x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x6, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x400000000000004, 0x0, 0x6, 0x1814, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, r1, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x3f, 0x40, 0x7, 0x0, 0x9, 0x124a7c, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x4f0000000, 0x8, 0x2, 0x3ff, 0x7fff, 0x7, 0x0, 0x3ff}, 0x0, 0x1, r2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x795502, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'gretap0\x00', 0x1000}) ioctl$TUNSETOFFLOAD(r4, 0x400454c9, 0x13) socketpair(0x22, 0x6, 0x5, &(0x7f0000000380)) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000240)={'ip6gretap0\x00', 0xe00}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000002c0)=0x3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) sendmsg$inet(r6, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000280), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x18}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'team_slave_1\x00', 0x600}) 23:02:18 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r0 = getpid() syz_clone(0x41840280, &(0x7f00000005c0)="cc99478a2e3b83565599a568958a30b4bd371a6e7516da60868191b8b3783d196ebc6da7f95e5ec6f3571a96c101c9fcc2e908e97f7355b8ff3d9c26c763751d20bf1dc1c126db071769becca6e7867e0604169ef824903fb8b8c59ca4de8f31a4ef69bfe268f993685c81e2b8b72ac5325cb608696cfb24e3811024e9c8007bdbb2c15d7b600486e1f5297673947f9963be86b6321192ad531063be3f58650d24ef84ef074d620dbf430e4839dace3eb67a", 0xb2, &(0x7f0000000500), &(0x7f00000006c0), 0x0) syz_open_procfs$namespace(0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000300)=@raw=[@kfunc, @kfunc, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @jmp={0x5, 0x1, 0x0, 0x0, 0x8, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x3}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000240)='GPL\x00', 0x0, 0x87, &(0x7f0000000380)=""/135, 0x41100, 0x8, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000480)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x8, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)}, 0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x1f, 0xfc, 0x3, 0x0, 0x100000, 0x41220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x8, 0x6, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x100000001}, r0, 0x2, 0xffffffffffffffff, 0x0) r2 = getpid() syz_open_procfs$namespace(r2, 0x0) gettid() syz_open_procfs$namespace(r0, 0x0) 23:02:18 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000033c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000003840)={&(0x7f0000003400)=@hci, 0x80, &(0x7f0000003740)=[{0x0}, {0x0}], 0x2}, 0x0) 23:02:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000780)={&(0x7f0000000680)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0xf}]}}, &(0x7f00000006c0)=""/175, 0x26, 0xaf, 0x1}, 0x20) 23:02:18 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0x1000, &(0x7f0000000700)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xe0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:02:18 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:18 executing program 5: socketpair(0xa, 0x3, 0x8, &(0x7f00000001c0)) 23:02:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001400)={0x11, 0x3, &(0x7f0000000280)=@framed, &(0x7f0000000300)='GPL\x00', 0x1, 0x1000, &(0x7f0000000340)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:02:18 executing program 2: syz_clone(0x0, &(0x7f0000000000)="bc", 0x1, &(0x7f0000000100), 0x0, &(0x7f0000000180)) [ 435.053085][T14343] bridge0: port 3(veth0_to_bond) entered disabled state [ 435.053595][T14343] bridge0: port 2(bridge_slave_1) entered disabled state 23:02:18 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) [ 435.054465][T14343] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.161675][T14353] device veth0_to_bond left promiscuous mode [ 435.161844][T14353] bridge0: port 3(veth0_to_bond) entered disabled state [ 435.178246][T14353] device bridge_slave_1 left promiscuous mode [ 435.178389][T14353] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.187158][T14353] device bridge_slave_0 left promiscuous mode [ 435.187293][T14353] bridge0: port 1(bridge_slave_0) entered disabled state 23:02:18 executing program 1: getpid() r0 = getpid() perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x0, 0x6}, r0, 0x6, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400)=r0, 0x12) syz_clone(0x1000000, &(0x7f0000000440)="9b70621d98d98b3800ed4046197a4e222b35602a251b76836548fd24a52595c6eb6d4aeba5804484d00ca866903aa365aebda52203be49bce2ba63e29c15ac30655937630c40dc5253642e82ee52d1540fab143567c429dadd56858331e769db5b4e7dceb56be4b7a89abda6cc0ac3f093809f26c2db90dbbe1646f7ab9565a78c334bca4d83acc788322edea080e6977b12f00e21af2303ea5dccf611ff3adbfe48fe9eb2e512a51da1db64f4b174a2abe4f76910c6c4e8468e103a2720b88c11ae1afa232687ce067b1fefaba31b88ddabb0bd963109c38f3697585b294e9ed6fa316f7c25410d5cd60a82c51ee05c706b40a9", 0xf4, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="4a4a66f68eceec000105dc44a54061c735d76676bced39897fb7c53c39775c4b6b2d25d751593d09000029768e5a0c2c42e52e32e13803efbe65b761f9460cdd295f923ad4dedc3763634d1c21031cc914492304d5b3e61fd415656a75c104aea91dc01ad506a8fb0b4b4c4d9096e5b686ad749b292f4f87c8e8f0431d262af23a0819f41820e18d7904b6399802c4fdc2d0db1d6cadc56448bfa94d3c77d0c3e24f4011f9854bf747c1d8c3d52b994ef274a3b5c423628e881226") syz_clone(0x43308400, &(0x7f0000000240)="f59b", 0x2, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)="ee5f0db7a94f1c2d322492b72c42ea2b6294ce0c5449738322e7780ff5386e87e234687c4f4aac58133482c8485fed0c1704b0e2ffe129ca39ab73257f4cecdad846181a0b30b2ef122b3c6167f1fe3777d929023ea433d9b11f860d4da3004691f70726c8725b61b0d0c34217432036f1feba0791158921f3393f045b2583") r1 = getpid() getpid() r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x7ff, 0x6, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xd, r2, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x5, 0x3}, r1, 0x5, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(r1, 0x0) 23:02:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/../file0/file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') 23:02:18 executing program 2: socketpair(0xb, 0x0, 0x0, &(0x7f0000000500)) 23:02:18 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:18 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x40, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77fc, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x5}, 0x709a4, 0x0, 0x2, 0x0, 0x5, 0x800002, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000340)='memory.numa_stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x6, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x400000000000004, 0x0, 0x6, 0x1814, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, r1, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x3f, 0x40, 0x7, 0x0, 0x9, 0x124a7c, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x4f0000000, 0x8, 0x2, 0x3ff, 0x7fff, 0x7, 0x0, 0x3ff}, 0x0, 0x1, r2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x795502, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'gretap0\x00', 0x1000}) ioctl$TUNSETOFFLOAD(r4, 0x400454c9, 0x13) socketpair(0x22, 0x6, 0x5, &(0x7f0000000380)) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000240)={'ip6gretap0\x00', 0xe00}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000002c0)=0x3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) sendmsg$inet(r6, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000280), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000f27a8ec54c956608000000ffff3bbbf599c5b011ba44fc6f26b129915ba2a4699679ab20b0ef7d897b2ac20ada06961c0de8c6506aa8ef7a49e8462e9fda0f1d1f095585afc2d0fee994471f807326ea76989901e383f5ac58bdb425942022bf0215d28e1ffef85dcd29f30cf0984f1adeaabee1783ccf3a8608c33f3b37a549d2ad18b19946164f4022ffdf56129cf68b6cf030d42094cda007c81f3ad539c3a0bb975f23a2ebabce632dbe9c8ccb26d19e1192d70676e13d532e4db2f070c29101ce351aa541cabed7cc0aa9570a60ee3d9be991e1777ac230e52083f01a16139dd14210c5441a30bcacdb915244a67fcbf56e91f995ff298ab6fc532419c5861b4818582bcc8d0f68f8640a7268070b6591992cea13edb34a313cd5"], 0x18}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'team_slave_1\x00', 0x600}) 23:02:18 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='blkio.bfq.io_queued\x00', 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) r0 = getpid() syz_clone(0x41840280, &(0x7f00000005c0)="cc99478a2e3b83565599a568958a30b4bd371a6e7516da60868191b8b3783d196ebc6da7f95e5ec6f3571a96c101c9fcc2e908e97f7355b8ff3d9c26c763751d20bf1dc1c126db071769becca6e7867e0604169ef824903fb8b8c59ca4de8f31a4ef69bfe268f993685c81e2b8b72ac5325cb608696cfb24e3811024e9c8007bdbb2c15d7b600486e1f5297673947f9963be86b6321192ad531063be3f58650d24ef84ef074d620dbf430e4839dace3eb67a", 0xb2, &(0x7f0000000500), &(0x7f00000006c0), 0x0) syz_open_procfs$namespace(0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000440), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000300)=@raw=[@kfunc, @kfunc, @btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @jmp={0x5, 0x1, 0x0, 0x0, 0x8, 0x2, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8}, @cb_func={0x18, 0x3}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000240)='GPL\x00', 0x0, 0x87, &(0x7f0000000380)=""/135, 0x41100, 0x8, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000480)={0xa, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x1, 0x8, 0x0, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)}, 0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x1f, 0xfc, 0x3, 0x0, 0x100000, 0x41220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x0, 0x8, 0x6, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x100000001}, r0, 0x2, 0xffffffffffffffff, 0x0) r2 = getpid() syz_open_procfs$namespace(r2, 0x0) gettid() syz_open_procfs$namespace(r0, 0x0) 23:02:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 23:02:18 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000008c0)={@map=0x1, 0xffffffffffffffff, 0x15}, 0x10) 23:02:18 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:18 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:18 executing program 2: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)}, 0x48) 23:02:18 executing program 5: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x1, 0x1000, &(0x7f0000000700)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r0}, 0x10) 23:02:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0x1}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f00000002c0)) 23:02:19 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a}, 0x48) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd002000, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0xad}, 0x28) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001580)='devices.list\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000e00)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:19 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x40, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77fc, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x5}, 0x709a4, 0x0, 0x2, 0x0, 0x5, 0x800002, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000340)='memory.numa_stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x6, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x400000000000004, 0x0, 0x6, 0x1814, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, r1, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x3f, 0x40, 0x7, 0x0, 0x9, 0x124a7c, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x4f0000000, 0x8, 0x2, 0x3ff, 0x7fff, 0x7, 0x0, 0x3ff}, 0x0, 0x1, r2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x795502, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'gretap0\x00', 0x1000}) ioctl$TUNSETOFFLOAD(r4, 0x400454c9, 0x13) socketpair(0x22, 0x6, 0x5, &(0x7f0000000380)) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000240)={'ip6gretap0\x00', 0xe00}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000002c0)=0x3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) sendmsg$inet(r6, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000280), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x18}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'team_slave_1\x00', 0x600}) 23:02:19 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000ac0)={r0, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b00)={r1}, 0x4) 23:02:19 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000002680)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000002b80)={0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000002880)=""/26, 0x1a}], 0x1}, 0x40) 23:02:19 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:19 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:19 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001d00), 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='x') ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000080)) 23:02:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x40049409, 0x0) 23:02:19 executing program 1: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x90}, [@ldst={0x2, 0x0, 0xb}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 23:02:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x12}]}}, &(0x7f0000000140)=""/234, 0x26, 0xea, 0x1}, 0x20) 23:02:19 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000040)=""/251, 0x26, 0xfb, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x3}, 0x80) 23:02:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x79, 0x10, 0x90}, [@ldst={0x2, 0x0, 0xb}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) 23:02:19 executing program 0: perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0x10482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000200), 0x8}, 0x40, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77fc, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x5}, 0x709a4, 0x0, 0x2, 0x0, 0x5, 0x800002, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000340)='memory.numa_stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x1400, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x6, @perf_bp={&(0x7f00000003c0)}, 0x0, 0x400000000000004, 0x0, 0x6, 0x1814, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xfffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xc, r1, 0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x3f, 0x40, 0x7, 0x0, 0x9, 0x124a7c, 0xb, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x40, 0x4, @perf_config_ext={0x0, 0x5}, 0x0, 0x4f0000000, 0x8, 0x2, 0x3ff, 0x7fff, 0x7, 0x0, 0x3ff}, 0x0, 0x1, r2, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x795502, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'gretap0\x00', 0x1000}) ioctl$TUNSETOFFLOAD(r4, 0x400454c9, 0x13) socketpair(0x22, 0x6, 0x5, &(0x7f0000000380)) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000240)={'ip6gretap0\x00', 0xe00}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f00000002c0)=0x3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) sendmsg$inet(r6, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000280), 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x18}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89a1, &(0x7f0000000080)) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000280)={'team_slave_1\x00', 0x600}) 23:02:19 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x8, &(0x7f0000001040)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe2c, 0x10, &(0x7f0000000000), 0x32}, 0x48) 23:02:19 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:19 executing program 5: perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x3a}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x69, 0xfd002000, &(0x7f00000004c0)="b95b03b700030703009e40f005dd1fff060000000000008477fbac141434e0000001c699da153f13e0e6e380f60109f683317585d7473f1cab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0xad}, 0x28) r1 = bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x3000000, 0x7, 0x0, &(0x7f0000000080)="d2eaa417e4aa41", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001580)='devices.list\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a00)=@bpf_ext={0x1c, 0x4, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1c0000, 0x0, 0x0, 0x0, 0xffffffff}, [@call={0x85, 0x0, 0x0, 0x7c}]}, &(0x7f0000000300)='GPL\x00', 0xfffffffa, 0x34, &(0x7f0000000480)=""/52, 0x41000, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000940)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000980)={0x1, 0x2, 0x3, 0x2}, 0x10, 0x23ef8, 0xffffffffffffffff, 0x0, &(0x7f00000009c0)=[0xffffffffffffffff, r2]}, 0x80) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000e00)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef]}}, &(0x7f0000000140)=""/234, 0x18, 0xea, 0x1}, 0x20) 23:02:19 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'\x00', 0x2}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x3) 23:02:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0xc6d, 0xa16, 0x0, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x16, &(0x7f0000000540)={r0, 0x0, 0x0}, 0x20) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r0, 0x4) 23:02:19 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000040)=""/251, 0x26, 0xfb, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x7, 0xee, &(0x7f0000000200)=""/238, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x2, &(0x7f0000000340), 0x10}, 0x80) 23:02:19 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:19 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0xe6d, 0xa16, 0x0, 0x1}, 0x48) write$cgroup_freezer_state(r0, 0x0, 0x0) 23:02:19 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:20 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0xc6d, 0xa16, 0x0, 0x1}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x16, &(0x7f0000000540)={r0, 0x0, 0x0}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000080)={r0, 0x0, 0x0}, 0x20) 23:02:20 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000040)=""/251, 0x26, 0xfb, 0x1}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000440)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x7, 0xee, &(0x7f0000000200)=""/238, 0x0, 0x0, '\x00', 0x0, 0x1b, r0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340), 0x20000350}, 0x80) 23:02:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x2, [@remote, @multicast]}) 23:02:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454cc, 0x0) 23:02:20 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000380)={&(0x7f0000000040)=@in6={0x18}, 0xc, 0x0}, 0x0) 23:02:20 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@bloom_filter={0x1e, 0x0, 0xc6d, 0xa16, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:02:20 executing program 2: syz_clone(0x1104600, 0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000280)="de") 23:02:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x3}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) 23:02:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d8, &(0x7f0000000000)={0x0, 0x1, [@multicast]}) 23:02:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454e2, 0x0) 23:02:20 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000b80)='ns/user\x00') 23:02:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d0, &(0x7f0000000000)) 23:02:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0xa, [@random="553e4d581a85", @broadcast, @multicast, @random="28c1683c3cb3", @multicast, @multicast, @broadcast, @remote, @link_local, @multicast]}) 23:02:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002140)={&(0x7f0000001080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}]}}, &(0x7f0000001140)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 23:02:20 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x54e3, 0x0) 23:02:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:20 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x8927, &(0x7f0000000000)) 23:02:20 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x800454e1, &(0x7f0000000000)) 23:02:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d4, &(0x7f0000000000)) 23:02:20 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'ipvlan1\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{}]}) 23:02:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:02:20 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000002140)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:02:20 executing program 2: syz_clone(0x8000600, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_clone(0x10020000, &(0x7f0000001300)="5a2dcede589c0dc6f613040dd42a2773e5bc312e0133e18371c72c3f481a46b16f8e66d3edc78d5e2c123ec0dbd3fbdb5d2b7450c8dd99ec5cc77305aec2b8250bedb2a66548ad37fc3e2d01daf93b9d9d2c", 0x52, &(0x7f0000000040), &(0x7f0000001380), &(0x7f00000013c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001440)={r0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000001400)='\x00'}, 0x30) r1 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f40)={0x11, 0x2, &(0x7f0000002dc0)=ANY=[@ANYBLOB="18500000f000000000020000"], &(0x7f0000002e00)='GPL\x00', 0xc1, 0x74, &(0x7f0000002e40)=""/116, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, 0x0, 0x0, 0x0) r4 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r4, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) getpid() 23:02:20 executing program 0: syz_clone(0x58208400, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:20 executing program 4: bpf$OBJ_GET_MAP(0x1e, &(0x7f0000000c40)={&(0x7f0000000c00)='./file0\x00'}, 0x10) 23:02:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x8008, 0x0, 0x0, 0x0, 0x8000000, 0x8, 0x0, 0x0, 0xffff0001, 0x0, 0x7}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x26, 0x0, 0x0, 0x0, 0x0, 0x7ee, 0x1024, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x1ced}, 0x0, 0x800, 0x0, 0x5, 0x8000000000000000, 0x4, 0xfff9, 0x0, 0x8}, 0xffffffffffffffff, 0xe, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.events\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x58, 0x5, 0x0, 0x9, 0x0, 0x0, 0x21004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={0x0, 0x4}, 0x47148, 0x80004, 0x0, 0x2, 0x0, 0x3}, r2, 0x100000, 0xffffffffffffffff, 0xa) r3 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='/dev/net/tun\x00') perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0x1, 0x9f, 0x0, 0x0, 0x6, 0x44a, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp, 0x5e020, 0x0, 0x80, 0x0, 0x9, 0x301, 0x1f, 0x0, 0x9, 0x0, 0x8000000000000000}, r3, 0x8, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000200)=""/2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000700)) 23:02:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) 23:02:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) [ 437.542953][T14523] bridge0: port 4(veth0_to_bond) entered blocking state [ 437.545287][T14523] bridge0: port 4(veth0_to_bond) entered disabled state 23:02:20 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x9, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000008c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f0000000080)) [ 437.620313][T14523] device veth0_to_bond entered promiscuous mode [ 437.640241][T14523] bridge0: port 4(veth0_to_bond) entered blocking state 23:02:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 23:02:21 executing program 2: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000049b87ca38328c86925c373e2ce4b6e55a39e85fdf852daf3c4262d52968db274c25d836b1c", @ANYRES32=0x1, @ANYBLOB="000000000000000085100000060000008510000003000000180000004000000000000000616e000001d5030000000000950000000000000018000000040000000000000006000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x40, &(0x7f0000000340)=""/64, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x7, 0x87, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000004c0)=r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r3, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000240)='.\x02', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.kill\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) [ 437.641998][T14523] bridge0: port 4(veth0_to_bond) entered forwarding state 23:02:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x8008, 0x0, 0x0, 0x0, 0x8000000, 0x8, 0x0, 0x0, 0xffff0001, 0x0, 0x7}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x26, 0x0, 0x0, 0x0, 0x0, 0x7ee, 0x1024, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x1ced}, 0x0, 0x800, 0x0, 0x5, 0x8000000000000000, 0x4, 0xfff9, 0x0, 0x8}, 0xffffffffffffffff, 0xe, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.events\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x58, 0x5, 0x0, 0x9, 0x0, 0x0, 0x21004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={0x0, 0x4}, 0x47148, 0x80004, 0x0, 0x2, 0x0, 0x3}, r2, 0x100000, 0xffffffffffffffff, 0xa) r3 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='/dev/net/tun\x00') perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0x1, 0x9f, 0x0, 0x0, 0x6, 0x44a, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp, 0x5e020, 0x0, 0x80, 0x0, 0x9, 0x301, 0x1f, 0x0, 0x9, 0x0, 0x8000000000000000}, r3, 0x8, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000200)=""/2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000700)) 23:02:21 executing program 5: perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000002140)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:02:21 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 23:02:21 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0x0, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x11}, 0x51500, 0x4, 0x4, 0x0, 0x400000004, 0x2, 0x8000, 0x0, 0x7ff, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4d81, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x82, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r0, 0x7) sendmsg$inet(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000280), 0x0, &(0x7f00000002c0)}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x30) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) [ 438.017412][T14540] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 438.017455][T14540] CPU: 1 PID: 14540 Comm: syz-executor.2 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 438.017486][T14540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.017501][T14540] Call Trace: [ 438.017508][T14540] [ 438.017517][T14540] dump_stack_lvl+0xcd/0x134 [ 438.017554][T14540] dump_header+0x10b/0x7f9 [ 438.017587][T14540] oom_kill_process.cold+0x10/0x15 23:02:21 executing program 0: syz_clone(0xc2a03480, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:21 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) [ 438.017621][T14540] out_of_memory+0x358/0x14b0 [ 438.017669][T14540] ? oom_killer_disable+0x270/0x270 23:02:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x8008, 0x0, 0x0, 0x0, 0x8000000, 0x8, 0x0, 0x0, 0xffff0001, 0x0, 0x7}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x26, 0x0, 0x0, 0x0, 0x0, 0x7ee, 0x1024, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x1ced}, 0x0, 0x800, 0x0, 0x5, 0x8000000000000000, 0x4, 0xfff9, 0x0, 0x8}, 0xffffffffffffffff, 0xe, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.events\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x58, 0x5, 0x0, 0x9, 0x0, 0x0, 0x21004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={0x0, 0x4}, 0x47148, 0x80004, 0x0, 0x2, 0x0, 0x3}, r2, 0x100000, 0xffffffffffffffff, 0xa) r3 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='/dev/net/tun\x00') perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0x1, 0x9f, 0x0, 0x0, 0x6, 0x44a, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp, 0x5e020, 0x0, 0x80, 0x0, 0x9, 0x301, 0x1f, 0x0, 0x9, 0x0, 0x8000000000000000}, r3, 0x8, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000200)=""/2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000700)) 23:02:21 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 438.017706][T14540] ? io_schedule_timeout+0x140/0x140 [ 438.017746][T14540] mem_cgroup_out_of_memory+0x206/0x270 [ 438.017780][T14540] ? mem_cgroup_margin+0x130/0x130 23:02:21 executing program 2: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000049b87ca38328c86925c373e2ce4b6e55a39e85fdf852daf3c4262d52968db274c25d836b1c", @ANYRES32=0x1, @ANYBLOB="000000000000000085100000060000008510000003000000180000004000000000000000616e000001d5030000000000950000000000000018000000040000000000000006000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x40, &(0x7f0000000340)=""/64, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x7, 0x87, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000004c0)=r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r3, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000240)='.\x02', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.kill\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) 23:02:21 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 438.017830][T14540] memory_max_write+0x25c/0x3b0 [ 438.017864][T14540] ? mem_cgroup_force_empty_write+0x150/0x150 [ 438.017901][T14540] ? lock_release+0x780/0x780 [ 438.017938][T14540] cgroup_file_write+0x1de/0x770 23:02:21 executing program 5: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000049b87ca38328c86925c373e2ce4b6e55a39e85fdf852daf3c4262d52968db274c25d836b1c", @ANYRES32=0x1, @ANYBLOB="000000000000000085100000060000008510000003000000180000004000000000000000616e000001d5030000000000950000000000000018000000040000000000000006000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x40, &(0x7f0000000340)=""/64, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x7, 0x87, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000004c0)=r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r3, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000240)='.\x02', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.kill\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) 23:02:21 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 438.017962][T14540] ? mem_cgroup_force_empty_write+0x150/0x150 [ 438.017994][T14540] ? kill_css+0x370/0x370 [ 438.018014][T14540] ? __phys_addr+0xc4/0x140 [ 438.018054][T14540] ? kill_css+0x370/0x370 [ 438.018076][T14540] kernfs_fop_write_iter+0x3f8/0x610 [ 438.018109][T14540] new_sync_write+0x38a/0x560 [ 438.018142][T14540] ? new_sync_read+0x5f0/0x5f0 [ 438.018179][T14540] ? lock_release+0x780/0x780 23:02:21 executing program 3: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4e, 0xa}, [@ldst={0x3, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0xf, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, r4, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x0, 0x9, 0x2}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000002c0)=[r0, r0, r4, r0]}, 0x80) [ 438.018234][T14540] vfs_write+0x7c0/0xac0 [ 438.018271][T14540] ksys_write+0x127/0x250 [ 438.018302][T14540] ? __ia32_sys_read+0xb0/0xb0 23:02:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x8008, 0x0, 0x0, 0x0, 0x8000000, 0x8, 0x0, 0x0, 0xffff0001, 0x0, 0x7}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x26, 0x0, 0x0, 0x0, 0x0, 0x7ee, 0x1024, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x1ced}, 0x0, 0x800, 0x0, 0x5, 0x8000000000000000, 0x4, 0xfff9, 0x0, 0x8}, 0xffffffffffffffff, 0xe, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.events\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x58, 0x5, 0x0, 0x9, 0x0, 0x0, 0x21004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={0x0, 0x4}, 0x47148, 0x80004, 0x0, 0x2, 0x0, 0x3}, r2, 0x100000, 0xffffffffffffffff, 0xa) r3 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='/dev/net/tun\x00') perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x6, 0x1, 0x9f, 0x0, 0x0, 0x6, 0x44a, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp, 0x5e020, 0x0, 0x80, 0x0, 0x9, 0x301, 0x1f, 0x0, 0x9, 0x0, 0x8000000000000000}, r3, 0x8, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000200)=""/2) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000700)) [ 438.018332][T14540] ? syscall_enter_from_user_mode+0x21/0x70 23:02:22 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0x0, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x11}, 0x51500, 0x4, 0x4, 0x0, 0x400000004, 0x2, 0x8000, 0x0, 0x7ff, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4d81, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x82, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r0, 0x7) sendmsg$inet(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000280), 0x0, &(0x7f00000002c0)}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x30) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) [ 438.018363][T14540] ? syscall_enter_from_user_mode+0x21/0x70 [ 438.018400][T14540] do_syscall_64+0x35/0xb0 23:02:22 executing program 2: ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0xd, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000049b87ca38328c86925c373e2ce4b6e55a39e85fdf852daf3c4262d52968db274c25d836b1c", @ANYRES32=0x1, @ANYBLOB="000000000000000085100000060000008510000003000000180000004000000000000000616e000001d5030000000000950000000000000018000000040000000000000006000000"], &(0x7f0000000300)='syzkaller\x00', 0x2, 0x40, &(0x7f0000000340)=""/64, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x4, 0x4}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0x7, 0x87, 0x5}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f00000004c0)=r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x3b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3443, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, r3, 0x0) close(r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mkdir(&(0x7f0000000240)='.\x02', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000500)='cgroup.kill\x00', 0x0, 0x0) r4 = openat$cgroup_int(r2, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_int(r4, &(0x7f0000000240), 0x12) [ 438.018442][T14540] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 438.018473][T14540] RIP: 0033:0x7f5ce1e89109 [ 438.018495][T14540] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:02:22 executing program 0: syz_clone(0x3c202100, 0x0, 0xe00000000000000, 0x0, 0x0, 0x0) 23:02:22 executing program 1: syz_clone(0xc6220400, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:22 executing program 3: r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffdfffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x4e, 0xa}, [@ldst={0x3, 0x0, 0x3, 0xa, 0x0, 0xff00}]}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0xf, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x1f2, 0x10, &(0x7f0000000000), 0xfffffe51}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(r3, &(0x7f0000000240)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xc, r4, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x81}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000240)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x0, 0x9, 0x2}, 0x10, 0xffffffffffffffff, r1, 0x0, &(0x7f00000002c0)=[r0, r0, r4, r0]}, 0x80) [ 438.018520][T14540] RSP: 002b:00007f5ce0dfe168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 438.018545][T14540] RAX: ffffffffffffffda RBX: 00007f5ce1f9c030 RCX: 00007f5ce1e89109 [ 438.018564][T14540] RDX: 0000000000000012 RSI: 0000000020000240 RDI: 0000000000000006 [ 438.018581][T14540] RBP: 00007f5ce1ee30ad R08: 0000000000000000 R09: 0000000000000000 23:02:22 executing program 3: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140)={@cgroup, 0xffffffffffffffff, 0x1d}, 0x10) [ 438.018597][T14540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 23:02:22 executing program 0: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@map, 0xffffffffffffffff, 0x8}, 0x10) [ 438.018612][T14540] R13: 00007ffddf2d2c4f R14: 00007f5ce0dfe300 R15: 0000000000022000 [ 438.018651][T14540] 23:02:22 executing program 3: socketpair(0x10, 0x0, 0x8, &(0x7f0000000280)) [ 438.018948][T14540] memory: usage 2560kB, limit 0kB, failcnt 177 [ 438.018964][T14540] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 438.018978][T14540] Memory cgroup stats for /syz2: [ 438.019142][T14540] anon 151552 [ 438.019142][T14540] file 241664 [ 438.019142][T14540] kernel 2228224 [ 438.019142][T14540] kernel_stack 98304 [ 438.019142][T14540] pagetables 81920 [ 438.019142][T14540] percpu 0 [ 438.019142][T14540] sock 0 [ 438.019142][T14540] vmalloc 0 [ 438.019142][T14540] shmem 229376 [ 438.019142][T14540] zswap 0 [ 438.019142][T14540] zswapped 0 [ 438.019142][T14540] file_mapped 200704 [ 438.019142][T14540] file_dirty 8192 [ 438.019142][T14540] file_writeback 0 [ 438.019142][T14540] swapcached 0 [ 438.019142][T14540] anon_thp 0 [ 438.019142][T14540] file_thp 0 [ 438.019142][T14540] shmem_thp 0 [ 438.019142][T14540] inactive_anon 212992 [ 438.019142][T14540] active_anon 167936 [ 438.019142][T14540] inactive_file 8192 [ 438.019142][T14540] active_file 4096 [ 438.019142][T14540] unevictable 0 [ 438.019142][T14540] slab_reclaimable 675184 [ 438.019142][T14540] slab_unreclaimable 1341928 [ 438.019142][T14540] slab 2017112 23:02:23 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0xc9ab) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000240)) 23:02:23 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0x0, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x11}, 0x51500, 0x4, 0x4, 0x0, 0x400000004, 0x2, 0x8000, 0x0, 0x7ff, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4d81, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x82, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r0, 0x7) sendmsg$inet(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000280), 0x0, &(0x7f00000002c0)}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x30) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:02:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8008}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x7ee, 0x1020, 0x5, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x1ced}, 0x3401, 0x800, 0x3, 0x5, 0x8000000000000000, 0x4, 0xfff9, 0x0, 0x8, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0xe, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.events\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = gettid() perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x58, 0x5, 0x0, 0x2, 0x0, 0x0, 0x21004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x4}, 0x47148, 0x80004, 0x0, 0x2, 0x0, 0x3}, r2, 0x100000, 0xffffffffffffffff, 0x0) r3 = gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000040)='/dev/net/tun\x00') perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x6, 0x1, 0x9f, 0x0, 0x0, 0x6, 0x44a, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp, 0x5e020, 0x20200, 0x80, 0x0, 0x9, 0x301, 0x1f, 0x0, 0x9, 0x0, 0x8000000000000000}, r3, 0x8, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3ff, 0xffffffffffffffc1}, 0x0, 0x9, 0x8, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000200)=""/2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a2, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000700)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x5, &(0x7f00000007c0)=ANY=[@ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x7, 0x6b, &(0x7f0000000140)=""/107, 0x41100, 0x6, '\x00', 0x0, 0x4c, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5, 0xfffffffe}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) write$cgroup_subtree(r5, &(0x7f0000000800)=ANY=[@ANYRES16, @ANYRESDEC, @ANYBLOB="9b8208d6074fed4d4207d091b49942cd34be2c9a10310b33b32880e3de952caebcdc161e881db7915fc9f869a2c16eb09755a5505b2e179f207077c9bb3163e59bdc6f25f073df2fcb51d7eb6507f67480c74b0c760d2dc3f9df6200000000000000c39300000018942108de7a7f2e874ab1ce7f02115a26d1852bb1f3ad531658ab7ea4bc371d9a20a2a6a10375446ab618df1697732ec60f7a2527d456be6412adb2858cc716e9c37dd159212b82e6f7cb2cdd4ad459567575f4e20200cb7a92aa993936a45cb5e9ab06123d79c70e8a31cd51b88ea60000000000002000000000000000000000000000000000000000dbea68923aec426db05137fe9a4f0eae869d7a99cd58be359734404dbb830f8421d083e757a144f08a5921243e4e1107d8aeb0cda188eaab2e8a81d5d4d36e615c25afde582693684f08ee3404a59c80a5b9cb4b42000032eded0be04c7d32a61e545c5a844682b76c57667e1737a1dc806a00351bb4a5ba3baa0458d06bde6b990ad9b7f5d94ebaac20f279a2fa08c7d6b1dfc615f7f56a8fa1008042eff415a4f14547d5ae541b3841000000000000000000000075bc30f7887e85e712d29cad450e2d80cfa3506ff499a87116c1461cd6940b0dc6c3e741991aed0f8dbef9eb95bc97460000fd4865df2268ea5749e539d29550eeb07fd96ace45884838a063260ec24d82529dcf14dea1c53da026b9f187c9ee4e5097d931ff92ec9c20eff28e008e3fee4ba19f8c05a036df64fef95f2a29dc0f1eb07dbb43fcf2cc080eecdc06cd00fafcb163050031dc0c1b86d1482bd5454a0dff3bbdc247e6af5d04e2b0b892c9f47bea3134108f7b9b4b4ca7071f128f0d25f95b7bd9e3c0b7c94e67159c7c8a19d6fff4976be2e60a78ec7225d2e0cfef3df30f0000000000000000649c8314edb8cd7e600d55d555b9f0781a3d3c8a4cc0a9ac40a89a847e6cecb128e8fd10d7e6abac571c84428d77ce590c5074f5bbb9d29f467b62204a486953bbc5a7906a02dfe10bd37c5fd894c223ae722dc41fd3861cf05c34afd82d17da2d38c408d57c34a88e3fcec334fe1fbe617ad8ab043e844cd91390a7d658f0ee75acbe842566f3e3355b538f92655d836bc4912a6b299a87cad69f898ada023fdce92c228ad0dc1085d8ca8c7cdba79b81fc2ba829aeb63ca5000be81a64a615615d74e6d1596d7ed98b501cf07115f689bd6e25f498c16a35f9499c68dbb147493b066110a66e68b686679025a68e6b3f5051005b03e738a1c40787b98a1eef4581893958917962af539049e5b2c5d2efd32404ed532ab74b97f7c8d8d7dd7d23e05148e61e1d82468893314d4f518b08291f72884666", @ANYRES16=r4, @ANYRES32=r0], 0x210fe) 23:02:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x4, &(0x7f0000000540)=@framed={{}, [@kfunc]}, &(0x7f0000000600)='GPL\x00', 0x3, 0xdc, &(0x7f0000000640)=""/220, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:02:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x7ee, 0x1020, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x1ced}, 0x3401, 0x800, 0x3, 0x5, 0x8000000000000000, 0x4, 0xfff9, 0x0, 0x8}, 0xffffffffffffffff, 0xe, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.events\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x6, 0xc3, 0x9f, 0x0, 0x0, 0x6, 0x44a, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp, 0x5e020, 0x20200, 0x80, 0x6, 0x9, 0x0, 0x1f, 0x0, 0x9, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/13) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x9, 0xfd, 0x3, 0x8, 0x0, 0x100000001, 0x80400, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000340)}, 0x800, 0x6, 0x17, 0x9, 0x1, 0x403, 0x2, 0x0, 0x7fff, 0x0, 0x81}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) socketpair(0x5, 0xa, 0xffffffff, &(0x7f0000000400)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000700)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x5, &(0x7f00000007c0)=ANY=[@ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x7, 0x6b, &(0x7f0000000140)=""/107, 0x41100, 0x6, '\x00', 0x0, 0x4c, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5, 0xfffffffe}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000900)='io.latency\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000001300)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB="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", @ANYRESOCT, @ANYRES32], 0x210fe) [ 438.019208][T14540] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=13684,uid=0 [ 438.019338][T14540] Memory cgroup out of memory: Killed process 13684 (syz-executor.2) total-vm:50536kB, anon-rss:392kB, file-rss:9072kB, shmem-rss:64kB, UID:0 pgtables:72kB oom_score_adj:0 [ 438.356779][T14553] bridge0: port 3(team0) entered disabled state [ 438.356904][T14553] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.357234][T14553] bridge0: port 1(bridge_slave_0) entered disabled state [ 438.448043][T14548] device team0 left promiscuous mode [ 438.448079][T14548] device team_slave_0 left promiscuous mode [ 438.453222][T14548] device team_slave_1 left promiscuous mode [ 438.453989][T14548] bridge0: port 3(team0) entered disabled state [ 438.495587][T14548] device bridge_slave_1 left promiscuous mode [ 438.495981][T14548] bridge0: port 2(bridge_slave_1) entered disabled state [ 438.510817][T14548] device bridge_slave_0 left promiscuous mode [ 438.511333][T14548] bridge0: port 1(bridge_slave_0) entered disabled state [ 439.712486][ T1231] ieee802154 phy0 wpan0: encryption failed: -22 [ 439.712534][ T1231] ieee802154 phy1 wpan1: encryption failed: -22 [ 439.882646][T12779] syz-executor.5 invoked oom-killer: gfp_mask=0xdc0(GFP_KERNEL|__GFP_ZERO), order=0, oom_score_adj=0 [ 439.882682][T12779] CPU: 0 PID: 12779 Comm: syz-executor.5 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 439.882709][T12779] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.882722][T12779] Call Trace: [ 439.882728][T12779] [ 439.882737][T12779] dump_stack_lvl+0xcd/0x134 [ 439.882769][T12779] dump_header+0x10b/0x7f9 [ 439.882800][T12779] oom_kill_process.cold+0x10/0x15 [ 439.882831][T12779] out_of_memory+0x358/0x14b0 [ 439.882869][T12779] ? find_held_lock+0x2d/0x110 [ 439.882900][T12779] ? oom_killer_disable+0x270/0x270 [ 439.882936][T12779] ? find_held_lock+0x2d/0x110 [ 439.882970][T12779] mem_cgroup_out_of_memory+0x206/0x270 [ 439.883001][T12779] ? mem_cgroup_margin+0x130/0x130 [ 439.883027][T12779] ? lock_downgrade+0x6e0/0x6e0 [ 439.883076][T12779] try_charge_memcg+0xef9/0x1380 [ 439.883115][T12779] ? mem_cgroup_handle_over_high+0x510/0x510 [ 439.883147][T12779] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 439.883176][T12779] ? lock_downgrade+0x6e0/0x6e0 [ 