last executing test programs: 4m20.267988028s ago: executing program 4 (id=1537): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0x13, &(0x7f0000000cc0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff7}, [@printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @printk={@ld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x3}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x2}]}, @var={0x7, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x2e]}}, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) r2 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(r2, &(0x7f00000003c0)={'c', ' *:* ', 'm\x00'}, 0x8) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x3d}, {0x6}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='f2fs_truncate_data_blocks_range\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) r4 = openat$cgroup_int(r3, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[@ANYBLOB=','], 0x6a) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="b702000011000000bfa300000000000007030000407effff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7ebfcd0cd00006ed3d09a6175037958e271b60dedf8937f02008b6d83923dd29c034055d47dafe6c8dc3d5d78c07f34e4d5b3185b310efd4989147a00000000f110026e6d2ef831ab7ea0c34f17e3adeef3bb622003b538dfd8e012e71f6420b90adddff61b5b0a341a2d7cbdb90000bdb2ca76050000003a14817ac61e4dd11183a13477bf7e060e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132658555cf476619f28d9961b626c57c2691208171656d60a17e3c1c4b751ca532e6ea09c346df3d7cb4ebd31a08b32808b80200000000000000334d83239d1d2e9ff10ff2d27080e71113610e10c358e8327e7050b6c860dac12233f9a1fb9c2aec61ce63a38d316ef49b66d6e42fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a5f3d74ca891c4594e8a4399e01eadd3964663e88535c133f7130856f75643619f567d2e24f29e5dad9326edb697a6ea0182babc18cefd07e002cab5ebfcaad34732181feb215139f15eadddcb0c7cbe31fbae7c34d5ac5e7e64c21add9191eadd6e1795ad6a0f7f8cd3fccbdc3dec04b25dfc17975238345d4f71af35910b158e56657b7218baaa7cbf781c0a99bd50499ccff0f000000000000c7beba3da8223fe5308e4e2833baace04f4087c4f0da0d9a88f9dbb593ddeb3f0932a4d0175b889b8eccf707882042e716df9b57b290c661d4e85031086e97bcc5ca0e221a0e34323c129102b7b7a643e82e88a1940b3c02ed9c92d6f64b1282dc519b00159830d7617001154c46bd3ca96318c570f0721fc7aa2a580900000000000000b4f22cdf550ef091a78098534f0d973058594119d06d5ea9a8d085734000000000000000c12346e47ad97f4ead7cf754a52e4b2d0f22d428bd705414888700a30e2366c6a06b3367a389ca39059787790017b0689a1f3db9c24db65c1e00015c1d573dab18fd0600885f1ea8f2fd299fc3cdafda323e9c7080397bc49d70c060d57bc88fbe09baa058b040360ab9261503d2f363fb099408885afc2bf9a4f8c3506b669e889f5e4be1b8e0d634ebc1057b7e98186fc5141bd670dba6f43279f73db9dec75070cd9ab0fd969169ef6d2857b6bf955012cf7fe50d133da86e0477e42b98a6cc999dc21c3ef408e633dfa35f14d6e734837d365e63845f3c1092f8e34fc7eac9e8af3904ea0f3698cd9492794b82649b50d726bff873339c4cad4ead1348474250eda2c8067ab730c1d85969b95a2a5687f2ed690000522a0b7426000000000000000000000000000000000000000093fc7a82b98f99d9dedf7ba17f5f0b6d15e552fbd21f7eecff10243a43af03eea84c4304a5d3f93c02000000000000000043e1ed82b9aa0ae92a499984a009000000937523f5292d12659906005cde64f903c3415c458a2b32c2318f0858f19c6def80e1481e8e1c0098fc3f38b7a57211adb15d824cfdcf229628c0de49860a44286fe0e257cfa4ce50f3d10763d442824414a73c06837fe08de62f8710ca977960b74d0000ce73da6022a8671d1a3575b4e18c28c73203bf134686dd65808452cb6b76fcb134252c78de9b240de7b4cd015a77f76bb6470c05fc980b3d8f3f964f432a4bf6cddd6222c2da006b6fdb9c8468ae1d986a893b9519444d16a6dfa92c04331a6698507048fab5ae402acd05fe621f22712dfd09004770b4278fa14547d8ce3c21188e5e4e2baacd98e8e451d6aaaf090000006ed1d9018000008dd952595d78e9583bf4ea5de36099e3cddcb24ebb6eddb9e87c9ece87a42c0000abdfc6ea55887dfa18d0aea1b6eca5a883702b0bf3aeebb225895db90e237157a34e9f447237ea5b391bddd1290f7ce987a0e36b8e71b1779bbe95ffa9c3e0f6ba66e4d48e75253e3d633811e4b3220616aafbe7a3a18375ae593eb58fd500426286472466823cb8e1800aaaa0d9463c0c4ea5541a55df6eeffec0b66482228816cdfccb98374c644eea45de7867a0efbad0ab2bc33b350440a90b791b2b33f74a112a3b91b40bed8db2df8633207f8387e04ca52ab0f3f7b058b13523b896800b992972d9609551c27a5916ea16069c5bf55b98d926d3c27e7945b2999600000000f857bc1332d200194f658b930780603134ae6b7f5092772bd5d880dbe21b790c475b14b7fe4fe002dffd651faa79bb0cee0cdac23c3218f2ddaa6f7ba04b696a30d313bed30ba8f35569a9b07ee7308da09c01a4b827aa17bc2213fc1572b0204dd456b11a454d1f3f14179974aae624ea59500f5e048b2780666de81a040663c57f49af25be909984aea1b81f33426f86b4b941c08dfe2bc8ec246ec1aae120c42405e428923f3a83d9ba5c373f5e8a54120b451e2806370f1ed60c9fd5d9af4d16cb0f413c324da52d4bd2e01d3ac2d578d72e2d63322dfc9245ce3e3a097fb82f4e3b61a57094616020f72f1c55ee3d325c7496a7c2f10cfea516ae436751227378f00ca0f1f6c1dcf879700dd90b96a330f92bff736c83ca53e7f02b734d1a9292896f5d7f244bfab4946c7042e88206f641eafcc5b4ba7a7880533cdeac995d1caf6936f356ecf07a0084e7adc2dc12417997b03087c7b3b44b06f6158a2a18ce0e56ffbeb22f40521dd9972583d413098aa80db98ef324a2bfb7961c07b47521973cf0bb6f5530f6216b447b35d6e06b72b22b29de42bb1bc8ce0a0e3500000000000000000000000000b92eb197e4149627920000008000000000801792756f90b37f0858efc387f559203f314a4b0ed750fa72e5948ac3fe5921c14ef578d413e7b2a9e2f87f7b44949fe14c00000000000047030c09f62d444b4981db81799776eeb444000000009705fa8b56779bc876ad4f8d8c8e50815c4c3b27487996c09121caf47f76158362c74904f89cbc588aae84567a83571ff72bb65c082b5a8dee145ff221159aed2768edc05a3167d84205d5af86553c21e1f023a51c0e179fccfbc201982e3ddcaa45613899d19082453b180ca0c525b8d3cfaf7d0bcddeb5d5c7166038f276a92941393ba5e51f77172822bd903d9f8b436656771774ed88daab0d0cfdd1bf4d30ab566e1a4cb3ad66d830e10f7c1de13218aea21e7def613204c2b7c1ad48b01c208f4032e93408000000000000e96db049b92fc32ee34fe7a3419c8fbf03d61c159dc5864e030000a2c55b614d622b8de966c97e1940026f96db3c78ca18c9f08d1c47edf1a4d7298109f31b6078711ee72eacab84213bf50000000000000000000000000000001217887d0452aa6d26e4614d511710abeec84b78c027c160ba375dfa55a49b832ce4dfb91122193d514ed992c07f8cd6d897b314907e15642da228dbc03429e6e0e7ac118ed351c3b0c44bf5d8b58be573f8333aa8cc2ec5b5e305b3dee2562d415b4b9ed530797f55f9fe8510423409629a09000000000000009a35d9ca93e4b4591679547b8de8af1782451f7b8e1de508f1e9e525210d62bc850f8035040ad9e562be58797515b737bfb21d35ac560f99dbd18dad5e6345a464955e8141d75b6177e4fa176a020b0000000000006e76f0294fee7d19a0f327f8796d77b6e24b8df4bb438b527d10e657d49b844198ea9f93c4fd6fd2daa9bd87fd1e02ecc8075dca1280c201043257e9bd3c9a7aa150eb1711632b76d4dc0555d4bfcfd057980136d6e9000003b24fa300ef90bfe4ad364256937796f941c2faad94785f48777941f0cd3dba54ab6a5d5e91e90ac9ae994c3d4108b2fe7eca9413ac9bc138c74800487eb19c48db3f79be964808f109b5e36fc7fdd41def361427b6b9c118e5c9a0a1d5ca24886e33a7f81b2188ec75a5fc9302e3695bdcc9ab11201ef940569c995c21eeaefe2e8fc02e0433dc7371d1f72124ba263e554c30fdd7cd8c2da1e8706417da9ad8916551a1182fac08603dfc2f2279ba161c13984cd753b54a85e6f3010975e9ff51318b09fa13e2d38ce013aab41524c298c3719e31bcb1f102eaeee69a19e006bcdb1acc2664efa949a1a07bb3d7848d5e1381fbe63c522053a3bb32eb6345e10f7a12bf84e0e196a00833f464dd2f6547f14ebf137fce33efeb813211f31ff24d7dbb00f2574ccda59b3ea068fc2a18c37ee579f5a9ecc47da73684bcadd209ae5bbb7147df74d027d8d0adcdb54182c9de8053fc8b1b9d19c16c53d34db6e26f6a88d449f6abf3010100007e206a758a3f02816b4e097cfa3d46e45e7949c5b10691d49b9693a798a330a1ccb32d49772e80862df36dc0156b3f72cd85083f8e96ca1697457ec722766bd46ee2424975a38149bd57e5c0eb4087fc243e7e51b0aca9f0ab0668d7f2ee9ad9f267d8804417aa7e36a64d489bb84a1483fd3c3ecb024060002858cbb1f7708f5b41fca2fee7c03b1f862ce88dc313d913e041dd7583a1ac41c466757c5dd07ea2c5d62a000000000000000019a4e9a9c2cbc906f97fd6eb71b18d09a5df123ebbdb2827b43aed6a29e9942e402c1ae52e9cb98f3019d364fc21ea12023db91ced3c2f06550cef8a79ed39091e4776001187d0ab2f82478431d36470cc008d745ce8fd64c9aa64da230bb080945a557081b767beb75b1ea856a55c71b8fda672289aa6088630d48ac8039f19fec3acbcc5944a4e6fd44af8f10110db730a8d0d41b4ea36f9510f843a471963bd4621b9e43f08d341bb69df430ac6398c1b28bdd33b69b4b86d7c5f30cf728294e8ea1861ce50c367498945285f73c94d91210652eb4f3077cab6be2a3512eddbcb63d091d69fb1b26c8ada9a9f9355aea34fe55fd0d3011cb83ac03268dc66dd108a4e9944241e1d4ba69212ee0e7526e72c19346d08d3c3c82cb987f1bd2fd9ce2c88082ea23abbf23c6bd43fc9f9f8ea7656e25d3d73cd056b1f782de1fe349fc33546558366ed99940c0fda039272d277a3576d4e0469779d711e10b6bf040f7274fd9577c1c33326d2e60ee611ae226ef00e2944fb727832dc8dad36a6072aacfc4bcefb808ab7b3b95e0f60616320b2a9e1f8fac812daac9983639b35184803b7d192ce1f226e97fa23c37df95d067a54a8b412644cad9ecc251fbe418a81aaf00cc8d15758ff0eb885a40630396ba76b8fadc09e62ef70c8a0121e7e8322cb8bc0f50ad33a17143a29c14ecadd1b6244e31b888d8f3fa03208d3e9a4826a98f31995509015ebdc89f2f3106e54d5898d3758b9bfc9e4924e9cedf7f8fd584e7185703cc5f23741ffb480b5a87cd7efcceb409d354bdab211ebd50ab12b13c1b8ce93093a59a0f952153c2efd10e72ec9ee5fa2a00f9637851ddb81d059f9a363c4ada68dd25f19ee9e4841acee7c1b35ad6f9d54cf4939ce78a55a04e655d7746a3989c6f33b02f8497aacb6bfca7456111900000000000000000048d35af24acb66fdd4d1fb150138f0ee6abfc7049c94346868ed76d3a5df7335184386a5c532d425f1a098ff93efd05e5dd8b765121fbdfe5ef44f6472b939c31883f45889142e82086c2448da60d7a40774d71c2da2e7f6d4fe5d36923213cc7b7d71a1c90006e8f8d84953f284b0eb4366beff5df5595827dcd736e8cfab28cfa416e83c06213ca7fd21af56e3de1d80e77060447e20a8b317a4c06e24e99239824d08abf670a685bc46c8168bee4cfc30cc6d0dc030a592925bad3e0f805f0d4b2b600dc3f0c4c6f75bb4e49982f4198ac90ab77c5572c956d415858bad5ee117b3e5f1507bbd0d7a30388865deb11106a93225a81feb08f5"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001300)=@base={0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6, 0xffffffffffffffff}, &(0x7f0000000380), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r7, &(0x7f00000000c0), 0x0}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000000)="b9ff0300600d698cff9e14f07e00", 0x0, 0xe00, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xf, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="b4000080b97b006201000000000000950000f7ff00000000000000000000000014c5ee4731974d451b40e41c938234bb827d2fcb00f6a091d5ba0fc7c13520fce6881ad4ae08aa69"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) write$cgroup_subtree(r3, &(0x7f0000000400)={[{0x2b, 'cpuset'}, {0x0, 'blkio'}, {0x2d, 'rdma'}]}, 0x15) 4m19.156810193s ago: executing program 4 (id=1549): bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x8}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0x80000001}}]}, {0x0, [0x61]}}, 0x0, 0x53, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000180)='W', 0x1}], 0x1}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x17, &(0x7f0000000040)={0x0}, 0x10) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r0, 0xc008744c, &(0x7f0000000180)) 4m18.723239719s ago: executing program 4 (id=1555): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000140)='lo\x00\x96o\xd6Q\xb4Y\xa9\xc87,%\x81\xfe\x00\xd2\xd1|C\b\x00\x00\x00\x00\x00\x00\x00\xe3\xd8Yk\xdd\x85\xaac{\x8c\x8ffp`-\xcd\xf6jh\xbf\x9c\xd9\xd5\xf4\xe68\xe6O\xc2\xf1V0\x8b\xdd\xcc\xeeR\xf2/\xba\fE>k\a\xe7>t7\x8e(\xf0\x87d\xaf\x93\xfa`\xa6,o\x81.\x1cR\xa5\t\x00\x00\x00\x00\x00\x00\x00|pT\x15\xbc\f*d\x8b\xc2\xcd\x8f\x98\xdf\x00\x00\x1cM\x9c\xa5\xe0\xa8\x00\x00\x00\x80V\xf6\x80$H!w\xa6m\xd8\x7f\xc6\x837\x83/\x9a\xdf\x01\xf2\x9e\xbb\xca^\xf9\x05\xeb\xb8{7[\xf9\xe9\x15\xdc0]\x89\x9b~\x04\xb4\xa5\xad\v.\xd0*%`\xb0\x96\x86\xdb\xa9\xd3\x01\xb2\xc7\xf8G\x069\x90,\xda\xf6\xc5\xcd\xec\xa3z\xd2\"4\xab\xf4\xa7\x83r\xa4\x80|\x03C\x9c\x00\xac\xba\xcb\xa4h\x86w_Eu\xbfy%,\xe5\n\xc1\xb3\xa4g\xa3P\x0f\x11\x93\xc7\x7f\xec\xb2\xc5E\x00\xdd\xf2e\xa8\xf1<\xb2\xc82\xbf=o\x00`\xc1A\'\xc6X\x92\x0e[\x19\xaa?\x06\xe5\x9d\xd1\x87\x92\xbb\xe3Y\x97\xc2\x8aV\x18q\x9e\'\x8f0\x04\xa8\xa9#\x8e\xd0\f^\xca\x88+\x80\x82DG\x96\xe10\xac\xf3zE\x11g\xa0\xc4.\xde8`\xa33\x85\xc9\x87-\x8c\x12\x96\xb9\'\x1c|\x1766\xb7\x04g\xc6\xc2\xa9\xa5\xdc\xd9\x89\b\x9b\xbd\xc9\xcd\a\xa7J\'\xc0\x8a1\x94\x17\xd8\xdc\xea\x1b/\x9c\x9d\x01\x87@\xe2+\xf1\'\xf8\aA%\xd9\x9a\x1a\xe5\xb2m$U\x9b\xa1') perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0xc8, 0x9, 0x3, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1200000000}, 0x0, 0x4, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x8000000000000003, 0x19188, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x1, @perf_config_ext={0x1000fff, 0x400}, 0x105563, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x20001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0fce"], 0x50) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00000000db5b686158bbcfe8875a06030000112300000000000000ff00000000ac1414aa3b20"], 0xfdef) 4m18.64516236s ago: executing program 4 (id=1556): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000e570ebc2f864b89272a80000000000000000007ad83ed9e739bc7da820fa6bc2fe6ae18c8b02e41132bb714415d385ac231b0fcaa233514c2f527f27e2d1290de56c4b65f4eedcde4d2273dd0c59bd00298f5b384527eb17bddb77c39d161477def673b1750815759d6e2c3010ddd92689fbc4c119a69f4a997779e9be3a36efb28dbcc150af3bf4eb4aa76282fd668aa2dadc9e02cd98c6f2f1176cf1b1b480", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB='\x00\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x5d, 0x0, 0x0, 0x0, 0x1000, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) 4m18.589335971s ago: executing program 4 (id=1559): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0), 0x183081, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd6372ce22667f2c00dbf6e97158b33d4fec877f1b6d76745b686158bbcfe8875afdef00010000000029"], 0x66) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="180200000000000000000000000000008500000027000000850000000800000095000000000000001644ac29e83946cfc7968102c7dc48c4a4fbacec981fda152b00c5ebc7733d2ed95abd36a3211e2853579a66e749"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x46) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f0800", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x4010744d, &(0x7f0000000180)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001340)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') recvmsg$unix(r8, &(0x7f00000012c0)={&(0x7f0000001000)=@abs, 0x6e, &(0x7f0000001280)=[{&(0x7f0000001080)=""/88, 0x58}, {&(0x7f0000001100)=""/131, 0x83}, {&(0x7f00000011c0)=""/134, 0x86}], 0x3}, 0x40000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xde) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x60}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) close(r9) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000fd1487e6fe1699070389d63a54c308b37c34d3224ac0e7291457d72286a1610d0e06aaf2c976bb61be5657eed76a42aef5bfe945893dabe46805eaaa4f904d5e8a524688d71e2c56ef3a7bc907e0ef00970bf0ab68337a144bdccc44a18a0700ac1b41b21e68c36c3a110732ee243380d0c88efaa01adbcb0b200fd30d7f8738b4537108888a77cdb3fdf46e2897c51398caf715e188d1b0915fada40816bcf07ec79b184fe99ffb0045131f6b9f28b5fd2431ab7ff74ae09f0e392e493a5bd4e0b7850a5a6aa139755e72f6d29118ec24bd20f06f7ede7dd2285d9af4f7457ea4b5a15773586fb523e6ad54bf1f53", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r8, @ANYBLOB='\x00'/28], 0x50) 4m17.276140769s ago: executing program 4 (id=1585): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xa, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x12) 4m2.319236754s ago: executing program 32 (id=1585): r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xa, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100, 0x9, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x12) 2m10.104352694s ago: executing program 2 (id=2508): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x4b, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES64], 0x22) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200052f00fe800000fe800000875a65059ff57b00000000000000000000000000ac1414aa000022eb"], 0xcfa4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x4, 0x5}, {0x0, 0x2}]}, @union={0x3, 0x1, 0x0, 0x5, 0x1, 0x5, [{0x9, 0x2, 0x9}]}]}}, &(0x7f0000000600)=""/4088, 0x4e, 0xff8, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r5, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000440), 0x8, 0x89, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0xb, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000017c0)=@bpf_lsm={0x1d, 0x1d, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x154, 0x0, 0x0, 0x0, 0x60f7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x4, 0x1, 0x0, 0x6, 0x6, 0xfffffffffffffffe}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0xda9bd928c6576d11, '\x00', r7, 0x1b, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x3, 0x10, 0x5, 0x8000}, 0x10, r8, 0x0, 0x7, &(0x7f0000001700)=[r6, r1, r0, r6], &(0x7f0000001740)=[{0x0, 0x5, 0x10, 0x1}, {0x0, 0x3, 0x2, 0x9}, {0x2, 0x1, 0x8, 0xc}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x2, 0xb, 0x7}, {0x1, 0x5, 0x6, 0x1}, {0x2, 0x3, 0x2, 0x4}], 0x10, 0xfffffffa, @value=r5}, 0x94) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m8.686590813s ago: executing program 2 (id=2514): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 2m8.685602904s ago: executing program 2 (id=2516): perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x4b, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES64], 0x22) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200052f00fe800000fe800000875a65059ff57b00000000000000000000000000ac1414aa000022eb"], 0xcfa4) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x7, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x2}]}, @union={0x3, 0x1, 0x0, 0x5, 0x1, 0x5, [{0x9, 0x2, 0x9}]}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000600)=""/4088, 0x4b, 0xff8, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r5, 0xe0, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x5, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x96, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000340), &(0x7f0000000440), 0x8, 0x89, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000005c0)={0xb, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000017c0)=@bpf_lsm={0x1d, 0x1d, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x154, 0x0, 0x0, 0x0, 0x60f7}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@alu={0x4, 0x1, 0x0, 0x6, 0x6, 0xfffffffffffffffe}, @map_val={0x18, 0x6, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @cb_func={0x18, 0x4, 0x4, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000200)='syzkaller\x00', 0x3, 0x0, 0x0, 0x41000, 0xda9bd928c6576d11, '\x00', r7, 0x1b, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x3, 0x10, 0x5, 0x8000}, 0x10, r8, 0x0, 0x7, &(0x7f0000001700)=[r6, r1, r0, r6], &(0x7f0000001740)=[{0x0, 0x5, 0x10, 0x1}, {0x0, 0x3, 0x2, 0x9}, {0x2, 0x1, 0x8, 0xc}, {0x1, 0x4, 0x0, 0x6}, {0x3, 0x2, 0xb, 0x7}, {0x1, 0x5, 0x6, 0x1}, {0x2, 0x3, 0x2, 0x4}], 0x10, 0xfffffffa, @value=r5}, 0x94) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m7.564642089s ago: executing program 2 (id=2528): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c000000020000000000000002000084ffffffff000000000300000000000001000000000300000000000000000000000000000200000000000020000000000602"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 2m7.420107051s ago: executing program 2 (id=2530): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0/../file0\x00', r0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x43, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x12, 0x5, &(0x7f0000000040)=@framed={{0x55, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x1c}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2m5.903370532s ago: executing program 2 (id=2539): socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x158) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x42100000, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001780)=ANY=[@ANYBLOB="850000002a00"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) socketpair(0x1e, 0x1, 0x0, 0x0) (async) close(0xffffffffffffffff) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(0x0, 0x158) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) syz_clone(0x42100000, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001780)=ANY=[@ANYBLOB="850000002a00"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) (async) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) (async) 1m50.892494388s ago: executing program 33 (id=2539): socketpair(0x1e, 0x1, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x158) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x42100000, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001780)=ANY=[@ANYBLOB="850000002a00"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) socketpair(0x1e, 0x1, 0x0, 0x0) (async) close(0xffffffffffffffff) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) (async) mkdir(0x0, 0x158) (async) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) (async) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) (async) syz_clone(0x42100000, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_procs(r0, &(0x7f0000000380)='cgroup.procs\x00', 0x2, 0x0) (async) write$cgroup_pid(r1, &(0x7f0000000040), 0x12) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001780)=ANY=[@ANYBLOB="850000002a00"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000b80)={{0xeb9f, 0x1, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0xfc5f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) openat$cgroup_procs(r2, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) (async) write$cgroup_pid(r3, &(0x7f0000000c40), 0x12) (async) 6.5173699s ago: executing program 0 (id=3206): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0xdd, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}}, 0x0, 0xffffffffffffffff, r1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0x98}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(0xffffffffffffffff) (async) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000800000000000000", @ANYRES32, @ANYBLOB="26a18c4a6d5f64"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000800000000000000", @ANYRES32, @ANYBLOB="26a18c4a6d5f64"], 0x48) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @rights={{0x10}}], 