last executing test programs: 4.108195802s ago: executing program 3 (id=4941): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8f41c288d409ef0e169a340295f36d4b4", &(0x7f0000000280), 0x5, r1}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r2, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907021175f37538e486dd6300a273000000000000686158bbcfe8875a06030000ff23000000000000000000000000ac1414aa3b"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000008c0)={r2, 0xe0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2, &(0x7f0000000340)=[0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0], 0x0, 0xf6, &(0x7f0000000540)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0x34, 0x8, 0x8, &(0x7f0000000780)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x68, '\x00', 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000040)="c5", 0x0, 0x3, 0x700}, 0x50) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x8, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000740)={'dvmrp1\x00', @local}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r9}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.549879469s ago: executing program 3 (id=4944): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0xd1, &(0x7f00000004c0)=""/209}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7280000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 2.972309548s ago: executing program 3 (id=4953): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000280), &(0x7f0000000380)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r3}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800082}, 0x10}, 0x90) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000069000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'vlan1\x00', @random='\x003\x00'}) 1.953236735s ago: executing program 2 (id=4963): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x5, 0x2, 0x4}, 0x48) close(r0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0x0, 0x8, 0x8, 0x4, 0x18, 0x10}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}]}, &(0x7f0000000680)='syzkaller\x00', 0x2, 0xdc, &(0x7f0000000700)=""/220, 0x41000, 0x20, '\x00', r1, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x9, 0x7, 0xfffffd72}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000940)=[r0, r0, r3, r0, r0, r3], 0x0, 0x10, 0x7}, 0x90) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x18, 0xe, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x3}, [@alu={0x7, 0x0, 0x8, 0x8, 0x4, 0x18, 0x10}, @map_idx_val={0x18, 0x5, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x101}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}]}, &(0x7f0000000680)='syzkaller\x00', 0x2, 0xdc, &(0x7f0000000700)=""/220, 0x41000, 0x20, '\x00', r1, 0x0, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000800)={0x5, 0x9, 0x7, 0xfffffd72}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000940)=[r0, r0, r3, r0, r0, r3], 0x0, 0x10, 0x7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000080)='mm_compaction_begin\x00', r4}, 0x10) write$cgroup_subtree(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x8, 0x0, 0x9, 0x0, 0xfffffffffffeffff, 0x4024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46e8, 0x0, 0x0, 0x0, 0x10000040001}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x20, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x20, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) write$cgroup_int(r7, &(0x7f0000000080)=0x6, 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317ce6203c23c00fe800000"], 0xfe1b) (async) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317ce6203c23c00fe800000"], 0xfe1b) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) (async) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_type(r8, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r9, &(0x7f0000000280), 0x9) gettid() r10 = openat$cgroup_procs(r8, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'pimreg\x00', 0x210}) write$cgroup_pid(r10, &(0x7f0000000c40), 0x12) (async) write$cgroup_pid(r10, &(0x7f0000000c40), 0x12) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b420000000004c000000000063000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) openat$cgroup_procs(r8, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 1.925534437s ago: executing program 1 (id=4964): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x101000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x10) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) 1.807987017s ago: executing program 2 (id=4965): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0xd1, &(0x7f00000004c0)=""/209}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7280000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 1.259452024s ago: executing program 4 (id=4966): bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f00000008c0)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r0, 0x58, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@func={0xc, 0x0, 0x0, 0xc, 0x3}]}, {0x0, [0x5f, 0x30]}}, &(0x7f0000000580)=""/96, 0x28, 0x60, 0x1, 0x2}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x10001, 0x81, 0x4, 0x104, 0xffffffffffffffff, 0x7, '\x00', r2, r3, 0x1, 0x2, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18040000000000000000000000400000850000009900000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r5, 0x4b49, 0x2000000c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000f4ff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x2e) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) write$cgroup_type(0xffffffffffffffff, &(0x7f00000003c0), 0x9) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r8}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.196476319s ago: executing program 1 (id=4967): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000080000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='module_request\x00', r1}, 0x10) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x2801}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r2, @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f060b79", 0x4}], 0x1}, 0x40) recvmsg(r5, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=""/78, 0x4e}], 0x1}, 0x12000) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000ec0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=@base={0x9, 0x5, 0x20009, 0x7}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{r8, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r9, &(0x7f0000000000), 0x0}, 0x20) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r11}, 0x10) 1.151418533s ago: executing program 0 (id=4968): r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000002c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.130882975s ago: executing program 2 (id=4969): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) setsockopt$sock_attach_bpf(r1, 0x1, 0x22, &(0x7f0000000280), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001400) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/103, 0x67}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.114902346s ago: executing program 0 (id=4970): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000600), &(0x7f0000000540)=""/154}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x2, 0xe68c}, 0x10210, 0x88, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000140)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40305829, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="850000002200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r5, 0x0, 0x36, 0x0, &(0x7f00000004c0)="348b0d151f8218e2c73697e4080049c416b90900000093321cfc5e8b99025e8b9900683341b35e6d1276299a0e3e29968c2974f50acc", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9f080100180000001e00"/20], 0x0, 0x1a}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={0xffffffffffffffff, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.028467073s ago: executing program 1 (id=4971): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000020000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_freezer_state(r1, &(0x7f00000001c0), 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfdcc) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x400000) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x5, &(0x7f0000000500)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x401, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r5, 0x0, &(0x7f00000003c0)=""/91}, 0x20) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="e5208bec8241db22cc8d156604448929965ca26e44bb2702cfc91157d1a5f1770d8621229df85cab328196c96950130917b639a92b24fa51fb89621ab4a2b1c648fbed46093accafb7f1b75a632cc1d0af9d"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0xd6, 0x9, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000004000071103b00000000b2b68ca04a2ce1c401"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) 972.705868ms ago: executing program 4 (id=4972): r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000002c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 934.303401ms ago: executing program 4 (id=4973): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1f, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x11, &(0x7f0000000800)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000023"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) close(r3) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r6) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r6) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) 889.417885ms ago: executing program 3 (id=4974): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x0, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000004055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open$cgroup(&(0x7f0000000500)={0x4, 0x80, 0x7, 0x20, 0x80, 0x4, 0x0, 0x6, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x198, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x0, 0x9, 0xff, 0x9, 0x4, 0x200, 0x3, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000dc0)={0x6, 0x17, &(0x7f0000000800)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7}, {}, {}, [@exit, @cb_func={0x18, 0xb, 0x4, 0x0, 0xffffffffffffffff}, @map_fd={0x18, 0x1}, @map_val={0x18, 0x1}, @call={0x85, 0x0, 0x0, 0x99}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000006c0)='GPL\x00', 0x9, 0x14, &(0x7f00000008c0)=""/20, 0x41000, 0x23, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000d80)=[{0x0, 0x3, 0xa, 0xa}], 0x10, 0x9}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000f80)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x41000}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) close(r1) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x1b, &(0x7f0000000000)='/proc/t/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee\x00\x00'}, 0x30) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x3ff, 0x22a0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc87, 0x0, @perf_bp={&(0x7f00000000c0), 0x7}, 0x0, 0x0, 0x7, 0x7, 0x9875352, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x9, 0xffffffffffffffff, 0x1) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1, 0x0, 0x0, 0xf5}, 0x1f) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0xa, 0x0, 0x0, 0x0, 0x5, 0xd3, &(0x7f0000000500)=""/211, 0x0, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x1393543e0e0c9a14, 0x0, '\x00', 0x0, 0x7a0fbe8c97c053ab, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x4, 0x6, 0x0, 0x42}, 0x48) 874.285666ms ago: executing program 2 (id=4975): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f00000004c0)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x3}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r7) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r7, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(0x3) 846.610598ms ago: executing program 0 (id=4976): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8, 0x0, 0x1}, 0x48) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000003040)={&(0x7f0000002d40), 0x6e, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) (async) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) (async) sendmsg$inet(r2, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000d00)={0x0}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) (async) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0xa, [@enum={0x7, 0x1, 0x0, 0x6, 0x4, [{0x7}]}, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0xffff, [{0x1, 0x1}]}]}, {0x0, [0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, 0x2e]}}, 0x0, 0x4e}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffff7f}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 781.500564ms ago: executing program 1 (id=4977): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0), 0x101000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x10) close(r1) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000400)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) 740.499248ms ago: executing program 4 (id=4978): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/1952], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000900), 0x4) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x3}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xa, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00'}, 0x10) 714.12271ms ago: executing program 0 (id=4979): bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) write$cgroup_type(r0, &(0x7f0000000080), 0x11ffffce1) r1 = getpid() perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x8, 0x6, 0xd, 0x2, 0x0, 0x9, 0x44, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x4010, 0x2, 0x2, 0x7, 0x8000000000000000, 0x7, 0x5, 0x0, 0xb8b, 0x0, 0xffff}, r1, 0x7, r0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0xfffffff6) socketpair(0x1f, 0x3, 0xef, &(0x7f0000000280)) 296.690235ms ago: executing program 1 (id=4980): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="1b23000d"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x5, &(0x7f0000000040)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x5}, @call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000140)='syzkaller\x00', 0x4, 0xd1, &(0x7f00000004c0)=""/209}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7280000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r2}, &(0x7f0000000540), &(0x7f0000000580)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r2, &(0x7f0000000780)}, 0x20) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r6, 0x401054d5, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) 142.496118ms ago: executing program 2 (id=4981): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082", @ANYRESDEC=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x19, 0xf, 0xfffffff2, 0x10001, 0x10, r6, 0xd5, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)=@generic={&(0x7f0000000000)='./file0\x00', r7}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800"/16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r10}, 0x10) 142.021558ms ago: executing program 0 (id=4982): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_process_fork\x00', r5}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c540000001f061ff95"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffefb}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x3, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7968dd986c6a6700020006aa"], 0xfdef) 139.146229ms ago: executing program 3 (id=4983): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000071121200000000009500000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x38, 0x38, 0xa, [@volatile={0x5, 0x0, 0x0, 0x9, 0x3}, @fwd={0xe}, @var={0x7, 0x0, 0x0, 0xe, 0x3}, @var={0x1, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x0, 0x5f, 0x30, 0x61, 0x30, 0x61, 0x5f, 0x2e]}}, &(0x7f0000000040)=""/41, 0x5a, 0x29, 0x1, 0x400}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES32=r2], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffd34, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000004000000000b703000000000000850000000c000000b7000000000000001801000006646c2500000000002020207bfdff0000000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180000000000000000000000000000009500000000000000fd3ae10435ad542e855b4bd801025955e33636bef253b9510eee7fe143379732e1261b", @ANYRES64=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x11, 0x4, 0x4, 0x2, 0x21, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000011b000a150e6d8b76d0101fb000000000080030000002f000000000000"], &(0x7f0000000000)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000000)='ext4_allocate_inode\x00'}, 0x10) unlink(&(0x7f0000000000)='./cgroup.cpu/cpuset.cpus/file0\x00') r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r5}, 0x10) write$cgroup_int(r4, &(0x7f0000000200), 0x43451) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_int(r6, &(0x7f0000000200), 0x43451) 108.243081ms ago: executing program 4 (id=4984): r0 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r0, &(0x7f00000002c0), 0x12) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 100.603482ms ago: executing program 3 (id=4985): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x14, 0x4, 0x8, 0x2000004, 0x0, 0x1}, 0x48) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x8400, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x1, 0x9, 0x20, 0x81, 0x0, 0x4, 0x5a80, 0x6, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1af, 0x1, @perf_bp={&(0x7f00000002c0), 0x3}, 0x802, 0xff, 0x1, 0x7, 0x0, 0x3, 0x2, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x2, 0xffffffffffffffff, 0x1) r2 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, r1, 0x9) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x2, 0x20, 0x0, 0x400, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000010c0), 0x4}, 0x8006, 0x0, 0x0, 0x1, 0xad, 0x800000, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, r2, 0x9) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x6, 0x0, 0x0, 0xffffffff, 0x20, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x6}, 0x90825, 0x100000000, 0x2, 0x5, 0x323, 0x8, 0x60, 0x0, 0x2, 0x0, 0x1984}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='&\x00') bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000cc0)={0xffffffffffffffff, 0x20, &(0x7f0000000480)={&(0x7f0000000780)=""/52, 0x34, 