439.883210][T12779] ? lock_downgrade+0x6e0/0x6e0 [ 439.883246][T12779] ? rcu_read_unlock+0x9/0x60 [ 439.883285][T12779] obj_cgroup_charge+0x2ab/0x5e0 [ 439.883318][T12779] ? __alloc_file+0x21/0x270 [ 439.883342][T12779] kmem_cache_alloc+0x92/0x3b0 [ 439.883378][T12779] __alloc_file+0x21/0x270 [ 439.883402][T12779] alloc_empty_file+0x6d/0x170 [ 439.883429][T12779] alloc_file+0x59/0x590 [ 439.883458][T12779] alloc_file_pseudo+0x165/0x250 [ 439.883484][T12779] ? alloc_file+0x590/0x590 [ 439.883511][T12779] ? alloc_fd+0x2f0/0x670 [ 439.883546][T12779] sock_alloc_file+0x4f/0x190 [ 439.883578][T12779] __sys_socket+0x1a4/0x240 [ 439.883602][T12779] ? __sys_socket_file+0x1f0/0x1f0 [ 439.883629][T12779] ? syscall_enter_from_user_mode+0x21/0x70 [ 439.883663][T12779] __x64_sys_socket+0x6f/0xb0 [ 439.883684][T12779] ? syscall_enter_from_user_mode+0x21/0x70 [ 439.883712][T12779] do_syscall_64+0x35/0xb0 [ 439.883740][T12779] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 439.883768][T12779] RIP: 0033:0x7f8b1108a787 [ 439.883788][T12779] Code: f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 439.883809][T12779] RSP: 002b:00007ffff4ef9448 EFLAGS: 00000206 ORIG_RAX: 0000000000000029 [ 439.883831][T12779] RAX: ffffffffffffffda RBX: 00007ffff4ef9bb0 RCX: 00007f8b1108a787 [ 439.883847][T12779] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 439.883861][T12779] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007ffff4ef99c0 [ 439.883875][T12779] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000032 [ 439.883890][T12779] R13: 000000000006b58d R14: 0000000000000012 R15: 00007ffff4ef9bf0 [ 439.883926][T12779] [ 439.883935][T12779] memory: usage 3436kB, limit 0kB, failcnt 183 [ 439.883948][T12779] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 439.883962][T12779] Memory cgroup stats for /syz5: [ 439.884267][T12779] anon 61440 [ 439.884267][T12779] file 204800 [ 439.884267][T12779] kernel 3252224 [ 439.884267][T12779] kernel_stack 0 [ 439.884267][T12779] pagetables 8192 [ 439.884267][T12779] percpu 0 [ 439.884267][T12779] sock 0 [ 439.884267][T12779] vmalloc 0 [ 439.884267][T12779] shmem 192512 [ 439.884267][T12779] zswap 0 [ 439.884267][T12779] zswapped 0 [ 439.884267][T12779] file_mapped 188416 [ 439.884267][T12779] file_dirty 8192 [ 439.884267][T12779] file_writeback 0 [ 439.884267][T12779] swapcached 0 [ 439.884267][T12779] anon_thp 0 [ 439.884267][T12779] file_thp 0 [ 439.884267][T12779] shmem_thp 0 [ 439.884267][T12779] inactive_anon 65536 [ 439.884267][T12779] active_anon 188416 [ 439.884267][T12779] inactive_file 8192 [ 439.884267][T12779] active_file 4096 [ 439.884267][T12779] unevictable 0 [ 439.884267][T12779] slab_reclaimable 721704 [ 439.884267][T12779] slab_unreclaimable 2513640 [ 439.884267][T12779] slab 3235344 [ 439.884337][T12779] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz5,mems_allowed=0-1,oom_memcg=/syz5,task_memcg=/syz5,task=syz-executor.5,pid=12779,uid=0 [ 439.884433][T12779] Memory cgroup out of memory: Killed process 12779 (syz-executor.5) total-vm:50536kB, anon-rss:396kB, file-rss:9072kB, shmem-rss:64kB, UID:0 pgtables:68kB oom_score_adj:0 [ 440.639363][T14601] bridge0: port 3(veth0_to_bond) entered blocking state [ 440.640705][T14601] bridge0: port 3(veth0_to_bond) entered disabled state [ 440.649829][T14601] device veth0_to_bond entered promiscuous mode [ 440.650248][T14601] bridge0: port 3(veth0_to_bond) entered blocking state [ 440.650307][T14601] bridge0: port 3(veth0_to_bond) entered forwarding state [ 442.594501][ T3654] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 442.596191][ T3654] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 442.596789][ T3654] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 442.597748][ T3654] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 442.598228][ T3654] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 442.598689][ T3654] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 442.745745][T14615] chnl_net:caif_netlink_parms(): no params data found [ 442.806089][T14615] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.806167][T14615] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.806772][T14615] device bridge_slave_0 entered promiscuous mode [ 442.808187][T14615] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.808255][T14615] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.808856][T14615] device bridge_slave_1 entered promiscuous mode [ 442.835576][T14615] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 442.837747][T14615] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 442.893278][T14615] team0: Port device team_slave_0 added [ 442.895578][T14615] team0: Port device team_slave_1 added [ 442.918870][T14615] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 442.918885][T14615] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.918921][T14615] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 442.924443][T14615] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 442.924457][T14615] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.924484][T14615] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 443.013768][T14615] device hsr_slave_0 entered promiscuous mode [ 443.015171][T14615] device hsr_slave_1 entered promiscuous mode [ 443.015698][T14615] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 443.015719][T14615] Cannot create hsr debugfs directory [ 443.218315][T14615] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.245657][ T92] device hsr_slave_0 left promiscuous mode [ 443.246035][ T92] device hsr_slave_1 left promiscuous mode [ 443.246368][ T92] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 443.246406][ T92] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 443.247563][ T92] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 443.247577][ T92] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 443.248692][ T92] device bridge_slave_1 left promiscuous mode [ 443.248769][ T92] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.257016][ T92] device bridge_slave_0 left promiscuous mode [ 443.257156][ T92] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.276412][ T92] device hsr_slave_0 left promiscuous mode [ 443.283750][ T92] device hsr_slave_1 left promiscuous mode [ 443.284453][ T92] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 443.284485][ T92] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 443.287915][ T92] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 443.287939][ T92] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 443.291284][ T92] device bridge_slave_1 left promiscuous mode [ 443.291395][ T92] bridge0: port 2(bridge_slave_1) entered disabled state [ 443.303145][ T92] device bridge_slave_0 left promiscuous mode [ 443.303266][ T92] bridge0: port 1(bridge_slave_0) entered disabled state [ 443.338177][ T92] device veth1_macvtap left promiscuous mode [ 443.338234][ T92] device veth0_macvtap left promiscuous mode [ 443.338364][ T92] device veth1_vlan left promiscuous mode [ 443.338478][ T92] device veth0_vlan left promiscuous mode [ 443.380030][ T92] device veth1_macvtap left promiscuous mode [ 443.380088][ T92] device veth0_macvtap left promiscuous mode [ 443.380213][ T92] device veth1_vlan left promiscuous mode [ 443.380297][ T92] device veth0_vlan left promiscuous mode [ 443.685355][ T92] team0 (unregistering): Port device team_slave_1 removed [ 443.700887][ T92] team0 (unregistering): Port device team_slave_0 removed [ 443.706326][ T92] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 443.717113][ T92] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 443.789394][ T92] bond0 (unregistering): Released all slaves [ 443.935416][ T92] team0 (unregistering): Port device team_slave_1 removed [ 443.941553][ T92] team0 (unregistering): Port device team_slave_0 removed [ 443.959417][ T92] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 443.974657][ T92] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 444.043237][ T92] bond0 (unregistering): Released all slaves [ 444.095499][T14615] 8021q: adding VLAN 0 to HW filter on device team0 [ 444.101884][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 444.102393][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 444.102872][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 444.103344][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 444.103748][T10831] bridge0: port 1(bridge_slave_0) entered blocking state [ 444.103809][T10831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 444.104608][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 444.105072][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 444.105431][T10831] bridge0: port 2(bridge_slave_1) entered blocking state [ 444.105490][T10831] bridge0: port 2(bridge_slave_1) entered forwarding state [ 444.106044][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 444.111027][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 444.115715][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 444.124944][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 444.126038][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 444.126748][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 444.131715][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 444.132568][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 444.136647][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 444.137140][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 444.145728][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 444.146248][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 444.157145][T14615] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 444.173063][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 444.173186][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 444.176971][T14615] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 444.577238][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 444.577606][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 444.598003][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 444.598380][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.598811][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.599087][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.607884][T14615] device veth0_vlan entered promiscuous mode [ 444.618200][T14615] device veth1_vlan entered promiscuous mode [ 444.651592][T14615] device veth0_macvtap entered promiscuous mode [ 444.654536][T14615] device veth1_macvtap entered promiscuous mode [ 444.673769][ T144] Bluetooth: hci0: command 0x0409 tx timeout [ 444.681267][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 444.681897][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 444.682499][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 444.683039][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 444.684690][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 444.685417][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 444.686138][T14615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 444.686156][T14615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.686166][T14615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 444.686180][T14615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.686188][T14615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 444.686202][T14615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.686211][T14615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 444.686225][T14615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.687255][T14615] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 444.687497][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 444.688052][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 444.693706][T14615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 444.693725][T14615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.693735][T14615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 444.693749][T14615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.693758][T14615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 444.693772][T14615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.693781][T14615] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 444.693795][T14615] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 444.694878][T14615] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 444.694975][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 444.695527][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 444.868839][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 444.868858][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 444.871583][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 444.894914][ T47] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 444.894934][ T47] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 444.897209][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 445.354915][T14634] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 445.355099][T14634] CPU: 0 PID: 14634 Comm: syz-executor.2 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 445.355131][T14634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.355146][T14634] Call Trace: [ 445.355153][T14634] [ 445.355162][T14634] dump_stack_lvl+0xcd/0x134 [ 445.355196][T14634] dump_header+0x10b/0x7f9 [ 445.355230][T14634] oom_kill_process.cold+0x10/0x15 [ 445.355265][T14634] out_of_memory+0x358/0x14b0 [ 445.355311][T14634] ? oom_killer_disable+0x270/0x270 [ 445.355350][T14634] ? io_schedule_timeout+0x140/0x140 [ 445.355382][T14634] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 445.355421][T14634] mem_cgroup_out_of_memory+0x206/0x270 23:02:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x8, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x4}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x61, 0x5f]}}, &(0x7f0000000140)=""/163, 0x34, 0xa3, 0x1}, 0x20) 23:02:28 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x2, 0x4, 0x8, 0xff}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000000)="a347", 0x0}, 0x20) 23:02:28 executing program 3: bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) 23:02:28 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0x0, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x2, 0x11}, 0x51500, 0x4, 0x4, 0x0, 0x400000004, 0x2, 0x8000, 0x0, 0x7ff, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x4030582a, &(0x7f0000000040)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4d81, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x82, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r0, 0x7) sendmsg$inet(r4, &(0x7f0000000300)={&(0x7f00000000c0)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000280), 0x0, &(0x7f00000002c0)}, 0x20004810) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x30) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:02:28 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000300), 0x10) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x22, 0x0, 0x0, 0x0, 0x0, 0x7ee, 0x1020, 0x5, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x0, 0x1ced}, 0x3401, 0x800, 0x3, 0x5, 0x8000000000000000, 0x4, 0xfff9, 0x0, 0x8}, 0xffffffffffffffff, 0xe, r0, 0x3) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.events\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x6, 0xc3, 0x9f, 0x0, 0x0, 0x6, 0x44a, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_bp, 0x5e020, 0x20200, 0x80, 0x6, 0x9, 0x0, 0x1f, 0x0, 0x9, 0x0, 0x8000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00', 0x20}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f0000000440)=""/13) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x9, 0xfd, 0x3, 0x8, 0x0, 0x100000001, 0x80400, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000340)}, 0x800, 0x6, 0x17, 0x9, 0x1, 0x403, 0x2, 0x0, 0x7fff, 0x0, 0x81}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89a2, &(0x7f0000000080)) socketpair(0x5, 0xa, 0xffffffff, &(0x7f0000000400)) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000700)) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x5, &(0x7f00000007c0)=ANY=[@ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x7, 0x6b, &(0x7f0000000140)=""/107, 0x41100, 0x6, '\x00', 0x0, 0x4c, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5, 0xfffffffe}, 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000900)='io.latency\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000001300)=ANY=[@ANYBLOB="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", @ANYRESDEC, @ANYBLOB="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", @ANYRESOCT, @ANYRES32], 0x210fe) 23:02:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x8, [@enum={0x0, 0x2, 0x0, 0x6, 0x4, [{0x4}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x61, 0x5f]}}, &(0x7f0000000140)=""/163, 0x3c, 0xa3, 0x1}, 0x20) [ 445.355455][T14634] ? mem_cgroup_margin+0x130/0x130 [ 445.355507][T14634] memory_max_write+0x25c/0x3b0 [ 445.355545][T14634] ? mem_cgroup_force_empty_write+0x150/0x150 [ 445.355584][T14634] ? lock_release+0x780/0x780 [ 445.355630][T14634] cgroup_file_write+0x1de/0x770 [ 445.355658][T14634] ? mem_cgroup_force_empty_write+0x150/0x150 [ 445.355694][T14634] ? kill_css+0x370/0x370 [ 445.355718][T14634] ? __phys_addr+0xc4/0x140 23:02:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x9, [@struct={0x7, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x6, 0x5}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000340)=""/226, 0x39, 0xe2, 0x1}, 0x20) [ 445.355762][T14634] ? kill_css+0x370/0x370 23:02:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x12, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "bb"}]}}, &(0x7f0000000080)=""/217, 0x2a, 0xd9, 0x1}, 0x20) [ 445.355786][T14634] kernfs_fop_write_iter+0x3f8/0x610 [ 445.355823][T14634] new_sync_write+0x38a/0x560 [ 445.355857][T14634] ? new_sync_read+0x5f0/0x5f0 [ 445.355897][T14634] ? lock_release+0x780/0x780 [ 445.355955][T14634] vfs_write+0x7c0/0xac0 [ 445.355994][T14634] ksys_write+0x127/0x250 23:02:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var={0x1000001}]}}, &(0x7f00000001c0)=""/217, 0x2a, 0xd9, 0x1}, 0x20) 23:02:29 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x48000400, 0x0, 0x0, 0x0, 0x0, 0x0) [ 445.356026][T14634] ? __ia32_sys_read+0xb0/0xb0 [ 445.356058][T14634] ? syscall_enter_from_user_mode+0x21/0x70 [ 445.356089][T14634] ? syscall_enter_from_user_mode+0x21/0x70 [ 445.356126][T14634] do_syscall_64+0x35/0xb0 23:02:29 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'veth1_vlan\x00'}) 23:02:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0x693a0150e30dc6e6}) [ 445.356158][T14634] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 445.356189][T14634] RIP: 0033:0x7fd2ce089109 [ 445.356211][T14634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 445.356236][T14634] RSP: 002b:00007fd2cf2c5168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 445.356261][T14634] RAX: ffffffffffffffda RBX: 00007fd2ce19bf60 RCX: 00007fd2ce089109 [ 445.356279][T14634] RDX: 0000000000000012 RSI: 0000000020000240 RDI: 0000000000000006 [ 445.356296][T14634] RBP: 00007fd2ce0e30ad R08: 0000000000000000 R09: 0000000000000000 [ 445.356312][T14634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 445.356328][T14634] R13: 00007fff2a311e4f R14: 00007fd2cf2c5300 R15: 0000000000022000 [ 445.356370][T14634] [ 445.356468][T14634] memory: usage 1472kB, limit 0kB, failcnt 177 [ 445.356505][T14634] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 445.356627][T14634] Memory cgroup stats for /syz2: [ 445.359474][T14634] anon 114688 [ 445.359474][T14634] file 233472 [ 445.359474][T14634] kernel 1163264 [ 445.359474][T14634] kernel_stack 65536 [ 445.359474][T14634] pagetables 81920 [ 445.359474][T14634] percpu 0 [ 445.359474][T14634] sock 0 [ 445.359474][T14634] vmalloc 0 [ 445.359474][T14634] shmem 229376 [ 445.359474][T14634] zswap 0 [ 445.359474][T14634] zswapped 0 [ 445.359474][T14634] file_mapped 200704 [ 445.359474][T14634] file_dirty 0 [ 445.359474][T14634] file_writeback 0 [ 445.359474][T14634] swapcached 0 [ 445.359474][T14634] anon_thp 0 [ 445.359474][T14634] file_thp 0 [ 445.359474][T14634] shmem_thp 0 [ 445.359474][T14634] inactive_anon 167936 [ 445.359474][T14634] active_anon 167936 [ 445.359474][T14634] inactive_file 0 [ 445.359474][T14634] active_file 4096 [ 445.359474][T14634] unevictable 0 [ 445.359474][T14634] slab_reclaimable 310496 [ 445.359474][T14634] slab_unreclaimable 680576 [ 445.359474][T14634] slab 991072 [ 445.370640][T14634] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=14615,uid=0 [ 445.371272][T14634] Memory cgroup out of memory: Killed process 14615 (syz-executor.2) total-vm:50536kB, anon-rss:364kB, file-rss:8384kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 445.374013][T14634] syz-executor.2 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 445.374190][T14634] CPU: 0 PID: 14634 Comm: syz-executor.2 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 23:02:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x9, 0x0, 0x0, 0x0, 0x3, 0x1}, 0x48) [ 445.374222][T14634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:02:29 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='0\n3'], 0x5) 23:02:29 executing program 3: gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid_for_children\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0x401, 0xfffffffffffffe45) r0 = syz_clone(0x40081000, &(0x7f0000002980), 0x0, &(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)="07efaf08c22fe7090dd04ac918de5c5522123651269adb89f3962f6dbff09436836ae9db238b32469ec12fa7a33b040d3a47c67dc2072572317c1513a0b2e9a68618285816be5eac8840cb6cf31888d8fd641dd262e044fe5f25f86f537b281cef57b50c58c9da8d561140e9469ccb599f6aae9145b5402125297e1f287dade1894d78b963dc4a71493e4141eba2dc38a56a62c8155a1460015ab70014c449a94aa251694d2048307256cf5311f4ae6094b6ffe3dd672f924a946c3d4368a654a43a59fc885a1ce9626f98c5d5849bb4cf3dc857e71857a8097edb88a554bdedea023cade064d3b49bec46180636cd942265b546bd1f16c5e6ffaf1421f4474308872c2dc0f7764a2c4830838b0f7e2665dd350c52f6624f0b91f4a6567defc259a7a4ef64017e635b1be7bd11cb09dcbc8e7ff99e81b680b8cc3c6646d3f0e9d9aab9c3b7881f1ae8b0d26596e856be2b29f10a5b4f328b65a992817417aee09e2cf80f03bc04958d27c6334dae04952416efdaa8f72871087690a76fe8de82d6ccd5d606f6117554adc3b734b1a53a4523880b18997c0f7375efe125caf073e0deab1aba9744e6beb1ba11a1f8144ee104f45f81d32cfc67e12daf5226ae513d4f03d6d0597ec8617ef1da252703cd17bbb49dc4fa3f10bc0174926250b34f652ec4632c56b795bd281e2439ee6beba077bf436df42888c7286ce9da3c3244802747aa2c00be4294de2a738b454f6b356134f47732f288f4579ab40eba6f936c47161fcf038295e73aea0df01f2efaef14b4860aa77affa5e892bf948ec75b3cb18eb5d23b45f8d6d0db34517ca69c6cbf9e99b5e1c79191063ac517cb325eadda32b3394358405bb073aa5fd06dd1f3d47e1fa9de46f72cbc948623e2e488000df21366db3ec732381d34e374f618c99d4a98dd2b6943f16ac063691e572c526d7b9ec97645044f3fe2e2f9ada2eed7fdb10efaff95a30bb6210e8cc91504a597114d295c60830da7ca744b1e804ebbebe0498b107aa3f2e09e1957d2088d1b9074187a0f6b894efe4360343f8859bac7f7dabd41b6b9f0742932e98397b68df2e00d64b5249bde977b7ddd889cc6fa7f0b25125c9209d7001b6ddb3199f4a68f5dbd4e931c55f78d1c7039a96e3ed1349efe3827ab8b13c3c29061ae0c18fd2cc295eadd5c15ebeb0098f56223e9c1f1f74bd4e8002cf885e4fc2898c0ae2398ec5f902b2cf4dac189c5d596f2983be3e685aa9c9264d25057ca284f93c77997c3e2212741a112147aa6522dbfa117800690951d5cf6936f9f6407d35ecfc383600220fd4651f3c4cf574bc0dd83564377d7eefc01abaee1c156faa88d411acf0cb5cbfe9523cbd1e96fbc915f391a9571b94551cd69fa9e4f395d29a0561b90c2e6409c85cf50b697d3cbfd0c4eb0a39b8db1f61edffe3edf682a25b2683866e2b2710127756baa85cb2bfed179bb825162e091b18c7c0c46cda48cdada15fe56db7e9024f487c8da4195dfffb1af5b2d22b78ea4d8576c1f7fc0ecf9d46d9698cb54efbc69b432e8fc7ecd99ad8fbd6f2f891366243e58d5dbd427a6a311089c244b932b940b22f96f417803f610588c649283b3204b7476977f44295fdf5203b6882d317a9ebd5d48e9574a82db2e1ece8a9b27e789a5d30e341988fb52a535d9cbda1532c76ea3f0e0ad6fca8f621c15e3e88ed7572d8ae6227e1e8b5d88f7b11a463c5d5c218c2127677a811698efb69312f6c1df60580c51a11a5f470ca8d894831900a118d232ae53426af36528a012a9df7739111a00f123295ebb2c416503f7fb6e1fe020d916cd138966e974ddb207a5322b8db8129440027610ccd07abe4115bf33478091eb24db95c6f647e1ebf93317d425e232149e6d1a412473a7312317f3d69bcc54bf4946b39c6570550c0ba9acddde64d1801683279f70cad4e5aeae44bbbad5b36471eea0231c2dae80de9c03952690d5a1db6caa856e15dbf8aed9abad68e5af41ee82fb937e503bdd34b8453e614dbff6f57048af9ec308ace6b112d28a3ec971580349ed4af009c1cb070db8ab6bcc88a05c93627bc1ac400fdc6899e1f25f7c15165a6e440da24dadaa0fadb3ebb470bb2ef318da7b10ded5b309d55906aa39104231df4e9c3ef5f17aad6f407cd9050c2305ed5467499d58fad23c096866c0cea67fa233032f6105a3a950e0371b82a40e2e59729e40dc472a710414fc75a4f37a1c0c828615cc8baa0f5d8380ddbb8c7bf72688dd877e71c884ce6bf8ad2f20ec1dbedcb1259e4f021532b603f67971b17e197e17e1573380145763a98fd0518f3faaf1d2ab65963a2b5102877a3f3e4c049e7af7ac3fa5d223cb706826b5a18c1b05b290cd699d873117cde8a69b3ac2f0912b49a52b999d6d77265dcb8c90a300051fcd4d1b120af06ba76612f117fc1452896e3c9ced601230b11bad448c966debefe05330f43027dd0f7972a3a674f5ad72fb96cf7f2748cc0bfbd40cbb3d0a2236a805ac05bc3daea9683bc3c20c95d7142768190b23421c13315d8775d6b26709694b312c305200c6f08be4df5a04089ae41e769e62ffcadc015e82fc2525c748293252d20909d25d214e16bf53c129b45a1b99e58b4c282fb52e31fdf66f5c4f28ef305de80296e96bead1587fa74aff41b51d99be21f653901ac48dfb17688e5bc9e9fd66aba110753ed0d2c8a00c7a6c91ec7a566e72d194739f1bd412fbe65be3a572bda649aea27cc422bccd3f795ac1f081915dcce321a7efe2ee5f55018155b0d4467a4cdbf8dee110b84270cff3b2fbca57c6aa405aca84dfb820318038ef1a39f0f539c186bc88b1361cdb00cbd801099fde90c3beba6026a20873fdadd8ca88c465aa19caf2ca7c03eda9e53f54eb5e188fc8ec73d993c70cf9dfc81ee9332018dbed87dfb9fee409392e29b6aa5a0d94c934f2266ca1fb39c848163c32cb21ad10b2b6917219b1f03dff4259070806dbdf63d8075b5f59f03210c6f3500c1492fb8da509bb3b5403e4c3c398c6482b30240bff4f2cb977d822db4e2fa3bac0430e012d6e12bed3bc548a07cf3711136e6bbf9d851a324befd422928f381d978ab3f1f2af4f001b12fa9ad86dd9546ef78b12425cd29db1407aaaf19ff810f397c314d0da9a19a06008dd6ce3d88930e89dddf56bc82f71506234437b594936f5a8c832bb9a09d0e3579a292c7794ed5dbc66a1e73b5e15cc3cce6bce3476883ab6ab78695af523163334bda2d87267f53b8c08e557836d7c090c76335b67f64e83372fff64f190db5e834e04bbd69432498c083424469451f4280e7ce69e8b3572d9ad64c91316f0e63a44ac0cb1f36a7a1bae8a9d2d57bc1374a747060dc5448a88cc14cb1d6befc847372e0c5b2f56ae0ebe02913111076bee2d0ec9f2787e30ebfc8b340b137be1bcbf6ca6411dbf0eeb038bf10fe4f8839db439210a1a1d41c8e0ec9cd9850d18897dad291ea9e3b3e3a721e04df78a6f4ac3c89e373d708d747e2d2d2a1d598a7aeca6bc92ce148d16a4ea9e2814b8c9963936cdd6f0dc89ad53343c9af8115cdca0d567d4a0a5677a5da55bb6dde2de3df50cd1ea5193a76a081eac5d1be30cb5292cbeb607e6069acc1f583de3826b35b51253adb8e2411784e6c6683bafecd9ff292f25bebcf8c492f98443a9b00ddebb3d1ff4c6896c0a13c5bdd57db02cf5f4e77ef03d69c5359868c5f0b51f64e4e81c769475581494e6a1551a314465f8b4fc336525540d77fba6a7922965ce906520622c740b4336ee7800753a4a3694a4d869d78742b22311692c2f45dcc4f7f9f138c8ef2e72c47d75a5a20022f7c6f7bb4228e6f98119d03b4bf6cab81ddf7ccdba3db1a47159ed625d3550db4e32e28a10ca67627c8dc4aae6a5033f34d8aa8f617cd5dd16ba84b7a971e56943d0667148e0455c9b27336e66888acd33ee6cd8f2fe5e54965a29aca676c9d87db7abcf613fe1dda5e9c7dabb5d9d958dfd54213db14dcafbd7746739f89deb5fd8198e9c839556bf37824d1638b89de330545973651b66852a802d025427014a360a33d20c5182f00df24e24d2a2b97f97c3295d072af4143e9ff35de807e9532187c18ede8ab0e41c793e24c2963a50dc2c0f6329b3a98b3c766097386e88e81d9520f6f65fbd974c6a12bf95c62e7345108b76f50cfa1c5f88db7c43202b1708a306a22b33694a214f1aa3fc5f13969f0dfec8076d70824d2d9c59b7e592ff540e8929ea9360b32f5c7e936e3dbcc97b41ac7c8848984d7818f8b6fa21e4fcf34551d07f3be3c81a4675c78d696806f70a887c62fe86257c14cf47ec95a357b19c96f79be212383e7c0afa9d003822417f49069fb06f512317f505d8b6281079a411b30cc6dae0a0c1138f4db16782990fe6648c601f03136bbfe80e49147a8405bb2d130a82e1e2d0dbe3e037063e4042dc1d23a0f8edf92c9eac3fb6ae6fa8c381df65ed318ee05ef730416a731e0934da6e47c0cbc7690240a66072831350055b3521e6ab6d1e36faa441e87b66a45ab514bd80ccc8aa1227e73c46f323672d8f7cb45ed230b4c84dcb32628510ff251a9a178448fe30c2a435d441c40c4a9c4163ee5b7ae87ef3d52f831cb423657571b59df5d796a1a85cf4ceb973506e53ab8303cbfabc5ee14428fbd6e6dcf6e57d19c0adaea8458feb18c7af612ffeb34cb0625c7f9ff5b85fc511a5b282d37e56d3a840536b25a0d9404b784e6a05cb8f136e012cfc16cefe9a0918ea01ba08058d89e9dd9565576a8574b6f437e80b57c7aae8fb473781d24772dc7d02e75cf7ba8c67a1dd0a8f7651acb8b4bee90fa41cff0146e2b5d3e7fb4ad543acc4ca01332c2fe808034797f0ce2dca4b3798d05e049d80034ab619785ffe56b368a979c050886bd6ed4b394fcb4232b171d72cc2663f71d9baf937fa8af6c68ae7908a96a7a97210cfa82535d31bb5a797c0b3f924c86964776fe766cb0f92a0385aff6a1697e7b65ede8a0d9e0b05d1b9856b68155b8c2400b467f2bafc2cb861facaa090fee75a44395e884827edef7ffc88a94d29f7cff76033e877da46003cfc7b541dd3dfcccd921117aaa4a407915ca7406709f483c7a434487d0742caacb147185b074ea5140e85f8bcee14de470bd984c96db1f7dbda1ff8efddbdec427087b9c5300d785b06c8bedc15332e9f7d54939d9e9fdf5915891452e4dbf53d331643cc6e536afaaad9c0b172e5bd50d57e0dfa071089ca16d7e5a135b0635b1efd5cbe23a1946e099e28c27379dab923d68ccbd3694da7c92e1986d28173f44ef550625f2d6a0659a676b038656e4e696fef84d837536ec6d8679f463abfdb722ffbbaf08fd267b81547d94e23e2a6938f2151c20405ed5982ccf61972a92b6e9a29e9e1233736289ba439ad2094e5f0767ffe622e9c22920590eace37ed149a969f2d952728929b95082a3be7919c7e6069b098bb5dc0a3c194335fc8097d021245353e9f952c24980201f157b01e57354be456c3ac86593781cfa2ca0bc3c42599327715f687c7f3e6a7500cbc9f8e21ea1644cf0330bbcbda638f9707adf551fcd4f10ac5803355d48ca04fe0c1cd478444f96b6939f845e3d89c749fc6566307f6d79c75e0359b4c9c966c986fb2e5a745ba6bd815405111043f766037b1de62f46cb074dd1d1adbd23b916a82996af451a942e33eed54f04bf4e52a394f9c9c1f6de13a9b05b6a79469927257abd033983af3da89803174462f028b8c1f54e0aabc99f25026a94e0e29cbe3") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380)=r0, 0x12) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/uts\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) [ 445.374237][T14634] Call Trace: [ 445.374243][T14634] [ 445.374252][T14634] dump_stack_lvl+0xcd/0x134 23:02:29 executing program 4: openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) [ 445.374286][T14634] dump_header+0x10b/0x7f9 [ 445.374319][T14634] oom_kill_process.cold+0x10/0x15 [ 445.374354][T14634] out_of_memory+0x358/0x14b0 [ 445.374390][T14634] ? lockdep_hardirqs_on+0x79/0x100 23:02:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x74, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) close(0xffffffffffffffff) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$ITER_CREATE(0x21, 0x0, 0x0) [ 445.374425][T14634] ? oom_killer_disable+0x270/0x270 [ 445.374462][T14634] ? mem_cgroup_out_of_memory+0x199/0x270 [ 445.374503][T14634] mem_cgroup_out_of_memory+0x206/0x270 [ 445.374536][T14634] ? mem_cgroup_margin+0x130/0x130 [ 445.374581][T14634] ? _raw_spin_unlock_irqrestore+0x38/0x70 [ 445.374623][T14634] memory_max_write+0x25c/0x3b0 [ 445.374660][T14634] ? mem_cgroup_force_empty_write+0x150/0x150 [ 445.374699][T14634] ? lock_release+0x780/0x780 [ 445.374740][T14634] cgroup_file_write+0x1de/0x770 [ 445.374767][T14634] ? mem_cgroup_force_empty_write+0x150/0x150 [ 445.374803][T14634] ? kill_css+0x370/0x370 [ 445.374827][T14634] ? __phys_addr+0xc4/0x140 [ 445.374871][T14634] ? kill_css+0x370/0x370 [ 445.374895][T14634] kernfs_fop_write_iter+0x3f8/0x610 [ 445.374932][T14634] new_sync_write+0x38a/0x560 [ 445.374967][T14634] ? new_sync_read+0x5f0/0x5f0 [ 445.375006][T14634] ? lock_release+0x780/0x780 [ 445.375064][T14634] vfs_write+0x7c0/0xac0 [ 445.375103][T14634] ksys_write+0x127/0x250 [ 445.375134][T14634] ? __ia32_sys_read+0xb0/0xb0 [ 445.375166][T14634] ? syscall_enter_from_user_mode+0x21/0x70 [ 445.375196][T14634] ? syscall_enter_from_user_mode+0x21/0x70 [ 445.375235][T14634] do_syscall_64+0x35/0xb0 [ 445.375266][T14634] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 445.375297][T14634] RIP: 0033:0x7fd2ce089109 [ 445.375318][T14634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 445.375344][T14634] RSP: 002b:00007fd2cf2c5168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 445.375369][T14634] RAX: ffffffffffffffda RBX: 00007fd2ce19bf60 RCX: 00007fd2ce089109 [ 445.375387][T14634] RDX: 0000000000000012 RSI: 0000000020000240 RDI: 0000000000000006 [ 445.375403][T14634] RBP: 00007fd2ce0e30ad R08: 0000000000000000 R09: 0000000000000000 [ 445.375419][T14634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 445.375435][T14634] R13: 00007fff2a311e4f R14: 00007fd2cf2c5300 R15: 0000000000022000 [ 445.375477][T14634] [ 445.375505][T14634] memory: usage 1452kB, limit 0kB, failcnt 177 [ 445.375627][T14634] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 445.375900][T14634] Memory cgroup stats for /syz2: [ 445.380641][T14634] anon 114688 [ 445.380641][T14634] file 233472 [ 445.380641][T14634] kernel 1163264 [ 445.380641][T14634] kernel_stack 65536 [ 445.380641][T14634] pagetables 81920 [ 445.380641][T14634] percpu 0 [ 445.380641][T14634] sock 0 [ 445.380641][T14634] vmalloc 0 [ 445.380641][T14634] shmem 229376 [ 445.380641][T14634] zswap 0 [ 445.380641][T14634] zswapped 0 [ 445.380641][T14634] file_mapped 200704 [ 445.380641][T14634] file_dirty 0 [ 445.380641][T14634] file_writeback 0 [ 445.380641][T14634] swapcached 0 [ 445.380641][T14634] anon_thp 0 [ 445.380641][T14634] file_thp 0 [ 445.380641][T14634] shmem_thp 0 [ 445.380641][T14634] inactive_anon 167936 [ 445.380641][T14634] active_anon 167936 [ 445.380641][T14634] inactive_file 0 [ 445.380641][T14634] active_file 4096 [ 445.380641][T14634] unevictable 0 [ 445.380641][T14634] slab_reclaimable 310496 [ 445.380641][T14634] slab_unreclaimable 680576 [ 445.380641][T14634] slab 991072 [ 445.380906][T14634] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0-1,oom_memcg=/syz2,task_memcg=/syz2,task=syz-executor.2,pid=14633,uid=0 [ 445.382114][T14634] Memory cgroup out of memory: Killed process 14633 (syz-executor.2) total-vm:56556kB, anon-rss:376kB, file-rss:8192kB, shmem-rss:0kB, UID:0 pgtables:84kB oom_score_adj:1000 [ 448.760669][ T3648] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 448.764105][ T3648] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 448.766543][ T3648] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 448.767626][ T3648] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 448.768142][ T3648] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 448.768407][ T3648] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 448.856976][ T92] device hsr_slave_0 left promiscuous mode [ 448.857610][ T92] device hsr_slave_1 left promiscuous mode [ 448.858236][ T92] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 448.858259][ T92] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 448.860279][ T92] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 448.860302][ T92] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 448.867375][ T92] device bridge_slave_1 left promiscuous mode [ 448.867503][ T92] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.879445][ T92] device bridge_slave_0 left promiscuous mode [ 448.880201][ T92] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.914419][ T92] device veth1_macvtap left promiscuous mode [ 448.914478][ T92] device veth0_macvtap left promiscuous mode [ 448.914599][ T92] device veth1_vlan left promiscuous mode [ 448.914685][ T92] device veth0_vlan left promiscuous mode [ 449.105960][ T92] team0 (unregistering): Port device team_slave_1 removed [ 449.117638][ T92] team0 (unregistering): Port device team_slave_0 removed [ 449.131298][ T92] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 449.136091][ T92] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 449.204536][ T92] bond0 (unregistering): Released all slaves [ 449.299326][T14681] chnl_net:caif_netlink_parms(): no params data found [ 449.361446][T14681] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.361523][T14681] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.362118][T14681] device bridge_slave_0 entered promiscuous mode [ 449.363466][T14681] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.363534][T14681] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.364128][T14681] device bridge_slave_1 entered promiscuous mode [ 449.388994][T14681] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 449.421003][ T3654] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 449.422302][ T3654] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 449.427253][ T3654] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 449.428381][ T3654] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 449.430547][ T3654] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 449.430777][ T3654] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 449.443150][T14681] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 449.522632][T14681] team0: Port device team_slave_0 added [ 449.538156][T14681] team0: Port device team_slave_1 added [ 449.572253][T14681] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 449.572268][T14681] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 449.572295][T14681] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 449.576210][T14681] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 449.576230][T14681] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 449.576257][T14681] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 449.688294][T14681] device hsr_slave_0 entered promiscuous mode [ 449.688893][T14681] device hsr_slave_1 entered promiscuous mode [ 449.689213][T14681] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 449.689227][T14681] Cannot create hsr debugfs directory [ 449.692325][T14683] chnl_net:caif_netlink_parms(): no params data found [ 449.834006][T14683] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.834128][T14683] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.835245][T14683] device bridge_slave_0 entered promiscuous mode [ 449.837398][T14683] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.837514][T14683] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.839047][T14683] device bridge_slave_1 entered promiscuous mode [ 449.923125][T14683] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 449.926481][T14683] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 449.986904][T14683] team0: Port device team_slave_0 added [ 449.988999][T14683] team0: Port device team_slave_1 added [ 450.052449][T14683] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 450.052464][T14683] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 450.052492][T14683] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 450.054426][T14683] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 450.054438][T14683] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 450.054465][T14683] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 450.112762][T14681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 450.137741][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 450.138379][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.142597][T14683] device hsr_slave_0 entered promiscuous mode [ 450.143767][T14683] device hsr_slave_1 entered promiscuous mode [ 450.144259][T14683] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 450.144280][T14683] Cannot create hsr debugfs directory [ 450.147533][T14681] 8021q: adding VLAN 0 to HW filter on device team0 [ 450.182183][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 450.182764][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.183200][ T9477] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.183256][ T9477] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.183724][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 450.184276][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.184704][ T9477] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.184760][ T9477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.185195][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 450.186376][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 450.310841][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 450.355443][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 450.356595][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 450.357279][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 450.357931][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 450.367473][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 450.388777][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 450.389373][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.395442][T14681] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 450.396105][T14681] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 450.400481][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 450.401039][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.458530][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 450.458670][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 450.477172][T14681] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 450.536765][T14683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 450.559022][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 450.560006][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 450.565318][T14683] 8021q: adding VLAN 0 to HW filter on device team0 [ 450.590432][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 450.590903][T10831] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.590972][T10831] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.591757][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 450.607697][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 450.608133][ T9477] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.608194][ T9477] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.662108][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 450.662953][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 450.668449][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 450.686376][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 450.691911][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 450.708770][T14683] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 450.750678][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 450.750800][T10831] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 450.753720][T14683] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 450.833955][T10831] Bluetooth: hci0: command 0x0409 tx timeout [ 451.209755][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 451.210485][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 451.248548][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 451.249220][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 451.250417][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 451.251102][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.281949][T14681] device veth0_vlan entered promiscuous mode [ 451.293923][T14681] device veth1_vlan entered promiscuous mode [ 451.379995][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 451.380640][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 451.381247][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 451.381841][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 451.385546][T14681] device veth0_macvtap entered promiscuous mode [ 451.389374][T14681] device veth1_macvtap entered promiscuous mode [ 451.418632][T14681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 451.418653][T14681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 451.418663][T14681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 23:02:35 executing program 5: socketpair(0x11, 0xa, 0x0, &(0x7f00000001c0)) 23:02:35 executing program 4: syz_clone(0x608c8000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:35 executing program 1: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x48000400, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:35 executing program 3: gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid_for_children\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0x401, 0xfffffffffffffe45) r0 = syz_clone(0x40081000, &(0x7f0000002980), 0x0, &(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)="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") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380)=r0, 0x12) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/uts\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 23:02:35 executing program 0: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x48000400, 0x0, 0x0, 0x0, 0x0, 0x0) [ 451.418676][T14681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 451.418685][T14681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 451.418698][T14681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 451.418707][T14681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 451.418722][T14681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 451.422379][T14681] batman_adv: batadv0: Interface activated: batadv_slave_0 23:02:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x3}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000400)=""/182, 0x34, 0xb6, 0x1}, 0x20) [ 451.422501][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 451.423145][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 451.423714][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 451.424308][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 451.427787][T14681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 