0x80}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000540), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x14, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000185c57dae81100000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x10001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcb2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0x14, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000185c57dae81100000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x10001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfcb2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000940)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = gettid() bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0x3, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x0, 0x1, 0x75}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99, 0x1, @perf_config_ext, 0x100019, 0x9, 0xbad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5fd}, r7, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={r7, r2, 0x0, 0x1, &(0x7f0000000380)='\x00'}, 0x30) bpf$ITER_CREATE(0x21, &(0x7f0000000400)={r2}, 0x8) 5.763363131s ago: executing program 0 (id=3207): perf_event_open(&(0x7f0000001080)={0x1, 0x80, 0x1, 0x0, 0x8, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x400000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000600)={r0, &(0x7f0000000600), &(0x7f0000000000)=""/10, 0x2}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 5.709268421s ago: executing program 0 (id=3209): perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x6, 0x22, 0x0, 0x0, 0x0, 0xaa91, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0, 0x4}, 0x4001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x200, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xe}, 0x1049, 0x0, 0x0, 0xa, 0x0, 0x0, 0x3, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0xa, 0x3, 0xff, &(0x7f0000000000)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=0x1, @ANYBLOB="090000b3b347b62b3d9968160000000000000079070000000000000000a8075f9169df234ae6db4cc95c4142bbc6af34b3cb75d9be9d1f9b50c4f6cc9c8c1d426bce8170745b642c1e7dd8e7d0cc6a280b969d4ace55ad08f37350cbd61bb0bcf0ad1aa862da3db2b7f9b27d321948de578b9f29ca8e735a57437de8f4a34904b7244ee8b659702660eaf28744dedc2898437288365f51447534dd880179be9fdc5233c78731487a542d5383403229", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="01000000000000000500"/28], 0x50) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000280)={0x3, 0x4, 0x4, 0xa, 0x0, r1, 0x40, '\x00', 0x0, r2, 0x5, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x500, 0x0, &(0x7f0000000000)) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x60240, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) socketpair(0x2, 0xa, 0x1, &(0x7f0000000140)={0x0, 0x0}) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x47, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x108406, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001780)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r5, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0], 0x0, 0xc6, &(0x7f0000000780)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0xf0, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000006c0)=0xffffffffffffffff, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000002c0)={0x4}, 0x8) 5.09399322s ago: executing program 3 (id=3214): bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, @fallback=0x25, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1, 0x0, 0x9}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000020000000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000001100000000000000000000000046"], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r4, &(0x7f0000000380)={&(0x7f0000000280), 0x10, &(0x7f0000000800)=[{&(0x7f00000005c0)='Z', 0x101d0}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(r6) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100), 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYRES8=r7], 0xfffffffffffffceb, 0x884}, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 5.08713445s ago: executing program 3 (id=3215): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0xffffffffffffff6e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x285c, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x3}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5ff, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x2b, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)) 4.999633291s ago: executing program 3 (id=3216): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 4.924228292s ago: executing program 3 (id=3217): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0xfdef) 4.710528845s ago: executing program 0 (id=3220): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0xa00, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0x9) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="09000000070000000000010005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) socketpair(0x10, 0x6, 0xa, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0b0000000700000001000100490000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r2, 0x0, 0xffdd) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x16, 0x8, &(0x7f0000000dc0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x2800000002000000, 0xe, 0x55, &(0x7f0000000140)="a06ad876d56a0064d082778c3938", &(0x7f0000000380)=""/85, 0x0, 0x4000000}, 0x1a) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 4.637852416s ago: executing program 3 (id=3221): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x5, 0x2aa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb3ff, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYRESDEC, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x5421, 0x110e22ffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1e000000fbffffff00000000b3a6403432", @ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20], 0x48) perf_event_open(0x0, 0x0, 0x1000000000000, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 4.004174265s ago: executing program 1 (id=3224): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x2, 0xc, &(0x7f00000013c0)=ANY=[@ANYBLOB="180200001000000000000000000000001801000020696c2500000000002020207b2af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000087000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff2e, &(0x7f0000000040)=""/210, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x19, &(0x7f0000000300)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0x51, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x4b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffffffffffff, 0x100000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x8, 0x10, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000e00000000000000ad0a00001801000020786c2500000000002020207bee0cf95bc67f978ec95612eea388cd1af8ff00000000bfa10000000000000701e80e000000000000000008000000b70300005703000085001400060000001843000004000000ef1400000000000000000c74050008000000183b"], 0x0, 0x6, 0x0, 0x0, 0x41100, 0x2, '\x00', 0x0, @cgroup_skb=0x1, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x6}, 0x0, 0x80000000c8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 32) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000580)={r0}, 0x4) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="b702000024000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d83b23dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e1a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c11160fb20b1c581e7b0915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab3aa32f948c06b59b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cae1bd4f4390af9a9ceafd07ed00b0000002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a469398685211bbae3e26d0a5752813bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a7237841cef384b22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72c7ead0509d380578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9624d37c10223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b9557aeb62ecd1446a470dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c74f0e2a9bf62ffec6459db40000000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced84680900000000000000d16d7d9158ffffffff00000000ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d2782a70cf44ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d767671414c99d4894edff8249dc1e3428d2129369ee1b85af1eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038deb359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b2042b8ff8c21ad702cca54728acad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd20785f653b621491dc6aaee0d40973109644fb94c06006e3c1be2f633c1d987591ec3db58a7bb3042ec3f77abb21338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e155f455010b0cb578af7dc7d5e87d4cd376444e2de02f47c61e8e84ff828de453f3489460fd83210e95307e676e1fb4d5865c0ca177a4c7fbb4e62b4450900576b2b5cc7f819abd0f885cc4806f47ffb966fcf1e54f5a2d3875e46000000000000e734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d3676329a18cda690d192a070886df42b2708398773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169cdfaa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c30930804fdc3690d10ecb65dc5b47481ed51a6359cade91fd645c6d924f36a86bf1eee2e8893e903054d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf817becd9e5a225d67521d1128eac7d80a6225c3e2f0932223bfbf69ff861f4394836ddf128d6d19079e64336e09000000c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f324661fdcfa68f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b98a8bf6c747d9a1cc500bb892c3a16ff10feea20bdac89afb758cf350000000000000000000000000200000000000000ed713df0c59e38928511a64845f1b21ed03369719fa905909d8ce35b42761c46d040e53a0a227e9cecd4d414231baa4894a13763ea5de7a52e61a588babaf5da9a28f477e032400938116cb294447898039724881de3ba3dd5e5e115b58d438b17ad11bf1b1f1ed057d89ec46b2b9bb434e9187a728d1136333958469b22d2126664b5299cc3167ac9a4d501638b978e1c692da5261dae5c9d13065b8ed8b358e7273dfa1e9a8dc1d16aa1edd0c274dedb7cd7e4753c152b4e0e3d124e561420587b9b00ab68c32d6b397c5e7cc4e803e6b6e8ed547e2875372023d111e64cd9ee3635888ecbc7352fd60f348456d74e9e7c09ee202dd09524ecfd3d8c836c0a13a9a45a7e2cec88fa2710ee35cded1b824fe4fe68849eee41b5e335aeec0f27053b3a07a001ffe29c5cc3a0ccdcc74330c2a995378d225495c5a543519d952c96da9257f47acc29c48d48b22b1f502b9d743d352de56efbb1b15158c4f0107ba5b3394d4cad4f0a1d31f694d0f559e7f82682775ec7569eeb7ef643dbcbafc4c1c5cbb0ad02dd2a69c5f2b5350049a817b546cf734a746a1cc147a6050b6dc2d16598e8e3a5c3515d0edc23e66bbdc6c117559357f49c59208af1162ba1d6667e3ab6bb1696c32dc3bcb2c8ab30d28265ff55c8a80c8e3ce29b2f576ea686d351a8cdb808739ed1a7022fb6e4e834593279c791085e49d1b8124adaf0010790e72ef2035e3da7ebb117c1a032a7378d5c62bb1a4e212618113bbd688091273028a44abfe09067e22fda361d6769d1f44bb06ca0cb9a14a54a8ba0dcb5445c4b368bd1dcce7500"/2367], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 3.922557266s ago: executing program 5 (id=3225): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0/../file0\x00', r0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x1848, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000067f500"/28], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r4}, 0x10) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000380)={r1}, 0x8) write$cgroup_type(r5, &(0x7f00000003c0), 0x9) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x43, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000340)={0x100, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) 3.259429265s ago: executing program 5 (id=3227): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 3.246495785s ago: executing program 0 (id=3228): write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000002c0)={[{0x2b, 'cpu'}, {0x2b, 'blkio'}]}, 0xc) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) (async) socketpair(0xa, 0x800, 0x9, &(0x7f0000000000)) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="13000000100000000200"/20, @ANYRES32, @ANYBLOB="0000070000000000000000000800000000001a00", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB="18004000000000000000000000000000040000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095000000d3031a00"], &(0x7f0000000100)='GPL\x00', 0x4, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x81) (async) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x101100, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'ipvlan0\x00', 0x2}) ioctl$TUNSETNOCSUM(r1, 0x400454c8, 0x1) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)) ioctl$TUNGETDEVNETNS(r2, 0x5460, 0x20000000) (async) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) close(r4) (async) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000640)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032908000000000000000000000000ac14140a000000000000000000000000ac1414aa"], 0xfdef) 3.241190265s ago: executing program 5 (id=3229): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r0, 0x8982, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207c1af8ff00000000bfa1000000003f9b71fd1a76ed13b2ab092abf000007010000f8ffffffb702000008000000b70300000100008085000000060000009500000000000000"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) 3.228072635s ago: executing program 6 (id=3230): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x1000, 0x5}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) close(r1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x7a}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = getpid() perf_event_open(&(0x7f0000002100)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0xa0100, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x6}, 0x10, 0x0, 0x80000003, 0x6}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa2721, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab92, 0x0, @perf_config_ext={0xd, 0x823}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x40}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r3, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r1, 0x80047441, &(0x7f0000001200)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0xfffffffffffffffd, 0x1}, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000140)={'ip_vti0\x00'}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000b000000080000000100000f050001000000000001000000000000000000000000000000612f"], &(0x7f00000001c0)=""/257, 0x3b, 0x101, 0x6, 0x0, 0x0, @void, @value}, 0x28) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r4, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000003c0)={r6, 0x58, &(0x7f0000000340)}, 0x10) ioctl$TUNSETOFFLOAD(r5, 0x400454ce, 0xac13282fc6d87719) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x1, 0x80, 0x1, 0xe, 0xd0, 0x5, 0x0, 0x400, 0x461a0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x9, 0x2}, 0x7000, 0x2, 0x9, 0x3, 0x4, 0x8, 0xf8, 0x0, 0xe3bf}) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) 3.092447747s ago: executing program 5 (id=3231): perf_event_open(&(0x7f0000000a00)={0x1, 0xbb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xb2321, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x80000000}, 0x0, 0x7b, 0x0, 0x7}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f00000000c0)={0x1}, 0x8) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x5451, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x16, &(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000000), 0xfffffd26) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x19, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x86) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2401, 0x0) close(0x3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r6 = syz_clone(0x20000, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000200), 0x0) write$cgroup_pid(r5, &(0x7f0000000240)=r6, 0x12) 2.359105157s ago: executing program 0 (id=3232): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="180800000000000000000000004000008510000006000000180a0000", @ANYRES32, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0xc, [@struct={0x8, 0x1, 0x0, 0x4, 0x0, 0x4, [{0xa, 0x3, 0x8}]}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x20}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}]}, {0x0, [0x61, 0x0, 0x2e, 0x2b, 0x61, 0x61, 0x0, 0x61, 0x0, 0x5f]}}, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000600)='memory.current\x00', 0xf0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x98}, 0x2000) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_subtree(r6, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x9, [@struct, @var={0x7, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x30, 0x0, 0x2e]}}, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_clone(0xa6015800, &(0x7f0000000140)="551e3366aae2ccfe170ef8061fb197c9ccfd018f37c65d69d638dab13bda12000400000000000064e1f7949e45ecb11910384be8d47c75277e6f5a946cea4fb896be82dcc31b169b2cd15d40221aefa5dff012495d302cf0618e70f625165f85b0b1f015b354b30c81b64e63ed172e4d58a697c1f526bf1ac7b8a4e5fec4705e8c72ec49b56f7f27b1bee2e3b07cc326bb227fdfbc9636ab67eb945b197f86b3ca32e929988c5b4e9c33f0f0fc15ae504bedb2db059cad009363aafd8915dec82e36ae8a1a38af", 0xc7, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x99, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0500000004000000080000000e"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000006020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000ecff850000000400000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x9, 0x4, 0x680, 0x8, 0x80, r7, 0xe, '\x00', 0x0, r4, 0x3, 0x3, 0x1, 0x0, @void, @value, @void, @value}, 0x50) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) write$cgroup_pid(r0, &(0x7f0000000140)=0xffffffffffffffff, 0x12) 2.250352689s ago: executing program 1 (id=3233): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000018000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 2.200693819s ago: executing program 6 (id=3234): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013900000000009500000000000000ebfbad3f0c4953260cdf35fd70ed47332920667acb285d1367e2a83bfd3b4e34f0cd5eb07ddb8f7707735bdbf16918aa55a241e6cdd111c189067667fe76ceee4928f2c0700e7192f162376ffa83c3342623f2d78735a656ad"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x600000}, 0x7, 0x0, 0xffffffffffffffff, 0x300, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 2.10596174s ago: executing program 6 (id=3235): socketpair(0x1, 0x80000, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x24}, {0x6}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000001000)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed@n\x00\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xf3\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x9c\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50x0, &(0x7f00000006c0)=""/249, 0xf9}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000b000000000009bae35b94a805b427a0300000000000000"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={r3, 0x0, 0x0, 0xc}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) recvmsg(0xffffffffffffffff, 0x0, 0x0) socketpair(0x2c, 0xa, 0x3ff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000ac0)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xe, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r5}, 0xc) syz_clone(0x20000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000900), 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x18, 0xb, &(0x7f0000000180)=@raw=[@printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xc35e}}, @alu={0x7, 0x0, 0xd, 0xb, 0x3, 0x50, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2}], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000e80)=""/4096, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xf, r1, 0x8, &(0x7f0000000580)={0x5, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x7, 0x9, 0x800}, 0x10, r2, r6, 0x2, &(0x7f0000000940)=[r0], &(0x7f00000009c0)=[{0x0, 0x4, 0x7, 0x9}, {0x0, 0x4, 0xc, 0x1}], 0x10, 0xa8f, @void, @value}, 0x94) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f00000000c0)=[{}, {0x94}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000b00)=ANY=[@ANYBLOB="1808000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf09000000000000c5090100000000009500000000000000b7020000000000007b9af8ff00000000c5090000ffffff807baaf0ff00000000bf2700000000000007080000fffdffffbfa4000b5c29dc4e661db9000000000007040000f0ffffff540200000800000018220000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7050000080000004608f0ff76000000bf9800000000000056080000000000008500000005000000b7000000000000009500000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.069374631s ago: executing program 6 (id=3237): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @random="ec9dafdd17be"}) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xffffffdd, 0xa}, [@ldst={0x3, 0x2, 0x3, 0x1c10a1, 0x0, 0x31}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x68000000, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.529932839s ago: executing program 5 (id=3238): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e000000850000000f000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)=@generic={&(0x7f0000000140)='./file0/../file0\x00', r0}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r3}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43451) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_open_procfs$namespace(0x0, &(0x7f0000000600)='ns/user\x00') perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x43, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801, 0x0, 0x0, 0x0, 0x101, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0xf9, 0x0, 0x0, 0x0, 0xe8, 0x0, 0x0, 0x1040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x8420, 0xc8, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 1.47419575s ago: executing program 6 (id=3239): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000}, 0x0, 0x4, 0x0, 0x0, 0x0, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00', 0x200}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000980)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000000000000000000000006ccc3b711aa04d040000"], 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext={0x3}, 0x12, 0xc8, 0x10000, 0x0, 0x9}, 0x0, 0x10, 0xffffffffffffffff, 0x0) close(r5) 1.316259721s ago: executing program 1 (id=3240): bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0900000004000000ff0f000005"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x3, '\x00', 0x0, @fallback=0x25, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1, 0x0, 0x9}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x2000, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) socketpair(0x1e, 0x5, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000000000000000020000000300000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000001100000000000000000000000046"], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg$tipc(r4, &(0x7f0000000380)={&(0x7f0000000280), 0x10, &(0x7f0000000800)=[{&(0x7f00000005c0)='Z', 0x101d0}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(r6) r7 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x2a, &(0x7f0000000100), 0x4) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYRES8=r7], 0xfffffffffffffceb, 0x884}, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, &(0x7f0000000000)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.243693562s ago: executing program 1 (id=3241): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.115296904s ago: executing program 1 (id=3242): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0xc, 0xffff, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ITER_CREATE(0x21, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x1, 0xffffffffffffffff, 0x9) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x100, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x6, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={r2, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xf6, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f00000003c0), &(0x7f0000000680), 0x8, 0x8c, 0x8, 0x8, &(0x7f00000006c0)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0xe, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="185f9d132996000000006c00"/26], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', r5, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1000000000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000600)={r0, &(0x7f0000000080), 0x0}, 0x20) 628.230741ms ago: executing program 3 (id=3243): mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1083}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00000000000000120000f1850000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x67, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000000)={&(0x7f0000000300), 0x6e, 0x0, 0x0, 0x0, 0xfffffffffffffde2}, 0x141) bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x13, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x28}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r5, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfbffffff}]}) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb3, 0x0, 0x0, 0x0, 0x0, 0x4c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80350, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x5, 0x7ff}}, 0x0, 0xffffffffffffffff, r6, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r7, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) 246.558336ms ago: executing program 6 (id=3244): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x29}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xe, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x100e64, 0xc78}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r1 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x17, 0x2d, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x34}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}}, @call={0x85, 0x0, 0x0, 0x3d}, @map_val={0x18, 0xa, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xe}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}, @printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x5}}, @ldst={0x3, 0x3, 0x6, 0x9, 0x5, 0xffffffffffffffff, 0x1}, @exit, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000008000000010001000900000001000000", @ANYRES32, @ANYBLOB="00000000000000e34326f2bf1cbc790000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) close(r1) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f00000018c0)=ANY=[@ANYBLOB="b405000000000000711098000000000066000000000000009500000000000000bfd76ee96dd56ffd7713f23eab174876adbf83bb0c7c69b08047628a02bd43450c2c062a197aa28d2b15ba1ce55dcce2a591d27112605fb1cb1c4b991b8b4c99d4072b4314332d01b3440ca92fbbc2f05fc3e8a56e0b5e2726c66c81bdb056fb15ac175fb687525fc4c3837ffe49fa530cb9fa26bf2e0669a80913847be4735031c3fd6ebf87afa2704ca69854b9f0c99cea19baa7355d5fa8ef4429391c02"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x366, 0x10, &(0x7f0000000000), 0x2b2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000900)=@bloom_filter={0x1e, 0x2, 0x7, 0x14800000, 0x0, 0xffffffffffffffff, 0x200, '\x00', 0x0, 0xffffffffffffffff, 0x100, 0x3, 0x80000000, 0x4, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001380), 0x5}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 0s ago: executing program 5 (id=3245): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073013900000000009500000000000000ebfbad3f0c4953260cdf35fd70ed47332920667acb285d1367e2a83bfd3b4e34f0cd5eb07ddb8f7707735bdbf16918aa55a241e6cdd111c189067667fe76ceee4928f2c0700e7192f162376ffa83c3342623f2d78735a656ad"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x1000000}, 0x7, 0x0, 0xffffffffffffffff, 0x300, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) kernel console output (not intermixed with test programs): [ 100.515834][ T2323] bpf_map_area_alloc+0x83/0x90 [ 100.520843][ T2323] reuseport_array_alloc+0x146/0x230 [ 100.526118][ T2323] ? reuseport_array_alloc_check+0x90/0x90 [ 100.531996][ T2323] ? array_map_alloc_check+0x1da/0x2d0 [ 100.537435][ T2323] map_create+0x2d8/0x980 [ 100.541748][ T2323] ? security_bpf+0x82/0xa0 [ 100.546239][ T2323] __se_sys_bpf+0x2dc/0x570 [ 100.551099][ T2323] ? __x64_sys_bpf+0x90/0x90 [ 100.556462][ T2323] ? check_preemption_disabled+0x118/0x300 [ 100.562434][ T2323] ? __ia32_sys_read+0x90/0x90 [ 100.567196][ T2323] ? debug_smp_processor_id+0x1c/0x20 [ 100.572834][ T2323] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 100.578898][ T2323] __x64_sys_bpf+0x7b/0x90 [ 100.583387][ T2323] do_syscall_64+0xcf/0x170 [ 100.587880][ T2323] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 100.593756][ T2323] RIP: 0033:0x7fc6bd11a969 [ 100.598156][ T2323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.618217][ T2323] RSP: 002b:00007fc6bb783038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 100.626823][ T2323] RAX: ffffffffffffffda RBX: 00007fc6bd341fa0 RCX: 00007fc6bd11a969 [ 100.634961][ T2323] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 100.642932][ T2323] RBP: 00007fc6bb783090 R08: 0000000000000000 R09: 0000000000000000 [ 100.651257][ T2323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 100.659320][ T2323] R13: 0000000000000000 R14: 00007fc6bd341fa0 R15: 00007ffcb5e84198 [ 101.320593][ T2362] FAULT_INJECTION: forcing a failure. [ 101.320593][ T2362] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 101.398398][ T2362] CPU: 1 PID: 2362 Comm: syz.0.695 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 101.409529][ T2362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 101.419685][ T2362] Call Trace: [ 101.422986][ T2362] __dump_stack+0x1e/0x20 [ 101.427322][ T2362] dump_stack+0x15b/0x1b8 [ 101.431657][ T2362] ? thaw_kernel_threads+0x220/0x220 [ 101.437117][ T2362] ? show_regs_print_info+0x18/0x18 [ 101.442410][ T2362] should_fail+0x69e/0x7e0 [ 101.446825][ T2362] ? setup_fault_attr+0x230/0x230 [ 101.451862][ T2362] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 101.457410][ T2362] should_fail_alloc_page+0x4f/0x60 [ 101.462621][ T2362] __alloc_pages_nodemask+0xf5/0x4b0 [ 101.467901][ T2362] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 101.473444][ T2362] ? __vmalloc_node_range+0x2af/0x6e0 [ 101.478805][ T2362] ? kasan_kmalloc+0xd/0x20 [ 101.483304][ T2362] ? __kmalloc+0x12a/0x2f0 [ 101.487887][ T2362] ? __vmalloc_node_range+0x2af/0x6e0 [ 101.493249][ T2362] __vmalloc_node_range+0x36a/0x6e0 [ 101.498458][ T2362] ? reuseport_array_alloc+0x146/0x230 [ 101.504086][ T2362] __vmalloc_node_flags_caller+0x7d/0x90 [ 101.509724][ T2362] ? reuseport_array_alloc+0x146/0x230 [ 101.515190][ T2362] bpf_map_area_alloc+0x83/0x90 [ 101.520053][ T2362] reuseport_array_alloc+0x146/0x230 [ 101.525346][ T2362] ? reuseport_array_alloc_check+0x90/0x90 [ 101.531244][ T2362] ? array_map_alloc_check+0x1da/0x2d0 [ 101.536702][ T2362] map_create+0x2d8/0x980 [ 101.541024][ T2362] ? security_bpf+0x82/0xa0 [ 101.545545][ T2362] __se_sys_bpf+0x2dc/0x570 [ 101.550046][ T2362] ? __x64_sys_bpf+0x90/0x90 [ 101.554628][ T2362] ? check_preemption_disabled+0x118/0x300 [ 101.560456][ T2362] ? __ia32_sys_read+0x90/0x90 [ 101.565324][ T2362] ? debug_smp_processor_id+0x1c/0x20 [ 101.570949][ T2362] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 101.577272][ T2362] __x64_sys_bpf+0x7b/0x90 [ 101.581682][ T2362] do_syscall_64+0xcf/0x170 [ 101.586391][ T2362] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 101.592299][ T2362] RIP: 0033:0x7f5d4a16e969 [ 101.596717][ T2362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.616499][ T2362] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.624910][ T2362] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 101.632882][ T2362] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 101.640848][ T2362] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 101.649086][ T2362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 101.657716][ T2362] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 102.280123][ T2388] device syzkaller0 entered promiscuous mode [ 102.311636][ T23] audit: type=1400 audit(1747833747.210:154): avc: denied { relabelfrom } for pid=2387 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 102.332811][ T23] audit: type=1400 audit(1747833747.230:155): avc: denied { relabelto } for pid=2387 comm="syz.3.703" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 102.543553][ T2405] FAULT_INJECTION: forcing a failure. [ 102.543553][ T2405] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.557283][ T2405] CPU: 1 PID: 2405 Comm: syz.2.710 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 102.568467][ T2405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 102.578612][ T2405] Call Trace: [ 102.581899][ T2405] __dump_stack+0x1e/0x20 [ 102.586323][ T2405] dump_stack+0x15b/0x1b8 [ 102.590731][ T2405] ? thaw_kernel_threads+0x220/0x220 [ 102.596008][ T2405] ? show_regs_print_info+0x18/0x18 [ 102.601211][ T2405] should_fail+0x69e/0x7e0 [ 102.605621][ T2405] ? setup_fault_attr+0x230/0x230 [ 102.610811][ T2405] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 102.616377][ T2405] should_fail_alloc_page+0x4f/0x60 [ 102.621659][ T2405] __alloc_pages_nodemask+0xf5/0x4b0 [ 102.626952][ T2405] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 102.632690][ T2405] ? __vmalloc_node_range+0x2af/0x6e0 [ 102.638075][ T2405] ? kasan_kmalloc+0xd/0x20 [ 102.642713][ T2405] ? __kmalloc+0x12a/0x2f0 [ 102.647134][ T2405] ? __vmalloc_node_range+0x2af/0x6e0 [ 102.652682][ T2405] __vmalloc_node_range+0x36a/0x6e0 [ 102.657892][ T2405] ? reuseport_array_alloc+0x146/0x230 [ 102.663353][ T2405] __vmalloc_node_flags_caller+0x7d/0x90 [ 102.668977][ T2405] ? reuseport_array_alloc+0x146/0x230 [ 102.674516][ T2405] bpf_map_area_alloc+0x83/0x90 [ 102.679365][ T2405] reuseport_array_alloc+0x146/0x230 [ 102.684727][ T2405] ? reuseport_array_alloc_check+0x90/0x90 [ 102.690728][ T2405] ? array_map_alloc_check+0x1da/0x2d0 [ 102.696343][ T2405] map_create+0x2d8/0x980 [ 102.700677][ T2405] ? security_bpf+0x82/0xa0 [ 102.705294][ T2405] __se_sys_bpf+0x2dc/0x570 [ 102.709901][ T2405] ? __x64_sys_bpf+0x90/0x90 [ 102.714516][ T2405] ? check_preemption_disabled+0x118/0x300 [ 102.720334][ T2405] ? __ia32_sys_read+0x90/0x90 [ 102.725194][ T2405] ? debug_smp_processor_id+0x1c/0x20 [ 102.730560][ T2405] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 102.736815][ T2405] __x64_sys_bpf+0x7b/0x90 [ 102.741232][ T2405] do_syscall_64+0xcf/0x170 [ 102.745734][ T2405] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 102.751622][ T2405] RIP: 0033:0x7fc6bd11a969 [ 102.756026][ T2405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.775617][ T2405] RSP: 002b:00007fc6bb783038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 102.784013][ T2405] RAX: ffffffffffffffda RBX: 00007fc6bd341fa0 RCX: 00007fc6bd11a969 [ 102.791973][ T2405] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 102.800072][ T2405] RBP: 00007fc6bb783090 R08: 0000000000000000 R09: 0000000000000000 [ 102.808039][ T2405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 102.816004][ T2405] R13: 0000000000000000 R14: 00007fc6bd341fa0 R15: 00007ffcb5e84198 [ 103.173350][ T2441] FAULT_INJECTION: forcing a failure. [ 103.173350][ T2441] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 103.238678][ T2441] CPU: 1 PID: 2441 Comm: syz.0.724 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 103.249880][ T2441] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 103.260020][ T2441] Call Trace: [ 103.263315][ T2441] __dump_stack+0x1e/0x20 [ 103.267636][ T2441] dump_stack+0x15b/0x1b8 [ 103.271959][ T2441] ? thaw_kernel_threads+0x220/0x220 [ 103.277236][ T2441] ? show_regs_print_info+0x18/0x18 [ 103.282430][ T2441] should_fail+0x69e/0x7e0 [ 103.286841][ T2441] ? setup_fault_attr+0x230/0x230 [ 103.291859][ T2441] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 103.297397][ T2441] should_fail_alloc_page+0x4f/0x60 [ 103.302592][ T2441] __alloc_pages_nodemask+0xf5/0x4b0 [ 103.307870][ T2441] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 103.313491][ T2441] ? __vmalloc_node_range+0x2af/0x6e0 [ 103.318848][ T2441] ? kasan_kmalloc+0xd/0x20 [ 103.323427][ T2441] ? __kmalloc+0x12a/0x2f0 [ 103.327839][ T2441] ? __vmalloc_node_range+0x2af/0x6e0 [ 103.333207][ T2441] __vmalloc_node_range+0x36a/0x6e0 [ 103.338420][ T2441] ? reuseport_array_alloc+0x146/0x230 [ 103.344059][ T2441] __vmalloc_node_flags_caller+0x7d/0x90 [ 103.349700][ T2441] ? reuseport_array_alloc+0x146/0x230 [ 103.355595][ T2441] bpf_map_area_alloc+0x83/0x90 [ 103.360452][ T2441] reuseport_array_alloc+0x146/0x230 [ 103.365733][ T2441] ? reuseport_array_alloc_check+0x90/0x90 [ 103.371551][ T2441] ? array_map_alloc_check+0x1da/0x2d0 [ 103.377006][ T2441] map_create+0x2d8/0x980 [ 103.381504][ T2441] ? security_bpf+0x82/0xa0 [ 103.386115][ T2441] __se_sys_bpf+0x2dc/0x570 [ 103.390616][ T2441] ? __x64_sys_bpf+0x90/0x90 [ 103.395330][ T2441] ? check_preemption_disabled+0x118/0x300 [ 103.401341][ T2441] ? __ia32_sys_read+0x90/0x90 [ 103.406228][ T2441] ? debug_smp_processor_id+0x1c/0x20 [ 103.411793][ T2441] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 103.417849][ T2441] __x64_sys_bpf+0x7b/0x90 [ 103.422258][ T2441] do_syscall_64+0xcf/0x170 [ 103.426756][ T2441] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 103.432735][ T2441] RIP: 0033:0x7f5d4a16e969 [ 103.437229][ T2441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 103.457007][ T2441] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 103.465512][ T2441] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 103.473485][ T2441] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 103.481545][ T2441] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 103.489519][ T2441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 103.497488][ T2441] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 104.543119][ T2475] device syzkaller0 entered promiscuous mode [ 104.560660][ T2475] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 104.838412][ T2496] FAULT_INJECTION: forcing a failure. [ 104.838412][ T2496] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 104.879103][ T2496] CPU: 1 PID: 2496 Comm: syz.3.741 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 104.890918][ T2496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 104.901149][ T2496] Call Trace: [ 104.904617][ T2496] __dump_stack+0x1e/0x20 [ 104.909219][ T2496] dump_stack+0x15b/0x1b8 [ 104.913556][ T2496] ? thaw_kernel_threads+0x220/0x220 [ 104.918845][ T2496] ? show_regs_print_info+0x18/0x18 [ 104.924063][ T2496] should_fail+0x69e/0x7e0 [ 104.928497][ T2496] ? setup_fault_attr+0x230/0x230 [ 104.933540][ T2496] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 104.939086][ T2496] should_fail_alloc_page+0x4f/0x60 [ 104.944311][ T2496] __alloc_pages_nodemask+0xf5/0x4b0 [ 104.949601][ T2496] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 104.955150][ T2496] ? __vmalloc_node_range+0x2af/0x6e0 [ 104.960543][ T2496] ? kasan_kmalloc+0xd/0x20 [ 104.965051][ T2496] ? __kmalloc+0x12a/0x2f0 [ 104.969470][ T2496] ? __vmalloc_node_range+0x2af/0x6e0 [ 104.974864][ T2496] __vmalloc_node_range+0x36a/0x6e0 [ 104.980071][ T2496] ? reuseport_array_alloc+0x146/0x230 [ 104.985795][ T2496] __vmalloc_node_flags_caller+0x7d/0x90 [ 104.991436][ T2496] ? reuseport_array_alloc+0x146/0x230 [ 104.996991][ T2496] bpf_map_area_alloc+0x83/0x90 [ 105.001851][ T2496] reuseport_array_alloc+0x146/0x230 [ 105.007151][ T2496] ? reuseport_array_alloc_check+0x90/0x90 [ 105.012997][ T2496] ? array_map_alloc_check+0x1da/0x2d0 [ 105.018464][ T2496] map_create+0x2d8/0x980 [ 105.022985][ T2496] ? security_bpf+0x82/0xa0 [ 105.027497][ T2496] __se_sys_bpf+0x2dc/0x570 [ 105.032029][ T2496] ? __x64_sys_bpf+0x90/0x90 [ 105.036618][ T2496] ? check_preemption_disabled+0x118/0x300 [ 105.042433][ T2496] ? __ia32_sys_read+0x90/0x90 [ 105.047200][ T2496] ? debug_smp_processor_id+0x1c/0x20 [ 105.052672][ T2496] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 105.058918][ T2496] __x64_sys_bpf+0x7b/0x90 [ 105.063336][ T2496] do_syscall_64+0xcf/0x170 [ 105.067843][ T2496] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 105.073851][ T2496] RIP: 0033:0x7f9733f2a969 [ 105.078282][ T2496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 105.097889][ T2496] RSP: 002b:00007f9732593038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 105.106309][ T2496] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 105.114430][ T2496] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 105.122410][ T2496] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 105.130557][ T2496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 105.138606][ T2496] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 105.690608][ T2518] device wg2 entered promiscuous mode [ 105.865265][ T23] audit: type=1400 audit(1747833750.760:156): avc: denied { create } for pid=2525 comm="syz.2.