219] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 965.267647][T28219] ? proc_fail_nth_write+0x20b/0x290 [ 965.272784][T28219] ? proc_fail_nth_read+0x210/0x210 [ 965.277808][T28219] ? security_file_permission+0x86/0xb0 [ 965.283182][T28219] ? rw_verify_area+0x1c3/0x360 [ 965.287880][T28219] ? preempt_count_add+0x92/0x1a0 [ 965.292741][T28219] ? vfs_write+0x852/0xe70 [ 965.296985][T28219] ? kmem_cache_free+0x1c0/0x1e0 [ 965.301760][T28219] ? kernel_write+0x3d0/0x3d0 [ 965.306532][T28219] ? __kasan_check_write+0x14/0x20 [ 965.311474][T28219] ? mutex_lock+0xa5/0x110 [ 965.315729][T28219] ? mutex_trylock+0xa0/0xa0 [ 965.320158][T28219] ? __kasan_check_write+0x14/0x20 [ 965.325106][T28219] ? fput_many+0x160/0x1b0 [ 965.329367][T28219] ? debug_smp_processor_id+0x17/0x20 [ 965.334565][T28219] __x64_sys_bpf+0x7b/0x90 [ 965.338818][T28219] do_syscall_64+0x34/0x70 [ 965.343083][T28219] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 965.348807][T28219] RIP: 0033:0x7ff6e69b4719 [ 965.353050][T28219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 965.372490][T28219] RSP: 002b:00007ff6e562d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 965.380734][T28219] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b4719 [ 965.388543][T28219] RDX: 0000000000000028 RSI: 0000000020000580 RDI: 0000000000000012 [ 965.396352][T28219] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 965.404167][T28219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 965.411977][T28219] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 965.661496][T28234] bridge0: port 2(bridge_slave_1) entered disabled state [ 965.668520][T28234] bridge0: port 1(bridge_slave_0) entered disabled state [ 966.011228][T28246] FAULT_INJECTION: forcing a failure. [ 966.011228][T28246] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 966.069168][T28248] FAULT_INJECTION: forcing a failure. [ 966.069168][T28248] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 966.085954][T28246] CPU: 0 PID: 28246 Comm: syz.6.10404 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 966.097224][T28246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 966.107124][T28246] Call Trace: [ 966.110260][T28246] dump_stack_lvl+0x1e2/0x24b [ 966.114804][T28246] ? bfq_pos_tree_add_move+0x43b/0x43b [ 966.120062][T28246] ? __alloc_skb+0x37c/0x510 [ 966.124486][T28246] dump_stack+0x15/0x17 [ 966.128473][T28246] should_fail+0x3c6/0x510 [ 966.132726][T28246] should_fail_usercopy+0x1a/0x20 [ 966.137585][T28246] _copy_from_iter+0x22c/0xd10 [ 966.142191][T28246] ? sock_alloc_send_pskb+0x936/0xa50 [ 966.147397][T28246] ? copyout_mc+0x90/0x90 [ 966.151564][T28246] ? __check_object_size+0x2e6/0x3c0 [ 966.156684][T28246] skb_copy_datagram_from_iter+0x100/0x6d0 [ 966.162328][T28246] tun_get_user+0x1904/0x38f0 [ 966.166840][T28246] ? kmem_cache_free+0xa9/0x1e0 [ 966.171523][T28246] ? do_sys_openat2+0x1fc/0x710 [ 966.176212][T28246] ? _kstrtoull+0x3a0/0x4a0 [ 966.180551][T28246] ? tun_do_read+0x1f60/0x1f60 [ 966.185235][T28246] ? kstrtouint_from_user+0x20a/0x2a0 [ 966.190445][T28246] ? kstrtol_from_user+0x310/0x310 [ 966.195393][T28246] ? avc_policy_seqno+0x1b/0x70 [ 966.200076][T28246] ? selinux_file_permission+0x2bb/0x560 [ 966.205547][T28246] ? fsnotify_perm+0x67/0x4e0 [ 966.210066][T28246] tun_chr_write_iter+0x1a8/0x250 [ 966.214925][T28246] vfs_write+0xb4c/0xe70 [ 966.219000][T28246] ? kernel_write+0x3d0/0x3d0 [ 966.223594][T28246] ? __fdget_pos+0x209/0x3a0 [ 966.228019][T28246] ? ksys_write+0x77/0x2c0 [ 966.232270][T28246] ksys_write+0x199/0x2c0 [ 966.236528][T28246] ? __ia32_sys_read+0x90/0x90 [ 966.241149][T28246] ? debug_smp_processor_id+0x17/0x20 [ 966.246341][T28246] __x64_sys_write+0x7b/0x90 [ 966.250770][T28246] do_syscall_64+0x34/0x70 [ 966.255021][T28246] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 966.260751][T28246] RIP: 0033:0x7f4759128719 [ 966.264999][T28246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 966.284753][T28246] RSP: 002b:00007f4757da1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 966.292990][T28246] RAX: ffffffffffffffda RBX: 00007f47592dff80 RCX: 00007f4759128719 [ 966.300809][T28246] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 966.308614][T28246] RBP: 00007f4757da1090 R08: 0000000000000000 R09: 0000000000000000 [ 966.316422][T28246] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 966.324328][T28246] R13: 0000000000000000 R14: 00007f47592dff80 R15: 00007ffc4ed03c68 [ 966.332178][T28248] CPU: 1 PID: 28248 Comm: syz.7.10405 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 966.343532][T28248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 966.353744][T28248] Call Trace: [ 966.356877][T28248] dump_stack_lvl+0x1e2/0x24b [ 966.361398][T28248] ? bfq_pos_tree_add_move+0x43b/0x43b [ 966.366677][T28248] dump_stack+0x15/0x17 [ 966.370665][T28248] should_fail+0x3c6/0x510 [ 966.374928][T28248] should_fail_alloc_page+0x52/0x60 [ 966.379954][T28248] __alloc_pages_nodemask+0x1b3/0xaf0 [ 