451.427804][T14681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 451.427815][T14681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 451.427830][T14681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 451.427839][T14681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 451.427854][T14681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 451.427862][T14681] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 451.427875][T14681] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 451.429096][T14681] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 451.429199][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 451.430695][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 451.487863][T10831] Bluetooth: hci4: command 0x0409 tx timeout [ 451.566705][ T3695] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 451.566724][ T3695] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 451.582109][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 451.624986][ T1042] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 451.625005][ T1042] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 451.627304][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 452.084199][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 452.084970][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 452.174547][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 452.175206][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 452.176082][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 452.176642][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 452.190705][T14683] device veth0_vlan entered promiscuous mode [ 452.247922][T14683] device veth1_vlan entered promiscuous mode [ 452.347782][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 452.348549][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 452.349143][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 452.350319][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 452.356545][T14683] device veth0_macvtap entered promiscuous mode [ 452.391709][T14683] device veth1_macvtap entered promiscuous mode [ 452.421449][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 23:02:36 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x4, &(0x7f0000000100)=@framed={{}, [@ldst={0x2, 0x0, 0x3, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:02:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x3}]}]}}, &(0x7f0000000400)=""/182, 0x32, 0xb6, 0x1}, 0x20) 23:02:36 executing program 4: syz_clone(0x4c24f000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:36 executing program 3: gettid() syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/pid_for_children\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000180)=0x401, 0xfffffffffffffe45) r0 = syz_clone(0x40081000, &(0x7f0000002980), 0x0, &(0x7f0000003980), &(0x7f00000039c0), &(0x7f0000003a00)="07efaf08c22fe7090dd04ac918de5c5522123651269adb89f3962f6dbff09436836ae9db238b32469ec12fa7a33b040d3a47c67dc2072572317c1513a0b2e9a68618285816be5eac8840cb6cf31888d8fd641dd262e044fe5f25f86f537b281cef57b50c58c9da8d561140e9469ccb599f6aae9145b5402125297e1f287dade1894d78b963dc4a71493e4141eba2dc38a56a62c8155a1460015ab70014c449a94aa251694d2048307256cf5311f4ae6094b6ffe3dd672f924a946c3d4368a654a43a59fc885a1ce9626f98c5d5849bb4cf3dc857e71857a8097edb88a554bdedea023cade064d3b49bec46180636cd942265b546bd1f16c5e6ffaf1421f4474308872c2dc0f7764a2c4830838b0f7e2665dd350c52f6624f0b91f4a6567defc259a7a4ef64017e635b1be7bd11cb09dcbc8e7ff99e81b680b8cc3c6646d3f0e9d9aab9c3b7881f1ae8b0d26596e856be2b29f10a5b4f328b65a992817417aee09e2cf80f03bc04958d27c6334dae04952416efdaa8f72871087690a76fe8de82d6ccd5d606f6117554adc3b734b1a53a4523880b18997c0f7375efe125caf073e0deab1aba9744e6beb1ba11a1f8144ee104f45f81d32cfc67e12daf5226ae513d4f03d6d0597ec8617ef1da252703cd17bbb49dc4fa3f10bc0174926250b34f652ec4632c56b795bd281e2439ee6beba077bf436df42888c7286ce9da3c3244802747aa2c00be4294de2a738b454f6b356134f47732f288f4579ab40eba6f936c47161fcf038295e73aea0df01f2efaef14b4860aa77affa5e892bf948ec75b3cb18eb5d23b45f8d6d0db34517ca69c6cbf9e99b5e1c79191063ac517cb325eadda32b3394358405bb073aa5fd06dd1f3d47e1fa9de46f72cbc948623e2e488000df21366db3ec732381d34e374f618c99d4a98dd2b6943f16ac063691e572c526d7b9ec97645044f3fe2e2f9ada2eed7fdb10efaff95a30bb6210e8cc91504a597114d295c60830da7ca744b1e804ebbebe0498b107aa3f2e09e1957d2088d1b9074187a0f6b894efe4360343f8859bac7f7dabd41b6b9f0742932e98397b68df2e00d64b5249bde977b7ddd889cc6fa7f0b25125c9209d7001b6ddb3199f4a68f5dbd4e931c55f78d1c7039a96e3ed1349efe3827ab8b13c3c29061ae0c18fd2cc295eadd5c15ebeb0098f56223e9c1f1f74bd4e8002cf885e4fc2898c0ae2398ec5f902b2cf4dac189c5d596f2983be3e685aa9c9264d25057ca284f93c77997c3e2212741a112147aa6522dbfa117800690951d5cf6936f9f6407d35ecfc383600220fd4651f3c4cf574bc0dd83564377d7eefc01abaee1c156faa88d411acf0cb5cbfe9523cbd1e96fbc915f391a9571b94551cd69fa9e4f395d29a0561b90c2e6409c85cf50b697d3cbfd0c4eb0a39b8db1f61edffe3edf682a25b2683866e2b2710127756baa85cb2bfed179bb825162e091b18c7c0c46cda48cdada15fe56db7e9024f487c8da4195dfffb1af5b2d22b78ea4d8576c1f7fc0ecf9d46d9698cb54efbc69b432e8fc7ecd99ad8fbd6f2f891366243e58d5dbd427a6a311089c244b932b940b22f96f417803f610588c649283b3204b7476977f44295fdf5203b6882d317a9ebd5d48e9574a82db2e1ece8a9b27e789a5d30e341988fb52a535d9cbda1532c76ea3f0e0ad6fca8f621c15e3e88ed7572d8ae6227e1e8b5d88f7b11a463c5d5c218c2127677a811698efb69312f6c1df60580c51a11a5f470ca8d894831900a118d232ae53426af36528a012a9df7739111a00f123295ebb2c416503f7fb6e1fe020d916cd138966e974ddb207a5322b8db8129440027610ccd07abe4115bf33478091eb24db95c6f647e1ebf93317d425e232149e6d1a412473a7312317f3d69bcc54bf4946b39c6570550c0ba9acddde64d1801683279f70cad4e5aeae44bbbad5b36471eea0231c2dae80de9c03952690d5a1db6caa856e15dbf8aed9abad68e5af41ee82fb937e503bdd34b8453e614dbff6f57048af9ec308ace6b112d28a3ec971580349ed4af009c1cb070db8ab6bcc88a05c93627bc1ac400fdc6899e1f25f7c15165a6e440da24dadaa0fadb3ebb470bb2ef318da7b10ded5b309d55906aa39104231df4e9c3ef5f17aad6f407cd9050c2305ed5467499d58fad23c096866c0cea67fa233032f6105a3a950e0371b82a40e2e59729e40dc472a710414fc75a4f37a1c0c828615cc8baa0f5d8380ddbb8c7bf72688dd877e71c884ce6bf8ad2f20ec1dbedcb1259e4f021532b603f67971b17e197e17e1573380145763a98fd0518f3faaf1d2ab65963a2b5102877a3f3e4c049e7af7ac3fa5d223cb706826b5a18c1b05b290cd699d873117cde8a69b3ac2f0912b49a52b999d6d77265dcb8c90a300051fcd4d1b120af06ba76612f117fc1452896e3c9ced601230b11bad448c966debefe05330f43027dd0f7972a3a674f5ad72fb96cf7f2748cc0bfbd40cbb3d0a2236a805ac05bc3daea9683bc3c20c95d7142768190b23421c13315d8775d6b26709694b312c305200c6f08be4df5a04089ae41e769e62ffcadc015e82fc2525c748293252d20909d25d214e16bf53c129b45a1b99e58b4c282fb52e31fdf66f5c4f28ef305de80296e96bead1587fa74aff41b51d99be21f653901ac48dfb17688e5bc9e9fd66aba110753ed0d2c8a00c7a6c91ec7a566e72d194739f1bd412fbe65be3a572bda649aea27cc422bccd3f795ac1f081915dcce321a7efe2ee5f55018155b0d4467a4cdbf8dee110b84270cff3b2fbca57c6aa405aca84dfb820318038ef1a39f0f539c186bc88b1361cdb00cbd801099fde90c3beba6026a20873fdadd8ca88c465aa19caf2ca7c03eda9e53f54eb5e188fc8ec73d993c70cf9dfc81ee9332018dbed87dfb9fee409392e29b6aa5a0d94c934f2266ca1fb39c848163c32cb21ad10b2b6917219b1f03dff4259070806dbdf63d8075b5f59f03210c6f3500c1492fb8da509bb3b5403e4c3c398c6482b30240bff4f2cb977d822db4e2fa3bac0430e012d6e12bed3bc548a07cf3711136e6bbf9d851a324befd422928f381d978ab3f1f2af4f001b12fa9ad86dd9546ef78b12425cd29db1407aaaf19ff810f397c314d0da9a19a06008dd6ce3d88930e89dddf56bc82f71506234437b594936f5a8c832bb9a09d0e3579a292c7794ed5dbc66a1e73b5e15cc3cce6bce3476883ab6ab78695af523163334bda2d87267f53b8c08e557836d7c090c76335b67f64e83372fff64f190db5e834e04bbd69432498c083424469451f4280e7ce69e8b3572d9ad64c91316f0e63a44ac0cb1f36a7a1bae8a9d2d57bc1374a747060dc5448a88cc14cb1d6befc847372e0c5b2f56ae0ebe02913111076bee2d0ec9f2787e30ebfc8b340b137be1bcbf6ca6411dbf0eeb038bf10fe4f8839db439210a1a1d41c8e0ec9cd9850d18897dad291ea9e3b3e3a721e04df78a6f4ac3c89e373d708d747e2d2d2a1d598a7aeca6bc92ce148d16a4ea9e2814b8c9963936cdd6f0dc89ad53343c9af8115cdca0d567d4a0a5677a5da55bb6dde2de3df50cd1ea5193a76a081eac5d1be30cb5292cbeb607e6069acc1f583de3826b35b51253adb8e2411784e6c6683bafecd9ff292f25bebcf8c492f98443a9b00ddebb3d1ff4c6896c0a13c5bdd57db02cf5f4e77ef03d69c5359868c5f0b51f64e4e81c769475581494e6a1551a314465f8b4fc336525540d77fba6a7922965ce906520622c740b4336ee7800753a4a3694a4d869d78742b22311692c2f45dcc4f7f9f138c8ef2e72c47d75a5a20022f7c6f7bb4228e6f98119d03b4bf6cab81ddf7ccdba3db1a47159ed625d3550db4e32e28a10ca67627c8dc4aae6a5033f34d8aa8f617cd5dd16ba84b7a971e56943d0667148e0455c9b27336e66888acd33ee6cd8f2fe5e54965a29aca676c9d87db7abcf613fe1dda5e9c7dabb5d9d958dfd54213db14dcafbd7746739f89deb5fd8198e9c839556bf37824d1638b89de330545973651b66852a802d025427014a360a33d20c5182f00df24e24d2a2b97f97c3295d072af4143e9ff35de807e9532187c18ede8ab0e41c793e24c2963a50dc2c0f6329b3a98b3c766097386e88e81d9520f6f65fbd974c6a12bf95c62e7345108b76f50cfa1c5f88db7c43202b1708a306a22b33694a214f1aa3fc5f13969f0dfec8076d70824d2d9c59b7e592ff540e8929ea9360b32f5c7e936e3dbcc97b41ac7c8848984d7818f8b6fa21e4fcf34551d07f3be3c81a4675c78d696806f70a887c62fe86257c14cf47ec95a357b19c96f79be212383e7c0afa9d003822417f49069fb06f512317f505d8b6281079a411b30cc6dae0a0c1138f4db16782990fe6648c601f03136bbfe80e49147a8405bb2d130a82e1e2d0dbe3e037063e4042dc1d23a0f8edf92c9eac3fb6ae6fa8c381df65ed318ee05ef730416a731e0934da6e47c0cbc7690240a66072831350055b3521e6ab6d1e36faa441e87b66a45ab514bd80ccc8aa1227e73c46f323672d8f7cb45ed230b4c84dcb32628510ff251a9a178448fe30c2a435d441c40c4a9c4163ee5b7ae87ef3d52f831cb423657571b59df5d796a1a85cf4ceb973506e53ab8303cbfabc5ee14428fbd6e6dcf6e57d19c0adaea8458feb18c7af612ffeb34cb0625c7f9ff5b85fc511a5b282d37e56d3a840536b25a0d9404b784e6a05cb8f136e012cfc16cefe9a0918ea01ba08058d89e9dd9565576a8574b6f437e80b57c7aae8fb473781d24772dc7d02e75cf7ba8c67a1dd0a8f7651acb8b4bee90fa41cff0146e2b5d3e7fb4ad543acc4ca01332c2fe808034797f0ce2dca4b3798d05e049d80034ab619785ffe56b368a979c050886bd6ed4b394fcb4232b171d72cc2663f71d9baf937fa8af6c68ae7908a96a7a97210cfa82535d31bb5a797c0b3f924c86964776fe766cb0f92a0385aff6a1697e7b65ede8a0d9e0b05d1b9856b68155b8c2400b467f2bafc2cb861facaa090fee75a44395e884827edef7ffc88a94d29f7cff76033e877da46003cfc7b541dd3dfcccd921117aaa4a407915ca7406709f483c7a434487d0742caacb147185b074ea5140e85f8bcee14de470bd984c96db1f7dbda1ff8efddbdec427087b9c5300d785b06c8bedc15332e9f7d54939d9e9fdf5915891452e4dbf53d331643cc6e536afaaad9c0b172e5bd50d57e0dfa071089ca16d7e5a135b0635b1efd5cbe23a1946e099e28c27379dab923d68ccbd3694da7c92e1986d28173f44ef550625f2d6a0659a676b038656e4e696fef84d837536ec6d8679f463abfdb722ffbbaf08fd267b81547d94e23e2a6938f2151c20405ed5982ccf61972a92b6e9a29e9e1233736289ba439ad2094e5f0767ffe622e9c22920590eace37ed149a969f2d952728929b95082a3be7919c7e6069b098bb5dc0a3c194335fc8097d021245353e9f952c24980201f157b01e57354be456c3ac86593781cfa2ca0bc3c42599327715f687c7f3e6a7500cbc9f8e21ea1644cf0330bbcbda638f9707adf551fcd4f10ac5803355d48ca04fe0c1cd478444f96b6939f845e3d89c749fc6566307f6d79c75e0359b4c9c966c986fb2e5a745ba6bd815405111043f766037b1de62f46cb074dd1d1adbd23b916a82996af451a942e33eed54f04bf4e52a394f9c9c1f6de13a9b05b6a79469927257abd033983af3da89803174462f028b8c1f54e0aabc99f25026a94e0e29cbe3") write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000380)=r0, 0x12) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000200)='ns/uts\x00') write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 23:02:36 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000500)='/', 0x1}], 0x1, &(0x7f0000000a00)=[@ip_tos_int={{0x14}}], 0x18}, 0x4000851) 23:02:36 executing program 0: bpf$BPF_BTF_LOAD(0xa, 0xfffffffffffffffe, 0x9d) [ 452.421472][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 452.421483][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 23:02:36 executing program 5: syz_clone(0x400c5180, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) 23:02:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xb, 0x0, 0x0, 0x3, 0x101}, 0x48) [ 452.421498][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:02:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0xc, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:02:36 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') 23:02:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) [ 452.421507][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 452.421522][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:02:36 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') 23:02:36 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/pid\x00') ioctl$TUNSETLINK(r0, 0xb701, 0x0) 23:02:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000f40)={0x18, 0x1, &(0x7f0000000d40)=@raw=[@exit], &(0x7f0000000d80)='syzkaller\x00', 0x1, 0xf4, &(0x7f0000000dc0)=""/244, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 452.421531][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 23:02:36 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') [ 452.421546][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 452.421555][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 452.421570][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 452.422989][T14683] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 452.423113][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 452.423786][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 23:02:36 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x15, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0xc, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:02:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/pid\x00') ioctl$TUNSETLINK(r0, 0xc0189436, 0x20000000) 23:02:36 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') ioctl$TUNSETLINK(r0, 0xb701, 0x0) 23:02:36 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') ioctl$TUNSETLINK(r0, 0xb701, 0x0) 23:02:36 executing program 4: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') 23:02:36 executing program 5: syz_clone(0x400c5180, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) [ 452.424369][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 452.424972][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready 23:02:36 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/pid\x00') ioctl$TUNSETLINK(r0, 0xb704, 0x0) 23:02:36 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x541b, 0x20000000) [ 452.432416][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:02:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x8, 0x4, &(0x7f0000000100)=@framed={{}, [@ldst={0x2, 0x0, 0x3}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:02:36 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time\x00') ioctl$TUNSETLINK(r0, 0xb701, 0x0) [ 452.432442][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:02:36 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/pid\x00') ioctl$TUNSETLINK(r0, 0xb702, 0x0) [ 452.432451][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:02:36 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRES64=r0, @ANYRES16], 0x24) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)={[{0x2b, 'perf_event'}, {0x2d, 'net_cls'}, {0x2d, 'hugetlb'}]}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0185879, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc004743e, &(0x7f0000000680)='&@[\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_bp={0x0}, 0x8400, 0x4, 0x3, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x4010744d, 0x20000007) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0xffffffffffff0001) 23:02:36 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x2, 0x4, 0x63d, 0xff, 0x4}, 0x48) [ 452.432465][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:02:36 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x408fc, 0x0, 0x0, 0x1, 0x3, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x80, 0x2, 0x0, 0x2001ff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e9a, 0x1, @perf_config_ext={0x8, 0x3}, 0x58000, 0x1000004, 0x3, 0x1, 0x3ff, 0xfcae, 0x8000, 0x0, 0xffffff7f, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'veth0_macvtap\x00', 0xa00}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x40fff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'macsec0\x00', @broadcast}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) sendmsg$inet(r5, &(0x7f0000000300)={&(0x7f0000000500)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0020000000000000000000000100000081000000000000000000000000000000000000000200000000020000000000000000000000000000000004000001000000020000000000000000f6a201000081000000070000008600000000010100db71728907d733e1d401bc52bd1c1ce88823c67e9f27e061425b333d8b7100000000000000008810c71800c064961e0cbb02e9ad78e5df79273077640faa07dfee4d11bf940245df514ddbdd3287fa838f4bb7591daf91154e051b287c2fe57ebc0000000064f3b9a07ee9d9ca5ae910f9794d000000fdffffff00"/239]}, 0x20000810) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='bv\xde\xec\x13\xd20\x00') socketpair(0x28, 0x3, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x8, 0xfe, 0x3, 0x0, 0x0, 0x4f, 0x100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x1d3a}, 0x208, 0x9, 0x4, 0x5, 0x400, 0x8, 0x0, 0x0, 0x4, 0x0, 0x800}, 0x0, 0x7, r0, 0x4) close(r1) 23:02:36 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x800000ff}, 0x48) 23:02:36 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x2, 0x4, 0x8, 0xfffffff7}, 0x48) [ 452.432474][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 452.432487][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:02:37 executing program 0: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r0, r1, 0x25, 0x10}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x4, 0x76}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000980)={r2, &(0x7f0000000840), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, 0x0, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_clone(0x8000, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0xbb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext, 0x3644, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 452.432495][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 452.432507][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 452.432516][T14683] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 452.432528][T14683] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 452.433789][T14683] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 452.434379][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 452.435039][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 452.615383][ T3695] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 452.615409][ T3695] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 452.617880][ T5125] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 452.647049][ T47] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 452.647070][ T47] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 452.649000][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 452.919807][ T5696] Bluetooth: hci0: command 0x041b tx timeout [ 453.550736][ T9477] Bluetooth: hci4: command 0x041b tx timeout [ 453.854375][T14801] bridge0: port 4(veth0_to_bond) entered disabled state [ 453.854730][T14801] bridge0: port 3(team0) entered disabled state [ 453.855251][T14801] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.855715][T14801] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.014046][T14808] device veth0_to_bond left promiscuous mode [ 454.014201][T14808] bridge0: port 4(veth0_to_bond) entered disabled state [ 454.015783][T14808] device team0 left promiscuous mode [ 454.015796][T14808] device team_slave_0 left promiscuous mode [ 454.015899][T14808] device team_slave_1 left promiscuous mode [ 454.017728][T14808] bridge0: port 3(team0) entered disabled state [ 454.019326][T14808] device bridge_slave_1 left promiscuous mode [ 454.019450][T14808] bridge0: port 2(bridge_slave_1) entered disabled state 23:02:37 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000240)=ANY=[@ANYBLOB='b *:* rwr'], 0x9) 23:02:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x48) 23:02:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f0000000240)=ANY=[@ANYBLOB='b *:* rww'], 0x9) 23:02:37 executing program 0: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0x1, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000200)={r0, r1, 0x25, 0x10}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xe, 0x4, 0x4, 0x76}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000980)={r2, &(0x7f0000000840), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, 0x0, &(0x7f0000014ff5)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_clone(0x8000, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0xbb, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_config_ext, 0x3644, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd41}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:37 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x408fc, 0x0, 0x0, 0x1, 0x3, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x80, 0x2, 0x0, 0x2001ff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e9a, 0x1, @perf_config_ext={0x8, 0x3}, 0x58000, 0x1000004, 0x3, 0x1, 0x3ff, 0xfcae, 0x8000, 0x0, 0xffffff7f, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'veth0_macvtap\x00', 0xa00}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x40fff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'macsec0\x00', @broadcast}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) sendmsg$inet(r5, &(0x7f0000000300)={&(0x7f0000000500)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0020000000000000000000000100000081000000000000000000000000000000000000000200000000020000000000000000000000000000000004000001000000020000000000000000f6a201000081000000070000008600000000010100db71728907d733e1d401bc52bd1c1ce88823c67e9f27e061425b333d8b7100000000000000008810c71800c064961e0cbb02e9ad78e5df79273077640faa07dfee4d11bf940245df514ddbdd3287fa838f4bb7591daf91154e051b287c2fe57ebc0000000064f3b9a07ee9d9ca5ae910f9794d000000fdffffff00"/239]}, 0x20000810) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='bv\xde\xec\x13\xd20\x00') socketpair(0x28, 0x3, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x8, 0xfe, 0x3, 0x0, 0x0, 0x4f, 0x100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x1d3a}, 0x208, 0x9, 0x4, 0x5, 0x400, 0x8, 0x0, 0x0, 0x4, 0x0, 0x800}, 0x0, 0x7, r0, 0x4) close(r1) [ 454.031327][T14808] device bridge_slave_0 left promiscuous mode [ 454.031462][T14808] bridge0: port 1(bridge_slave_0) entered disabled state 23:02:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRES64, @ANYRES64=r0, @ANYRES16], 0x24) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)={[{0x2b, 'perf_event'}, {0x2d, 'net_cls'}, {0x2d, 'hugetlb'}]}, 0x1e) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0185879, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[], 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0xc004743e, &(0x7f0000000680)='&@[\x00') openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x2, @perf_bp={0x0}, 0x8400, 0x4, 0x3, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x4010744d, 0x20000007) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000200)=0xffffffffffff0001) 23:02:37 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x17, 0x0, 0xff, 0xc000000}, 0x48) 23:02:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000001c0)={0x18, 0xb, &(0x7f0000000000)=@raw=[@func, @map_idx, @map_idx_val, @kfunc, @jmp, @cb_func, @cb_func], &(0x7f0000000080)='GPL\x00', 0xff, 0x80, &(0x7f00000000c0)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:02:37 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_to_batadv\x00', 0x2000}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x0, 0x2, 0x0, 0x110, 0x1, 0x110, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x1, 0x3, 0xc}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r2, &(0x7f0000000000), 0x20b000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x0, 0x0, &(0x7f00000003c0)='GPL\x00', 0x0, 0xa7, &(0x7f0000000400)=""/167, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000700)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000740)={0x0, 0xd, 0x0, 0x8}, 0x10}, 0x80) ioctl$TUNSETLINK(r0, 0x400454cd, 0x308) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x308) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000300)={'dummy0\x00', 0x200}) write$cgroup_int(r3, &(0x7f0000000180), 0x12) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000800)=ANY=[@ANYRESDEC, @ANYBLOB="2a3bc5546aef0b647ccbbb16cfb0744de6fd3d461725ebdad880aa207afeea0fba57e4bece6e12c755fdfcb53dcc9b737a95544aa04c2ecb9f64f184e5b305325294e13b2c805ff0e0df75a9ec3f16db3b649bf0bd0b8bd0103ad7a0d9ae5157a76512bebc06ba5ea28827d8ae2f662b131d2736d11d0d906e243a8c6d6913277ab63c7f57668db23383ed3a9150645d8e473bd0ae4c33143f37c327768d27138182377d8bcdd591253c52eb698c7444014399a61c01dde8d4ead45a4e966ea5699f891c764b994cf6fe70a4d8d853eca44456ce4e8ea6796b87ff5b22", @ANYRESDEC, @ANYBLOB="6b14d8a3e111fb1c"], 0x32600) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000240)={'ip6tnl0\x00', 0x800}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r4 = bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r3}, 0x8) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'batadv_slave_0\x00', 0x200}) 23:02:37 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x2, 0x4, 0x8, 0xff}, 0x48) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f00000000c0)={r0, 0x0, 0x0}, 0x20) 23:02:37 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800400000000000000085a9036d48bf44e9000020000080950db50b6cd4efdd73db5be3a6b70b743cf34bb83586780ee8f94038718579fc7c54400a4a68f9bdae19e71d83f97a173c9b4225e08ba71a1c268900000000f9573d850ca462cca8644d795a2cc61b7ee625a0b1673f31a04cea92eb0f35c240fc11a8816d2759fd0600b0f303adf7567518a490c3dbb48cc279000081e9fe0ce46bd9de5c193607436ebfdbd38e1ebaf0e73c4eb60c9cb82c120bd9d35e467d760e2efb3f35f59106cc369fab03ccbcf1e9d456330ce8bc297ef0e29208e299503409db388e08cea175ee1ed4eac44b43b66e83c74572fc0000000000000000000000000000000000000000b84825616d3f6f75e832b3dd6433dbba7ecf5c618a558078644b975a33dbb961b46490d2100e0f30130ffe4abe175aa8a5fe64aa510d39fb5e88869a307d64d3c70cee3604986905c9b8fb4710244fcfea3b144398051d26dce3a99bc9ebdb8c4c901c80c3200b402e8cfb99c27a6f8879c6d6733ed344f3fba8a21482967a847f316426c3ab25a79d77241550a909a07bfcb813359be9f3410edd3bfa2eff8f6c3494e9e5e7724c1184097b300ff86a7b73dd5a24e7000000000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0x100}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x40, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x8000000, 0xffffffffffffff5e) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x600, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x0, 0x10000}, 0x8000, 0x0, 0x0, 0x1, 0x80000000000}, 0x0, 0x2, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xf1c, 0x10001}, 0x40444, 0x0, 0x0, 0x0, 0x4fe8b, 0x0, 0xfffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 23:02:37 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086604, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000440)='cpuset.effective_cpus\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 454.498727][T14844] EXT4-fs warning (device sda1): __ext4_ioctl:1159: Setting inode version is not supported with metadata_csum enabled. 23:02:37 executing program 3: syz_clone(0xa9280000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x29, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/226, 0x1a, 0xe2, 0x1}, 0x20) 23:02:37 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x12, 0x7, 0x0, 0x5, 0x0, 0x1}, 0x48) 23:02:37 executing program 3: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f00)={0x9, 0x2, &(0x7f0000000d00)=@raw=[@map_idx], &(0x7f0000000d40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2}, 0x80) 23:02:38 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x408fc, 0x0, 0x0, 0x1, 0x3, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x80, 0x2, 0x0, 0x2001ff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e9a, 0x1, @perf_config_ext={0x8, 0x3}, 0x58000, 0x1000004, 0x3, 0x1, 0x3ff, 0xfcae, 0x8000, 0x0, 0xffffff7f, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'veth0_macvtap\x00', 0xa00}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x40fff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'macsec0\x00', @broadcast}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) sendmsg$inet(r5, &(0x7f0000000300)={&(0x7f0000000500)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0020000000000000000000000100000081000000000000000000000000000000000000000200000000020000000000000000000000000000000004000001000000020000000000000000f6a201000081000000070000008600000000010100db71728907d733e1d401bc52bd1c1ce88823c67e9f27e061425b333d8b7100000000000000008810c71800c064961e0cbb02e9ad78e5df79273077640faa07dfee4d11bf940245df514ddbdd3287fa838f4bb7591daf91154e051b287c2fe57ebc0000000064f3b9a07ee9d9ca5ae910f9794d000000fdffffff00"/239]}, 0x20000810) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='bv\xde\xec\x13\xd20\x00') socketpair(0x28, 0x3, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x8, 0xfe, 0x3, 0x0, 0x0, 0x4f, 0x100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x1d3a}, 0x208, 0x9, 0x4, 0x5, 0x400, 0x8, 0x0, 0x0, 0x4, 0x0, 0x800}, 0x0, 0x7, r0, 0x4) close(r1) 23:02:38 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x12, 0x3, 0x4, 0x7fffffff}, 0x48) 23:02:38 executing program 4: syz_clone(0xd20a0100, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:38 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x18}, 0xc) perf_event_open$cgroup(&(0x7f0000000b00)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:02:38 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800400000000000000085a9036d48bf44e9000020000080950db50b6cd4efdd73db5be3a6b70b743cf34bb83586780ee8f94038718579fc7c54400a4a68f9bdae19e71d83f97a173c9b4225e08ba71a1c268900000000f9573d850ca462cca8644d795a2cc61b7ee625a0b1673f31a04cea92eb0f35c240fc11a8816d2759fd0600b0f303adf7567518a490c3dbb48cc279000081e9fe0ce46bd9de5c193607436ebfdbd38e1ebaf0e73c4eb60c9cb82c120bd9d35e467d760e2efb3f35f59106cc369fab03ccbcf1e9d456330ce8bc297ef0e29208e299503409db388e08cea175ee1ed4eac44b43b66e83c74572fc0000000000000000000000000000000000000000b84825616d3f6f75e832b3dd6433dbba7ecf5c618a558078644b975a33dbb961b46490d2100e0f30130ffe4abe175aa8a5fe64aa510d39fb5e88869a307d64d3c70cee3604986905c9b8fb4710244fcfea3b144398051d26dce3a99bc9ebdb8c4c901c80c3200b402e8cfb99c27a6f8879c6d6733ed344f3fba8a21482967a847f316426c3ab25a79d77241550a909a07bfcb813359be9f3410edd3bfa2eff8f6c3494e9e5e7724c1184097b300ff86a7b73dd5a24e7000000000000000000"], &(0x7f0000000100)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0x100}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x40, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x8000000, 0xffffffffffffff5e) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x600, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x0, 0x10000}, 0x8000, 0x0, 0x0, 0x1, 0x80000000000}, 0x0, 0x2, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xf1c, 0x10001}, 0x40444, 0x0, 0x0, 0x0, 0x4fe8b, 0x0, 0xfffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 23:02:38 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0xcfd, 0x20, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 23:02:38 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x6609, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000006c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) 23:02:38 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x19, 0x0, 0x21) 23:02:38 executing program 2: bpf$MAP_CREATE(0x6, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 23:02:38 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0x100}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x40, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x8000000, 0xffffffffffffff5e) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x600, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x0, 0x10000}, 0x8000, 0x0, 0x0, 0x1, 0x80000000000}, 0x0, 0x2, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xf1c, 0x10001}, 0x40444, 0x0, 0x0, 0x0, 0x4fe8b, 0x0, 0xfffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) [ 455.000033][T10831] Bluetooth: hci0: command 0x040f tx timeout 23:02:38 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x7ff}, 0x408fc, 0x0, 0x0, 0x1, 0x3, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x80, 0x2, 0x0, 0x2001ff, 0x100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e9a, 0x1, @perf_config_ext={0x8, 0x3}, 0x58000, 0x1000004, 0x3, 0x1, 0x3ff, 0xfcae, 0x8000, 0x0, 0xffffff7f, 0x0, 0xffffffffffffffc0}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000240)={'veth0_macvtap\x00', 0xa00}) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)=0x40fff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$ITER_CREATE(0x21, &(0x7f0000000280)={r2}, 0x8) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000100)={'macsec0\x00', @broadcast}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) sendmsg$inet(r5, &(0x7f0000000300)={&(0x7f0000000500)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0020000000000000000000000100000081000000000000000000000000000000000000000200000000020000000000000000000000000000000004000001000000020000000000000000f6a201000081000000070000008600000000010100db71728907d733e1d401bc52bd1c1ce88823c67e9f27e061425b333d8b7100000000000000008810c71800c064961e0cbb02e9ad78e5df79273077640faa07dfee4d11bf940245df514ddbdd3287fa838f4bb7591daf91154e051b287c2fe57ebc0000000064f3b9a07ee9d9ca5ae910f9794d000000fdffffff00"/239]}, 0x20000810) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000200)='bv\xde\xec\x13\xd20\x00') socketpair(0x28, 0x3, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a1, &(0x7f0000000080)) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x8, 0xfe, 0x3, 0x0, 0x0, 0x4f, 0x100, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x0, 0x1d3a}, 0x208, 0x9, 0x4, 0x5, 0x400, 0x8, 0x0, 0x0, 0x4, 0x0, 0x800}, 0x0, 0x7, r0, 0x4) close(r1) 23:02:38 executing program 3: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000004c0)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 23:02:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x48}}, &(0x7f00000000c0)=""/150, 0x1a, 0x96, 0x1}, 0x20) 23:02:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4}}]}}, &(0x7f0000000140)=""/194, 0x32, 0xc2, 0x1}, 0x20) 23:02:38 executing program 4: syz_clone(0xd20a0100, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:38 executing program 3: r0 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x11, &(0x7f0000000040), 0x4) 23:02:38 executing program 0: syz_clone(0x36085100, 0x0, 0x0, 0x0, 0x0, 0x0) 23:02:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x1}]}}, &(0x7f00000003c0)=""/198, 0x26, 0xc6, 0x1}, 0x20) 23:02:38 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'hsr0\x00', 0x100}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x552d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x40, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r0}, 0x8) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'wg1\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) close(0xffffffffffffffff) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000200)=0x8000000, 0xffffffffffffff5e) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x5, 0x0, 0x4, 0x0, 0xfffffffffffffffe, 0x600, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x0, 0x10000}, 0x8000, 0x0, 0x0, 0x1, 0x80000000000}, 0x0, 0x2, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x0, 0x0) write$cgroup_int(r4, &(0x7f0000000200), 0x23000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xf1c, 0x10001}, 0x40444, 0x0, 0x0, 0x0, 0x4fe8b, 0x0, 0xfffc}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 23:02:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct, @fwd={0x1}]}, {0x0, [0x61]}}, &(0x7f00000003c0)=""/198, 0x33, 0xc6, 0x1}, 0x20) 23:02:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@ptr]}}, &(0x7f00000000c0)=""/150, 0x26, 0x96, 0x1}, 0x20) 23:02:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000000c0)=""/150, 0x1a, 0x96, 0x1}, 0x20) 23:02:38 executing program 1: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f00000003c0)=""/198, 0x26, 0xc6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r0, 0x0, 0x0}, 0x10) 23:02:38 executing program 3: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x1c}, 0xc) 23:02:38 executing program 5: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x24, 0x1, 0x0, 0x0}, 0x20) 23:02:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x11, 0x1, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}], &(0x7f0000000080)='GPL\x00', 0x4, 0xd7, &(0x7f00000000c0)=""/215, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) [ 455.630175][ T5696] Bluetooth: hci4: command 0x040f tx timeout 23:02:39 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) 23:02:39 executing program 1: bpf$BPF_PROG_QUERY(0x10, &(0x7f00000000c0)={0xffffffffffffffff, 0x24, 0x0, 0x0, 0x0}, 0x20) 23:02:39 executing program 3: syz_clone(0x42980300, &(0x7f0000000580), 0x0, &(0x7f0000000000), &(0x7f0000000040), 0x0) 23:02:39 executing program 0: syz_clone(0x40000000, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100), 0x0) 23:02:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000003c0)=""/198, 0x26, 0xc6, 0x1}, 0x20) 23:02:39 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='\x00\x00\x00\x00\x00\x00\x88'}, 0x30) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)) 23:02:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x7, [@var={0x5, 0x0, 0x0, 0xe, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000240)=""/157, 0x47, 0x9d, 0x1}, 0x20) 23:02:39 executing program 5: openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x10000, 0x0) 23:02:39 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, 0x0) 23:02:39 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x18, 0x4, 0x0, 0x0, 0x1, 0x1}, 0x48) 23:02:39 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0xcfd, 0x20, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x4}, 0x38) 23:02:39 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000000000000}, 0x48) 23:02:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0xcfd, 0x20, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f0000000000)="8e", &(0x7f0000000100)=""/111}, 0x20) 23:02:39 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x6) sendmsg(r1, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x2022) 23:02:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x6, 0x4, 0x1600, 0xff}, 0x48) 23:02:39 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0}, 0x2) sendmsg(r1, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 23:02:39 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='blkio.bfq.io_wait_time_recursive\x00', 0x26e1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0xfffffffffffffff8, 0xa58a}, 0x8400, 0xff, 0x3, 0x9, 0x3, 0x0, 0xfffe}, 0x0, 0xa, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000740)=0xffffffffffffff81) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0185879, &(0x7f0000000080)) write$cgroup_subtree(r1, &(0x7f0000000100), 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000780)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0185879, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0xfffffffffffffff8, 0xa58a}, 0x8400, 0xff, 0x3, 0x0, 0x3, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xa, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, &(0x7f0000000000), 0x19f}, 0x48) 23:02:39 executing program 2: syz_clone(0x24081000, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) 23:02:39 executing program 0: syz_clone(0x40000000, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100), 0x0) 23:02:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:39 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0xafd, 0x12) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, 0x0, 0xfffffffffffffd78) r2 = perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000001c0), 0x10) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='memory.current\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f00000000c0)='blkio.bfq.dequeue\x00', 0x0, 0x0) r5 = openat$cgroup_int(r3, &(0x7f00000003c0)='memory.high\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x4000000000000, 0xbfffffffffffffff}, 0x3844, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write$cgroup_int(r5, 0x0, 0x0) 23:02:39 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffdef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x8b10c27e4d70239c}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r4, 0xffffffffffffffff, 0x28, 0x6, r5}, 0x14) write$cgroup_int(r2, &(0x7f0000000040), 0x12) 23:02:39 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x6, 0x4, 0xcfd, 0x20, 0x0, 0x1}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, r0}, 0x38) 23:02:39 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x2000, 0x7f, 0x0, 0x1}, 0x48) 23:02:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f0000000040)={0x0, 0x29, 0x0}, 0x0) close(r0) recvmsg(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x0) 23:02:39 executing program 2: r0 = perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) 23:02:40 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xc, 0x4, 0x4, 0x7f, 0x0, 0x1}, 0x48) 23:02:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x1, 0x80}, 0x10, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) r1 = getpid() syz_clone(0x2000, &(0x7f00000004c0)="37812c9fc40bee21378bbf3df3ec34c7af9070cc4a5b7bf5273cbe4df952ae5f4f4e620ae20545774a18c023e3249c48d8f1af6a1515c2bdcb692e06aedc72e262f5ee6ca60c53883ff60d3304bf832b58c01a8d22262f3b126d102a20b769f28d79", 0x62, 0x0, &(0x7f0000000580), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x4, 0x7, 0x7, 0xc00, r0, 0xe3b, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x401, 0x3a, &(0x7f00000002c0)=""/58, 0x41000, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xf}, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9095, 0x0, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:02:40 executing program 3: socketpair(0xa, 0x3, 0x87, &(0x7f0000000740)) 23:02:40 executing program 0: perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 457.069719][ T5696] Bluetooth: hci0: command 0x0419 tx timeout 23:02:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:40 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x24b7}, 0x2000, 0x7, 0x1, 0x9, 0x2, 0x1, 0x0, 0x0, 0x6, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:40 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffdef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x8b10c27e4d70239c}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r4, 0xffffffffffffffff, 0x28, 0x6, r5}, 0x14) write$cgroup_int(r2, &(0x7f0000000040), 0x12) 23:02:40 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="ae0c89631718000000000400000000000016000000850000000000000000000000000000000000fddae21d5e08b84f7890f97589f47ec7a4a524e3cfa8746e05c4b4506fd4dcedd650726a257eef4ebcb0fa27f9aa325caab6b468cee168586b1030888a22cee034143f03f8e6989bb4e4034db07b7eaa3b0bed56e9d0af41e8d39ca3a5c295ee119b6aa066b56a88e1ce583d12e410a9231a5097fff729b190c790b7c727205611bbd36abf739368ef2400"/194], 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000ff07000000000000090000001d6affff010000000726ff7f0900000066e5c3507aa778bb1e2d"], &(0x7f0000000280)='syzkaller\x00', 0x401, 0x3a, &(0x7f00000002c0)=""/58, 0x41000, 0x6, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0xe, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) 23:02:40 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0xa, 0x40, 0x6, 0x5}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000003c0)={&(0x7f0000000480)='.', 0x0, 0x0, 0x0, 0x7bf, r0}, 0x38) 23:02:40 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffdef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x8b10c27e4d70239c}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r4, 0xffffffffffffffff, 0x28, 0x6, r5}, 0x14) write$cgroup_int(r2, &(0x7f0000000040), 0x12) 23:02:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x1, 0x80}, 0x10, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) r1 = getpid() syz_clone(0x2000, &(0x7f00000004c0)="37812c9fc40bee21378bbf3df3ec34c7af9070cc4a5b7bf5273cbe4df952ae5f4f4e620ae20545774a18c023e3249c48d8f1af6a1515c2bdcb692e06aedc72e262f5ee6ca60c53883ff60d3304bf832b58c01a8d22262f3b126d102a20b769f28d79", 0x62, 0x0, &(0x7f0000000580), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x4, 0x7, 0x7, 0xc00, r0, 0xe3b, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x401, 0x3a, &(0x7f00000002c0)=""/58, 0x41000, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xf}, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9095, 0x0, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:02:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="ae0c89631718000000000400000000000016000000850000000000000000000000000000000000fddae21d5e08b84f7890f97589f47ec7a4a524e3cfa8746e05c4b4506fd4dcedd650726a257eef4ebcb0fa27f9aa325caab6b468cee168586b1030888a22cee034143f03f8e6989bb4e4034db07b7eaa3b0bed56e9d0af41e8d39ca3a5c295ee119b6aa066b56a88e1ce583d12e410a9231a5097fff729b190c790b7c727205611bbd36abf739368ef2400"/194], 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000ff07000000000000090000001d6affff010000000726ff7f0900000066e5c3507aa778bb1e2d"], &(0x7f0000000280)='syzkaller\x00', 0x401, 