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 106.448994][ T23] audit: type=1400 audit(1747833751.320:157): avc: denied { create } for pid=2527 comm="syz.4.753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 107.125082][ T2580] device syzkaller0 entered promiscuous mode [ 107.566515][ T23] audit: type=1400 audit(1747833752.450:158): avc: denied { create } for pid=2597 comm="syz.0.777" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 108.157849][ T23] audit: type=1400 audit(1747833753.050:159): avc: denied { ioctl } for pid=2627 comm="syz.2.788" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 108.511360][ T2651] FAULT_INJECTION: forcing a failure. [ 108.511360][ T2651] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 108.591144][ T2651] CPU: 1 PID: 2651 Comm: syz.2.796 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 108.602275][ T2651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 108.612324][ T2651] Call Trace: [ 108.615612][ T2651] __dump_stack+0x1e/0x20 [ 108.620019][ T2651] dump_stack+0x15b/0x1b8 [ 108.624604][ T2651] ? thaw_kernel_threads+0x220/0x220 [ 108.629885][ T2651] ? show_regs_print_info+0x18/0x18 [ 108.635085][ T2651] should_fail+0x69e/0x7e0 [ 108.639500][ T2651] ? setup_fault_attr+0x230/0x230 [ 108.644519][ T2651] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 108.650262][ T2651] should_fail_alloc_page+0x4f/0x60 [ 108.655470][ T2651] __alloc_pages_nodemask+0xf5/0x4b0 [ 108.660764][ T2651] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 108.666305][ T2651] ? __vmalloc_node_range+0x2af/0x6e0 [ 108.671668][ T2651] ? kasan_kmalloc+0xd/0x20 [ 108.676174][ T2651] ? __kmalloc+0x12a/0x2f0 [ 108.680677][ T2651] ? __vmalloc_node_range+0x2af/0x6e0 [ 108.686048][ T2651] __vmalloc_node_range+0x36a/0x6e0 [ 108.691293][ T2651] ? reuseport_array_alloc+0x146/0x230 [ 108.696755][ T2651] __vmalloc_node_flags_caller+0x7d/0x90 [ 108.702402][ T2651] ? reuseport_array_alloc+0x146/0x230 [ 108.707856][ T2651] bpf_map_area_alloc+0x83/0x90 [ 108.712785][ T2651] reuseport_array_alloc+0x146/0x230 [ 108.718063][ T2651] ? reuseport_array_alloc_check+0x90/0x90 [ 108.723860][ T2651] ? array_map_alloc_check+0x1da/0x2d0 [ 108.729320][ T2651] map_create+0x2d8/0x980 [ 108.733648][ T2651] ? security_bpf+0x82/0xa0 [ 108.738167][ T2651] __se_sys_bpf+0x2dc/0x570 [ 108.742661][ T2651] ? __x64_sys_bpf+0x90/0x90 [ 108.747252][ T2651] ? check_preemption_disabled+0x118/0x300 [ 108.753203][ T2651] ? __ia32_sys_read+0x90/0x90 [ 108.758090][ T2651] ? debug_smp_processor_id+0x1c/0x20 [ 108.763478][ T2651] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 108.769541][ T2651] __x64_sys_bpf+0x7b/0x90 [ 108.773951][ T2651] do_syscall_64+0xcf/0x170 [ 108.778448][ T2651] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 108.784431][ T2651] RIP: 0033:0x7fc6bd11a969 [ 108.788930][ T2651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 108.808542][ T2651] RSP: 002b:00007fc6bb783038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 108.816947][ T2651] RAX: ffffffffffffffda RBX: 00007fc6bd341fa0 RCX: 00007fc6bd11a969 [ 108.824928][ T2651] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 108.832922][ T2651] RBP: 00007fc6bb783090 R08: 0000000000000000 R09: 0000000000000000 [ 108.840884][ T2651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 108.848863][ T2651] R13: 0000000000000000 R14: 00007fc6bd341fa0 R15: 00007ffcb5e84198 [ 110.156195][ T2701] FAULT_INJECTION: forcing a failure. [ 110.156195][ T2701] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 110.300525][ T2701] CPU: 0 PID: 2701 Comm: syz.0.814 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 110.311732][ T2701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 110.321788][ T2701] Call Trace: [ 110.325079][ T2701] __dump_stack+0x1e/0x20 [ 110.329448][ T2701] dump_stack+0x15b/0x1b8 [ 110.333772][ T2701] ? thaw_kernel_threads+0x220/0x220 [ 110.339053][ T2701] ? show_regs_print_info+0x18/0x18 [ 110.344536][ T2701] should_fail+0x69e/0x7e0 [ 110.348959][ T2701] ? setup_fault_attr+0x230/0x230 [ 110.353983][ T2701] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 110.359527][ T2701] should_fail_alloc_page+0x4f/0x60 [ 110.364726][ T2701] __alloc_pages_nodemask+0xf5/0x4b0 [ 110.370115][ T2701] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 110.375660][ T2701] ? __vmalloc_node_range+0x2af/0x6e0 [ 110.381028][ T2701] ? kasan_kmalloc+0xd/0x20 [ 110.385531][ T2701] ? __kmalloc+0x12a/0x2f0 [ 110.390188][ T2701] ? __vmalloc_node_range+0x2af/0x6e0 [ 110.395557][ T2701] __vmalloc_node_range+0x36a/0x6e0 [ 110.400756][ T2701] ? reuseport_array_alloc+0x146/0x230 [ 110.406214][ T2701] __vmalloc_node_flags_caller+0x7d/0x90 [ 110.411843][ T2701] ? reuseport_array_alloc+0x146/0x230 [ 110.417745][ T2701] bpf_map_area_alloc+0x83/0x90 [ 110.422594][ T2701] reuseport_array_alloc+0x146/0x230 [ 110.427875][ T2701] ? reuseport_array_alloc_check+0x90/0x90 [ 110.433679][ T2701] ? array_map_alloc_check+0x1da/0x2d0 [ 110.439143][ T2701] map_create+0x2d8/0x980 [ 110.443553][ T2701] ? security_bpf+0x82/0xa0 [ 110.448052][ T2701] __se_sys_bpf+0x2dc/0x570 [ 110.452547][ T2701] ? __x64_sys_bpf+0x90/0x90 [ 110.457127][ T2701] ? check_preemption_disabled+0x118/0x300 [ 110.462928][ T2701] ? __ia32_sys_read+0x90/0x90 [ 110.467688][ T2701] ? debug_smp_processor_id+0x1c/0x20 [ 110.473054][ T2701] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 110.479117][ T2701] __x64_sys_bpf+0x7b/0x90 [ 110.483626][ T2701] do_syscall_64+0xcf/0x170 [ 110.488124][ T2701] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 110.494009][ T2701] RIP: 0033:0x7f5d4a16e969 [ 110.498507][ T2701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.518370][ T2701] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 110.526955][ T2701] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 110.534927][ T2701] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 110.543079][ T2701] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 110.551054][ T2701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 110.559035][ T2701] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 111.129397][ T23] audit: type=1400 audit(1747833756.030:160): avc: denied { create } for pid=2744 comm="syz.3.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 111.156956][ T23] audit: type=1400 audit(1747833756.050:161): avc: denied { create } for pid=2741 comm="syz.1.829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 111.177402][ T23] audit: type=1400 audit(1747833756.050:162): avc: denied { create } for pid=2744 comm="syz.3.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 111.226392][ T2751] FAULT_INJECTION: forcing a failure. [ 111.226392][ T2751] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 111.256289][ T2751] CPU: 0 PID: 2751 Comm: syz.0.831 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 111.267836][ T2751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 111.277879][ T2751] Call Trace: [ 111.281160][ T2751] __dump_stack+0x1e/0x20 [ 111.285500][ T2751] dump_stack+0x15b/0x1b8 [ 111.289818][ T2751] ? thaw_kernel_threads+0x220/0x220 [ 111.295091][ T2751] ? show_regs_print_info+0x18/0x18 [ 111.300299][ T2751] should_fail+0x69e/0x7e0 [ 111.304705][ T2751] ? setup_fault_attr+0x230/0x230 [ 111.309893][ T2751] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 111.315431][ T2751] should_fail_alloc_page+0x4f/0x60 [ 111.320617][ T2751] __alloc_pages_nodemask+0xf5/0x4b0 [ 111.325895][ T2751] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 111.331430][ T2751] ? __vmalloc_node_range+0x2af/0x6e0 [ 111.336893][ T2751] ? kasan_kmalloc+0xd/0x20 [ 111.341385][ T2751] ? __kmalloc+0x12a/0x2f0 [ 111.345797][ T2751] ? __vmalloc_node_range+0x2af/0x6e0 [ 111.351172][ T2751] __vmalloc_node_range+0x36a/0x6e0 [ 111.356368][ T2751] ? reuseport_array_alloc+0x146/0x230 [ 111.361836][ T2751] __vmalloc_node_flags_caller+0x7d/0x90 [ 111.367637][ T2751] ? reuseport_array_alloc+0x146/0x230 [ 111.373104][ T2751] bpf_map_area_alloc+0x83/0x90 [ 111.378047][ T2751] reuseport_array_alloc+0x146/0x230 [ 111.383334][ T2751] ? reuseport_array_alloc_check+0x90/0x90 [ 111.389328][ T2751] ? array_map_alloc_check+0x1da/0x2d0 [ 111.394779][ T2751] map_create+0x2d8/0x980 [ 111.399134][ T2751] ? security_bpf+0x82/0xa0 [ 111.403819][ T2751] __se_sys_bpf+0x2dc/0x570 [ 111.408319][ T2751] ? __x64_sys_bpf+0x90/0x90 [ 111.412903][ T2751] ? check_preemption_disabled+0x118/0x300 [ 111.419049][ T2751] ? __ia32_sys_read+0x90/0x90 [ 111.423827][ T2751] ? debug_smp_processor_id+0x1c/0x20 [ 111.429188][ T2751] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 111.435333][ T2751] __x64_sys_bpf+0x7b/0x90 [ 111.439741][ T2751] do_syscall_64+0xcf/0x170 [ 111.444238][ T2751] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 111.450119][ T2751] RIP: 0033:0x7f5d4a16e969 [ 111.454534][ T2751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 111.474388][ T2751] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 111.482795][ T2751] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 111.490846][ T2751] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 111.498879][ T2751] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 111.506842][ T2751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 111.514803][ T2751] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 114.963516][ T23] audit: type=1400 audit(1747833759.860:163): avc: denied { create } for pid=2864 comm="syz.1.873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 116.927376][ T2926] device syzkaller0 entered promiscuous mode [ 119.775516][ T2991] FAULT_INJECTION: forcing a failure. [ 119.775516][ T2991] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 119.903347][ T2991] CPU: 0 PID: 2991 Comm: syz.3.914 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 119.914646][ T2991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 119.924702][ T2991] Call Trace: [ 119.927997][ T2991] __dump_stack+0x1e/0x20 [ 119.932344][ T2991] dump_stack+0x15b/0x1b8 [ 119.936687][ T2991] ? thaw_kernel_threads+0x220/0x220 [ 119.942419][ T2991] ? show_regs_print_info+0x18/0x18 [ 119.947629][ T2991] should_fail+0x69e/0x7e0 [ 119.952052][ T2991] ? setup_fault_attr+0x230/0x230 [ 119.957086][ T2991] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 119.962733][ T2991] should_fail_alloc_page+0x4f/0x60 [ 119.967926][ T2991] __alloc_pages_nodemask+0xf5/0x4b0 [ 119.973205][ T2991] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 119.978748][ T2991] ? __vmalloc_node_range+0x2af/0x6e0 [ 119.984115][ T2991] ? kasan_kmalloc+0xd/0x20 [ 119.988612][ T2991] ? __kmalloc+0x12a/0x2f0 [ 119.993027][ T2991] ? __vmalloc_node_range+0x2af/0x6e0 [ 119.998534][ T2991] __vmalloc_node_range+0x36a/0x6e0 [ 120.003741][ T2991] ? reuseport_array_alloc+0x146/0x230 [ 120.009207][ T2991] __vmalloc_node_flags_caller+0x7d/0x90 [ 120.014841][ T2991] ? reuseport_array_alloc+0x146/0x230 [ 120.020297][ T2991] bpf_map_area_alloc+0x83/0x90 [ 120.025172][ T2991] reuseport_array_alloc+0x146/0x230 [ 120.030462][ T2991] ? reuseport_array_alloc_check+0x90/0x90 [ 120.036273][ T2991] ? array_map_alloc_check+0x1da/0x2d0 [ 120.041732][ T2991] map_create+0x2d8/0x980 [ 120.046069][ T2991] ? security_bpf+0x82/0xa0 [ 120.050575][ T2991] __se_sys_bpf+0x2dc/0x570 [ 120.055081][ T2991] ? __x64_sys_bpf+0x90/0x90 [ 120.059679][ T2991] ? check_preemption_disabled+0x118/0x300 [ 120.065490][ T2991] ? __ia32_sys_read+0x90/0x90 [ 120.070264][ T2991] ? debug_smp_processor_id+0x1c/0x20 [ 120.075823][ T2991] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 120.081984][ T2991] __x64_sys_bpf+0x7b/0x90 [ 120.086426][ T2991] do_syscall_64+0xcf/0x170 [ 120.091034][ T2991] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 120.096934][ T2991] RIP: 0033:0x7f9733f2a969 [ 120.101351][ T2991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 120.121132][ T2991] RSP: 002b:00007f9732593038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 120.129562][ T2991] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 120.137624][ T2991] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 120.145598][ T2991] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 120.153566][ T2991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 120.161534][ T2991] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 120.966257][ T3033] device sit0 entered promiscuous mode [ 121.749174][ T3071] FAULT_INJECTION: forcing a failure. [ 121.749174][ T3071] name failslab, interval 1, probability 0, space 0, times 0 [ 121.761915][ T3071] CPU: 0 PID: 3071 Comm: syz.3.940 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 121.773012][ T3071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 121.783063][ T3071] Call Trace: [ 121.786352][ T3071] __dump_stack+0x1e/0x20 [ 121.790676][ T3071] dump_stack+0x15b/0x1b8 [ 121.795000][ T3071] ? thaw_kernel_threads+0x220/0x220 [ 121.800282][ T3071] ? show_regs_print_info+0x18/0x18 [ 121.805485][ T3071] ? __kasan_check_write+0x14/0x20 [ 121.810684][ T3071] ? proc_fail_nth_write+0x17a/0x1f0 [ 121.815966][ T3071] should_fail+0x69e/0x7e0 [ 121.820376][ T3071] ? setup_fault_attr+0x230/0x230 [ 121.825389][ T3071] ? __fget+0x3be/0x440 [ 121.829528][ T3071] __should_failslab+0x10c/0x150 [ 121.834451][ T3071] ? map_update_elem+0x2b3/0xb00 [ 121.839457][ T3071] should_failslab+0x9/0x20 [ 121.843945][ T3071] __kmalloc_track_caller+0x52/0x2d0 [ 121.849232][ T3071] memdup_user+0x25/0xb0 [ 121.853462][ T3071] map_update_elem+0x2b3/0xb00 [ 121.858209][ T3071] ? security_bpf+0x82/0xa0 [ 121.862696][ T3071] __se_sys_bpf+0x39d/0x570 [ 121.867185][ T3071] ? __x64_sys_bpf+0x90/0x90 [ 121.871761][ T3071] ? check_preemption_disabled+0x118/0x300 [ 121.877552][ T3071] ? __ia32_sys_read+0x90/0x90 [ 121.882302][ T3071] ? task_work_run+0x15e/0x170 [ 121.887047][ T3071] ? debug_smp_processor_id+0x1c/0x20 [ 121.892400][ T3071] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 121.898450][ T3071] __x64_sys_bpf+0x7b/0x90 [ 121.902850][ T3071] do_syscall_64+0xcf/0x170 [ 121.907338][ T3071] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 121.913215][ T3071] RIP: 0033:0x7f9733f2a969 [ 121.917613][ T3071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.937199][ T3071] RSP: 002b:00007f9732593038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 121.945594][ T3071] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 121.953558][ T3071] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000002 [ 121.961509][ T3071] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 121.969463][ T3071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.977415][ T3071] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 122.361671][ T23] audit: type=1400 audit(1747833767.260:164): avc: denied { create } for pid=3076 comm="syz.1.942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 124.040749][ T23] audit: type=1400 audit(1747833768.940:165): avc: denied { create } for pid=3125 comm="syz.4.958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 125.981459][ T23] audit: type=1400 audit(1747833770.880:166): avc: denied { create } for pid=3185 comm="syz.0.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 126.205751][ T23] audit: type=1400 audit(1747833771.100:167): avc: denied { create } for pid=3203 comm="syz.4.984" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 131.529204][ T3376] device syzkaller0 entered promiscuous mode [ 131.903324][ T3391] device syzkaller0 entered promiscuous mode [ 135.362856][ T23] audit: type=1400 audit(1747833780.260:168): avc: denied { create } for pid=3500 comm="syz.3.1082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 135.690240][ T3557] device syzkaller0 entered promiscuous mode [ 135.890900][ T3563] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 136.174054][ T3574] device sit0 entered promiscuous mode [ 136.713418][ T3628] FAULT_INJECTION: forcing a failure. [ 136.713418][ T3628] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 136.756189][ T3628] CPU: 1 PID: 3628 Comm: syz.4.1130 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 136.767400][ T3628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 136.777452][ T3628] Call Trace: [ 136.780745][ T3628] __dump_stack+0x1e/0x20 [ 136.785085][ T3628] dump_stack+0x15b/0x1b8 [ 136.789423][ T3628] ? thaw_kernel_threads+0x220/0x220 [ 136.794715][ T3628] ? show_regs_print_info+0x18/0x18 [ 136.799940][ T3628] should_fail+0x69e/0x7e0 [ 136.804360][ T3628] ? setup_fault_attr+0x230/0x230 [ 136.809382][ T3628] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 136.814929][ T3628] should_fail_alloc_page+0x4f/0x60 [ 136.820150][ T3628] __alloc_pages_nodemask+0xf5/0x4b0 [ 136.825434][ T3628] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 136.830977][ T3628] ? __vmalloc_node_range+0x2af/0x6e0 [ 136.836341][ T3628] ? kasan_kmalloc+0xd/0x20 [ 136.840836][ T3628] ? __kmalloc+0x12a/0x2f0 [ 136.845244][ T3628] ? __vmalloc_node_range+0x2af/0x6e0 [ 136.850930][ T3628] __vmalloc_node_range+0x36a/0x6e0 [ 136.856138][ T3628] ? reuseport_array_alloc+0x146/0x230 [ 136.861596][ T3628] __vmalloc_node_flags_caller+0x7d/0x90 [ 136.867235][ T3628] ? reuseport_array_alloc+0x146/0x230 [ 136.872689][ T3628] bpf_map_area_alloc+0x83/0x90 [ 136.877536][ T3628] reuseport_array_alloc+0x146/0x230 [ 136.882812][ T3628] ? reuseport_array_alloc_check+0x90/0x90 [ 136.888610][ T3628] ? array_map_alloc_check+0x1da/0x2d0 [ 136.894066][ T3628] map_create+0x2d8/0x980 [ 136.898558][ T3628] ? security_bpf+0x82/0xa0 [ 136.903052][ T3628] __se_sys_bpf+0x2dc/0x570 [ 136.907550][ T3628] ? __x64_sys_bpf+0x90/0x90 [ 136.912157][ T3628] ? check_preemption_disabled+0x118/0x300 [ 136.917966][ T3628] ? __ia32_sys_read+0x90/0x90 [ 136.922727][ T3628] ? debug_smp_processor_id+0x1c/0x20 [ 136.928089][ T3628] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 136.934147][ T3628] __x64_sys_bpf+0x7b/0x90 [ 136.938556][ T3628] do_syscall_64+0xcf/0x170 [ 136.943055][ T3628] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 136.948959][ T3628] RIP: 0033:0x7f128101f969 [ 136.953381][ T3628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 136.972987][ T3628] RSP: 002b:00007f127f688038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 136.981389][ T3628] RAX: ffffffffffffffda RBX: 00007f1281246fa0 RCX: 00007f128101f969 [ 136.989354][ T3628] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 136.997406][ T3628] RBP: 00007f127f688090 R08: 0000000000000000 R09: 0000000000000000 [ 137.005368][ T3628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.013332][ T3628] R13: 0000000000000000 R14: 00007f1281246fa0 R15: 00007fff73aa9bb8 [ 137.373886][ T3669] FAULT_INJECTION: forcing a failure. [ 137.373886][ T3669] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 137.389087][ T3669] CPU: 1 PID: 3669 Comm: syz.0.1148 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 137.400278][ T3669] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 137.410320][ T3669] Call Trace: [ 137.413599][ T3669] __dump_stack+0x1e/0x20 [ 137.417910][ T3669] dump_stack+0x15b/0x1b8 [ 137.422228][ T3669] ? thaw_kernel_threads+0x220/0x220 [ 137.427497][ T3669] ? show_regs_print_info+0x18/0x18 [ 137.432679][ T3669] should_fail+0x69e/0x7e0 [ 137.437079][ T3669] ? setup_fault_attr+0x230/0x230 [ 137.442091][ T3669] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 137.447618][ T3669] should_fail_alloc_page+0x4f/0x60 [ 137.452801][ T3669] __alloc_pages_nodemask+0xf5/0x4b0 [ 137.458067][ T3669] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 137.463594][ T3669] ? __vmalloc_node_range+0x2af/0x6e0 [ 137.468949][ T3669] ? kasan_kmalloc+0xd/0x20 [ 137.473434][ T3669] ? __kmalloc+0x12a/0x2f0 [ 137.477922][ T3669] ? __vmalloc_node_range+0x2af/0x6e0 [ 137.483280][ T3669] __vmalloc_node_range+0x36a/0x6e0 [ 137.488468][ T3669] ? reuseport_array_alloc+0x146/0x230 [ 137.493908][ T3669] __vmalloc_node_flags_caller+0x7d/0x90 [ 137.499538][ T3669] ? reuseport_array_alloc+0x146/0x230 [ 137.504980][ T3669] bpf_map_area_alloc+0x83/0x90 [ 137.509813][ T3669] reuseport_array_alloc+0x146/0x230 [ 137.515082][ T3669] ? reuseport_array_alloc_check+0x90/0x90 [ 137.520868][ T3669] ? array_map_alloc_check+0x1da/0x2d0 [ 137.526308][ T3669] map_create+0x2d8/0x980 [ 137.530628][ T3669] ? security_bpf+0x82/0xa0 [ 137.535113][ T3669] __se_sys_bpf+0x2dc/0x570 [ 137.539595][ T3669] ? __x64_sys_bpf+0x90/0x90 [ 137.544251][ T3669] ? check_preemption_disabled+0x118/0x300 [ 137.550125][ T3669] ? __ia32_sys_read+0x90/0x90 [ 137.554991][ T3669] ? debug_smp_processor_id+0x1c/0x20 [ 137.560358][ T3669] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 137.566416][ T3669] __x64_sys_bpf+0x7b/0x90 [ 137.570824][ T3669] do_syscall_64+0xcf/0x170 [ 137.575400][ T3669] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 137.581280][ T3669] RIP: 0033:0x7f5d4a16e969 [ 137.585683][ T3669] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.605271][ T3669] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 137.613667][ T3669] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 137.621709][ T3669] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 137.629666][ T3669] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 137.637621][ T3669] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 137.646123][ T3669] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 138.341573][ T23] audit: type=1400 audit(1747833782.960:169): avc: denied { ioctl } for pid=3691 comm="syz.3.1157" path="socket:[31206]" dev="sockfs" ino=31206 ioctlcmd=0x8924 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 138.421286][ T3710] FAULT_INJECTION: forcing a failure. [ 138.421286][ T3710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 138.442209][ T3710] CPU: 1 PID: 3710 Comm: syz.0.1162 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 138.453499][ T3710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 138.463553][ T3710] Call Trace: [ 138.466844][ T3710] __dump_stack+0x1e/0x20 [ 138.471170][ T3710] dump_stack+0x15b/0x1b8 [ 138.475584][ T3710] ? thaw_kernel_threads+0x220/0x220 [ 138.480884][ T3710] ? show_regs_print_info+0x18/0x18 [ 138.486179][ T3710] should_fail+0x69e/0x7e0 [ 138.490635][ T3710] ? setup_fault_attr+0x230/0x230 [ 138.495749][ T3710] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 138.501291][ T3710] should_fail_alloc_page+0x4f/0x60 [ 138.506482][ T3710] __alloc_pages_nodemask+0xf5/0x4b0 [ 138.511887][ T3710] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 138.517445][ T3710] ? __vmalloc_node_range+0x2af/0x6e0 [ 138.522874][ T3710] ? kasan_kmalloc+0xd/0x20 [ 138.527378][ T3710] ? __kmalloc+0x12a/0x2f0 [ 138.531805][ T3710] ? __vmalloc_node_range+0x2af/0x6e0 [ 138.537179][ T3710] __vmalloc_node_range+0x36a/0x6e0 [ 138.542381][ T3710] ? reuseport_array_alloc+0x146/0x230 [ 138.547853][ T3710] __vmalloc_node_flags_caller+0x7d/0x90 [ 138.553481][ T3710] ? reuseport_array_alloc+0x146/0x230 [ 138.559193][ T3710] bpf_map_area_alloc+0x83/0x90 [ 138.564039][ T3710] reuseport_array_alloc+0x146/0x230 [ 138.569320][ T3710] ? reuseport_array_alloc_check+0x90/0x90 [ 138.575140][ T3710] ? array_map_alloc_check+0x1da/0x2d0 [ 138.580594][ T3710] map_create+0x2d8/0x980 [ 138.584951][ T3710] ? security_bpf+0x82/0xa0 [ 138.589464][ T3710] __se_sys_bpf+0x2dc/0x570 [ 138.593975][ T3710] ? __x64_sys_bpf+0x90/0x90 [ 138.598589][ T3710] ? check_preemption_disabled+0x118/0x300 [ 138.604489][ T3710] ? __ia32_sys_read+0x90/0x90 [ 138.609256][ T3710] ? debug_smp_processor_id+0x1c/0x20 [ 138.614639][ T3710] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 138.620708][ T3710] __x64_sys_bpf+0x7b/0x90 [ 138.625124][ T3710] do_syscall_64+0xcf/0x170 [ 138.629631][ T3710] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 138.635515][ T3710] RIP: 0033:0x7f5d4a16e969 [ 138.639932][ T3710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 138.659541][ T3710] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 138.668049][ T3710] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 138.676026][ T3710] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 138.684004][ T3710] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 138.691970][ T3710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 138.700033][ T3710] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 139.398444][ T3740] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 141.890161][ T3808] device syzkaller0 entered promiscuous mode [ 141.922459][ T23] audit: type=1400 