966.385150][T28248] ? sched_clock+0x3a/0x40 [ 966.389420][T28248] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 966.394799][T28248] ? pcpu_block_update_hint_alloc+0x8f0/0xcf0 [ 966.400717][T28248] pcpu_populate_chunk+0x190/0xe10 [ 966.405659][T28248] pcpu_alloc+0xa81/0x1420 [ 966.409900][T28248] __alloc_percpu_gfp+0x27/0x30 [ 966.414583][T28248] array_map_alloc+0x486/0x7c0 [ 966.419199][T28248] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 966.424648][T28248] ? selinux_bpf+0xcb/0x100 [ 966.429000][T28248] ? array_map_alloc_check+0x27b/0x350 [ 966.434292][T28248] __se_sys_bpf+0x620f/0x11cb0 [ 966.438883][T28248] ? stack_trace_save+0x113/0x1c0 [ 966.443741][T28248] ? terminate_walk+0x407/0x4f0 [ 966.448431][T28248] ? stack_trace_snprint+0xf0/0xf0 [ 966.453377][T28248] ? kmem_cache_free+0xa9/0x1e0 [ 966.458068][T28248] ? kmem_cache_free+0xa9/0x1e0 [ 966.462782][T28248] ? kasan_set_track+0x5d/0x70 [ 966.467357][T28248] ? __x64_sys_bpf+0x90/0x90 [ 966.471850][T28248] ? __kasan_slab_free+0x11/0x20 [ 966.476626][T28248] ? slab_free_freelist_hook+0xc0/0x190 [ 966.482009][T28248] ? kmem_cache_free+0xa9/0x1e0 [ 966.486697][T28248] ? putname+0xe7/0x140 [ 966.490682][T28248] ? do_sys_openat2+0x1fc/0x710 [ 966.495368][T28248] ? __x64_sys_openat+0x243/0x290 [ 966.500230][T28248] ? do_syscall_64+0x34/0x70 [ 966.504661][T28248] ? _kstrtoull+0x3a0/0x4a0 [ 966.508999][T28248] ? kstrtouint_from_user+0x20a/0x2a0 [ 966.514207][T28248] ? kstrtol_from_user+0x310/0x310 [ 966.519159][T28248] ? memset+0x35/0x40 [ 966.522975][T28248] ? __fsnotify_parent+0x4b9/0x6c0 [ 966.527924][T28248] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 966.534341][T28248] ? proc_fail_nth_write+0x20b/0x290 [ 966.539462][T28248] ? proc_fail_nth_read+0x210/0x210 [ 966.544496][T28248] ? security_file_permission+0x86/0xb0 [ 966.549877][T28248] ? rw_verify_area+0x1c3/0x360 [ 966.554566][T28248] ? preempt_count_add+0x92/0x1a0 [ 966.559425][T28248] ? vfs_write+0x852/0xe70 [ 966.563681][T28248] ? kmem_cache_free+0x1c0/0x1e0 [ 966.568451][T28248] ? kernel_write+0x3d0/0x3d0 [ 966.572963][T28248] ? __kasan_check_write+0x14/0x20 [ 966.577909][T28248] ? mutex_lock+0xa5/0x110 [ 966.582163][T28248] ? mutex_trylock+0xa0/0xa0 [ 966.586593][T28248] ? __kasan_check_write+0x14/0x20 [ 966.591536][T28248] ? fput_many+0x160/0x1b0 [ 966.595800][T28248] ? debug_smp_processor_id+0x17/0x20 [ 966.601001][T28248] __x64_sys_bpf+0x7b/0x90 [ 966.605251][T28248] do_syscall_64+0x34/0x70 [ 966.609505][T28248] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 966.615244][T28248] RIP: 0033:0x7ff909198719 [ 966.619495][T28248] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 966.639016][T28248] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 966.647351][T28248] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 966.655160][T28248] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 966.662975][T28248] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 966.670782][T28248] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 966.678596][T28248] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 966.938756][T28273] device syzkaller0 entered promiscuous mode [ 968.325435][T28303] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 968.398661][T28303] device syzkaller0 entered promiscuous mode [ 969.667305][T28316] FAULT_INJECTION: forcing a failure. [ 969.667305][T28316] name failslab, interval 1, probability 0, space 0, times 0 [ 969.699547][T28316] CPU: 1 PID: 28316 Comm: syz.8.10432 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 969.710833][T28316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 969.720709][T28316] Call Trace: [ 969.723850][T28316] dump_stack_lvl+0x1e2/0x24b [ 969.728373][T28316] ? bfq_pos_tree_add_move+0x43b/0x43b [ 969.733741][T28316] dump_stack+0x15/0x17 [ 969.737732][T28316] should_fail+0x3c6/0x510 [ 969.741983][T28316] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 969.747272][T28316] __should_failslab+0xa4/0xe0 [ 969.752002][T28316] should_failslab+0x9/0x20 [ 969.756342][T28316] __kmalloc_track_caller+0x5f/0x320 [ 969.761454][T28316] ? kmem_cache_alloc+0x168/0x2e0 [ 969.766315][T28316] ? __alloc_skb+0x80/0x510 [ 969.770668][T28316] ? rtmsg_ifinfo_build_skb+0x7f/0x180 [ 969.775963][T28316] __alloc_skb+0xbc/0x510 [ 969.780293][T28316] ? if_nlmsg_size+0x59c/0x5f0 [ 969.784888][T28316] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 969.790009][T28316] rtnetlink_event+0xf3/0x1b0 [ 969.794538][T28316] raw_notifier_call_chain+0x8c/0xf0 [ 969.799636][T28316] dev_set_mac_address+0x325/0x470 [ 969.804581][T28316] ? dev_pre_changeaddr_notify+0x220/0x220 [ 969.810254][T28316] dev_set_mac_address_user+0x31/0x50 [ 969.815437][T28316] dev_ifsioc+0x657/0xae0 [ 969.819601][T28316] ? dev_ioctl+0xb40/0xb40 [ 969.823873][T28316] ? dev_get_by_name_rcu+0xc5/0xf0 [ 969.828811][T28316] dev_ioctl+0x526/0xb40 [ 969.832886][T28316] sock_do_ioctl+0x295/0x3a0 [ 969.837313][T28316] ? sock_show_fdinfo+0xa0/0xa0 [ 969.841995][T28316] ? kernel_write+0x3d0/0x3d0 [ 969.846519][T28316] ? selinux_file_ioctl+0x3cc/0x540 [ 969.851546][T28316] sock_ioctl+0x4a6/0x760 [ 969.855709][T28316] ? sock_poll+0x340/0x340 [ 969.859969][T28316] ? security_file_ioctl+0x84/0xb0 [ 969.864903][T28316] ? sock_poll+0x340/0x340 [ 969.869160][T28316] __se_sys_ioctl+0x114/0x190 [ 969.873672][T28316] __x64_sys_ioctl+0x7b/0x90 [ 969.878097][T28316] do_syscall_64+0x34/0x70 [ 969.882354][T28316] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 969.888193][T28316] RIP: 0033:0x7f05927a7719 [ 969.892461][T28316] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 969.911979][T28316] RSP: 002b:00007f0591420038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 969.920211][T28316] RAX: ffffffffffffffda RBX: 00007f059295ef80 RCX: 00007f05927a7719 [ 969.928020][T28316] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 969.935936][T28316] RBP: 00007f0591420090 R08: 0000000000000000 R09: 0000000000000000 [ 969.943845][T28316] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 969.951656][T28316] R13: 0000000000000000 R14: 00007f059295ef80 R15: 00007ffda6ea0db8 [ 970.847624][T28339] device wg2 left promiscuous mode [ 970.938638][T28341] device wg2 entered promiscuous mode [ 973.104638][T28448] device pim6reg1 entered promiscuous mode [ 973.822440][T28472] device pim6reg1 entered promiscuous mode [ 973.997037][T28478] device pim6reg1 entered promiscuous mode [ 974.795168][T28517] syz.7.10513[28517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 974.795266][T28517] syz.7.10513[28517] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 974.941783][T28525] FAULT_INJECTION: forcing a failure. [ 974.941783][T28525] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 974.972012][T28525] CPU: 1 PID: 28525 Comm: syz.0.10517 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 974.983279][T28525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 974.993255][T28525] Call Trace: [ 974.996394][T28525] dump_stack_lvl+0x1e2/0x24b [ 975.000945][T28525] ? bfq_pos_tree_add_move+0x43b/0x43b [ 975.006199][T28525] dump_stack+0x15/0x17 [ 975.010186][T28525] should_fail+0x3c6/0x510 [ 975.014438][T28525] should_fail_usercopy+0x1a/0x20 [ 975.019296][T28525] _copy_to_user+0x20/0x90 [ 975.023551][T28525] simple_read_from_buffer+0xc7/0x150 [ 975.028757][T28525] proc_fail_nth_read+0x1a3/0x210 [ 975.033620][T28525] ? proc_fault_inject_write+0x390/0x390 [ 975.039085][T28525] ? security_file_permission+0x86/0xb0 [ 975.044468][T28525] ? rw_verify_area+0x1c3/0x360 [ 975.049153][T28525] ? proc_fault_inject_write+0x390/0x390 [ 975.054620][T28525] vfs_read+0x200/0xba0 [ 975.058616][T28525] ? __fd_install+0x11e/0x220 [ 975.063129][T28525] ? kernel_read+0x70/0x70 [ 975.067387][T28525] ? __kasan_check_write+0x14/0x20 [ 975.072486][T28525] ? mutex_lock+0xa5/0x110 [ 975.076730][T28525] ? mutex_trylock+0xa0/0xa0 [ 975.081144][T28525] ? __fdget_pos+0x2e7/0x3a0 [ 975.085577][T28525] ? ksys_read+0x77/0x2c0 [ 975.089745][T28525] ksys_read+0x199/0x2c0 [ 975.093815][T28525] ? bpf_trace_run1+0x210/0x210 [ 975.098502][T28525] ? vfs_write+0xe70/0xe70 [ 975.102758][T28525] ? __bpf_trace_sys_enter+0x62/0x70 [ 975.107875][T28525] __x64_sys_read+0x7b/0x90 [ 975.112210][T28525] do_syscall_64+0x34/0x70 [ 975.116466][T28525] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 975.122199][T28525] RIP: 0033:0x7ff6e69b315c [ 975.126448][T28525] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 975.145900][T28525] RSP: 002b:00007ff6e562d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 975.154129][T28525] RAX: ffffffffffffffda RBX: 00007ff6e6b6bf80 RCX: 00007ff6e69b315c [ 975.161939][T28525] RDX: 000000000000000f RSI: 00007ff6e562d0a0 RDI: 0000000000000007 [ 975.169750][T28525] RBP: 00007ff6e562d090 R08: 0000000000000000 R09: 0000000000000000 [ 975.177561][T28525] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 975.185373][T28525] R13: 0000000000000000 R14: 00007ff6e6b6bf80 R15: 00007ffd63ca0c48 [ 975.326554][T28554] device pim6reg1 entered promiscuous mode [ 975.504948][T28561] device syzkaller0 entered promiscuous mode [ 975.530555][T28572] FAULT_INJECTION: forcing a failure. [ 975.530555][T28572] name failslab, interval 1, probability 0, space 0, times 0 [ 975.549720][T28572] CPU: 1 PID: 28572 Comm: syz.5.10529 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 975.561091][T28572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 975.570980][T28572] Call Trace: [ 975.574117][T28572] dump_stack_lvl+0x1e2/0x24b [ 975.578632][T28572] ? bfq_pos_tree_add_move+0x43b/0x43b [ 975.583929][T28572] ? pcpu_memcg_post_alloc_hook+0x1c8/0x360 [ 975.589653][T28572] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 975.596157][T28572] ? find_next_bit+0xc7/0x100 [ 975.600669][T28572] dump_stack+0x15/0x17 [ 975.604657][T28572] should_fail+0x3c6/0x510 [ 975.608939][T28572] ? kvmalloc_node+0x82/0x130 [ 975.613427][T28572] __should_failslab+0xa4/0xe0 [ 975.618029][T28572] should_failslab+0x9/0x20 [ 