0x3a, &(0x7f00000002c0)=""/58, 0x41000, 0x6, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0xe, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) [ 457.747658][T10831] Bluetooth: hci4: command 0x0419 tx timeout [ 457.756860][ T3637] syz-executor.1 invoked oom-killer: gfp_mask=0xdc0(GFP_KERNEL|__GFP_ZERO), order=0, oom_score_adj=0 [ 457.756893][ T3637] CPU: 0 PID: 3637 Comm: syz-executor.1 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 457.756918][ T3637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 457.756930][ T3637] Call Trace: [ 457.756936][ T3637] [ 457.756943][ T3637] dump_stack_lvl+0xcd/0x134 [ 457.756975][ T3637] dump_header+0x10b/0x7f9 [ 457.757004][ T3637] oom_kill_process.cold+0x10/0x15 23:02:41 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="ae0c89631718000000000400000000000016000000850000000000000000000000000000000000fddae21d5e08b84f7890f97589f47ec7a4a524e3cfa8746e05c4b4506fd4dcedd650726a257eef4ebcb0fa27f9aa325caab6b468cee168586b1030888a22cee034143f03f8e6989bb4e4034db07b7eaa3b0bed56e9d0af41e8d39ca3a5c295ee119b6aa066b56a88e1ce583d12e410a9231a5097fff729b190c790b7c727205611bbd36abf739368ef2400"/194], 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x1}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000ff07000000000000090000001d6affff010000000726ff7f0900000066e5c3507aa778bb1e2d"], &(0x7f0000000280)='syzkaller\x00', 0x401, 0x3a, &(0x7f00000002c0)=""/58, 0x41000, 0x6, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0xe, 0x4, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) 23:02:41 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x24b7}, 0x2000, 0x7, 0x1, 0x9, 0x2, 0x1, 0x0, 0x0, 0x6, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 457.757034][ T3637] out_of_memory+0x358/0x14b0 [ 457.757070][ T3637] ? find_held_lock+0x2d/0x110 23:02:41 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 457.757100][ T3637] ? oom_killer_disable+0x270/0x270 [ 457.757132][ T3637] ? find_held_lock+0x2d/0x110 [ 457.757163][ T3637] mem_cgroup_out_of_memory+0x206/0x270 [ 457.757191][ T3637] ? mem_cgroup_margin+0x130/0x130 [ 457.757215][ T3637] ? lock_downgrade+0x6e0/0x6e0 [ 457.757265][ T3637] try_charge_memcg+0xef9/0x1380 [ 457.757304][ T3637] ? mem_cgroup_handle_over_high+0x510/0x510 23:02:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x1, 0x80}, 0x10, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) r1 = getpid() syz_clone(0x2000, &(0x7f00000004c0)="37812c9fc40bee21378bbf3df3ec34c7af9070cc4a5b7bf5273cbe4df952ae5f4f4e620ae20545774a18c023e3249c48d8f1af6a1515c2bdcb692e06aedc72e262f5ee6ca60c53883ff60d3304bf832b58c01a8d22262f3b126d102a20b769f28d79", 0x62, 0x0, &(0x7f0000000580), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x4, 0x7, 0x7, 0xc00, r0, 0xe3b, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x401, 0x3a, &(0x7f00000002c0)=""/58, 0x41000, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xf}, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9095, 0x0, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 457.757336][ T3637] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 457.757365][ T3637] ? lock_downgrade+0x6e0/0x6e0 [ 457.757404][ T3637] ? lock_downgrade+0x6e0/0x6e0 23:02:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x24b7}, 0x2000, 0x7, 0x1, 0x9, 0x2, 0x1, 0x0, 0x0, 0x6, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 457.757434][ T3637] ? rcu_read_unlock+0x9/0x60 [ 457.757474][ T3637] obj_cgroup_charge+0x2ab/0x5e0 [ 457.757509][ T3637] ? __alloc_file+0x21/0x270 [ 457.757532][ T3637] kmem_cache_alloc+0x92/0x3b0 [ 457.757561][ T3637] ? stack_trace_save+0x8c/0xc0 [ 457.757595][ T3637] __alloc_file+0x21/0x270 [ 457.757621][ T3637] alloc_empty_file+0x6d/0x170 23:02:42 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffdef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x8b10c27e4d70239c}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r4, 0xffffffffffffffff, 0x28, 0x6, r5}, 0x14) write$cgroup_int(r2, &(0x7f0000000040), 0x12) [ 457.757648][ T3637] path_openat+0xe4/0x2910 [ 457.757671][ T3637] ? __lock_acquire+0x163e/0x5660 [ 457.757717][ T3637] ? path_lookupat+0x860/0x860 [ 457.757741][ T3637] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 457.757793][ T3637] do_filp_open+0x1aa/0x400 [ 457.757818][ T3637] ? may_open_dev+0xf0/0xf0 23:02:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x1, 0x80}, 0x10, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) r1 = getpid() syz_clone(0x2000, &(0x7f00000004c0)="37812c9fc40bee21378bbf3df3ec34c7af9070cc4a5b7bf5273cbe4df952ae5f4f4e620ae20545774a18c023e3249c48d8f1af6a1515c2bdcb692e06aedc72e262f5ee6ca60c53883ff60d3304bf832b58c01a8d22262f3b126d102a20b769f28d79", 0x62, 0x0, &(0x7f0000000580), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x4, 0x7, 0x7, 0xc00, r0, 0xe3b, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000008c0)={0x11, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB], &(0x7f0000000280)='syzkaller\x00', 0x401, 0x3a, &(0x7f00000002c0)=""/58, 0x41000, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x8, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xf}, 0x440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9095, 0x0, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 457.757847][ T3637] ? alloc_fd+0x2f0/0x670 [ 457.757880][ T3637] ? lock_downgrade+0x6e0/0x6e0 [ 457.757915][ T3637] ? rwlock_bug.part.0+0x90/0x90 [ 457.757942][ T3637] ? _find_next_bit+0x1e3/0x260 [ 457.757977][ T3637] ? _raw_spin_unlock+0x24/0x40 23:02:42 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 457.758004][ T3637] ? alloc_fd+0x2f0/0x670 [ 457.758044][ T3637] do_sys_openat2+0x16d/0x4c0 23:02:42 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 457.758071][ T3637] ? find_held_lock+0x2d/0x110 [ 457.758103][ T3637] ? build_open_flags+0x6f0/0x6f0 [ 457.758134][ T3637] ? lock_downgrade+0x6e0/0x6e0 [ 457.758175][ T3637] __x64_sys_openat+0x13f/0x1f0 [ 457.758204][ T3637] ? __ia32_sys_open+0x1c0/0x1c0 [ 457.758236][ T3637] ? syscall_enter_from_user_mode+0x21/0x70 [ 457.758264][ T3637] ? syscall_enter_from_user_mode+0x21/0x70 [ 457.758298][ T3637] do_syscall_64+0x35/0xb0 [ 457.758328][ T3637] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 457.758356][ T3637] RIP: 0033:0x7fea66688c48 [ 457.758377][ T3637] Code: 24 18 31 c0 41 83 e2 40 75 40 89 f0 25 00 00 41 00 3d 00 00 41 00 74 32 44 89 c2 4c 89 ce bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 40 48 8b 4c 24 18 64 48 2b 0c 25 28 00 00 00 [ 457.758399][ T3637] RSP: 002b:00007ffd8fe10d30 EFLAGS: 00000287 ORIG_RAX: 0000000000000101 [ 457.758423][ T3637] RAX: ffffffffffffffda RBX: 00000000000005ce RCX: 00007fea66688c48 23:02:43 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffdef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x8b10c27e4d70239c}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r4, 0xffffffffffffffff, 0x28, 0x6, r5}, 0x14) write$cgroup_int(r2, &(0x7f0000000040), 0x12) 23:02:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:43 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffdef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x8b10c27e4d70239c}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r4, 0xffffffffffffffff, 0x28, 0x6, r5}, 0x14) write$cgroup_int(r2, &(0x7f0000000040), 0x12) 23:02:43 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x1300, 0x7f, 0x0, 0x1}, 0x48) [ 457.758440][ T3637] RDX: 0000000000090800 RSI: 00007ffd8fe11f20 RDI: 00000000ffffff9c [ 457.758456][ T3637] RBP: 00007ffd8fe11efc R08: 0000000000090800 R09: 00007ffd8fe11f20 [ 457.758471][ T3637] R10: 0000000000000000 R11: 0000000000000287 R12: 00007fea666e2218 23:02:44 executing program 2: syz_clone(0x41400, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='C') [ 457.758486][ T3637] R13: 00007ffd8fe11f20 R14: 0000000000000011 R15: 00007ffd8fe11f60 [ 457.758523][ T3637] [ 457.803784][ T3637] memory: usage 2660kB, limit 0kB, failcnt 20 [ 457.803803][ T3637] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 23:02:44 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) 23:02:44 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = bpf$ITER_CREATE(0x21, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfffffdef) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(r1, 0x0, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='freezer.state\x00', 0x0, 0x0) syz_clone(0x0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x8b10c27e4d70239c}, 0x10) r5 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00', 0x0, 0x8}, 0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@cgroup=r4, 0xffffffffffffffff, 0x28, 0x6, r5}, 0x14) write$cgroup_int(r2, &(0x7f0000000040), 0x12) [ 457.803817][ T3637] Memory cgroup stats for /syz1: [ 457.804023][ T3637] anon 57344 [ 457.804023][ T3637] file 274432 [ 457.804023][ T3637] kernel 2392064 [ 457.804023][ T3637] kernel_stack 0 [ 457.804023][ T3637] pagetables 8192 [ 457.804023][ T3637] percpu 0 [ 457.804023][ T3637] sock 0 [ 457.804023][ T3637] vmalloc 0 [ 457.804023][ T3637] shmem 204800 [ 457.804023][ T3637] zswap 0 [ 457.804023][ T3637] zswapped 0 [ 457.804023][ T3637] file_mapped 204800 [ 457.804023][ T3637] file_dirty 49152 [ 457.804023][ T3637] file_writeback 0 [ 457.804023][ T3637] swapcached 0 23:02:44 executing program 5: syz_clone(0x10002100, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) [ 457.804023][ T3637] anon_thp 0 [ 457.804023][ T3637] file_thp 0 [ 457.804023][ T3637] shmem_thp 0 [ 457.804023][ T3637] inactive_anon 65536 [ 457.804023][ T3637] active_anon 196608 [ 457.804023][ T3637] inactive_file 36864 [ 457.804023][ T3637] active_file 32768 [ 457.804023][ T3637] unevictable 0 [ 457.804023][ T3637] slab_reclaimable 834496 [ 457.804023][ T3637] slab_unreclaimable 1541032 [ 457.804023][ T3637] slab 2375528 23:02:44 executing program 5: syz_clone(0x60000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x0) 23:02:44 executing program 2: syz_clone(0x41400, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='C') 23:02:44 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4f00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x3, 0x4d68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:02:44 executing program 2: syz_clone(0x18988000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 457.804090][ T3637] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=3637,uid=0 [ 457.805408][ T3637] Memory cgroup out of memory: Killed process 3637 (syz-executor.1) total-vm:50536kB, anon-rss:396kB, file-rss:9072kB, shmem-rss:4kB, UID:0 pgtables:68kB oom_score_adj:0 [ 458.909129][T15017] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 23:02:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 23:02:45 executing program 2: openat$ppp(0xffffffffffffff9c, 0x0, 0x454c80, 0x0) syz_clone(0x60000000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)) [ 458.909167][T15017] CPU: 1 PID: 15017 Comm: syz-executor.0 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 458.909196][T15017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 458.909210][T15017] Call Trace: [ 458.909216][T15017] [ 458.909226][T15017] dump_stack_lvl+0xcd/0x134 [ 458.909261][T15017] dump_header+0x10b/0x7f9 [ 458.909296][T15017] oom_kill_process.cold+0x10/0x15 [ 458.909331][T15017] out_of_memory+0x358/0x14b0 [ 458.909377][T15017] ? oom_killer_disable+0x270/0x270 [ 458.909416][T15017] ? io_schedule_timeout+0x140/0x140 [ 458.909462][T15017] mem_cgroup_out_of_memory+0x206/0x270 [ 458.909492][T15017] ? mem_cgroup_margin+0x130/0x130 [ 458.909543][T15017] memory_max_write+0x25c/0x3b0 [ 458.909580][T15017] ? mem_cgroup_force_empty_write+0x150/0x150 [ 458.909617][T15017] ? lock_release+0x780/0x780 [ 458.909654][T15017] cgroup_file_write+0x1de/0x770 [ 458.909682][T15017] ? mem_cgroup_force_empty_write+0x150/0x150 [ 458.909724][T15017] ? kill_css+0x370/0x370 [ 458.909746][T15017] ? __phys_addr+0xc4/0x140 [ 458.909792][T15017] ? kill_css+0x370/0x370 [ 458.909816][T15017] kernfs_fop_write_iter+0x3f8/0x610 [ 458.909854][T15017] new_sync_write+0x38a/0x560 [ 458.909889][T15017] ? new_sync_read+0x5f0/0x5f0 [ 458.909930][T15017] ? lock_release+0x780/0x780 [ 458.909989][T15017] vfs_write+0x7c0/0xac0 [ 458.910029][T15017] ksys_write+0x127/0x250 [ 458.910061][T15017] ? __ia32_sys_read+0xb0/0xb0 [ 458.910094][T15017] ? syscall_enter_from_user_mode+0x21/0x70 [ 458.910124][T15017] ? syscall_enter_from_user_mode+0x21/0x70 [ 458.910163][T15017] do_syscall_64+0x35/0xb0 [ 458.910195][T15017] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 458.910225][T15017] RIP: 0033:0x7f81ede89109 [ 458.910247][T15017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 458.910273][T15017] RSP: 002b:00007f81eef7c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 458.910299][T15017] RAX: ffffffffffffffda RBX: 00007f81edf9c030 RCX: 00007f81ede89109 [ 458.910318][T15017] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 458.910335][T15017] RBP: 00007f81edee30ad R08: 0000000000000000 R09: 0000000000000000 [ 458.910351][T15017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 458.910366][T15017] R13: 00007ffe9c0dc2ef R14: 00007f81eef7c300 R15: 0000000000022000 [ 458.910409][T15017] [ 458.978618][T15017] memory: usage 4404kB, limit 0kB, failcnt 79 [ 458.978639][T15017] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 458.978654][T15017] Memory cgroup stats for /syz0: [ 459.101597][T15017] anon 147456 [ 459.101597][T15017] file 266240 [ 459.101597][T15017] kernel 4096000 [ 459.101597][T15017] kernel_stack 98304 [ 459.101597][T15017] pagetables 77824 [ 459.101597][T15017] percpu 16576 [ 459.101597][T15017] sock 0 [ 459.101597][T15017] vmalloc 0 [ 459.101597][T15017] shmem 237568 [ 459.101597][T15017] zswap 0 [ 459.101597][T15017] zswapped 0 [ 459.101597][T15017] file_mapped 200704 [ 459.101597][T15017] file_dirty 28672 [ 459.101597][T15017] file_writeback 0 [ 459.101597][T15017] swapcached 0 [ 459.101597][T15017] anon_thp 0 [ 459.101597][T15017] file_thp 0 [ 459.101597][T15017] shmem_thp 0 [ 459.101597][T15017] inactive_anon 221184 [ 459.101597][T15017] active_anon 163840 [ 459.101597][T15017] inactive_file 12288 [ 459.101597][T15017] active_file 16384 [ 459.101597][T15017] unevictable 0 [ 459.101597][T15017] slab_reclaimable 760736 [ 459.101597][T15017] slab_unreclaimable 3116936 [ 459.101597][T15017] slab 3877672 [ 459.101706][T15017] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=13214,uid=0 [ 459.101852][T15017] Memory cgroup out of memory: Killed process 13214 (syz-executor.0) total-vm:50536kB, anon-rss:384kB, file-rss:9072kB, shmem-rss:64kB, UID:0 pgtables:68kB oom_score_adj:0 [ 463.131202][ T3695] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 463.190187][ T3695] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 463.245420][ T3695] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 463.310706][ T3695] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 465.443655][ T3695] device hsr_slave_0 left promiscuous mode [ 465.444181][ T3695] device hsr_slave_1 left promiscuous mode [ 465.444543][ T3695] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 465.444580][ T3695] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 465.445731][ T3695] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 465.445745][ T3695] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 465.448663][ T3695] device hsr_slave_0 left promiscuous mode [ 465.448981][ T3695] device hsr_slave_1 left promiscuous mode [ 465.449300][ T3695] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 465.449321][ T3695] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 465.456787][ T3695] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 465.456811][ T3695] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 465.494489][ T3695] device veth1_macvtap left promiscuous mode [ 465.494527][ T3695] device veth0_macvtap left promiscuous mode [ 465.494604][ T3695] device veth1_vlan left promiscuous mode [ 465.494656][ T3695] device veth0_vlan left promiscuous mode [ 465.495407][ T3695] device veth1_macvtap left promiscuous mode [ 465.495439][ T3695] device veth0_macvtap left promiscuous mode [ 465.495506][ T3695] device veth1_vlan left promiscuous mode [ 465.495555][ T3695] device veth0_vlan left promiscuous mode [ 465.803000][ T3695] team0 (unregistering): Port device team_slave_1 removed [ 465.810943][ T3695] team0 (unregistering): Port device team_slave_0 removed [ 465.835070][ T3695] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 465.839389][ T3695] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 465.907759][ T3695] bond0 (unregistering): Released all slaves [ 466.005255][ T3695] team0 (unregistering): Port device team_slave_1 removed [ 466.017469][ T3695] team0 (unregistering): Port device team_slave_0 removed [ 466.031135][ T3695] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 466.037023][ T3695] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 466.109351][ T3695] bond0 (unregistering): Released all slaves [ 466.351119][ T3648] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 467.159701][ T3654] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 471.309863][ T3654] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 472.030184][ T3648] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 473.719455][ T3654] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 473.720506][ T3654] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 473.720968][ T3654] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 473.721772][ T3654] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 473.722261][ T3654] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 473.722513][ T3654] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 473.815799][T15290] chnl_net:caif_netlink_parms(): no params data found [ 473.850358][T15290] bridge0: port 1(bridge_slave_0) entered blocking state [ 473.850488][T15290] bridge0: port 1(bridge_slave_0) entered disabled state [ 473.851652][T15290] device bridge_slave_0 entered promiscuous mode [ 473.853991][T15290] bridge0: port 2(bridge_slave_1) entered blocking state [ 473.854107][T15290] bridge0: port 2(bridge_slave_1) entered disabled state [ 473.855128][T15290] device bridge_slave_1 entered promiscuous mode [ 473.903344][T15290] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 473.904783][T15290] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 473.939312][T15290] team0: Port device team_slave_0 added [ 473.943941][T15290] team0: Port device team_slave_1 added [ 473.960188][T15290] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 473.960204][T15290] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 473.960227][T15290] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 473.961370][T15290] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 473.961382][T15290] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 473.961407][T15290] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 473.978549][T15290] device hsr_slave_0 entered promiscuous mode [ 473.984147][T15290] device hsr_slave_1 entered promiscuous mode [ 474.016476][T15290] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 474.016504][T15290] Cannot create hsr debugfs directory [ 474.140347][T15290] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.140429][T15290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.140590][T15290] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.140672][T15290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.190605][T15290] 8021q: adding VLAN 0 to HW filter on device bond0 [ 474.195756][ T5696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 474.196321][ T5696] bridge0: port 1(bridge_slave_0) entered disabled state [ 474.196784][ T5696] bridge0: port 2(bridge_slave_1) entered disabled state [ 474.197710][ T5696] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 474.212067][T15290] 8021q: adding VLAN 0 to HW filter on device team0 [ 474.222604][ T5696] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 474.223076][ T5696] bridge0: port 1(bridge_slave_0) entered blocking state [ 474.223130][ T5696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 474.227504][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 474.227909][ T23] bridge0: port 2(bridge_slave_1) entered blocking state [ 474.227968][ T23] bridge0: port 2(bridge_slave_1) entered forwarding state [ 474.260139][ T5696] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 474.260875][ T5696] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 474.271366][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 474.287123][ T5696] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 474.293053][ T23] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 474.296247][T15290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 474.310445][ T5696] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 474.310560][ T5696] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 474.318548][T15290] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 474.742372][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 474.774510][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.775314][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 474.775860][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 474.804951][T15290] device veth0_vlan entered promiscuous mode [ 474.817387][T15290] device veth1_vlan entered promiscuous mode [ 474.854964][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 474.855561][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 474.862709][T15290] device veth0_macvtap entered promiscuous mode [ 474.872456][T15290] device veth1_macvtap entered promiscuous mode [ 474.895491][T15290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 474.895512][T15290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 474.895522][T15290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 474.895536][T15290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 474.895546][T15290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 474.895561][T15290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 474.895571][T15290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 474.895586][T15290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 474.896962][T15290] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 474.897072][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 474.897688][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 474.898253][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 474.898777][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 474.903810][T15290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 474.903830][T15290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 474.903839][T15290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 474.903854][T15290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 474.903863][T15290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 474.903876][T15290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 474.903884][T15290] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 474.903896][T15290] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 474.905079][T15290] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 474.905187][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 474.905817][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 475.033773][ T3701] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 475.033793][ T3701] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 475.036293][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 475.108474][ T3701] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 475.108494][ T3701] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 475.115169][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 475.495590][T15337] syz-executor.1 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 475.495655][T15337] CPU: 0 PID: 15337 Comm: syz-executor.1 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 475.495673][T15337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.495681][T15337] Call Trace: [ 475.495685][T15337] [ 475.495690][T15337] dump_stack_lvl+0xcd/0x134 [ 475.495713][T15337] dump_header+0x10b/0x7f9 [ 475.495732][T15337] oom_kill_process.cold+0x10/0x15 [ 475.495750][T15337] out_of_memory+0x358/0x14b0 [ 475.495775][T15337] ? oom_killer_disable+0x270/0x270 [ 475.495795][T15337] ? io_schedule_timeout+0x140/0x140 [ 475.495813][T15337] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 475.495834][T15337] mem_cgroup_out_of_memory+0x206/0x270 [ 475.495852][T15337] ? mem_cgroup_margin+0x130/0x130 [ 475.495879][T15337] memory_max_write+0x25c/0x3b0 [ 475.495898][T15337] ? mem_cgroup_force_empty_write+0x150/0x150 23:02:58 executing program 3: syz_clone(0x41400, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 23:02:58 executing program 2: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000002240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0xa, 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xa0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41}, 0x15) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0xe, 0x2000000, &(0x7f00000000c0)="61df712bc884fed5722780b6c2a7", 0x0, 0x8000}, 0x28) 23:02:58 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 23:02:58 executing program 1: syz_clone(0x40a09100, 0x0, 0xffffffffffffff90, 0x0, 0x0, 0x0) [ 475.495917][T15337] ? lock_release+0x780/0x780 [ 475.495941][T15337] cgroup_file_write+0x1de/0x770 [ 475.495960][T15337] ? mem_cgroup_force_empty_write+0x150/0x150 [ 475.495978][T15337] ? kill_css+0x370/0x370 [ 475.495990][T15337] ? __phys_addr+0xc4/0x140 [ 475.496015][T15337] ? kill_css+0x370/0x370 [ 475.496029][T15337] kernfs_fop_write_iter+0x3f8/0x610 [ 475.496052][T15337] new_sync_write+0x38a/0x560 [ 475.496070][T15337] ? new_sync_read+0x5f0/0x5f0 [ 475.496086][T15337] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 475.496113][T15337] ? lockdep_hardirqs_on+0x79/0x100 [ 475.496127][T15337] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 475.496151][T15337] ? vfs_write+0x6af/0xac0 [ 475.496169][T15337] vfs_write+0x7c0/0xac0 [ 475.496189][T15337] ksys_write+0x127/0x250 [ 475.496206][T15337] ? __ia32_sys_read+0xb0/0xb0 [ 475.496223][T15337] ? syscall_enter_from_user_mode+0x21/0x70 [ 475.496238][T15337] ? syscall_enter_from_user_mode+0x21/0x70 [ 475.496258][T15337] do_syscall_64+0x35/0xb0 [ 475.496275][T15337] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 475.496291][T15337] RIP: 0033:0x7f78f1c89109 [ 475.496303][T15337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 475.496317][T15337] RSP: 002b:00007f78f2dd3168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 475.496332][T15337] RAX: ffffffffffffffda RBX: 00007f78f1d9bf60 RCX: 00007f78f1c89109 [ 475.496341][T15337] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 475.496350][T15337] RBP: 00007f78f1ce30ad R08: 0000000000000000 R09: 0000000000000000 [ 475.496358][T15337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 475.496367][T15337] R13: 00007ffcacc2143f R14: 00007f78f2dd3300 R15: 0000000000022000 [ 475.496388][T15337] [ 475.496405][T15337] memory: usage 776kB, limit 0kB, failcnt 37 [ 475.496430][T15337] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 475.496439][T15337] Memory cgroup stats for /syz1: [ 475.497037][T15337] anon 135168 [ 475.497037][T15337] file 229376 [ 475.497037][T15337] kernel 430080 [ 475.497037][T15337] kernel_stack 98304 [ 475.497037][T15337] pagetables 77824 [ 475.497037][T15337] percpu 0 [ 475.497037][T15337] sock 0 [ 475.497037][T15337] vmalloc 0 [ 475.497037][T15337] shmem 204800 [ 475.497037][T15337] zswap 0 [ 475.497037][T15337] zswapped 0 [ 475.497037][T15337] file_mapped 204800 [ 475.497037][T15337] file_dirty 0 [ 475.497037][T15337] file_writeback 0 [ 475.497037][T15337] swapcached 0 [ 475.497037][T15337] anon_thp 0 [ 475.497037][T15337] file_thp 0 [ 475.497037][T15337] shmem_thp 0 [ 475.497037][T15337] inactive_anon 143360 [ 475.497037][T15337] active_anon 196608 [ 475.497037][T15337] inactive_file 12288 [ 475.497037][T15337] active_file 12288 [ 475.497037][T15337] unevictable 0 [ 475.497037][T15337] slab_reclaimable 47120 [ 475.497037][T15337] slab_unreclaimable 176184 [ 475.497037][T15337] slab 223304 [ 475.497145][T15337] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15336,uid=0 [ 475.497562][T15337] Memory cgroup out of memory: Killed process 15336 (syz-executor.1) total-vm:56688kB, anon-rss:428kB, file-rss:8944kB, shmem-rss:56kB, UID:0 pgtables:84kB oom_score_adj:1000 [ 475.760719][T15290] syz-executor.1 invoked oom-killer: gfp_mask=0x400cc0(GFP_KERNEL_ACCOUNT), order=0, oom_score_adj=0 [ 475.760753][T15290] CPU: 0 PID: 15290 Comm: syz-executor.1 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 475.760778][T15290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 475.760791][T15290] Call Trace: [ 475.760797][T15290] [ 475.760806][T15290] dump_stack_lvl+0xcd/0x134 [ 475.760838][T15290] dump_header+0x10b/0x7f9 [ 475.760870][T15290] oom_kill_process.cold+0x10/0x15 [ 475.760901][T15290] out_of_memory+0x358/0x14b0 [ 475.760938][T15290] ? find_held_lock+0x2d/0x110 [ 475.760975][T15290] ? oom_killer_disable+0x270/0x270 [ 475.761012][T15290] ? find_held_lock+0x2d/0x110 [ 475.761046][T15290] mem_cgroup_out_of_memory+0x206/0x270 [ 475.761077][T15290] ? mem_cgroup_margin+0x130/0x130 [ 475.761103][T15290] ? lock_downgrade+0x6e0/0x6e0 [ 475.761151][T15290] try_charge_memcg+0xef9/0x1380 [ 475.761191][T15290] ? mem_cgroup_handle_over_high+0x510/0x510 [ 475.761223][T15290] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 475.761252][T15290] ? lock_downgrade+0x6e0/0x6e0 [ 475.761287][T15290] ? lock_downgrade+0x6e0/0x6e0 [ 475.761317][T15290] ? rcu_read_unlock+0x9/0x60 [ 475.761356][T15290] obj_cgroup_charge+0x2ab/0x5e0 [ 475.761393][T15290] ? kvmalloc_node+0x3e/0x190 [ 475.761418][T15290] __kmalloc_node+0xa7/0x390 [ 475.761454][T15290] kvmalloc_node+0x3e/0x190 [ 475.761483][T15290] xt_alloc_table_info+0x3c/0xa0 [ 475.761571][T15290] do_ipt_set_ctl+0x500/0xb80 [ 475.761618][T15290] ? __mutex_lock+0x231/0x1350 [ 475.761645][T15290] ? compat_do_replace.constprop.0+0x470/0x470 [ 475.761686][T15290] ? wait_for_completion_io_timeout+0x20/0x20 [ 475.761734][T15290] ? nf_sockopt_find.constprop.0+0x22d/0x2a0 [ 475.761786][T15290] nf_setsockopt+0x83/0xe0 [ 475.761816][T15290] ip_setsockopt+0x3c3/0x3ab0 [ 475.761877][T15290] ? ip_sock_set_tos+0x30/0x30 [ 475.761902][T15290] ? mark_lock.part.0+0xee/0x1910 [ 475.761932][T15290] ? lock_chain_count+0x20/0x20 [ 475.761962][T15290] ? aa_profile_af_perm+0x2e0/0x2e0 [ 475.762037][T15290] ? lock_chain_count+0x20/0x20 [ 475.762065][T15290] ? __vfree+0x3c/0xd0 [ 475.762111][T15290] ? tcp_setsockopt+0x136/0x2520 [ 475.762135][T15290] tcp_setsockopt+0x136/0x2520 [ 475.762167][T15290] ? tcp_sock_set_keepidle+0x40/0x40 [ 475.762200][T15290] ? aa_sk_perm+0x30f/0xaa0 [ 475.762228][T15290] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 475.762264][T15290] ? aa_af_perm+0x230/0x230 [ 475.762290][T15290] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 475.762332][T15290] ? sock_common_setsockopt+0x2b/0x100 [ 475.762366][T15290] __sys_setsockopt+0x2db/0x6a0 [ 475.762393][T15290] ? sock_common_recvmsg+0x190/0x190 [ 475.762420][T15290] ? __ia32_sys_recv+0x100/0x100 [ 475.762447][T15290] ? lock_downgrade+0x6e0/0x6e0 [ 475.762475][T15290] ? acct_account_cputime+0x19d/0x310 [ 475.762524][T15290] __x64_sys_setsockopt+0xba/0x150 [ 475.762550][T15290] ? syscall_enter_from_user_mode+0x21/0x70 [ 475.762578][T15290] do_syscall_64+0x35/0xb0 [ 475.762607][T15290] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 475.762635][T15290] RIP: 0033:0x7f78f1c8a75a [ 475.762656][T15290] Code: 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 36 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 475.762680][T15290] RSP: 002b:00007ffcacc20fa8 EFLAGS: 00000206 ORIG_RAX: 0000000000000036 [ 475.762703][T15290] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f78f1c8a75a [ 475.762719][T15290] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 475.762734][T15290] RBP: 00007ffcacc20fd0 R08: 0000000000000408 R09: fefefefefefeff64 [ 475.762750][T15290] R10: 00007f78f1d6db00 R11: 0000000000000206 R12: 00007ffcacc21030 [ 475.762766][T15290] R13: 0000000000000003 R14: 00007ffcacc20fcc R15: 00007f78f1d6daa0 [ 475.762802][T15290] [ 475.762810][T15290] memory: usage 528kB, limit 0kB, failcnt 56 [ 475.762824][T15290] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 475.762838][T15290] Memory cgroup stats for /syz1: [ 475.763228][T15290] anon 45056 [ 475.763228][T15290] file 229376 [ 475.763228][T15290] kernel 266240 [ 475.763228][T15290] kernel_stack 0 [ 475.763228][T15290] pagetables 8192 [ 475.763228][T15290] percpu 0 [ 475.763228][T15290] sock 0 [ 475.763228][T15290] vmalloc 0 [ 475.763228][T15290] shmem 204800 [ 475.763228][T15290] zswap 0 [ 475.763228][T15290] zswapped 0 [ 475.763228][T15290] file_mapped 204800 [ 475.763228][T15290] file_dirty 0 [ 475.763228][T15290] file_writeback 0 [ 475.763228][T15290] swapcached 0 [ 475.763228][T15290] anon_thp 0 [ 475.763228][T15290] file_thp 0 [ 475.763228][T15290] shmem_thp 0 [ 475.763228][T15290] inactive_anon 53248 [ 475.763228][T15290] active_anon 196608 [ 475.763228][T15290] inactive_file 12288 [ 475.763228][T15290] active_file 12288 [ 475.763228][T15290] unevictable 0 [ 475.763228][T15290] slab_reclaimable 62552 [ 475.763228][T15290] slab_unreclaimable 181600 [ 475.763228][T15290] slab 244152 [ 475.763228][T15290] workingset_refault_anon 0 [ 475.763298][T15290] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz1,mems_allowed=0-1,oom_memcg=/syz1,task_memcg=/syz1,task=syz-executor.1,pid=15290,uid=0 [ 475.763398][T15290] Memory cgroup out of memory: Killed process 15290 (syz-executor.1) total-vm:50536kB, anon-rss:372kB, file-rss:8384kB, shmem-rss:0kB, UID:0 pgtables:72kB oom_score_adj:0 [ 475.801624][ T5696] Bluetooth: hci2: command 0x0409 tx timeout [ 476.509900][ T3654] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 477.292194][ T47] device hsr_slave_0 left promiscuous mode [ 477.301288][ T47] device hsr_slave_1 left promiscuous mode [ 477.313315][ T47] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 477.313347][ T47] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 477.315598][ T47] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 477.315619][ T47] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 477.408311][ T47] device bridge_slave_1 left promiscuous mode [ 477.408457][ T47] bridge0: port 2(bridge_slave_1) entered disabled state [ 477.411817][ T47] device bridge_slave_0 left promiscuous mode [ 477.411955][ T47] bridge0: port 1(bridge_slave_0) entered disabled state [ 477.418273][ T47] device veth1_macvtap left promiscuous mode [ 477.418338][ T47] device veth0_macvtap left promiscuous mode [ 477.418457][ T47] device veth1_vlan left promiscuous mode [ 477.418542][ T47] device veth0_vlan left promiscuous mode [ 477.693897][ T47] team0 (unregistering): Port device team_slave_1 removed [ 477.698384][ T47] team0 (unregistering): Port device team_slave_0 removed [ 477.725670][ T47] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 477.744263][ T47] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 477.804730][ T47] bond0 (unregistering): Released all slaves [ 479.476517][ T3648] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 479.478121][ T3648] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 479.478910][ T3648] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 479.486833][ T3648] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 479.487450][ T3648] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 479.487685][ T3648] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 479.582137][T15392] chnl_net:caif_netlink_parms(): no params data found [ 479.617888][T15392] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.617964][T15392] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.618555][T15392] device bridge_slave_0 entered promiscuous mode [ 479.622758][T15392] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.622814][T15392] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.623754][T15392] device bridge_slave_1 entered promiscuous mode [ 479.656841][T15392] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 479.659141][T15392] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 479.699023][T15392] team0: Port device team_slave_0 added [ 479.700845][T15392] team0: Port device team_slave_1 added [ 479.719174][T15392] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 479.719189][T15392] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 479.719215][T15392] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 479.725057][T15392] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 479.725072][T15392] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 479.725099][T15392] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 479.814920][T15392] device hsr_slave_0 entered promiscuous mode [ 479.815474][T15392] device hsr_slave_1 entered promiscuous mode [ 479.815775][T15392] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 479.815790][T15392] Cannot create hsr debugfs directory [ 479.894490][T15392] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.894537][T15392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 479.894629][T15392] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.894669][T15392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.939113][T15392] 8021q: adding VLAN 0 to HW filter on device bond0 [ 479.948380][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 479.950946][T15097] bridge0: port 1(bridge_slave_0) entered disabled state [ 479.952185][T15097] bridge0: port 2(bridge_slave_1) entered disabled state [ 479.953969][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 479.975041][T15392] 8021q: adding VLAN 0 to HW filter on device team0 [ 479.985476][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 479.985902][T15097] bridge0: port 1(bridge_slave_0) entered blocking state [ 479.985960][T15097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 479.993639][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 479.994078][T15093] bridge0: port 2(bridge_slave_1) entered blocking state [ 479.994142][T15093] bridge0: port 2(bridge_slave_1) entered forwarding state [ 480.010146][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 480.011113][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 480.016929][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 480.023544][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 480.028990][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 480.034105][T15392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 480.050084][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 480.050204][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 480.057263][T15392] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 480.312631][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 480.318326][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 480.318778][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 480.319055][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 480.322930][T15392] device veth0_vlan entered promiscuous mode [ 480.329066][T15392] device veth1_vlan entered promiscuous mode [ 480.365071][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 480.365642][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 480.366318][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 480.371755][T15392] device veth0_macvtap entered promiscuous mode [ 480.375609][T15392] device veth1_macvtap entered promiscuous mode [ 480.393027][T15392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 480.393047][T15392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 480.393057][T15392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 480.393071][T15392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 480.393080][T15392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 480.393094][T15392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 480.393103][T15392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 480.393117][T15392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 480.394883][T15392] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 480.394994][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 480.414032][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 480.417474][T15392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 480.417492][T15392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 480.417501][T15392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 480.417515][T15392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 480.417526][T15392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 480.417539][T15392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 480.417549][T15392] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 480.417563][T15392] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 480.419148][T15392] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 480.440002][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 480.531906][ T1042] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 480.531926][ T1042] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 480.533798][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 480.578292][ T3701] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 480.578312][ T3701] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 480.582292][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready 23:03:04 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r3) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) 23:03:04 executing program 5: syz_clone(0x60000000, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000180), 0x0) 23:03:04 executing program 0: syz_clone(0xc8180400, &(0x7f0000000040), 0x0, &(0x7f0000000080), 0x0, 0x0) 23:03:04 executing program 2: syz_clone(0xc8180400, 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:04 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x16, 0x0, 0x7, 0x8, 0x1400}, 0x48) 23:03:04 executing program 1: syz_clone(0x2265000, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) [ 481.199474][T15415] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 481.201246][T15415] CPU: 0 PID: 15415 Comm: syz-executor.0 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 481.201279][T15415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:03:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x4, 0x0, 0x0, 0x11}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/236, 0x29, 0xec, 0x1}, 0x20) [ 481.201293][T15415] Call Trace: [ 481.201299][T15415] [ 481.201309][T15415] dump_stack_lvl+0xcd/0x134 [ 481.201343][T15415] dump_header+0x10b/0x7f9 [ 481.201380][T15415] oom_kill_process.cold+0x10/0x15 [ 481.201412][T15415] out_of_memory+0x358/0x14b0 [ 481.201452][T15415] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 23:03:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0xeb, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/236, 0x1a, 0xec, 0x1}, 0x20) [ 481.201488][T15415] ? oom_killer_disable+0x270/0x270 [ 481.201522][T15415] ? preempt_schedule_thunk+0x16/0x18 [ 481.201565][T15415] mem_cgroup_out_of_memory+0x206/0x270 [ 481.201598][T15415] ? mem_cgroup_margin+0x130/0x130 [ 481.201650][T15415] memory_max_write+0x25c/0x3b0 [ 481.201685][T15415] ? mem_cgroup_force_empty_write+0x150/0x150 23:03:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x7, 0x0, [{}]}]}}, &(0x7f0000000080)=""/175, 0x2e, 0xaf, 0x1}, 0x20) [ 481.201734][T15415] cgroup_file_write+0x1de/0x770 [ 481.201762][T15415] ? mem_cgroup_force_empty_write+0x150/0x150 [ 481.201796][T15415] ? kill_css+0x370/0x370 [ 481.201827][T15415] ? kernfs_fop_write_iter+0x375/0x610 23:03:05 executing program 0: bpf$MAP_CREATE(0x5, &(0x7f0000000240), 0x48) [ 481.201861][T15415] ? kill_css+0x370/0x370 [ 481.201883][T15415] kernfs_fop_write_iter+0x3f8/0x610 [ 481.201919][T15415] new_sync_write+0x38a/0x560 [ 481.201954][T15415] ? new_sync_read+0x5f0/0x5f0 23:03:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x9}]}}, &(0x7f0000000200)=""/242, 0x32, 0xf2, 0x1}, 0x20) 23:03:05 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r3) [ 481.202022][T15415] vfs_write+0x7c0/0xac0 [ 481.202061][T15415] ksys_write+0x127/0x250 [ 481.202093][T15415] ? __ia32_sys_read+0xb0/0xb0 [ 481.202125][T15415] ? syscall_enter_from_user_mode+0x21/0x70 23:03:05 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000013c0)={r0, 0x0, 0x0, 0x0, 0x0}, 0x20) [ 481.202155][T15415] ? syscall_enter_from_user_mode+0x21/0x70 [ 481.202190][T15415] do_syscall_64+0x35/0xb0 [ 481.202222][T15415] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 481.202252][T15415] RIP: 0033:0x7fa838a89109 23:03:05 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="ae0c89631718000000000400000000000016000000850000000000000000000000000000000000fddae21d5e08b84f7890f97589f47ec7a4a524e3cfa8746e05c4b4506fd4dcedd650726a257eef4ebcb0fa27f9aa325caab6b468cee168586b1030888a22cee034143f03f8e6989bb4e4034db07b7eaa3b0bed56e9d0af41e8d39ca3a5c295ee119b6aa066b56a88e1ce583d12e410a9231a5097fff729b190c790b7c727205611bbd36abf739368ef2400"/194], &(0x7f00000005c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x1, 0x80}, 