0x0, &(0x7f0000000680)=""/43, 0x2b}}, 0x10) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000740)={0x1b, 0x0, 0x0, 0xa5, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1b, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="180000000006000000180100002020702500000000002020207b1af8ff00000000bfa1000000000000070100000300ffffb702000008000000b703000004000000850000000600000005000000000000009500"/96], &(0x7f0000000400)='syzkaller\x00', 0x100, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, &(0x7f0000000600)={0x9}, 0x8, 0x10, &(0x7f0000000640)={0x4, 0x0, 0x100, 0x3}, 0x10, r3, 0xffffffffffffffff, 0x7, &(0x7f0000000300)=[0x1, 0xffffffffffffffff, r4, 0xffffffffffffffff, r0], &(0x7f0000000800)=[{0x3, 0x0, 0x6, 0x7}, {0x4, 0x4, 0xd}, {0x5, 0x1, 0xc, 0x3}, {0x0, 0x0, 0x6}, {0x2, 0x5, 0xf}, {0x0, 0x3}, {0x3, 0x0, 0x10, 0x2}], 0x10, 0x8}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@bloom_filter={0x1e, 0x400, 0xffffffc1, 0x401, 0x2b09, r4, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x80000003, 0x4}, 0x48) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cgroup.controllers\x00', 0x100002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x29}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000006c0)={r0, 0x58, &(0x7f0000000b40)}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0xc028660f, &(0x7f00000005c0)=0x3fffffffe) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000640)=0x915b) bpf$ITER_CREATE(0x21, &(0x7f0000000e00)={r5}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x0, 0x7, &(0x7f0000000500)=ANY=[@ANYBLOB="18891d5d7d925ef0f40000068d000000c8c8763177a32ddaeeb5e4e637de2c294000f0ffffffffffff7f", @ANYRESDEC, @ANYRES16], &(0x7f0000001280)='GPL\x00', 0x203ff, 0x99, &(0x7f00000012c0)=""/153, 0x0, 0x20, '\x00', 0x0, 0x0, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000640)={0x3, 0x7, 0xfffffffe, 0x6243}, 0x10, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000680)=[{0x1, 0x5, 0xc, 0x1}, {0x5, 0x3, 0x5, 0xc}, {0x5, 0x5, 0x8, 0xc}], 0x10, 0x8000}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000940), 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40001) 89.753393ms ago: executing program 1 (id=4986): mkdir(&(0x7f0000000200)='./cgroup\x00', 0x1) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001a40)=ANY=[@ANYBLOB="b70200000f000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000010000006a0a00fe00000000850000000d000000bf0000000000000095000000000000005ecefab8f2e85c6c1ca711fc206bb8ad6ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bd04000000000000009c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5f683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891184604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e101d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe151acc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394b9ba1a836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429ba63903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6d6fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f25005798ca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9958fad67ccaba76408da35c9f1534c8bd48bbdf9594e8b4ce73febaefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb3b379e221a5318849b6b0679b5d65ab855fc9f1d10022cc20603480ffb1e3392fad690ce56aaa717e56fd55aec3d9d6671f55d7bc33830a4095497586e8d15c2a32d3176d45b783cb27112a69c14134488b6dd302c3e92a7e659351b610ed5ba022f92d4bf26b0a5c10a3c8eb0fabdf0017995ea0c06b41fe6dda769729328d6ee80ab3b4aeeeee7926575d526431184b2034b5cdacc8eaab03cf45af6ec451f65705d8a4375d559e4c3ad80e942d237616d8f2fdd5afe4fdf21478228d9f6299bf67cf1e62fc11c285e18fb65eeb657bc7375401bb175f6d2625195ce8647945dbdfb7eacc06a24832d155059b0f0c36b9433eff190f4c4c160f0484d4d39f5f92e8bd49ad3df23b961fe7bf9e506c5098ca79deb7906257e4ce9035f3a6b29453ee41640ade8b5916f38d19ab6f2fd51a9fd9a2559411967460952acf5c549e5466ee2d8563397a5f028486220fae69611d9bc0f1a68d31ad1a4e387de687ab1537bd46703e4e5ae0f096f731916628bf743a49ea7b7d22c04d738ca439343aaab682d45dc91187e9ff08005358e1f3d864f36ee590fb0da9c958f15f9105c41add43a7c28874e58c31a7acb0467e0bd97f2ccd78615b5144267772381e7498bb98d9e8a3f98b505e5c9645e19d011dd86a1dc134fa4b21ff8ec2d054ae7e0044b4700cd54ce392c2ee515e86070f2df561c15f331a1babfa60504410fa56a848ba1f501c8eb0bd6856451d150cfaf95d6dc889be27e8915bb3670fc76bcbeb390f3cefb5429c84907a92c6eab2b15758194ece4b1461f622510bcff5c0f8354637856f94d71a0841180e78a3a837ae7847c479f5c9c54859cb85393f190042a5dc31197f2c463be8affe29869d71df330b3466fc79b3488b4a2a3e2aae9af6421cd0902347103f2384bf08e5230b37297b668be11b4428b9a8e8c259afa6c73dd87fcc165b2fea66a180bf048530a5849f849d37aca6874cb1d50defdb90b3da04a575db38825db87f6bb0013a5dabcc0e9783aaac0cbb5d6fc437f1e77bf69cae31a213ca2b90ece8cc70fa320c9ffd05618e7a6e6cf8ada6b3e62557174b6d3516cc0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x6b, 0x60000000}, 0x2c) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r1, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb0100180000000000000078000000780000000800000000000000000000030000000002000000040000000b0000000b00000007000085060000000b0000000000000002000000010000000100f400000800000d00000004000000470f00000e0000000200000001000000040000000000000000000000010000000100000078eb000000000000010000000100010000610061612e5f00"], &(0x7f00000002c0)=""/49, 0x98, 0x31, 0x1, 0x7}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000700)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r7], &(0x7f0000000640)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x17, r9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xc, 0x4, &(0x7f0000001580)=ANY=[@ANYBLOB="b40200000000000061114c000000000085000000870000009500000000000000e533d03998d88ada3aae159497d9c67b7cf5213848c81c24be2e32850d138b018c2f19021a67c19b65ee609417cb646c8aa76ad4c7b9f536b2e55129db3d9f31ef1f94bba98f93cf4c6fbfe35991a7608545191f5e2e0208dcf91775e18787dab27fc2ad54c3a65db2691c1e4b6e5ff0cd0ae87468d6eb14c5f6e67c692cb63b1f3b8c20ee09ce7c5d9032158cee3287e7bb4cdfe44b83096144139c1e7ef76f09"], &(0x7f0000000380)='GPL\x00', 0x5, 0xff92, &(0x7f00000003c0)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x36c, 0x10, &(0x7f0000000000), 0x26}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000010018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 52.040166ms ago: executing program 0 (id=4987): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000020000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_freezer_state(r1, &(0x7f00000001c0), 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0xfdcc) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x400000) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x11, 0x5, &(0x7f0000000500)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x401, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={r5, 0x0, &(0x7f00000003c0)=""/91}, 0x20) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000600)=ANY=[@ANYBLOB="e5208bec8241db22cc8d156604448929965ca26e44bb2702cfc91157d1a5f1770d8621229df85cab328196c96950130917b639a92b24fa51fb89621ab4a2b1c648fbed46093accafb7f1b75a632cc1d0af9d"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x1, 0xd6, 0x9, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000200)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000004000071103b00000000b2b68ca04a2ce1c401"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) 51.191666ms ago: executing program 4 (id=4988): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xa, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000a9000000000000000200000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events.local\x00', 0x26e1, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x9, 0x5, 0x6, 0x4}, 0x48) (async) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r3}, 0x10) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0xe, 0x0, &(0x7f0000000b80)='GPL\x00'}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) 0s ago: executing program 2 (id=4989): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{0x1}, &(0x7f0000000080), &(0x7f0000000200)='%pB \x00'}, 0x20) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x10000, 0x2, 0x9, 0x34, r0, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x10003, 0x0, 0x9}, 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r3}, 0xc) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x22, &(0x7f00000006c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2}, {}, {}, [@alu={0x7, 0x0, 0xb, 0xa, 0x4, 0xfffffffffffffffe, 0xffffffffffffffff}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4443}}, @map_val={0x18, 0x0, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0xbb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x5}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x8001, 0x0, 0x0, 0x0, 0xa}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000000)=0x9e3) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40001) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) kernel console output (not intermixed with test programs): ] ? putname+0xe7/0x140 [ 364.655801][T10212] ? do_sys_openat2+0x1fc/0x710 [ 364.660491][T10212] ? __x64_sys_openat+0x243/0x290 [ 364.665437][T10212] ? do_syscall_64+0x34/0x70 [ 364.669864][T10212] ? _kstrtoull+0x3a0/0x4a0 [ 364.674203][T10212] ? kstrtouint_from_user+0x20a/0x2a0 [ 364.679415][T10212] ? kstrtol_from_user+0x310/0x310 [ 364.684358][T10212] ? memset+0x35/0x40 [ 364.688180][T10212] ? __fsnotify_parent+0x4b9/0x6c0 [ 364.693126][T10212] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 364.699720][T10212] ? proc_fail_nth_write+0x20b/0x290 [ 364.704841][T10212] ? proc_fail_nth_read+0x210/0x210 [ 364.709877][T10212] ? security_file_permission+0x86/0xb0 [ 364.715258][T10212] ? rw_verify_area+0x1c3/0x360 [ 364.719943][T10212] ? preempt_count_add+0x92/0x1a0 [ 364.724804][T10212] ? vfs_write+0x852/0xe70 [ 364.729056][T10212] ? kmem_cache_free+0xa9/0x1e0 [ 364.733741][T10212] ? kernel_write+0x3d0/0x3d0 [ 364.738256][T10212] ? __kasan_check_write+0x14/0x20 [ 364.743211][T10212] ? mutex_lock+0xa5/0x110 [ 364.747459][T10212] ? mutex_trylock+0xa0/0xa0 [ 364.751884][T10212] ? __kasan_check_write+0x14/0x20 [ 364.756827][T10212] ? fput_many+0x160/0x1b0 [ 364.761091][T10212] ? debug_smp_processor_id+0x17/0x20 [ 364.766286][T10212] __x64_sys_bpf+0x7b/0x90 [ 364.770541][T10212] do_syscall_64+0x34/0x70 [ 364.774797][T10212] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 364.780522][T10212] RIP: 0033:0x7faec5d08e79 [ 364.784780][T10212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.804219][T10212] RSP: 002b:00007faec4986038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 364.812462][T10212] RAX: ffffffffffffffda RBX: 00007faec5ea4f80 RCX: 00007faec5d08e79 [ 364.820271][T10212] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 364.828081][T10212] RBP: 00007faec4986090 R08: 0000000000000000 R09: 0000000000000000 [ 364.835892][T10212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 364.843709][T10212] R13: 0000000000000000 R14: 00007faec5ea4f80 R15: 00007fff1aa59698 [ 365.293700][T10265] FAULT_INJECTION: forcing a failure. [ 365.293700][T10265] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 365.320765][T10265] CPU: 0 PID: 10265 Comm: syz.3.3288 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 365.331949][T10265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 365.341844][T10265] Call Trace: [ 365.344976][T10265] dump_stack_lvl+0x1e2/0x24b [ 365.349499][T10265] ? bfq_pos_tree_add_move+0x43b/0x43b [ 365.354788][T10265] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 365.360684][T10265] dump_stack+0x15/0x17 [ 365.364673][T10265] should_fail+0x3c6/0x510 [ 365.368931][T10265] should_fail_alloc_page+0x52/0x60 [ 365.373962][T10265] __alloc_pages_nodemask+0x1b3/0xaf0 [ 365.379175][T10265] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 365.384550][T10265] ? __kasan_kmalloc+0x9/0x10 [ 365.389062][T10265] ? __vmalloc_node_range+0x2a9/0x7c0 [ 365.394269][T10265] __vmalloc_node_range+0x36c/0x7c0 [ 365.399308][T10265] bpf_map_area_alloc+0xd9/0xf0 [ 365.403991][T10265] ? prealloc_init+0x13b/0x7f0 [ 365.408589][T10265] prealloc_init+0x13b/0x7f0 [ 365.413018][T10265] ? __kmalloc+0x1aa/0x330 [ 365.417270][T10265] htab_map_alloc+0x68d/0x950 [ 365.421776][T10265] __se_sys_bpf+0x620f/0x11cb0 [ 365.426373][T10265] ? stack_trace_save+0x113/0x1c0 [ 365.431235][T10265] ? terminate_walk+0x407/0x4f0 [ 365.435917][T10265] ? stack_trace_snprint+0xf0/0xf0 [ 365.440865][T10265] ? kmem_cache_free+0xa9/0x1e0 [ 365.445550][T10265] ? kmem_cache_free+0xa9/0x1e0 [ 365.450238][T10265] ? kasan_set_track+0x5d/0x70 [ 365.454838][T10265] ? __x64_sys_bpf+0x90/0x90 [ 365.459265][T10265] ? __kasan_slab_free+0x11/0x20 [ 365.464036][T10265] ? slab_free_freelist_hook+0xc0/0x190 [ 365.469420][T10265] ? kmem_cache_free+0xa9/0x1e0 [ 365.474106][T10265] ? putname+0xe7/0x140 [ 365.478098][T10265] ? do_sys_openat2+0x1fc/0x710 [ 365.482783][T10265] ? __x64_sys_openat+0x243/0x290 [ 365.487645][T10265] ? do_syscall_64+0x34/0x70 [ 365.492073][T10265] ? _kstrtoull+0x3a0/0x4a0 [ 365.496411][T10265] ? kstrtouint_from_user+0x20a/0x2a0 [ 365.501622][T10265] ? kstrtol_from_user+0x310/0x310 [ 365.506567][T10265] ? memset+0x35/0x40 [ 365.510384][T10265] ? __fsnotify_parent+0x4b9/0x6c0 [ 365.515333][T10265] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 365.521926][T10265] ? proc_fail_nth_write+0x20b/0x290 [ 365.527061][T10265] ? proc_fail_nth_read+0x210/0x210 [ 365.532084][T10265] ? security_file_permission+0x86/0xb0 [ 365.537464][T10265] ? rw_verify_area+0x1c3/0x360 [ 365.542151][T10265] ? preempt_count_add+0x92/0x1a0 [ 365.547015][T10265] ? vfs_write+0x852/0xe70 [ 365.551264][T10265] ? kmem_cache_free+0xa9/0x1e0 [ 365.555949][T10265] ? kernel_write+0x3d0/0x3d0 [ 365.560464][T10265] ? __kasan_check_write+0x14/0x20 [ 365.565409][T10265] ? mutex_lock+0xa5/0x110 [ 365.569661][T10265] ? mutex_trylock+0xa0/0xa0 [ 365.574091][T10265] ? __kasan_check_write+0x14/0x20 [ 365.579037][T10265] ? fput_many+0x160/0x1b0 [ 365.583296][T10265] ? debug_smp_processor_id+0x17/0x20 [ 365.588497][T10265] __x64_sys_bpf+0x7b/0x90 [ 365.592751][T10265] do_syscall_64+0x34/0x70 [ 365.597006][T10265] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 365.602728][T10265] RIP: 0033:0x7f1edaa72e79 [ 365.606987][T10265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.626424][T10265] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 365.634666][T10265] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 365.642476][T10265] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 365.650288][T10265] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 365.658099][T10265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 365.665911][T10265] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 366.333865][T10315] device pim6reg1 entered promiscuous mode [ 366.358355][T10318] FAULT_INJECTION: forcing a failure. [ 366.358355][T10318] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 366.390891][T10318] CPU: 1 PID: 10318 Comm: syz.3.3303 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 366.402072][T10318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 366.411961][T10318] Call Trace: [ 366.415095][T10318] dump_stack_lvl+0x1e2/0x24b [ 366.419608][T10318] ? bfq_pos_tree_add_move+0x43b/0x43b [ 366.424899][T10318] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 366.430798][T10318] dump_stack+0x15/0x17 [ 366.434789][T10318] should_fail+0x3c6/0x510 [ 366.439046][T10318] should_fail_alloc_page+0x52/0x60 [ 366.444077][T10318] __alloc_pages_nodemask+0x1b3/0xaf0 [ 366.449289][T10318] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 366.454667][T10318] ? __kasan_kmalloc+0x9/0x10 [ 366.459180][T10318] ? __vmalloc_node_range+0x2a9/0x7c0 [ 366.464386][T10318] __vmalloc_node_range+0x36c/0x7c0 [ 366.469424][T10318] bpf_map_area_alloc+0xd9/0xf0 [ 366.474106][T10318] ? prealloc_init+0x13b/0x7f0 [ 366.478709][T10318] prealloc_init+0x13b/0x7f0 [ 366.483132][T10318] ? __kmalloc+0x1aa/0x330 [ 366.487396][T10318] htab_map_alloc+0x68d/0x950 [ 366.491925][T10318] __se_sys_bpf+0x620f/0x11cb0 [ 366.496515][T10318] ? stack_trace_save+0x113/0x1c0 [ 366.501362][T10318] ? terminate_walk+0x407/0x4f0 [ 366.506045][T10318] ? stack_trace_snprint+0xf0/0xf0 [ 366.510993][T10318] ? kmem_cache_free+0xa9/0x1e0 [ 366.515678][T10318] ? kmem_cache_free+0xa9/0x1e0 [ 366.520367][T10318] ? kasan_set_track+0x5d/0x70 [ 366.524967][T10318] ? __x64_sys_bpf+0x90/0x90 [ 366.529394][T10318] ? __kasan_slab_free+0x11/0x20 [ 366.534164][T10318] ? slab_free_freelist_hook+0xc0/0x190 [ 366.539554][T10318] ? kmem_cache_free+0xa9/0x1e0 [ 366.544233][T10318] ? putname+0xe7/0x140 [ 366.548225][T10318] ? do_sys_openat2+0x1fc/0x710 [ 366.552909][T10318] ? __x64_sys_openat+0x243/0x290 [ 366.557773][T10318] ? do_syscall_64+0x34/0x70 [ 366.562200][T10318] ? _kstrtoull+0x3a0/0x4a0 [ 366.566539][T10318] ? kstrtouint_from_user+0x20a/0x2a0 [ 366.571746][T10318] ? kstrtol_from_user+0x310/0x310 [ 366.576697][T10318] ? memset+0x35/0x40 [ 366.580513][T10318] ? __fsnotify_parent+0x4b9/0x6c0 [ 366.585463][T10318] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 366.592057][T10318] ? proc_fail_nth_write+0x20b/0x290 [ 366.597176][T10318] ? proc_fail_nth_read+0x210/0x210 [ 366.602210][T10318] ? security_file_permission+0x86/0xb0 [ 366.607591][T10318] ? rw_verify_area+0x1c3/0x360 [ 366.612281][T10318] ? preempt_count_add+0x92/0x1a0 [ 366.617138][T10318] ? vfs_write+0x852/0xe70 [ 366.621399][T10318] ? kmem_cache_free+0xa9/0x1e0 [ 366.626078][T10318] ? kernel_write+0x3d0/0x3d0 [ 366.630591][T10318] ? __kasan_check_write+0x14/0x20 [ 366.635539][T10318] ? mutex_lock+0xa5/0x110 [ 366.639790][T10318] ? mutex_trylock+0xa0/0xa0 [ 366.644218][T10318] ? __kasan_check_write+0x14/0x20 [ 366.649167][T10318] ? fput_many+0x160/0x1b0 [ 366.653425][T10318] ? debug_smp_processor_id+0x17/0x20 [ 366.658625][T10318] __x64_sys_bpf+0x7b/0x90 [ 366.662878][T10318] do_syscall_64+0x34/0x70 [ 366.667134][T10318] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 366.672858][T10318] RIP: 0033:0x7f1edaa72e79 [ 366.677115][T10318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 366.696555][T10318] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 366.704794][T10318] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 