975.622365][T28572] __kmalloc+0x60/0x330 [ 975.626364][T28572] kvmalloc_node+0x82/0x130 [ 975.630699][T28572] pfifo_fast_init+0x110/0x7a0 [ 975.635302][T28572] qdisc_create_dflt+0x138/0x3d0 [ 975.640073][T28572] ? _raw_spin_lock+0xa4/0x1b0 [ 975.644676][T28572] dev_activate+0x2e0/0x1310 [ 975.649108][T28572] __dev_open+0x3bf/0x4e0 [ 975.653265][T28572] ? dev_open+0x260/0x260 [ 975.657434][T28572] ? _raw_spin_unlock_bh+0x51/0x60 [ 975.662379][T28572] ? dev_set_rx_mode+0x245/0x2e0 [ 975.667153][T28572] ? __kasan_check_read+0x11/0x20 [ 975.672032][T28572] __dev_change_flags+0x1db/0x6e0 [ 975.676877][T28572] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 975.683467][T28572] ? dev_get_flags+0x1e0/0x1e0 [ 975.688072][T28572] ? selinux_capset+0xf0/0xf0 [ 975.692584][T28572] dev_change_flags+0x8c/0x1a0 [ 975.697268][T28572] dev_ifsioc+0x115/0xae0 [ 975.701868][T28572] ? dev_ioctl+0xb40/0xb40 [ 975.706125][T28572] ? dev_get_by_name_rcu+0xc5/0xf0 [ 975.711457][T28572] dev_ioctl+0x526/0xb40 [ 975.716014][T28572] sock_do_ioctl+0x295/0x3a0 [ 975.720440][T28572] ? sock_show_fdinfo+0xa0/0xa0 [ 975.725123][T28572] ? kernel_write+0x3d0/0x3d0 [ 975.729634][T28572] ? selinux_file_ioctl+0x3cc/0x540 [ 975.734665][T28572] sock_ioctl+0x4a6/0x760 [ 975.738828][T28572] ? sock_poll+0x340/0x340 [ 975.743087][T28572] ? security_file_ioctl+0x84/0xb0 [ 975.748026][T28572] ? sock_poll+0x340/0x340 [ 975.752280][T28572] __se_sys_ioctl+0x114/0x190 [ 975.756792][T28572] __x64_sys_ioctl+0x7b/0x90 [ 975.761219][T28572] do_syscall_64+0x34/0x70 [ 975.765476][T28572] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 975.771346][T28572] RIP: 0033:0x7fe68f265719 [ 975.775597][T28572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 975.795471][T28572] RSP: 002b:00007fe68dede038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 975.803717][T28572] RAX: ffffffffffffffda RBX: 00007fe68f41cf80 RCX: 00007fe68f265719 [ 975.811526][T28572] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 975.819337][T28572] RBP: 00007fe68dede090 R08: 0000000000000000 R09: 0000000000000000 [ 975.827148][T28572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 975.834956][T28572] R13: 0000000000000000 R14: 00007fe68f41cf80 R15: 00007ffc72c570e8 [ 975.882859][T28572] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 975.891015][T28572] device pim6reg1 entered promiscuous mode [ 977.461389][T28671] FAULT_INJECTION: forcing a failure. [ 977.461389][T28671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 977.516518][T28671] CPU: 0 PID: 28671 Comm: syz.5.10570 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 977.527798][T28671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 977.537688][T28671] Call Trace: [ 977.540821][T28671] dump_stack_lvl+0x1e2/0x24b [ 977.545340][T28671] ? bfq_pos_tree_add_move+0x43b/0x43b [ 977.550626][T28671] ? kasan_set_track+0x5d/0x70 [ 977.555229][T28671] ? __kasan_slab_free+0x11/0x20 [ 977.560010][T28671] dump_stack+0x15/0x17 [ 977.563993][T28671] should_fail+0x3c6/0x510 [ 977.568251][T28671] should_fail_usercopy+0x1a/0x20 [ 977.573105][T28671] _copy_from_user+0x20/0xd0 [ 977.577526][T28671] iovec_from_user+0xc7/0x330 [ 977.582038][T28671] __import_iovec+0x6d/0x3b0 [ 977.586466][T28671] ? __fsnotify_parent+0x4b9/0x6c0 [ 977.591415][T28671] import_iovec+0xe5/0x120 [ 977.595665][T28671] ___sys_recvmsg+0x56b/0x690 [ 977.600178][T28671] ? __sys_recvmsg+0x270/0x270 [ 977.604788][T28671] ? __fdget+0x1bc/0x240 [ 977.608875][T28671] __x64_sys_recvmsg+0x1ee/0x2c0 [ 977.613649][T28671] ? ___sys_recvmsg+0x690/0x690 [ 977.618416][T28671] ? debug_smp_processor_id+0x17/0x20 [ 977.623936][T28671] do_syscall_64+0x34/0x70 [ 977.628190][T28671] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 977.633905][T28671] RIP: 0033:0x7fe68f265719 [ 977.638158][T28671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 977.657694][T28671] RSP: 002b:00007fe68dede038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 977.665945][T28671] RAX: ffffffffffffffda RBX: 00007fe68f41cf80 RCX: 00007fe68f265719 [ 977.673755][T28671] RDX: 0000000000000000 RSI: 0000000020000900 RDI: 0000000000000005 [ 977.681567][T28671] RBP: 00007fe68dede090 R08: 0000000000000000 R09: 0000000000000000 [ 977.689369][T28671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 977.697181][T28671] R13: 0000000000000000 R14: 00007fe68f41cf80 R15: 00007ffc72c570e8 [ 978.301516][T28708] FAULT_INJECTION: forcing a failure. [ 978.301516][T28708] name failslab, interval 1, probability 0, space 0, times 0 [ 978.456733][T28708] CPU: 0 PID: 28708 Comm: syz.7.10584 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 978.468026][T28708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 978.478002][T28708] Call Trace: [ 978.481152][T28708] dump_stack_lvl+0x1e2/0x24b [ 978.485647][T28708] ? panic+0x812/0x812 [ 978.489547][T28708] ? bfq_pos_tree_add_move+0x43b/0x43b [ 978.494847][T28708] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 978.501443][T28708] dump_stack+0x15/0x17 [ 