audit(1747833786.820:170): avc: denied { create } for pid=3809 comm="syz.0.1193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 142.525750][ T3820] FAULT_INJECTION: forcing a failure. [ 142.525750][ T3820] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 142.738985][ T3820] CPU: 1 PID: 3820 Comm: syz.3.1196 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 142.750214][ T3820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 142.760265][ T3820] Call Trace: [ 142.763551][ T3820] __dump_stack+0x1e/0x20 [ 142.767892][ T3820] dump_stack+0x15b/0x1b8 [ 142.772221][ T3820] ? thaw_kernel_threads+0x220/0x220 [ 142.777502][ T3820] ? show_regs_print_info+0x18/0x18 [ 142.782695][ T3820] should_fail+0x69e/0x7e0 [ 142.787117][ T3820] ? setup_fault_attr+0x230/0x230 [ 142.792136][ T3820] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 142.797694][ T3820] should_fail_alloc_page+0x4f/0x60 [ 142.803050][ T3820] __alloc_pages_nodemask+0xf5/0x4b0 [ 142.808341][ T3820] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 142.813888][ T3820] ? __vmalloc_node_range+0x2af/0x6e0 [ 142.819254][ T3820] ? kasan_kmalloc+0xd/0x20 [ 142.823756][ T3820] ? __kmalloc+0x12a/0x2f0 [ 142.828166][ T3820] ? __vmalloc_node_range+0x2af/0x6e0 [ 142.833539][ T3820] __vmalloc_node_range+0x36a/0x6e0 [ 142.838769][ T3820] ? reuseport_array_alloc+0x146/0x230 [ 142.844226][ T3820] __vmalloc_node_flags_caller+0x7d/0x90 [ 142.849867][ T3820] ? reuseport_array_alloc+0x146/0x230 [ 142.855335][ T3820] bpf_map_area_alloc+0x83/0x90 [ 142.860188][ T3820] reuseport_array_alloc+0x146/0x230 [ 142.865474][ T3820] ? reuseport_array_alloc_check+0x90/0x90 [ 142.871287][ T3820] ? array_map_alloc_check+0x1da/0x2d0 [ 142.876834][ T3820] map_create+0x2d8/0x980 [ 142.881165][ T3820] ? security_bpf+0x82/0xa0 [ 142.885671][ T3820] __se_sys_bpf+0x2dc/0x570 [ 142.890171][ T3820] ? __x64_sys_bpf+0x90/0x90 [ 142.895030][ T3820] ? check_preemption_disabled+0x118/0x300 [ 142.900838][ T3820] ? __ia32_sys_read+0x90/0x90 [ 142.905712][ T3820] ? debug_smp_processor_id+0x1c/0x20 [ 142.911073][ T3820] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 142.917121][ T3820] __x64_sys_bpf+0x7b/0x90 [ 142.921525][ T3820] do_syscall_64+0xcf/0x170 [ 142.926010][ T3820] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 142.931981][ T3820] RIP: 0033:0x7f9733f2a969 [ 142.936467][ T3820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.956081][ T3820] RSP: 002b:00007f9732593038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 142.964478][ T3820] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 142.972434][ T3820] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 142.980391][ T3820] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 142.988343][ T3820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 142.996297][ T3820] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 143.618698][ T3823] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.626959][ T3823] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.135826][ T3836] device syzkaller0 entered promiscuous mode [ 144.307839][ T3866] FAULT_INJECTION: forcing a failure. [ 144.307839][ T3866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 144.359160][ T3866] CPU: 1 PID: 3866 Comm: syz.0.1207 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 144.370369][ T3866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 144.380414][ T3866] Call Trace: [ 144.383694][ T3866] __dump_stack+0x1e/0x20 [ 144.388011][ T3866] dump_stack+0x15b/0x1b8 [ 144.392328][ T3866] ? thaw_kernel_threads+0x220/0x220 [ 144.397601][ T3866] ? show_regs_print_info+0x18/0x18 [ 144.403049][ T3866] should_fail+0x69e/0x7e0 [ 144.407456][ T3866] ? setup_fault_attr+0x230/0x230 [ 144.412475][ T3866] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 144.418009][ T3866] should_fail_alloc_page+0x4f/0x60 [ 144.423314][ T3866] __alloc_pages_nodemask+0xf5/0x4b0 [ 144.428770][ T3866] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 144.434320][ T3866] ? __vmalloc_node_range+0x2af/0x6e0 [ 144.439731][ T3866] ? kasan_kmalloc+0xd/0x20 [ 144.444225][ T3866] ? __kmalloc+0x12a/0x2f0 [ 144.448639][ T3866] ? __vmalloc_node_range+0x2af/0x6e0 [ 144.454094][ T3866] __vmalloc_node_range+0x36a/0x6e0 [ 144.459394][ T3866] ? reuseport_array_alloc+0x146/0x230 [ 144.464852][ T3866] __vmalloc_node_flags_caller+0x7d/0x90 [ 144.470490][ T3866] ? reuseport_array_alloc+0x146/0x230 [ 144.476035][ T3866] bpf_map_area_alloc+0x83/0x90 [ 144.480892][ T3866] reuseport_array_alloc+0x146/0x230 [ 144.486172][ T3866] ? reuseport_array_alloc_check+0x90/0x90 [ 144.491981][ T3866] ? array_map_alloc_check+0x1da/0x2d0 [ 144.497440][ T3866] map_create+0x2d8/0x980 [ 144.501762][ T3866] ? security_bpf+0x82/0xa0 [ 144.506255][ T3866] __se_sys_bpf+0x2dc/0x570 [ 144.510832][ T3866] ? __x64_sys_bpf+0x90/0x90 [ 144.515404][ T3866] ? check_preemption_disabled+0x118/0x300 [ 144.521378][ T3866] ? __ia32_sys_read+0x90/0x90 [ 144.526142][ T3866] ? debug_smp_processor_id+0x1c/0x20 [ 144.531533][ T3866] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 144.537650][ T3866] __x64_sys_bpf+0x7b/0x90 [ 144.542062][ T3866] do_syscall_64+0xcf/0x170 [ 144.546561][ T3866] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 144.552452][ T3866] RIP: 0033:0x7f5d4a16e969 [ 144.556858][ T3866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 144.576449][ T3866] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 144.584847][ T3866] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 144.592804][ T3866] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 144.600768][ T3866] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 144.608743][ T3866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 144.616708][ T3866] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 145.433150][ T23] audit: type=1400 audit(1747833790.330:171): avc: denied { append } for pid=3932 comm="syz.3.1229" name="ppp" dev="devtmpfs" ino=10738 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 146.236485][ T23] audit: type=1400 audit(1747833791.130:172): avc: denied { create } for pid=4009 comm="syz.3.1256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 148.769489][ T4072] device lo left promiscuous mode [ 148.809930][ T4076] device lo entered promiscuous mode [ 149.995058][ T4123] bridge0: port 3(veth0) entered blocking state [ 150.009522][ T4123] bridge0: port 3(veth0) entered disabled state [ 150.098313][ T4123] device veth0 entered promiscuous mode [ 150.104747][ T4123] bridge0: port 3(veth0) entered blocking state [ 150.111206][ T4123] bridge0: port 3(veth0) entered forwarding state [ 152.604255][ T4206] @: renamed from bond_slave_0 [ 160.401603][ T4389] device syzkaller0 entered promiscuous mode [ 161.037440][ T4420] FAULT_INJECTION: forcing a failure. [ 161.037440][ T4420] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 161.050859][ T4420] CPU: 0 PID: 4420 Comm: syz.3.1380 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 161.062038][ T4420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 161.072259][ T4420] Call Trace: [ 161.075550][ T4420] __dump_stack+0x1e/0x20 [ 161.079869][ T4420] dump_stack+0x15b/0x1b8 [ 161.084199][ T4420] ? thaw_kernel_threads+0x220/0x220 [ 161.089475][ T4420] ? show_regs_print_info+0x18/0x18 [ 161.094666][ T4420] should_fail+0x69e/0x7e0 [ 161.099081][ T4420] ? setup_fault_attr+0x230/0x230 [ 161.104212][ T4420] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 161.109852][ T4420] should_fail_alloc_page+0x4f/0x60 [ 161.115038][ T4420] __alloc_pages_nodemask+0xf5/0x4b0 [ 161.120327][ T4420] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 161.125901][ T4420] ? __vmalloc_node_range+0x2af/0x6e0 [ 161.131361][ T4420] ? kasan_kmalloc+0xd/0x20 [ 161.135860][ T4420] ? __kmalloc+0x12a/0x2f0 [ 161.140351][ T4420] ? __vmalloc_node_range+0x2af/0x6e0 [ 161.145714][ T4420] __vmalloc_node_range+0x36a/0x6e0 [ 161.150905][ T4420] ? reuseport_array_alloc+0x146/0x230 [ 161.156369][ T4420] __vmalloc_node_flags_caller+0x7d/0x90 [ 161.162084][ T4420] ? reuseport_array_alloc+0x146/0x230 [ 161.167542][ T4420] bpf_map_area_alloc+0x83/0x90 [ 161.172566][ T4420] reuseport_array_alloc+0x146/0x230 [ 161.177928][ T4420] ? reuseport_array_alloc_check+0x90/0x90 [ 161.183727][ T4420] ? array_map_alloc_check+0x1da/0x2d0 [ 161.189264][ T4420] map_create+0x2d8/0x980 [ 161.193586][ T4420] ? security_bpf+0x82/0xa0 [ 161.198091][ T4420] __se_sys_bpf+0x2dc/0x570 [ 161.202704][ T4420] ? __x64_sys_bpf+0x90/0x90 [ 161.207283][ T4420] ? check_preemption_disabled+0x118/0x300 [ 161.213084][ T4420] ? __ia32_sys_read+0x90/0x90 [ 161.217845][ T4420] ? debug_smp_processor_id+0x1c/0x20 [ 161.223207][ T4420] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 161.229264][ T4420] __x64_sys_bpf+0x7b/0x90 [ 161.233939][ T4420] do_syscall_64+0xcf/0x170 [ 161.238434][ T4420] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 161.244316][ T4420] RIP: 0033:0x7f9733f2a969 [ 161.248727][ T4420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.268504][ T4420] RSP: 002b:00007f9732593038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.277000][ T4420] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 161.285081][ T4420] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 161.293044][ T4420] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 161.301115][ T4420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.309077][ T4420] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 162.173729][ T4464] FAULT_INJECTION: forcing a failure. [ 162.173729][ T4464] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.233615][ T4464] CPU: 1 PID: 4464 Comm: syz.0.1395 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 162.244857][ T4464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 162.254999][ T4464] Call Trace: [ 162.258293][ T4464] __dump_stack+0x1e/0x20 [ 162.262613][ T4464] dump_stack+0x15b/0x1b8 [ 162.266932][ T4464] ? thaw_kernel_threads+0x220/0x220 [ 162.272237][ T4464] ? show_regs_print_info+0x18/0x18 [ 162.277437][ T4464] should_fail+0x69e/0x7e0 [ 162.281848][ T4464] ? setup_fault_attr+0x230/0x230 [ 162.286865][ T4464] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 162.292406][ T4464] should_fail_alloc_page+0x4f/0x60 [ 162.297597][ T4464] __alloc_pages_nodemask+0xf5/0x4b0 [ 162.302873][ T4464] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 162.308407][ T4464] ? __vmalloc_node_range+0x2af/0x6e0 [ 162.313767][ T4464] ? kasan_kmalloc+0xd/0x20 [ 162.318282][ T4464] ? __kmalloc+0x12a/0x2f0 [ 162.322697][ T4464] ? __vmalloc_node_range+0x2af/0x6e0 [ 162.328072][ T4464] __vmalloc_node_range+0x36a/0x6e0 [ 162.333300][ T4464] ? reuseport_array_alloc+0x146/0x230 [ 162.338750][ T4464] __vmalloc_node_flags_caller+0x7d/0x90 [ 162.344368][ T4464] ? reuseport_array_alloc+0x146/0x230 [ 162.349811][ T4464] bpf_map_area_alloc+0x83/0x90 [ 162.354818][ T4464] reuseport_array_alloc+0x146/0x230 [ 162.360083][ T4464] ? reuseport_array_alloc_check+0x90/0x90 [ 162.365887][ T4464] ? array_map_alloc_check+0x1da/0x2d0 [ 162.371330][ T4464] map_create+0x2d8/0x980 [ 162.375640][ T4464] ? security_bpf+0x82/0xa0 [ 162.380298][ T4464] __se_sys_bpf+0x2dc/0x570 [ 162.384785][ T4464] ? __x64_sys_bpf+0x90/0x90 [ 162.389366][ T4464] ? check_preemption_disabled+0x118/0x300 [ 162.395156][ T4464] ? __ia32_sys_read+0x90/0x90 [ 162.399900][ T4464] ? debug_smp_processor_id+0x1c/0x20 [ 162.405256][ T4464] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 162.411407][ T4464] __x64_sys_bpf+0x7b/0x90 [ 162.415806][ T4464] do_syscall_64+0xcf/0x170 [ 162.420313][ T4464] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 162.426198][ T4464] RIP: 0033:0x7f5d4a16e969 [ 162.430718][ T4464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.450303][ T4464] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 162.458743][ T4464] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 162.466706][ T4464] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 162.474746][ T4464] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 162.482711][ T4464] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 162.490675][ T4464] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 169.509433][ T4580] device syzkaller0 entered promiscuous mode [ 170.234304][ T4606] : port 1(veth0_to_team) entered blocking state [ 170.253260][ T4606] : port 1(veth0_to_team) entered disabled state [ 170.274741][ T4606] device veth0_to_team entered promiscuous mode [ 170.713713][ T4649] syz.2.1457[4649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.713753][ T4649] syz.2.1457[4649] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.742265][ T4650] syz.2.1457[4650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.765963][ T4650] syz.2.1457[4650] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.125946][ T4717] device syzkaller0 entered promiscuous mode [ 174.100838][ T4766] : port 1(veth0_to_team) entered blocking state [ 174.107529][ T4766] : port 1(veth0_to_team) entered disabled state [ 174.263952][ T4766] device veth0_to_team entered promiscuous mode [ 174.411858][ T4786] FAULT_INJECTION: forcing a failure. [ 174.411858][ T4786] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 174.529810][ T4786] CPU: 0 PID: 4786 Comm: syz.3.1500 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 174.541191][ T4786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 174.551245][ T4786] Call Trace: [ 174.554564][ T4786] __dump_stack+0x1e/0x20 [ 174.559056][ T4786] dump_stack+0x15b/0x1b8 [ 174.563378][ T4786] ? thaw_kernel_threads+0x220/0x220 [ 174.568663][ T4786] ? show_regs_print_info+0x18/0x18 [ 174.573846][ T4786] should_fail+0x69e/0x7e0 [ 174.578263][ T4786] ? setup_fault_attr+0x230/0x230 [ 174.583275][ T4786] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 174.588913][ T4786] should_fail_alloc_page+0x4f/0x60 [ 174.594092][ T4786] __alloc_pages_nodemask+0xf5/0x4b0 [ 174.599367][ T4786] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 174.604894][ T4786] ? __vmalloc_node_range+0x2af/0x6e0 [ 174.610263][ T4786] ? kasan_kmalloc+0xd/0x20 [ 174.614769][ T4786] ? __kmalloc+0x12a/0x2f0 [ 174.619173][ T4786] ? __vmalloc_node_range+0x2af/0x6e0 [ 174.624535][ T4786] __vmalloc_node_range+0x36a/0x6e0 [ 174.629733][ T4786] ? reuseport_array_alloc+0x146/0x230 [ 174.635182][ T4786] __vmalloc_node_flags_caller+0x7d/0x90 [ 174.640798][ T4786] ? reuseport_array_alloc+0x146/0x230 [ 174.646244][ T4786] bpf_map_area_alloc+0x83/0x90 [ 174.651079][ T4786] reuseport_array_alloc+0x146/0x230 [ 174.656535][ T4786] ? reuseport_array_alloc_check+0x90/0x90 [ 174.662330][ T4786] ? array_map_alloc_check+0x1da/0x2d0 [ 174.667859][ T4786] map_create+0x2d8/0x980 [ 174.672183][ T4786] ? security_bpf+0x82/0xa0 [ 174.676757][ T4786] __se_sys_bpf+0x2dc/0x570 [ 174.681245][ T4786] ? __x64_sys_bpf+0x90/0x90 [ 174.685843][ T4786] ? check_preemption_disabled+0x118/0x300 [ 174.691633][ T4786] ? __ia32_sys_read+0x90/0x90 [ 174.696383][ T4786] ? debug_smp_processor_id+0x1c/0x20 [ 174.701742][ T4786] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 174.707789][ T4786] __x64_sys_bpf+0x7b/0x90 [ 174.712188][ T4786] do_syscall_64+0xcf/0x170 [ 174.716679][ T4786] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 174.722555][ T4786] RIP: 0033:0x7f9733f2a969 [ 174.726958][ T4786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 174.746546][ T4786] RSP: 002b:00007f9732593038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 174.754949][ T4786] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 174.762904][ T4786] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 174.770858][ T4786] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 174.778812][ T4786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 174.786767][ T4786] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 175.307516][ T4811] device syzkaller0 entered promiscuous mode [ 175.532311][ T4821] device wg2 entered promiscuous mode [ 175.945824][ T4827] FAULT_INJECTION: forcing a failure. [ 175.945824][ T4827] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 175.972627][ T4827] CPU: 0 PID: 4827 Comm: syz.1.1517 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 175.983854][ T4827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 175.993904][ T4827] Call Trace: [ 175.997191][ T4827] __dump_stack+0x1e/0x20 [ 176.001511][ T4827] dump_stack+0x15b/0x1b8 [ 176.005832][ T4827] ? thaw_kernel_threads+0x220/0x220 [ 176.011121][ T4827] ? show_regs_print_info+0x18/0x18 [ 176.016313][ T4827] should_fail+0x69e/0x7e0 [ 176.020726][ T4827] ? setup_fault_attr+0x230/0x230 [ 176.025744][ T4827] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 176.031282][ T4827] should_fail_alloc_page+0x4f/0x60 [ 176.036468][ T4827] __alloc_pages_nodemask+0xf5/0x4b0 [ 176.041752][ T4827] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 176.047288][ T4827] ? __vmalloc_node_range+0x2af/0x6e0 [ 176.052650][ T4827] ? kasan_kmalloc+0xd/0x20 [ 176.057148][ T4827] ? __kmalloc+0x12a/0x2f0 [ 176.061553][ T4827] ? __vmalloc_node_range+0x2af/0x6e0 [ 176.066914][ T4827] __vmalloc_node_range+0x36a/0x6e0 [ 176.072109][ T4827] ? reuseport_array_alloc+0x146/0x230 [ 176.077560][ T4827] __vmalloc_node_flags_caller+0x7d/0x90 [ 176.083281][ T4827] ? reuseport_array_alloc+0x146/0x230 [ 176.088729][ T4827] bpf_map_area_alloc+0x83/0x90 [ 176.093569][ T4827] reuseport_array_alloc+0x146/0x230 [ 176.098849][ T4827] ? reuseport_array_alloc_check+0x90/0x90 [ 176.104652][ T4827] ? array_map_alloc_check+0x1da/0x2d0 [ 176.110101][ T4827] map_create+0x2d8/0x980 [ 176.114450][ T4827] ? security_bpf+0x82/0xa0 [ 176.119121][ T4827] __se_sys_bpf+0x2dc/0x570 [ 176.123613][ T4827] ? __x64_sys_bpf+0x90/0x90 [ 176.128191][ T4827] ? check_preemption_disabled+0x118/0x300 [ 176.133990][ T4827] ? __ia32_sys_read+0x90/0x90 [ 176.138748][ T4827] ? debug_smp_processor_id+0x1c/0x20 [ 176.144129][ T4827] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 176.150186][ T4827] __x64_sys_bpf+0x7b/0x90 [ 176.154595][ T4827] do_syscall_64+0xcf/0x170 [ 176.159096][ T4827] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 176.164977][ T4827] RIP: 0033:0x7f7356ee7969 [ 176.169383][ T4827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.188976][ T4827] RSP: 002b:00007f7355550038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 176.197463][ T4827] RAX: ffffffffffffffda RBX: 00007f735710efa0 RCX: 00007f7356ee7969 [ 176.205427][ T4827] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 176.213388][ T4827] RBP: 00007f7355550090 R08: 0000000000000000 R09: 0000000000000000 [ 176.221464][ T4827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 176.229425][ T4827] R13: 0000000000000000 R14: 00007f735710efa0 R15: 00007ffc27734518 [ 176.534691][ T23] audit: type=1400 audit(1747833821.370:173): avc: denied { create } for pid=4834 comm="syz.2.1521" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 176.900769][ T4878] FAULT_INJECTION: forcing a failure. [ 176.900769][ T4878] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 176.946841][ T4878] CPU: 0 PID: 4878 Comm: syz.0.1533 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 176.958056][ T4878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 176.968124][ T4878] Call Trace: [ 176.971422][ T4878] __dump_stack+0x1e/0x20 [ 176.975872][ T4878] dump_stack+0x15b/0x1b8 [ 176.980210][ T4878] ? thaw_kernel_threads+0x220/0x220 [ 176.985494][ T4878] ? show_regs_print_info+0x18/0x18 [ 176.990698][ T4878] should_fail+0x69e/0x7e0 [ 176.995200][ T4878] ? setup_fault_attr+0x230/0x230 [ 177.000223][ T4878] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 177.005771][ T4878] should_fail_alloc_page+0x4f/0x60 [ 177.010960][ T4878] __alloc_pages_nodemask+0xf5/0x4b0 [ 177.016236][ T4878] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 177.021768][ T4878] ? __vmalloc_node_range+0x2af/0x6e0 [ 177.027123][ T4878] ? kasan_kmalloc+0xd/0x20 [ 177.031610][ T4878] ? __kmalloc+0x12a/0x2f0 [ 177.036015][ T4878] ? __vmalloc_node_range+0x2af/0x6e0 [ 177.041551][ T4878] __vmalloc_node_range+0x36a/0x6e0 [ 177.046750][ T4878] ? reuseport_array_alloc+0x146/0x230 [ 177.052192][ T4878] __vmalloc_node_flags_caller+0x7d/0x90 [ 177.057808][ T4878] ? reuseport_array_alloc+0x146/0x230 [ 177.063250][ T4878] bpf_map_area_alloc+0x83/0x90 [ 177.068093][ T4878] reuseport_array_alloc+0x146/0x230 [ 177.073360][ T4878] ? reuseport_array_alloc_check+0x90/0x90 [ 177.079149][ T4878] ? array_map_alloc_check+0x1da/0x2d0 [ 177.084590][ T4878] map_create+0x2d8/0x980 [ 177.088907][ T4878] ? security_bpf+0x82/0xa0 [ 177.093395][ T4878] __se_sys_bpf+0x2dc/0x570 [ 177.097886][ T4878] ? __x64_sys_bpf+0x90/0x90 [ 177.102460][ T4878] ? check_preemption_disabled+0x118/0x300 [ 177.108249][ T4878] ? __ia32_sys_read+0x90/0x90 [ 177.113200][ T4878] ? debug_smp_processor_id+0x1c/0x20 [ 177.118555][ T4878] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 177.124604][ T4878] __x64_sys_bpf+0x7b/0x90 [ 177.129102][ T4878] do_syscall_64+0xcf/0x170 [ 177.133598][ T4878] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 177.139473][ T4878] RIP: 0033:0x7f5d4a16e969 [ 177.143870][ T4878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.163545][ T4878] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 177.172029][ T4878] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 177.179981][ T4878] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 177.187934][ T4878] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 177.195885][ T4878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 177.203842][ T4878] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 177.509674][ T4910] syz.3.1540 (4910) used obsolete PPPIOCDETACH ioctl [ 178.963885][ T4990] device syzkaller0 entered promiscuous mode [ 