366.712607][T10318] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 366.720415][T10318] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 366.728228][T10318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 366.736038][T10318] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 368.009790][T10367] Â: renamed from pim6reg1 [ 368.747719][T10401] FAULT_INJECTION: forcing a failure. [ 368.747719][T10401] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.806484][T10401] CPU: 1 PID: 10401 Comm: syz.4.3326 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 368.817667][T10401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 368.827558][T10401] Call Trace: [ 368.830688][T10401] dump_stack_lvl+0x1e2/0x24b [ 368.835193][T10401] ? bfq_pos_tree_add_move+0x43b/0x43b [ 368.840493][T10401] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 368.846389][T10401] dump_stack+0x15/0x17 [ 368.850383][T10401] should_fail+0x3c6/0x510 [ 368.854640][T10401] should_fail_alloc_page+0x52/0x60 [ 368.859673][T10401] __alloc_pages_nodemask+0x1b3/0xaf0 [ 368.864880][T10401] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 368.870260][T10401] ? __kasan_kmalloc+0x9/0x10 [ 368.874772][T10401] ? __vmalloc_node_range+0x2a9/0x7c0 [ 368.879979][T10401] __vmalloc_node_range+0x36c/0x7c0 [ 368.885014][T10401] bpf_map_area_alloc+0xd9/0xf0 [ 368.889700][T10401] ? prealloc_init+0x13b/0x7f0 [ 368.894300][T10401] prealloc_init+0x13b/0x7f0 [ 368.898727][T10401] ? __kmalloc+0x1aa/0x330 [ 368.902978][T10401] htab_map_alloc+0x68d/0x950 [ 368.907495][T10401] __se_sys_bpf+0x620f/0x11cb0 [ 368.912092][T10401] ? stack_trace_save+0x113/0x1c0 [ 368.916953][T10401] ? terminate_walk+0x407/0x4f0 [ 368.921638][T10401] ? stack_trace_snprint+0xf0/0xf0 [ 368.926589][T10401] ? kmem_cache_free+0xa9/0x1e0 [ 368.931273][T10401] ? kmem_cache_free+0xa9/0x1e0 [ 368.935957][T10401] ? kasan_set_track+0x5d/0x70 [ 368.940558][T10401] ? __x64_sys_bpf+0x90/0x90 [ 368.944985][T10401] ? __kasan_slab_free+0x11/0x20 [ 368.949757][T10401] ? slab_free_freelist_hook+0xc0/0x190 [ 368.955137][T10401] ? kmem_cache_free+0xa9/0x1e0 [ 368.959824][T10401] ? putname+0xe7/0x140 [ 368.963817][T10401] ? do_sys_openat2+0x1fc/0x710 [ 368.968505][T10401] ? __x64_sys_openat+0x243/0x290 [ 368.973365][T10401] ? do_syscall_64+0x34/0x70 [ 368.977794][T10401] ? _kstrtoull+0x3a0/0x4a0 [ 368.982131][T10401] ? kstrtouint_from_user+0x20a/0x2a0 [ 368.987339][T10401] ? kstrtol_from_user+0x310/0x310 [ 368.992288][T10401] ? memset+0x35/0x40 [ 368.996105][T10401] ? __fsnotify_parent+0x4b9/0x6c0 [ 369.001055][T10401] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 369.007647][T10401] ? proc_fail_nth_write+0x20b/0x290 [ 369.012771][T10401] ? proc_fail_nth_read+0x210/0x210 [ 369.017804][T10401] ? security_file_permission+0x86/0xb0 [ 369.023182][T10401] ? rw_verify_area+0x1c3/0x360 [ 369.027870][T10401] ? preempt_count_add+0x92/0x1a0 [ 369.032729][T10401] ? vfs_write+0x852/0xe70 [ 369.036984][T10401] ? kmem_cache_free+0xa9/0x1e0 [ 369.041670][T10401] ? kernel_write+0x3d0/0x3d0 [ 369.046182][T10401] ? __kasan_check_write+0x14/0x20 [ 369.051131][T10401] ? mutex_lock+0xa5/0x110 [ 369.055380][T10401] ? mutex_trylock+0xa0/0xa0 [ 369.059811][T10401] ? __kasan_check_write+0x14/0x20 [ 369.064755][T10401] ? fput_many+0x160/0x1b0 [ 369.069015][T10401] ? debug_smp_processor_id+0x17/0x20 [ 369.074220][T10401] __x64_sys_bpf+0x7b/0x90 [ 369.078471][T10401] do_syscall_64+0x34/0x70 [ 369.082724][T10401] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 369.088455][T10401] RIP: 0033:0x7f1fb839fe79 [ 369.092702][T10401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 369.112144][T10401] RSP: 002b:00007f1fb701d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 369.120387][T10401] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839fe79 [ 369.128199][T10401] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 369.136009][T10401] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 369.143820][T10401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 369.151633][T10401] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 369.328316][T10414] device sit0 left promiscuous mode [ 369.474220][T10414] device veth0_virt_wifi entered promiscuous mode [ 371.680871][T10455] FAULT_INJECTION: forcing a failure. [ 371.680871][T10455] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 371.750137][T10455] CPU: 1 PID: 10455 Comm: syz.4.3341 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 371.761317][T10455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 371.771209][T10455] Call Trace: [ 371.774340][T10455] dump_stack_lvl+0x1e2/0x24b [ 371.778849][T10455] ? bfq_pos_tree_add_move+0x43b/0x43b [ 371.784144][T10455] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 371.790054][T10455] dump_stack+0x15/0x17 [ 371.794040][T10455] should_fail+0x3c6/0x510 [ 371.798293][T10455] should_fail_alloc_page+0x52/0x60 [ 371.803325][T10455] __alloc_pages_nodemask+0x1b3/0xaf0 [ 371.808540][T10455] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 371.813914][T10455] ? __kasan_kmalloc+0x9/0x10 [ 371.818424][T10455] ? __vmalloc_node_range+0x2a9/0x7c0 [ 371.823633][T10455] __vmalloc_node_range+0x36c/0x7c0 [ 371.828671][T10455] bpf_map_area_alloc+0xd9/0xf0 [ 371.833350][T10455] ? prealloc_init+0x13b/0x7f0 [ 371.837951][T10455] prealloc_init+0x13b/0x7f0 [ 371.842383][T10455] ? __kmalloc+0x1aa/0x330 [ 371.846720][T10455] htab_map_alloc+0x68d/0x950 [ 371.851234][T10455] __se_sys_bpf+0x620f/0x11cb0 [ 371.855835][T10455] ? stack_trace_save+0x113/0x1c0 [ 371.860694][T10455] ? terminate_walk+0x407/0x4f0 [ 371.865382][T10455] ? stack_trace_snprint+0xf0/0xf0 [ 371.870328][T10455] ? kmem_cache_free+0xa9/0x1e0 [ 371.875017][T10455] ? kmem_cache_free+0xa9/0x1e0 [ 371.879701][T10455] ? kasan_set_track+0x5d/0x70 [ 371.884301][T10455] ? __x64_sys_bpf+0x90/0x90 [ 371.888725][T10455] ? __kasan_slab_free+0x11/0x20 [ 371.893495][T10455] ? slab_free_freelist_hook+0xc0/0x190 [ 371.898878][T10455] ? kmem_cache_free+0xa9/0x1e0 [ 371.903565][T10455] ? putname+0xe7/0x140 [ 371.907561][T10455] ? do_sys_openat2+0x1fc/0x710 [ 371.912244][T10455] ? __x64_sys_openat+0x243/0x290 [ 371.917106][T10455] ? do_syscall_64+0x34/0x70 [ 371.921533][T10455] ? _kstrtoull+0x3a0/0x4a0 [ 371.925875][T10455] ? kstrtouint_from_user+0x20a/0x2a0 [ 371.931086][T10455] ? kstrtol_from_user+0x310/0x310 [ 371.936035][T10455] ? memset+0x35/0x40 [ 371.939846][T10455] ? __fsnotify_parent+0x4b9/0x6c0 [ 371.944793][T10455] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 371.951389][T10455] ? proc_fail_nth_write+0x20b/0x290 [ 371.956512][T10455] ? proc_fail_nth_read+0x210/0x210 [ 371.961542][T10455] ? security_file_permission+0x86/0xb0 [ 371.966928][T10455] ? rw_verify_area+0x1c3/0x360 [ 371.971612][T10455] ? preempt_count_add+0x92/0x1a0 [ 371.976472][T10455] ? vfs_write+0x852/0xe70 [ 371.980723][T10455] ? kmem_cache_free+0xa9/0x1e0 [ 371.985409][T10455] ? kernel_write+0x3d0/0x3d0 [ 371.989921][T10455] ? __kasan_check_write+0x14/0x20 [ 371.994866][T10455] ? mutex_lock+0xa5/0x110 [ 371.999117][T10455] ? mutex_trylock+0xa0/0xa0 [ 372.003546][T10455] ? __kasan_check_write+0x14/0x20 [ 372.008492][T10455] ? fput_many+0x160/0x1b0 [ 372.012749][T10455] ? debug_smp_processor_id+0x17/0x20 [ 372.017953][T10455] __x64_sys_bpf+0x7b/0x90 [ 372.022205][T10455] do_syscall_64+0x34/0x70 [ 372.026461][T10455] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 372.032187][T10455] RIP: 0033:0x7f1fb839fe79 [ 372.036441][T10455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 372.055879][T10455] RSP: 002b:00007f1fb701d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 372.064123][T10455] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839fe79 [ 372.071935][T10455] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 372.079746][T10455] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 372.087555][T10455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 372.095367][T10455] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 373.086494][ T24] audit: type=1400 audit(1724383103.399:156): avc: denied { create } for pid=10465 comm="syz.4.3345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 374.179886][T10495] device sit0 left promiscuous mode [ 374.259831][T10506] device sit0 entered promiscuous mode [ 375.219076][T10545] device syzkaller0 entered promiscuous mode [ 375.456870][T10563] device sit0 entered promiscuous mode [ 376.370006][T10616] device pim6reg1 entered promiscuous mode [ 376.969088][T10659] pim6reg: tun_chr_ioctl cmd 1074025677 [ 376.975756][T10659] pim6reg: linktype set to 780 [ 376.984035][T10663] pim6reg: tun_chr_ioctl cmd 1074025677 [ 376.989801][T10663] pim6reg: linktype set to 780 [ 378.251752][T10691] device syzkaller0 entered promiscuous mode [ 378.570436][T10701] device syzkaller0 entered promiscuous mode [ 379.094698][T10749] FAULT_INJECTION: forcing a failure. [ 379.094698][T10749] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 379.108361][T10749] CPU: 0 PID: 10749 Comm: syz.1.3440 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 379.119537][T10749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 379.129417][T10749] Call Trace: [ 379.132551][T10749] dump_stack_lvl+0x1e2/0x24b [ 379.137059][T10749] ? bfq_pos_tree_add_move+0x43b/0x43b [ 379.142355][T10749] dump_stack+0x15/0x17 [ 379.146343][T10749] should_fail+0x3c6/0x510 [ 379.150601][T10749] should_fail_alloc_page+0x52/0x60 [ 379.155630][T10749] __alloc_pages_nodemask+0x1b3/0xaf0 [ 379.160842][T10749] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 379.166234][T10749] ? find_next_bit+0x7f/0x100 [ 379.170733][T10749] pcpu_populate_chunk+0x190/0xe10 [ 379.175675][T10749] pcpu_alloc+0xa81/0x1420 [ 379.179931][T10749] __alloc_percpu_gfp+0x27/0x30 [ 379.184710][T10749] prealloc_init+0x243/0x7f0 [ 379.189142][T10749] htab_map_alloc+0x68d/0x950 [ 379.193650][T10749] __se_sys_bpf+0x620f/0x11cb0 [ 379.198256][T10749] ? stack_trace_save+0x113/0x1c0 [ 379.203111][T10749] ? terminate_walk+0x407/0x4f0 [ 379.207797][T10749] ? stack_trace_snprint+0xf0/0xf0 [ 379.212762][T10749] ? kmem_cache_free+0xa9/0x1e0 [ 379.217435][T10749] ? kmem_cache_free+0xa9/0x1e0 [ 379.222128][T10749] ? kasan_set_track+0x5d/0x70 [ 379.226715][T10749] ? __x64_sys_bpf+0x90/0x90 [ 379.231146][T10749] ? __kasan_slab_free+0x11/0x20 [ 379.235913][T10749] ? slab_free_freelist_hook+0xc0/0x190 [ 379.241298][T10749] ? kmem_cache_free+0xa9/0x1e0 [ 379.245982][T10749] ? putname+0xe7/0x140 [ 379.249976][T10749] ? do_sys_openat2+0x1fc/0x710 [ 379.254660][T10749] ? __x64_sys_openat+0x243/0x290 [ 379.259525][T10749] ? do_syscall_64+0x34/0x70 [ 379.263960][T10749] ? _kstrtoull+0x3a0/0x4a0 [ 379.268303][T10749] ? kstrtouint_from_user+0x20a/0x2a0 [ 379.273504][T10749] ? kstrtol_from_user+0x310/0x310 [ 379.278459][T10749] ? memset+0x35/0x40 [ 379.282269][T10749] ? __fsnotify_parent+0x4b9/0x6c0 [ 379.287218][T10749] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 379.293811][T10749] ? proc_fail_nth_write+0x20b/0x290 [ 379.298943][T10749] ? proc_fail_nth_read+0x210/0x210 [ 379.303974][T10749] ? security_file_permission+0x86/0xb0 [ 379.309352][T10749] ? rw_verify_area+0x1c3/0x360 [ 379.314040][T10749] ? preempt_count_add+0x92/0x1a0 [ 379.318900][T10749] ? vfs_write+0x852/0xe70 [ 379.323145][T10749] ? kmem_cache_free+0xa9/0x1e0 [ 379.327828][T10749] ? kernel_write+0x3d0/0x3d0 [ 379.332341][T10749] ? __kasan_check_write+0x14/0x20 [ 379.337287][T10749] ? mutex_lock+0xa5/0x110 [ 379.341540][T10749] ? mutex_trylock+0xa0/0xa0 [ 379.345967][T10749] ? __kasan_check_write+0x14/0x20 [ 379.350915][T10749] ? fput_many+0x160/0x1b0 [ 379.355172][T10749] ? debug_smp_processor_id+0x17/0x20 [ 379.360384][T10749] __x64_sys_bpf+0x7b/0x90 [ 379.364630][T10749] do_syscall_64+0x34/0x70 [ 379.368885][T10749] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 379.374608][T10749] RIP: 0033:0x7f309d926e79 [ 379.378863][T10749] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.398302][T10749] RSP: 002b:00007f309c5a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 379.406547][T10749] RAX: ffffffffffffffda RBX: 00007f309dac2f80 RCX: 00007f309d926e79 [ 379.414356][T10749] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 379.422169][T10749] RBP: 00007f309c5a4090 R08: 0000000000000000 R09: 0000000000000000 [ 379.429981][T10749] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 379.437792][T10749] R13: 0000000000000000 R14: 00007f309dac2f80 R15: 00007ffcf22f2e08 [ 380.041220][T10770] device syzkaller0 entered promiscuous mode [ 380.160740][T10782] device pim6reg1 entered promiscuous mode [ 380.600572][T10790] FAULT_INJECTION: forcing a failure. [ 380.600572][T10790] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 380.614001][T10790] CPU: 1 PID: 10790 Comm: syz.2.3452 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 380.625172][T10790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 380.635065][T10790] Call Trace: [ 380.638199][T10790] dump_stack_lvl+0x1e2/0x24b [ 380.642702][T10790] ? bfq_pos_tree_add_move+0x43b/0x43b [ 380.647996][T10790] dump_stack+0x15/0x17 [ 380.651983][T10790] should_fail+0x3c6/0x510 [ 380.656240][T10790] should_fail_alloc_page+0x52/0x60 [ 380.661279][T10790] __alloc_pages_nodemask+0x1b3/0xaf0 [ 380.666482][T10790] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 380.671860][T10790] ? find_next_bit+0x7f/0x100 [ 380.676371][T10790] pcpu_populate_chunk+0x190/0xe10 [ 380.681321][T10790] pcpu_alloc+0xa81/0x1420 [ 380.685573][T10790] __alloc_percpu_gfp+0x27/0x30 [ 380.690260][T10790] prealloc_init+0x243/0x7f0 [ 380.694683][T10790] htab_map_alloc+0x68d/0x950 [ 380.699202][T10790] __se_sys_bpf+0x620f/0x11cb0 [ 380.703799][T10790] ? stack_trace_save+0x113/0x1c0 [ 380.708659][T10790] ? terminate_walk+0x407/0x4f0 [ 380.713345][T10790] ? stack_trace_snprint+0xf0/0xf0 [ 380.718303][T10790] ? kmem_cache_free+0xa9/0x1e0 [ 380.722981][T10790] ? kmem_cache_free+0xa9/0x1e0 [ 380.727665][T10790] ? kasan_set_track+0x5d/0x70 [ 380.732266][T10790] ? __x64_sys_bpf+0x90/0x90 [ 380.736691][T10790] ? __kasan_slab_free+0x11/0x20 [ 380.741462][T10790] ? slab_free_freelist_hook+0xc0/0x190 [ 380.746846][T10790] ? kmem_cache_free+0xa9/0x1e0 [ 380.751532][T10790] ? putname+0xe7/0x140 [ 380.755520][T10790] ? do_sys_openat2+0x1fc/0x710 [ 380.760220][T10790] ? __x64_sys_openat+0x243/0x290 [ 380.765070][T10790] ? do_syscall_64+0x34/0x70 [ 380.769500][T10790] ? _kstrtoull+0x3a0/0x4a0 [ 380.773839][T10790] ? kstrtouint_from_user+0x20a/0x2a0 [ 380.779045][T10790] ? kstrtol_from_user+0x310/0x310 [ 380.783994][T10790] ? memset+0x35/0x40 [ 380.787814][T10790] ? __fsnotify_parent+0x4b9/0x6c0 [ 380.792761][T10790] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 380.799355][T10790] ? proc_fail_nth_write+0x20b/0x290 [ 380.804477][T10790] ? proc_fail_nth_read+0x210/0x210 [ 380.809511][T10790] ? security_file_permission+0x86/0xb0 [ 380.814891][T10790] ? rw_verify_area+0x1c3/0x360 [ 380.819578][T10790] ? preempt_count_add+0x92/0x1a0 [ 380.824437][T10790] ? vfs_write+0x852/0xe70 [ 380.828693][T10790] ? kmem_cache_free+0x1c0/0x1e0 [ 380.833463][T10790] ? kernel_write+0x3d0/0x3d0 [ 380.837980][T10790] ? __kasan_check_write+0x14/0x20 [ 380.842927][T10790] ? mutex_lock+0xa5/0x110 [ 380.847184][T10790] ? mutex_trylock+0xa0/0xa0 [ 380.851605][T10790] ? __kasan_check_write+0x14/0x20 [ 380.856556][T10790] ? fput_many+0x160/0x1b0 [ 380.860809][T10790] ? debug_smp_processor_id+0x17/0x20 [ 380.866011][T10790] __x64_sys_bpf+0x7b/0x90 [ 380.870266][T10790] do_syscall_64+0x34/0x70 [ 380.874518][T10790] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 380.880246][T10790] RIP: 0033:0x7f00fec34e79 [ 380.884499][T10790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.903939][T10790] RSP: 002b:00007f00fd8b2038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 380.912181][T10790] RAX: ffffffffffffffda RBX: 00007f00fedd0f80 RCX: 00007f00fec34e79 [ 380.919994][T10790] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 380.927803][T10790] RBP: 00007f00fd8b2090 R08: 0000000000000000 R09: 0000000000000000 [ 380.935616][T10790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 380.943427][T10790] R13: 0000000000000000 R14: 00007f00fedd0f80 R15: 00007fffa9d644b8 [ 381.971017][T10832] FAULT_INJECTION: forcing a failure. [ 381.971017][T10832] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 381.984490][T10832] CPU: 0 PID: 10832 Comm: syz.3.3469 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 381.995661][T10832] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 382.005550][T10832] Call Trace: [ 382.008686][T10832] dump_stack_lvl+0x1e2/0x24b [ 382.013191][T10832] ? bfq_pos_tree_add_move+0x43b/0x43b [ 382.018499][T10832] dump_stack+0x15/0x17 [ 382.022473][T10832] should_fail+0x3c6/0x510 [ 382.026735][T10832] should_fail_alloc_page+0x52/0x60 [ 382.031761][T10832] __alloc_pages_nodemask+0x1b3/0xaf0 [ 382.036979][T10832] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 382.042362][T10832] ? find_next_bit+0x7f/0x100 [ 382.046872][T10832] pcpu_populate_chunk+0x190/0xe10 [ 382.051818][T10832] pcpu_alloc+0xa81/0x1420 [ 382.056068][T10832] __alloc_percpu_gfp+0x27/0x30 [ 382.060752][T10832] prealloc_init+0x243/0x7f0 [ 382.065182][T10832] htab_map_alloc+0x68d/0x950 [ 382.069698][T10832] __se_sys_bpf+0x620f/0x11cb0 [ 382.074295][T10832] ? stack_trace_save+0x113/0x1c0 [ 382.079152][T10832] ? terminate_walk+0x407/0x4f0 [ 382.083835][T10832] ? stack_trace_snprint+0xf0/0xf0 [ 382.088785][T10832] ? kmem_cache_free+0xa9/0x1e0 [ 382.093467][T10832] ? kmem_cache_free+0xa9/0x1e0 [ 382.098154][T10832] ? kasan_set_track+0x5d/0x70 [ 382.102754][T10832] ? __x64_sys_bpf+0x90/0x90 [ 382.107181][T10832] ? __kasan_slab_free+0x11/0x20 [ 382.111954][T10832] ? slab_free_freelist_hook+0xc0/0x190 [ 382.117335][T10832] ? kmem_cache_free+0xa9/0x1e0 [ 382.122022][T10832] ? putname+0xe7/0x140 [ 382.126015][T10832] ? do_sys_openat2+0x1fc/0x710 [ 382.130699][T10832] ? __x64_sys_openat+0x243/0x290 [ 382.135559][T10832] ? do_syscall_64+0x34/0x70 [ 382.139990][T10832] ? _kstrtoull+0x3a0/0x4a0 [ 382.144327][T10832] ? kstrtouint_from_user+0x20a/0x2a0 [ 382.149535][T10832] ? kstrtol_from_user+0x310/0x310 [ 382.154486][T10832] ? memset+0x35/0x40 [ 382.158309][T10832] ? __fsnotify_parent+0x4b9/0x6c0 [ 