978.505562][T28708] should_fail+0x3c6/0x510 [ 978.509761][T28708] ? slhc_init+0x77/0x7a0 [ 978.514020][T28708] __should_failslab+0xa4/0xe0 [ 978.518618][T28708] should_failslab+0x9/0x20 [ 978.522951][T28708] kmem_cache_alloc_trace+0x3a/0x2e0 [ 978.528095][T28708] ? __mutex_lock_slowpath+0xe/0x10 [ 978.533119][T28708] slhc_init+0x77/0x7a0 [ 978.537117][T28708] ppp_ioctl+0x12bf/0x1810 [ 978.541355][T28708] ? ppp_poll+0x250/0x250 [ 978.545540][T28708] ? __fget_files+0x31e/0x380 [ 978.550125][T28708] ? security_file_ioctl+0x84/0xb0 [ 978.555146][T28708] ? ppp_poll+0x250/0x250 [ 978.559325][T28708] __se_sys_ioctl+0x114/0x190 [ 978.563830][T28708] __x64_sys_ioctl+0x7b/0x90 [ 978.568256][T28708] do_syscall_64+0x34/0x70 [ 978.572509][T28708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 978.578234][T28708] RIP: 0033:0x7ff909198719 [ 978.582506][T28708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 978.602141][T28708] RSP: 002b:00007ff907df0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 978.610378][T28708] RAX: ffffffffffffffda RBX: 00007ff909350058 RCX: 00007ff909198719 [ 978.618191][T28708] RDX: 000000002000000c RSI: 0000000040047451 RDI: 0000000000000003 [ 978.625999][T28708] RBP: 00007ff907df0090 R08: 0000000000000000 R09: 0000000000000000 [ 978.633806][T28708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 978.641666][T28708] R13: 0000000000000000 R14: 00007ff909350058 R15: 00007ffcc3902458 [ 981.578649][T28859] FAULT_INJECTION: forcing a failure. [ 981.578649][T28859] name failslab, interval 1, probability 0, space 0, times 0 [ 981.688525][T28859] CPU: 0 PID: 28859 Comm: syz.7.10639 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 981.699813][T28859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 981.709775][T28859] Call Trace: [ 981.712910][T28859] dump_stack_lvl+0x1e2/0x24b [ 981.717419][T28859] ? bfq_pos_tree_add_move+0x43b/0x43b [ 981.722712][T28859] ? __kasan_check_read+0x11/0x20 [ 981.727661][T28859] ? preempt_schedule_irq+0xe7/0x140 [ 981.732779][T28859] ? preempt_schedule_notrace+0x140/0x140 [ 981.738335][T28859] dump_stack+0x15/0x17 [ 981.742414][T28859] should_fail+0x3c6/0x510 [ 981.746669][T28859] ? vm_area_dup+0x26/0x270 [ 981.751006][T28859] __should_failslab+0xa4/0xe0 [ 981.755708][T28859] should_failslab+0x9/0x20 [ 981.760046][T28859] kmem_cache_alloc+0x3d/0x2e0 [ 981.764649][T28859] vm_area_dup+0x26/0x270 [ 981.768821][T28859] copy_mm+0x8ac/0x13a0 [ 981.772807][T28859] ? __irq_exit_rcu+0x40/0x150 [ 981.777417][T28859] ? copy_signal+0x610/0x610 [ 981.781832][T28859] ? __init_rwsem+0xd6/0x1c0 [ 981.786384][T28859] ? copy_signal+0x4e3/0x610 [ 981.790774][T28859] copy_process+0x1175/0x3340 [ 981.795293][T28859] ? proc_fail_nth_write+0x20b/0x290 [ 981.800412][T28859] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 981.805360][T28859] ? vfs_write+0x852/0xe70 [ 981.809617][T28859] kernel_clone+0x21e/0x9e0 [ 981.813952][T28859] ? kvm_sched_clock_read+0x18/0x40 [ 981.818982][T28859] ? create_io_thread+0x1e0/0x1e0 [ 981.823839][T28859] ? sched_clock+0x3a/0x40 [ 981.828102][T28859] __x64_sys_clone+0x23f/0x290 [ 981.832691][T28859] ? __do_sys_vfork+0x130/0x130 [ 981.837398][T28859] ? syscall_enter_from_user_mode+0x1d/0x1a0 [ 981.843207][T28859] do_syscall_64+0x34/0x70 [ 981.847450][T28859] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 981.853258][T28859] RIP: 0033:0x7ff909198719 [ 981.857522][T28859] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 981.876953][T28859] RSP: 002b:00007ff907e10fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 981.885221][T28859] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 981.893273][T28859] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c000000 [ 981.901082][T28859] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 981.909162][T28859] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 981.917326][T28859] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458 [ 982.270984][T28876] FAULT_INJECTION: forcing a failure. [ 982.270984][T28876] name failslab, interval 1, probability 0, space 0, times 0 [ 982.479201][T28876] CPU: 0 PID: 28876 Comm: syz.6.10646 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 982.490488][T28876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 982.500370][T28876] Call Trace: [ 982.503508][T28876] dump_stack_lvl+0x1e2/0x24b [ 982.508023][T28876] ? panic+0x812/0x812 [ 982.511919][T28876] ? bfq_pos_tree_add_move+0x43b/0x43b [ 982.517215][T28876] dump_stack+0x15/0x17 [ 982.521201][T28876] should_fail+0x3c6/0x510 [ 982.525458][T28876] ? __se_sys_bpf+0x5b94/0x11cb0 [ 982.530228][T28876] __should_failslab+0xa4/0xe0 [ 982.534833][T28876] should_failslab+0x9/0x20 [ 982.539165][T28876] __kmalloc_track_caller+0x5f/0x320 [ 982.544286][T28876] memdup_user+0x25/0xb0 [ 982.548364][T28876] __se_sys_bpf+0x5b94/0x11cb0 [ 982.552965][T28876] ? stack_trace_save+0x113/0x1c0 [ 982.557825][T28876] ? terminate_walk+0x407/0x4f0 [ 982.562510][T28876] ? stack_trace_snprint+0xf0/0xf0 [ 