0x10, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) 23:03:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@func={0x4}]}, {0x0, [0x0, 0x0, 0x0]}}, &(0x7f00000002c0)=""/236, 0x29, 0xec, 0x1}, 0x20) [ 481.202273][T15415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:03:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x0, 0x0, 0x2}}, &(0x7f0000000200)=""/242, 0x1a, 0xf2, 0x1}, 0x20) 23:03:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000002c0)=""/236, 0x1a, 0xec, 0x1}, 0x20) [ 481.202299][T15415] RSP: 002b:00007fa839be9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 481.202324][T15415] RAX: ffffffffffffffda RBX: 00007fa838b9bf60 RCX: 00007fa838a89109 [ 481.202343][T15415] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000005 [ 481.202359][T15415] RBP: 00007fa838ae30ad R08: 0000000000000000 R09: 0000000000000000 [ 481.202382][T15415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 481.202397][T15415] R13: 00007fffcdd4f35f R14: 00007fa839be9300 R15: 0000000000022000 [ 481.202439][T15415] [ 481.202751][T15415] memory: usage 788kB, limit 0kB, failcnt 81 [ 481.202889][T15415] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 481.203196][T15415] Memory cgroup stats for /syz0: [ 481.209629][T15415] anon 135168 [ 481.209629][T15415] file 249856 [ 481.209629][T15415] kernel 385024 [ 481.209629][T15415] kernel_stack 98304 [ 481.209629][T15415] pagetables 77824 [ 481.209629][T15415] percpu 0 [ 481.209629][T15415] sock 0 [ 481.209629][T15415] vmalloc 0 [ 481.209629][T15415] shmem 237568 [ 481.209629][T15415] zswap 0 [ 481.209629][T15415] zswapped 0 [ 481.209629][T15415] file_mapped 200704 [ 481.209629][T15415] file_dirty 0 [ 481.209629][T15415] file_writeback 0 [ 481.209629][T15415] swapcached 0 [ 481.209629][T15415] anon_thp 0 [ 481.209629][T15415] file_thp 0 [ 481.209629][T15415] shmem_thp 0 [ 481.209629][T15415] inactive_anon 208896 [ 481.209629][T15415] active_anon 163840 [ 481.209629][T15415] inactive_file 4096 [ 481.209629][T15415] active_file 8192 [ 481.209629][T15415] unevictable 0 [ 481.209629][T15415] slab_reclaimable 44936 [ 481.209629][T15415] slab_unreclaimable 139192 [ 481.209629][T15415] slab 184128 [ 481.210566][T15415] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=15414,uid=0 [ 481.213034][T15415] Memory cgroup out of memory: Killed process 15414 (syz-executor.0) total-vm:56688kB, anon-rss:428kB, file-rss:8944kB, shmem-rss:56kB, UID:0 pgtables:80kB oom_score_adj:1000 [ 481.356735][T15392] syz-executor.0 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=0 [ 481.356768][T15392] CPU: 0 PID: 15392 Comm: syz-executor.0 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 481.356792][T15392] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 481.356804][T15392] Call Trace: [ 481.356810][T15392] [ 481.356818][T15392] dump_stack_lvl+0xcd/0x134 [ 481.356850][T15392] dump_header+0x10b/0x7f9 [ 481.356877][T15392] oom_kill_process.cold+0x10/0x15 [ 481.356910][T15392] out_of_memory+0x358/0x14b0 [ 481.356946][T15392] ? find_held_lock+0x2d/0x110 [ 481.356974][T15392] ? oom_killer_disable+0x270/0x270 [ 481.357006][T15392] ? find_held_lock+0x2d/0x110 [ 481.357037][T15392] mem_cgroup_out_of_memory+0x206/0x270 [ 481.357067][T15392] ? mem_cgroup_margin+0x130/0x130 [ 481.357092][T15392] ? lock_downgrade+0x6e0/0x6e0 [ 481.357139][T15392] try_charge_memcg+0xef9/0x1380 [ 481.357176][T15392] ? mem_cgroup_handle_over_high+0x510/0x510 [ 481.357207][T15392] ? get_mem_cgroup_from_objcg+0xa1/0x260 [ 481.357236][T15392] ? lock_downgrade+0x6e0/0x6e0 [ 481.357269][T15392] ? lock_downgrade+0x6e0/0x6e0 [ 481.357314][T15392] obj_cgroup_charge+0x2ab/0x5e0 [ 481.357355][T15392] kmem_cache_alloc_lru+0x143/0x720 [ 481.357385][T15392] ? sock_alloc_inode+0x23/0x1d0 [ 481.357423][T15392] sock_alloc_inode+0x23/0x1d0 [ 481.357450][T15392] ? sock_free_inode+0x20/0x20 [ 481.357477][T15392] alloc_inode+0x61/0x230 [ 481.357502][T15392] new_inode_pseudo+0x14/0xe0 [ 481.357529][T15392] sock_alloc+0x3c/0x260 [ 481.357555][T15392] __sock_create+0xb9/0x790 [ 481.357584][T15392] __sys_socket+0x12f/0x240 [ 481.357607][T15392] ? __sys_socket_file+0x1f0/0x1f0 [ 481.357633][T15392] ? syscall_enter_from_user_mode+0x21/0x70 [ 481.357666][T15392] __x64_sys_socket+0x6f/0xb0 [ 481.357685][T15392] ? syscall_enter_from_user_mode+0x21/0x70 [ 481.357707][T15392] do_syscall_64+0x35/0xb0 [ 481.357734][T15392] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 481.357762][T15392] RIP: 0033:0x7fa838a8a787 [ 481.357782][T15392] Code: f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 29 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 481.357805][T15392] RSP: 002b:00007fffcdd4eed8 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 481.357827][T15392] RAX: ffffffffffffffda RBX: 00007fffcdd4f640 RCX: 00007fa838a8a787 [ 481.357843][T15392] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 481.357857][T15392] RBP: 0000000000000003 R08: 0000000000000000 R09: 00007fffcdd4f450 [ 481.357872][T15392] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000032 [ 481.357885][T15392] R13: 0000000000075633 R14: 0000000000000010 R15: 00007fffcdd4f680 [ 481.357919][T15392] [ 481.366974][T15392] memory: usage 504kB, limit 0kB, failcnt 100 [ 481.366993][T15392] swap: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 481.367007][T15392] Memory cgroup stats for /syz0: [ 481.367224][T15392] anon 45056 [ 481.367224][T15392] file 249856 [ 481.367224][T15392] kernel 221184 [ 481.367224][T15392] kernel_stack 0 [ 481.367224][T15392] pagetables 8192 [ 481.367224][T15392] percpu 0 [ 481.367224][T15392] sock 0 [ 481.367224][T15392] vmalloc 0 [ 481.367224][T15392] shmem 237568 [ 481.367224][T15392] zswap 0 [ 481.367224][T15392] zswapped 0 [ 481.367224][T15392] file_mapped 200704 [ 481.367224][T15392] file_dirty 0 [ 481.367224][T15392] file_writeback 0 [ 481.367224][T15392] swapcached 0 [ 481.367224][T15392] anon_thp 0 [ 481.367224][T15392] file_thp 0 [ 481.367224][T15392] shmem_thp 0 [ 481.367224][T15392] inactive_anon 118784 [ 481.367224][T15392] active_anon 163840 [ 481.367224][T15392] inactive_file 8192 [ 481.367224][T15392] active_file 4096 [ 481.367224][T15392] unevictable 0 [ 481.367224][T15392] slab_reclaimable 59736 [ 481.367224][T15392] slab_unreclaimable 135472 [ 481.367224][T15392] slab 195208 [ 481.367224][T15392] workingset_refault_anon 0 [ 481.367290][T15392] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz0,mems_allowed=0-1,oom_memcg=/syz0,task_memcg=/syz0,task=syz-executor.0,pid=15392,uid=0 [ 481.367396][T15392] Memory cgroup out of memory: Killed process 15392 (syz-executor.0) total-vm:50536kB, anon-rss:372kB, file-rss:8384kB, shmem-rss:0kB, UID:0 pgtables:68kB oom_score_adj:0 [ 481.456882][T15392] socket: no more sockets [ 483.111611][ T1042] device hsr_slave_0 left promiscuous mode [ 483.112259][ T1042] device hsr_slave_1 left promiscuous mode [ 483.113085][ T1042] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 483.113113][ T1042] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 483.115437][ T1042] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 483.115460][ T1042] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 483.117623][ T1042] device bridge_slave_1 left promiscuous mode [ 483.117773][ T1042] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.127774][ T1042] device bridge_slave_0 left promiscuous mode [ 483.127915][ T1042] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.140881][ T1042] device veth1_macvtap left promiscuous mode [ 483.140943][ T1042] device veth0_macvtap left promiscuous mode [ 483.141074][ T1042] device veth1_vlan left promiscuous mode [ 483.141169][ T1042] device veth0_vlan left promiscuous mode [ 483.895799][ T1042] team0 (unregistering): Port device team_slave_1 removed [ 483.914297][ T1042] team0 (unregistering): Port device team_slave_0 removed [ 483.939120][ T1042] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 483.959119][ T1042] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 484.017337][ T1042] bond0 (unregistering): Released all slaves [ 484.842452][ T3648] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 484.843582][ T3648] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 484.844171][ T3648] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 484.845011][ T3648] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 484.845518][ T3648] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 484.845791][ T3648] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 485.060217][T15490] chnl_net:caif_netlink_parms(): no params data found [ 485.151401][T15490] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.151543][T15490] bridge0: port 1(bridge_slave_0) entered disabled state [ 485.152653][T15490] device bridge_slave_0 entered promiscuous mode [ 485.154978][T15490] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.157228][T15490] bridge0: port 2(bridge_slave_1) entered disabled state [ 485.158385][T15490] device bridge_slave_1 entered promiscuous mode [ 485.181963][T15490] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 485.184287][T15490] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 485.298970][T15490] team0: Port device team_slave_0 added [ 485.306566][T15490] team0: Port device team_slave_1 added [ 485.322559][ T3654] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 485.323988][ T3654] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 485.324995][ T3654] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 485.325932][ T3654] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 485.326408][ T3654] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 485.326661][ T3654] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 485.422956][T15490] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 485.422973][T15490] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 485.423001][T15490] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 485.424969][T15490] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 485.424982][T15490] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 485.425009][T15490] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 485.497563][T15490] device hsr_slave_0 entered promiscuous mode [ 485.522180][T15490] device hsr_slave_1 entered promiscuous mode [ 485.522759][T15490] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 485.522782][T15490] Cannot create hsr debugfs directory [ 485.805018][T15499] chnl_net:caif_netlink_parms(): no params data found [ 485.929608][T15490] bridge0: port 2(bridge_slave_1) entered blocking state [ 485.929680][T15490] bridge0: port 2(bridge_slave_1) entered forwarding state [ 485.929840][T15490] bridge0: port 1(bridge_slave_0) entered blocking state [ 485.929915][T15490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 486.129090][T15490] 8021q: adding VLAN 0 to HW filter on device bond0 [ 486.136542][T15499] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.136675][T15499] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.137908][T15499] device bridge_slave_0 entered promiscuous mode [ 486.151614][ T5123] bridge0: port 1(bridge_slave_0) entered disabled state [ 486.152528][ T5123] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.154814][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 486.184753][T15499] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.184820][T15499] bridge0: port 2(bridge_slave_1) entered disabled state [ 486.185934][T15499] device bridge_slave_1 entered promiscuous mode [ 486.226529][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 486.227187][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 486.236103][T15490] 8021q: adding VLAN 0 to HW filter on device team0 [ 486.268978][T15499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 486.313782][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 486.314414][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 486.314824][T15097] bridge0: port 1(bridge_slave_0) entered blocking state [ 486.314878][T15097] bridge0: port 1(bridge_slave_0) entered forwarding state [ 486.315330][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 486.315878][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 486.316301][T15097] bridge0: port 2(bridge_slave_1) entered blocking state [ 486.316358][T15097] bridge0: port 2(bridge_slave_1) entered forwarding state [ 486.316793][T15097] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 486.319406][T15499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 486.340522][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 486.345594][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 486.346652][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 486.347385][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 486.376528][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 486.377318][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 486.377992][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 486.378516][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 486.386520][T15499] team0: Port device team_slave_0 added [ 486.388507][T15499] team0: Port device team_slave_1 added [ 486.456091][T15490] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 486.456833][T15490] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 486.475335][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 486.475948][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 486.476969][T15499] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 486.476981][T15499] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 486.477009][T15499] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 486.478976][T15499] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 486.478988][T15499] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 486.479015][T15499] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 486.553558][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 486.553800][ T14] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 486.561720][T15490] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 486.576684][T15499] device hsr_slave_0 entered promiscuous mode [ 486.577447][T15499] device hsr_slave_1 entered promiscuous mode [ 486.577952][T15499] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 486.577974][T15499] Cannot create hsr debugfs directory [ 486.909613][ T14] Bluetooth: hci2: command 0x0409 tx timeout [ 486.979427][T15499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 486.987870][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 486.989711][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 486.990256][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 486.995124][T15499] 8021q: adding VLAN 0 to HW filter on device team0 [ 487.014773][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 487.015402][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 487.015815][T15095] bridge0: port 1(bridge_slave_0) entered blocking state [ 487.015876][T15095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 487.022735][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 487.078255][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 487.078761][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 487.079145][T15095] bridge0: port 2(bridge_slave_1) entered blocking state [ 487.079198][T15095] bridge0: port 2(bridge_slave_1) entered forwarding state [ 487.112120][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 487.113019][ T9477] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 487.138691][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 487.139375][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 487.140416][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 487.144214][T15499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 487.190181][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 487.190296][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 487.205931][T15499] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 487.389777][ T9478] Bluetooth: hci3: command 0x0409 tx timeout [ 487.426510][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 487.427094][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 487.479390][T15490] device veth0_vlan entered promiscuous mode [ 487.494952][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 487.495653][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 487.496491][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 487.496991][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 487.511541][T15490] device veth1_vlan entered promiscuous mode [ 487.536041][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 487.536656][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 487.537219][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 487.537812][ T3680] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 487.550880][T15490] device veth0_macvtap entered promiscuous mode [ 487.556599][T15490] device veth1_macvtap entered promiscuous mode [ 487.587886][T15490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 487.587907][T15490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 487.587918][T15490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 487.587932][T15490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 487.587942][T15490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 487.587956][T15490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 487.587965][T15490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 487.587978][T15490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 487.589299][T15490] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 487.590053][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 487.590674][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 487.591234][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 487.591819][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 487.595337][T15490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 487.595354][T15490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 487.595363][T15490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 487.595378][T15490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 487.595387][T15490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:03:11 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="ae0c89631718000000000400000000000016000000850000000000000000000000000000000000fddae21d5e08b84f7890f97589f47ec7a4a524e3cfa8746e05c4b4506fd4dcedd650726a257eef4ebcb0fa27f9aa325caab6b468cee168586b1030888a22cee034143f03f8e6989bb4e4034db07b7eaa3b0bed56e9d0af41e8d39ca3a5c295ee119b6aa066b56a88e1ce583d12e410a9231a5097fff729b190c790b7c727205611bbd36abf739368ef2400"/194], &(0x7f00000005c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x1, 0x80}, 0x10, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) 23:03:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x0, 0x0, 0x0, 0xe}]}}, &(0x7f00000002c0)=""/236, 0x26, 0xec, 0x1}, 0x20) 23:03:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0x4, 0x0, [{}]}]}}, &(0x7f0000000080)=""/175, 0x2e, 0xaf, 0x1}, 0x20) 23:03:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0x6, &(0x7f0000000b40)=ANY=[@ANYBLOB="ae0c89631718000000000400000000000016000000850000000000000000000000000000000000fddae21d5e08b84f7890f97589f47ec7a4a524e3cfa8746e05c4b4506fd4dcedd650726a257eef4ebcb0fa27f9aa325caab6b468cee168586b1030888a22cee034143f03f8e6989bb4e4034db07b7eaa3b0bed56e9d0af41e8d39ca3a5c295ee119b6aa066b56a88e1ce583d12e410a9231a5097fff729b190c790b7c727205611bbd36abf739368ef2400"/194], &(0x7f00000005c0)='GPL\x00', 0x6, 0x2a, &(0x7f0000000700)=""/42, 0x0, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000740)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000780)={0x0, 0x6, 0x1, 0x80}, 0x10, 0xffffffffffffffff}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x8e, 0x5, 0x0, 0x2, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x10, 0x0, 0x0, 0x0, 0x0, 0xd864, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@map, 0xffffffffffffffff, 0x17}, 0x10) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='io.weight\x00', 0x2, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) 23:03:11 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) [ 487.595400][T15490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:03:11 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x0, 0x7, 0x4}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000240)={r0, 0x0, 0x0}, 0x20) [ 487.595409][T15490] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:03:11 executing program 3: socketpair(0x2, 0xa, 0x803, &(0x7f0000000180)) 23:03:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x102) [ 487.595423][T15490] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:03:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd={0x0, 0x0, 0x0, 0x7, 0x74000000}]}}, &(0x7f0000000140)=""/237, 0x26, 0xed, 0x2}, 0x20) [ 487.596591][T15490] batman_adv: batadv0: Interface activated: batadv_slave_1 23:03:11 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x303, 0x303, &(0x7f0000000040)="b9070360f000f007049e0ff0655804ffffe10e600401633a77fbac141441e0002001be3e7d2a182fff", 0x0, 0x2a, 0x18000000, 0x0, 0xfeb9, &(0x7f0000000640)="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", &(0x7f0000000100)}, 0x28) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc028660f, 0x0) [ 487.615886][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 23:03:11 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) openat$cgroup_int(r1, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1f, 0x0, 0x0, &(0x7f0000000480)='GPL\x00', 0x6, 0xbb, &(0x7f00000004c0)=""/187, 0x0, 0x8, '\x00', 0x0, 0x1f, r0, 0x8, &(0x7f0000000580)={0x3, 0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x3, 0x9, 0x81, 0x3}, 0x10, 0x0, r1, 0x0, &(0x7f0000000600)=[0xffffffffffffffff, r0, r1, r0, 0xffffffffffffffff, r0]}, 0x80) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000001800)='devices.allow\x00', 0x2, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000780), 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x81, 0x7f, 0x0, 0x0, 0xffffffffffffffff, 0x45, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x5, 0x8}, 0x48) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000001880), 0x10) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000018c0)=@base={0xa, 0x20, 0x1, 0x1ff, 0x0, 0xffffffffffffffff, 0x3, '\x00', 0x0, r2, 0x0, 0x4}, 0x48) [ 487.616555][ T9478] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 487.771465][ T3701] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 487.771485][ T3701] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 487.774631][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 487.817013][ T47] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 487.817033][ T47] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 487.818953][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 488.203915][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 488.204692][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 488.322080][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 488.322746][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 488.323626][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 488.324192][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 488.354115][T15499] device veth0_vlan entered promiscuous mode [ 488.401379][T15499] device veth1_vlan entered promiscuous mode [ 488.536243][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 488.536944][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 488.537588][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 23:03:12 executing program 0: r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000002140)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x48) 23:03:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x3}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000140)=""/237, 0x28, 0xed, 0x2}, 0x20) 23:03:12 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001340)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x14022, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x36006) 23:03:12 executing program 1: r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) close(r1) 23:03:12 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) [ 488.538205][T15093] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 488.567840][T15499] device veth0_macvtap entered promiscuous mode [ 488.625205][T15499] device veth1_macvtap entered promiscuous mode 23:03:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 23:03:12 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x102) [ 488.711203][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 23:03:12 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x17, 0x0, 0x7, 0x20}, 0x48) write$cgroup_pressure(r0, 0x0, 0x0) 23:03:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xc4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 488.711226][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 488.711236][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 23:03:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x0, 0x0, 0x0, 0x8, 0x6c000000}]}}, &(0x7f0000000080)=""/211, 0x26, 0xd3, 0x1}, 0x20) 23:03:12 executing program 2: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8924, &(0x7f0000000080)) [ 488.711250][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:03:12 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) 23:03:12 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) [ 488.711260][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 23:03:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 23:03:12 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001340)='memory.events\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40086602, &(0x7f0000000040)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r4 = perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0xa, 0xfffffffffffffff7, 0xfffffff7, 0x3, 0x101, 0x0, 0x1, 0x0, 0x2, 0x0, 0x7}, r0, 0xb, r2, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f00000003c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x74c9c83e, 0x0, 0xf, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x98, 0x20}, 0x10000, 0x0, 0x2, 0x0, 0x3, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x7}) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xda00) write$cgroup_int(r5, &(0x7f0000000200), 0x36006) [ 488.711274][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 488.711284][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 488.711298][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 488.711308][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 488.711323][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:03:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) 23:03:13 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) 23:03:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) [ 488.721535][T15499] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 488.722459][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 488.723149][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready 23:03:13 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x102) 23:03:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 23:03:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) [ 488.724647][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 488.725245][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 488.750023][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:03:13 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) 23:03:13 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) 23:03:13 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) [ 488.750045][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:03:13 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r1, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) [ 488.750055][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 488.750069][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 488.750079][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 23:03:14 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) 23:03:14 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000380)=[0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000001540), 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000080)) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='cgroup.controllers\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0xc0c0583b, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r3, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000440)={r0, 0xffffffffffffffff, 0xb}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x4a}) [ 488.751620][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 488.751634][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 488.751649][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:03:14 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:03:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x16, 0x0, 0x2, 0x9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffc}, 0x48) 23:03:14 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) [ 488.751661][T15499] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 488.751676][T15499] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 23:03:14 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x90, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x102) 23:03:14 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 23:03:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x16, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="620af8ff0c250021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2add19b18ed8a25312a2e2c49e8020a69644a2f57ba30600f1cc1a100a9af698393aa0f3881f9c240456c35199fad0093c59d66b5ece9f36c70d0f13905ea23c22626c9f87f9793f50bb546020677b0c5077da80fb982c1eea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c2918451ebdcf4cef809606056fe5c34664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec28b48b45ef40387ad54d42d57181aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0000000000000006f803c6468779241d902d7bf6023cdcedb5e0125ebbcebdde510cb2364141215106bf04f658333719acd97cfa107d40224edc5465a932b77e74e80220d42bc6099ad2300000080006ef6c1ff0900000000000000c63a949e8b7955394ffa82b8e942c89112f40cfd7c3a1d37a6ab87b15867926602d94591c926abfb076719237c8d0e60b0eea24492a660583eecdb039ed3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a99630200a04d5bb924cfe5f3185418d60532af9c4d2ec7c3272095e63c80aff9fa740b5b7632f32030910800000000000000a2a790d62c6faec2fed44da4928b3014ab2f70344e16cb9a6298060d6b2ba11de6c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa47b7da9c77af4c0eb97fca585ec6bf58351d564beb61e8caab9c70764b0a8a7583c90b3433b809bdb9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c0200000000000000000000000000030000000000000000000000000010008bc0d95597dd713a497a6638e1a585a4b2d02edc3e28dd271c896249ed85b980680b6c294c8320002b435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac50299ba96ffffff7f00000000df73be83bb7d5ad897ef3b7cda42013d53046da21b40216e14ba2d6af8656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dcbcf729433282830689da6b53b263339871429d120000003341bf4a00fcffffffffffffffe09fec2271fe01589646efd1cf870cd7bb2366fde4010429738fcc91782bb8bd45d85f5d793cc5ee0c2a5ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d5bc8955778567bc79e13b78249788f11f761038bffd4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe7d7fa29822aea68a660e717a04becff0f719197724f4fce1093b62d7e8c7123d8ecbbc55bf404e4e1f74b4000000000000000d978cf906df0042e36acd37d7f9e119f2c00000080000000002a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c366e3a06fb99e0aa7f23a054b0060477e005cbf6b1844ade2f4d92d6bd72ee2c9fdc75aaaf1e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f54c2d3335457acecc34f24c9ae153ec60ac0694da85bff9f5f4df9b3e90e5c708ce65cd6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffeaac70bc94776a8525b86e66964ae09bb6d163118e4cbe024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a409000000000000008485b3b8a8c9aa3d14f93100c2e0893862eef552fcde2981f48c482bde6e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba4958ea8e4aa37094191ebd7d439205991dcfa2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2d466483c17a65fc85fa3bce109b60000000000000000009cee560cb4c23d3a8d6550058dfaf622502aae9482aaacd503d876327283dd39adeac895822fada37f32544c74d06fbf90b258daa4714f11b9349a1bfe16460000000000000000d8263c92777303c86adc75ad2339d9cf6fc9683148432fb25e7922da48e61bba99087bfc9455131cd79f63402d3b89c4140815713e90020000000000000000c086867e01eaa5ee892c51d5705794db23c67ebb7f477235952a4df51a1b610e5072ebcd9cfe6759bd99d5b3af171d8830b1fc9e4c7e3b914b2b55fdc927a4c77c1390bdc862a34165d23b4d8da44917163630922c5f0661b9abdd00f796819a6de45fbc673a63a5714e2bce8d41cfb091cf1ed2945700000000000000002704d0fc3177bcf9ce28462176326a32a627aa8e887ab384d8ba731c0506cdde0a61f03df29de29ba1708f984a530b8e5d390b1f23270c7fe30d30a732d2b928d44160548536bfb0288ba49fc020ea23db58025f25f58fc04924ef372573687b6ff84ce1a94629141bbc73db6c9a2fadc4e67aa1e9b8f518fe680375217173973692aa38a7c2ee5e608f81eca2f483245b7a6f458c57d078d34ccf2cce89331708dd0f27f372920758d25ddec3b76c834d51a241273fcd87bcdbdb80297d57bd9956ce4b39a6d5636bf5b8067cff8b3d58888a07267168f2233e8cb67219c4cdaa37628419b3c1ac78ba41e86d4131795d4480bbf6f608c1eae68d266d2243328f71fddd06c4460cf01f3223b3a35e1c0e91ebd01c036b7aed3d973f8cdaf71ed66aa3fbf465ca80e9a42d9e1c691ed460d9dcf0332415b20dbf603edcc179edff40697505d81cefa29827f1a88538d2651defda85297edee5de935f35751e5b1533d488d0b02c17565b8a7fe1ff0ecf67f02ad339359d949a1ccde085dd6a0bc617cb7c120cccb3569961c903df4a89696c2bef90384f5d02bacd97c9b7da34c20f5f612941602128bad282cb7e310f01a76c111e141da4101c3c155564e189cb1ae139b1cd5b8c2fa2fd28d800000000000000000000b4a27cb909a17c2d9db9a5b3ef98400d8478124ee3fc0a90c7ad535452e2015e580125a9385547486382ec96f4b094e9aa2184f608fe8ad40eb4667d27c187774faa6ce15d300481fab65ac8c7cd29c8180c9bc07f029aa7e04448266ffcaba876eb14586876204e1b791eef56ed36215877d28882d786356f15eeb2358772486842ae83740cf88dd019dbdf64b78220fdd5601a80705437a299a09ca071f16cf1e3a61a1a7b08367a60d3a56e093029877ed987d10045c58c9cad223d3971d530c72837cd2ea4186233af17f1fe89f6c0be2e26daf47567306aa2138305f0be78c5d20cee87abbecff211db7fb79263fd00e5217350a1cab596c5d65f29ddb3ac5892f699a380411afe51ad1ab3cf9f353e6bf7f89c70c84a37b307709a4ab2decfc26babc044f37ed617fc1b22400ffbed7aa5174e39043ff9fbf24dd02aabd43f67555c35923d9d38a399060876b71a785f44095363bb41dbb06a97b855e88fdd84f613c7c1fa2c1e6201525fcc2c0baf61021556e25b38f082d9f1860268345172324c461774ba2c9d0418d2b5ca9de819da1e0278d412a09b3bb69b878ec51aa004e88eb7e98658bc5d9f29c4dff83fcff6e3208e5faa866ec4e2e12d0f262799e60bf6c8e81ba2029b1c288a5c2f64b94ca8bb3c2b3386313e6c17310af2d060cea0d80a6c575bca5acc5cc043764af77e76c5a998d320635c18eb3449421dee6abf389f832485a347a933d51b9d24277c53fb4c502d411aebde80205d2b1f878e460bfde15eeeea016ba9b88b8188c24b173b9c522ea1a53914b93f77c70b57cdd28b1a9afcf5a56dc300d1ccdcb4bbd86d2c7384ed325ab0a91773bdfdeb675e2cc31c6ab555ea4fccf335a34554ed88264f091d04bd50b53b412dddb98ee8c970c09cc77f12a9b9aeba17f4a3cfa38a095e7403ccc311cc1fe8d838cf6df32f4f5b63eda24c4d9c205022be4f08c998bf1e54d4918f36e4151227379b8adce4c3f448c641e538a20e4b4376d9721bcd1b23e606623caf28b7e405a90110b1f79ebd3b94a41d4a7b5917adad581be1a1eea06fa6ff99525feaeb3ba8c5a480702678f24b19f6df86d563c00162e07f12d09a65e8e47ccc255a3a845ff130c37bbcb44cd5a3fb911ce06569593d01a32c27be41106104a27d303772af025dd68d786ccba9a7077e76f1a49d60f9cea10662"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe2c, 0x10, &(0x7f0000000000), 0x32}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x0, 0x2e, 0xf0, &(0x7f0000000040)="e1865d0d", 0x0, 0x136, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 23:03:14 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x32, 0x0, 0x0, &(0x7f0000000000), 0x18}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) gettid() perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x60444, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xd69a, 0x1, @perf_bp={&(0x7f00000002c0), 0xe}, 0x52161, 0x0, 0x7, 0x1, 0x0, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20004000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='xen_mmu_set_pud\x00'}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='xen_mmu_set_pud\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='xen_mmu_set_pud\x00'}, 0x10) [ 488.753094][T15499] batman_adv: batadv0: Interface activated: batadv_slave_1 23:03:14 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0) [ 488.765352][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready 23:03:14 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 488.766065][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 23:03:14 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000540)={[{0x2, 'io'}]}, 0x4) [ 488.931092][ T3701] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 488.931113][ T3701] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 23:03:14 executing program 2: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000540)={[{0x2b, 'cpu', 0x2f}]}, 0x5) [ 488.933863][T15095] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 488.994243][T15095] Bluetooth: hci2: command 0x041b tx timeout [ 489.016671][ T11] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 23:03:14 executing program 0: socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)) 23:03:15 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0xfffff000, 0xe, 0x0, &(0x7f0000000340)="85fea8d7070487a3066d996308c0", 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 489.016692][ T11] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 23:03:15 executing program 2: socketpair$unix(0x11, 0x3, 0x0, &(0x7f0000000000)) [ 489.018851][ T5123] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 489.480110][ T5123] Bluetooth: hci3: command 0x041b tx timeout [ 491.084460][T15095] Bluetooth: hci2: command 0x040f tx timeout 23:03:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) [ 491.553065][T15095] Bluetooth: hci3: command 0x040f tx timeout 23:03:15 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:15 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001ac0)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001b00)={&(0x7f0000001440), 0x80, &(0x7f0000001a00)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 23:03:15 executing program 2: syz_clone(0x40000100, &(0x7f00000002c0)="6b469629e1bdcc576c18e4020bafbd0d035a2a66a7238add6b3c70d34f807e1327f6150991a6c7617643b35c2cc21ffe3e5566315ac6ee72d33599b6", 0x3c, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="313fde0198e484888a12ca4d159532d106cbe6d4e92242b40cf707d0662acf546b5b702d4ba6ab78d0f75b3169e56f04580b0b3dd913f931c65f18958bd68547f18768cbc90ffb95e97b2dfc1673541d4dd709d8") 23:03:15 executing program 1: syz_clone(0x40000100, &(0x7f00000002c0), 0x0, &(0x7f0000000340), 0x0, 0x0) 23:03:15 executing program 5: syz_clone(0x40000100, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) 23:03:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001440)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x25000000}, {}]}]}}, &(0x7f0000000440)=""/4096, 0x36, 0x1000, 0x1}, 0x20) 23:03:15 executing program 0: perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:03:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) 23:03:15 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_merged\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000000)=0xc9ab) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40086602, &(0x7f0000000240)) 23:03:16 executing program 1: syz_clone(0x40000100, &(0x7f00000002c0), 0x0, &(0x7f0000000340), 0x0, 0x0) 23:03:16 executing program 2: syz_clone(0x40000100, &(0x7f00000002c0)="6b469629e1bdcc576c18e4020bafbd0d035a2a66a7238add6b3c70d34f807e1327f6150991a6c7617643b35c2cc21ffe3e5566315ac6ee72d33599b6", 0x3c, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="313fde0198e484888a12ca4d159532d106cbe6d4e92242b40cf707d0662acf546b5b702d4ba6ab78d0f75b3169e56f04580b0b3dd913f931c65f18958bd68547f18768cbc90ffb95e97b2dfc1673541d4dd709d8") 23:03:16 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x38}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'bridge_slave_0\x00', 0x100}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00'}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8943, &(0x7f0000000080)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r2}, 0x8) ioctl$TUNSETLINK(r4, 0x400454cd, 0x101) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x8, 0x3, 0x0, 0x6, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xc1e}, 0x288, 0x4, 0x100, 0x5, 0x9, 0x7, 0x0, 0x0, 0x1d, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r0, 0x2) close(r6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 23:03:16 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:16 executing program 5: perf_event_open$cgroup(&(0x7f0000000b00)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:03:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0ffe8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000100b7050000640000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b52eb83ec5a3000000000000000090941bd3108d311f7801000000000000000012cf6956e002000000000000006ab2367e8a87554c901f03733d40c62753ecd1f46f09beb1bbfad9bae24b4e8a96ec60f2af2cf99376e43836ba33fd5a447f8e80148b929304000755861103bb45e5d53c9fe36b34444bb7e9670e615b826859d017fc94c5857ead931db6cd370e93b6d5a74cc1d2c50896249ed7420f8680a730d876c36a1f02378eb12d0000556ec919d0b1681369d448c6f8a5cc77c17c996c59d115baf6d1c889109dde3e4c8d4e7f20fd224829af6de3d5ef71857496714db96c836db18ea5189cfbddd6e4de3617a9abc31f82984050fbee8dd9d11b370c05e1f134e5f90a326b0cb5268e40f5ba9b538c32acc2a63c464c60a516c3f87f05e5d1af657c445131edb61670ff2c62117e96eba223ffffffff00000000d2aad967d9e293fad4e69127d5656e63bf02a5ac113879bfc27d7e6ba1f41301065efb1685e22251d556a89c2886ea64bc457280330dc9cdb6890ebda8f038de3c753fdb023400010000796a7823d24f795ab1258fe937312fc5e921e8758153be202ffca15500001970e28e6238581501b710cf8b82bc02c12fe01bd8df4e97d3aed0c415a49dc67e8a3693b23668c55eed4e24eafa16a4f43b6729990a9321531e5eb006b547c13cdfa22faf5ba0bbeda4f1181d07a28d77ea1c5aa7f5d58331ad45fc89ac44c9d2d6b3db76fc9d341f076200f85d2b53455187cf493901ad919329a295f63be4e91417b9cd09cf47278ad771ad171c31c7fcff2a9e869c2144f5775c37084acc57b5793f25f853f7a98965e5bd9ff5253f787eb3215723550000000056abdefce1b79ddd22976be5c0a0223ba549828029af8de217c2ff79e68f648420cbb226a752b817fc17efaa3268c68d23659a581b7c43263f95946caba8d4c3b1472b08c6de0adbaeda5b2d63835dc147e69204ce1c0cb20ea6f9393e8fc685cb742036437354cc7a64b48743d1f1dbfd6d8169cfe3da7dc5d77bbc26f5ed74953e29837f614415015cbc113516e3402c1301e9668d6493087475a101d077632b20aeff95c4415b1ef22aa16661392f40f0ea914474adb817001f59058641f6a764c7a1652d96dcfa640d780ca1ec01c9bc314146a00e375a8d146eb87bb25c2f2cce0935a5f33deeebdd5b956d25da0cf00ad09e10e8aa7d879bed35491223b15b34438be933bfacffae28e9d027624638d933c159fbc293916ebcc6b2eb67fe9d321b7c08dfa128a64f1e36527bd8144e69c289b8d07ef6619d6442520d16ca714a4dce016f243e418875d5684b997648150000000000000000000000cd99f155c385e01d497f04b068b885dda21d3dd79d34074234b110234251dd31c07e33d49fe1ca289b44b7233c102d7cd67ffd6069c5ef77cc15912cab8df161b5ae0b54681f1637eada2cdfb08cd7d7badec9238c461aa1d0aa7998878147c798d26eec743249e8307297a95e6a3aff97b831ff827bd657fe74c4612d113f8fcf485e656da7794a27bf1ea4bf35163a1e65ef647b726538f6f7aee476e7ff5011bd7f48793891be8b22410991909f6a6a91e0005bff29ebfdb5dd2c5153081e876cc6a808528a32c3a7c4eb45ac55d5ea762a9501000000fe9b1580a7fbc443765b093703b79eda6c891d9e043fb1a0c8be17d44194a7df81e2121c62dc000000000000000000000017b0dc0477af64eb42e57981b11cb4179a7839ef86c709aa3208e0ebc08942051139bafd5bccce574f5fece92fb710f0676d484acea6b7e1d3a3fda8a98aabc6505f5677c1ab84a68a64334fda33160fc3c0691b46ec4ddcf3eff4404b1ad216b20a56b54b485632eade33931ca01d11b9000000007de9c6cfeebacdbd9f514901acbf8c8afbc42b88baeceb2b0495a2a153029b68d12cfb5e3c4b19e384d7241433ad83000000000000d2780f170cf0c69d00a133e40f14fb9a169d0fda8f0536916804c17344f1edf0dc5ff07f6fac8d1d27ce3ba21d44536ba303d47d86eddf7b9d2300000000000000000000000051b637b049a77385b2eea214ffff000000000000f0a1ce1526d1ca7900c22755c0f724a0d399816f89f5f8f19148962ab4b66ed78cff54eeb1bcbd2d475fd255be7e598c9cc109a5ce45aebd5460a952ab01319a024f467986e5d6b85fabd2f93a9fe368d92979ca30407a1dcdd2bf49c13edcf5449f57dff204217bcfc3804c6b600a7d2141e7393bbc965bfeb0e40f985ed4c8f5e1eb48685e3e9bda17d9bc6eb733ccc952b25a4a059c4b2a85219331bf685e4420e46cb2c1a9ce91feae5657b2996b1f5687126ccfb08896bcd379cd9d249453594f79f39d24d640fcbf2e19d8f4b4f54ef1f959f10a49255ffcfaecb152d188c0596518c7d464fb4151961ce81f100b545a7c9df02420104639ad985832f1049945cf82dfdd0b3f1c2f463bfd18a891edb87580d6da019d894188b3801a4c6bb70c8e2b0a53eb8016be520510fe9b0cca0a6cfa2f4fc3b900"/1934], &(0x7f0000000340)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x6, 0x2, &(0x7f0000000600)=@raw=[@ldst={0x0, 0x0, 0x6, 0x5}, @jmp={0x5, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffff8}], &(0x7f0000000680)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0xffffffff, &(0x7f0000000140)="a673f3ce05f1a282eeab0500330005008110e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3a8, 0x0, 0x4a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) syz_open_procfs$namespace(0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) [ 493.162882][T15093] Bluetooth: hci2: command 0x0419 tx timeout 23:03:16 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:16 