382.163255][T10832] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 382.169844][T10832] ? proc_fail_nth_write+0x20b/0x290 [ 382.174966][T10832] ? proc_fail_nth_read+0x210/0x210 [ 382.180001][T10832] ? security_file_permission+0x86/0xb0 [ 382.185380][T10832] ? rw_verify_area+0x1c3/0x360 [ 382.190071][T10832] ? preempt_count_add+0x92/0x1a0 [ 382.194924][T10832] ? vfs_write+0x852/0xe70 [ 382.199181][T10832] ? kmem_cache_free+0xa9/0x1e0 [ 382.203868][T10832] ? kernel_write+0x3d0/0x3d0 [ 382.208379][T10832] ? __kasan_check_write+0x14/0x20 [ 382.213326][T10832] ? mutex_lock+0xa5/0x110 [ 382.217579][T10832] ? mutex_trylock+0xa0/0xa0 [ 382.222005][T10832] ? __kasan_check_write+0x14/0x20 [ 382.226951][T10832] ? fput_many+0x160/0x1b0 [ 382.231212][T10832] ? debug_smp_processor_id+0x17/0x20 [ 382.236414][T10832] __x64_sys_bpf+0x7b/0x90 [ 382.240664][T10832] do_syscall_64+0x34/0x70 [ 382.244920][T10832] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 382.250645][T10832] RIP: 0033:0x7f1edaa72e79 [ 382.254901][T10832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 382.274339][T10832] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 382.282584][T10832] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 382.290397][T10832] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 382.298205][T10832] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 382.306015][T10832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 382.313829][T10832] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 382.769618][T10867] device veth0_vlan left promiscuous mode [ 382.831103][T10867] device veth0_vlan entered promiscuous mode [ 382.973915][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 382.982708][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 382.991238][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 383.008275][T10875] device pim6reg1 entered promiscuous mode [ 383.060857][T10886] device syzkaller0 entered promiscuous mode [ 384.455467][T10940] FAULT_INJECTION: forcing a failure. [ 384.455467][T10940] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 384.472099][T10940] CPU: 1 PID: 10940 Comm: syz.1.3502 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 384.483277][T10940] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 384.493166][T10940] Call Trace: [ 384.496295][T10940] dump_stack_lvl+0x1e2/0x24b [ 384.500810][T10940] ? bfq_pos_tree_add_move+0x43b/0x43b [ 384.506097][T10940] dump_stack+0x15/0x17 [ 384.510098][T10940] should_fail+0x3c6/0x510 [ 384.514347][T10940] should_fail_alloc_page+0x52/0x60 [ 384.519404][T10940] __alloc_pages_nodemask+0x1b3/0xaf0 [ 384.524590][T10940] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 384.529972][T10940] ? find_next_bit+0x7f/0x100 [ 384.534480][T10940] pcpu_populate_chunk+0x190/0xe10 [ 384.539627][T10940] pcpu_alloc+0xa81/0x1420 [ 384.543933][T10940] __alloc_percpu_gfp+0x27/0x30 [ 384.548601][T10940] prealloc_init+0x243/0x7f0 [ 384.553030][T10940] htab_map_alloc+0x68d/0x950 [ 384.557539][T10940] __se_sys_bpf+0x620f/0x11cb0 [ 384.562138][T10940] ? stack_trace_save+0x113/0x1c0 [ 384.566996][T10940] ? terminate_walk+0x407/0x4f0 [ 384.571703][T10940] ? stack_trace_snprint+0xf0/0xf0 [ 384.576631][T10940] ? kmem_cache_free+0xa9/0x1e0 [ 384.581315][T10940] ? kmem_cache_free+0xa9/0x1e0 [ 384.586000][T10940] ? kasan_set_track+0x5d/0x70 [ 384.590602][T10940] ? __x64_sys_bpf+0x90/0x90 [ 384.595026][T10940] ? __kasan_slab_free+0x11/0x20 [ 384.599800][T10940] ? slab_free_freelist_hook+0xc0/0x190 [ 384.605182][T10940] ? kmem_cache_free+0xa9/0x1e0 [ 384.609869][T10940] ? putname+0xe7/0x140 [ 384.613859][T10940] ? do_sys_openat2+0x1fc/0x710 [ 384.618547][T10940] ? __x64_sys_openat+0x243/0x290 [ 384.623408][T10940] ? do_syscall_64+0x34/0x70 [ 384.627838][T10940] ? _kstrtoull+0x3a0/0x4a0 [ 384.632176][T10940] ? kstrtouint_from_user+0x20a/0x2a0 [ 384.637382][T10940] ? kstrtol_from_user+0x310/0x310 [ 384.642334][T10940] ? memset+0x35/0x40 [ 384.646149][T10940] ? __fsnotify_parent+0x4b9/0x6c0 [ 384.651096][T10940] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 384.657689][T10940] ? proc_fail_nth_write+0x20b/0x290 [ 384.662811][T10940] ? proc_fail_nth_read+0x210/0x210 [ 384.667848][T10940] ? security_file_permission+0x86/0xb0 [ 384.673229][T10940] ? rw_verify_area+0x1c3/0x360 [ 384.677916][T10940] ? preempt_count_add+0x92/0x1a0 [ 384.682774][T10940] ? vfs_write+0x852/0xe70 [ 384.687027][T10940] ? kmem_cache_free+0x1c0/0x1e0 [ 384.691800][T10940] ? kernel_write+0x3d0/0x3d0 [ 384.696313][T10940] ? __kasan_check_write+0x14/0x20 [ 384.701260][T10940] ? mutex_lock+0xa5/0x110 [ 384.705522][T10940] ? mutex_trylock+0xa0/0xa0 [ 384.709945][T10940] ? __kasan_check_write+0x14/0x20 [ 384.714887][T10940] ? fput_many+0x160/0x1b0 [ 384.719145][T10940] ? debug_smp_processor_id+0x17/0x20 [ 384.724348][T10940] __x64_sys_bpf+0x7b/0x90 [ 384.728602][T10940] do_syscall_64+0x34/0x70 [ 384.732858][T10940] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 384.738579][T10940] RIP: 0033:0x7f309d926e79 [ 384.742836][T10940] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 384.762274][T10940] RSP: 002b:00007f309c5a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 384.770519][T10940] RAX: ffffffffffffffda RBX: 00007f309dac2f80 RCX: 00007f309d926e79 [ 384.778326][T10940] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 384.786137][T10940] RBP: 00007f309c5a4090 R08: 0000000000000000 R09: 0000000000000000 [ 384.793950][T10940] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 384.801762][T10940] R13: 0000000000000000 R14: 00007f309dac2f80 R15: 00007ffcf22f2e08 [ 385.430752][T10969] ¯Ê®¸}p: renamed from pim6reg1 [ 386.232091][T11020] FAULT_INJECTION: forcing a failure. [ 386.232091][T11020] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 386.245642][T11020] CPU: 1 PID: 11020 Comm: syz.4.3532 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 386.256816][T11020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 386.266712][T11020] Call Trace: [ 386.269851][T11020] dump_stack_lvl+0x1e2/0x24b [ 386.274351][T11020] ? bfq_pos_tree_add_move+0x43b/0x43b [ 386.279643][T11020] dump_stack+0x15/0x17 [ 386.283652][T11020] should_fail+0x3c6/0x510 [ 386.287899][T11020] should_fail_alloc_page+0x52/0x60 [ 386.292922][T11020] __alloc_pages_nodemask+0x1b3/0xaf0 [ 386.298130][T11020] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 386.303508][T11020] ? find_next_bit+0x7f/0x100 [ 386.308020][T11020] pcpu_populate_chunk+0x190/0xe10 [ 386.312968][T11020] pcpu_alloc+0xa81/0x1420 [ 386.317220][T11020] __alloc_percpu_gfp+0x27/0x30 [ 386.321905][T11020] prealloc_init+0x243/0x7f0 [ 386.326333][T11020] htab_map_alloc+0x68d/0x950 [ 386.330847][T11020] __se_sys_bpf+0x620f/0x11cb0 [ 386.335444][T11020] ? stack_trace_save+0x113/0x1c0 [ 386.340306][T11020] ? terminate_walk+0x407/0x4f0 [ 386.344990][T11020] ? stack_trace_snprint+0xf0/0xf0 [ 386.349940][T11020] ? kmem_cache_free+0xa9/0x1e0 [ 386.354624][T11020] ? kmem_cache_free+0xa9/0x1e0 [ 386.359311][T11020] ? kasan_set_track+0x5d/0x70 [ 386.363912][T11020] ? __x64_sys_bpf+0x90/0x90 [ 386.368336][T11020] ? __kasan_slab_free+0x11/0x20 [ 386.373112][T11020] ? slab_free_freelist_hook+0xc0/0x190 [ 386.378493][T11020] ? kmem_cache_free+0xa9/0x1e0 [ 386.383177][T11020] ? putname+0xe7/0x140 [ 386.387170][T11020] ? do_sys_openat2+0x1fc/0x710 [ 386.391856][T11020] ? __x64_sys_openat+0x243/0x290 [ 386.396716][T11020] ? do_syscall_64+0x34/0x70 [ 386.401147][T11020] ? _kstrtoull+0x3a0/0x4a0 [ 386.405485][T11020] ? kstrtouint_from_user+0x20a/0x2a0 [ 386.410691][T11020] ? kstrtol_from_user+0x310/0x310 [ 386.415638][T11020] ? memset+0x35/0x40 [ 386.419458][T11020] ? __fsnotify_parent+0x4b9/0x6c0 [ 386.424409][T11020] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 386.431000][T11020] ? proc_fail_nth_write+0x20b/0x290 [ 386.436123][T11020] ? proc_fail_nth_read+0x210/0x210 [ 386.441157][T11020] ? security_file_permission+0x86/0xb0 [ 386.446537][T11020] ? rw_verify_area+0x1c3/0x360 [ 386.451224][T11020] ? preempt_count_add+0x92/0x1a0 [ 386.456082][T11020] ? vfs_write+0x852/0xe70 [ 386.460357][T11020] ? kmem_cache_free+0x1c0/0x1e0 [ 386.465111][T11020] ? kernel_write+0x3d0/0x3d0 [ 386.469633][T11020] ? __kasan_check_write+0x14/0x20 [ 386.474592][T11020] ? mutex_lock+0xa5/0x110 [ 386.478828][T11020] ? mutex_trylock+0xa0/0xa0 [ 386.483259][T11020] ? __kasan_check_write+0x14/0x20 [ 386.488198][T11020] ? fput_many+0x160/0x1b0 [ 386.492454][T11020] ? debug_smp_processor_id+0x17/0x20 [ 386.497657][T11020] __x64_sys_bpf+0x7b/0x90 [ 386.501909][T11020] do_syscall_64+0x34/0x70 [ 386.506164][T11020] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 386.511890][T11020] RIP: 0033:0x7f1fb839fe79 [ 386.516143][T11020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 386.535582][T11020] RSP: 002b:00007f1fb701d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 386.543829][T11020] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839fe79 [ 386.551637][T11020] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 386.559448][T11020] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 386.567260][T11020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 386.575070][T11020] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 386.886952][ T24] audit: type=1400 audit(1724383117.229:157): avc: denied { create } for pid=11059 comm="syz.2.3544" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 387.159725][T11076] FAULT_INJECTION: forcing a failure. [ 387.159725][T11076] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 387.175476][T11076] CPU: 0 PID: 11076 Comm: syz.3.3549 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 387.186642][T11076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 387.196534][T11076] Call Trace: [ 387.199665][T11076] dump_stack_lvl+0x1e2/0x24b [ 387.204172][T11076] ? bfq_pos_tree_add_move+0x43b/0x43b [ 387.209473][T11076] dump_stack+0x15/0x17 [ 387.213460][T11076] should_fail+0x3c6/0x510 [ 387.217719][T11076] should_fail_alloc_page+0x52/0x60 [ 387.222745][T11076] __alloc_pages_nodemask+0x1b3/0xaf0 [ 387.228044][T11076] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 387.233423][T11076] ? find_next_bit+0x7f/0x100 [ 387.237936][T11076] pcpu_populate_chunk+0x190/0xe10 [ 387.242882][T11076] pcpu_alloc+0xa81/0x1420 [ 387.247136][T11076] __alloc_percpu_gfp+0x27/0x30 [ 387.251819][T11076] prealloc_init+0x243/0x7f0 [ 387.256338][T11076] htab_map_alloc+0x68d/0x950 [ 387.260852][T11076] __se_sys_bpf+0x620f/0x11cb0 [ 387.265452][T11076] ? stack_trace_save+0x113/0x1c0 [ 387.270310][T11076] ? terminate_walk+0x407/0x4f0 [ 387.275003][T11076] ? stack_trace_snprint+0xf0/0xf0 [ 387.279946][T11076] ? kmem_cache_free+0xa9/0x1e0 [ 387.284626][T11076] ? kmem_cache_free+0xa9/0x1e0 [ 387.289316][T11076] ? kasan_set_track+0x5d/0x70 [ 387.293911][T11076] ? __x64_sys_bpf+0x90/0x90 [ 387.298587][T11076] ? __kasan_slab_free+0x11/0x20 [ 387.303354][T11076] ? slab_free_freelist_hook+0xc0/0x190 [ 387.308827][T11076] ? kmem_cache_free+0xa9/0x1e0 [ 387.313501][T11076] ? putname+0xe7/0x140 [ 387.317497][T11076] ? do_sys_openat2+0x1fc/0x710 [ 387.322179][T11076] ? __x64_sys_openat+0x243/0x290 [ 387.327041][T11076] ? do_syscall_64+0x34/0x70 [ 387.331470][T11076] ? _kstrtoull+0x3a0/0x4a0 [ 387.335808][T11076] ? kstrtouint_from_user+0x20a/0x2a0 [ 387.341013][T11076] ? kstrtol_from_user+0x310/0x310 [ 387.346048][T11076] ? memset+0x35/0x40 [ 387.349868][T11076] ? __fsnotify_parent+0x4b9/0x6c0 [ 387.354834][T11076] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 387.361530][T11076] ? proc_fail_nth_write+0x20b/0x290 [ 387.366644][T11076] ? proc_fail_nth_read+0x210/0x210 [ 387.371676][T11076] ? security_file_permission+0x86/0xb0 [ 387.377055][T11076] ? rw_verify_area+0x1c3/0x360 [ 387.381738][T11076] ? preempt_count_add+0x92/0x1a0 [ 387.386600][T11076] ? vfs_write+0x852/0xe70 [ 387.390851][T11076] ? kmem_cache_free+0xa9/0x1e0 [ 387.395535][T11076] ? kernel_write+0x3d0/0x3d0 [ 387.400055][T11076] ? __kasan_check_write+0x14/0x20 [ 387.405005][T11076] ? mutex_lock+0xa5/0x110 [ 387.409253][T11076] ? mutex_trylock+0xa0/0xa0 [ 387.413677][T11076] ? __kasan_check_write+0x14/0x20 [ 387.418626][T11076] ? fput_many+0x160/0x1b0 [ 387.422880][T11076] ? debug_smp_processor_id+0x17/0x20 [ 387.428087][T11076] __x64_sys_bpf+0x7b/0x90 [ 387.432335][T11076] do_syscall_64+0x34/0x70 [ 387.436591][T11076] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 387.442318][T11076] RIP: 0033:0x7f1edaa72e79 [ 387.446574][T11076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.466017][T11076] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 387.474258][T11076] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 387.482067][T11076] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 387.489879][T11076] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 387.497688][T11076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 387.505498][T11076] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 387.993589][T11058] device syzkaller0 entered promiscuous mode [ 394.804132][T11347] FAULT_INJECTION: forcing a failure. [ 394.804132][T11347] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 394.817444][T11347] CPU: 0 PID: 11347 Comm: syz.1.3637 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 394.828614][T11347] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 394.838505][T11347] Call Trace: [ 394.841643][T11347] dump_stack_lvl+0x1e2/0x24b [ 394.846141][T11347] ? bfq_pos_tree_add_move+0x43b/0x43b [ 394.851436][T11347] dump_stack+0x15/0x17 [ 394.855427][T11347] should_fail+0x3c6/0x510 [ 394.859683][T11347] should_fail_alloc_page+0x52/0x60 [ 394.864714][T11347] __alloc_pages_nodemask+0x1b3/0xaf0 [ 394.869926][T11347] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 394.875315][T11347] ? pcpu_block_update_hint_alloc+0x935/0xcf0 [ 394.881210][T11347] ? find_next_bit+0x7f/0x100 [ 394.885720][T11347] pcpu_populate_chunk+0x190/0xe10 [ 394.890669][T11347] pcpu_alloc+0xa81/0x1420 [ 394.894919][T11347] __alloc_percpu_gfp+0x27/0x30 [ 394.899606][T11347] prealloc_init+0x243/0x7f0 [ 394.904033][T11347] htab_map_alloc+0x68d/0x950 [ 394.908549][T11347] __se_sys_bpf+0x620f/0x11cb0 [ 394.913147][T11347] ? stack_trace_save+0x113/0x1c0 [ 394.918005][T11347] ? terminate_walk+0x407/0x4f0 [ 394.922691][T11347] ? stack_trace_snprint+0xf0/0xf0 [ 394.927640][T11347] ? kmem_cache_free+0xa9/0x1e0 [ 394.932323][T11347] ? kmem_cache_free+0xa9/0x1e0 [ 394.937012][T11347] ? kasan_set_track+0x5d/0x70 [ 394.941612][T11347] ? __x64_sys_bpf+0x90/0x90 [ 394.946036][T11347] ? __kasan_slab_free+0x11/0x20 [ 394.950809][T11347] ? slab_free_freelist_hook+0xc0/0x190 [ 394.956193][T11347] ? kmem_cache_free+0xa9/0x1e0 [ 394.960883][T11347] ? putname+0xe7/0x140 [ 394.964871][T11347] ? do_sys_openat2+0x1fc/0x710 [ 394.969560][T11347] ? __x64_sys_openat+0x243/0x290 [ 394.974419][T11347] ? do_syscall_64+0x34/0x70 [ 394.978846][T11347] ? _kstrtoull+0x3a0/0x4a0 [ 394.983186][T11347] ? kstrtouint_from_user+0x20a/0x2a0 [ 394.988392][T11347] ? kstrtol_from_user+0x310/0x310 [ 394.993340][T11347] ? memset+0x35/0x40 [ 394.997160][T11347] ? __fsnotify_parent+0x4b9/0x6c0 [ 395.002109][T11347] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 395.008702][T11347] ? proc_fail_nth_write+0x20b/0x290 [ 395.013828][T11347] ? proc_fail_nth_read+0x210/0x210 [ 395.018856][T11347] ? security_file_permission+0x86/0xb0 [ 395.024237][T11347] ? rw_verify_area+0x1c3/0x360 [ 395.028925][T11347] ? preempt_count_add+0x92/0x1a0 [ 395.033782][T11347] ? vfs_write+0x852/0xe70 [ 395.038038][T11347] ? kmem_cache_free+0x1c0/0x1e0 [ 395.042809][T11347] ? kernel_write+0x3d0/0x3d0 [ 395.047324][T11347] ? __kasan_check_write+0x14/0x20 [ 395.052270][T11347] ? mutex_lock+0xa5/0x110 [ 395.056521][T11347] ? mutex_trylock+0xa0/0xa0 [ 395.060950][T11347] ? __kasan_check_write+0x14/0x20 [ 395.065898][T11347] ? fput_many+0x160/0x1b0 [ 395.070153][T11347] ? debug_smp_processor_id+0x17/0x20 [ 395.075356][T11347] __x64_sys_bpf+0x7b/0x90 [ 395.079610][T11347] do_syscall_64+0x34/0x70 [ 395.083866][T11347] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 395.089590][T11347] RIP: 0033:0x7f309d926e79 [ 395.093845][T11347] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 395.113282][T11347] RSP: 002b:00007f309c5a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 395.121527][T11347] RAX: ffffffffffffffda RBX: 00007f309dac2f80 RCX: 00007f309d926e79 [ 395.129337][T11347] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 395.137150][T11347] RBP: 00007f309c5a4090 R08: 0000000000000000 R09: 0000000000000000 [ 395.144963][T11347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 395.152778][T11347] R13: 0000000000000000 R14: 00007f309dac2f80 R15: 00007ffcf22f2e08 [ 395.422947][T11359] syz.0.3645[11359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 395.422994][T11359] syz.0.3645[11359] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.643286][T11421] syz.3.3663[11421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 397.671734][T11421] syz.3.3663[11421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.915729][T11499] FAULT_INJECTION: forcing a failure. [ 400.915729][T11499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 401.228133][T11499] CPU: 1 PID: 11499 Comm: syz.4.3687 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 401.239312][T11499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 401.249202][T11499] Call Trace: [ 401.252340][T11499] dump_stack_lvl+0x1e2/0x24b [ 401.256843][T11499] ? bfq_pos_tree_add_move+0x43b/0x43b [ 401.262140][T11499] dump_stack+0x15/0x17 [ 401.266131][T11499] should_fail+0x3c6/0x510 [ 401.270384][T11499] should_fail_usercopy+0x1a/0x20 [ 401.275243][T11499] _copy_to_user+0x20/0x90 [ 401.279500][T11499] simple_read_from_buffer+0xc7/0x150 [ 401.284705][T11499] proc_fail_nth_read+0x1a3/0x210 [ 401.289567][T11499] ? proc_fault_inject_write+0x390/0x390 [ 401.295031][T11499] ? security_file_permission+0x86/0xb0 [ 401.300419][T11499] ? rw_verify_area+0x1c3/0x360 [ 401.305114][T11499] ? proc_fault_inject_write+0x390/0x390 [ 401.310582][T11499] vfs_read+0x200/0xba0 [ 401.314563][T11499] ? kernel_read+0x70/0x70 [ 401.318814][T11499] ? __kasan_check_write+0x14/0x20 [ 401.323758][T11499] ? mutex_lock+0xa5/0x110 [ 401.328015][T11499] ? mutex_trylock+0xa0/0xa0 [ 401.332440][T11499] ? __fdget_pos+0x2e7/0x3a0 [ 401.336865][T11499] ? ksys_read+0x77/0x2c0 [ 401.341061][T11499] ksys_read+0x199/0x2c0 [ 401.345106][T11499] ? vfs_write+0xe70/0xe70 [ 401.349364][T11499] ? debug_smp_processor_id+0x17/0x20 [ 401.354564][T11499] __x64_sys_read+0x7b/0x90 [ 401.358910][T11499] do_syscall_64+0x34/0x70 [ 401.363158][T11499] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 401.368886][T11499] RIP: 0033:0x7f1fb839e8bc [ 401.373138][T11499] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 401.392585][T11499] RSP: 002b:00007f1fb701d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 401.400836][T11499] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839e8bc [ 401.408635][T11499] RDX: 000000000000000f RSI: 00007f1fb701d0a0 RDI: 0000000000000007 [ 401.416461][T11499] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 401.424258][T11499] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.432069][T11499] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 402.846183][T11554] FAULT_INJECTION: forcing a failure. [ 402.846183][T11554] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 402.894035][T11554] CPU: 1 PID: 11554 Comm: syz.0.3706 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 402.905220][T11554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 402.915112][T11554] Call Trace: [ 402.918253][T11554] dump_stack_lvl+0x1e2/0x24b [ 402.922761][T11554] ? bfq_pos_tree_add_move+0x43b/0x43b [ 402.928053][T11554] dump_stack+0x15/0x17 [ 402.932042][T11554] should_fail+0x3c6/0x510 [ 402.936299][T11554] should_fail_alloc_page+0x52/0x60 [ 402.941332][T11554] __alloc_pages_nodemask+0x1b3/0xaf0 [ 402.946550][T11554] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 402.951921][T11554] ? find_next_bit+0x7f/0x100 [ 402.956425][T11554] pcpu_populate_chunk+0x190/0xe10 [ 402.961381][T11554] pcpu_alloc+0xa81/0x1420 [ 402.965632][T11554] __alloc_percpu_gfp+0x27/0x30 [ 402.970322][T11554] prealloc_init+0x243/0x7f0 [ 402.974748][T11554] htab_map_alloc+0x68d/0x950 [ 402.979260][T11554] __se_sys_bpf+0x620f/0x11cb0 [ 402.983862][T11554] ? stack_trace_save+0x113/0x1c0 [ 402.988720][T11554] ? terminate_walk+0x407/0x4f0 [ 402.993406][T11554] ? stack_trace_snprint+0xf0/0xf0 [ 402.998355][T11554] ? kmem_cache_free+0xa9/0x1e0 [ 403.003039][T11554] ? kmem_cache_free+0xa9/0x1e0 [ 403.007731][T11554] ? kasan_set_track+0x5d/0x70 [ 403.012327][T11554] ? __x64_sys_bpf+0x90/0x90 [ 403.016751][T11554] ? __kasan_slab_free+0x11/0x20 [ 403.021523][T11554] ? slab_free_freelist_hook+0xc0/0x190 [ 403.026910][T11554] ? kmem_cache_free+0xa9/0x1e0 [ 403.031595][T11554] ? putname+0xe7/0x140 [ 403.035584][T11554] ? do_sys_openat2+0x1fc/0x710 [ 403.040272][T11554] ? __x64_sys_openat+0x243/0x290 [ 403.045137][T11554] ? do_syscall_64+0x34/0x70 [ 403.049558][T11554] ? _kstrtoull+0x3a0/0x4a0 [ 403.053905][T11554] ? kstrtouint_from_user+0x20a/0x2a0 [ 403.059106][T11554] ? kstrtol_from_user+0x310/0x310 [ 403.064055][T11554] ? memset+0x35/0x40 [ 403.067872][T11554] ? __fsnotify_parent+0x4b9/0x6c0 [ 403.072827][T11554] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 403.079415][T11554] ? proc_fail_nth_write+0x20b/0x290 [ 403.084541][T11554] ? proc_fail_nth_read+0x210/0x210 [ 403.089573][T11554] ? security_file_permission+0x86/0xb0 [ 403.094952][T11554] ? rw_verify_area+0x1c3/0x360 [ 403.099641][T11554] ? preempt_count_add+0x92/0x1a0 [ 403.104499][T11554] ? vfs_write+0x852/0xe70 [ 403.108752][T11554] ? kmem_cache_free+0xa9/0x1e0 [ 403.113440][T11554] ? kernel_write+0x3d0/0x3d0 [ 403.117952][T11554] ? __kasan_check_write+0x14/0x20 [ 403.122897][T11554] ? mutex_lock+0xa5/0x110 [ 403.127150][T11554] ? mutex_trylock+0xa0/0xa0 [ 403.131578][T11554] ? __kasan_check_write+0x14/0x20 [ 403.136523][T11554] ? fput_many+0x160/0x1b0 [ 403.140789][T11554] ? debug_smp_processor_id+0x17/0x20 [ 403.145989][T11554] __x64_sys_bpf+0x7b/0x90 [ 403.150237][T11554] do_syscall_64+0x34/0x70 [ 403.154496][T11554] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 403.160216][T11554] RIP: 0033:0x7faec5d08e79 [ 403.164467][T11554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.183910][T11554] RSP: 002b:00007faec4986038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 403.192154][T11554] RAX: ffffffffffffffda RBX: 00007faec5ea4f80 RCX: 00007faec5d08e79 [ 403.199963][T11554] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 403.207781][T11554] RBP: 00007faec4986090 R08: 0000000000000000 R09: 0000000000000000 [ 403.215587][T11554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 403.223396][T11554] R13: 0000000000000000 R14: 00007faec5ea4f80 R15: 00007fff1aa59698 [ 404.114055][T11577] device sit0 left promiscuous mode [ 404.132758][T11585] device sit0 entered promiscuous mode [ 404.992126][T11612] FAULT_INJECTION: forcing a failure. [ 404.992126][T11612] name failslab, interval 1, probability 0, space 0, times 0 [ 405.115299][T11612] CPU: 1 PID: 11612 Comm: syz.4.3725 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 405.126481][T11612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 405.136373][T11612] Call Trace: [ 405.139509][T11612] dump_stack_lvl+0x1e2/0x24b [ 405.144022][T11612] ? panic+0x812/0x812 [ 405.147926][T11612] ? bfq_pos_tree_add_move+0x43b/0x43b [ 405.153217][T11612] ? kstrtouint_from_user+0x20a/0x2a0 [ 405.158423][T11612] ? kstrtol_from_user+0x310/0x310 [ 405.163366][T11612] dump_stack+0x15/0x17 [ 405.167356][T11612] should_fail+0x3c6/0x510 [ 405.171610][T11612] ? kernfs_fop_write_iter+0x151/0x410 [ 405.176905][T11612] __should_failslab+0xa4/0xe0 [ 405.181513][T11612] should_failslab+0x9/0x20 [ 405.185846][T11612] __kmalloc+0x60/0x330 [ 405.189840][T11612] ? security_file_permission+0x7b/0xb0 [ 405.195222][T11612] kernfs_fop_write_iter+0x151/0x410 [ 405.200341][T11612] vfs_write+0xb4c/0xe70 [ 405.204421][T11612] ? kernel_write+0x3d0/0x3d0 [ 405.208943][T11612] ? mutex_trylock+0xa0/0xa0 [ 405.213357][T11612] ? __fdget_pos+0x2e7/0x3a0 [ 405.217783][T11612] ? ksys_write+0x77/0x2c0 [ 405.222035][T11612] ksys_write+0x199/0x2c0 [ 405.226201][T11612] ? __ia32_sys_read+0x90/0x90 [ 405.230806][T11612] ? debug_smp_processor_id+0x17/0x20 [ 405.236010][T11612] __x64_sys_write+0x7b/0x90 [ 405.240438][T11612] do_syscall_64+0x34/0x70 [ 405.244691][T11612] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 405.250413][T11612] RIP: 0033:0x7f1fb839fe79 [ 405.254669][T11612] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.274110][T11612] RSP: 002b:00007f1fb701d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 405.282354][T11612] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839fe79 [ 405.290163][T11612] RDX: 0000000000000006 RSI: 0000000020000040 RDI: 0000000000000008 [ 405.297975][T11612] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 405.305788][T11612] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.313598][T11612] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 405.595213][T11628] FAULT_INJECTION: forcing a failure. [ 405.595213][T11628] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 405.703109][T11628] CPU: 1 PID: 11628 Comm: syz.3.3732 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 405.714292][T11628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 405.724179][T11628] Call Trace: [ 405.727316][T11628] dump_stack_lvl+0x1e2/0x24b [ 405.731826][T11628] ? bfq_pos_tree_add_move+0x43b/0x43b [ 405.737117][T11628] dump_stack+0x15/0x17 [ 405.741106][T11628] should_fail+0x3c6/0x510 [ 405.745363][T11628] should_fail_alloc_page+0x52/0x60 [ 405.750396][T11628] __alloc_pages_nodemask+0x1b3/0xaf0 [ 405.755610][T11628] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 405.760984][T11628] ? find_next_bit+0x7f/0x100 [ 405.765500][T11628] pcpu_populate_chunk+0x190/0xe10 [ 405.770450][T11628] pcpu_alloc+0xa81/0x1420 [ 405.774699][T11628] __alloc_percpu_gfp+0x27/0x30 [ 405.779384][T11628] prealloc_init+0x243/0x7f0 [ 405.783821][T11628] htab_map_alloc+0x68d/0x950 [ 405.788326][T11628] __se_sys_bpf+0x620f/0x11cb0 [ 405.792924][T11628] ? stack_trace_save+0x113/0x1c0 [ 405.797785][T11628] ? terminate_walk+0x407/0x4f0 [ 405.802470][T11628] ? stack_trace_snprint+0xf0/0xf0 [ 405.807421][T11628] ? kmem_cache_free+0xa9/0x1e0 [ 405.812106][T11628] ? kmem_cache_free+0xa9/0x1e0 [ 405.816789][T11628] ? kasan_set_track+0x5d/0x70 [ 405.821391][T11628] ? __x64_sys_bpf+0x90/0x90 [ 405.825816][T11628] ? __kasan_slab_free+0x11/0x20 [ 405.830589][T11628] ? slab_free_freelist_hook+0xc0/0x190 [ 405.835974][T11628] ? kmem_cache_free+0xa9/0x1e0 [ 405.840658][T11628] ? putname+0xe7/0x140 [ 405.844648][T11628] ? do_sys_openat2+0x1fc/0x710 [ 405.849334][T11628] ? __x64_sys_openat+0x243/0x290 [ 405.854197][T11628] ? do_syscall_64+0x34/0x70 [ 405.858623][T11628] ? _kstrtoull+0x3a0/0x4a0 [ 405.862968][T11628] ? kstrtouint_from_user+0x20a/0x2a0 [ 405.868166][T11628] ? kstrtol_from_user+0x310/0x310 [ 405.873114][T11628] ? memset+0x35/0x40 [ 405.876933][T11628] ? __fsnotify_parent+0x4b9/0x6c0 [ 405.881879][T11628] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 405.888475][T11628] ? proc_fail_nth_write+0x20b/0x290 [ 405.893594][T11628] ? proc_fail_nth_read+0x210/0x210 [ 405.898631][T11628] ? security_file_permission+0x86/0xb0 [ 405.904010][T11628] ? rw_verify_area+0x1c3/0x360 [ 405.908698][T11628] ? preempt_count_add+0x92/0x1a0 [ 405.913556][T11628] ? vfs_write+0x852/0xe70 [ 405.917812][T11628] ? kmem_cache_free+0xa9/0x1e0 [ 405.922498][T11628] ? kernel_write+0x3d0/0x3d0 [ 405.927012][T11628] ? __kasan_check_write+0x14/0x20 [ 405.931958][T11628] ? mutex_lock+0xa5/0x110 [ 405.936209][T11628] ? mutex_trylock+0xa0/0xa0 [ 405.940641][T11628] ? __kasan_check_write+0x14/0x20 [ 405.945584][T11628] ? fput_many+0x160/0x1b0 [ 405.949841][T11628] ? debug_smp_processor_id+0x17/0x20 [ 405.955043][T11628] __x64_sys_bpf+0x7b/0x90 [ 405.959295][T11628] do_syscall_64+0x34/0x70 [ 405.963553][T11628] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 405.969279][T11628] RIP: 0033:0x7f1edaa72e79 [ 405.973531][T11628] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.992968][T11628] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 406.001214][T11628] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 406.009023][T11628] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 406.016837][T11628] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 406.024644][T11628] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 406.032459][T11628] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 406.258712][T11643] syz.0.3737[11643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 406.258774][T11643] syz.0.3737[11643] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.573800][ T94] udevd[94]: worker [7287] terminated by signal 33 (Unknown signal 33) [ 412.621945][ T94] udevd[94]: worker [7287] failed while handling '/devices/virtual/block/loop1' [ 412.718760][T11839] syz.0.3794[11839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.718821][T11839] syz.0.3794[11839] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 413.072567][T11842] tap1: tun_chr_ioctl cmd 1074025677 [ 413.089158][T11842] tap1: linktype set to 44775 [ 413.694464][T11865] FAULT_INJECTION: forcing a failure. [ 413.694464][T11865] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.901534][T11865] CPU: 0 PID: 11865 Comm: syz.2.3803 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 413.912721][T11865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 413.922607][T11865] Call Trace: [ 413.925741][T11865] dump_stack_lvl+0x1e2/0x24b [ 413.930248][T11865] ? bfq_pos_tree_add_move+0x43b/0x43b [ 413.935541][T11865] dump_stack+0x15/0x17 [ 413.939533][T11865] should_fail+0x3c6/0x510 [ 413.943787][T11865] should_fail_usercopy+0x1a/0x20 [ 413.948649][T11865] _copy_to_user+0x20/0x90 [ 413.952901][T11865] simple_read_from_buffer+0xc7/0x150 [ 413.958108][T11865] proc_fail_nth_read+0x1a3/0x210 [ 413.962972][T11865] ? proc_fault_inject_write+0x390/0x390 [ 413.968435][T11865] ? security_file_permission+0x86/0xb0 [ 413.973819][T11865] ? rw_verify_area+0x1c3/0x360 [ 413.978504][T11865] ? proc_fault_inject_write+0x390/0x390 [ 413.983970][T11865] vfs_read+0x200/0xba0 [ 413.987964][T11865] ? kernel_read+0x70/0x70 [ 413.992216][T11865] ? __kasan_check_write+0x14/0x20 [ 413.997164][T11865] ? mutex_lock+0xa5/0x110 [ 414.001417][T11865] ? mutex_trylock+0xa0/0xa0 [ 414.005848][T11865] ? __fdget_pos+0x2e7/0x3a0 [ 414.010268][T11865] ? ksys_read+0x77/0x2c0 [ 414.014433][T11865] ksys_read+0x199/0x2c0 [ 414.018516][T11865] ? vfs_write+0xe70/0xe70 [ 414.022771][T11865] ? debug_smp_processor_id+0x17/0x20 [ 414.027976][T11865] __x64_sys_read+0x7b/0x90 [ 414.032317][T11865] do_syscall_64+0x34/0x70 [ 414.036589][T11865] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 414.042301][T11865] RIP: 0033:0x7f00fec338bc [ 414.046560][T11865] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 414.066002][T11865] RSP: 002b:00007f00fd8b2030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 414.074235][T11865] RAX: ffffffffffffffda RBX: 00007f00fedd0f80 RCX: 00007f00fec338bc [ 414.082044][T11865] RDX: 000000000000000f RSI: 00007f00fd8b20a0 RDI: 0000000000000009 [ 414.089855][T11865] RBP: 00007f00fd8b2090 R08: 0000000000000000 R09: 0000000000000000 [ 414.097666][T11865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.105475][T11865] R13: 0000000000000000 R14: 00007f00fedd0f80 R15: 00007fffa9d644b8 [ 414.630505][T11885] FAULT_INJECTION: forcing a failure. [ 414.630505][T11885] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 414.643693][T11885] CPU: 0 PID: 11885 Comm: syz.4.3812 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 414.654862][T11885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 414.664750][T11885] Call Trace: [ 414.667885][T11885] dump_stack_lvl+0x1e2/0x24b [ 414.672391][T11885] ? bfq_pos_tree_add_move+0x43b/0x43b [ 414.677691][T11885] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 414.684279][T11885] ? proc_fail_nth_write+0x20b/0x290 [ 414.689400][T11885] dump_stack+0x15/0x17 [ 414.693392][T11885] should_fail+0x3c6/0x510 [ 414.697648][T11885] should_fail_usercopy+0x1a/0x20 [ 414.702509][T11885] _copy_from_user+0x20/0xd0 [ 414.706938][T11885] sock_do_ioctl+0x20e/0x3a0 [ 414.711359][T11885] ? sock_show_fdinfo+0xa0/0xa0 [ 414.716046][T11885] ? kernel_write+0x3d0/0x3d0 [ 414.720560][T11885] ? selinux_file_ioctl+0x3cc/0x540 [ 414.725593][T11885] sock_ioctl+0x4a6/0x760 [ 414.729764][T11885] ? sock_poll+0x340/0x340 [ 414.734014][T11885] ? security_file_ioctl+0x84/0xb0 [ 414.738957][T11885] ? sock_poll+0x340/0x340 [ 414.743211][T11885] __se_sys_ioctl+0x114/0x190 [ 414.747724][T11885] __x64_sys_ioctl+0x7b/0x90 [ 414.752150][T11885] do_syscall_64+0x34/0x70 [ 414.756405][T11885] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 414.762130][T11885] RIP: 0033:0x7f1fb839fe79 [ 414.766384][T11885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.785826][T11885] RSP: 002b:00007f1fb701d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 414.794067][T11885] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839fe79 [ 414.801878][T11885] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 414.809691][T11885] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 414.817501][T11885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.825312][T11885] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 414.944050][T11892] device syzkaller0 entered promiscuous mode [ 415.482646][T11923] FAULT_INJECTION: forcing a failure. [ 415.482646][T11923] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 415.598724][T11923] CPU: 0 PID: 11923 Comm: syz.3.3825 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 415.609907][T11923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 415.619792][T11923] Call Trace: [ 415.622930][T11923] dump_stack_lvl+0x1e2/0x24b [ 415.627438][T11923] ? bfq_pos_tree_add_move+0x43b/0x43b [ 415.632732][T11923] dump_stack+0x15/0x17 [ 415.636725][T11923] should_fail+0x3c6/0x510 [ 415.640978][T11923] should_fail_alloc_page+0x52/0x60 [ 415.646011][T11923] __alloc_pages_nodemask+0x1b3/0xaf0 [ 415.651226][T11923] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 415.656601][T11923] ? find_next_bit+0x7f/0x100 [ 415.661112][T11923] pcpu_populate_chunk+0x190/0xe10 [ 415.666061][T11923] pcpu_alloc+0xa81/0x1420 [ 415.670315][T11923] __alloc_percpu_gfp+0x27/0x30 [ 415.675001][T11923] prealloc_init+0x243/0x7f0 [ 415.679427][T11923] htab_map_alloc+0x68d/0x950 [ 415.684038][T11923] __se_sys_bpf+0x620f/0x11cb0 [ 415.688638][T11923] ? stack_trace_save+0x113/0x1c0 [ 415.693587][T11923] ? terminate_walk+0x407/0x4f0 [ 415.698271][T11923] ? stack_trace_snprint+0xf0/0xf0 [ 415.703220][T11923] ? kmem_cache_free+0xa9/0x1e0 [ 415.707907][T11923] ? kmem_cache_free+0xa9/0x1e0 [ 415.712590][T11923] ? kasan_set_track+0x5d/0x70 [ 415.717190][T11923] ? __x64_sys_bpf+0x90/0x90 [ 415.721618][T11923] ? __kasan_slab_free+0x11/0x20 [ 415.726391][T11923] ? slab_free_freelist_hook+0xc0/0x190 [ 415.731770][T11923] ? kmem_cache_free+0xa9/0x1e0 [ 415.736457][T11923] ? putname+0xe7/0x140 [ 415.740449][T11923] ? do_sys_openat2+0x1fc/0x710 [ 415.745136][T11923] ? __x64_sys_openat+0x243/0x290 [ 415.749998][T11923] ? do_syscall_64+0x34/0x70 [ 415.754426][T11923] ? _kstrtoull+0x3a0/0x4a0 [ 415.758765][T11923] ? kstrtouint_from_user+0x20a/0x2a0 [ 415.763972][T11923] ? kstrtol_from_user+0x310/0x310 [ 415.768919][T11923] ? htab_map_hash+0x320/0x7e0 [ 415.773518][T11923] ? memset+0x35/0x40 [ 415.777337][T11923] ? __fsnotify_parent+0x4b9/0x6c0 [ 415.782290][T11923] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 415.788880][T11923] ? proc_fail_nth_write+0x20b/0x290 [ 415.794002][T11923] ? proc_fail_nth_read+0x210/0x210 [ 415.799044][T11923] ? security_file_permission+0x86/0xb0 [ 415.804418][T11923] ? rw_verify_area+0x1c3/0x360 [ 415.809103][T11923] ? preempt_count_add+0x92/0x1a0 [ 415.813963][T11923] ? vfs_write+0x852/0xe70 [ 415.818224][T11923] ? kmem_cache_free+0x1c0/0x1e0 [ 415.822990][T11923] ? kernel_write+0x3d0/0x3d0 [ 415.827504][T11923] ? __kasan_check_write+0x14/0x20 [ 415.832538][T11923] ? mutex_lock+0xa5/0x110 [ 415.836789][T11923] ? mutex_trylock+0xa0/0xa0 [ 415.841218][T11923] ? __kasan_check_write+0x14/0x20 [ 415.846162][T11923] ? fput_many+0x160/0x1b0 [ 415.850422][T11923] ? debug_smp_processor_id+0x17/0x20 [ 415.855627][T11923] __x64_sys_bpf+0x7b/0x90 [ 415.859876][T11923] do_syscall_64+0x34/0x70 [ 415.864129][T11923] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 415.869855][T11923] RIP: 0033:0x7f1edaa72e79 [ 415.874110][T11923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.893557][T11923] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 415.901795][T11923] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 415.909604][T11923] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 415.917417][T11923] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 415.925226][T11923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 415.933039][T11923] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 423.828639][T12154] device pim6reg1 entered promiscuous mode [ 423.995434][T12167] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.002424][T12167] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.009886][T12167] device bridge_slave_0 entered promiscuous mode [ 424.061886][T12167] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.069970][T12167] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.077244][T12167] device bridge_slave_1 entered promiscuous mode [ 424.237809][T12171] device syzkaller0 entered promiscuous mode [ 424.308066][T12186] device pim6reg1 entered promiscuous mode [ 424.368706][T12167] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.375554][T12167] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.382690][T12167] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.389463][T12167] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.443703][ T8896] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.451355][ T8896] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.505253][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 424.512608][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 424.520316][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 424.528520][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 424.536545][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.543363][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 424.550640][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 424.558690][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 424.566779][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.573611][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 424.580831][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 424.588883][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 424.603971][T12167] device veth0_vlan entered promiscuous mode [ 424.861159][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 424.871270][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 424.879210][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 424.887501][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 424.895539][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 424.903345][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 424.911274][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 424.918813][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 424.998750][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 425.006872][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 425.016778][T12167] device veth1_macvtap entered promiscuous mode [ 425.028559][ T8896] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 425.035974][ T8896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 425.045278][ T8896] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 425.053456][ T8896] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 425.062249][ T8896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 425.681284][T12245] ªªªªªª: renamed from vlan0 [ 425.798460][ T9] device bridge_slave_1 left promiscuous mode [ 425.836584][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.914591][ T9] device bridge_slave_0 left promiscuous mode [ 425.931492][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.939622][ T9] device veth1_macvtap left promiscuous mode [ 426.267969][T12292] FAULT_INJECTION: forcing a failure. [ 426.267969][T12292] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 426.284686][T12292] CPU: 1 PID: 12292 Comm: syz.3.3958 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 426.295866][T12292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 426.305754][T12292] Call Trace: [ 426.308890][T12292] dump_stack_lvl+0x1e2/0x24b [ 426.313392][T12292] ? bfq_pos_tree_add_move+0x43b/0x43b [ 426.318686][T12292] dump_stack+0x15/0x17 [ 426.322678][T12292] should_fail+0x3c6/0x510 [ 426.326937][T12292] should_fail_alloc_page+0x52/0x60 [ 426.331966][T12292] __alloc_pages_nodemask+0x1b3/0xaf0 [ 426.337177][T12292] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 426.342555][T12292] ? find_next_bit+0x7f/0x100 [ 426.347069][T12292] pcpu_populate_chunk+0x190/0xe10 [ 426.352015][T12292] pcpu_alloc+0xa81/0x1420 [ 426.356268][T12292] __alloc_percpu_gfp+0x27/0x30 [ 426.360956][T12292] prealloc_init+0x243/0x7f0 [ 426.365381][T12292] htab_map_alloc+0x68d/0x950 [ 426.369896][T12292] __se_sys_bpf+0x620f/0x11cb0 [ 426.374494][T12292] ? stack_trace_save+0x113/0x1c0 [ 426.379357][T12292] ? terminate_walk+0x407/0x4f0 [ 426.384041][T12292] ? stack_trace_snprint+0xf0/0xf0 [ 426.388992][T12292] ? kmem_cache_free+0xa9/0x1e0 [ 426.393679][T12292] ? kmem_cache_free+0xa9/0x1e0 [ 426.398360][T12292] ? kasan_set_track+0x5d/0x70 [ 426.402963][T12292] ? __x64_sys_bpf+0x90/0x90 [ 426.407389][T12292] ? __kasan_slab_free+0x11/0x20 [ 426.412159][T12292] ? slab_free_freelist_hook+0xc0/0x190 [ 426.417540][T12292] ? kmem_cache_free+0xa9/0x1e0 [ 426.422228][T12292] ? putname+0xe7/0x140 [ 426.426218][T12292] ? do_sys_openat2+0x1fc/0x710 [ 426.430906][T12292] ? __x64_sys_openat+0x243/0x290 [ 426.435767][T12292] ? do_syscall_64+0x34/0x70 [ 426.440195][T12292] ? _kstrtoull+0x3a0/0x4a0 [ 426.444534][T12292] ? kstrtouint_from_user+0x20a/0x2a0 [ 426.449740][T12292] ? kstrtol_from_user+0x310/0x310 [ 426.454687][T12292] ? memset+0x35/0x40 [ 426.458510][T12292] ? __fsnotify_parent+0x4b9/0x6c0 [ 426.463456][T12292] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 426.470049][T12292] ? proc_fail_nth_write+0x20b/0x290 [ 426.475170][T12292] ? proc_fail_nth_read+0x210/0x210 [ 426.480205][T12292] ? security_file_permission+0x86/0xb0 [ 426.485586][T12292] ? rw_verify_area+0x1c3/0x360 [ 426.490272][T12292] ? preempt_count_add+0x92/0x1a0 [ 426.495133][T12292] ? vfs_write+0x852/0xe70 [ 426.499387][T12292] ? kmem_cache_free+0xa9/0x1e0 [ 426.504073][T12292] ? kernel_write+0x3d0/0x3d0 [ 426.508587][T12292] ? __kasan_check_write+0x14/0x20 [ 426.513532][T12292] ? mutex_lock+0xa5/0x110 [ 426.517784][T12292] ? mutex_trylock+0xa0/0xa0 [ 426.522213][T12292] ? __kasan_check_write+0x14/0x20 [ 426.527161][T12292] ? fput_many+0x160/0x1b0 [ 426.531416][T12292] ? debug_smp_processor_id+0x17/0x20 [ 426.536623][T12292] __x64_sys_bpf+0x7b/0x90 [ 426.540870][T12292] do_syscall_64+0x34/0x70 [ 426.545124][T12292] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 426.550852][T12292] RIP: 0033:0x7f1edaa72e79 [ 426.555108][T12292] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 426.574544][T12292] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 426.582804][T12292] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 426.590795][T12292] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 426.598596][T12292] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 426.606489][T12292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 426.614302][T12292] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 426.637508][T12307] syz.3.3951[12307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 426.637561][T12307] syz.3.3951[12307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 427.878404][T12346] device pim6reg1 entered promiscuous mode [ 428.780822][T12408] FAULT_INJECTION: forcing a failure. [ 428.780822][T12408] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 428.794189][T12408] CPU: 0 PID: 12408 Comm: syz.4.3989 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 428.805357][T12408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 428.815247][T12408] Call Trace: [ 428.818379][T12408] dump_stack_lvl+0x1e2/0x24b [ 428.822887][T12408] ? bfq_pos_tree_add_move+0x43b/0x43b [ 428.828183][T12408] dump_stack+0x15/0x17 [ 428.832172][T12408] should_fail+0x3c6/0x510 [ 428.836434][T12408] should_fail_alloc_page+0x52/0x60 [ 428.841472][T12408] __alloc_pages_nodemask+0x1b3/0xaf0 [ 428.846671][T12408] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 428.852062][T12408] ? find_next_bit+0x7f/0x100 [ 428.856566][T12408] pcpu_populate_chunk+0x190/0xe10 [ 428.861510][T12408] pcpu_alloc+0xa81/0x1420 [ 428.865764][T12408] __alloc_percpu_gfp+0x27/0x30 [ 428.870452][T12408] prealloc_init+0x243/0x7f0 [ 428.874884][T12408] htab_map_alloc+0x68d/0x950 [ 428.879390][T12408] __se_sys_bpf+0x620f/0x11cb0 [ 428.883987][T12408] ? stack_trace_save+0x113/0x1c0 [ 428.888848][T12408] ? terminate_walk+0x407/0x4f0 [ 428.893542][T12408] ? stack_trace_snprint+0xf0/0xf0 [ 428.898486][T12408] ? kmem_cache_free+0xa9/0x1e0 [ 428.903171][T12408] ? kmem_cache_free+0xa9/0x1e0 [ 428.907855][T12408] ? kasan_set_track+0x5d/0x70 [ 428.912458][T12408] ? __x64_sys_bpf+0x90/0x90 [ 428.916881][T12408] ? __kasan_slab_free+0x11/0x20 [ 428.921655][T12408] ? slab_free_freelist_hook+0xc0/0x190 [ 428.927035][T12408] ? kmem_cache_free+0xa9/0x1e0 [ 428.931721][T12408] ? putname+0xe7/0x140 [ 428.935712][T12408] ? do_sys_openat2+0x1fc/0x710 [ 428.940403][T12408] ? __x64_sys_openat+0x243/0x290 [ 428.945275][T12408] ? do_syscall_64+0x34/0x70 [ 428.949700][T12408] ? _kstrtoull+0x3a0/0x4a0 [ 428.954034][T12408] ? kstrtouint_from_user+0x20a/0x2a0 [ 428.959235][T12408] ? kstrtol_from_user+0x310/0x310 [ 428.964195][T12408] ? memset+0x35/0x40 [ 428.968005][T12408] ? __fsnotify_parent+0x4b9/0x6c0 [ 428.972949][T12408] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 428.979547][T12408] ? proc_fail_nth_write+0x20b/0x290 [ 428.984666][T12408] ? proc_fail_nth_read+0x210/0x210 [ 428.989701][T12408] ? security_file_permission+0x86/0xb0 [ 428.995082][T12408] ? rw_verify_area+0x1c3/0x360 [ 428.999770][T12408] ? preempt_count_add+0x92/0x1a0 [ 429.004625][T12408] ? vfs_write+0x852/0xe70 [ 429.008884][T12408] ? kmem_cache_free+0xa9/0x1e0 [ 429.013568][T12408] ? kernel_write+0x3d0/0x3d0 [ 429.018082][T12408] ? __kasan_check_write+0x14/0x20 [ 429.023028][T12408] ? mutex_lock+0xa5/0x110 [ 429.027279][T12408] ? mutex_trylock+0xa0/0xa0 [ 429.031707][T12408] ? __kasan_check_write+0x14/0x20 [ 429.036652][T12408] ? fput_many+0x160/0x1b0 [ 429.040917][T12408] ? debug_smp_processor_id+0x17/0x20 [ 429.046114][T12408] __x64_sys_bpf+0x7b/0x90 [ 429.050365][T12408] do_syscall_64+0x34/0x70 [ 429.054625][T12408] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 429.060348][T12408] RIP: 0033:0x7f1fb839fe79 [ 429.064603][T12408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.084038][T12408] RSP: 002b:00007f1fb701d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 429.092287][T12408] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839fe79 [ 429.100096][T12408] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 429.107906][T12408] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 429.115716][T12408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 429.123528][T12408] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 429.611652][T12437] device syzkaller0 entered promiscuous mode [ 429.623286][T12444] tap0: tun_chr_ioctl cmd 1074025692 [ 430.306324][T12492] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.313420][T12492] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.000931][T12519] device sit0 entered promiscuous mode [ 431.278996][T12537] FAULT_INJECTION: forcing a failure. [ 431.278996][T12537] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 431.340116][T12537] CPU: 0 PID: 12537 Comm: syz.3.4038 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 431.351294][T12537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 431.361529][T12537] Call Trace: [ 431.364660][T12537] dump_stack_lvl+0x1e2/0x24b [ 431.369168][T12537] ? bfq_pos_tree_add_move+0x43b/0x43b [ 431.374459][T12537] dump_stack+0x15/0x17 [ 431.378455][T12537] should_fail+0x3c6/0x510 [ 431.382711][T12537] should_fail_alloc_page+0x52/0x60 [ 431.387741][T12537] __alloc_pages_nodemask+0x1b3/0xaf0 [ 431.392947][T12537] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 431.398337][T12537] ? find_next_bit+0x7f/0x100 [ 431.402844][T12537] pcpu_populate_chunk+0x190/0xe10 [ 431.407790][T12537] pcpu_alloc+0xa81/0x1420 [ 431.412041][T12537] __alloc_percpu_gfp+0x27/0x30 [ 431.416728][T12537] prealloc_init+0x243/0x7f0 [ 431.421162][T12537] htab_map_alloc+0x68d/0x950 [ 431.425668][T12537] __se_sys_bpf+0x620f/0x11cb0 [ 431.430271][T12537] ? stack_trace_save+0x113/0x1c0 [ 431.435130][T12537] ? terminate_walk+0x407/0x4f0 [ 431.439815][T12537] ? stack_trace_snprint+0xf0/0xf0 [ 431.444763][T12537] ? kmem_cache_free+0xa9/0x1e0 [ 431.449450][T12537] ? kmem_cache_free+0xa9/0x1e0 [ 431.454135][T12537] ? kasan_set_track+0x5d/0x70 [ 431.458737][T12537] ? __x64_sys_bpf+0x90/0x90 [ 431.463161][T12537] ? __kasan_slab_free+0x11/0x20 [ 431.467936][T12537] ? slab_free_freelist_hook+0xc0/0x190 [ 431.473316][T12537] ? kmem_cache_free+0xa9/0x1e0 [ 431.478008][T12537] ? putname+0xe7/0x140 [ 431.481994][T12537] ? do_sys_openat2+0x1fc/0x710 [ 431.486680][T12537] ? __x64_sys_openat+0x243/0x290 [ 431.491543][T12537] ? do_syscall_64+0x34/0x70 [ 431.495970][T12537] ? _kstrtoull+0x3a0/0x4a0 [ 431.500312][T12537] ? kstrtouint_from_user+0x20a/0x2a0 [ 431.505516][T12537] ? kstrtol_from_user+0x310/0x310 [ 431.510480][T12537] ? memset+0x35/0x40 [ 431.514290][T12537] ? __fsnotify_parent+0x4b9/0x6c0 [ 431.519239][T12537] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 431.525831][T12537] ? proc_fail_nth_write+0x20b/0x290 [ 431.530949][T12537] ? proc_fail_nth_read+0x210/0x210 [ 431.536016][T12537] ? security_file_permission+0x86/0xb0 [ 431.541365][T12537] ? rw_verify_area+0x1c3/0x360 [ 431.546047][T12537] ? preempt_count_add+0x92/0x1a0 [ 431.550912][T12537] ? vfs_write+0x852/0xe70 [ 431.555160][T12537] ? kmem_cache_free+0xa9/0x1e0 [ 431.559850][T12537] ? kernel_write+0x3d0/0x3d0 [ 431.564361][T12537] ? __kasan_check_write+0x14/0x20 [ 431.569308][T12537] ? mutex_lock+0xa5/0x110 [ 431.573558][T12537] ? mutex_trylock+0xa0/0xa0 [ 431.577988][T12537] ? __kasan_check_write+0x14/0x20 [ 431.582934][T12537] ? fput_many+0x160/0x1b0 [ 431.587191][T12537] ? debug_smp_processor_id+0x17/0x20 [ 431.592394][T12537] __x64_sys_bpf+0x7b/0x90 [ 431.596648][T12537] do_syscall_64+0x34/0x70 [ 431.600906][T12537] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 431.606627][T12537] RIP: 0033:0x7f1edaa72e79 [ 431.610884][T12537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 431.630320][T12537] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 431.638566][T12537] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 431.646376][T12537] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 431.654186][T12537] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 431.662345][T12537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 431.670157][T12537] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 431.694285][T12538] device syzkaller0 entered promiscuous mode [ 431.979226][T12552] bridge0: port 2(bridge_slave_1) entered disabled state [ 431.986239][T12552] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.995360][T12556] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.002240][T12556] bridge0: port 2(bridge_slave_1) entered forwarding state [ 432.009338][T12556] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.016095][T12556] bridge0: port 1(bridge_slave_0) entered forwarding state [ 432.036459][T12556] device bridge0 entered promiscuous mode [ 432.080623][T12559] device pim6reg1 entered promiscuous mode [ 432.422436][T12585] FAULT_INJECTION: forcing a failure. [ 432.422436][T12585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 432.435925][T12585] CPU: 0 PID: 12585 Comm: syz.0.4054 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 432.447093][T12585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 432.456985][T12585] Call Trace: [ 432.460118][T12585] dump_stack_lvl+0x1e2/0x24b [ 432.464627][T12585] ? bfq_pos_tree_add_move+0x43b/0x43b [ 432.469923][T12585] dump_stack+0x15/0x17 [ 432.473913][T12585] should_fail+0x3c6/0x510 [ 432.478170][T12585] should_fail_alloc_page+0x52/0x60 [ 432.483202][T12585] __alloc_pages_nodemask+0x1b3/0xaf0 [ 432.488410][T12585] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 432.493783][T12585] ? find_next_bit+0x7f/0x100 [ 432.498296][T12585] pcpu_populate_chunk+0x190/0xe10 [ 432.503243][T12585] pcpu_alloc+0xa81/0x1420 [ 432.507497][T12585] __alloc_percpu_gfp+0x27/0x30 [ 432.512183][T12585] prealloc_init+0x243/0x7f0 [ 432.516608][T12585] htab_map_alloc+0x68d/0x950 [ 432.521124][T12585] __se_sys_bpf+0x620f/0x11cb0 [ 432.525723][T12585] ? stack_trace_save+0x113/0x1c0 [ 432.530584][T12585] ? terminate_walk+0x407/0x4f0 [ 432.535272][T12585] ? stack_trace_snprint+0xf0/0xf0 [ 432.540218][T12585] ? kmem_cache_free+0xa9/0x1e0 [ 432.544909][T12585] ? kmem_cache_free+0xa9/0x1e0 [ 432.549589][T12585] ? kasan_set_track+0x5d/0x70 [ 432.554189][T12585] ? __x64_sys_bpf+0x90/0x90 [ 432.558615][T12585] ? __kasan_slab_free+0x11/0x20 [ 432.563829][T12585] ? slab_free_freelist_hook+0xc0/0x190 [ 432.569205][T12585] ? kmem_cache_free+0xa9/0x1e0 [ 432.573890][T12585] ? putname+0xe7/0x140 [ 432.577879][T12585] ? do_sys_openat2+0x1fc/0x710 [ 432.582566][T12585] ? __x64_sys_openat+0x243/0x290 [ 432.587434][T12585] ? do_syscall_64+0x34/0x70 [ 432.591857][T12585] ? _kstrtoull+0x3a0/0x4a0 [ 432.596194][T12585] ? kstrtouint_from_user+0x20a/0x2a0 [ 432.601402][T12585] ? kstrtol_from_user+0x310/0x310 [ 432.606351][T12585] ? memset+0x35/0x40 [ 432.610170][T12585] ? __fsnotify_parent+0x4b9/0x6c0 [ 432.615116][T12585] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 432.621712][T12585] ? proc_fail_nth_write+0x20b/0x290 [ 432.626833][T12585] ? proc_fail_nth_read+0x210/0x210 [ 