982.567459][T28876] ? kmem_cache_free+0xa9/0x1e0 [ 982.572143][T28876] ? kmem_cache_free+0xa9/0x1e0 [ 982.576831][T28876] ? kasan_set_track+0x5d/0x70 [ 982.581431][T28876] ? __x64_sys_bpf+0x90/0x90 [ 982.585855][T28876] ? __kasan_slab_free+0x11/0x20 [ 982.590628][T28876] ? slab_free_freelist_hook+0xc0/0x190 [ 982.596023][T28876] ? kmem_cache_free+0xa9/0x1e0 [ 982.600697][T28876] ? putname+0xe7/0x140 [ 982.604783][T28876] ? do_sys_openat2+0x1fc/0x710 [ 982.609471][T28876] ? __x64_sys_openat+0x243/0x290 [ 982.614328][T28876] ? do_syscall_64+0x34/0x70 [ 982.618752][T28876] ? _kstrtoull+0x3a0/0x4a0 [ 982.623104][T28876] ? kstrtouint_from_user+0x20a/0x2a0 [ 982.628300][T28876] ? kstrtol_from_user+0x310/0x310 [ 982.633250][T28876] ? memset+0x35/0x40 [ 982.637067][T28876] ? __fsnotify_parent+0x4b9/0x6c0 [ 982.642016][T28876] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 982.648435][T28876] ? proc_fail_nth_write+0x20b/0x290 [ 982.653581][T28876] ? proc_fail_nth_read+0x210/0x210 [ 982.658593][T28876] ? security_file_permission+0x86/0xb0 [ 982.663971][T28876] ? rw_verify_area+0x1c3/0x360 [ 982.668658][T28876] ? preempt_count_add+0x92/0x1a0 [ 982.673520][T28876] ? vfs_write+0x852/0xe70 [ 982.677773][T28876] ? kmem_cache_free+0xa9/0x1e0 [ 982.682458][T28876] ? kernel_write+0x3d0/0x3d0 [ 982.686971][T28876] ? __kasan_check_write+0x14/0x20 [ 982.691915][T28876] ? mutex_lock+0xa5/0x110 [ 982.696170][T28876] ? mutex_trylock+0xa0/0xa0 [ 982.700598][T28876] ? __kasan_check_write+0x14/0x20 [ 982.705545][T28876] ? fput_many+0x160/0x1b0 [ 982.709807][T28876] ? debug_smp_processor_id+0x17/0x20 [ 982.715005][T28876] __x64_sys_bpf+0x7b/0x90 [ 982.719257][T28876] do_syscall_64+0x34/0x70 [ 982.723524][T28876] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 982.729240][T28876] RIP: 0033:0x7f4759128719 [ 982.733493][T28876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 982.752934][T28876] RSP: 002b:00007f4757da1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 982.761175][T28876] RAX: ffffffffffffffda RBX: 00007f47592dff80 RCX: 00007f4759128719 [ 982.768986][T28876] RDX: 0000000000000020 RSI: 0000000020000300 RDI: 0000000000000001 [ 982.776796][T28876] RBP: 00007f4757da1090 R08: 0000000000000000 R09: 0000000000000000 [ 982.784607][T28876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 982.792418][T28876] R13: 0000000000000000 R14: 00007f47592dff80 R15: 00007ffc4ed03c68 [ 984.498123][T28938] device wg2 left promiscuous mode [ 985.107573][T28965] device pim6reg1 entered promiscuous mode [ 985.291599][T28966] device syzkaller0 entered promiscuous mode [ 985.594677][T28973] device veth0_vlan left promiscuous mode [ 985.603570][T28973] device veth0_vlan entered promiscuous mode [ 986.568565][T29000] device veth1_macvtap left promiscuous mode [ 986.615959][T29000] device macsec0 left promiscuous mode [ 986.772671][T29003] device veth1_macvtap entered promiscuous mode [ 986.778904][T29003] device macsec0 entered promiscuous mode [ 988.011976][T29029] device syzkaller0 entered promiscuous mode [ 988.363469][T29052] FAULT_INJECTION: forcing a failure. [ 988.363469][T29052] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 988.378521][T29052] CPU: 0 PID: 29052 Comm: syz.8.10709 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 988.389800][T29052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 988.399683][T29052] Call Trace: [ 988.402923][T29052] dump_stack_lvl+0x1e2/0x24b [ 988.407426][T29052] ? bfq_pos_tree_add_move+0x43b/0x43b [ 988.412718][T29052] ? avc_has_perm+0x275/0x400 [ 988.417236][T29052] dump_stack+0x15/0x17 [ 988.421221][T29052] should_fail+0x3c6/0x510 [ 988.425479][T29052] should_fail_usercopy+0x1a/0x20 [ 988.430340][T29052] copy_page_from_iter+0x398/0x6e0 [ 988.435374][T29052] pipe_write+0x92b/0x18c0 [ 988.439634][T29052] ? pipe_read+0x1040/0x1040 [ 988.444050][T29052] ? fsnotify_perm+0x67/0x4e0 [ 988.448563][T29052] ? security_file_permission+0x7b/0xb0 [ 988.454034][T29052] ? security_file_permission+0x86/0xb0 [ 988.459623][T29052] ? iov_iter_init+0x3f/0x120 [ 988.464131][T29052] vfs_write+0xb4c/0xe70 [ 988.468214][T29052] ? kernel_write+0x3d0/0x3d0 [ 988.472730][T29052] ? __fdget_pos+0x209/0x3a0 [ 988.477147][T29052] ? ksys_write+0x77/0x2c0 [ 988.481402][T29052] ksys_write+0x199/0x2c0 [ 988.485572][T29052] ? __ia32_sys_read+0x90/0x90 [ 988.490170][T29052] ? debug_smp_processor_id+0x17/0x20 [ 988.495378][T29052] __x64_sys_write+0x7b/0x90 [ 988.499802][T29052] do_syscall_64+0x34/0x70 [ 988.504052][T29052] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 988.509782][T29052] RIP: 0033:0x7f05927a7719 [ 988.514037][T29052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 988.533823][T29052] RSP: 002b:00007f0591420038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 988.542069][T29052] RAX: ffffffffffffffda RBX: 00007f059295ef80 RCX: 00007f05927a7719 [ 988.549881][T29052] RDX: 0000000000083000 RSI: 0000000020000040 RDI: 0000000000000000 [ 988.557692][T29052] RBP: 00007f0591420090 R08: 