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"/1934], &(0x7f0000000340)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x6, 0x2, &(0x7f0000000600)=@raw=[@ldst={0x0, 0x0, 0x6, 0x5}, @jmp={0x5, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffff8}], &(0x7f0000000680)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0xffffffff, &(0x7f0000000140)="a673f3ce05f1a282eeab0500330005008110e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3a8, 0x0, 0x4a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) syz_open_procfs$namespace(0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) [ 493.629877][T15093] Bluetooth: hci3: command 0x0419 tx timeout [ 493.708115][T15777] rose0: default qdisc (pfifo_fast) fail, fallback to noqueue 23:03:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000004503000000fefff67a0af0ffe8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000100b7050000640000006a0a00fe00000000850000000b000000b70000004dc50000950000000000000089c81f20273d16b52eb83ec5a3000000000000000090941bd3108d311f7801000000000000000012cf6956e002000000000000006ab2367e8a87554c901f03733d40c62753ecd1f46f09beb1bbfad9bae24b4e8a96ec60f2af2cf99376e43836ba33fd5a447f8e80148b929304000755861103bb45e5d53c9fe36b34444bb7e9670e615b826859d017fc94c5857ead931db6cd370e93b6d5a74cc1d2c50896249ed7420f8680a730d876c36a1f02378eb12d0000556ec919d0b1681369d448c6f8a5cc77c17c996c59d115baf6d1c889109dde3e4c8d4e7f20fd224829af6de3d5ef71857496714db96c836db18ea5189cfbddd6e4de3617a9abc31f82984050fbee8dd9d11b370c05e1f134e5f90a326b0cb5268e40f5ba9b538c32acc2a63c464c60a516c3f87f05e5d1af657c445131edb61670ff2c62117e96eba223ffffffff00000000d2aad967d9e293fad4e69127d5656e63bf02a5ac113879bfc27d7e6ba1f41301065efb1685e22251d556a89c2886ea64bc457280330dc9cdb6890ebda8f038de3c753fdb023400010000796a7823d24f795ab1258fe937312fc5e921e8758153be202ffca15500001970e28e6238581501b710cf8b82bc02c12fe01bd8df4e97d3aed0c415a49dc67e8a3693b23668c55eed4e24eafa16a4f43b6729990a9321531e5eb006b547c13cdfa22faf5ba0bbeda4f1181d07a28d77ea1c5aa7f5d58331ad45fc89ac44c9d2d6b3db76fc9d341f076200f85d2b53455187cf493901ad919329a295f63be4e91417b9cd09cf47278ad771ad171c31c7fcff2a9e869c2144f5775c37084acc57b5793f25f853f7a98965e5bd9ff5253f787eb3215723550000000056abdefce1b79ddd22976be5c0a0223ba549828029af8de217c2ff79e68f648420cbb226a752b817fc17efaa3268c68d23659a581b7c43263f95946caba8d4c3b1472b08c6de0adbaeda5b2d63835dc147e69204ce1c0cb20ea6f9393e8fc685cb742036437354cc7a64b48743d1f1dbfd6d8169cfe3da7dc5d77bbc26f5ed74953e29837f614415015cbc113516e3402c1301e9668d6493087475a101d077632b20aeff95c4415b1ef22aa16661392f40f0ea914474adb817001f59058641f6a764c7a1652d96dcfa640d780ca1ec01c9bc314146a00e375a8d146eb87bb25c2f2cce0935a5f33deeebdd5b956d25da0cf00ad09e10e8aa7d879bed35491223b15b34438be933bfacffae28e9d027624638d933c159fbc293916ebcc6b2eb67fe9d321b7c08dfa128a64f1e36527bd8144e69c289b8d07ef6619d6442520d16ca714a4dce016f243e418875d5684b997648150000000000000000000000cd99f155c385e01d497f04b068b885dda21d3dd79d34074234b110234251dd31c07e33d49fe1ca289b44b7233c102d7cd67ffd6069c5ef77cc15912cab8df161b5ae0b54681f1637eada2cdfb08cd7d7badec9238c461aa1d0aa7998878147c798d26eec743249e8307297a95e6a3aff97b831ff827bd657fe74c4612d113f8fcf485e656da7794a27bf1ea4bf35163a1e65ef647b726538f6f7aee476e7ff5011bd7f48793891be8b22410991909f6a6a91e0005bff29ebfdb5dd2c5153081e876cc6a808528a32c3a7c4eb45ac55d5ea762a9501000000fe9b1580a7fbc443765b093703b79eda6c891d9e043fb1a0c8be17d44194a7df81e2121c62dc000000000000000000000017b0dc0477af64eb42e57981b11cb4179a7839ef86c709aa3208e0ebc08942051139bafd5bccce574f5fece92fb710f0676d484acea6b7e1d3a3fda8a98aabc6505f5677c1ab84a68a64334fda33160fc3c0691b46ec4ddcf3eff4404b1ad216b20a56b54b485632eade33931ca01d11b9000000007de9c6cfeebacdbd9f514901acbf8c8afbc42b88baeceb2b0495a2a153029b68d12cfb5e3c4b19e384d7241433ad83000000000000d2780f170cf0c69d00a133e40f14fb9a169d0fda8f0536916804c17344f1edf0dc5ff07f6fac8d1d27ce3ba21d44536ba303d47d86eddf7b9d2300000000000000000000000051b637b049a77385b2eea214ffff000000000000f0a1ce1526d1ca7900c22755c0f724a0d399816f89f5f8f19148962ab4b66ed78cff54eeb1bcbd2d475fd255be7e598c9cc109a5ce45aebd5460a952ab01319a024f467986e5d6b85fabd2f93a9fe368d92979ca30407a1dcdd2bf49c13edcf5449f57dff204217bcfc3804c6b600a7d2141e7393bbc965bfeb0e40f985ed4c8f5e1eb48685e3e9bda17d9bc6eb733ccc952b25a4a059c4b2a85219331bf685e4420e46cb2c1a9ce91feae5657b2996b1f5687126ccfb08896bcd379cd9d249453594f79f39d24d640fcbf2e19d8f4b4f54ef1f959f10a49255ffcfaecb152d188c0596518c7d464fb4151961ce81f100b545a7c9df02420104639ad985832f1049945cf82dfdd0b3f1c2f463bfd18a891edb87580d6da019d894188b3801a4c6bb70c8e2b0a53eb8016be520510fe9b0cca0a6cfa2f4fc3b900"/1934], &(0x7f0000000340)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x6, 0x2, &(0x7f0000000600)=@raw=[@ldst={0x0, 0x0, 0x6, 0x5}, @jmp={0x5, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffff8}], &(0x7f0000000680)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0xffffffff, &(0x7f0000000140)="a673f3ce05f1a282eeab0500330005008110e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3a8, 0x0, 0x4a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) syz_open_procfs$namespace(0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) 23:03:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:17 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"/1934], &(0x7f0000000340)='GPL\x00'}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x660c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x6, 0x2, &(0x7f0000000600)=@raw=[@ldst={0x0, 0x0, 0x6, 0x5}, @jmp={0x5, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffff8}], &(0x7f0000000680)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r0, 0x0, 0x10, 0xffffffff, &(0x7f0000000140)="a673f3ce05f1a282eeab0500330005008110e63238f9cf8c0ccade00556e97d003cc298613f230d6841f3099e19fd903b2ffa5106c71ac91c7457b2d7f4157f069737d63ab32be2a651d7cee2970a9df488cae6702031c92a8b4b6376f9972f3848c104d413745d4c57253b2d61d64787c4de49fc5", 0x0, 0x3a8, 0x0, 0x4a, 0xffffffffffffffbc, &(0x7f0000000040)="15396af9a72e96da8129ed1653da4c7f58430968e943c7415c1135cc832d158cfe31f78128c0f6ced392de7b250aa16a0837c05297e7c9d3db2466761815aeb216c263f7010b0d4de72c5f199f0be260a48e8c37d2ea3a52026012d3"}, 0x28) syz_open_procfs$namespace(0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x4004743c, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x0) 23:03:17 executing program 0: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x38}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'bridge_slave_0\x00', 0x100}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00'}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000000c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8943, &(0x7f0000000080)) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000040)={r2}, 0x8) ioctl$TUNSETLINK(r4, 0x400454cd, 0x101) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'rose0\x00', 0x1}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x80, 0x8, 0x3, 0x0, 0x6, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x6, 0xc1e}, 0x288, 0x4, 0x100, 0x5, 0x9, 0x7, 0x0, 0x0, 0x1d, 0x0, 0x9}, 0xffffffffffffffff, 0x0, r0, 0x2) close(r6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 23:03:21 executing program 1: syz_clone(0x40000100, &(0x7f00000002c0), 0x0, &(0x7f0000000340), 0x0, 0x0) 23:03:21 executing program 5: syz_clone(0x42980300, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 23:03:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000640), 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000140)) 23:03:21 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:21 executing program 2: syz_clone(0x40000100, &(0x7f00000002c0)="6b469629e1bdcc576c18e4020bafbd0d035a2a66a7238add6b3c70d34f807e1327f6150991a6c7617643b35c2cc21ffe3e5566315ac6ee72d33599b6", 0x3c, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="313fde0198e484888a12ca4d159532d106cbe6d4e92242b40cf707d0662acf546b5b702d4ba6ab78d0f75b3169e56f04580b0b3dd913f931c65f18958bd68547f18768cbc90ffb95e97b2dfc1673541d4dd709d8") 23:03:21 executing program 3: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x70000000, 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:21 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000014c0)='ns/user\x00') 23:03:21 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x2, 0x4, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:03:21 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x6, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:03:22 executing program 5: syz_clone(0x42980300, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0) 23:03:22 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000003700)=@bloom_filter={0x1e, 0x0, 0x4, 0x2000000}, 0x48) 23:03:22 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000080), 0x2, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000380)='syz1\x00', 0x200002, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f00000003c0), 0x8) openat$cgroup_freezer_state(r2, &(0x7f0000000000), 0x2, 0x0) openat$cgroup(r0, &(0x7f00000002c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup(r1, &(0x7f0000000200)='syz0\x00', 0x200002, 0x0) openat$cgroup_pressure(r3, &(0x7f0000000240)='memory.pressure\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.io_serviced_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000340)={@map=0x1, r4, 0x26, 0x1}, 0x14) openat$cgroup_freezer_state(r1, &(0x7f0000000280), 0x2, 0x0) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=0x1, 0x4) mkdirat$cgroup(r3, &(0x7f0000000180)='syz0\x00', 0x1ff) 23:03:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000880)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0x3, 0x0, [{}, {}]}]}}, &(0x7f00000007c0)=""/181, 0x36, 0xb5, 0x1}, 0x20) 23:03:22 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000018c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x89e0, 0x0) 23:03:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000018c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x8903, 0x0) 23:03:22 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040), 0x59) 23:03:22 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000018c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_RESET(r0, 0x894c, 0x0) 23:03:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0xf, 0x0, 0x0, [{}]}]}}, &(0x7f00000013c0)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 23:03:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0xe, 0x0, 0x0, 0x0}, 0x20) 23:03:22 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) write$cgroup_devices(r1, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 23:03:22 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r0, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000001480)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:03:23 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x8, 0x1, &(0x7f00000001c0)=@raw=[@ldst], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:03:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x1}]}}, &(0x7f00000013c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 23:03:23 executing program 5: bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) syz_clone(0x70000000, 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)) 23:03:23 executing program 3: syz_clone(0x4041100, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)='!') 23:03:23 executing program 2: bpf$PROG_LOAD_XDP(0x6, &(0x7f00000003c0)={0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:03:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:23 executing program 1: bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x7, 0x0, 0x0, 0x0, 0x0, 0x2}]}, &(0x7f0000000300)='syzkaller\x00', 0x1, 0xaa, &(0x7f00000004c0)=""/170, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:03:23 executing program 2: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_clone(0x60001000, &(0x7f0000000b40)="7033d1f25d631ba2b15100e6909dd96b1f6dabd2a16f7dba3f1c945476d1a1be7073e811074d15017b633159c4095ebbaed01963cc7ce3b668ef026d2cdcc33cadd78165b97a061def76e8d2bd46308d7cfd89f75412ba61293b0ccbc3eacdb749a52ff99c7fdb81b4b5ab7bcb2bb61eae88cf20b4c10862d99c750d7477b318bef3a1f368e0345ae83e7ff76a2cc2b4218c9e3a079f86a3abcb61ac08089c6b8127add6e52a872d482c2392d47c275bb17b9c358ecb43b1c217a3511fd24156189d415f571d9e45614ae2409a54a0ef6ac1deffe52a3cb2275c433f8169a14707ce71e5155e8a7a4a3369ef08b62de52e64bbe59ff9023b4aad7cf02633b52217bfea37ddf2ed11f9f37c8b1e34f68dcb4e76901f722ba36cc20b41ba52fd8bd14e6068889747d0ae18c398eacd5fc7c126dc68d627e0daca33f1740f6f62eb1dd4428d1ce3f3285d5c4f9734cc360a27003c494c9e519b58a02b706bee28b85cef8206a29b556570f9e1a2e1e67286cc21e5df5c444bb5b1715060289c09f8f3935371f9066884c19ef140e55f7dae7a444fd401ddc27925bf7770bed934c61877a07d6f6753dfb8d0142ad094b6736e8171eb7d61417ecb22fee9a3aa4cd5e45f49a7588a834217c97f0ebbc4b86e4a19cd4b45c3d78be71ae89b61f8dc2681a1b3fe9b8a6e581734f18363a52f9222814e170c7d0de629dd197a05c7ab8cde06262a988d96392192ab19ba2360f89ab21c41b9107510a805156f8f1a6ee956eab4fbbdbfe0513d0620f513d24942e14756ab739864048e84f882da56180d27f572db8c2a61ae83828e664fc013e8b9437b80c35855e14f11d2d1787fdfa73df9f399ac684003ec5886bb0d445a472608c224751f559481044d587382a4e3f9b433ec2d7245c619e2cb156a8658b8c90df61fedddbdd073c30b1d1ca99c2a86fba9084e07fbb1f00d9135b7ee66b0c3a16ff5902ac87c1ac59bd7159e4bff189d7a0e6b58e2f533769ec9145ac9fb5eb380fd6860ed5dde8cd6f3856fdd7761eb0c352b791dbfc9671253c823acfeb31fdbba9d212e192378e0f98c0011b1bacf58344294aa56124c6feef62d225c077b3bb5f5dc3f5851c4e4caecfc7a7995db12735f5856d65a8a46b0c43009d9aa35ea9a25fa7107ae8146a15eb51a5011532d6c09fe13af38f7740139073b4671e3db11d48e65ab5c0073b59905e32ba7a37a5973b06a4fd5cb9df1056e0daaf5b48a120cd80badc5f79a400e0bd02c9686704abcbdf003ad459d3725d2496509d51d09140d4c10fa0a57da84cc72758c0b9b1203e0051a2dc25a40e952b3c32bc245f6a6a0a253511b7efc23dfa7c3a046a81190e58f3876fb677cbe88241721fd7dd752b60e946684d6c6661e52bd8eb1247904d0e4aefbcfccbb53031d57bbb1c00d13edf3427f41d7d02dfce9c475549d4b21f001e7ea37a3b18e42747f332cbbd5958312757810351299430307bc5122943f791e5622d0d39f8fa46ac4936226583737e43ef04326a8a8a0568b7a5d3385259352893c9f04a9478e473cd1606a3ae916e43c8c52717ac8e4931a4c980d739e6ac8873e081a2dd8fafe7ddec3e5336ae8c11255ea3a2c0b74576495aaaf47d2ec2949b3e5ecae13574eb273ec32e4e221c27e88a5c8778d3edf715b7bb0a93475bcd0938871a79b98b52bb8088c5e6a59c2542c0093d3c0c9f9f0bd1e5cf25ee7a38facd8d78c417e27cdcb626b1d31e57a113dc353dbff636b1ecc54eaab49987d27773299404dbed61bca84d11156c1a1577207ede964ef2ea35365b90e150e9fe35010768fbf94adad66e4492d75ea6d1bac850fb94fd9428c1dae3a262d787946ec17da4a6d623e61ba3c4f8af42cd6fce3f8c4580e6c1bcbb09f9752d154f7aea50297eecb559f0aaa5618d1a753ad75011c9990a95840010c2995adce946df788fc4068a7eb409b95884d0350dec31a4b22d2062953739359f037458cc0be1b9c9b9bff5d144d02998044d44144f4d8caf9874b632da76005a1593be2f5d0fa75fca6017fc9845155368d85389a2119d1063d0aac7fc35cce3362ff0ed5a89720c9f19942cd73efa4473168ca6a9468864618e59812aabe543bac27da21e92757dbfb79ad49c975f3e95efeb996a87732ce0c1e0dbf3463276597d5f25cdccf1acd47d73b18b35966985b60aeb762f0fecf0d996f66574df40ef6d9120522e4171402ce4174f1638a9a858ddd3b0de0cbc2dd4068bf1fcc12dfb6535bd8dbd1ccb0b4175c2cc3d77c70adab40c59776ef7dd3c4eab51a155e48a139c2a83b97ada5ce28d31dd7732ec7ff2b31e109e607be0fd9acaaf2fdecb71c8c7c6e34e5eb1ec261aa941807f680486e7c70feaf5fc344449fb39fc85fcc06696894cd3078cfa3ced9aa6979c170db4352c7315c4ce7766fe513e3d1e962aa2cef01216021eb341604aafca120b467cce8cfe7fd825af6fc0e9a32099a548f0355f4b3484e73f42c3ce6c41daa861f8f489c9f71cc1f5289b88dbb24f1a493927375673cffa375a8b6c3ebed6cb4c3022eb4b008cfada007a035087078c28bba4751470fc9d65b4f17973322b05f2c27bf8d1760a76bef0131ad92bdb77546cf265b63841264032bff3fdbea50e4f10d15fd304dd9ba9919078ad0163c367fc3b9dfa8e887650c9258976381faa875172430c4e81dbd5e1d0115aaf42168ee2ca3aa27f5fde1097c3cea0cad3a3b4211b9526b17deaf77d1cec65fc8a68ed21ac3731ea4b2f7b10f993fbe4a1e789eadbd1609ce4d115f4c271aac76a3561ea9d7c0beba598d501e5b26ae795a3666fa0ab31b6d83f4f15e69783e569258f9f38ca6eb84991d5a53115b9ccb8ade28d04749cc7e42d5be5859e446cabf04c202841997156e7320d2523cde105b7e29cb2d958f38423dae22277a20ba20ceb3d2d7d64cd0d2c147e3d51425adb8a92b5625dcbacd55e2bbf361c255875e5d860748a9b46f3ba3e59d4bfa2286a71573ff65ced295521e8311ea33a3034fe7b9e369f2cd4a1b2091d531bbe337af98962d7a1cd0a7b794ff7cf8afe5578ff081881d4614dbfc1f8b9f91f278358fa7f6cc68b18bf2b8db22713c5cb71f8cf08f9eea952438c892c7d4fd919ddc39543913df5bea0e2185bb9cc5b4541c92bfb16055f9aeb7741c39326aff8dda3da2814f8ae1a6c6786866fcc84d239b3177c2e2693f99068c45569cf2817f34d6dbc676648b564b47dd62fa07b124fc9890489164147a444de5a49802c35d073a9a4715c9b676e4fde4e306e5360ec77306ab19cd4ff5b0237753b3cd241c406e879b9ba2bed4ce2bc9bd557d071ebf0147ad804bd82408414a0ef7da26e0000e7deccfa3e81b818e8e2c9d2b061e142a3aa8e775cd0bd239c8c73ad5d5200fb713eae89819fb9df8bc28310b392c5cf93b53de7fc22b997d13e416132bd296b6bc17411635a7bb47ec21bc4c24b02faad5761c27cb359d57bc0621b1174607037dfda59c1ae3fdf261accf5ecea8da12b817f3f2884371732e17143428354ec408d7d59019e1cb74d2393b4715f3af432ccf25fab2d7a3a881e4a3", 0x9ec, &(0x7f0000000540), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 23:03:23 executing program 0: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000240)='\x00') openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_clone(0x60001000, &(0x7f0000000b40), 0x0, &(0x7f0000000540), 0x0, 0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) 23:03:23 executing program 3: bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) syz_clone(0x60001000, 0x0, 0x0, &(0x7f0000000540), 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) 23:03:23 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000038c0)=@base={0x1, 0x5, 0x5, 0x8f, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x8, r0}, 0x38) 23:03:23 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/pid_for_children\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') 23:03:23 executing program 5: bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) syz_clone(0x70000000, 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)) 23:03:23 executing program 1: syz_clone(0x52040580, 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:24 executing program 0: perf_event_open(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10900, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4802}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:03:24 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x4001) 23:03:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xec010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) 23:03:24 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x6, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 23:03:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:24 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_freezer_state(r0, &(0x7f0000000200), 0x2, 0x0) write$cgroup_freezer_state(r1, 0x0, 0x0) 23:03:24 executing program 5: bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) syz_clone(0x70000000, 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)) 23:03:24 executing program 1: syz_clone(0x52040580, 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:24 executing program 2: bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77fc, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x5}, 0x709a4, 0x0, 0x2, 0x0, 0x0, 0x800002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000340)='memory.numa_stat\x00', 0x26e1, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x0, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x59, &(0x7f00000004c0)=""/89, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000400), 0x8, 0x10, &(0x7f0000000540)={0x5}, 0x10}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0xc, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x800}, [@alu={0x4, 0x1, 0x2, 0x7, 0xa, 0x30, 0x8}, @alu={0x7, 0x0, 0x0, 0x2, 0xb, 0xfffffffffffffff8, 0x4}, @cb_func={0x18, 0x0, 0x4, 0x0, 0xfffffffffffffffd}, @alu={0x4, 0x1, 0x3, 0x9, 0x1, 0x30, 0xfffffffffffffff0}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0x80000000}, @map_idx={0x18, 0xa, 0x5, 0x0, 0xc}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x5}, @func]}, &(0x7f0000000100)='GPL\x00', 0xdb, 0x5a, &(0x7f0000000240)=""/90, 0x40f00, 0xc, '\x00', 0x0, 0xa, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xa, 0x42135782, 0x98b}, 0x10, 0xffffffffffffffff, r2, 0x0, &(0x7f0000000480)=[0xffffffffffffffff, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, r3]}, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)={[{0x0, 'cpu'}]}, 0x5) write$cgroup_int(r3, &(0x7f0000000200), 0x400086) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5531, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close(r4) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x0, 0x6, 0x8, 0x7, 0x0, 0xe000000000000, 0x1121, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x29, 0x2, @perf_bp={&(0x7f0000000580), 0x4}, 0x4200, 0xfffffffffffffc01, 0x1, 0x0, 0x80000000, 0x2, 0x1, 0x0, 0x4, 0x0, 0x4}, 0x0, 0xa, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'nr0\x00', 0x4000}) [ 501.225590][ T1231] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.225641][ T1231] ieee802154 phy1 wpan1: encryption failed: -22 23:03:24 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0xec010000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:03:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:24 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:24 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:03:24 executing program 3: socketpair(0x28, 0x0, 0x1fd, &(0x7f0000000080)) 23:03:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:25 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000080)) 23:03:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum, @func={0x1}]}}, &(0x7f00000001c0)=""/160, 0x32, 0xa0, 0x1}, 0x20) 23:03:25 executing program 5: bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) syz_clone(0x70000000, 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000180)) 23:03:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x2}]}]}, {0x0, [0x0, 0x5f, 0x2e]}}, &(0x7f0000000540)=""/170, 0x35, 0xaa, 0x1}, 0x20) 23:03:25 executing program 2: syz_clone(0x82005000, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 23:03:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:25 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x9e03}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:03:25 executing program 0: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000040), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000800)={[{0x2b, 'cpuset'}]}, 0x8) 23:03:25 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0xfffffffd, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xf7, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x51500, 0x4, 0x4, 0x0, 0x3, 0x2, 0x8000, 0x0, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4890, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x7f, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r1, 0x7) sendmsg$inet(r4, &(0x7f0000000580)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000880)="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", 0x11f}], 0x1, &(0x7f00000002c0)}, 0x20004810) sendmsg$inet(r1, &(0x7f0000000ac0)={&(0x7f0000000040)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000480)="4fedcadb29b4e77e82d784fb506e41d6df47ca45214e78146545403efe84311beefb68b1bd540ca191c33f59c9be47d4bcd512b227bbca7065c3c23d3738068555fe5fc98e4ca901bccb07f1a05c554e6fa923af440c7562271028f5737c3e9c389fcc00cf1f002b291f6fe443891d62e74d6c9a4464ad6e65fcd8f23c42288c775d6e24223fc3118be337f1b26fa7f61ce1a945dd79f9a5da93c6257d9f68d8c6bed913acf05457a595dba68ff9862c6ba7274d6995f651d3b1fe0a8cf91f9bf096f7805c6e4c988c4a188ae4144ced", 0xd0}, {&(0x7f00000009c0)="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", 0xfd}, {&(0x7f00000002c0)="fc2664cc4ff5a5f8a1f217538bd311db4301d229c353a11ceee9124309a6fd237aab8bc5ee2358135490f6e6cb0f8246546955f58237b121", 0x38}], 0x3, &(0x7f0000000b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x16, [@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x22}, @remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1]}, @rr={0x7, 0x23, 0x13, [@multicast2, @remote, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x30}, @local, @loopback]}, @ssrr={0x89, 0xb, 0x5d, [@multicast1, @loopback]}]}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0xc8}, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x6d) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000600)='cpu\xc7S\xb4\x19T#\x8e\xa1ge_percpu_sys\x00\xf1\xe3\xf6\xcc\'\x9a\xa7Q)\x88\x14-\xbe\xc2\xc3\xf9\x87 \x9d\x82\x9ckE\xfe#)\xe6Y\x1eqI\xe9\xc5\bq\xa1\t\xc1\\\xe1\x91\tZ\x14\xc1\x89 \xa0\xb1ncL\xceeC\x17\x8f\x85\xa2w\xc3\xe5$\x8c\xa9\n\x95Z\xa4{k\x04\x98;G\xff\xc8\'X\xba_\x87\xf9\xcc\x1c\x8cV\x1d7\xbfi9{\xc9(\xb7\x18\xa6\xa3\xe8Q\xf0G`\x10\xf8r\xa0A\xd6\x1d\x82\xc9\xa1\"\v\xa7\xa08\x8a\x93!\xb9rr\xe6N^C\x96\x8a\xcb0\x05BuK\xa8y\x90\x19\x8d\xe8\xbe!\xc7l\xc09\x80d\xf7T\xb3&Z,Q\x9fS\x1a\xa3') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:03:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:25 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x3, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x3, 0xf9, &(0x7f0000000100)=""/249, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000)={r0}, 0xc) 23:03:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0xb00}, 0x48) 23:03:25 executing program 5: socketpair(0x2b, 0x0, 0x0, &(0x7f0000000e80)) [ 502.273725][T15963] bridge0: port 3(veth0_to_bond) entered disabled state [ 502.274099][T15963] bridge0: port 2(bridge_slave_1) entered disabled state 23:03:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/../file0\x00', 0x0) [ 502.275421][T15963] bridge0: port 1(bridge_slave_0) entered disabled state 23:03:25 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x1a, 0x8, 0x0, &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:03:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) [ 502.526567][T15966] device veth0_to_bond left promiscuous mode [ 502.526732][T15966] bridge0: port 3(veth0_to_bond) entered disabled state [ 502.590436][T15966] device bridge_slave_1 left promiscuous mode [ 502.590589][T15966] bridge0: port 2(bridge_slave_1) entered disabled state [ 502.627484][T15966] device bridge_slave_0 left promiscuous mode 23:03:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1}, 0x48) 23:03:25 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0xc, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1}, 0x48) 23:03:25 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:25 executing program 1: bpf$BPF_LINK_CREATE(0x3, 0x0, 0x0) [ 502.627647][T15966] bridge0: port 1(bridge_slave_0) entered disabled state 23:03:26 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0xfffffffd, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xf7, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x51500, 0x4, 0x4, 0x0, 0x3, 0x2, 0x8000, 0x0, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4890, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x7f, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r1, 0x7) sendmsg$inet(r4, &(0x7f0000000580)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000880)="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", 0x11f}], 0x1, &(0x7f00000002c0)}, 0x20004810) sendmsg$inet(r1, &(0x7f0000000ac0)={&(0x7f0000000040)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000480)="4fedcadb29b4e77e82d784fb506e41d6df47ca45214e78146545403efe84311beefb68b1bd540ca191c33f59c9be47d4bcd512b227bbca7065c3c23d3738068555fe5fc98e4ca901bccb07f1a05c554e6fa923af440c7562271028f5737c3e9c389fcc00cf1f002b291f6fe443891d62e74d6c9a4464ad6e65fcd8f23c42288c775d6e24223fc3118be337f1b26fa7f61ce1a945dd79f9a5da93c6257d9f68d8c6bed913acf05457a595dba68ff9862c6ba7274d6995f651d3b1fe0a8cf91f9bf096f7805c6e4c988c4a188ae4144ced", 0xd0}, {&(0x7f00000009c0)="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", 0xfd}, {&(0x7f00000002c0)="fc2664cc4ff5a5f8a1f217538bd311db4301d229c353a11ceee9124309a6fd237aab8bc5ee2358135490f6e6cb0f8246546955f58237b121", 0x38}], 0x3, &(0x7f0000000b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x16, [@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x22}, @remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1]}, @rr={0x7, 0x23, 0x13, [@multicast2, @remote, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x30}, @local, @loopback]}, @ssrr={0x89, 0xb, 0x5d, [@multicast1, @loopback]}]}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0xc8}, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x6d) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000600)='cpu\xc7S\xb4\x19T#\x8e\xa1ge_percpu_sys\x00\xf1\xe3\xf6\xcc\'\x9a\xa7Q)\x88\x14-\xbe\xc2\xc3\xf9\x87 \x9d\x82\x9ckE\xfe#)\xe6Y\x1eqI\xe9\xc5\bq\xa1\t\xc1\\\xe1\x91\tZ\x14\xc1\x89 \xa0\xb1ncL\xceeC\x17\x8f\x85\xa2w\xc3\xe5$\x8c\xa9\n\x95Z\xa4{k\x04\x98;G\xff\xc8\'X\xba_\x87\xf9\xcc\x1c\x8cV\x1d7\xbfi9{\xc9(\xb7\x18\xa6\xa3\xe8Q\xf0G`\x10\xf8r\xa0A\xd6\x1d\x82\xc9\xa1\"\v\xa7\xa08\x8a\x93!\xb9rr\xe6N^C\x96\x8a\xcb0\x05BuK\xa8y\x90\x19\x8d\xe8\xbe!\xc7l\xc09\x80d\xf7T\xb3&Z,Q\x9fS\x1a\xa3') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:03:26 executing program 5: bpf$BPF_LINK_CREATE(0x23, 0x0, 0x0) 23:03:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0xb00}, 0x48) 23:03:26 executing program 1: syz_clone(0x0, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0) syz_clone(0x61030080, &(0x7f0000000000)="99c53fcef431368a235cec67e6bc16d2263482b0f5ea4e31265f707389fe224a64d9fc60272ef6d0e791a075d2d965ad388037b2ebdaec97eb92c14a112961b4180347a1a4a0ce13fb1f507ebbd2215096a1960ef1ec9e079efb53975a82a169f52cc767b37a50a37c83b24517a72b07bcc272da13f42db68417f7eb613d42fe9658bac42e3495243311ea88e92b47131a41c7c9cdafad6713a21c6ed0dc2e7c0f164683d068863e3a26171bb33f2abeaaeb04641f4bb9114d8f8bb8cdcea60f7d1e3be2811ec6eab3c43387fd1e60776abde99d", 0xd4, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="c61f4d3614a0b81ee785a13111a4cc3de1436c19ef283277053b00984b8b3f1acec1ea85ec54921ac9e534a4db27bdb9da6a6b181a26789ceec6f89b1f0b4fbcb294eb67a7a6a003a53b52a2cce30eaf0b58b956e7afc13c45bfcda408b5e616d57c460a880ef97f416c675d3a966b64fa5e66dc4660fe01549b178ac2c416516edaa4a8c588fda4f6c8bc04da7ead71ea64c1538e1fd5355b63d4f8e60169313d00995d005c8a137db851898267c56b76bcfb91d0e0f043a214781a08683ea143b9d7f6b9d07de28dc4e3b61b1544761e833d503258aed542624a5e65a7dac2") openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x40025400, &(0x7f00000002c0)="49c04ce7733ed6c161bf97ae3127a7bda7530ca50de15eeebf75d883af31bc8a03efb6e8fad1b3d372c3ad940a4a2fa42c761905002cc1cd25f384f9f48b44b918e81c645df1c274aa170a661f789bb5d05423b33fcab6ddbff29b4e0800aa15c4af08235d75a9bf17fb817fc0f5e68edf5f11e4040ae2643300c26f7a3f2b", 0x7f, &(0x7f0000000380), &(0x7f0000000480), &(0x7f00000003c0)="f8aedbe97f8233ec070a29caa0e5a4bff36c9568c32865d833fc7e36f019041b4909af33aee3189e212df77538d032b4fca014de6b3885768398") 23:03:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter, 0x48) 23:03:26 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0xfffffffd, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xf7, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x51500, 0x4, 0x4, 0x0, 0x3, 0x2, 0x8000, 0x0, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4890, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x7f, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r1, 0x7) sendmsg$inet(r4, &(0x7f0000000580)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000880)="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", 0x11f}], 0x1, &(0x7f00000002c0)}, 0x20004810) sendmsg$inet(r1, &(0x7f0000000ac0)={&(0x7f0000000040)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000480)="4fedcadb29b4e77e82d784fb506e41d6df47ca45214e78146545403efe84311beefb68b1bd540ca191c33f59c9be47d4bcd512b227bbca7065c3c23d3738068555fe5fc98e4ca901bccb07f1a05c554e6fa923af440c7562271028f5737c3e9c389fcc00cf1f002b291f6fe443891d62e74d6c9a4464ad6e65fcd8f23c42288c775d6e24223fc3118be337f1b26fa7f61ce1a945dd79f9a5da93c6257d9f68d8c6bed913acf05457a595dba68ff9862c6ba7274d6995f651d3b1fe0a8cf91f9bf096f7805c6e4c988c4a188ae4144ced", 0xd0}, {&(0x7f00000009c0)="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", 0xfd}, {&(0x7f00000002c0)="fc2664cc4ff5a5f8a1f217538bd311db4301d229c353a11ceee9124309a6fd237aab8bc5ee2358135490f6e6cb0f8246546955f58237b121", 0x38}], 0x3, &(0x7f0000000b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x16, [@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x22}, @remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1]}, @rr={0x7, 0x23, 0x13, [@multicast2, @remote, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x30}, @local, @loopback]}, @ssrr={0x89, 0xb, 0x5d, [@multicast1, @loopback]}]}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0xc8}, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x6d) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000600)='cpu\xc7S\xb4\x19T#\x8e\xa1ge_percpu_sys\x00\xf1\xe3\xf6\xcc\'\x9a\xa7Q)\x88\x14-\xbe\xc2\xc3\xf9\x87 \x9d\x82\x9ckE\xfe#)\xe6Y\x1eqI\xe9\xc5\bq\xa1\t\xc1\\\xe1\x91\tZ\x14\xc1\x89 \xa0\xb1ncL\xceeC\x17\x8f\x85\xa2w\xc3\xe5$\x8c\xa9\n\x95Z\xa4{k\x04\x98;G\xff\xc8\'X\xba_\x87\xf9\xcc\x1c\x8cV\x1d7\xbfi9{\xc9(\xb7\x18\xa6\xa3\xe8Q\xf0G`\x10\xf8r\xa0A\xd6\x1d\x82\xc9\xa1\"\v\xa7\xa08\x8a\x93!\xb9rr\xe6N^C\x96\x8a\xcb0\x05BuK\xa8y\x90\x19\x8d\xe8\xbe!\xc7l\xc09\x80d\xf7T\xb3&Z,Q\x9fS\x1a\xa3') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:03:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:26 executing program 2: socketpair(0x23, 0x0, 0xcfb7, &(0x7f0000000000)) 23:03:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) [ 503.141504][T16009] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.142553][T16009] bridge0: port 1(bridge_slave_0) entered disabled state 23:03:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0xb00}, 0x48) 23:03:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) [ 503.216239][T16014] device bridge_slave_1 left promiscuous mode [ 503.216387][T16014] bridge0: port 2(bridge_slave_1) entered disabled state [ 503.271357][T16014] device bridge_slave_0 left promiscuous mode [ 503.271502][T16014] bridge0: port 1(bridge_slave_0) entered disabled state 23:03:26 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0xfffffffd, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xf7, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x51500, 0x4, 0x4, 0x0, 0x3, 0x2, 0x8000, 0x0, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4890, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x7f, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r1, 0x7) sendmsg$inet(r4, &(0x7f0000000580)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000880)="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", 0x11f}], 0x1, &(0x7f00000002c0)}, 0x20004810) sendmsg$inet(r1, &(0x7f0000000ac0)={&(0x7f0000000040)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000480)="4fedcadb29b4e77e82d784fb506e41d6df47ca45214e78146545403efe84311beefb68b1bd540ca191c33f59c9be47d4bcd512b227bbca7065c3c23d3738068555fe5fc98e4ca901bccb07f1a05c554e6fa923af440c7562271028f5737c3e9c389fcc00cf1f002b291f6fe443891d62e74d6c9a4464ad6e65fcd8f23c42288c775d6e24223fc3118be337f1b26fa7f61ce1a945dd79f9a5da93c6257d9f68d8c6bed913acf05457a595dba68ff9862c6ba7274d6995f651d3b1fe0a8cf91f9bf096f7805c6e4c988c4a188ae4144ced", 0xd0}, {&(0x7f00000009c0)="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", 0xfd}, {&(0x7f00000002c0)="fc2664cc4ff5a5f8a1f217538bd311db4301d229c353a11ceee9124309a6fd237aab8bc5ee2358135490f6e6cb0f8246546955f58237b121", 0x38}], 0x3, &(0x7f0000000b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x16, [@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x22}, @remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1]}, @rr={0x7, 0x23, 0x13, [@multicast2, @remote, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x30}, @local, @loopback]}, @ssrr={0x89, 0xb, 0x5d, [@multicast1, @loopback]}]}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0xc8}, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x6d) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000600)='cpu\xc7S\xb4\x19T#\x8e\xa1ge_percpu_sys\x00\xf1\xe3\xf6\xcc\'\x9a\xa7Q)\x88\x14-\xbe\xc2\xc3\xf9\x87 \x9d\x82\x9ckE\xfe#)\xe6Y\x1eqI\xe9\xc5\bq\xa1\t\xc1\\\xe1\x91\tZ\x14\xc1\x89 \xa0\xb1ncL\xceeC\x17\x8f\x85\xa2w\xc3\xe5$\x8c\xa9\n\x95Z\xa4{k\x04\x98;G\xff\xc8\'X\xba_\x87\xf9\xcc\x1c\x8cV\x1d7\xbfi9{\xc9(\xb7\x18\xa6\xa3\xe8Q\xf0G`\x10\xf8r\xa0A\xd6\x1d\x82\xc9\xa1\"\v\xa7\xa08\x8a\x93!\xb9rr\xe6N^C\x96\x8a\xcb0\x05BuK\xa8y\x90\x19\x8d\xe8\xbe!\xc7l\xc09\x80d\xf7T\xb3&Z,Q\x9fS\x1a\xa3') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:03:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc688144412c622c9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x80) 23:03:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:26 executing program 2: bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x2) 23:03:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0x18, 0x4, 0x2, 0x0, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0xb00}, 0x48) 23:03:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:26 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0xfffffffd, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xf7, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x51500, 0x4, 0x4, 0x0, 0x3, 0x2, 0x8000, 0x0, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4890, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x7f, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r1, 0x7) sendmsg$inet(r4, &(0x7f0000000580)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000880)="0cf3f979f081fffb328ea6f381fc34d4c7ff498e91f804cc451a57e04b2c70a1ed076b8224e97f941cf00b9cec9a6613a720cdcc9632ca6816c76c7ca71093174f623e397d73696fbe9aa215b06945aaadfba01a94fd87137129aa72ff99790fd81012139bef61502d0551ebc4c6d3bdd0fb640645b8125312f7b0709b2043fbabf3a2e3dd9f964d943546703759a80ea1f4d89d7cd5d675f9fc1f68f2deeeb432e7750a81c360dd74a51d8ad00096d212880bf17f7829bd117ecf40e0659b5a6c5ad67f56fdf64d110b271b064e190f9c4bffa7458245d2f8df68f74e0a012a716925fd92374eb152c9c57cb92e1f924585f7808b2bacfc61b1547741437c5025597b2f492076fd68d98c04cd9956d710f0309354d130403143b4046334ff", 0x11f}], 0x1, &(0x7f00000002c0)}, 0x20004810) sendmsg$inet(r1, &(0x7f0000000ac0)={&(0x7f0000000040)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000480)="4fedcadb29b4e77e82d784fb506e41d6df47ca45214e78146545403efe84311beefb68b1bd540ca191c33f59c9be47d4bcd512b227bbca7065c3c23d3738068555fe5fc98e4ca901bccb07f1a05c554e6fa923af440c7562271028f5737c3e9c389fcc00cf1f002b291f6fe443891d62e74d6c9a4464ad6e65fcd8f23c42288c775d6e24223fc3118be337f1b26fa7f61ce1a945dd79f9a5da93c6257d9f68d8c6bed913acf05457a595dba68ff9862c6ba7274d6995f651d3b1fe0a8cf91f9bf096f7805c6e4c988c4a188ae4144ced", 0xd0}, {&(0x7f00000009c0)="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", 0xfd}, {&(0x7f00000002c0)="fc2664cc4ff5a5f8a1f217538bd311db4301d229c353a11ceee9124309a6fd237aab8bc5ee2358135490f6e6cb0f8246546955f58237b121", 0x38}], 0x3, &(0x7f0000000b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x16, [@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x22}, @remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1]}, @rr={0x7, 0x23, 0x13, [@multicast2, @remote, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x30}, @local, @loopback]}, @ssrr={0x89, 0xb, 0x5d, [@multicast1, @loopback]}]}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0xc8}, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x6d) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000600)='cpu\xc7S\xb4\x19T#\x8e\xa1ge_percpu_sys\x00\xf1\xe3\xf6\xcc\'\x9a\xa7Q)\x88\x14-\xbe\xc2\xc3\xf9\x87 \x9d\x82\x9ckE\xfe#)\xe6Y\x1eqI\xe9\xc5\bq\xa1\t\xc1\\\xe1\x91\tZ\x14\xc1\x89 \xa0\xb1ncL\xceeC\x17\x8f\x85\xa2w\xc3\xe5$\x8c\xa9\n\x95Z\xa4{k\x04\x98;G\xff\xc8\'X\xba_\x87\xf9\xcc\x1c\x8cV\x1d7\xbfi9{\xc9(\xb7\x18\xa6\xa3\xe8Q\xf0G`\x10\xf8r\xa0A\xd6\x1d\x82\xc9\xa1\"\v\xa7\xa08\x8a\x93!\xb9rr\xe6N^C\x96\x8a\xcb0\x05BuK\xa8y\x90\x19\x8d\xe8\xbe!\xc7l\xc09\x80d\xf7T\xb3&Z,Q\x9fS\x1a\xa3') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:03:26 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@bloom_filter={0x1e, 0x0, 0x0, 0x0, 0x14a4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1}, 0x48) 23:03:26 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x1, 0xc, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:03:26 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:26 executing program 0: syz_clone(0x0, &(0x7f0000000040)="82", 0x1, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) 23:03:27 executing program 1: syz_clone(0x0, &(0x7f000000d180)="a6", 0x1, 0x0, 0x0, &(0x7f000000e200)) 23:03:27 executing program 3: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0xfffffffd, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xf7, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x51500, 0x4, 0x4, 0x0, 0x3, 0x2, 0x8000, 0x0, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4890, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x7f, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r1, 0x7) sendmsg$inet(r4, &(0x7f0000000580)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000880)="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", 0x11f}], 0x1, &(0x7f00000002c0)}, 0x20004810) sendmsg$inet(r1, &(0x7f0000000ac0)={&(0x7f0000000040)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000480)="4fedcadb29b4e77e82d784fb506e41d6df47ca45214e78146545403efe84311beefb68b1bd540ca191c33f59c9be47d4bcd512b227bbca7065c3c23d3738068555fe5fc98e4ca901bccb07f1a05c554e6fa923af440c7562271028f5737c3e9c389fcc00cf1f002b291f6fe443891d62e74d6c9a4464ad6e65fcd8f23c42288c775d6e24223fc3118be337f1b26fa7f61ce1a945dd79f9a5da93c6257d9f68d8c6bed913acf05457a595dba68ff9862c6ba7274d6995f651d3b1fe0a8cf91f9bf096f7805c6e4c988c4a188ae4144ced", 0xd0}, {&(0x7f00000009c0)="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", 0xfd}, {&(0x7f00000002c0)="fc2664cc4ff5a5f8a1f217538bd311db4301d229c353a11ceee9124309a6fd237aab8bc5ee2358135490f6e6cb0f8246546955f58237b121", 0x38}], 0x3, &(0x7f0000000b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x16, [@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x22}, @remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1]}, @rr={0x7, 0x23, 0x13, [@multicast2, @remote, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x30}, @local, @loopback]}, @ssrr={0x89, 0xb, 0x5d, [@multicast1, @loopback]}]}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0xc8}, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x6d) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000600)='cpu\xc7S\xb4\x19T#\x8e\xa1ge_percpu_sys\x00\xf1\xe3\xf6\xcc\'\x9a\xa7Q)\x88\x14-\xbe\xc2\xc3\xf9\x87 \x9d\x82\x9ckE\xfe#)\xe6Y\x1eqI\xe9\xc5\bq\xa1\t\xc1\\\xe1\x91\tZ\x14\xc1\x89 \xa0\xb1ncL\xceeC\x17\x8f\x85\xa2w\xc3\xe5$\x8c\xa9\n\x95Z\xa4{k\x04\x98;G\xff\xc8\'X\xba_\x87\xf9\xcc\x1c\x8cV\x1d7\xbfi9{\xc9(\xb7\x18\xa6\xa3\xe8Q\xf0G`\x10\xf8r\xa0A\xd6\x1d\x82\xc9\xa1\"\v\xa7\xa08\x8a\x93!\xb9rr\xe6N^C\x96\x8a\xcb0\x05BuK\xa8y\x90\x19\x8d\xe8\xbe!\xc7l\xc09\x80d\xf7T\xb3&Z,Q\x9fS\x1a\xa3') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:03:27 executing program 2: syz_clone(0x0, &(0x7f000000d180)="a6", 0x1, 0x0, 0x0, 0x0) 23:03:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 0: syz_clone(0x0, &(0x7f000000d180)="a6", 0x1, &(0x7f000000e180), 0x0, 0x0) 23:03:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x8, 0xfffffffd}, 0x48) 23:03:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 5: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x2000c, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x777c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x408fc, 0x0, 0xfffffffd, 0x1, 0x0, 0x10800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xf7, 0x0, 0x80, 0x2, 0x0, 0x1ff, 0x40100, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x5}, 0x51500, 0x4, 0x4, 0x0, 0x3, 0x2, 0x8000, 0x0, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x18) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x7, r1, 0x8) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454c9, 0x1a) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000240)={'macvlan1\x00', 0x800}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x3, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = perf_event_open(&(0x7f0000000400)={0x4, 0x80, 0x6, 0x21, 0x4, 0x8, 0x0, 0x1, 0x102, 0xf, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x3, @perf_config_ext={0xfffffffffffffff9, 0xc74}, 0x4890, 0x8000000000004, 0x0, 0x4, 0x8, 0x7, 0x7f, 0x0, 0x1f9, 0x0, 0x1a5635ba}, 0xffffffffffffffff, 0xa, r1, 0x7) sendmsg$inet(r4, &(0x7f0000000580)={&(0x7f00000000c0)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000880)="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", 0x11f}], 0x1, &(0x7f00000002c0)}, 0x20004810) sendmsg$inet(r1, &(0x7f0000000ac0)={&(0x7f0000000040)={0x2, 0x4e21, @private=0xa010101}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000480)="4fedcadb29b4e77e82d784fb506e41d6df47ca45214e78146545403efe84311beefb68b1bd540ca191c33f59c9be47d4bcd512b227bbca7065c3c23d3738068555fe5fc98e4ca901bccb07f1a05c554e6fa923af440c7562271028f5737c3e9c389fcc00cf1f002b291f6fe443891d62e74d6c9a4464ad6e65fcd8f23c42288c775d6e24223fc3118be337f1b26fa7f61ce1a945dd79f9a5da93c6257d9f68d8c6bed913acf05457a595dba68ff9862c6ba7274d6995f651d3b1fe0a8cf91f9bf096f7805c6e4c988c4a188ae4144ced", 0xd0}, {&(0x7f00000009c0)="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", 0xfd}, {&(0x7f00000002c0)="fc2664cc4ff5a5f8a1f217538bd311db4301d229c353a11ceee9124309a6fd237aab8bc5ee2358135490f6e6cb0f8246546955f58237b121", 0x38}], 0x3, &(0x7f0000000b00)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_retopts={{0x64, 0x0, 0x7, {[@ssrr={0x89, 0x23, 0x16, [@remote, @loopback, @dev={0xac, 0x14, 0x14, 0x22}, @remote, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, @multicast1]}, @rr={0x7, 0x23, 0x13, [@multicast2, @remote, @private=0xa010102, @broadcast, @dev={0xac, 0x14, 0x14, 0x24}, @dev={0xac, 0x14, 0x14, 0x30}, @local, @loopback]}, @ssrr={0x89, 0xb, 0x5d, [@multicast1, @loopback]}]}}}, @ip_ttl={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3}}], 0xc8}, 0x800) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000380)='bridge0\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0xf7, &(0x7f0000000780)='ip6gretap0\x00K>\xccn\x9dO\b\'\x90\xb2\x92\xb6\x97g\x05\xc3\xdco\xf5\fJ\xecR\x8dno\x05\x14\xc1vu\x9f/x\xe64gl\xe7\xd3{)\xe2\xb0\xe1K\x9a3\x8e\x91\x82h\xff\x1e\x14\xa0\xd8\xf5\x8c.