432.631867][T12585] ? security_file_permission+0x86/0xb0 [ 432.637250][T12585] ? rw_verify_area+0x1c3/0x360 [ 432.641937][T12585] ? preempt_count_add+0x92/0x1a0 [ 432.646803][T12585] ? vfs_write+0x852/0xe70 [ 432.651051][T12585] ? kmem_cache_free+0xa9/0x1e0 [ 432.655734][T12585] ? kernel_write+0x3d0/0x3d0 [ 432.660249][T12585] ? __kasan_check_write+0x14/0x20 [ 432.665197][T12585] ? mutex_lock+0xa5/0x110 [ 432.669453][T12585] ? mutex_trylock+0xa0/0xa0 [ 432.673873][T12585] ? __kasan_check_write+0x14/0x20 [ 432.678823][T12585] ? fput_many+0x160/0x1b0 [ 432.683079][T12585] ? debug_smp_processor_id+0x17/0x20 [ 432.688283][T12585] __x64_sys_bpf+0x7b/0x90 [ 432.692536][T12585] do_syscall_64+0x34/0x70 [ 432.696792][T12585] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 432.702514][T12585] RIP: 0033:0x7faec5d08e79 [ 432.706773][T12585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 432.726207][T12585] RSP: 002b:00007faec4986038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 432.734451][T12585] RAX: ffffffffffffffda RBX: 00007faec5ea4f80 RCX: 00007faec5d08e79 [ 432.742262][T12585] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 432.750072][T12585] RBP: 00007faec4986090 R08: 0000000000000000 R09: 0000000000000000 [ 432.757889][T12585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 432.765790][T12585] R13: 0000000000000000 R14: 00007faec5ea4f80 R15: 00007fff1aa59698 [ 434.262660][T12680] device veth0_vlan left promiscuous mode [ 434.276976][T12680] device veth0_vlan entered promiscuous mode [ 434.290411][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 434.298475][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 434.305893][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 435.029468][T12718] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.036442][T12718] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.088611][T12718] device bridge0 left promiscuous mode [ 435.142976][T12722] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.149940][T12722] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.157027][T12722] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.163795][T12722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.186882][T12722] device bridge0 entered promiscuous mode [ 435.238906][T12728] FAULT_INJECTION: forcing a failure. [ 435.238906][T12728] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 435.316490][T12728] CPU: 1 PID: 12728 Comm: syz.3.4099 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 435.327672][T12728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 435.337558][T12728] Call Trace: [ 435.340699][T12728] dump_stack_lvl+0x1e2/0x24b [ 435.345200][T12728] ? bfq_pos_tree_add_move+0x43b/0x43b [ 435.350514][T12728] dump_stack+0x15/0x17 [ 435.354491][T12728] should_fail+0x3c6/0x510 [ 435.358750][T12728] should_fail_alloc_page+0x52/0x60 [ 435.363776][T12728] __alloc_pages_nodemask+0x1b3/0xaf0 [ 435.368987][T12728] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 435.374366][T12728] ? find_next_bit+0x7f/0x100 [ 435.378883][T12728] pcpu_populate_chunk+0x190/0xe10 [ 435.383825][T12728] pcpu_alloc+0xa81/0x1420 [ 435.388081][T12728] __alloc_percpu_gfp+0x27/0x30 [ 435.392764][T12728] prealloc_init+0x243/0x7f0 [ 435.397195][T12728] htab_map_alloc+0x68d/0x950 [ 435.401703][T12728] __se_sys_bpf+0x620f/0x11cb0 [ 435.406304][T12728] ? stack_trace_save+0x113/0x1c0 [ 435.411161][T12728] ? terminate_walk+0x407/0x4f0 [ 435.415847][T12728] ? stack_trace_snprint+0xf0/0xf0 [ 435.420798][T12728] ? kmem_cache_free+0xa9/0x1e0 [ 435.425482][T12728] ? kmem_cache_free+0xa9/0x1e0 [ 435.430169][T12728] ? kasan_set_track+0x5d/0x70 [ 435.434767][T12728] ? __x64_sys_bpf+0x90/0x90 [ 435.439194][T12728] ? __kasan_slab_free+0x11/0x20 [ 435.443964][T12728] ? slab_free_freelist_hook+0xc0/0x190 [ 435.449359][T12728] ? kmem_cache_free+0xa9/0x1e0 [ 435.454123][T12728] ? putname+0xe7/0x140 [ 435.458114][T12728] ? _kstrtoull+0x3a0/0x4a0 [ 435.462457][T12728] ? kstrtouint_from_user+0x20a/0x2a0 [ 435.467668][T12728] ? kstrtol_from_user+0x310/0x310 [ 435.472694][T12728] ? htab_map_hash+0x356/0x7e0 [ 435.477369][T12728] ? memset+0x35/0x40 [ 435.481134][T12728] ? __fsnotify_parent+0x4b9/0x6c0 [ 435.486067][T12728] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 435.492663][T12728] ? proc_fail_nth_write+0x20b/0x290 [ 435.497782][T12728] ? proc_fail_nth_read+0x210/0x210 [ 435.502814][T12728] ? security_file_permission+0x86/0xb0 [ 435.508195][T12728] ? rw_verify_area+0x1c3/0x360 [ 435.512880][T12728] ? preempt_count_add+0x92/0x1a0 [ 435.517739][T12728] ? vfs_write+0x852/0xe70 [ 435.521996][T12728] ? kmem_cache_free+0x1c0/0x1e0 [ 435.526768][T12728] ? kernel_write+0x3d0/0x3d0 [ 435.531282][T12728] ? __kasan_check_write+0x14/0x20 [ 435.536227][T12728] ? mutex_lock+0xa5/0x110 [ 435.540478][T12728] ? mutex_trylock+0xa0/0xa0 [ 435.545025][T12728] ? __kasan_check_write+0x14/0x20 [ 435.549955][T12728] ? fput_many+0x160/0x1b0 [ 435.554213][T12728] ? debug_smp_processor_id+0x17/0x20 [ 435.559416][T12728] __x64_sys_bpf+0x7b/0x90 [ 435.563670][T12728] do_syscall_64+0x34/0x70 [ 435.567920][T12728] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 435.573644][T12728] RIP: 0033:0x7f1edaa72e79 [ 435.577902][T12728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 435.597342][T12728] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 435.605583][T12728] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 435.613395][T12728] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 435.621205][T12728] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 435.629016][T12728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 435.636828][T12728] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 438.879553][T12815] device pim6reg1 entered promiscuous mode [ 441.561272][T12869] device pim6reg1 entered promiscuous mode [ 441.900176][T12896] FAULT_INJECTION: forcing a failure. [ 441.900176][T12896] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 441.924205][T12896] CPU: 1 PID: 12896 Comm: syz.0.4147 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 441.935389][T12896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 441.945272][T12896] Call Trace: [ 441.948411][T12896] dump_stack_lvl+0x1e2/0x24b [ 441.952915][T12896] ? bfq_pos_tree_add_move+0x43b/0x43b [ 441.958212][T12896] dump_stack+0x15/0x17 [ 441.962198][T12896] should_fail+0x3c6/0x510 [ 441.966457][T12896] should_fail_alloc_page+0x52/0x60 [ 441.971482][T12896] __alloc_pages_nodemask+0x1b3/0xaf0 [ 441.976692][T12896] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 441.982090][T12896] ? find_next_bit+0x7f/0x100 [ 441.986595][T12896] pcpu_populate_chunk+0x190/0xe10 [ 441.991538][T12896] pcpu_alloc+0xa81/0x1420 [ 441.995793][T12896] __alloc_percpu_gfp+0x27/0x30 [ 442.000479][T12896] prealloc_init+0x243/0x7f0 [ 442.004899][T12896] htab_map_alloc+0x68d/0x950 [ 442.009414][T12896] __se_sys_bpf+0x620f/0x11cb0 [ 442.014014][T12896] ? stack_trace_save+0x113/0x1c0 [ 442.018872][T12896] ? terminate_walk+0x407/0x4f0 [ 442.023558][T12896] ? stack_trace_snprint+0xf0/0xf0 [ 442.028508][T12896] ? kmem_cache_free+0xa9/0x1e0 [ 442.033204][T12896] ? kmem_cache_free+0xa9/0x1e0 [ 442.037886][T12896] ? kasan_set_track+0x5d/0x70 [ 442.042482][T12896] ? __x64_sys_bpf+0x90/0x90 [ 442.046909][T12896] ? __kasan_slab_free+0x11/0x20 [ 442.051693][T12896] ? slab_free_freelist_hook+0xc0/0x190 [ 442.057066][T12896] ? kmem_cache_free+0xa9/0x1e0 [ 442.061749][T12896] ? putname+0xe7/0x140 [ 442.065740][T12896] ? do_sys_openat2+0x1fc/0x710 [ 442.070428][T12896] ? __x64_sys_openat+0x243/0x290 [ 442.075288][T12896] ? do_syscall_64+0x34/0x70 [ 442.079718][T12896] ? _kstrtoull+0x3a0/0x4a0 [ 442.084062][T12896] ? kstrtouint_from_user+0x20a/0x2a0 [ 442.089271][T12896] ? kstrtol_from_user+0x310/0x310 [ 442.094218][T12896] ? memset+0x35/0x40 [ 442.098039][T12896] ? __fsnotify_parent+0x4b9/0x6c0 [ 442.102994][T12896] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 442.109579][T12896] ? proc_fail_nth_write+0x20b/0x290 [ 442.114699][T12896] ? proc_fail_nth_read+0x210/0x210 [ 442.119737][T12896] ? security_file_permission+0x86/0xb0 [ 442.125109][T12896] ? rw_verify_area+0x1c3/0x360 [ 442.129794][T12896] ? preempt_count_add+0x92/0x1a0 [ 442.134650][T12896] ? vfs_write+0x852/0xe70 [ 442.138920][T12896] ? kmem_cache_free+0xa9/0x1e0 [ 442.143599][T12896] ? kernel_write+0x3d0/0x3d0 [ 442.148108][T12896] ? __kasan_check_write+0x14/0x20 [ 442.153049][T12896] ? mutex_lock+0xa5/0x110 [ 442.157301][T12896] ? mutex_trylock+0xa0/0xa0 [ 442.161730][T12896] ? __kasan_check_write+0x14/0x20 [ 442.166691][T12896] ? fput_many+0x160/0x1b0 [ 442.170933][T12896] ? debug_smp_processor_id+0x17/0x20 [ 442.176145][T12896] __x64_sys_bpf+0x7b/0x90 [ 442.180399][T12896] do_syscall_64+0x34/0x70 [ 442.184644][T12896] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 442.190372][T12896] RIP: 0033:0x7faec5d08e79 [ 442.194624][T12896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 442.214064][T12896] RSP: 002b:00007faec4986038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 442.222307][T12896] RAX: ffffffffffffffda RBX: 00007faec5ea4f80 RCX: 00007faec5d08e79 [ 442.230126][T12896] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 442.237930][T12896] RBP: 00007faec4986090 R08: 0000000000000000 R09: 0000000000000000 [ 442.245741][T12896] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 442.253549][T12896] R13: 0000000000000000 R14: 00007faec5ea4f80 R15: 00007fff1aa59698 [ 443.376693][T12955] device macsec0 entered promiscuous mode [ 443.398802][T12953] FAULT_INJECTION: forcing a failure. [ 443.398802][T12953] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.436468][T12953] CPU: 1 PID: 12953 Comm: syz.2.4164 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 443.447650][T12953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 443.457536][T12953] Call Trace: [ 443.460672][T12953] dump_stack_lvl+0x1e2/0x24b [ 443.465177][T12953] ? bfq_pos_tree_add_move+0x43b/0x43b [ 443.470479][T12953] ? prealloc_init+0x243/0x7f0 [ 443.475074][T12953] dump_stack+0x15/0x17 [ 443.479065][T12953] should_fail+0x3c6/0x510 [ 443.483321][T12953] should_fail_alloc_page+0x52/0x60 [ 443.488354][T12953] __alloc_pages_nodemask+0x1b3/0xaf0 [ 443.493565][T12953] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 443.498946][T12953] ? __kasan_kmalloc+0x9/0x10 [ 443.503454][T12953] ? __kmalloc+0x1aa/0x330 [ 443.507706][T12953] ? __vmalloc_node_range+0x2a9/0x7c0 [ 443.512918][T12953] __vmalloc_node_range+0x36c/0x7c0 [ 443.517953][T12953] ? pcpu_create_chunk+0x146/0xb80 [ 443.522897][T12953] __vmalloc+0x7a/0x90 [ 443.526800][T12953] ? pcpu_create_chunk+0x146/0xb80 [ 443.531747][T12953] pcpu_create_chunk+0x146/0xb80 [ 443.536524][T12953] pcpu_alloc+0x802/0x1420 [ 443.540779][T12953] __alloc_percpu_gfp+0x27/0x30 [ 443.545460][T12953] prealloc_init+0x243/0x7f0 [ 443.549889][T12953] htab_map_alloc+0x68d/0x950 [ 443.554400][T12953] __se_sys_bpf+0x620f/0x11cb0 [ 443.559000][T12953] ? stack_trace_save+0x113/0x1c0 [ 443.563871][T12953] ? terminate_walk+0x407/0x4f0 [ 443.568550][T12953] ? stack_trace_snprint+0xf0/0xf0 [ 443.573496][T12953] ? kmem_cache_free+0xa9/0x1e0 [ 443.578181][T12953] ? kmem_cache_free+0xa9/0x1e0 [ 443.582870][T12953] ? kasan_set_track+0x5d/0x70 [ 443.587466][T12953] ? __x64_sys_bpf+0x90/0x90 [ 443.591892][T12953] ? __kasan_slab_free+0x11/0x20 [ 443.596666][T12953] ? slab_free_freelist_hook+0xc0/0x190 [ 443.602048][T12953] ? kmem_cache_free+0xa9/0x1e0 [ 443.606750][T12953] ? putname+0xe7/0x140 [ 443.610729][T12953] ? do_sys_openat2+0x1fc/0x710 [ 443.615418][T12953] ? __x64_sys_openat+0x243/0x290 [ 443.620280][T12953] ? do_syscall_64+0x34/0x70 [ 443.624703][T12953] ? _kstrtoull+0x3a0/0x4a0 [ 443.629041][T12953] ? kstrtouint_from_user+0x20a/0x2a0 [ 443.634249][T12953] ? kstrtol_from_user+0x310/0x310 [ 443.639201][T12953] ? memset+0x35/0x40 [ 443.643018][T12953] ? __fsnotify_parent+0x4b9/0x6c0 [ 443.647964][T12953] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 443.654558][T12953] ? proc_fail_nth_write+0x20b/0x290 [ 443.659680][T12953] ? proc_fail_nth_read+0x210/0x210 [ 443.664714][T12953] ? security_file_permission+0x86/0xb0 [ 443.670094][T12953] ? rw_verify_area+0x1c3/0x360 [ 443.674782][T12953] ? preempt_count_add+0x92/0x1a0 [ 443.679639][T12953] ? vfs_write+0x852/0xe70 [ 443.683895][T12953] ? kmem_cache_free+0xa9/0x1e0 [ 443.688597][T12953] ? kernel_write+0x3d0/0x3d0 [ 443.693099][T12953] ? __kasan_check_write+0x14/0x20 [ 443.698044][T12953] ? mutex_lock+0xa5/0x110 [ 443.702296][T12953] ? mutex_trylock+0xa0/0xa0 [ 443.706720][T12953] ? __kasan_check_write+0x14/0x20 [ 443.711668][T12953] ? fput_many+0x160/0x1b0 [ 443.715925][T12953] ? debug_smp_processor_id+0x17/0x20 [ 443.721128][T12953] __x64_sys_bpf+0x7b/0x90 [ 443.725380][T12953] do_syscall_64+0x34/0x70 [ 443.729636][T12953] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 443.735362][T12953] RIP: 0033:0x7f5d4b9dde79 [ 443.739618][T12953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 443.759055][T12953] RSP: 002b:00007f5d4a65b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 443.767300][T12953] RAX: ffffffffffffffda RBX: 00007f5d4bb79f80 RCX: 00007f5d4b9dde79 [ 443.775107][T12953] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 443.782927][T12953] RBP: 00007f5d4a65b090 R08: 0000000000000000 R09: 0000000000000000 [ 443.790738][T12953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 443.798549][T12953] R13: 0000000000000000 R14: 00007f5d4bb79f80 R15: 00007ffd6333a2f8 [ 445.780164][T13060] syz.2.4182[13060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.780215][T13060] syz.2.4182[13060] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.909952][T13067] syz.2.4182[13067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.941445][T13067] syz.2.4182[13067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.857770][T13103] device sit0 left promiscuous mode [ 446.959627][T13103] device sit0 entered promiscuous mode [ 448.656867][T13191] device veth0_vlan left promiscuous mode [ 448.669103][T13191] device veth0_vlan entered promiscuous mode [ 448.689779][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 448.720023][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 448.810589][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 451.630435][T13300] syz.4.4259[13300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 451.630490][T13300] syz.4.4259[13300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 452.010473][T13303] device syzkaller0 entered promiscuous mode [ 452.769063][T13350] FAULT_INJECTION: forcing a failure. [ 452.769063][T13350] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 452.846484][T13350] CPU: 0 PID: 13350 Comm: syz.4.4272 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 452.857672][T13350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 452.867563][T13350] Call Trace: [ 452.870701][T13350] dump_stack_lvl+0x1e2/0x24b [ 452.875209][T13350] ? bfq_pos_tree_add_move+0x43b/0x43b [ 452.880501][T13350] dump_stack+0x15/0x17 [ 452.884492][T13350] should_fail+0x3c6/0x510 [ 452.888750][T13350] should_fail_alloc_page+0x52/0x60 [ 452.893781][T13350] __alloc_pages_nodemask+0x1b3/0xaf0 [ 452.898991][T13350] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 452.904370][T13350] ? find_next_bit+0x7f/0x100 [ 452.908882][T13350] pcpu_populate_chunk+0x190/0xe10 [ 452.913830][T13350] pcpu_alloc+0xa81/0x1420 [ 452.918082][T13350] __alloc_percpu_gfp+0x27/0x30 [ 452.922763][T13350] prealloc_init+0x243/0x7f0 [ 452.927191][T13350] htab_map_alloc+0x68d/0x950 [ 452.931704][T13350] __se_sys_bpf+0x620f/0x11cb0 [ 452.936302][T13350] ? stack_trace_save+0x113/0x1c0 [ 452.941160][T13350] ? terminate_walk+0x407/0x4f0 [ 452.945849][T13350] ? stack_trace_snprint+0xf0/0xf0 [ 452.950801][T13350] ? kmem_cache_free+0xa9/0x1e0 [ 452.955483][T13350] ? kmem_cache_free+0xa9/0x1e0 [ 452.960169][T13350] ? __x64_sys_bpf+0x90/0x90 [ 452.964595][T13350] ? __kasan_check_write+0x14/0x20 [ 452.969544][T13350] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 452.974833][T13350] ? __x64_sys_openat+0x243/0x290 [ 452.979702][T13350] ? do_syscall_64+0x34/0x70 [ 452.984121][T13350] ? _kstrtoull+0x3a0/0x4a0 [ 452.988455][T13350] ? kstrtouint_from_user+0x20a/0x2a0 [ 452.993663][T13350] ? kstrtol_from_user+0x310/0x310 [ 452.998614][T13350] ? stack_map_peek_elem+0x216/0x310 [ 453.003733][T13350] ? memset+0x35/0x40 [ 453.007558][T13350] ? __fsnotify_parent+0x4b9/0x6c0 [ 453.012514][T13350] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 453.019093][T13350] ? proc_fail_nth_write+0x20b/0x290 [ 453.024217][T13350] ? proc_fail_nth_read+0x210/0x210 [ 453.029249][T13350] ? security_file_permission+0x86/0xb0 [ 453.034631][T13350] ? rw_verify_area+0x1c3/0x360 [ 453.039317][T13350] ? preempt_count_add+0x92/0x1a0 [ 453.044174][T13350] ? vfs_write+0x852/0xe70 [ 453.048432][T13350] ? kmem_cache_free+0x1c0/0x1e0 [ 453.053202][T13350] ? kernel_write+0x3d0/0x3d0 [ 453.057715][T13350] ? __kasan_check_write+0x14/0x20 [ 453.062662][T13350] ? mutex_lock+0xa5/0x110 [ 453.066914][T13350] ? mutex_trylock+0xa0/0xa0 [ 453.071343][T13350] ? __kasan_check_write+0x14/0x20 [ 453.076288][T13350] ? fput_many+0x160/0x1b0 [ 453.080545][T13350] ? debug_smp_processor_id+0x17/0x20 [ 453.085748][T13350] __x64_sys_bpf+0x7b/0x90 [ 453.090001][T13350] do_syscall_64+0x34/0x70 [ 453.094254][T13350] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 453.100070][T13350] RIP: 0033:0x7f1fb839fe79 [ 453.104320][T13350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 453.123762][T13350] RSP: 002b:00007f1fb701d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 453.132005][T13350] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839fe79 [ 453.139818][T13350] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 453.147627][T13350] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 453.155438][T13350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 453.163249][T13350] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 454.923627][T13393] device pim6reg1 entered promiscuous mode [ 457.407951][T13484] device veth1_macvtap left promiscuous mode [ 457.872386][T13507] device syzkaller0 entered promiscuous mode [ 457.972728][T13517] FAULT_INJECTION: forcing a failure. [ 