183.105354][ T5072] @: renamed from bond_slave_0 [ 183.257572][ T5072] device wg2 left promiscuous mode [ 183.368299][ T5072] device wg2 entered promiscuous mode [ 191.295354][ T5215] device syzkaller0 entered promiscuous mode [ 196.628848][ T5288] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.663098][ T5288] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.676958][ T5288] device bridge_slave_0 entered promiscuous mode [ 196.727602][ T5288] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.734695][ T5288] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.749160][ T5288] device bridge_slave_1 entered promiscuous mode [ 197.730013][ T23] audit: type=1400 audit(1747833842.630:174): avc: denied { write } for pid=5288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 197.768618][ T23] audit: type=1400 audit(1747833842.630:175): avc: denied { read } for pid=5288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 197.880045][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 197.896774][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 197.937499][ T5331] FAULT_INJECTION: forcing a failure. [ 197.937499][ T5331] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 197.952617][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 197.969319][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 197.987057][ T5331] CPU: 1 PID: 5331 Comm: syz.0.1675 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 197.998264][ T5331] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 197.999124][ T3884] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.008312][ T5331] Call Trace: [ 198.008330][ T5331] __dump_stack+0x1e/0x20 [ 198.008344][ T5331] dump_stack+0x15b/0x1b8 [ 198.015372][ T3884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.018633][ T5331] ? thaw_kernel_threads+0x220/0x220 [ 198.039808][ T5331] ? show_regs_print_info+0x18/0x18 [ 198.045014][ T5331] should_fail+0x69e/0x7e0 [ 198.049433][ T5331] ? setup_fault_attr+0x230/0x230 [ 198.054474][ T5331] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 198.060015][ T5331] should_fail_alloc_page+0x4f/0x60 [ 198.065209][ T5331] __alloc_pages_nodemask+0xf5/0x4b0 [ 198.070490][ T5331] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 198.076296][ T5331] ? __vmalloc_node_range+0x2af/0x6e0 [ 198.081785][ T5331] ? kasan_kmalloc+0xd/0x20 [ 198.086373][ T5331] ? __kmalloc+0x12a/0x2f0 [ 198.090827][ T5331] ? __vmalloc_node_range+0x2af/0x6e0 [ 198.096220][ T5331] __vmalloc_node_range+0x36a/0x6e0 [ 198.101416][ T5331] ? reuseport_array_alloc+0x146/0x230 [ 198.106873][ T5331] __vmalloc_node_flags_caller+0x7d/0x90 [ 198.112509][ T5331] ? reuseport_array_alloc+0x146/0x230 [ 198.117968][ T5331] bpf_map_area_alloc+0x83/0x90 [ 198.122899][ T5331] reuseport_array_alloc+0x146/0x230 [ 198.128181][ T5331] ? reuseport_array_alloc_check+0x90/0x90 [ 198.133988][ T5331] ? array_map_alloc_check+0x1da/0x2d0 [ 198.139449][ T5331] map_create+0x2d8/0x980 [ 198.143777][ T5331] ? security_bpf+0x82/0xa0 [ 198.148278][ T5331] __se_sys_bpf+0x2dc/0x570 [ 198.152882][ T5331] ? __x64_sys_bpf+0x90/0x90 [ 198.157475][ T5331] ? check_preemption_disabled+0x118/0x300 [ 198.163288][ T5331] ? __ia32_sys_read+0x90/0x90 [ 198.168055][ T5331] ? debug_smp_processor_id+0x1c/0x20 [ 198.173431][ T5331] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 198.179503][ T5331] __x64_sys_bpf+0x7b/0x90 [ 198.183926][ T5331] do_syscall_64+0xcf/0x170 [ 198.188434][ T5331] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 198.194856][ T5331] RIP: 0033:0x7f5d4a16e969 [ 198.199272][ T5331] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.219075][ T5331] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.227575][ T5331] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 198.235554][ T5331] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 198.243526][ T5331] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 198.251495][ T5331] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.259466][ T5331] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 198.283206][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 198.330811][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 198.362046][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 198.393879][ T3884] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.400955][ T3884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.602558][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 198.621104][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 198.640691][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 198.672806][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 198.684132][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 198.695837][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 198.708489][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 198.720070][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 198.732337][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 198.745198][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 198.757054][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 198.769712][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 198.781635][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 198.793196][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 198.924439][ T23] audit: type=1400 audit(1747833843.820:176): avc: denied { mounton } for pid=5288 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=12946 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 201.591830][ T5435] bridge0: port 2(bridge_slave_1) entered disabled state [ 201.601855][ T5435] bridge0: port 1(bridge_slave_0) entered disabled state [ 201.891067][ T5446] FAULT_INJECTION: forcing a failure. [ 201.891067][ T5446] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 201.935149][ T5446] CPU: 0 PID: 5446 Comm: syz.5.1711 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 201.946436][ T5446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 201.956484][ T5446] Call Trace: [ 201.959773][ T5446] __dump_stack+0x1e/0x20 [ 201.964104][ T5446] dump_stack+0x15b/0x1b8 [ 201.968512][ T5446] ? thaw_kernel_threads+0x220/0x220 [ 201.973791][ T5446] ? show_regs_print_info+0x18/0x18 [ 201.978988][ T5446] should_fail+0x69e/0x7e0 [ 201.983393][ T5446] ? setup_fault_attr+0x230/0x230 [ 201.988504][ T5446] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 201.994111][ T5446] should_fail_alloc_page+0x4f/0x60 [ 201.999297][ T5446] __alloc_pages_nodemask+0xf5/0x4b0 [ 202.004575][ T5446] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 202.010232][ T5446] ? __vmalloc_node_range+0x2af/0x6e0 [ 202.015765][ T5446] ? kasan_kmalloc+0xd/0x20 [ 202.020352][ T5446] ? __kmalloc+0x12a/0x2f0 [ 202.024759][ T5446] ? __vmalloc_node_range+0x2af/0x6e0 [ 202.030123][ T5446] __vmalloc_node_range+0x36a/0x6e0 [ 202.035327][ T5446] ? reuseport_array_alloc+0x146/0x230 [ 202.040774][ T5446] __vmalloc_node_flags_caller+0x7d/0x90 [ 202.046396][ T5446] ? reuseport_array_alloc+0x146/0x230 [ 202.051877][ T5446] bpf_map_area_alloc+0x83/0x90 [ 202.056818][ T5446] reuseport_array_alloc+0x146/0x230 [ 202.062202][ T5446] ? reuseport_array_alloc_check+0x90/0x90 [ 202.068000][ T5446] ? array_map_alloc_check+0x1da/0x2d0 [ 202.073715][ T5446] map_create+0x2d8/0x980 [ 202.078041][ T5446] ? security_bpf+0x82/0xa0 [ 202.082539][ T5446] __se_sys_bpf+0x2dc/0x570 [ 202.087033][ T5446] ? __x64_sys_bpf+0x90/0x90 [ 202.091615][ T5446] ? check_preemption_disabled+0x118/0x300 [ 202.097412][ T5446] ? __ia32_sys_read+0x90/0x90 [ 202.102169][ T5446] ? debug_smp_processor_id+0x1c/0x20 [ 202.107555][ T5446] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 202.113664][ T5446] __x64_sys_bpf+0x7b/0x90 [ 202.118075][ T5446] do_syscall_64+0xcf/0x170 [ 202.122709][ T5446] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 202.128716][ T5446] RIP: 0033:0x7f9ab7e1b969 [ 202.133125][ T5446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 202.153999][ T5446] RSP: 002b:00007f9ab6484038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 202.162417][ T5446] RAX: ffffffffffffffda RBX: 00007f9ab8042fa0 RCX: 00007f9ab7e1b969 [ 202.170464][ T5446] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 202.178512][ T5446] RBP: 00007f9ab6484090 R08: 0000000000000000 R09: 0000000000000000 [ 202.186486][ T5446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 202.194546][ T5446] R13: 0000000000000000 R14: 00007f9ab8042fa0 R15: 00007ffe9f856b28 [ 202.494754][ T359] device veth0_to_team left promiscuous mode [ 202.503423][ T359] : port 1(veth0_to_team) entered disabled state [ 202.762998][ T359] device veth0 left promiscuous mode [ 202.768864][ T359] bridge0: port 3(veth0) entered disabled state [ 202.862714][ T359] device bridge_slave_1 left promiscuous mode [ 202.884901][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 202.956398][ T359] device bridge_slave_0 left promiscuous mode [ 202.962618][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 203.752875][ T23] audit: type=1400 audit(1747833848.650:177): avc: denied { create } for pid=5479 comm="syz.0.1724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 204.499809][ T5497] FAULT_INJECTION: forcing a failure. [ 204.499809][ T5497] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 204.530237][ T5497] CPU: 1 PID: 5497 Comm: syz.0.1730 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 204.541442][ T5497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 204.551489][ T5497] Call Trace: [ 204.554771][ T5497] __dump_stack+0x1e/0x20 [ 204.559189][ T5497] dump_stack+0x15b/0x1b8 [ 204.563520][ T5497] ? thaw_kernel_threads+0x220/0x220 [ 204.568806][ T5497] ? show_regs_print_info+0x18/0x18 [ 204.574108][ T5497] should_fail+0x69e/0x7e0 [ 204.578531][ T5497] ? setup_fault_attr+0x230/0x230 [ 204.583557][ T5497] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 204.589192][ T5497] should_fail_alloc_page+0x4f/0x60 [ 204.594386][ T5497] __alloc_pages_nodemask+0xf5/0x4b0 [ 204.599667][ T5497] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 204.605308][ T5497] ? __vmalloc_node_range+0x2af/0x6e0 [ 204.610688][ T5497] ? kasan_kmalloc+0xd/0x20 [ 204.615349][ T5497] ? __kmalloc+0x12a/0x2f0 [ 204.619797][ T5497] ? __vmalloc_node_range+0x2af/0x6e0 [ 204.625172][ T5497] __vmalloc_node_range+0x36a/0x6e0 [ 204.630368][ T5497] ? reuseport_array_alloc+0x146/0x230 [ 204.635825][ T5497] __vmalloc_node_flags_caller+0x7d/0x90 [ 204.641449][ T5497] ? reuseport_array_alloc+0x146/0x230 [ 204.646903][ T5497] bpf_map_area_alloc+0x83/0x90 [ 204.651749][ T5497] reuseport_array_alloc+0x146/0x230 [ 204.657029][ T5497] ? reuseport_array_alloc_check+0x90/0x90 [ 204.662828][ T5497] ? array_map_alloc_check+0x1da/0x2d0 [ 204.668290][ T5497] map_create+0x2d8/0x980 [ 204.672619][ T5497] ? security_bpf+0x82/0xa0 [ 204.677118][ T5497] __se_sys_bpf+0x2dc/0x570 [ 204.681617][ T5497] ? __x64_sys_bpf+0x90/0x90 [ 204.686203][ T5497] ? check_preemption_disabled+0x118/0x300 [ 204.692016][ T5497] ? __ia32_sys_read+0x90/0x90 [ 204.696790][ T5497] ? debug_smp_processor_id+0x1c/0x20 [ 204.702281][ T5497] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 204.708461][ T5497] __x64_sys_bpf+0x7b/0x90 [ 204.712890][ T5497] do_syscall_64+0xcf/0x170 [ 204.717403][ T5497] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 204.723304][ T5497] RIP: 0033:0x7f5d4a16e969 [ 204.727724][ T5497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.747416][ T5497] RSP: 002b:00007f5d487d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 204.755829][ T5497] RAX: ffffffffffffffda RBX: 00007f5d4a395fa0 RCX: 00007f5d4a16e969 [ 204.764088][ T5497] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 204.772224][ T5497] RBP: 00007f5d487d7090 R08: 0000000000000000 R09: 0000000000000000 [ 204.780207][ T5497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.788288][ T5497] R13: 0000000000000000 R14: 00007f5d4a395fa0 R15: 00007ffefa08a698 [ 208.082019][ T5604] device lo entered promiscuous mode [ 214.500812][ T5716] FAULT_INJECTION: forcing a failure. [ 214.500812][ T5716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 214.533750][ T5716] CPU: 1 PID: 5716 Comm: syz.3.1799 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 214.545236][ T5716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 214.555298][ T5716] Call Trace: [ 214.558596][ T5716] __dump_stack+0x1e/0x20 [ 214.563123][ T5716] dump_stack+0x15b/0x1b8 [ 214.567509][ T5716] ? thaw_kernel_threads+0x220/0x220 [ 214.572792][ T5716] ? show_regs_print_info+0x18/0x18 [ 214.577984][ T5716] should_fail+0x69e/0x7e0 [ 214.582492][ T5716] ? setup_fault_attr+0x230/0x230 [ 214.587510][ T5716] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 214.593069][ T5716] should_fail_alloc_page+0x4f/0x60 [ 214.598355][ T5716] __alloc_pages_nodemask+0xf5/0x4b0 [ 214.603640][ T5716] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 214.609169][ T5716] ? __vmalloc_node_range+0x2af/0x6e0 [ 214.614612][ T5716] ? kasan_kmalloc+0xd/0x20 [ 214.619098][ T5716] ? __kmalloc+0x12a/0x2f0 [ 214.623495][ T5716] ? __vmalloc_node_range+0x2af/0x6e0 [ 214.628852][ T5716] __vmalloc_node_range+0x36a/0x6e0 [ 214.634039][ T5716] ? reuseport_array_alloc+0x146/0x230 [ 214.639575][ T5716] __vmalloc_node_flags_caller+0x7d/0x90 [ 214.645274][ T5716] ? reuseport_array_alloc+0x146/0x230 [ 214.650738][ T5716] bpf_map_area_alloc+0x83/0x90 [ 214.655744][ T5716] reuseport_array_alloc+0x146/0x230 [ 214.661012][ T5716] ? reuseport_array_alloc_check+0x90/0x90 [ 214.666817][ T5716] ? array_map_alloc_check+0x1da/0x2d0 [ 214.672356][ T5716] map_create+0x2d8/0x980 [ 214.676755][ T5716] ? security_bpf+0x82/0xa0 [ 214.681241][ T5716] __se_sys_bpf+0x2dc/0x570 [ 214.685819][ T5716] ? __x64_sys_bpf+0x90/0x90 [ 214.690406][ T5716] ? check_preemption_disabled+0x118/0x300 [ 214.696288][ T5716] ? __ia32_sys_read+0x90/0x90 [ 214.701125][ T5716] ? debug_smp_processor_id+0x1c/0x20 [ 214.706579][ T5716] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 214.712627][ T5716] __x64_sys_bpf+0x7b/0x90 [ 214.717027][ T5716] do_syscall_64+0xcf/0x170 [ 214.721616][ T5716] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 214.727492][ T5716] RIP: 0033:0x7f9733f2a969 [ 214.731890][ T5716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.751694][ T5716] RSP: 002b:00007f9732593038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 214.760233][ T5716] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 214.768195][ T5716] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 214.776239][ T5716] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 214.784490][ T5716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 214.792447][ T5716] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 216.641587][ T5765] FAULT_INJECTION: forcing a failure. [ 216.641587][ T5765] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 216.717229][ T5765] CPU: 1 PID: 5765 Comm: syz.1.1818 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 216.728435][ T5765] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 216.738484][ T5765] Call Trace: [ 216.741774][ T5765] __dump_stack+0x1e/0x20 [ 216.746098][ T5765] dump_stack+0x15b/0x1b8 [ 216.750423][ T5765] ? thaw_kernel_threads+0x220/0x220 [ 216.755874][ T5765] ? show_regs_print_info+0x18/0x18 [ 216.761077][ T5765] should_fail+0x69e/0x7e0 [ 216.765597][ T5765] ? setup_fault_attr+0x230/0x230 [ 216.770629][ T5765] ? __alloc_pages_nodemask+0x4b0/0x4b0 [ 216.776170][ T5765] should_fail_alloc_page+0x4f/0x60 [ 216.781364][ T5765] __alloc_pages_nodemask+0xf5/0x4b0 [ 216.786774][ T5765] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 216.792321][ T5765] ? __vmalloc_node_range+0x2af/0x6e0 [ 216.797695][ T5765] ? kasan_kmalloc+0xd/0x20 [ 216.802199][ T5765] ? __kmalloc+0x12a/0x2f0 [ 216.806601][ T5765] ? __vmalloc_node_range+0x2af/0x6e0 [ 216.812219][ T5765] __vmalloc_node_range+0x36a/0x6e0 [ 216.817407][ T5765] ? reuseport_array_alloc+0x146/0x230 [ 216.822869][ T5765] __vmalloc_node_flags_caller+0x7d/0x90 [ 216.828488][ T5765] ? reuseport_array_alloc+0x146/0x230 [ 216.833945][ T5765] bpf_map_area_alloc+0x83/0x90 [ 216.838782][ T5765] reuseport_array_alloc+0x146/0x230 [ 216.844056][ T5765] ? reuseport_array_alloc_check+0x90/0x90 [ 216.849874][ T5765] ? array_map_alloc_check+0x1da/0x2d0 [ 216.855497][ T5765] map_create+0x2d8/0x980 [ 216.860252][ T5765] ? security_bpf+0x82/0xa0 [ 216.864755][ T5765] __se_sys_bpf+0x2dc/0x570 [ 216.869247][ T5765] ? __x64_sys_bpf+0x90/0x90 [ 216.874536][ T5765] ? check_preemption_disabled+0x118/0x300 [ 216.880554][ T5765] ? __ia32_sys_read+0x90/0x90 [ 216.885415][ T5765] ? debug_smp_processor_id+0x1c/0x20 [ 216.891043][ T5765] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 216.897119][ T5765] __x64_sys_bpf+0x7b/0x90 [ 216.901713][ T5765] do_syscall_64+0xcf/0x170 [ 216.906218][ T5765] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 216.912455][ T5765] RIP: 0033:0x7f7356ee7969 [ 216.916858][ T5765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.936901][ T5765] RSP: 002b:00007f7355550038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 216.945314][ T5765] RAX: ffffffffffffffda RBX: 00007f735710efa0 RCX: 00007f7356ee7969 [ 216.953543][ T5765] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 216.961817][ T5765] RBP: 00007f7355550090 R08: 0000000000000000 R09: 0000000000000000 [ 216.970219][ T5765] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 216.978531][ T5765] R13: 0000000000000000 R14: 00007f735710efa0 R15: 00007ffc27734518 [ 227.726479][ T6022] FAULT_INJECTION: forcing a failure. [ 227.726479][ T6022] name failslab, interval 1, probability 0, space 0, times 0 [ 227.818995][ T6022] CPU: 0 PID: 6022 Comm: syz.3.1906 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 227.830200][ T6022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 227.840251][ T6022] Call Trace: [ 227.843546][ T6022] __dump_stack+0x1e/0x20 [ 227.847880][ T6022] dump_stack+0x15b/0x1b8 [ 227.852213][ T6022] ? thaw_kernel_threads+0x220/0x220 [ 227.857496][ T6022] ? show_regs_print_info+0x18/0x18 [ 227.862691][ T6022] ? stack_trace_save+0xaa/0xf0 [ 227.867533][ T6022] ? stack_trace_snprint+0x170/0x170 [ 227.872809][ T6022] should_fail+0x69e/0x7e0 [ 227.877217][ T6022] ? setup_fault_attr+0x230/0x230 [ 227.882233][ T6022] ? kstrtouint_from_user+0x1a0/0x200 [ 227.887690][ T6022] ? __kasan_slab_free+0x1c3/0x280 [ 227.892797][ T6022] ? kstrtol_from_user+0x260/0x260 [ 227.897989][ T6022] ? do_syscall_64+0xcf/0x170 [ 227.902656][ T6022] ? dup_task_struct+0x57/0x640 [ 227.907495][ T6022] __should_failslab+0x10c/0x150 [ 227.912445][ T6022] should_failslab+0x9/0x20 [ 227.916939][ T6022] kmem_cache_alloc+0x2d/0x270 [ 227.921691][ T6022] dup_task_struct+0x57/0x640 [ 227.926360][ T6022] ? recalc_sigpending+0x1a6/0x230 [ 227.931570][ T6022] copy_process+0x503/0x2cf0 [ 227.936157][ T6022] ? proc_fail_nth_read+0x210/0x210 [ 227.941437][ T6022] ? memset+0x31/0x40 [ 227.945411][ T6022] ? avc_policy_seqno+0x1b/0x70 [ 227.950251][ T6022] ? check_preemption_disabled+0x9b/0x300 [ 227.955958][ T6022] ? debug_smp_processor_id+0x20/0x20 [ 227.961319][ T6022] ? fork_idle+0x1c0/0x1c0 [ 227.965729][ T6022] ? security_file_permission+0xde/0x300 [ 227.971351][ T6022] _do_fork+0x190/0x860 [ 227.975494][ T6022] ? __kasan_check_write+0x14/0x20 [ 227.980591][ T6022] ? copy_process+0x2cf0/0x2cf0 [ 227.985433][ T6022] ? __ia32_sys_read+0x90/0x90 [ 227.990187][ T6022] ? task_work_run+0x15e/0x170 [ 227.994937][ T6022] __x64_sys_clone+0x12e/0x160 [ 227.999692][ T6022] do_syscall_64+0xcf/0x170 [ 228.004205][ T6022] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 228.010171][ T6022] RIP: 0033:0x7f9733f2a969 [ 228.014575][ T6022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.034354][ T6022] RSP: 002b:00007f9732592fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 228.043111][ T6022] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 228.051161][ T6022] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002000 [ 228.059121][ T6022] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 228.067086][ T6022] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 228.075144][ T6022] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 228.984099][ T6069] FAULT_INJECTION: forcing a failure. [ 228.984099][ T6069] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 229.090558][ T6069] CPU: 0 PID: 6069 Comm: syz.3.1920 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 229.101849][ T6069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 229.111897][ T6069] Call Trace: [ 229.115183][ T6069] __dump_stack+0x1e/0x20 [ 229.119519][ T6069] dump_stack+0x15b/0x1b8 [ 229.123844][ T6069] ? thaw_kernel_threads+0x220/0x220 [ 229.129120][ T6069] ? _do_fork+0x190/0x860 [ 229.133482][ T6069] ? show_regs_print_info+0x18/0x18 [ 229.138676][ T6069] should_fail+0x69e/0x7e0 [ 229.143086][ T6069] ? setup_fault_attr+0x230/0x230 [ 229.148108][ T6069] should_fail_alloc_page+0x4f/0x60 [ 229.153299][ T6069] __alloc_pages_nodemask+0xf5/0x4b0 [ 229.158663][ T6069] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 229.164295][ T6069] ? kasan_slab_alloc+0x12/0x20 [ 229.169421][ T6069] ? kmem_cache_alloc+0xe2/0x270 [ 229.174379][ T6069] ? dup_task_struct+0x57/0x640 [ 229.179398][ T6069] dup_task_struct+0x91/0x640 [ 229.184074][ T6069] ? recalc_sigpending+0x1a6/0x230 [ 229.189186][ T6069] copy_process+0x503/0x2cf0 [ 229.193772][ T6069] ? proc_fail_nth_read+0x210/0x210 [ 229.199052][ T6069] ? memset+0x31/0x40 [ 229.203024][ T6069] ? avc_policy_seqno+0x1b/0x70 [ 229.207864][ T6069] ? check_preemption_disabled+0x9b/0x300 [ 229.213577][ T6069] ? debug_smp_processor_id+0x20/0x20 [ 229.218938][ T6069] ? fork_idle+0x1c0/0x1c0 [ 229.223351][ T6069] ? security_file_permission+0xde/0x300 [ 229.228982][ T6069] _do_fork+0x190/0x860 [ 229.233132][ T6069] ? __kasan_check_write+0x14/0x20 [ 229.238317][ T6069] ? copy_process+0x2cf0/0x2cf0 [ 229.243164][ T6069] ? __ia32_sys_read+0x90/0x90 [ 229.247917][ T6069] ? task_work_run+0x15e/0x170 [ 229.252683][ T6069] __x64_sys_clone+0x12e/0x160 [ 229.257458][ T6069] do_syscall_64+0xcf/0x170 [ 229.261967][ T6069] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 229.267850][ T6069] RIP: 0033:0x7f9733f2a969 [ 229.272292][ T6069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 229.292241][ T6069] RSP: 002b:00007f9732592fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 229.300653][ T6069] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 229.308627][ T6069] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002000 [ 229.316600][ T6069] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 229.324569][ T6069] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 229.332543][ T6069] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 230.161053][ T6125] FAULT_INJECTION: forcing a failure. [ 230.161053][ T6125] name failslab, interval 1, probability 0, space 0, times 0 [ 230.356616][ T6125] CPU: 0 PID: 6125 Comm: syz.1.1937 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 230.368000][ T6125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 230.378162][ T6125] Call Trace: [ 230.381453][ T6125] __dump_stack+0x1e/0x20 [ 230.385775][ T6125] dump_stack+0x15b/0x1b8 [ 230.390118][ T6125] ? thaw_kernel_threads+0x220/0x220 [ 230.395394][ T6125] ? show_regs_print_info+0x18/0x18 [ 230.400586][ T6125] should_fail+0x69e/0x7e0 [ 230.404992][ T6125] ? setup_fault_attr+0x230/0x230 [ 230.410001][ T6125] ? check_preemption_disabled+0x9b/0x300 [ 230.415706][ T6125] ? debug_smp_processor_id+0x20/0x20 [ 230.421070][ T6125] ? prepare_creds+0x2c/0x5d0 [ 230.425745][ T6125] __should_failslab+0x10c/0x150 [ 230.430767][ T6125] should_failslab+0x9/0x20 [ 230.435256][ T6125] kmem_cache_alloc+0x2d/0x270 [ 230.440005][ T6125] ? prepare_creds+0x13/0x5d0 [ 230.444671][ T6125] prepare_creds+0x2c/0x5d0 [ 230.449163][ T6125] ? copy_creds+0x7b/0x480 [ 230.453567][ T6125] copy_creds+0xe5/0x480 [ 230.457815][ T6125] copy_process+0x7da/0x2cf0 [ 230.462499][ T6125] ? proc_fail_nth_read+0x210/0x210 [ 230.467704][ T6125] ? memset+0x31/0x40 [ 230.471675][ T6125] ? avc_policy_seqno+0x1b/0x70 [ 230.476524][ T6125] ? check_preemption_disabled+0x9b/0x300 [ 230.482379][ T6125] ? debug_smp_processor_id+0x20/0x20 [ 230.487758][ T6125] ? fork_idle+0x1c0/0x1c0 [ 230.492183][ T6125] ? security_file_permission+0xde/0x300 [ 230.498012][ T6125] _do_fork+0x190/0x860 [ 230.502338][ T6125] ? __kasan_check_write+0x14/0x20 [ 230.507550][ T6125] ? copy_process+0x2cf0/0x2cf0 [ 230.512400][ T6125] ? __ia32_sys_read+0x90/0x90 [ 230.517301][ T6125] ? task_work_run+0x15e/0x170 [ 230.522070][ T6125] __x64_sys_clone+0x12e/0x160 [ 230.526860][ T6125] do_syscall_64+0xcf/0x170 [ 230.531361][ T6125] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 230.537264][ T6125] RIP: 0033:0x7f7356ee7969 [ 230.541699][ T6125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.561800][ T6125] RSP: 002b:00007f735554ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 230.570478][ T6125] RAX: ffffffffffffffda RBX: 00007f735710efa0 RCX: 00007f7356ee7969 [ 230.578441][ T6125] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002000 [ 230.586402][ T6125] RBP: 00007f7355550090 R08: 0000000000000000 R09: 0000000000000000 [ 230.594378][ T6125] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 230.602537][ T6125] R13: 0000000000000000 R14: 00007f735710efa0 R15: 00007ffc27734518 [ 238.642061][ T6192] FAULT_INJECTION: forcing a failure. [ 238.642061][ T6192] name failslab, interval 1, probability 0, space 0, times 0 [ 238.654807][ T6192] CPU: 0 PID: 6192 Comm: syz.3.1955 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 238.666275][ T6192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 238.676449][ T6192] Call Trace: [ 238.679819][ T6192] __dump_stack+0x1e/0x20 [ 238.684146][ T6192] dump_stack+0x15b/0x1b8 [ 238.688471][ T6192] ? thaw_kernel_threads+0x220/0x220 [ 238.693837][ T6192] ? show_regs_print_info+0x18/0x18 [ 238.699027][ T6192] should_fail+0x69e/0x7e0 [ 238.703512][ T6192] ? setup_fault_attr+0x230/0x230 [ 238.708515][ T6192] ? selinux_cred_prepare+0x74/0x80 [ 238.713690][ T6192] ? __delayacct_tsk_init+0x2c/0xa0 [ 238.718950][ T6192] __should_failslab+0x10c/0x150 [ 238.723876][ T6192] should_failslab+0x9/0x20 [ 238.728356][ T6192] kmem_cache_alloc+0x2d/0x270 [ 238.733177][ T6192] ? __delayacct_tsk_init+0x1b/0xa0 [ 238.738390][ T6192] __delayacct_tsk_init+0x2c/0xa0 [ 238.743497][ T6192] copy_process+0x879/0x2cf0 [ 238.748089][ T6192] ? proc_fail_nth_read+0x210/0x210 [ 238.753276][ T6192] ? memset+0x31/0x40 [ 238.757240][ T6192] ? avc_policy_seqno+0x1b/0x70 [ 238.762087][ T6192] ? debug_smp_processor_id+0x20/0x20 [ 238.767457][ T6192] ? fork_idle+0x1c0/0x1c0 [ 238.771977][ T6192] ? security_file_permission+0xde/0x300 [ 238.777606][ T6192] _do_fork+0x190/0x860 [ 238.781747][ T6192] ? __kasan_check_write+0x14/0x20 [ 238.786840][ T6192] ? copy_process+0x2cf0/0x2cf0 [ 238.791763][ T6192] ? __ia32_sys_read+0x90/0x90 [ 238.796522][ T6192] ? task_work_run+0x15e/0x170 [ 238.801282][ T6192] __x64_sys_clone+0x12e/0x160 [ 238.806091][ T6192] do_syscall_64+0xcf/0x170 [ 238.810587][ T6192] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 238.816558][ T6192] RIP: 0033:0x7f9733f2a969 [ 238.821091][ T6192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 238.840683][ T6192] RSP: 002b:00007f9732592fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 238.849086][ T6192] RAX: ffffffffffffffda RBX: 00007f9734151fa0 RCX: 00007f9733f2a969 [ 238.857307][ T6192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002000 [ 238.865351][ T6192] RBP: 00007f9732593090 R08: 0000000000000000 R09: 0000000000000000 [ 238.873474][ T6192] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 238.881439][ T6192] R13: 0000000000000000 R14: 00007f9734151fa0 R15: 00007ffd9525ded8 [ 240.714430][ T6239] FAULT_INJECTION: forcing a failure. [ 240.714430][ T6239] name failslab, interval 1, probability 0, space 0, times 0 [ 240.740615][ T6239] CPU: 0 PID: 6239 Comm: syz.5.1971 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 240.752008][ T6239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 240.762083][ T6239] Call Trace: [ 240.765402][ T6239] __dump_stack+0x1e/0x20 [ 240.769721][ T6239] dump_stack+0x15b/0x1b8 [ 240.774073][ T6239] ? thaw_kernel_threads+0x220/0x220 [ 240.779367][ T6239] ? show_regs_print_info+0x18/0x18 [ 240.784585][ T6239] ? __kasan_kmalloc+0x1c3/0x200 [ 240.789523][ T6239] should_fail+0x69e/0x7e0 [ 240.793937][ T6239] ? setup_fault_attr+0x230/0x230 [ 240.798965][ T6239] ? avc_denied+0x1b0/0x1b0 [ 240.803763][ T6239] ? dup_fd+0x70/0xaf0 [ 240.807821][ T6239] __should_failslab+0x10c/0x150 [ 240.812752][ T6239] should_failslab+0x9/0x20 [ 240.817355][ T6239] kmem_cache_alloc+0x2d/0x270 [ 240.822179][ T6239] dup_fd+0x70/0xaf0 [ 240.826068][ T6239] ? avc_has_perm_noaudit+0x3f0/0x3f0 [ 240.831518][ T6239] copy_files+0xc4/0x160 [ 240.835751][ T6239] ? dup_task_struct+0x640/0x640 [ 240.840774][ T6239] ? security_task_alloc+0xfb/0x130 [ 240.846225][ T6239] copy_process+0x10b5/0x2cf0 [ 240.850895][ T6239] ? proc_fail_nth_read+0x210/0x210 [ 240.856107][ T6239] ? fork_idle+0x1c0/0x1c0 [ 240.860515][ T6239] ? security_file_permission+0xde/0x300 [ 240.866139][ T6239] _do_fork+0x190/0x860 [ 240.870289][ T6239] ? __kasan_check_write+0x14/0x20 [ 240.875389][ T6239] ? copy_process+0x2cf0/0x2cf0 [ 240.880228][ T6239] ? __ia32_sys_read+0x90/0x90 [ 240.884992][ T6239] ? task_work_run+0x15e/0x170 [ 240.889745][ T6239] __x64_sys_clone+0x12e/0x160 [ 240.894595][ T6239] do_syscall_64+0xcf/0x170 [ 240.899092][ T6239] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 240.905063][ T6239] RIP: 0033:0x7f9ab7e1b969 [ 240.909557][ T6239] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.929366][ T6239] RSP: 002b:00007f9ab6483fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 240.938199][ T6239] RAX: ffffffffffffffda RBX: 00007f9ab8042fa0 RCX: 00007f9ab7e1b969 [ 240.946158][ T6239] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002000 [ 240.954232][ T6239] RBP: 00007f9ab6484090 R08: 0000000000000000 R09: 0000000000000000 [ 240.962279][ T6239] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 240.970243][ T6239] R13: 0000000000000000 R14: 00007f9ab8042fa0 R15: 00007ffe9f856b28 [ 243.131226][ T6290] FAULT_INJECTION: forcing a failure. [ 243.131226][ T6290] name failslab, interval 1, probability 0, space 0, times 0 [ 243.144185][ T6290] CPU: 0 PID: 6290 Comm: syz.2.1989 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 243.155369][ T6290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 243.165422][ T6290] Call Trace: [ 243.168801][ T6290] __dump_stack+0x1e/0x20 [ 243.173124][ T6290] dump_stack+0x15b/0x1b8 [ 243.177446][ T6290] ? thaw_kernel_threads+0x220/0x220 [ 243.182720][ T6290] ? show_regs_print_info+0x18/0x18 [ 243.188003][ T6290] should_fail+0x69e/0x7e0 [ 243.192416][ T6290] ? setup_fault_attr+0x230/0x230 [ 243.197436][ T6290] ? alloc_fdtable+0x93/0x270 [ 243.202106][ T6290] __should_failslab+0x10c/0x150 [ 243.207040][ T6290] should_failslab+0x9/0x20 [ 243.211670][ T6290] kmem_cache_alloc_trace+0x2d/0x290 [ 243.216968][ T6290] alloc_fdtable+0x93/0x270 [ 243.221474][ T6290] ? kmem_cache_alloc+0xe2/0x270 [ 243.226407][ T6290] ? dup_fd+0x70/0xaf0 [ 243.230472][ T6290] dup_fd+0x786/0xaf0 [ 243.234463][ T6290] copy_files+0xc4/0x160 [ 243.238787][ T6290] ? dup_task_struct+0x640/0x640 [ 243.243721][ T6290] ? security_task_alloc+0xfb/0x130 [ 243.248912][ T6290] copy_process+0x10b5/0x2cf0 [ 243.253586][ T6290] ? proc_fail_nth_read+0x210/0x210 [ 243.258802][ T6290] ? fork_idle+0x1c0/0x1c0 [ 243.263261][ T6290] ? security_file_permission+0xde/0x300 [ 243.268892][ T6290] _do_fork+0x190/0x860 [ 243.273131][ T6290] ? __kasan_check_write+0x14/0x20 [ 243.278303][ T6290] ? copy_process+0x2cf0/0x2cf0 [ 243.283150][ T6290] ? __ia32_sys_read+0x90/0x90 [ 243.287901][ T6290] ? task_work_run+0x15e/0x170 [ 243.292743][ T6290] __x64_sys_clone+0x12e/0x160 [ 243.297499][ T6290] do_syscall_64+0xcf/0x170 [ 243.302088][ T6290] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 243.308149][ T6290] RIP: 0033:0x7fc6bd11a969 [ 243.312559][ T6290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.332166][ T6290] RSP: 002b:00007fc6bb782fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 243.340781][ T6290] RAX: ffffffffffffffda RBX: 00007fc6bd341fa0 RCX: 00007fc6bd11a969 [ 243.348762][ T6290] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002000 [ 243.356819][ T6290] RBP: 00007fc6bb783090 R08: 0000000000000000 R09: 0000000000000000 [ 243.365003][ T6290] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 243.373251][ T6290] R13: 0000000000000000 R14: 00007fc6bd341fa0 R15: 00007ffcb5e84198 [ 246.963880][ T6359] FAULT_INJECTION: forcing a failure. [ 246.963880][ T6359] name failslab, interval 1, probability 0, space 0, times 0 [ 247.051899][ T6359] CPU: 0 PID: 6359 Comm: syz.5.2012 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 247.063105][ T6359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 247.073150][ T6359] Call Trace: [ 247.076437][ T6359] __dump_stack+0x1e/0x20 [ 247.080754][ T6359] dump_stack+0x15b/0x1b8 [ 247.085076][ T6359] ? thaw_kernel_threads+0x220/0x220 [ 247.090374][ T6359] ? show_regs_print_info+0x18/0x18 [ 247.095688][ T6359] should_fail+0x69e/0x7e0 [ 247.100103][ T6359] ? setup_fault_attr+0x230/0x230 [ 247.105124][ T6359] ? kvmalloc_node+0x88/0xf0 [ 247.109710][ T6359] __should_failslab+0x10c/0x150 [ 247.114815][ T6359] should_failslab+0x9/0x20 [ 247.119323][ T6359] __kmalloc+0x53/0x2f0 [ 247.123496][ T6359] ? alloc_fdtable+0x93/0x270 [ 247.128174][ T6359] kvmalloc_node+0x88/0xf0 [ 247.132581][ T6359] alloc_fdtable+0xd1/0x270 [ 247.137087][ T6359] ? kmem_cache_alloc+0xe2/0x270 [ 247.142113][ T6359] ? dup_fd+0x70/0xaf0 [ 247.146171][ T6359] dup_fd+0x786/0xaf0 [ 247.150152][ T6359] copy_files+0xc4/0x160 [ 247.154483][ T6359] ? dup_task_struct+0x640/0x640 [ 247.159416][ T6359] ? security_task_alloc+0xfb/0x130 [ 247.164604][ T6359] copy_process+0x10b5/0x2cf0 [ 247.169272][ T6359] ? proc_fail_nth_read+0x210/0x210 [ 247.174469][ T6359] ? fork_idle+0x1c0/0x1c0 [ 247.178885][ T6359] ? security_file_permission+0xde/0x300 [ 247.184619][ T6359] _do_fork+0x190/0x860 [ 247.188769][ T6359] ? __kasan_check_write+0x14/0x20 [ 247.193875][ T6359] ? copy_process+0x2cf0/0x2cf0 [ 247.198716][ T6359] ? __ia32_sys_read+0x90/0x90 [ 247.203728][ T6359] ? task_work_run+0x15e/0x170 [ 247.208485][ T6359] __x64_sys_clone+0x12e/0x160 [ 247.213259][ T6359] do_syscall_64+0xcf/0x170 [ 247.217764][ T6359] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 247.223877][ T6359] RIP: 0033:0x7f9ab7e1b969 [ 247.228287][ T6359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.247888][ T6359] RSP: 002b:00007f9ab6483fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 247.256293][ T6359] RAX: ffffffffffffffda RBX: 00007f9ab8042fa0 RCX: 00007f9ab7e1b969 [ 247.264342][ T6359] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000c2002000 [ 247.272304][ T6359] RBP: 00007f9ab6484090 R08: 0000000000000000 R09: 0000000000000000 [ 247.280263][ T6359] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 247.288234][ T6359] R13: 0000000000000000 R14: 00007f9ab8042fa0 R15: 00007ffe9f856b28 [ 249.653720][ T23] audit: type=1400 audit(1747833894.550:178): avc: denied { create } for pid=6387 comm="syz.0.2020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 254.491311][ T6425] device syzkaller0 entered promiscuous mode [ 260.194639][ T23] audit: type=1400 audit(1747833905.070:179): avc: denied { create } for pid=6527 comm="syz.1.2065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 262.572105][ T6588] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.579489][ T6588] bridge0: port 1(bridge_slave_0) entered disabled state [ 262.599546][ T6590] device wg2 left promiscuous mode [ 262.653143][ T6588] device bridge_slave_1 left promiscuous mode [ 262.670283][ T6588] bridge0: port 2(bridge_slave_1) entered disabled state [ 262.688075][ T6588] device bridge_slave_0 left promiscuous mode [ 262.698224][ T6588] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.959095][ T6707] 0: renamed from bond_slave_1 [ 267.061875][ T6743] device syzkaller0 entered promiscuous mode [ 269.923449][ T6776] bridge0: port 2(bridge_slave_1) entered disabled state [ 269.991632][ T6776] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.739045][ T6778] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.746107][ T6778] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.753410][ T6778] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.760729][ T6778] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.953389][ T6778] device bridge0 entered promiscuous mode [ 272.063001][ T359] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 275.617978][ T6939] device wg2 left promiscuous mode [ 275.675155][ T6939] device wg2 entered promiscuous mode [ 277.529845][ T23] audit: type=1400 audit(1747833922.430:180): avc: denied { create } for pid=6987 comm="syz.0.2215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 277.857815][ T7007] device sit0 entered promiscuous mode [ 284.598966][ T7182] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.942416][ T7179] O3c: renamed from bridge_slave_0 [ 285.579140][ T7214] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 287.030873][ T7293] : renamed from team_slave_1 [ 287.732916][ T23] audit: type=1400 audit(1747833932.630:181): avc: denied { create } for pid=7342 comm="syz.0.2330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 288.384077][ T7385] device syzkaller0 entered promiscuous mode [ 289.353323][ T7459] device syzkaller0 entered promiscuous mode [ 290.178997][ T7489] bridge0: port 2(bridge_slave_1) entered disabled state [ 290.186447][ T7489] device bridge0 left promiscuous mode [ 292.134802][ T7556] device syzkaller0 entered promiscuous mode [ 295.077488][ T23] audit: type=1400 audit(1747833939.970:182): avc: denied { create } for pid=7629 comm="syz.0.2425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 299.313500][ T7756] device syzkaller0 entered promiscuous mode [ 300.045208][ T7769] device syzkaller0 entered promiscuous mode [ 305.211081][ T23] audit: type=1400 audit(1747833950.110:183): avc: denied { create } for pid=7846 comm="syz.5.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 306.394862][ T7876] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 308.796918][ T7934] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 309.402109][ T7953] device wg2 left promiscuous mode [ 310.433889][ T7991] @: renamed from bond_slave_0 [ 310.766695][ T7990] device syzkaller0 entered promiscuous mode [ 317.814551][ T8081] device syzkaller0 entered promiscuous mode [ 322.796844][ T8150] device syzkaller0 entered promiscuous mode [ 323.023835][ T8149] device wg2 entered promiscuous mode [ 326.825940][ T8194] bridge0: port 1(bridge_slave_0) entered blocking state [ 326.990938][ T8194] bridge0: port 1(bridge_slave_0) entered disabled state [ 326.998555][ T8194] device bridge_slave_0 entered promiscuous mode [ 327.311562][ T8194] bridge0: port 2(bridge_slave_1) entered blocking state [ 327.467843][ T8194] bridge0: port 2(bridge_slave_1) entered disabled state [ 327.539876][ T8194] device bridge_slave_1 entered promiscuous mode [ 328.673839][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 328.970155][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.272405][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 329.496145][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 329.675928][ T3884] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.683516][ T3884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.742916][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 329.751681][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 329.760225][ T3884] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.767537][ T3884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 330.002547][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 330.181304][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.663227][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.753391][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 331.214327][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 331.590316][ T23] audit: type=1400 audit(1747833976.490:184): avc: denied { create } for pid=8227 comm="syz.3.2613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 331.716082][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 331.872137][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 332.065350][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 332.073609][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 332.493575][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 332.566800][ T23] audit: type=1400 audit(1747833977.460:185): avc: denied { mount } for pid=8194 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 332.616225][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.054127][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.419952][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 333.977986][ T23] audit: type=1400 audit(1747833977.510:186): avc: denied { unmount } for pid=8194 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 340.529996][ T23] audit: type=1400 audit(1747833985.430:187): avc: denied { create } for pid=8374 comm="syz.6.2655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 342.815789][ T23] audit: type=1400 audit(1747833987.700:188): avc: denied { create } for pid=8413 comm="syz.6.2666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 354.684043][ T8732] bridge0: port 2(bridge_slave_1) entered blocking state [ 354.691624][ T8732] bridge0: port 2(bridge_slave_1) entered forwarding state [ 354.699866][ T8732] bridge0: port 1(bridge_slave_0) entered blocking state [ 354.707194][ T8732] bridge0: port 1(bridge_slave_0) entered forwarding state [ 354.860011][ T8732] device bridge0 entered promiscuous mode [ 355.166572][ T8747] bridge0: port 1(bridge_slave_0) entered disabled state [ 355.317151][ T8750] O3c: renamed from bridge_slave_0 [ 355.820945][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 357.257582][ T8793] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 358.479902][ T8804] device sit0 left promiscuous mode [ 359.161460][ T8811] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.186340][ T8811] O3c: renamed from bridge_slave_0 [ 365.404912][ T8933] : renamed from pim6reg1 [ 366.225612][ T8949] device syzkaller0 entered promiscuous mode [ 369.775550][ T9009] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.860710][ T9009] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.937364][ T9009] device bridge_slave_0 entered promiscuous mode [ 370.009048][ T9009] bridge0: port 2(bridge_slave_1) entered blocking state [ 370.048915][ T9009] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.056506][ T9009] device bridge_slave_1 entered promiscuous mode [ 370.246518][ T9024] device lo left promiscuous mode [ 370.481870][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.519679][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.747563][ T9024] Q6\bY4: renamed from lo [ 371.359009][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 371.419452][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 371.509266][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 371.529381][ T3884] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.536521][ T3884] bridge0: port 1(bridge_slave_0) entered forwarding state [ 371.630706][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.639761][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.651062][ T23] audit: type=1400 audit(1747834016.550:189): avc: denied { unlink } for pid=145 comm="syslogd" name="messages.0" dev="tmpfs" ino=447 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 371.659437][ T3884] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.681307][ T3884] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.749615][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.789796][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.821016][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 371.834345][ T9035] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.841671][ T9035] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.890300][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 371.926801][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 372.039266][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 372.047908][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 372.056877][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 372.068235][ T3884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.113007][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 372.131721][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 372.371847][ T278] device bridge_slave_1 left promiscuous mode [ 372.380686][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.412175][ T278] device O3c left promiscuous mode [ 372.424596][ T278] bridge0: port 1(O3c) entered disabled state [ 373.917538][ T9078] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.925763][ T9078] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.658017][ T9089] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.666145][ T9089] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.677825][ T9089] device bridge_slave_0 entered promiscuous mode [ 374.703135][ T9089] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.714039][ T9089] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.722068][ T9089] device bridge_slave_1 entered promiscuous mode [ 375.371122][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 375.385512][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 375.394982][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 375.403613][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 375.412303][ T7998] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.419618][ T7998] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.430065][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 375.438489][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 375.526612][ T7998] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.534037][ T7998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.676204][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 376.437307][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 376.487885][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 376.528690][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 376.580727][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 376.624394][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 376.640149][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 376.648056][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 377.416044][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 377.424348][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 377.703125][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 377.741939][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 377.895459][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 377.968504][ T7998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 381.739136][ T278] device veth0_to_team left promiscuous mode [ 381.745331][ T278] : port 1(veth0_to_team) entered disabled state [ 381.875608][ T278] device bridge_slave_1 left promiscuous mode [ 381.926480][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 381.992046][ T278] device O3c left promiscuous mode [ 381.999805][ T278] bridge0: port 1(O3c) entered disabled state [ 385.852261][ T9251] device syzkaller0 entered promiscuous mode [ 386.048291][ T9262] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.055490][ T9262] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.187162][ T9263] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.194375][ T9263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 386.201700][ T9263] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.208718][ T9263] bridge0: port 1(bridge_slave_0) entered forwarding state [ 386.223544][ T9263] device bridge0 entered promiscuous mode [ 387.253033][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.927116][ T9333] device syzkaller0 entered promiscuous mode [ 391.034995][ T9374] bridge0: port 2(bridge_slave_1) entered disabled state [ 391.057373][ T9374] bridge0: port 1(bridge_slave_0) entered disabled state [ 391.181057][ T9374] device bridge0 left promiscuous mode [ 391.365828][ T9376] bridge0: port 2(bridge_slave_1) entered blocking state [ 391.372999][ T9376] bridge0: port 2(bridge_slave_1) entered forwarding state [ 391.380402][ T9376] bridge0: port 1(bridge_slave_0) entered blocking state [ 391.387423][ T9376] bridge0: port 1(bridge_slave_0) entered forwarding state [ 391.395653][ T9376] device bridge0 entered promiscuous mode [ 391.421964][ T9390] O3c: renamed from bridge_slave_0 [ 392.428930][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 393.181191][ T23] audit: type=1400 audit(1747834038.080:190): avc: denied { create } for pid=9437 comm="syz.6.2967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 397.615798][ T9565] device bridge0 entered promiscuous mode [ 400.039073][ T9609] FAULT_INJECTION: forcing a failure. [ 400.039073][ T9609] name failslab, interval 1, probability 0, space 0, times 0 [ 400.111531][ T9609] CPU: 0 PID: 9609 Comm: syz.6.3019 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 400.123091][ T9609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 400.133267][ T9609] Call Trace: [ 400.136562][ T9609] __dump_stack+0x1e/0x20 [ 400.140884][ T9609] dump_stack+0x15b/0x1b8 [ 400.145224][ T9609] ? thaw_kernel_threads+0x220/0x220 [ 400.150499][ T9609] ? check_preemption_disabled+0x9b/0x300 [ 400.156207][ T9609] ? show_regs_print_info+0x18/0x18 [ 400.161399][ T9609] should_fail+0x69e/0x7e0 [ 400.165806][ T9609] ? setup_fault_attr+0x230/0x230 [ 400.170827][ T9609] ? avc_has_perm_noaudit+0x30e/0x3f0 [ 400.176195][ T9609] ? kvmalloc_node+0x88/0xf0 [ 400.180773][ T9609] __should_failslab+0x10c/0x150 [ 400.185701][ T9609] should_failslab+0x9/0x20 [ 400.190192][ T9609] __kmalloc+0x53/0x2f0 [ 400.194337][ T9609] kvmalloc_node+0x88/0xf0 [ 400.198744][ T9609] alloc_netdev_mqs+0x88/0xc50 [ 400.203495][ T9609] ? memcpy+0x49/0x60 [ 400.207469][ T9609] ? strlcpy+0x89/0xd0 [ 400.211529][ T9609] ? IP6_ECN_decapsulate+0x1830/0x1830 [ 400.216974][ T9609] ip6_tnl_locate+0x52a/0x650 [ 400.221647][ T9609] ? ip6_tnl_link_config+0x8f0/0x8f0 [ 400.226939][ T9609] ip6_tnl_ioctl+0x717/0xe60 [ 400.231533][ T9609] ? ip6_tnl_start_xmit+0x1730/0x1730 [ 400.236890][ T9609] ? __mutex_lock+0x8e5/0xe30 [ 400.241571][ T9609] ? full_name_hash+0xa0/0xf0 [ 400.246241][ T9609] dev_ifsioc+0x6a1/0xa40 [ 400.250567][ T9609] ? full_name_hash+0xa0/0xf0 [ 400.255231][ T9609] ? dev_ioctl+0xb80/0xb80 [ 400.259637][ T9609] dev_ioctl+0x5ea/0xb80 [ 400.263869][ T9609] sock_ioctl+0x6a1/0x710 [ 400.268184][ T9609] ? sock_poll+0x2f0/0x2f0 [ 400.272589][ T9609] ? __vfs_write+0xf9/0x5d0 [ 400.277192][ T9609] ? fsnotify+0xdea/0xeb0 [ 400.281608][ T9609] ? avc_policy_seqno+0x1b/0x70 [ 400.286454][ T9609] ? check_preemption_disabled+0x9b/0x300 [ 400.292158][ T9609] ? sock_poll+0x2f0/0x2f0 [ 400.296563][ T9609] do_vfs_ioctl+0x753/0x13f0 [ 400.301145][ T9609] ? ioctl_preallocate+0x1c0/0x1c0 [ 400.306248][ T9609] ? __fget+0x3be/0x440 [ 400.310395][ T9609] ? fget_many+0x30/0x30 [ 400.314672][ T9609] ? ksys_write+0x1eb/0x240 [ 400.319165][ T9609] ? __ia32_sys_read+0x90/0x90 [ 400.324016][ T9609] ? security_file_ioctl+0x84/0xa0 [ 400.329223][ T9609] __x64_sys_ioctl+0xe1/0x120 [ 400.333893][ T9609] do_syscall_64+0xcf/0x170 [ 400.338387][ T9609] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 400.344292][ T9609] RIP: 0033:0x7fe76e240969 [ 400.348872][ T9609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 400.368466][ T9609] RSP: 002b:00007fe76c888038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 400.376955][ T9609] RAX: ffffffffffffffda RBX: 00007fe76e468080 RCX: 00007fe76e240969 [ 400.385036][ T9609] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000005 [ 400.392995][ T9609] RBP: 00007fe76c888090 R08: 0000000000000000 R09: 0000000000000000 [ 400.401049][ T9609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 400.409031][ T9609] R13: 0000000000000000 R14: 00007fe76e468080 R15: 00007ffcd1a4c268 [ 406.955723][ T9696] syzkaller0: mtu less than device minimum [ 413.143100][ T9840] device wg2 left promiscuous mode [ 413.314946][ T9840] device wg2 entered promiscuous mode [ 416.332465][ T9905] device syzkaller0 entered promiscuous mode [ 418.296142][ T9947] device syzkaller0 entered promiscuous mode [ 421.250579][T10013] device syzkaller0 entered promiscuous mode [ 425.758961][T10083] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.776374][T10083] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.789714][T10083] device bridge_slave_0 entered promiscuous mode [ 425.809258][T10083] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.834008][T10083] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.846817][T10083] device bridge_slave_1 entered promiscuous mode [ 426.251616][T10083] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.258729][T10083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.266142][T10083] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.273209][T10083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.512980][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 426.548994][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 426.621120][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 426.821699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 426.846753][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 426.976373][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.983449][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.153550][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 427.162485][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 427.171393][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.178603][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.187810][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 427.196336][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 427.204548][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 427.212972][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 427.306383][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 427.315936][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 427.344682][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 427.353175][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.459145][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 427.476313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 427.511010][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 427.545203][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 427.564549][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 427.583941][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 427.663444][ T278] device veth0_to_team left promiscuous mode [ 427.677142][ T278] : port 1(veth0_to_team) entered disabled state [ 427.853876][ T278] device bridge_slave_1 left promiscuous mode [ 427.860443][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.867837][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.594956][T10235] syz.0.3209 uses obsolete (PF_INET,SOCK_PACKET) [ 432.965395][T10279] device syzkaller0 entered promiscuous mode [ 437.368867][T10321] ================================================================== [ 437.376959][T10321] BUG: KASAN: use-after-free in detach_if_pending+0x12d/0x330 [ 437.384480][T10321] Write of size 8 at addr ffff8881d0ed71c0 by task syz.0.3232/10321 [ 437.392519][T10321] [ 437.394857][T10321] CPU: 1 PID: 10321 Comm: syz.0.3232 Tainted: G W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 437.406643][T10321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 437.416764][T10321] Call Trace: [ 437.420046][T10321] __dump_stack+0x1e/0x20 [ 437.424350][T10321] dump_stack+0x15b/0x1b8 [ 437.428658][T10321] ? show_regs_print_info+0x18/0x18 [ 437.433833][T10321] ? vprintk_func+0x19a/0x1e0 [ 437.438483][T10321] ? printk+0xcc/0x110 [ 437.442544][T10321] ? detach_if_pending+0x12d/0x330 [ 437.447717][T10321] print_address_description+0x8d/0x4c0 [ 437.453243][T10321] ? thaw_kernel_threads+0x220/0x220 [ 437.458511][T10321] ? schedule_timeout+0xa9/0x340 [ 437.463618][T10321] ? detach_if_pending+0x12d/0x330 [ 437.468713][T10321] __kasan_report+0xef/0x120 [ 437.473289][T10321] ? detach_if_pending+0x12d/0x330 [ 437.478386][T10321] kasan_report+0x30/0x60 [ 437.482714][T10321] __asan_report_store8_noabort+0x17/0x20 [ 437.488411][T10321] detach_if_pending+0x12d/0x330 [ 437.493325][T10321] del_timer_sync+0x136/0x1a0 [ 437.498103][T10321] tun_flow_uninit+0x2f/0x2b0 [ 437.502774][T10321] ? free_percpu+0x322/0x7f0 [ 437.507435][T10321] tun_free_netdev+0x7a/0x1b0 [ 437.512093][T10321] ? tun_xdp+0x400/0x400 [ 437.516317][T10321] netdev_run_todo+0xa45/0xc70 [ 437.521056][T10321] ? kvfree+0x4c/0x50 [ 437.525017][T10321] ? netdev_refcnt_read+0x1d0/0x1d0 [ 437.530194][T10321] ? netdev_state_change+0xa7/0x1a0 [ 437.535370][T10321] ? netdev_features_change+0x110/0x110 [ 437.541062][T10321] rtnl_unlock+0xe/0x10 [ 437.545300][T10321] tun_chr_close+0xc4/0x140 [ 437.549786][T10321] ? tun_chr_open+0x540/0x540 [ 437.554455][T10321] __fput+0x2a3/0x730 [ 437.558423][T10321] ____fput+0x15/0x20 [ 437.562543][T10321] task_work_run+0x146/0x170 [ 437.567117][T10321] do_exit+0xa43/0x2660 [ 437.571254][T10321] ? put_task_struct+0x90/0x90 [ 437.576124][T10321] ? __kasan_check_write+0x14/0x20 [ 437.581216][T10321] ? _raw_spin_lock_irq+0x8f/0xe0 [ 437.586215][T10321] ? _raw_spin_lock_irqsave+0x110/0x110 [ 437.591825][T10321] do_group_exit+0x13e/0x300 [ 437.596391][T10321] ? __kasan_check_write+0x14/0x20 [ 437.601473][T10321] get_signal+0xdee/0x13d0 [ 437.605864][T10321] do_signal+0xad/0xda0 [ 437.610008][T10321] ? map_create+0x351/0x980 [ 437.614481][T10321] ? signal_fault+0x1d0/0x1d0 [ 437.619128][T10321] ? __se_sys_bpf+0x2dc/0x570 [ 437.623810][T10321] ? debug_smp_processor_id+0x20/0x20 [ 437.629166][T10321] exit_to_usermode_loop+0xc4/0x1b0 [ 437.634341][T10321] prepare_exit_to_usermode+0x18e/0x1f0 [ 437.639859][T10321] do_syscall_64+0x13e/0x170 [ 437.644507][T10321] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 437.650459][T10321] RIP: 0033:0x7fde1c984969 [ 437.654852][T10321] Code: Bad RIP value. [ 437.658904][T10321] RSP: 002b:00007fde1afab038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 437.667622][T10321] RAX: fffffffffffffff4 RBX: 00007fde1cbac160 RCX: 00007fde1c984969 [ 437.675582][T10321] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 0000000000000000 [ 437.683542][T10321] RBP: 00007fde1ca06ab1 R08: 0000000000000000 R09: 0000000000000000 [ 437.691583][T10321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 437.699534][T10321] R13: 0000000000000001 R14: 00007fde1cbac160 R15: 00007fff37fd1fc8 [ 437.707489][T10321] [ 437.709825][T10321] The buggy address belongs to the page: [ 437.715479][T10321] page:ffffea000743b5c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 437.724571][T10321] flags: 0x8000000000000000() [ 437.729232][T10321] raw: 8000000000000000 ffffea000743b588 ffffea0007954908 0000000000000000 [ 437.737797][T10321] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 437.746714][T10321] page dumped because: kasan: bad access detected [ 437.753110][T10321] page_owner tracks the page as freed [ 437.758557][T10321] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x102dc2(GFP_HIGHUSER|__GFP_NOWARN|__GFP_ZERO) [ 437.770514][T10321] prep_new_page+0x35e/0x370 [ 437.775094][T10321] get_page_from_freelist+0x1296/0x1310 [ 437.780621][T10321] __alloc_pages_nodemask+0x202/0x4b0 [ 437.785984][T10321] __vmalloc_node_range+0x36a/0x6e0 [ 437.791172][T10321] vmalloc_user+0x73/0x80 [ 437.795480][T10321] kcov_mmap+0x2b/0x120 [ 437.799630][T10321] mmap_region+0x101b/0x15a0 [ 437.804337][T10321] do_mmap+0x826/0xd90 [ 437.808387][T10321] vm_mmap_pgoff+0x195/0x230 [ 437.812957][T10321] ksys_mmap_pgoff+0x16f/0x1e0 [ 437.817697][T10321] __x64_sys_mmap+0xfa/0x110 [ 437.822263][T10321] do_syscall_64+0xcf/0x170 [ 437.827202][T10321] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 437.833078][T10321] page last free stack trace: [ 437.837760][T10321] free_unref_page_prepare+0x2a9/0x3a0 [ 437.843192][T10321] __free_pages+0xaa/0x110 [ 437.847590][T10321] __vunmap+0x76a/0x8a0 [ 437.851814][T10321] vfree+0x61/0x90 [ 437.855516][T10321] kcov_mmap+0x8c/0x120 [ 437.859735][T10321] mmap_region+0x101b/0x15a0 [ 437.864301][T10321] do_mmap+0x826/0xd90 [ 437.868432][T10321] vm_mmap_pgoff+0x195/0x230 [ 437.872994][T10321] ksys_mmap_pgoff+0x16f/0x1e0 [ 437.877742][T10321] __x64_sys_mmap+0xfa/0x110 [ 437.882305][T10321] do_syscall_64+0xcf/0x170 [ 437.886793][T10321] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 437.892659][T10321] [ 437.894963][T10321] Memory state around the buggy address: [ 437.900584][T10321] ffff8881d0ed7080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 437.908618][T10321] ffff8881d0ed7100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 437.916674][T10321] >ffff8881d0ed7180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 437.924811][T10321] ^ [ 437.930956][T10321] ffff8881d0ed7200: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 437.939076][T10321] ffff8881d0ed7280: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 437.947198][T10321] ================================================================== [ 437.955226][T10321] Disabling lock debugging due to kernel taint SYZFAIL: failed to send rpc fd=3 want=48224 sent=0 n=-1 (errno 32: Broken pipe) [ 438.828908][ C0] BUG: kernel NULL pointer dereference, address: 0000000000000000 [ 438.836817][ C0] #PF: supervisor instruction fetch in kernel mode [ 438.843301][ C0] #PF: error_code(0x0010) - not-present page [ 438.849251][ C0] PGD 0 P4D 0 [ 438.852627][ C0] Oops: 0010 [#1] PREEMPT SMP KASAN [ 438.857806][ C0] CPU: 0 PID: 10 Comm: ksoftirqd/0 Tainted: G B W 5.4.292-syzkaller-00021-gcd8e74fa0fa3 #0 [ 438.869055][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 438.879173][ C0] RIP: 0010:0x0 [ 438.882607][ C0] Code: Bad RIP value. [ 438.886645][ C0] RSP: 0018:ffff8881f5dd7bd0 EFLAGS: 00010206 [ 438.892685][ C0] RAX: ffffffff8150a590 RBX: 0000000000000100 RCX: ffff8881f5dc6e40 [ 438.900804][ C0] RDX: 0000000080000100 RSI: 0000000000000000 RDI: ffff8881d0ed71c0 [ 438.908874][ C0] RBP: ffff8881f5dd7c10 R08: 0000000000000004 R09: 0000000000000003 [ 438.916963][ C0] R10: ffffed103ebbaf74 R11: 1ffff1103ebbaf74 R12: 00000001000035f0 [ 438.925032][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881d0ed71c0 [ 438.932988][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 438.941893][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 438.948453][ C0] CR2: ffffffffffffffd6 CR3: 0000000005c0e000 CR4: 00000000003406b0 [ 438.956403][ C0] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 438.964366][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 438.972327][ C0] Call Trace: [ 438.975614][ C0] call_timer_fn+0x3c/0x380 [ 438.980204][ C0] __run_timers+0x81d/0xb60 [ 438.984687][ C0] ? enqueue_timer+0x2c0/0x2c0 [ 438.989433][ C0] ? check_preemption_disabled+0x9b/0x300 [ 438.995143][ C0] ? sched_clock_cpu+0x1b/0x390 [ 439.000069][ C0] ? __schedule+0xa57/0x12a0 [ 439.004644][ C0] run_timer_softirq+0x6a/0xf0 [ 439.009390][ C0] __do_softirq+0x236/0x660 [ 439.013875][ C0] ? ksoftirqd_should_run+0x20/0x20 [ 439.019058][ C0] run_ksoftirqd+0x23/0x30 [ 439.023456][ C0] smpboot_thread_fn+0x474/0x850 [ 439.028383][ C0] kthread+0x31e/0x3a0 [ 439.032520][ C0] ? cpu_report_death+0x190/0x190 [ 439.037524][ C0] ? kthread_blkcg+0xd0/0xd0 [ 439.042272][ C0] ret_from_fork+0x1f/0x30 [ 439.046703][ C0] Modules linked in: [ 439.050672][ C0] CR2: 0000000000000000 [ 439.054806][ C0] ---[ end trace e96f2c985f5d6991 ]--- [ 439.060248][ C0] RIP: 0010:0x0 [ 439.063707][ C0] Code: Bad RIP value. [ 439.067840][ C0] RSP: 0018:ffff8881f5dd7bd0 EFLAGS: 00010206 [ 439.073883][ C0] RAX: ffffffff8150a590 RBX: 0000000000000100 RCX: ffff8881f5dc6e40 [ 439.081924][ C0] RDX: 0000000080000100 RSI: 0000000000000000 RDI: ffff8881d0ed71c0 [ 439.089880][ C0] RBP: ffff8881f5dd7c10 R08: 0000000000000004 R09: 0000000000000003 [ 439.097832][ C0] R10: ffffed103ebbaf74 R11: 1ffff1103ebbaf74 R12: 00000001000035f0 [ 439.105792][ C0] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff8881d0ed71c0 [ 439.113746][ C0] FS: 0000000000000000(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 439.122660][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 439.129224][ C0] CR2: ffffffffffffffd6 CR3: 0000000005c0e000 CR4: 00000000003406b0 [ 439.137180][ C0] DR0: 0000000000000000 DR1: 0000200000000300 DR2: 0000000000000000 [ 439.145134][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 439.153087][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 439.160469][ C0] Kernel Offset: disabled [ 439.165042][ C0] Rebooting in 86400 seconds..