\x980o.\xcbRRs\xed\xf2,\x15Jo\x88%\xbagE\x7f\xfa\n\x90\xda\xa6\xfd\x81\x83G\x97\xe2\xca/B>H\xfd[\xdc\xd0\x88\xe6Z\x05\xb5\xaa\x13M\xa1\xc5\xa911\tA\x9d\x816\xb1\x1aC\x91\xb7>\xa6\x18\xcf{ \a\x9c&\xab0\xb4\x87#\xe8\xd5qa\x13,\x1d\x0f3\xdf\x8d\xbfV\xd4z\xef\xf5\xf8\xc6ID:\xf4\xc5\x12RM\xaa\x00ZwH\x89\xb23\x02\xd3\xbe\n7<\xf5\xa6\xd4\xf5\xbd\xb2/\xae\"\xc4\xd3\xfeh\xd0\x85|\x8a\xf3Z\x0e\x8bn[\xc8\xa6\xb5\xf6\xfc1'}, 0x6d) socketpair(0x9, 0x800, 0x0, &(0x7f00000003c0)) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000600)='cpu\xc7S\xb4\x19T#\x8e\xa1ge_percpu_sys\x00\xf1\xe3\xf6\xcc\'\x9a\xa7Q)\x88\x14-\xbe\xc2\xc3\xf9\x87 \x9d\x82\x9ckE\xfe#)\xe6Y\x1eqI\xe9\xc5\bq\xa1\t\xc1\\\xe1\x91\tZ\x14\xc1\x89 \xa0\xb1ncL\xceeC\x17\x8f\x85\xa2w\xc3\xe5$\x8c\xa9\n\x95Z\xa4{k\x04\x98;G\xff\xc8\'X\xba_\x87\xf9\xcc\x1c\x8cV\x1d7\xbfi9{\xc9(\xb7\x18\xa6\xa3\xe8Q\xf0G`\x10\xf8r\xa0A\xd6\x1d\x82\xc9\xa1\"\v\xa7\xa08\x8a\x93!\xb9rr\xe6N^C\x96\x8a\xcb0\x05BuK\xa8y\x90\x19\x8d\xe8\xbe!\xc7l\xc09\x80d\xf7T\xb3&Z,Q\x9fS\x1a\xa3') ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89a1, &(0x7f0000000080)) 23:03:27 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000400)={&(0x7f00000003c0)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000340)={&(0x7f0000000300)='./file0\x00'}, 0x10) 23:03:27 executing program 0: syz_clone(0x6e47dac878b15347, 0x0, 0x0, 0x0, 0x0, 0x0) 23:03:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 1: syz_clone(0x3c202100, 0x0, 0x700, 0x0, 0x0, 0x0) 23:03:27 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x11, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000900000000000000020000001863000000000000000000000000000085000000980000000c"], &(0x7f0000000200)='syzkaller\x00', 0x1, 0xd9, &(0x7f0000000240)=""/217, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 23:03:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 0: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0xfffffff7}, 0x8) 23:03:27 executing program 1: bpf$MAP_UPDATE_BATCH(0x4, 0x0, 0x0) 23:03:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:27 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) 23:03:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:28 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) 23:03:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) 23:03:28 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:28 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:29 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r3) 23:03:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:29 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) 23:03:29 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) 23:03:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) 23:03:29 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r3) 23:03:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:30 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) 23:03:30 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) 23:03:30 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, 0x0, 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) 23:03:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:31 executing program 2: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r3) 23:03:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 23:03:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:31 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 23:03:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) 23:03:31 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:31 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:32 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:32 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:03:32 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 23:03:33 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 23:03:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) 23:03:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:03:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:33 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:03:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:03:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:33 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xf, 0x0, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12", 0x0, 0xfff}, 0x48) 23:03:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 23:03:34 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000cc0)={0x0, 0x8, &(0x7f0000000540)=ANY=[@ANYBLOB="852000000500000018110000000000000000", @ANYRES32, @ANYBLOB="0000000000001a0018310000050000000000000000000000851000000700c31a032be577654851f096edafac3c08e7dcde115b90ec1355d5e7795ab4e8feba4a8e3d948b03e25d126a3b4329bd4c498c0a54aa3c2050523cec113cc17ebde86d727a3120db4bcf14c5def7c646e78113f7f29b6e1ad38161d8e32e605283a4990de70f1a6555c05ea36d03b3e37c1d8b8e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000c80)=[0xffffffffffffffff]}, 0x80) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:34 executing program 5: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) 23:03:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x5, @perf_config_ext={0x0, 0x9}, 0x70800, 0xcf, 0x200, 0x0, 0x100000001, 0x0, 0x90b, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x3) perf_event_open$cgroup(&(0x7f0000000280)={0x0, 0x80, 0x7, 0xf8, 0x81, 0xc0, 0x0, 0x7, 0x10a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_config_ext={0x24b7}, 0x0, 0x7, 0x0, 0x9, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x47}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000004080)=@base={0x2, 0x4, 0x4, 0xbfa2}, 0x48) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000500)={0x0, &(0x7f0000000040)=""/12, &(0x7f00000003c0), &(0x7f0000000440), 0x801, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r1, 0xe0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000580)=[0x0], 0x0, 0x0, 0x8, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000006c0)={0xffffffffffffffff, 0x20, &(0x7f0000000680)={&(0x7f0000000340), 0x0, 0x0, &(0x7f00000005c0)=""/129, 0x81}}, 0x10) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000840)={r2}, 0x4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000880)={0xffffffffffffffff, 0x42}, 0xc) r7 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000900)={&(0x7f00000008c0)='./file0\x00'}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x1, 0x1, 0xbc, 0xc9, 0x0, 0x1}, 0x48) close(r8) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340), 0x200001, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x15, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8, 0x98, &(0x7f00000004c0)=""/152, 0x1e00, 0x38, '\x00', r3, 0x1f, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r4, r5, 0x0, &(0x7f0000000940)=[0x1, r6, r7, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x40086602, &(0x7f0000000180)) 23:03:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:34 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000100), 0x4) recvmsg(r0, &(0x7f0000002040)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, 0x0, 0x0) 23:03:34 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:34 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x7, 0x8}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, r0}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r1, &(0x7f0000000300), 0x20000000}, 0x20) 23:03:34 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0x0, 0x0}, 0x10) 23:03:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:34 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (fail_nth: 1) 23:03:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 1) 23:03:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0x0, 0x0}, 0x10) 23:03:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:35 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (fail_nth: 2) 23:03:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) (fail_nth: 1) 23:03:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 1) [ 511.795712][T16279] FAULT_INJECTION: forcing a failure. [ 511.795712][T16279] name fail_usercopy, interval 1, probability 0, space 0, times 1 23:03:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0x0, 0x0}, 0x10) 23:03:35 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (fail_nth: 3) [ 511.795748][T16279] CPU: 0 PID: 16279 Comm: syz-executor.1 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 23:03:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 2) [ 511.795778][T16279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:03:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 2) 23:03:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) (fail_nth: 2) 23:03:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) [ 511.795792][T16279] Call Trace: [ 511.795798][T16279] 23:03:35 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) [ 511.795806][T16279] dump_stack_lvl+0xcd/0x134 [ 511.795848][T16279] should_fail.cold+0x5/0xa [ 511.795879][T16279] _copy_from_iter+0x389/0x15a0 23:03:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 3) 23:03:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) (fail_nth: 3) 23:03:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 3) [ 511.795924][T16279] ? _copy_from_iter_nocache+0x1510/0x1510 [ 511.795960][T16279] ? __virt_addr_valid+0x5d/0x2d0 [ 511.795991][T16279] ? __phys_addr+0xc4/0x140 23:03:35 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000001c0), 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) [ 511.796021][T16279] ? __phys_addr_symbol+0x2c/0x70 [ 511.796052][T16279] ? __check_object_size+0x353/0x7a0 [ 511.796086][T16279] kernfs_fop_write_iter+0x194/0x610 [ 511.796113][T16279] ? iov_iter_init+0x45/0x1b0 23:03:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) 23:03:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.796145][T16279] new_sync_write+0x38a/0x560 23:03:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 4) 23:03:35 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2, 'net_prio'}]}, 0xa) 23:03:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 4) [ 511.796177][T16279] ? new_sync_read+0x5f0/0x5f0 [ 511.796216][T16279] ? lock_release+0x780/0x780 [ 511.796268][T16279] vfs_write+0x7c0/0xac0 23:03:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) [ 511.796305][T16279] ksys_write+0x127/0x250 [ 511.796335][T16279] ? __ia32_sys_read+0xb0/0xb0 23:03:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 5) 23:03:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x2, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0), 0x8, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:35 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x3, 'net_prio'}]}, 0xa) 23:03:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 5) [ 511.796365][T16279] ? syscall_enter_from_user_mode+0x21/0x70 [ 511.796398][T16279] ? syscall_enter_from_user_mode+0x21/0x70 23:03:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) [ 511.796434][T16279] do_syscall_64+0x35/0xb0 [ 511.796466][T16279] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 511.796496][T16279] RIP: 0033:0x7f10f8089109 23:03:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 6) 23:03:35 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:35 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 6) 23:03:35 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x8, &(0x7f0000000300)}}, 0x10) 23:03:35 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x3, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:35 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) [ 511.796516][T16279] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:03:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 7) 23:03:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) [ 511.796541][T16279] RSP: 002b:00007f10f9298168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:03:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 7) [ 511.796566][T16279] RAX: ffffffffffffffda RBX: 00007f10f819bf60 RCX: 00007f10f8089109 23:03:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) 23:03:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:36 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2d, 'net_prio'}]}, 0xa) [ 511.796583][T16279] RDX: 000000000000000a RSI: 0000000020000080 RDI: 0000000000000004 [ 511.796598][T16279] RBP: 00007f10f92981d0 R08: 0000000000000000 R09: 0000000000000000 23:03:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 23:03:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 8) 23:03:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 8) 23:03:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) [ 511.796614][T16279] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:03:36 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x30, 'net_prio'}]}, 0xa) [ 511.796630][T16279] R13: 00007fff2a3fd31f R14: 00007f10f9298300 R15: 0000000000022000 [ 511.796667][T16279] 23:03:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x5, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:36 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x4}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x2, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) [ 511.876936][T16283] FAULT_INJECTION: forcing a failure. [ 511.876936][T16283] name fail_usercopy, interval 1, probability 0, space 0, times 0 23:03:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 9) 23:03:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 9) 23:03:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) 23:03:36 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0x7ffffffff000) 23:03:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x6, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.876970][T16283] CPU: 1 PID: 16283 Comm: syz-executor.5 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 511.876998][T16283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:03:36 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 1) [ 511.877012][T16283] Call Trace: 23:03:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 10) [ 511.877017][T16283] [ 511.877025][T16283] dump_stack_lvl+0xcd/0x134 23:03:36 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) (fail_nth: 10) 23:03:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x7, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.877059][T16283] should_fail.cold+0x5/0xa [ 511.877088][T16283] _copy_from_user+0x2a/0x170 [ 511.877116][T16283] __sys_bpf+0x335/0x5700 23:03:36 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.877163][T16283] ? bpf_perf_link_attach+0x520/0x520 23:03:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 2) 23:03:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 11) 23:03:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:36 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (async) [ 511.877196][T16283] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 511.877241][T16283] ? find_held_lock+0x2d/0x110 23:03:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x8, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:36 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.877305][T16283] __x64_sys_bpf+0x75/0xb0 [ 511.877343][T16283] ? syscall_enter_from_user_mode+0x21/0x70 23:03:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 3) 23:03:36 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 12) [ 511.877373][T16283] do_syscall_64+0x35/0xb0 [ 511.877402][T16283] entry_SYSCALL_64_after_hwframe+0x46/0xb0 23:03:36 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (async) [ 511.877431][T16283] RIP: 0033:0x7f72e3489109 [ 511.877451][T16283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:03:36 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x2, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:36 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x9, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 13) 23:03:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 4) [ 511.877476][T16283] RSP: 002b:00007f72e4593168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 23:03:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x3, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:37 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xa) [ 511.877501][T16283] RAX: ffffffffffffffda RBX: 00007f72e359bf60 RCX: 00007f72e3489109 23:03:37 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xa, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 14) 23:03:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 5) [ 511.877519][T16283] RDX: 0000000000000028 RSI: 00000000200001c0 RDI: 000000000000000a [ 511.877535][T16283] RBP: 00007f72e45931d0 R08: 0000000000000000 R09: 0000000000000000 23:03:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x4, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:37 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:37 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="006e65745f7072696f203faeb4d56875eb4694b5b1d6ccd040bf515cd4e1c97542e451a83b5abf824a334f146020da617f9a5f31b89f2d8ff09119fd4f79cb61dfa1170f32e5ffad57fe7f49a4d4092b9b9297df3fc52b9f52c9e21e776950f32676fd13d917afaa06210450266297b685db6a411b092097b6dad5e89f94c1e5f3e3aaf63f6b9fe69ada38d91eefc0a8ec793cfcdb27ec256ba991be3a9b9e3104d912a83c8664a3e7e83c06370c061ebea48dd0c35e8658b934015b17010c7bcc245d4c2952ced17a4cb416182e40780f06d7e0f6f4d345df1d002eeb1810b556ac9bf52b6c91b958895929cd0bc58638db9a8f4b538d6cb5d87c63f2d0e922f2c0c1e4eb5498336527e8c9fb64ebb7a7cfa06113df8da03cca12f43e3e4294a4"], 0xa) [ 511.877551][T16283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 511.877567][T16283] R13: 00007ffd1cf0f2bf R14: 00007f72e4593300 R15: 0000000000022000 23:03:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 15) 23:03:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xb, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 6) [ 511.877602][T16283] [ 511.902019][T16287] FAULT_INJECTION: forcing a failure. [ 511.902019][T16287] name fail_usercopy, interval 1, probability 0, space 0, times 0 23:03:37 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x5, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:37 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000100)='pids.events\x00', 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async, rerun: 32) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xa) (rerun: 32) [ 511.902052][T16287] CPU: 1 PID: 16287 Comm: syz-executor.2 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 23:03:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 7) 23:03:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xc, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 16) 23:03:37 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.902078][T16287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:03:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x6, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:37 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="006e65745f7072696f20460652d8a6549823150db5"], 0xa) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r1, r1, 0x1}, 0x10) openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) [ 511.902090][T16287] Call Trace: [ 511.902096][T16287] [ 511.902104][T16287] dump_stack_lvl+0xcd/0x134 23:03:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 8) 23:03:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 17) 23:03:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xd, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.902136][T16287] should_fail.cold+0x5/0xa [ 511.902163][T16287] _copy_from_user+0x2a/0x170 [ 511.902189][T16287] __sys_bpf+0x335/0x5700 23:03:37 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x7, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.902225][T16287] ? bpf_perf_link_attach+0x520/0x520 [ 511.902256][T16287] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 511.902298][T16287] ? find_held_lock+0x2d/0x110 23:03:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 9) 23:03:37 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="006e65745f7072696f20460652d8a6549823150db5"], 0xa) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r1, r1, 0x1}, 0x10) openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) 23:03:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xe, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.902367][T16287] __x64_sys_bpf+0x75/0xb0 [ 511.902397][T16287] ? syscall_enter_from_user_mode+0x21/0x70 [ 511.902425][T16287] do_syscall_64+0x35/0xb0 23:03:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 18) 23:03:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x8, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.902454][T16287] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 511.902482][T16287] RIP: 0033:0x7f7754e89109 23:03:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 10) [ 511.902501][T16287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:03:37 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:37 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xf, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:37 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 19) 23:03:37 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="006e65745f7072696f20460652d8a6549823150db5"], 0xa) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r1, r1, 0x1}, 0x10) (async) openat$cgroup_type(r0, &(0x7f00000000c0), 0x2, 0x0) 23:03:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x9, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:37 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 11) [ 511.902525][T16287] RSP: 002b:00007f7753dfe168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 23:03:38 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.902549][T16287] RAX: ffffffffffffffda RBX: 00007f7754f9bf60 RCX: 00007f7754e89109 23:03:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xb, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x10, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:38 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r4, r5, 0x25}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000100)=0x17) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r2, r3, 0x25}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) write$cgroup_subtree(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="2dffffffff7a6572202b6d65fc6d6f727986d0f2806f28deac2014c6ede1912e0e7db68cbbd84723a154246d915a5870a1b5dc51ffb2c646636713f9ba36cc6068906964a5a0e3cb0febbdd518b8100b"], 0x11) 23:03:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 20) 23:03:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 12) [ 511.902565][T16287] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 [ 511.902580][T16287] RBP: 00007f7753dfe1d0 R08: 0000000000000000 R09: 0000000000000000 23:03:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x11, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.902596][T16287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:03:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xc, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.902610][T16287] R13: 00007ffc7c8a639f R14: 00007f7753dfe300 R15: 0000000000022000 [ 511.902642][T16287] [ 511.961130][T16286] FAULT_INJECTION: forcing a failure. 23:03:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (fail_nth: 13) 23:03:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 21) [ 511.961130][T16286] name fail_usercopy, interval 1, probability 0, space 0, times 0 23:03:38 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (async, rerun: 32) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r4, r5, 0x25}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000100)=0x17) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r2, r3, 0x25}, 0x10) (async) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) (async) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) write$cgroup_subtree(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="2dffffffff7a6572202b6d65fc6d6f727986d0f2806f28deac2014c6ede1912e0e7db68cbbd84723a154246d915a5870a1b5dc51ffb2c646636713f9ba36cc6068906964a5a0e3cb0febbdd518b8100b"], 0x11) 23:03:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x12, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xd, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.961164][T16286] CPU: 1 PID: 16286 Comm: syz-executor.0 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 23:03:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) [ 511.961193][T16286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:03:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 22) 23:03:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x13, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.961207][T16286] Call Trace: 23:03:38 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r4, r5, 0x25}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000100)=0x17) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r2, r3, 0x25}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) write$cgroup_subtree(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="2dffffffff7a6572202b6d65fc6d6f727986d0f2806f28deac2014c6ede1912e0e7db68cbbd84723a154246d915a5870a1b5dc51ffb2c646636713f9ba36cc6068906964a5a0e3cb0febbdd518b8100b"], 0x11) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1076, &(0x7f0000000300)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r4, r5, 0x25}, 0x10) (async) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000100)=0x17) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r2, r3, 0x25}, 0x10) (async) write$cgroup_subtree(r3, &(0x7f0000000080), 0x0) (async) openat$cgroup_subtree(r1, &(0x7f00000000c0), 0x2, 0x0) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000080)={r3}, 0x8) (async) write$cgroup_subtree(r6, &(0x7f0000000180)=ANY=[@ANYBLOB="2dffffffff7a6572202b6d65fc6d6f727986d0f2806f28deac2014c6ede1912e0e7db68cbbd84723a154246d915a5870a1b5dc51ffb2c646636713f9ba36cc6068906964a5a0e3cb0febbdd518b8100b"], 0x11) (async) 23:03:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xe, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.961213][T16286] [ 511.961222][T16286] dump_stack_lvl+0xcd/0x134 [ 511.961255][T16286] should_fail.cold+0x5/0xa [ 511.961285][T16286] _copy_from_user+0x2a/0x170 23:03:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x2) [ 511.961319][T16286] __sys_bpf+0x335/0x5700 23:03:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 23) [ 511.961358][T16286] ? bpf_perf_link_attach+0x520/0x520 23:03:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x14, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.961389][T16286] ? lockdep_hardirqs_on_prepare+0x400/0x400 23:03:38 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000001900000000f013b826d7523a8249412156090051695be7bbe9eea47495fb1b76dc403eff635c99781eb21199f03282b491e5539e771f19e911b79f4c1be3fbc0c13df008cf8cb4df0f64cfd169dc4bc2b523"], 0xa) [ 511.961433][T16286] ? find_held_lock+0x2d/0x110 [ 511.961498][T16286] __x64_sys_bpf+0x75/0xb0 23:03:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x3) 23:03:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 24) 23:03:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x15, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.961528][T16286] ? syscall_enter_from_user_mode+0x21/0x70 [ 511.961557][T16286] do_syscall_64+0x35/0xb0 23:03:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x10, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.961612][T16286] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 511.961642][T16286] RIP: 0033:0x7fbac8689109 23:03:38 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000001900000000f013b826d7523a8249412156090051695be7bbe9eea47495fb1b76dc403eff635c99781eb21199f03282b491e5539e771f19e911b79f4c1be3fbc0c13df008cf8cb4df0f64cfd169dc4bc2b523"], 0xa) 23:03:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x4) [ 511.961661][T16286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:03:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:38 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 25) 23:03:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x11, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:38 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x16, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.961685][T16286] RSP: 002b:00007fbac988d168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 23:03:38 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000001900000000f013b826d7523a8249412156090051695be7bbe9eea47495fb1b76dc403eff635c99781eb21199f03282b491e5539e771f19e911b79f4c1be3fbc0c13df008cf8cb4df0f64cfd169dc4bc2b523"], 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000001900000000f013b826d7523a8249412156090051695be7bbe9eea47495fb1b76dc403eff635c99781eb21199f03282b491e5539e771f19e911b79f4c1be3fbc0c13df008cf8cb4df0f64cfd169dc4bc2b523"], 0xa) (async) 23:03:38 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x5) [ 511.961709][T16286] RAX: ffffffffffffffda RBX: 00007fbac879bf60 RCX: 00007fbac8689109 23:03:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 26) 23:03:39 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x12, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.961726][T16286] RDX: 0000000000000048 RSI: 0000000020000440 RDI: 0000000000000000 [ 511.961723][T16291] FAULT_INJECTION: forcing a failure. [ 511.961723][T16291] name fail_usercopy, interval 1, probability 0, space 0, times 0 23:03:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x17, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:39 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="00e5ffff00004ecc84815fdc72c6e122ee6708357897c515fe38d3b23279e0eb38b60ebae3e77b5391c95b2bc028155ffdbc250bfe0045981c9c9ed8f1e3303038554623ef9d7662f9fe61545c23789d862d39f0aa97d9b2f39e53a646c93b36e9052d6ea2767708103944f8da9a8092c5271fa4702873baac413be35dbb7c20e7ebfe0c61627d21365b92544277eab96b19cf5ddb2a1c4c7f2dd869ab45f6229d79fc05d05c7c6c6d448d6a32ffd417490093bd5921ecc7b91339185e81898e7b6a24002e4a6ba96fa2253be4962634b6545c03e367a4dda1"], 0xa) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2d, 'hugetlb'}, {0x2d, 'freezer'}, {0x2b, 'memory'}]}, 0x1a) perf_event_open$cgroup(&(0x7f0000000140)={0x9ad909d4030bcc67, 0x80, 0x1f, 0x1, 0x5, 0x4, 0x0, 0x4a, 0x90001, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_config_ext={0x8, 0x491}, 0x40000, 0x1f, 0x81, 0x0, 0xb6, 0x3ff, 0x81, 0x0, 0x8, 0x0, 0x7f}, r1, 0xf, r2, 0x3) 23:03:39 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x6) 23:03:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x13, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:39 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 27) [ 511.961742][T16286] RBP: 00007fbac988d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 511.961758][T16286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:03:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x18, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:39 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x7) [ 511.961771][T16286] R13: 00007fffc1884f6f R14: 00007fbac988d300 R15: 0000000000022000 23:03:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x14, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x19, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.961803][T16286] [ 511.961810][T16291] CPU: 0 PID: 16291 Comm: syz-executor.1 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 23:03:39 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async, rerun: 64) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) (rerun: 64) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="00e5ffff00004ecc84815fdc72c6e122ee6708357897c515fe38d3b23279e0eb38b60ebae3e77b5391c95b2bc028155ffdbc250bfe0045981c9c9ed8f1e3303038554623ef9d7662f9fe61545c23789d862d39f0aa97d9b2f39e53a646c93b36e9052d6ea2767708103944f8da9a8092c5271fa4702873baac413be35dbb7c20e7ebfe0c61627d21365b92544277eab96b19cf5ddb2a1c4c7f2dd869ab45f6229d79fc05d05c7c6c6d448d6a32ffd417490093bd5921ecc7b91339185e81898e7b6a24002e4a6ba96fa2253be4962634b6545c03e367a4dda1"], 0xa) (async, rerun: 64) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2d, 'hugetlb'}, {0x2d, 'freezer'}, {0x2b, 'memory'}]}, 0x1a) (async, rerun: 64) perf_event_open$cgroup(&(0x7f0000000140)={0x9ad909d4030bcc67, 0x80, 0x1f, 0x1, 0x5, 0x4, 0x0, 0x4a, 0x90001, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_config_ext={0x8, 0x491}, 0x40000, 0x1f, 0x81, 0x0, 0xb6, 0x3ff, 0x81, 0x0, 0x8, 0x0, 0x7f}, r1, 0xf, r2, 0x3) 23:03:39 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 28) 23:03:39 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x8) [ 511.961845][T16291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:03:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x15, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x1a, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.961857][T16291] Call Trace: [ 511.961862][T16291] [ 511.961870][T16291] dump_stack_lvl+0xcd/0x134 23:03:39 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 29) [ 511.961899][T16291] should_fail.cold+0x5/0xa [ 511.961929][T16291] _copy_to_user+0x2a/0x140 23:03:39 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x18) 23:03:39 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="00e5ffff00004ecc84815fdc72c6e122ee6708357897c515fe38d3b23279e0eb38b60ebae3e77b5391c95b2bc028155ffdbc250bfe0045981c9c9ed8f1e3303038554623ef9d7662f9fe61545c23789d862d39f0aa97d9b2f39e53a646c93b36e9052d6ea2767708103944f8da9a8092c5271fa4702873baac413be35dbb7c20e7ebfe0c61627d21365b92544277eab96b19cf5ddb2a1c4c7f2dd869ab45f6229d79fc05d05c7c6c6d448d6a32ffd417490093bd5921ecc7b91339185e81898e7b6a24002e4a6ba96fa2253be4962634b6545c03e367a4dda1"], 0xa) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2d, 'hugetlb'}, {0x2d, 'freezer'}, {0x2b, 'memory'}]}, 0x1a) perf_event_open$cgroup(&(0x7f0000000140)={0x9ad909d4030bcc67, 0x80, 0x1f, 0x1, 0x5, 0x4, 0x0, 0x4a, 0x90001, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_config_ext={0x8, 0x491}, 0x40000, 0x1f, 0x81, 0x0, 0xb6, 0x3ff, 0x81, 0x0, 0x8, 0x0, 0x7f}, r1, 0xf, r2, 0x3) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="00e5ffff00004ecc84815fdc72c6e122ee6708357897c515fe38d3b23279e0eb38b60ebae3e77b5391c95b2bc028155ffdbc250bfe0045981c9c9ed8f1e3303038554623ef9d7662f9fe61545c23789d862d39f0aa97d9b2f39e53a646c93b36e9052d6ea2767708103944f8da9a8092c5271fa4702873baac413be35dbb7c20e7ebfe0c61627d21365b92544277eab96b19cf5ddb2a1c4c7f2dd869ab45f6229d79fc05d05c7c6c6d448d6a32ffd417490093bd5921ecc7b91339185e81898e7b6a24002e4a6ba96fa2253be4962634b6545c03e367a4dda1"], 0xa) (async) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2d, 'hugetlb'}, {0x2d, 'freezer'}, {0x2b, 'memory'}]}, 0x1a) (async) perf_event_open$cgroup(&(0x7f0000000140)={0x9ad909d4030bcc67, 0x80, 0x1f, 0x1, 0x5, 0x4, 0x0, 0x4a, 0x90001, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_config_ext={0x8, 0x491}, 0x40000, 0x1f, 0x81, 0x0, 0xb6, 0x3ff, 0x81, 0x0, 0x8, 0x0, 0x7f}, r1, 0xf, r2, 0x3) (async) [ 511.961956][T16291] simple_read_from_buffer+0xcc/0x160 [ 511.961993][T16291] proc_fail_nth_read+0x187/0x220 23:03:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x1b, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x16, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:39 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.962030][T16291] ? proc_exe_link+0x1d0/0x1d0 [ 511.962062][T16291] ? security_file_permission+0xab/0xd0 23:03:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 30) 23:03:39 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x300) [ 511.962099][T16291] ? proc_exe_link+0x1d0/0x1d0 [ 511.962130][T16291] vfs_read+0x1ef/0x5d0 [ 511.962165][T16291] ksys_read+0x127/0x250 [ 511.962194][T16291] ? vfs_write+0xac0/0xac0 23:03:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x17, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:39 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:39 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 23:03:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 31) 23:03:39 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x1c, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 511.962223][T16291] ? syscall_enter_from_user_mode+0x21/0x70 [ 511.962249][T16291] ? syscall_enter_from_user_mode+0x21/0x70 23:03:39 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x408) [ 511.962285][T16291] do_syscall_64+0x35/0xb0 23:03:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x18, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.962313][T16291] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 511.962341][T16291] RIP: 0033:0x7f10f803bcbc 23:03:39 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.962360][T16291] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 23:03:39 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 32) 23:03:39 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) (async) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 23:03:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x500) 23:03:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) 23:03:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x1d, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x19, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 511.962384][T16291] RSP: 002b:00007f10f9298160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 23:03:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 33) 23:03:40 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz0\x00', 0x1ff) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 23:03:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x600) [ 511.962408][T16291] RAX: ffffffffffffffda RBX: 00007f10f819bf60 RCX: 00007f10f803bcbc 23:03:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x1e, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) [ 511.962423][T16291] RDX: 000000000000000f RSI: 00007f10f92981e0 RDI: 0000000000000005 [ 511.962438][T16291] RBP: 00007f10f92981d0 R08: 0000000000000000 R09: 0000000000000000 [ 511.962453][T16291] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:03:40 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) 23:03:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x700) 23:03:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x1a, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 34) [ 511.962467][T16291] R13: 00007fff2a3fd31f R14: 00007f10f9298300 R15: 0000000000022000 [ 511.962502][T16291] [ 512.057056][T16297] FAULT_INJECTION: forcing a failure. [ 512.057056][T16297] name fail_usercopy, interval 1, probability 0, space 0, times 0 23:03:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x21, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 512.057090][T16297] CPU: 0 PID: 16297 Comm: syz-executor.2 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 23:03:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 23:03:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x1b, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x804) [ 512.057118][T16297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 23:03:40 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (async) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) (async) 23:03:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 35) [ 512.057132][T16297] Call Trace: 23:03:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 512.057139][T16297] [ 512.057147][T16297] dump_stack_lvl+0xcd/0x134 [ 512.057181][T16297] should_fail.cold+0x5/0xa 23:03:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x22, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) [ 512.057210][T16297] strncpy_from_user+0x34/0x3c0 23:03:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x1800) 23:03:40 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (async) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) 23:03:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) 23:03:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 36) [ 512.057245][T16297] bpf_prog_load+0x5a0/0x2250 [ 512.057287][T16297] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 512.057319][T16297] ? find_held_lock+0x2d/0x110 23:03:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x23, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x1d, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 512.057356][T16297] ? __might_fault+0xd1/0x170 23:03:40 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="006e65745f7072698c0249e54fcfede816ec62a2a40a0195a765df1da9d7f9f68ce98033f89cca68a606124dd27a8d02883227d4a09294e54320d0c5873bf7c277414659e38f0f147db2c1204e4479922e47a8a44270ec672fa8d3a38b441511fddebc088441dc8ce283c66ac0cb76abf7c05b85e44fd88e4a7a27b6ec3403268ffb6a86486030dd3d18b591c9057a553e73945d2c72815c"], 0xa) [ 512.057383][T16297] ? lock_downgrade+0x6e0/0x6e0 23:03:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x4000) [ 512.057427][T16297] ? bpf_lsm_bpf+0x5/0x10 23:03:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 37) 23:03:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 512.057454][T16297] __sys_bpf+0x11a1/0x5700 [ 512.057488][T16297] ? bpf_perf_link_attach+0x520/0x520 23:03:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x1e, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 512.057517][T16297] ? lockdep_hardirqs_on_prepare+0x400/0x400 23:03:40 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x300, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:40 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0xff00) [ 512.057560][T16297] ? find_held_lock+0x2d/0x110 23:03:40 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="006e65745f7072698c0249e54fcfede816ec62a2a40a0195a765df1da9d7f9f68ce98033f89cca68a606124dd27a8d02883227d4a09294e54320d0c5873bf7c277414659e38f0f147db2c1204e4479922e47a8a44270ec672fa8d3a38b441511fddebc088441dc8ce283c66ac0cb76abf7c05b85e44fd88e4a7a27b6ec3403268ffb6a86486030dd3d18b591c9057a553e73945d2c72815c"], 0xa) [ 512.057620][T16297] __x64_sys_bpf+0x75/0xb0 23:03:40 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 38) 23:03:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) [ 512.057649][T16297] ? syscall_enter_from_user_mode+0x21/0x70 [ 512.057677][T16297] do_syscall_64+0x35/0xb0 23:03:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x21, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x400000) [ 512.057708][T16297] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 512.057738][T16297] RIP: 0033:0x7f7754e89109 23:03:41 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="006e65745f7072698c0249e54fcfede816ec62a2a40a0195a765df1da9d7f9f68ce98033f89cca68a606124dd27a8d02883227d4a09294e54320d0c5873bf7c277414659e38f0f147db2c1204e4479922e47a8a44270ec672fa8d3a38b441511fddebc088441dc8ce283c66ac0cb76abf7c05b85e44fd88e4a7a27b6ec3403268ffb6a86486030dd3d18b591c9057a553e73945d2c72815c"], 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f00000000c0)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="006e65745f7072698c0249e54fcfede816ec62a2a40a0195a765df1da9d7f9f68ce98033f89cca68a606124dd27a8d02883227d4a09294e54320d0c5873bf7c277414659e38f0f147db2c1204e4479922e47a8a44270ec672fa8d3a38b441511fddebc088441dc8ce283c66ac0cb76abf7c05b85e44fd88e4a7a27b6ec3403268ffb6a86486030dd3d18b591c9057a553e73945d2c72815c"], 0xa) (async) 23:03:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 39) 23:03:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x500, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 512.057758][T16297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 23:03:41 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080), 0x0) 23:03:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x22, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x1000000) 23:03:41 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.numa_stat\x00', 0x0, 0x0) [ 512.057782][T16297] RSP: 002b:00007f7753dfe168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 23:03:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 40) 23:03:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x600, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 512.057817][T16297] RAX: ffffffffffffffda RBX: 00007f7754f9bf60 RCX: 00007f7754e89109 [ 512.057836][T16297] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 23:03:41 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0x23, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x2000000) [ 