0000000000000000 R09: 0000000000000000 [ 988.565586][T29052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 988.573396][T29052] R13: 0000000000000000 R14: 00007f059295ef80 R15: 00007ffda6ea0db8 [ 988.648378][T29065] FAULT_INJECTION: forcing a failure. [ 988.648378][T29065] name failslab, interval 1, probability 0, space 0, times 0 [ 988.660854][T29065] CPU: 0 PID: 29065 Comm: syz.6.10714 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 988.672070][T29065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 988.681964][T29065] Call Trace: [ 988.685093][T29065] dump_stack_lvl+0x1e2/0x24b [ 988.689596][T29065] ? bfq_pos_tree_add_move+0x43b/0x43b [ 988.694892][T29065] ? unwind_next_frame+0x3cb/0x700 [ 988.699837][T29065] ? fib6_node_lookup+0x438/0x460 [ 988.704714][T29065] dump_stack+0x15/0x17 [ 988.708708][T29065] should_fail+0x3c6/0x510 [ 988.712944][T29065] ? inet_frag_find+0x715/0x19e0 [ 988.717807][T29065] __should_failslab+0xa4/0xe0 [ 988.722405][T29065] should_failslab+0x9/0x20 [ 988.726743][T29065] kmem_cache_alloc+0x3d/0x2e0 [ 988.731344][T29065] inet_frag_find+0x715/0x19e0 [ 988.735940][T29065] ? fib6_nh_age_exceptions+0x870/0x870 [ 988.741326][T29065] ? ip6frag_obj_hashfn+0x30/0x30 [ 988.746190][T29065] ? inet_frag_destroy_rcu+0xc0/0xc0 [ 988.751310][T29065] ? ipv6_frag_rcv+0x967/0x2510 [ 988.755996][T29065] ? __ipv6_addr_type+0x244/0x2f0 [ 988.760856][T29065] ipv6_frag_rcv+0xa64/0x2510 [ 988.765367][T29065] ? ip6t_do_table+0x162c/0x1800 [ 988.770144][T29065] ? jhash2+0x4f0/0x4f0 [ 988.774132][T29065] ? __raw_v6_lookup+0x41c/0x420 [ 988.778911][T29065] ? ip6t_alloc_initial_table+0x630/0x630 [ 988.784465][T29065] ip6_protocol_deliver_rcu+0xa57/0x12f0 [ 988.789934][T29065] ? ip6table_filter_hook+0x69/0x80 [ 988.794985][T29065] ip6_input+0xdc/0x260 [ 988.798975][T29065] ? ip6_protocol_deliver_rcu+0x12f0/0x12f0 [ 988.804684][T29065] ? ip6_input+0x260/0x260 [ 988.808936][T29065] ? ip6table_raw_hook+0x69/0x80 [ 988.813710][T29065] ip6_rcv_finish+0x185/0x350 [ 988.818222][T29065] ipv6_rcv+0xee/0x270 [ 988.822128][T29065] ? ip6_rcv_finish+0x350/0x350 [ 988.826822][T29065] ? refcount_add+0x80/0x80 [ 988.831154][T29065] ? down_read_trylock+0x179/0x1d0 [ 988.836287][T29065] ? kasan_poison+0x5d/0x70 [ 988.841136][T29065] ? __kasan_kmalloc_large+0xad/0xc0 [ 988.846255][T29065] ? __init_rwsem+0x1c0/0x1c0 [ 988.850771][T29065] ? ip6_rcv_finish+0x350/0x350 [ 988.855456][T29065] __netif_receive_skb+0x1c6/0x530 [ 988.860402][T29065] ? __kasan_check_write+0x14/0x20 [ 988.865351][T29065] ? exc_page_fault+0x33d/0x5b0 [ 988.870036][T29065] ? deliver_ptype_list_skb+0x3c0/0x3c0 [ 988.875422][T29065] ? asm_exc_page_fault+0x1e/0x30 [ 988.880280][T29065] ? _copy_from_iter+0x1c1/0xd10 [ 988.885053][T29065] netif_receive_skb+0xb0/0x480 [ 988.889742][T29065] ? _copy_from_iter+0x3e6/0xd10 [ 988.894535][T29065] ? netif_receive_skb_core+0x210/0x210 [ 988.899909][T29065] ? sock_alloc_send_pskb+0x936/0xa50 [ 988.905105][T29065] tun_rx_batched+0x6d9/0x870 [ 988.909634][T29065] ? eth_type_trans+0x2e4/0x620 [ 988.914307][T29065] ? local_bh_enable+0x30/0x30 [ 988.918911][T29065] ? debug_smp_processor_id+0x17/0x20 [ 988.924119][T29065] tun_get_user+0x2bf3/0x38f0 [ 988.928631][T29065] ? sysvec_irq_work+0xc8/0xd0 [ 988.933225][T29065] ? _kstrtoull+0x3a0/0x4a0 [ 988.937562][T29065] ? tun_do_read+0x1f60/0x1f60 [ 988.942159][T29065] ? kstrtouint_from_user+0x20a/0x2a0 [ 988.947371][T29065] ? kstrtol_from_user+0x310/0x310 [ 988.952314][T29065] ? __irq_work_queue_local+0x111/0x180 [ 988.957705][T29065] ? avc_policy_seqno+0x1b/0x70 [ 988.962383][T29065] ? selinux_file_permission+0x2bb/0x560 [ 988.967853][T29065] ? fsnotify_perm+0x67/0x4e0 [ 988.972366][T29065] tun_chr_write_iter+0x1a8/0x250 [ 988.977228][T29065] vfs_write+0xb4c/0xe70 [ 988.981302][T29065] ? putname+0xe7/0x140 [ 988.985296][T29065] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 988.990948][T29065] ? kernel_write+0x3d0/0x3d0 [ 988.995457][T29065] ? __fdget_pos+0x209/0x3a0 [ 988.999877][T29065] ? ksys_write+0x77/0x2c0 [ 989.004131][T29065] ksys_write+0x199/0x2c0 [ 989.008299][T29065] ? __ia32_sys_read+0x90/0x90 [ 989.012902][T29065] ? debug_smp_processor_id+0x17/0x20 [ 989.018106][T29065] __x64_sys_write+0x7b/0x90 [ 989.022531][T29065] do_syscall_64+0x34/0x70 [ 989.026786][T29065] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 989.032510][T29065] RIP: 0033:0x7f4759128719 [ 989.036767][T29065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 989.056202][T29065] RSP: 002b:00007f4757da1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 989.064464][T29065] RAX: ffffffffffffffda RBX: 00007f47592dff80 RCX: 00007f4759128719 [ 989.072276][T29065] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 989.080075][T29065] RBP: 00007f4757da1090 R08: 0000000000000000 R09: 0000000000000000 [ 989.087898][T29065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 989.095711][T29065] R13: 0000000000000000 R14: 00007f47592dff80 R15: 00007ffc4ed03c68 [ 