457.972728][T13517] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 457.985844][T13517] CPU: 0 PID: 13517 Comm: syz.3.4328 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 457.996932][T13517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 458.006825][T13517] Call Trace: [ 458.009960][T13517] dump_stack_lvl+0x1e2/0x24b [ 458.014467][T13517] ? bfq_pos_tree_add_move+0x43b/0x43b [ 458.019762][T13517] dump_stack+0x15/0x17 [ 458.023752][T13517] should_fail+0x3c6/0x510 [ 458.028027][T13517] should_fail_alloc_page+0x52/0x60 [ 458.033044][T13517] __alloc_pages_nodemask+0x1b3/0xaf0 [ 458.038247][T13517] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 458.043628][T13517] ? find_next_bit+0x7f/0x100 [ 458.048143][T13517] pcpu_populate_chunk+0x190/0xe10 [ 458.053089][T13517] pcpu_alloc+0xa81/0x1420 [ 458.057342][T13517] __alloc_percpu_gfp+0x27/0x30 [ 458.062027][T13517] prealloc_init+0x243/0x7f0 [ 458.066452][T13517] htab_map_alloc+0x68d/0x950 [ 458.070966][T13517] __se_sys_bpf+0x620f/0x11cb0 [ 458.075563][T13517] ? stack_trace_save+0x113/0x1c0 [ 458.080426][T13517] ? terminate_walk+0x407/0x4f0 [ 458.085112][T13517] ? stack_trace_snprint+0xf0/0xf0 [ 458.090061][T13517] ? kmem_cache_free+0xa9/0x1e0 [ 458.094746][T13517] ? kmem_cache_free+0xa9/0x1e0 [ 458.099432][T13517] ? kasan_set_track+0x5d/0x70 [ 458.104031][T13517] ? __x64_sys_bpf+0x90/0x90 [ 458.108455][T13517] ? __kasan_slab_free+0x11/0x20 [ 458.113230][T13517] ? _kstrtoull+0x3a0/0x4a0 [ 458.117571][T13517] ? kstrtouint_from_user+0x20a/0x2a0 [ 458.122777][T13517] ? kstrtol_from_user+0x310/0x310 [ 458.127727][T13517] ? memset+0x35/0x40 [ 458.131545][T13517] ? __fsnotify_parent+0x4b9/0x6c0 [ 458.136494][T13517] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 458.143080][T13517] ? proc_fail_nth_write+0x20b/0x290 [ 458.148201][T13517] ? proc_fail_nth_read+0x210/0x210 [ 458.153235][T13517] ? security_file_permission+0x86/0xb0 [ 458.158617][T13517] ? rw_verify_area+0x1c3/0x360 [ 458.163398][T13517] ? preempt_count_add+0x92/0x1a0 [ 458.168250][T13517] ? vfs_write+0x852/0xe70 [ 458.172505][T13517] ? kmem_cache_free+0x1c0/0x1e0 [ 458.177276][T13517] ? kernel_write+0x3d0/0x3d0 [ 458.181790][T13517] ? __kasan_check_write+0x14/0x20 [ 458.186736][T13517] ? mutex_lock+0xa5/0x110 [ 458.190992][T13517] ? mutex_trylock+0xa0/0xa0 [ 458.195417][T13517] ? __kasan_check_write+0x14/0x20 [ 458.200454][T13517] ? fput_many+0x160/0x1b0 [ 458.204706][T13517] ? debug_smp_processor_id+0x17/0x20 [ 458.209909][T13517] __x64_sys_bpf+0x7b/0x90 [ 458.214162][T13517] do_syscall_64+0x34/0x70 [ 458.218418][T13517] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 458.224144][T13517] RIP: 0033:0x7f1edaa72e79 [ 458.228397][T13517] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.247841][T13517] RSP: 002b:00007f1ed96f0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 458.256079][T13517] RAX: ffffffffffffffda RBX: 00007f1edac0ef80 RCX: 00007f1edaa72e79 [ 458.263892][T13517] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 458.271703][T13517] RBP: 00007f1ed96f0090 R08: 0000000000000000 R09: 0000000000000000 [ 458.279514][T13517] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 458.287325][T13517] R13: 0000000000000000 R14: 00007f1edac0ef80 R15: 00007ffd8554b038 [ 459.098260][T13541] syz.4.4336[13541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 459.098316][T13541] syz.4.4336[13541] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 460.304438][T13571] device syzkaller0 entered promiscuous mode [ 461.012087][T13585] FAULT_INJECTION: forcing a failure. [ 461.012087][T13585] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 461.053148][T13585] CPU: 1 PID: 13585 Comm: syz.1.4351 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 461.064334][T13585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 461.074219][T13585] Call Trace: [ 461.077356][T13585] dump_stack_lvl+0x1e2/0x24b [ 461.081865][T13585] ? bfq_pos_tree_add_move+0x43b/0x43b [ 461.087160][T13585] dump_stack+0x15/0x17 [ 461.091152][T13585] should_fail+0x3c6/0x510 [ 461.095401][T13585] should_fail_usercopy+0x1a/0x20 [ 461.100268][T13585] _copy_from_user+0x20/0xd0 [ 461.104692][T13585] wext_handle_ioctl+0xee/0x260 [ 461.109382][T13585] ? call_commit_handler+0x100/0x100 [ 461.114495][T13585] ? sched_clock_cpu+0x1b/0x3b0 [ 461.119181][T13585] ? sched_clock+0x3a/0x40 [ 461.123437][T13585] sock_ioctl+0x137/0x760 [ 461.127599][T13585] ? irq_exit_rcu+0x9/0x10 [ 461.131853][T13585] ? sock_poll+0x340/0x340 [ 461.136107][T13585] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 461.142096][T13585] ? __se_sys_ioctl+0x5e/0x190 [ 461.146697][T13585] ? do_vfs_ioctl+0x1/0x1a30 [ 461.151125][T13585] ? sock_poll+0x340/0x340 [ 461.155374][T13585] __se_sys_ioctl+0x114/0x190 [ 461.159887][T13585] __x64_sys_ioctl+0x7b/0x90 [ 461.164312][T13585] do_syscall_64+0x34/0x70 [ 461.168570][T13585] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 461.174292][T13585] RIP: 0033:0x7f309d926e79 [ 461.178546][T13585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 461.197997][T13585] RSP: 002b:00007f309c5a4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 461.206242][T13585] RAX: ffffffffffffffda RBX: 00007f309dac2f80 RCX: 00007f309d926e79 [ 461.214045][T13585] RDX: 0000000020000000 RSI: 0000000000008b0f RDI: 0000000000000006 [ 461.221856][T13585] RBP: 00007f309c5a4090 R08: 0000000000000000 R09: 0000000000000000 [ 461.229663][T13585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 461.237474][T13585] R13: 0000000000000000 R14: 00007f309dac2f80 R15: 00007ffcf22f2e08 [ 461.304351][T13597] device veth0_vlan left promiscuous mode [ 461.310223][T13597] device veth0_vlan entered promiscuous mode [ 461.341277][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 461.349367][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 461.356994][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 462.515954][T13634] FAULT_INJECTION: forcing a failure. [ 462.515954][T13634] name failslab, interval 1, probability 0, space 0, times 0 [ 462.558055][T13634] CPU: 1 PID: 13634 Comm: syz.4.4365 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 462.569240][T13634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 462.579130][T13634] Call Trace: [ 462.582261][T13634] dump_stack_lvl+0x1e2/0x24b [ 462.586767][T13634] ? panic+0x812/0x812 [ 462.590676][T13634] ? bfq_pos_tree_add_move+0x43b/0x43b [ 462.595983][T13634] ? avc_has_extended_perms+0x975/0xf70 [ 462.601352][T13634] dump_stack+0x15/0x17 [ 462.605342][T13634] should_fail+0x3c6/0x510 [ 462.609597][T13634] ? ioctl_standard_iw_point+0x4aa/0xca0 [ 462.615063][T13634] __should_failslab+0xa4/0xe0 [ 462.619666][T13634] should_failslab+0x9/0x20 [ 462.623999][T13634] __kmalloc+0x60/0x330 [ 462.627993][T13634] ? sched_clock+0x3a/0x40 [ 462.632245][T13634] ? sched_clock_cpu+0x1b/0x3b0 [ 462.636935][T13634] ioctl_standard_iw_point+0x4aa/0xca0 [ 462.642236][T13634] ? wireless_nlevent_process+0x110/0x110 [ 462.647788][T13634] ? iw_handler_get_iwstats+0x190/0x190 [ 462.653169][T13634] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 462.659162][T13634] ? __kasan_check_write+0x14/0x20 [ 462.664102][T13634] ? mutex_lock+0xa5/0x110 [ 462.668351][T13634] ? mutex_trylock+0xa0/0xa0 [ 462.672777][T13634] ioctl_standard_call+0xbe/0x280 [ 462.677636][T13634] ? wireless_nlevent_process+0x110/0x110 [ 462.683190][T13634] ? wext_ioctl_dispatch+0x3b0/0x3b0 [ 462.688314][T13634] wext_ioctl_dispatch+0x15b/0x3b0 [ 462.693263][T13634] ? iw_handler_get_private+0x1f0/0x1f0 [ 462.698644][T13634] ? __kasan_check_write+0x14/0x20 [ 462.703591][T13634] ? _copy_from_user+0x96/0xd0 [ 462.708193][T13634] wext_handle_ioctl+0x15b/0x260 [ 462.712963][T13634] ? call_commit_handler+0x100/0x100 [ 462.718086][T13634] ? do_vfs_ioctl+0xf6/0x1a30 [ 462.722598][T13634] sock_ioctl+0x137/0x760 [ 462.726765][T13634] ? sock_poll+0x340/0x340 [ 462.731023][T13634] ? security_file_ioctl+0x84/0xb0 [ 462.735961][T13634] ? sock_poll+0x340/0x340 [ 462.740217][T13634] __se_sys_ioctl+0x114/0x190 [ 462.744726][T13634] __x64_sys_ioctl+0x7b/0x90 [ 462.749159][T13634] do_syscall_64+0x34/0x70 [ 462.753406][T13634] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 462.759135][T13634] RIP: 0033:0x7f1fb839fe79 [ 462.763387][T13634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 462.782827][T13634] RSP: 002b:00007f1fb701d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 462.791069][T13634] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839fe79 [ 462.798880][T13634] RDX: 0000000020000000 RSI: 0000000000008b0f RDI: 0000000000000006 [ 462.806690][T13634] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 462.814502][T13634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 462.822315][T13634] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 464.549741][T13697] FAULT_INJECTION: forcing a failure. [ 464.549741][T13697] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 464.562924][T13697] CPU: 1 PID: 13697 Comm: syz.4.4381 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 464.574090][T13697] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 464.583977][T13697] Call Trace: [ 464.587112][T13697] dump_stack_lvl+0x1e2/0x24b [ 464.591618][T13697] ? bfq_pos_tree_add_move+0x43b/0x43b [ 464.596915][T13697] dump_stack+0x15/0x17 [ 464.600906][T13697] should_fail+0x3c6/0x510 [ 464.605160][T13697] should_fail_usercopy+0x1a/0x20 [ 464.610021][T13697] _copy_to_user+0x20/0x90 [ 464.614273][T13697] simple_read_from_buffer+0xc7/0x150 [ 464.619490][T13697] proc_fail_nth_read+0x1a3/0x210 [ 464.624340][T13697] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 464.630330][T13697] ? proc_fault_inject_write+0x390/0x390 [ 464.635800][T13697] ? vfs_read+0x15f/0xba0 [ 464.639963][T13697] ? vfs_read+0x1ec/0xba0 [ 464.644129][T13697] ? proc_fault_inject_write+0x390/0x390 [ 464.649595][T13697] vfs_read+0x200/0xba0 [ 464.653592][T13697] ? __this_cpu_preempt_check+0x13/0x20 [ 464.658969][T13697] ? kernel_read+0x70/0x70 [ 464.663223][T13697] ? __kasan_check_write+0x14/0x20 [ 464.668170][T13697] ? mutex_lock+0xa5/0x110 [ 464.672424][T13697] ? mutex_trylock+0xa0/0xa0 [ 464.676854][T13697] ? __fdget_pos+0x2e7/0x3a0 [ 464.681276][T13697] ? ksys_read+0x77/0x2c0 [ 464.685440][T13697] ksys_read+0x199/0x2c0 [ 464.689521][T13697] ? __kasan_check_write+0x14/0x20 [ 464.694471][T13697] ? vfs_write+0xe70/0xe70 [ 464.698721][T13697] ? __kasan_check_read+0x11/0x20 [ 464.703582][T13697] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 464.709484][T13697] __x64_sys_read+0x7b/0x90 [ 464.713819][T13697] do_syscall_64+0x34/0x70 [ 464.718076][T13697] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 464.723800][T13697] RIP: 0033:0x7f1fb839e8bc [ 464.728057][T13697] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 464.747499][T13697] RSP: 002b:00007f1fb701d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 464.755735][T13697] RAX: ffffffffffffffda RBX: 00007f1fb853bf80 RCX: 00007f1fb839e8bc [ 464.763546][T13697] RDX: 000000000000000f RSI: 00007f1fb701d0a0 RDI: 0000000000000008 [ 464.771356][T13697] RBP: 00007f1fb701d090 R08: 0000000000000000 R09: 0000000000000000 [ 464.779177][T13697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 464.786980][T13697] R13: 0000000000000000 R14: 00007f1fb853bf80 R15: 00007ffce1fc7b48 [ 466.256497][T13753] device syzkaller0 entered promiscuous mode [ 466.262826][T13754] device pim6reg1 entered promiscuous mode [ 466.445382][T13762] device pim6reg1 entered promiscuous mode [ 467.911142][T13805] device syzkaller0 entered promiscuous mode [ 469.550544][ T24] audit: type=1400 audit(1724383199.889:158): avc: denied { create } for pid=13841 comm="syz.4.4427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 470.199645][ T24] audit: type=1400 audit(1724383200.539:159): avc: denied { append } for pid=76 comm="syslogd" name="messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 470.380228][ T24] audit: type=1400 audit(1724383200.539:160): avc: denied { open } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 470.402397][ T24] audit: type=1400 audit(1724383200.539:161): avc: denied { getattr } for pid=76 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=9 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 470.431330][T13862] device syzkaller0 entered promiscuous mode [ 472.122893][T13939] device sit0 left promiscuous mode [ 472.313747][T13942] device sit0 entered promiscuous mode [ 472.386195][T13947] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 473.836181][T14013] device veth0_vlan left promiscuous mode [ 473.931564][T14013] device veth0_vlan entered promiscuous mode [ 474.287466][ T6935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 474.317006][ T6935] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 474.388719][ T6935] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 477.326298][T14114] device pim6reg1 entered promiscuous mode [ 477.914144][T14126] device syzkaller0 entered promiscuous mode [ 481.414081][T14226] device veth0_vlan left promiscuous mode [ 481.472027][T14226] device veth0_vlan entered promiscuous mode [ 481.629731][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 481.653936][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 481.695238][ T8903] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 483.457432][T14271] syz.3.4553[14271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.457494][T14271] syz.3.4553[14271] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 487.420532][T14445] device veth0_vlan left promiscuous mode [ 487.597298][T14445] device veth0_vlan entered promiscuous mode [ 487.681836][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 487.701026][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 487.708837][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 489.064297][T14518] device pim6reg1 entered promiscuous mode [ 490.216264][T14591] device veth0_vlan left promiscuous mode [ 490.274150][T14591] device veth0_vlan entered promiscuous mode [ 490.459776][ T6939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 490.473212][ T6939] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 490.487698][ T6939] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 490.529593][T14598] device sit0 left promiscuous mode [ 490.595079][T14601] device sit0 entered promiscuous mode [ 493.432601][T14727] syz.3.4690[14727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.432657][T14727] syz.3.4690[14727] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.672082][T14738] syz.3.4690[14738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 493.701640][T14738] syz.3.4690[14738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.522984][T14926] syz.4.4749[14926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.541553][T14926] syz.4.4749[14926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.617590][T14926] syz.4.4749[14926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.666362][T14926] syz.4.4749[14926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 498.717465][T14933] syz.4.4749[14933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 499.307651][T14991] device syzkaller0 entered promiscuous mode [ 499.372740][T15005] device syzkaller0 entered promiscuous mode [ 499.803340][T15052] device pim6reg1 entered promiscuous mode [ 502.190827][T15154] : renamed from ipvlan1 [ 502.366530][T15169] geneve1: tun_chr_ioctl cmd 1074025681 [ 502.394776][T15169] device syzkaller0 entered promiscuous mode [ 502.475361][T15169] bridge_slave_0: mtu greater than device maximum [ 502.599920][T15192] device veth0_to_team entered promiscuous mode [ 503.370463][T15262] syz.0.4848[15262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.370517][T15262] syz.0.4848[15262] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.827161][T15296] ÿÿÿÿÿÿ: renamed from vlan1 [ 504.361038][T15327] geneve1: tun_chr_ioctl cmd 1074025672 [ 504.438730][T15327] geneve1: ignored: set checksum enabled [ 505.724388][T15458] ip6tnl0: mtu less than device minimum [ 506.124718][T15474] device vxcan1 entered promiscuous mode [ 506.946214][T15507] device veth0_vlan left promiscuous mode [ 507.006433][T15507] device veth0_vlan entered promiscuous mode [ 507.271320][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 507.285304][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 507.293156][ T837] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 509.176206][T15539] device syzkaller0 entered promiscuous mode [ 510.604205][T15614] device vlan1 entered promiscuous mode [ 512.987725][T15707] device pim6reg1 entered promiscuous mode SYZFAIL: failed to send rpc fd=3 want=672 sent=0 n=-1 (errno 32: Broken pipe) [ 547.747061][ T48] device bridge_slave_1 left promiscuous mode [ 547.752980][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 547.760301][ T48] device bridge_slave_0 left promiscuous mode [ 547.766208][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 547.773754][ T48] device veth1_macvtap left promiscuous mode [ 549.327411][ T48] device bridge_slave_1 left promiscuous mode [ 549.333332][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.340557][ T48] device bridge_slave_0 left promiscuous mode [ 549.346490][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.353833][ T48] device bridge_slave_1 left promiscuous mode [ 549.359814][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.366852][ T48] device bridge_slave_0 left promiscuous mode [ 549.372749][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.380267][ T48] device bridge_slave_1 left promiscuous mode [ 549.386162][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.393403][ T48] device bridge_slave_0 left promiscuous mode [ 549.399413][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.407174][ T48] device bridge_slave_1 left promiscuous mode [ 549.413071][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 549.420361][ T48] device bridge_slave_0 left promiscuous mode [ 549.426270][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 549.434115][ T48] device veth0_vlan left promiscuous mode [ 549.439768][ T48] device veth1_macvtap left promiscuous mode [ 549.445450][ T48] device veth0_vlan left promiscuous mode [ 549.451743][ T48] device veth1_macvtap left promiscuous mode