512.057852][T16297] RBP: 00007f7753dfe1d0 R08: 0000000000000000 R09: 0000000000000000 23:03:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x700, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:41 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.numa_stat\x00', 0x0, 0x0) 23:03:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 41) [ 512.057869][T16297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 23:03:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xff0f, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 512.057885][T16297] R13: 00007ffc7c8a639f R14: 00007f7753dfe300 R15: 0000000000022000 [ 512.057921][T16297] 23:03:41 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x3000000) 23:03:41 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) (async) r1 = openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r1, &(0x7f0000000100)='memory.numa_stat\x00', 0x0, 0x0) 23:03:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x900, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 512.236066][T16314] syz-executor.2: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz2,mems_allowed=0-1 23:03:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 42) 23:03:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x4000000) 23:03:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x0, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 512.236229][T16314] CPU: 1 PID: 16314 Comm: syz-executor.2 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 23:03:41 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:41 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 43) 23:03:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xa00, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 512.236258][T16314] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.236272][T16314] Call Trace: [ 512.236279][T16314] [ 512.236295][T16314] dump_stack_lvl+0xcd/0x134 23:03:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 44) 23:03:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x2, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:41 executing program 4: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xb, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 512.236330][T16314] warn_alloc.cold+0x9b/0x189 23:03:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xb00, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) 23:03:41 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) 23:03:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x5000000) [ 512.236366][T16314] ? zone_watermark_ok_safe+0x290/0x290 [ 512.236411][T16314] ? __kasan_kmalloc+0xbd/0xd0 [ 512.236445][T16314] ? __get_vm_area_node+0x297/0x3f0 23:03:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x7, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 512.236486][T16314] __vmalloc_node_range+0xdff/0x13e0 23:03:41 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 45) 23:03:41 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x6000000) [ 512.236521][T16314] ? lock_chain_count+0x20/0x20 23:03:41 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) (fail_nth: 1) 23:03:41 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (async) 23:03:41 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xc00, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 512.236564][T16314] ? bpf_prog_alloc_no_stats+0x38/0x470 [ 512.236593][T16314] ? find_held_lock+0x2d/0x110 [ 512.236628][T16314] ? vfree_atomic+0xe0/0xe0 [ 512.236657][T16314] ? __might_fault+0xd1/0x170 23:03:42 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x7000000) 23:03:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 46) [ 512.236685][T16314] ? lock_downgrade+0x6e0/0x6e0 23:03:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="b702000005000000bf230000000000002703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400011000000404000001007d60b7030000000000006a0a00fe800000008500000026000000b7000000000000009500000000000000acaa8e53a53cb864c30009801c32048574bf16d94cf0987b00a749a8e53bdf9491cd1f2b94a64f1de23d03a870f7778d3e77ad85319f0113fe39233add8f68f87699162334343befce832cb8075c5f0ae30cde221371ff00000067e4b75da95370ae6fd2b99ac18f98403494d4a94e95fb8dcd813487b2bdb006c6465c15f04485a9f8c8e49dc512c5b0cd417b44dc68af2b4ca5467a97184c8e9d34b3e382b25e9614634e8e09194f7b83138f5275d9ab463797a2f6dcb45d5f278cd4fb74559575da3560c01cdf1eaa3fc7a3fb4f1689dfd5b626174770e4dfd1c82a694efc62f9ef9c8c0ea1efa5b949ce22827f6fd1dfc69d03482d8ec20bc22573f8594b91781cd8ff7f000000000000299ebf94588e60abe9c465c5bbdc0358226f8580dc1a83c6a44408de23475a74ef0deda8da5089269cb24e728dee6320444576c87cc576291e5367a5f1a5d5a12f8313bc8f0b7f73335279aa2b68c9f045831119881764c2c2c71bb65b5138c50e06024e80fd9656bc077e4e259695748b89335ba9eeef288de73815f20fefd4acfb6813ffff00000b971aec1a3e618a08a94ecbd401c8109c87ee3f5c0501857538d2a766bfcf4128fbe726903aca577aa8943af747760718dee5a21396dce6f61c6f3c7e00000000cb0868b48719e47296d9299df3831a1eff0e42f6f1eb1dc64dcc8e397366d12033f6288edbda3b838100000000000000000000800000edd4e1266dc94de76b3b676a13c57a0ed24f6270c4cbbf93472eb8093d8296c67b110068243052ad24b624fddc2f0f3a018c0085c2319c248d643cd09fa855b20a6d453f2e974ff0e55c010000008547c5a0ecefcc44cc9532f729167f215937357a4bb9746193c1ec000000000000dd43c108c2109dec087b26b7c9c22c46997042345bf59bf63dfa726c6b480443159c6bed51a0e021f05f7caa1b99cdb4d08d9031210ac00e67d8c40a18503cb7aabcc066dfbfd7f87abe1122f00e5454bec3564c8bdec0515ee2371316ef9de2"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x8, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) 23:03:42 executing program 0: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x91, &(0x7f0000000000)=""/145, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0xd00, &(0x7f0000000440)=@base={0x12, 0x4, 0x4, 0xfffffffb}, 0x48) [ 512.236722][T16314] ? bpf_prog_alloc_no_stats+0x38/0x470 23:03:42 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1009, &(0x7f0000001340)=""/4105, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r2, r3, 0x25}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup=r3, r1, 0x17}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@ldst={0x2, 0x3, 0x2, 0xa, 0x7, 0x5f}, @call={0x85, 0x0, 0x0, 0x52}, @jmp={0x5, 0x1, 0xa, 0x8, 0xb, 0x50}]}, &(0x7f0000000140)='syzkaller\x00', 0x8001, 0xd4, &(0x7f0000000300)=""/212, 0x40f00, 0x1c, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f0000000180)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xf, 0x8, 0x8001}, 0x10, 0x45a4, r1, 0x0, &(0x7f0000000200)=[r1, r1, r1]}, 0x80) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000480)=r4, 0x4) 23:03:42 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x2b, 'net_prio'}]}, 0xa) (fail_nth: 2) 23:03:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x36}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000001c0)={r0, 0x60, 0xcc0, 0xffffffff, &(0x7f0000000280)="7b5515ccc8bca12641e65d58fd1a12f639", 0x0, 0xfff}, 0x28) [ 512.236751][T16314] __vmalloc+0x69/0x80 [ 512.236781][T16314] ? bpf_prog_alloc_no_stats+0x38/0x470 23:03:42 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x8000000) 23:03:42 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x10, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x11, 0x18}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x7}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) (fail_nth: 47) [ 512.236810][T16314] bpf_prog_alloc_no_stats+0x38/0x470 [ 512.236837][T16314] ? bpf_lsm_capable+0x5/0x10 [ 512.236872][T16314] bpf_prog_alloc+0x28/0x1a0 23:03:42 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="18020000e2ffffff000000000000000085000000360000009500001800000000922ae83713ab9600010000801b10fb54a8cb72d232ad558c46fff4208d4990ec11ce1e3889860aa86fa77fa3d9501413ac30e00bd0081f8504e19a5183d769676520e98a263345e44d5ad123ca35510100c4d86abeb12303ff1c9fe0d0020000d60400000007d3670000008aff66d6b3181ffc1d62a3954c11c27839dc007c4d296e7359ea79a75dd098bbc4fa13aee48ca9e8969faebf3183fe803ab3f5024b52dc265b36fc9dae00a09404f01f9504d0976d252bd8d24538556e5e57bee3b8cf464ef3c6a7def8bad3ca6e3abdb21696e340bb8e2a093adc57196b40def3858ef569147fa4108328392d322ab4df10a2f69a6bdf7257ab44e81042410f57466f59aea2544047d6d8ac442e0000000000ee16c729300d230180000000000000a87db3670bba302085a22b5a8b051dc254e75290a8cd8470e776d6b80630d6cbde49b29a6cb5f4fc0001745cff0e5fe57238aeada5acf3209a08439f1ff01ffbe5b57922b6f6c67e02aa6d7760525b595fe1f697bc114ed1778e97a3f0295f946974cfb458c52a34cf924dc37b558fbf17a76f3547497aba5086e30ec8a57c814382ffab045ca077a9d15251875432e74b54afaf4985683c229ff92be0dade95ae7b68136b0046d535dd39c0f35469869e9b342b953f81447e6b9e522d62b1e6ffdaab304f864306335fc7a44195254b45a6c1312a13696c7202df5f764713504f94c5e0fbc70bcb975f97ed7b0300000000000000e54e9072a22d91744a332e2fa806e63c5cd98a8569a6d6bcfb0000002cf6c75ac63f04af77c98a1459ab1664885173b2b7130eae67e0ebe380d0f648713e68153579c02d71c58d147b00821ab9a6475b31e1ebf1369afe98682efbf3983f283f2f00000000992774814d63c933912d000000000000a66acb0a38856929e7d8b1b06c9bd5d7e5490f3b8596b694ea9483bd4bd287c83dd998a74694d18bdd8ad0983bc90770bbd26a82b9d99d17c02a97b523c47ef8c33400e90d3fbe019904ff782ca00edf1147a71bcc738ef636d32b01933556f9afe772cd45af8aeffe2753088e02ca6bb2feecf0a93a033713a0980865c7c62ea4d8f8a864dce9fa85aeb0454349100296ee2dba39c3f6fd6cf96714e11fe03b506380591a8c68e537dd659a7418b145dd0336d226bac1e122bd4c219f8a30160f2ab44f842e3be1c95b15175d0e664beb126000e96549e1a1208c686edb475b705e8a9515c97f4fc6b3c925ea404edbb3845111aed1637ec3890f1de61026dc6c6618580fd6ce9eac602c1756f6d105671241d48a8abe64f5caecc45f953383722135ed9925989e01eae489ec7052f8ed72c326c7a8aa63999e222659480e82c6f84d2033d9d1b597c54ce1822d14b7c7699b9d54f5f11f2e7fdc75575105aa9460eb6c882cbddd3ddd474cffbc35bc8623cd5eb68af82275a940be0400000000000000bcc3fbe7d90de96d6a8e9f32cf881f606b381e4903b500000000000000000000004a2357ba5f6000de1cfa88b7165dcfcf2aaee86d48f05b5ae4fc2bbc908fdb686d5da2a42e4b5024b653ea923c19e6cb723c1923b3eea2d73e136dff383c9fbbac53dfdcb1a68c98d8e96fe39eec23963faf3ebed3409144c7c53d6318ced678a621450a9b01e9f2772e5fa454d68d90677d8de36c3215d2ff3cfadcf65eb92adc6c62d66b11cb2d7556414a86dfa94bb7aa52c7febb1e9b2efcbbc5bccf9d39bed802f4f056976a128c76629a362ee9cc624ec454b90200fd9603f96908bddc145000000000000000000000000000002da31120c2f5df5c27454287de9e340f611267f32a060f2d21cb06fcaf45a0172f65d2ca82ad7931e7948c83a297e396f428d53371424b3044001b3db450eeb245ea2e4fe5ac7a7eef82c5d6d19f3ef0133bd904812ee52434a1d37894f71d79b07e7aef7785e2486472b5cba1ef346c1e8e23deb8c82bb6eb2c72c484241dc3b66da58260f800fffd96093aae764f477e29f01381a78039368b952f6f4a10295c50c887a31d8b543c5d10f2dbd4d0b84eaad43feb6e169a9f2fcff75d000000000000000000000000000000b92ac050cf9473f24fbfe011bc6366f56fa787f212c1f8c0f47f50b1e9b5d841b729315090a01cf07f14a70f5e578dbebf1e78191c8a0294436725772338bec18891971e3b932352896e1ea10f62e8ef7a87e16151b39d6c27575714540d8c293a3fa4b5a825360423a6cb6267d65ca303702839f15c4ee2745122ba5447671528f1ff23ed853140eddaca2c16c842b168bb55f6bb0f1c37f092713deb57d0aa78d6d4e5fc5be2c402bd241cf11fdcdcac6128f41bcba6279b27892b135a96454d40e5eed4d4dce481ca86bfac54c330b31b7f2cde17cb96faf546ecbe4c7518171621e1ddf0742d73d47d726a50f6e752f3325255bd7e8b5923aa3cfb6f7e06494f218b95f210450139c558000000060000d9a4322f26e48d94d3528e8528ff3076cf36bb52e0a7d0d60a2c104584605513a3c5533acfb0c5fc29300cf511319b265fe57020c3ce906b1bef60fc27b4ddd7a3318b81190c2459dbff3b311f027e925da8d2d71c32407814320a9c980e31bda7c0dd2d34ffb6966bbd02c19ea2e9712344696110c9e57695cc18a93bdaee64c38afca8004a204389bb0af9ceefd5d0d592c00aa6fe5cef38cacf9ed954fcc5dd19fbc661fa9d44630a247f0355bf5e1d5d994b61ee13f13cde1a48974d72a1ef0186831dc44c8316145ccbd321751d6022138478da176e52f374106a9a46015d7ea10ab95c70e6953274852d6f08129f2a176c5b6bd4c0"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1009, &(0x7f0000001340)=""/4105, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r2, r3, 0x25}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup=r3, r1, 0x17}, 0x10) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@ldst={0x2, 0x3, 0x2, 0xa, 0x7, 0x5f}, @call={0x85, 0x0, 0x0, 0x52}, @jmp={0x5, 0x1, 0xa, 0x8, 0xb, 0x50}]}, &(0x7f0000000140)='syzkaller\x00', 0x8001, 0xd4, &(0x7f0000000300)=""/212, 0x40f00, 0x1c, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f0000000180)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xf, 0x8, 0x8001}, 0x10, 0x45a4, r1, 0x0, &(0x7f0000000200)=[r1, r1, r1]}, 0x80) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000480)=r4, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz1\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_ro(r0, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) (async) write$cgroup_subtree(r1, &(0x7f0000000080)={[{0x0, 'net_prio'}]}, 0xa) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x6, 0x4, &(0x7f0000002780)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='GPL\x00', 0x4, 0x1009, &(0x7f0000001340)=""/4105, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuacct.stat\x00', 0x26e1, 0x0) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000001300)={r2, r3, 0x25}, 0x10) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={@cgroup=r3, r1, 0x17}, 0x10) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, [@ldst={0x2, 0x3, 0x2, 0xa, 0x7, 0x5f}, @call={0x85, 0x0, 0x0, 0x52}, @jmp={0x5, 0x1, 0xa, 0x8, 0xb, 0x50}]}, &(0x7f0000000140)='syzkaller\x00', 0x8001, 0xd4, &(0x7f0000000300)=""/212, 0x40f00, 0x1c, '\x00', 0x0, 0x18, r1, 0x8, &(0x7f0000000180)={0x4, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x0, 0xf, 0x8, 0x8001}, 0x10, 0x45a4, r1, 0x0, &(0x7f0000000200)=[r1, r1, r1]}, 0x80) (async) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000480)=r4, 0x4) (async) [ 512.236902][T16314] bpf_prog_load+0x749/0x2250 [ 512.236942][T16314] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 512.236976][T16314] ? find_held_lock+0x2d/0x110 [ 512.237012][T16314] ? __might_fault+0xd1/0x170 [ 512.237012][T16314] ? __might_fault+0xd1/0x170 [ 512.237040][T16314] ? lock_downgrade+0x6e0/0x6e0 [ 512.237088][T16314] ? bpf_lsm_bpf+0x5/0x10 [ 512.237119][T16314] __sys_bpf+0x11a1/0x5700 [ 512.237155][T16314] ? bpf_perf_link_attach+0x520/0x520 [ 512.237188][T16314] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 512.237234][T16314] ? find_held_lock+0x2d/0x110 [ 512.237305][T16314] __x64_sys_bpf+0x75/0xb0 [ 512.237336][T16314] ? syscall_enter_from_user_mode+0x21/0x70 [ 512.237367][T16314] do_syscall_64+0x35/0xb0 [ 512.237398][T16314] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 512.237430][T16314] RIP: 0033:0x7f7754e89109 [ 512.237450][T16314] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 512.237475][T16314] RSP: 002b:00007f7753dfe168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 512.237499][T16314] RAX: ffffffffffffffda RBX: 00007f7754f9bf60 RCX: 00007f7754e89109 [ 512.237516][T16314] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 [ 512.237532][T16314] RBP: 00007f7753dfe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 512.237547][T16314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.237562][T16314] R13: 00007ffc7c8a639f R14: 00007f7753dfe300 R15: 0000000000022000 [ 512.237598][T16314] [ 512.249423][T16313] FAULT_INJECTION: forcing a failure. [ 512.249423][T16313] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.249482][T16313] CPU: 0 PID: 16313 Comm: syz-executor.5 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 512.249508][T16313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.249521][T16313] Call Trace: [ 512.249527][T16313] [ 512.249535][T16313] dump_stack_lvl+0xcd/0x134 [ 512.249566][T16313] should_fail.cold+0x5/0xa [ 512.249593][T16313] _copy_from_user+0x2a/0x170 [ 512.249621][T16313] bpf_test_init.isra.0+0xee/0x150 [ 512.249716][T16313] bpf_prog_test_run_skb+0x22a/0x1e10 [ 512.249754][T16313] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 512.249795][T16313] ? fput+0x2b/0x190 [ 512.249819][T16313] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 512.249849][T16313] __sys_bpf+0x15c1/0x5700 [ 512.249884][T16313] ? bpf_perf_link_attach+0x520/0x520 [ 512.249915][T16313] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 512.249957][T16313] ? find_held_lock+0x2d/0x110 [ 512.250016][T16313] __x64_sys_bpf+0x75/0xb0 [ 512.250043][T16313] ? syscall_enter_from_user_mode+0x21/0x70 [ 512.250070][T16313] do_syscall_64+0x35/0xb0 [ 512.250098][T16313] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 512.250124][T16313] RIP: 0033:0x7f72e3489109 [ 512.250143][T16313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 512.250167][T16313] RSP: 002b:00007f72e4593168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 512.250189][T16313] RAX: ffffffffffffffda RBX: 00007f72e359bf60 RCX: 00007f72e3489109 [ 512.250206][T16313] RDX: 0000000000000028 RSI: 00000000200001c0 RDI: 000000000000000a [ 512.250220][T16313] RBP: 00007f72e45931d0 R08: 0000000000000000 R09: 0000000000000000 [ 512.250234][T16313] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.250251][T16313] R13: 00007ffd1cf0f2bf R14: 00007f72e4593300 R15: 0000000000022000 [ 512.250284][T16313] [ 512.252413][T16315] FAULT_INJECTION: forcing a failure. [ 512.252413][T16315] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.252443][T16315] CPU: 1 PID: 16315 Comm: syz-executor.0 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 512.252469][T16315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.252483][T16315] Call Trace: [ 512.252489][T16315] [ 512.252496][T16315] dump_stack_lvl+0xcd/0x134 [ 512.252527][T16315] should_fail.cold+0x5/0xa [ 512.252554][T16315] _copy_to_user+0x2a/0x140 [ 512.252580][T16315] simple_read_from_buffer+0xcc/0x160 [ 512.252617][T16315] proc_fail_nth_read+0x187/0x220 [ 512.252652][T16315] ? proc_exe_link+0x1d0/0x1d0 [ 512.252683][T16315] ? security_file_permission+0xab/0xd0 [ 512.252720][T16315] ? proc_exe_link+0x1d0/0x1d0 [ 512.252751][T16315] vfs_read+0x1ef/0x5d0 [ 512.252785][T16315] ksys_read+0x127/0x250 [ 512.252814][T16315] ? vfs_write+0xac0/0xac0 [ 512.252843][T16315] ? syscall_enter_from_user_mode+0x21/0x70 [ 512.252872][T16315] ? syscall_enter_from_user_mode+0x21/0x70 [ 512.252909][T16315] do_syscall_64+0x35/0xb0 [ 512.252939][T16315] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 512.252968][T16315] RIP: 0033:0x7fbac863bcbc [ 512.252988][T16315] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 512.253012][T16315] RSP: 002b:00007fbac988d160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 512.253037][T16315] RAX: ffffffffffffffda RBX: 00007fbac879bf60 RCX: 00007fbac863bcbc [ 512.253054][T16315] RDX: 000000000000000f RSI: 00007fbac988d1e0 RDI: 0000000000000005 [ 512.253071][T16315] RBP: 00007fbac988d1d0 R08: 0000000000000000 R09: 0000000000000000 [ 512.253087][T16315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.253102][T16315] R13: 00007fffc1884f6f R14: 00007fbac988d300 R15: 0000000000022000 [ 512.253139][T16315] [ 512.253244][T16314] Mem-Info: [ 512.253253][T16314] active_anon:646 inactive_anon:54011 isolated_anon:0 [ 512.253253][T16314] active_file:3980 inactive_file:7729 isolated_file:0 [ 512.253253][T16314] unevictable:768 dirty:0 writeback:0 [ 512.253253][T16314] slab_reclaimable:20201 slab_unreclaimable:102779 [ 512.253253][T16314] mapped:18178 shmem:1682 pagetables:1104 bounce:0 [ 512.253253][T16314] kernel_misc_reclaimable:0 [ 512.253253][T16314] free:1380780 free_pcp:6772 free_cma:0 [ 512.253330][T16314] Node 0 active_anon:2584kB inactive_anon:216044kB active_file:15844kB inactive_file:30916kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:72712kB dirty:0kB writeback:0kB shmem:5192kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 4096kB writeback_tmp:0kB kernel_stack:12908kB pagetables:4412kB all_unreclaimable? no [ 512.253397][T16314] Node 1 active_anon:0kB inactive_anon:0kB active_file:76kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:0kB writeback:0kB shmem:1536kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:4kB all_unreclaimable? no [ 512.253458][T16314] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 512.253525][T16314] lowmem_reserve[]: 0 2633 2634 2634 2634 [ 512.253562][T16314] Node 0 DMA32 free:1565028kB boost:0kB min:35572kB low:44464kB high:53356kB reserved_highatomic:0KB active_anon:2584kB inactive_anon:216044kB active_file:15844kB inactive_file:30916kB unevictable:1536kB writepending:0kB present:3129332kB managed:2701980kB mlocked:0kB bounce:0kB free_pcp:18700kB local_pcp:4416kB free_cma:0kB [ 512.253634][T16314] lowmem_reserve[]: 0 0 1 1 1 [ 512.253668][T16314] Node 0 Normal free:0kB boost:0kB min:12kB low:12kB high:12kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:1168kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 512.253734][T16314] lowmem_reserve[]: 0 0 0 0 0 [ 512.253768][T16314] Node 1 Normal free:3942732kB boost:0kB min:54316kB low:67892kB high:81468kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:76kB inactive_file:0kB unevictable:1536kB writepending:0kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:8384kB local_pcp:1184kB free_cma:0kB [ 512.253841][T16314] lowmem_reserve[]: 0 0 0 0 0 [ 512.253876][T16314] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 512.254010][T16314] Node 0 DMA32: 393*4kB (UE) 1096*8kB (UME) 712*16kB (UM) 360*32kB (UME) 134*64kB (UME) 262*128kB (UME) 197*256kB (UM) 135*512kB (UME) 82*1024kB (UME) 34*2048kB (UM) 297*4096kB (UM) = 1565028kB [ 512.254186][T16314] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 512.254392][T16314] Node 1 Normal: 169*4kB (UE) 43*8kB (UE) 27*16kB (UME) 151*32kB (UME) 61*64kB (UME) 19*128kB (UE) 8*256kB (U) 4*512kB (UE) 2*1024kB (UM) 0*2048kB 958*4096kB (M) = 3942732kB [ 512.254570][T16314] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 512.254591][T16314] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 512.254611][T16314] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 512.254631][T16314] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 512.254651][T16314] 13391 total pagecache pages [ 512.254659][T16314] 0 pages in swap cache [ 512.254665][T16314] Swap cache stats: add 0, delete 0, find 0/0 [ 512.254680][T16314] Free swap = 0kB [ 512.254686][T16314] Total swap = 0kB [ 512.254693][T16314] 2097051 pages RAM [ 512.254700][T16314] 0 pages HighMem/MovableOnly [ 512.254706][T16314] 388019 pages reserved [ 512.254712][T16314] 0 pages cma reserved [ 512.827215][T16358] FAULT_INJECTION: forcing a failure. [ 512.827215][T16358] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.827250][T16358] CPU: 0 PID: 16358 Comm: syz-executor.5 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 512.827279][T16358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.827293][T16358] Call Trace: [ 512.827300][T16358] [ 512.827309][T16358] dump_stack_lvl+0xcd/0x134 [ 512.827343][T16358] should_fail.cold+0x5/0xa [ 512.827373][T16358] _copy_to_user+0x2a/0x140 [ 512.827401][T16358] bpf_test_finish.isra.0+0x200/0x680 [ 512.827438][T16358] ? trace_bpf_test_finish+0x220/0x220 [ 512.827469][T16358] ? memset+0x20/0x40 [ 512.827501][T16358] ? __build_skb+0x50/0x60 [ 512.827556][T16358] bpf_prog_test_run_skb+0x115a/0x1e10 [ 512.827601][T16358] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 512.827637][T16358] ? fput+0x2b/0x190 [ 512.827661][T16358] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 512.827694][T16358] __sys_bpf+0x15c1/0x5700 [ 512.827732][T16358] ? bpf_perf_link_attach+0x520/0x520 [ 512.827764][T16358] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 512.827811][T16358] ? find_held_lock+0x2d/0x110 [ 512.827877][T16358] __x64_sys_bpf+0x75/0xb0 [ 512.827908][T16358] ? syscall_enter_from_user_mode+0x21/0x70 [ 512.827938][T16358] do_syscall_64+0x35/0xb0 [ 512.827968][T16358] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 512.827998][T16358] RIP: 0033:0x7f72e3489109 [ 512.828019][T16358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 512.828044][T16358] RSP: 002b:00007f72e4593168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 512.828075][T16358] RAX: ffffffffffffffda RBX: 00007f72e359bf60 RCX: 00007f72e3489109 [ 512.828092][T16358] RDX: 0000000000000028 RSI: 00000000200001c0 RDI: 000000000000000a [ 512.828108][T16358] RBP: 00007f72e45931d0 R08: 0000000000000000 R09: 0000000000000000 [ 512.828123][T16358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.828138][T16358] R13: 00007ffd1cf0f2bf R14: 00007f72e4593300 R15: 0000000000022000 [ 512.828174][T16358] [ 512.988124][T16372] FAULT_INJECTION: forcing a failure. [ 512.988124][T16372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.988158][T16372] CPU: 1 PID: 16372 Comm: syz-executor.5 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 512.988187][T16372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 512.988201][T16372] Call Trace: [ 512.988208][T16372] [ 512.988217][T16372] dump_stack_lvl+0xcd/0x134 [ 512.988251][T16372] should_fail.cold+0x5/0xa [ 512.988281][T16372] _copy_to_user+0x2a/0x140 [ 512.988310][T16372] bpf_test_finish.isra.0+0x231/0x680 [ 512.988346][T16372] ? trace_bpf_test_finish+0x220/0x220 [ 512.988377][T16372] ? memset+0x20/0x40 [ 512.988407][T16372] ? __build_skb+0x50/0x60 [ 512.988437][T16372] bpf_prog_test_run_skb+0x115a/0x1e10 [ 512.988478][T16372] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 512.988513][T16372] ? fput+0x2b/0x190 [ 512.988536][T16372] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 512.988573][T16372] __sys_bpf+0x15c1/0x5700 [ 512.988605][T16372] ? bpf_perf_link_attach+0x520/0x520 [ 512.988635][T16372] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 512.988681][T16372] ? find_held_lock+0x2d/0x110 [ 512.988741][T16372] __x64_sys_bpf+0x75/0xb0 [ 512.988770][T16372] ? syscall_enter_from_user_mode+0x21/0x70 [ 512.988797][T16372] do_syscall_64+0x35/0xb0 [ 512.988825][T16372] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 512.988853][T16372] RIP: 0033:0x7f72e3489109 [ 512.988873][T16372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 512.988896][T16372] RSP: 002b:00007f72e4593168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 512.988920][T16372] RAX: ffffffffffffffda RBX: 00007f72e359bf60 RCX: 00007f72e3489109 [ 512.988938][T16372] RDX: 0000000000000028 RSI: 00000000200001c0 RDI: 000000000000000a [ 512.988953][T16372] RBP: 00007f72e45931d0 R08: 0000000000000000 R09: 0000000000000000 [ 512.988969][T16372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 512.988984][T16372] R13: 00007ffd1cf0f2bf R14: 00007f72e4593300 R15: 0000000000022000 [ 512.989019][T16372] [ 513.011755][T16375] FAULT_INJECTION: forcing a failure. [ 513.011755][T16375] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.011786][T16375] CPU: 1 PID: 16375 Comm: syz-executor.2 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 513.011813][T16375] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.011827][T16375] Call Trace: [ 513.011833][T16375] [ 513.011841][T16375] dump_stack_lvl+0xcd/0x134 [ 513.011877][T16375] should_fail.cold+0x5/0xa [ 513.011906][T16375] _copy_from_user+0x2a/0x170 [ 513.011934][T16375] bpf_prog_load+0x13e1/0x2250 [ 513.011976][T16375] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 513.012009][T16375] ? find_held_lock+0x2d/0x110 [ 513.012043][T16375] ? __might_fault+0xd1/0x170 [ 513.012069][T16375] ? lock_downgrade+0x6e0/0x6e0 [ 513.012113][T16375] ? bpf_lsm_bpf+0x5/0x10 [ 513.012141][T16375] __sys_bpf+0x11a1/0x5700 [ 513.012176][T16375] ? bpf_perf_link_attach+0x520/0x520 [ 513.012207][T16375] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 513.012253][T16375] ? find_held_lock+0x2d/0x110 [ 513.012318][T16375] __x64_sys_bpf+0x75/0xb0 [ 513.012349][T16375] ? syscall_enter_from_user_mode+0x21/0x70 [ 513.012379][T16375] do_syscall_64+0x35/0xb0 [ 513.012409][T16375] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 513.012439][T16375] RIP: 0033:0x7f7754e89109 [ 513.012459][T16375] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 513.012485][T16375] RSP: 002b:00007f7753dfe168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 513.012509][T16375] RAX: ffffffffffffffda RBX: 00007f7754f9bf60 RCX: 00007f7754e89109 [ 513.012527][T16375] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 [ 513.012551][T16375] RBP: 00007f7753dfe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 513.012567][T16375] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.012583][T16375] R13: 00007ffc7c8a639f R14: 00007f7753dfe300 R15: 0000000000022000 [ 513.012620][T16375] [ 513.190424][T16388] FAULT_INJECTION: forcing a failure. [ 513.190424][T16388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.190458][T16388] CPU: 1 PID: 16388 Comm: syz-executor.2 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 513.190486][T16388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.190500][T16388] Call Trace: [ 513.190507][T16388] [ 513.190516][T16388] dump_stack_lvl+0xcd/0x134 [ 513.190557][T16388] should_fail.cold+0x5/0xa [ 513.190587][T16388] _copy_from_user+0x2a/0x170 [ 513.190615][T16388] bpf_prog_load+0x13e1/0x2250 [ 513.190660][T16388] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 513.190694][T16388] ? find_held_lock+0x2d/0x110 [ 513.190730][T16388] ? __might_fault+0xd1/0x170 [ 513.190758][T16388] ? lock_downgrade+0x6e0/0x6e0 [ 513.190805][T16388] ? bpf_lsm_bpf+0x5/0x10 [ 513.190834][T16388] __sys_bpf+0x11a1/0x5700 [ 513.190869][T16388] ? bpf_perf_link_attach+0x520/0x520 [ 513.190900][T16388] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 513.190943][T16388] ? find_held_lock+0x2d/0x110 [ 513.191007][T16388] __x64_sys_bpf+0x75/0xb0 [ 513.191035][T16388] ? syscall_enter_from_user_mode+0x21/0x70 [ 513.191065][T16388] do_syscall_64+0x35/0xb0 [ 513.191095][T16388] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 513.191124][T16388] RIP: 0033:0x7f7754e89109 [ 513.191143][T16388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 513.191166][T16388] RSP: 002b:00007f7753dfe168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 513.191191][T16388] RAX: ffffffffffffffda RBX: 00007f7754f9bf60 RCX: 00007f7754e89109 [ 513.191209][T16388] RDX: 0000000000000070 RSI: 0000000020000440 RDI: 0000000000000005 [ 513.191226][T16388] RBP: 00007f7753dfe1d0 R08: 0000000000000000 R09: 0000000000000000 [ 513.191242][T16388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.191257][T16388] R13: 00007ffc7c8a639f R14: 00007f7753dfe300 R15: 0000000000022000 [ 513.191292][T16388] [ 513.191294][T16387] FAULT_INJECTION: forcing a failure. [ 513.191294][T16387] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.191322][T16387] CPU: 0 PID: 16387 Comm: syz-executor.5 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 513.191349][T16387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.191363][T16387] Call Trace: [ 513.191370][T16387] [ 513.191378][T16387] dump_stack_lvl+0xcd/0x134 [ 513.191406][T16387] should_fail.cold+0x5/0xa [ 513.191433][T16387] _copy_to_user+0x2a/0x140 [ 513.191460][T16387] bpf_test_finish.isra.0+0x265/0x680 [ 513.191497][T16387] ? trace_bpf_test_finish+0x220/0x220 [ 513.191524][T16387] ? memset+0x20/0x40 [ 513.191551][T16387] ? __build_skb+0x50/0x60 [ 513.191583][T16387] bpf_prog_test_run_skb+0x115a/0x1e10 [ 513.191626][T16387] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 513.191660][T16387] ? fput+0x2b/0x190 [ 513.191683][T16387] ? bpf_prog_test_run_raw_tp+0x640/0x640 [ 513.191717][T16387] __sys_bpf+0x15c1/0x5700 [ 513.191749][T16387] ? bpf_perf_link_attach+0x520/0x520 [ 513.191781][T16387] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 513.191825][T16387] ? find_held_lock+0x2d/0x110 [ 513.191889][T16387] __x64_sys_bpf+0x75/0xb0 [ 513.191924][T16387] ? syscall_enter_from_user_mode+0x21/0x70 [ 513.191954][T16387] do_syscall_64+0x35/0xb0 [ 513.191984][T16387] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 513.192014][T16387] RIP: 0033:0x7f72e3489109 [ 513.192041][T16387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 513.192067][T16387] RSP: 002b:00007f72e4593168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 513.192089][T16387] RAX: ffffffffffffffda RBX: 00007f72e359bf60 RCX: 00007f72e3489109 [ 513.192106][T16387] RDX: 0000000000000028 RSI: 00000000200001c0 RDI: 000000000000000a [ 513.192121][T16387] RBP: 00007f72e45931d0 R08: 0000000000000000 R09: 0000000000000000 [ 513.192137][T16387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.192152][T16387] R13: 00007ffd1cf0f2bf R14: 00007f72e4593300 R15: 0000000000022000 [ 513.192187][T16387] [ 513.388329][T16400] FAULT_INJECTION: forcing a failure. [ 513.388329][T16400] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.388363][T16400] CPU: 0 PID: 16400 Comm: syz-executor.5 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 513.388391][T16400] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.388405][T16400] Call Trace: [ 513.388411][T16400] [ 513.388421][T16400] dump_stack_lvl+0xcd/0x134 [ 513.388455][T16400] should_fail.cold+0x5/0xa [ 513.388484][T16400] _copy_to_user+0x2a/0x140 [ 513.388513][T16400] simple_read_from_buffer+0xcc/0x160 [ 513.388551][T16400] proc_fail_nth_read+0x187/0x220 [ 513.388587][T16400] ? proc_exe_link+0x1d0/0x1d0 [ 513.388619][T16400] ? security_file_permission+0xab/0xd0 [ 513.388655][T16400] ? proc_exe_link+0x1d0/0x1d0 [ 513.388687][T16400] vfs_read+0x1ef/0x5d0 [ 513.388723][T16400] ksys_read+0x127/0x250 [ 513.388752][T16400] ? vfs_write+0xac0/0xac0 [ 513.388782][T16400] ? syscall_enter_from_user_mode+0x21/0x70 [ 513.388812][T16400] ? syscall_enter_from_user_mode+0x21/0x70 [ 513.388847][T16400] do_syscall_64+0x35/0xb0 [ 513.388877][T16400] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 513.388906][T16400] RIP: 0033:0x7f72e343bcbc [ 513.388926][T16400] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 513.388950][T16400] RSP: 002b:00007f72e4593160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 513.388975][T16400] RAX: ffffffffffffffda RBX: 00007f72e359bf60 RCX: 00007f72e343bcbc [ 513.388992][T16400] RDX: 000000000000000f RSI: 00007f72e45931e0 RDI: 0000000000000004 [ 513.389016][T16400] RBP: 00007f72e45931d0 R08: 0000000000000000 R09: 0000000000000000 [ 513.389032][T16400] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 513.389047][T16400] R13: 00007ffd1cf0f2bf R14: 00007f72e4593300 R15: 0000000000022000 [ 513.389086][T16400] [ 513.479692][ T8034] Bluetooth: hci1: command 0x0406 tx timeout [ 513.508336][T16408] FAULT_INJECTION: forcing a failure. [ 513.508336][T16408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 513.508369][T16408] CPU: 1 PID: 16408 Comm: syz-executor.3 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 513.508398][T16408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 513.508412][T16408] Call Trace: [ 513.508418][T16408] [ 513.508427][T16408] dump_stack_lvl+0xcd/0x134 [ 513.508461][T16408] should_fail.cold+0x5/0xa [ 513.508490][T16408] strncpy_from_user+0x34/0x3c0 [ 513.508525][T16408] getname_flags.part.0+0x95/0x4f0 [ 513.508560][T16408] getname+0x8e/0xd0 [ 513.508588][T16408] do_sys_openat2+0xf5/0x4c0 [ 513.508618][T16408] ? find_held_lock+0x2d/0x110 [ 513.508651][T16408] ? build_open_flags+0x6f0/0x6f0 [ 513.508685][T16408] ? lock_downgrade+0x6e0/0x6e0 [ 513.508725][T16408] __x64_sys_openat+0x13f/0x1f0 [ 513.508755][T16408] ? __ia32_sys_open+0x1c0/0x1c0 [ 513.508788][T16408] ? syscall_enter_from_user_mode+0x21/0x70 [ 513.508818][T16408] ? syscall_enter_from_user_mode+0x21/0x70 [ 513.508852][T16408] do_syscall_64+0x35/0xb0 [ 513.508883][T16408] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 513.508910][T16408] RIP: 0033:0x7f62ffc89109 [ 513.508931][T16408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 513.508955][T16408] RSP: 002b:00007f6300e79168 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 513.508987][T16408] RAX: ffffffffffffffda RBX: 00007f62ffd9bf60 RCX: 00007f62ffc89109 [ 513.509005][T16408] RDX: 000000000000275a RSI: 0000000020000040 RDI: 0000000000000003 [ 513.509021][T16408] RBP: 00007f6300e791d0 R08: 0000000000000000 R09: 0000000000000000 [ 513.509036][T16408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 513.509051][T16408] R13: 00007ffe182f90af R14: 00007f6300e79300 R15: 0000000000022000 [ 513.509085][T16408] [ 513.965028][T16451] ERROR: Out of memory at tomoyo_realpath_from_path. [ 514.129235][T16462] ERROR: Out of memory at tomoyo_realpath_from_path. [ 514.781480][T16522] ERROR: Out of memory at tomoyo_realpath_from_path. [ 514.930758][T16535] ERROR: Out of memory at tomoyo_realpath_from_path. [ 515.051904][T16543] FAULT_INJECTION: forcing a failure. [ 515.051904][T16543] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 515.051937][T16543] CPU: 0 PID: 16543 Comm: syz-executor.3 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 515.051967][T16543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 515.051982][T16543] Call Trace: [ 515.051988][T16543] [ 515.051996][T16543] dump_stack_lvl+0xcd/0x134 [ 515.052030][T16543] should_fail.cold+0x5/0xa [ 515.052062][T16543] _copy_to_user+0x2a/0x140 [ 515.052091][T16543] simple_read_from_buffer+0xcc/0x160 [ 515.052129][T16543] proc_fail_nth_read+0x187/0x220 [ 515.052166][T16543] ? proc_exe_link+0x1d0/0x1d0 [ 515.052196][T16543] ? security_file_permission+0xab/0xd0 [ 515.052234][T16543] ? proc_exe_link+0x1d0/0x1d0 [ 515.052264][T16543] vfs_read+0x1ef/0x5d0 [ 515.052298][T16543] ksys_read+0x127/0x250 [ 515.052327][T16543] ? vfs_write+0xac0/0xac0 [ 515.052356][T16543] ? syscall_enter_from_user_mode+0x21/0x70 [ 515.052384][T16543] ? syscall_enter_from_user_mode+0x21/0x70 [ 515.052418][T16543] do_syscall_64+0x35/0xb0 [ 515.052447][T16543] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 515.052476][T16543] RIP: 0033:0x7f62ffc3bcbc [ 515.052496][T16543] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 515.052520][T16543] RSP: 002b:00007f6300e79160 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 515.052544][T16543] RAX: ffffffffffffffda RBX: 00007f62ffd9bf60 RCX: 00007f62ffc3bcbc [ 515.052560][T16543] RDX: 000000000000000f RSI: 00007f6300e791e0 RDI: 0000000000000004 [ 515.052575][T16543] RBP: 00007f6300e791d0 R08: 0000000000000000 R09: 0000000000000000 [ 515.052591][T16543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 515.052605][T16543] R13: 00007ffe182f90af R14: 00007f6300e79300 R15: 0000000000022000 [ 515.052641][T16543] [ 518.931554][T16890] FAULT_INJECTION: forcing a failure. [ 518.931554][T16890] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 518.931587][T16890] CPU: 0 PID: 16890 Comm: syz-executor.4 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 518.931615][T16890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.931630][T16890] Call Trace: [ 518.931636][T16890] [ 518.931645][T16890] dump_stack_lvl+0xcd/0x134 [ 518.931680][T16890] should_fail.cold+0x5/0xa [ 518.931712][T16890] _copy_from_iter+0x389/0x15a0 [ 518.931756][T16890] ? _copy_from_iter_nocache+0x1510/0x1510 [ 518.931793][T16890] ? __virt_addr_valid+0x5d/0x2d0 [ 518.931823][T16890] ? __phys_addr+0xc4/0x140 [ 518.931853][T16890] ? __phys_addr_symbol+0x2c/0x70 [ 518.931882][T16890] ? __check_object_size+0x353/0x7a0 [ 518.931917][T16890] kernfs_fop_write_iter+0x194/0x610 [ 518.931953][T16890] ? iov_iter_init+0x45/0x1b0 [ 518.931986][T16890] new_sync_write+0x38a/0x560 [ 518.932019][T16890] ? new_sync_read+0x5f0/0x5f0 [ 518.932057][T16890] ? lock_release+0x780/0x780 [ 518.932112][T16890] vfs_write+0x7c0/0xac0 [ 518.932149][T16890] ksys_write+0x127/0x250 [ 518.932182][T16890] ? __ia32_sys_read+0xb0/0xb0 [ 518.932213][T16890] ? syscall_enter_from_user_mode+0x21/0x70 [ 518.932243][T16890] ? syscall_enter_from_user_mode+0x21/0x70 [ 518.932277][T16890] do_syscall_64+0x35/0xb0 [ 518.932307][T16890] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 518.932336][T16890] RIP: 0033:0x7fe1a2c89109 [ 518.932357][T16890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 518.932381][T16890] RSP: 002b:00007fe1a3dc6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 518.932407][T16890] RAX: ffffffffffffffda RBX: 00007fe1a2d9bf60 RCX: 00007fe1a2c89109 [ 518.932425][T16890] RDX: 000000000000000a RSI: 0000000020000080 RDI: 0000000000000004 [ 518.932440][T16890] RBP: 00007fe1a3dc61d0 R08: 0000000000000000 R09: 0000000000000000 [ 518.932455][T16890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 518.932470][T16890] R13: 00007ffee3549eff R14: 00007fe1a3dc6300 R15: 0000000000022000 [ 518.932509][T16890] [ 518.994854][T16897] ------------[ cut here ]------------ [ 518.994866][T16897] kernel BUG at arch/x86/kernel/alternative.c:1041! [ 518.994890][T16897] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 518.994915][T16897] CPU: 1 PID: 16897 Comm: syz-executor.5 Not tainted 5.19.0-rc1-syzkaller-00082-g825464e79db4 #0 [ 518.994945][T16897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 518.994961][T16897] RIP: 0010:__text_poke+0x348/0x8e0 [ 518.995007][T16897] Code: c3 0f 86 2c fe ff ff 49 8d bc 24 00 10 00 00 e8 ae 83 8d 00 48 89 44 24 30 48 85 db 74 0c 48 83 7c 24 30 00 0f 85 1b fe ff ff <0f> 0b 48 b8 00 f0 ff ff ff ff 0f 00 49 21 c0 48 85 db 0f 85 bf 02 [ 518.995033][T16897] RSP: 0018:ffffc900036ef808 EFLAGS: 00010246 [ 518.995058][T16897] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc9000d341000 [ 518.995076][T16897] RDX: 0000000000040000 RSI: ffffffff81b99c03 RDI: 0000000000000005 [ 518.995094][T16897] RBP: 0000000000000080 R08: 0000000000000005 R09: 0000000000000000 [ 518.995110][T16897] R10: 0000000000000000 R11: 0000000000000001 R12: ffffffffa0000a40 [ 518.995127][T16897] R13: 0000000000000080 R14: 0000000000000ac0 R15: 0000000000002000 [ 518.995144][T16897] FS: 00007f72e4593700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 518.995170][T16897] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 518.995190][T16897] CR2: 00007f72e359c028 CR3: 00000000781cf000 CR4: 00000000003506e0 [ 518.995208][T16897] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 518.995224][T16897] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 518.995240][T16897] Call Trace: [ 518.995246][T16897] [ 518.995254][T16897] ? cpumask_weight+0x40/0x40 [ 518.995287][T16897] ? __kasan_kmalloc+0xa9/0xd0 [ 518.995320][T16897] ? text_poke_memset+0x60/0x60 [ 518.995355][T16897] ? bpf_jit_binary_pack_alloc+0x3bd/0x990 [ 518.995389][T16897] text_poke_copy+0x6d/0xa0 [ 518.995415][T16897] bpf_arch_text_copy+0x21/0x40 [ 518.995447][T16897] bpf_jit_binary_pack_finalize+0x44/0x110 [ 518.995480][T16897] bpf_int_jit_compile+0xa74/0x13e0 [ 518.995509][T16897] ? arch_prepare_bpf_dispatcher+0xc0/0xc0 [ 518.995534][T16897] ? lock_downgrade+0x6e0/0x6e0 [ 518.995573][T16897] bpf_prog_select_runtime+0x2da/0x4b0 [ 518.995602][T16897] ? bpf_obj_name_cpy+0x144/0x1a0 [ 518.995637][T16897] bpf_prog_load+0xfe6/0x2250 [ 518.995667][T16897] ? mark_lock.part.0+0xee/0x1910 [ 518.995703][T16897] ? __bpf_prog_put.constprop.0+0x220/0x220 [ 518.995736][T16897] ? find_held_lock+0x2d/0x110 [ 518.995767][T16897] ? __might_fault+0xd1/0x170 [ 518.995803][T16897] ? bpf_lsm_bpf+0x5/0x10 [ 518.995831][T16897] __sys_bpf+0x11a1/0x5700 [ 518.995863][T16897] ? bpf_perf_link_attach+0x520/0x520 [ 518.995895][T16897] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 518.995934][T16897] ? find_held_lock+0x2d/0x110 [ 518.995978][T16897] __x64_sys_bpf+0x75/0xb0 [ 518.996009][T16897] ? syscall_enter_from_user_mode+0x21/0x70 [ 518.996039][T16897] do_syscall_64+0x35/0xb0 [ 518.996069][T16897] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 518.996098][T16897] RIP: 0033:0x7f72e3489109 [ 518.996117][T16897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 518.996143][T16897] RSP: 002b:00007f72e4593168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 518.996167][T16897] RAX: ffffffffffffffda RBX: 00007f72e359bf60 RCX: 00007f72e3489109 [ 518.996186][T16897] RDX: 0000000000000048 RSI: 0000000020000200 RDI: 0000000000000005 [ 518.996204][T16897] RBP: 00007f72e34e30ad R08: 0000000000000000 R09: 0000000000000000 [ 518.996220][T16897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 518.996235][T16897] R13: 00007ffd1cf0f2bf R14: 00007f72e4593300 R15: 0000000000022000 [ 518.996259][T16897] [ 518.996267][T16897] Modules linked in: [ 519.000728][T16897] ---[ end trace 0000000000000000 ]--- [ 519.000741][T16897] RIP: 0010:__text_poke+0x348/0x8e0 [ 519.000782][T16897] Code: c3 0f 86 2c fe ff ff 49 8d bc 24 00 10 00 00 e8 ae 83 8d 00 48 89 44 24 30 48 85 db 74 0c 48 83 7c 24 30 00 0f 85 1b fe ff ff <0f> 0b 48 b8 00 f0 ff ff ff ff 0f 00 49 21 c0 48 85 db 0f 85 bf 02 [ 519.000810][T16897] RSP: 0018:ffffc900036ef808 EFLAGS: 00010246 [ 519.000855][T16897] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc9000d341000 [ 519.000871][T16897] RDX: 0000000000040000 RSI: ffffffff81b99c03 RDI: 0000000000000005 [ 519.000886][T16897] RBP: 0000000000000080 R08: 0000000000000005 R09: 0000000000000000 [ 519.000900][T16897] R10: 0000000000000000 R11: 0000000000000001 R12: ffffffffa0000a40 [ 519.000914][T16897] R13: 0000000000000080 R14: 0000000000000ac0 R15: 0000000000002000 [ 519.000928][T16897] FS: 00007f72e4593700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 519.000951][T16897] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 519.000969][T16897] CR2: 00007f72e359c028 CR3: 00000000781cf000 CR4: 00000000003506e0 [ 519.000986][T16897] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 519.001002][T16897] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 519.001020][T16897] Kernel panic - not syncing: Fatal exception [ 519.001213][T16897] Kernel Offset: disabled