989.234946][T29083] device sit0 entered promiscuous mode [ 989.258232][T29081] device wg2 entered promiscuous mode [ 990.982511][T29154] device syzkaller0 entered promiscuous mode [ 991.202311][T29173] FAULT_INJECTION: forcing a failure. [ 991.202311][T29173] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 991.215352][T29173] CPU: 0 PID: 29173 Comm: syz.5.10752 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 991.226617][T29173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 991.236503][T29173] Call Trace: [ 991.239644][T29173] dump_stack_lvl+0x1e2/0x24b [ 991.244150][T29173] ? bfq_pos_tree_add_move+0x43b/0x43b [ 991.249445][T29173] dump_stack+0x15/0x17 [ 991.253428][T29173] should_fail+0x3c6/0x510 [ 991.257771][T29173] should_fail_usercopy+0x1a/0x20 [ 991.262632][T29173] _copy_to_user+0x20/0x90 [ 991.266888][T29173] simple_read_from_buffer+0xc7/0x150 [ 991.272097][T29173] proc_fail_nth_read+0x1a3/0x210 [ 991.276953][T29173] ? proc_fault_inject_write+0x390/0x390 [ 991.282421][T29173] ? security_file_permission+0x86/0xb0 [ 991.287807][T29173] ? rw_verify_area+0x1c3/0x360 [ 991.292488][T29173] ? proc_fault_inject_write+0x390/0x390 [ 991.297955][T29173] vfs_read+0x200/0xba0 [ 991.301953][T29173] ? kernel_read+0x70/0x70 [ 991.306202][T29173] ? __kasan_check_write+0x14/0x20 [ 991.311151][T29173] ? mutex_lock+0xa5/0x110 [ 991.315398][T29173] ? mutex_trylock+0xa0/0xa0 [ 991.319837][T29173] ? __fdget_pos+0x2e7/0x3a0 [ 991.324251][T29173] ? ksys_read+0x77/0x2c0 [ 991.328421][T29173] ksys_read+0x199/0x2c0 [ 991.332500][T29173] ? vfs_write+0xe70/0xe70 [ 991.336752][T29173] ? debug_smp_processor_id+0x17/0x20 [ 991.341962][T29173] __x64_sys_read+0x7b/0x90 [ 991.346300][T29173] do_syscall_64+0x34/0x70 [ 991.350555][T29173] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 991.356279][T29173] RIP: 0033:0x7fe68f26415c [ 991.360532][T29173] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 991.379973][T29173] RSP: 002b:00007fe68dede030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 991.388217][T29173] RAX: ffffffffffffffda RBX: 00007fe68f41cf80 RCX: 00007fe68f26415c [ 991.396029][T29173] RDX: 000000000000000f RSI: 00007fe68dede0a0 RDI: 0000000000000008 [ 991.403839][T29173] RBP: 00007fe68dede090 R08: 0000000000000000 R09: 0000000000000000 [ 991.411650][T29173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 991.419464][T29173] R13: 0000000000000000 R14: 00007fe68f41cf80 R15: 00007ffc72c570e8 [ 992.134994][T29193] device syzkaller0 entered promiscuous mode [ 992.798104][T29214] FAULT_INJECTION: forcing a failure. [ 992.798104][T29214] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 992.811095][T29214] CPU: 1 PID: 29214 Comm: syz.7.10767 Tainted: G W 5.10.226-syzkaller-00001-g6a01908517df #0 [ 992.822352][T29214] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 992.832244][T29214] Call Trace: [ 992.835402][T29214] dump_stack_lvl+0x1e2/0x24b [ 992.839883][T29214] ? bfq_pos_tree_add_move+0x43b/0x43b [ 992.845172][T29214] ? shmem_getpage_gfp+0x2226/0x2480 [ 992.850298][T29214] dump_stack+0x15/0x17 [ 992.854285][T29214] should_fail+0x3c6/0x510 [ 992.858541][T29214] should_fail_usercopy+0x1a/0x20 [ 992.863419][T29214] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 992.869308][T29214] ? shmem_getpage+0xa0/0xa0 [ 992.873735][T29214] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 992.879460][T29214] ? memzero_page+0x100/0x100 [ 992.883976][T29214] generic_perform_write+0x34c/0x570 [ 992.889120][T29214] ? grab_cache_page_write_begin+0xa0/0xa0 [ 992.894746][T29214] ? file_remove_privs+0x570/0x570 [ 992.899686][T29214] ? __kasan_check_write+0x14/0x20 [ 992.904631][T29214] __generic_file_write_iter+0x23c/0x560 [ 992.910093][T29214] ? generic_write_checks+0x3b9/0x470 [ 992.915306][T29214] generic_file_write_iter+0xaf/0x1c0 [ 992.920515][T29214] vfs_write+0xb4c/0xe70 [ 992.924598][T29214] ? kernel_write+0x3d0/0x3d0 [ 992.929125][T29214] ? mutex_trylock+0xa0/0xa0 [ 992.933535][T29214] ? __fdget_pos+0x2e7/0x3a0 [ 992.937954][T29214] ? ksys_write+0x77/0x2c0 [ 992.942212][T29214] ksys_write+0x199/0x2c0 [ 992.946375][T29214] ? __ia32_sys_read+0x90/0x90 [ 992.950977][T29214] ? debug_smp_processor_id+0x17/0x20 [ 992.956179][T29214] __x64_sys_write+0x7b/0x90 [ 992.960608][T29214] do_syscall_64+0x34/0x70 [ 992.964862][T29214] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 992.970598][T29214] RIP: 0033:0x7ff909198719 [ 992.974840][T29214] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 992.994278][T29214] RSP: 002b:00007ff907e11038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 993.002526][T29214] RAX: ffffffffffffffda RBX: 00007ff90934ff80 RCX: 00007ff909198719 [ 993.010337][T29214] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000006 [ 993.018145][T29214] RBP: 00007ff907e11090 R08: 0000000000000000 R09: 0000000000000000 [ 993.025967][T29214] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 993.033771][T29214] R13: 0000000000000000 R14: 00007ff90934ff80 R15: 00007ffcc3902458