last executing test programs: 10m24.518664801s ago: executing program 4 (id=6227): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000a80)='memory.oom.group\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b80)={0x1, 0x58, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000c40)={&(0x7f0000000bc0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xc, [@ptr={0xe, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x30, 0x61, 0x5f, 0x2e, 0x30, 0x2e, 0x9d914cf2795a8734, 0x0, 0x5f, 0x2e]}}, &(0x7f0000000c00)=""/60, 0x30, 0x3c, 0x1, 0xe6, 0x10000, @value}, 0x28) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000d00)={0x0, r0}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@bloom_filter={0x1e, 0x2, 0x54, 0x3, 0x10881, r2, 0x1ec, '\x00', r5, r6, 0x0, 0x5, 0x5, 0x8, @void, @value, @value=r7}, 0x50) r8 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001900)={0x6, 0x3, &(0x7f0000001500)=@framed, &(0x7f0000001600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000ac0)=ANY=[@ANYRES8, @ANYRES8=r8], 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000340), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x20103, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0], 0x0, 0x2c, &(0x7f0000000440)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000480), &(0x7f0000000580), 0x8, 0xbb, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r11 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x8c, 0x8c, 0x5, [@enum={0xe, 0x7, 0x0, 0x6, 0x4, [{0x9, 0x6}, {0xb, 0x6}, {0xb, 0x2}, {0x2, 0x40}, {0x2, 0x10}, {0x9, 0x6}, {0x9, 0x4ae}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x8}}, @union={0x6, 0x0, 0x0, 0x5, 0x0, 0x8}, @typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0x3}}]}, {0x0, [0x61, 0x5f, 0x5f]}}, &(0x7f0000000840)=""/113, 0xa9, 0x71, 0x1, 0x6, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x5, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x0, 0x0, 0x7fffffff}, [@cb_func={0x18, 0xb, 0x4, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000140)='GPL\x00', 0xff4, 0x19, &(0x7f0000000300)=""/25, 0x40f00, 0x40, '\x00', r10, 0x25, r11, 0x8, &(0x7f0000000900)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000940)={0x0, 0x6, 0x8b, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000980)=[r9, r9], 0x0, 0x10, 0x7, @void, @value}, 0x94) syz_clone(0x8020000, 0x0, 0x0, 0x0, 0x0, 0x0) 10m24.155065923s ago: executing program 4 (id=6229): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x9) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}, @enum]}}, &(0x7f0000000080)=""/227, 0x3e, 0xe3, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) 10m23.250390638s ago: executing program 4 (id=6237): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYBLOB="4a755dc62d8881dc27345d4b5748e19c18a4bcbf8978353065dfa312d1dcc1f5fa2edda9f962f8ecd0018f9facd4e39688c1eb3bac6c21dec2fed7ae468a9fb9d735870d0fc720cda89d5894a5c0eda9ea8280d554effedbed8a46ce689539e67d62e5c53ec9c6c95cae252045a795b96b4b2e8afbb7812e01f429d764a1b960109b2cdad28adb122cd8e20a61a60019562aaadf188486e1cbeeed319b0ac634b3fa382e5be18005308bf612dcda765a2e953b6f53b5fc296498087ef29260441d1134569d8476efaf7a0c9154afc16d", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000780)='f2fs_write_checkpoint\x00'}, 0xffffffffffffffae) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000200, 0x2a, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000b0000000b0000000050000000500000004000006040000000e00000080000000020000000300000001000000000000000a0000008900000012000000000000020200000001000000030000040600000010000000010000000a0000000600010000000000562100000e000000020000000000000010000000020000850a0000000500000001000000010000800d000000000000003c00000002000000030000060400000007000000ff0000000d000000fcffffff0a000000dd0000000000006100"], &(0x7f0000000540)=""/178, 0xcd, 0xb2, 0x0, 0x2, 0x10000, @value}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYRES64, @ANYRES16=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000500008004060000000096fd4fb9d16c1c44ed00010000005847328b9b38a461658fffa26590db596e91a7bf875388af67a8f589aafe0fa932dd704216ed96936251b67fd6fae6ef11a35db1ad47527cdc349fd8ce6e43cd3ec2c939b8e37696e5f24a2524a99614fcc8a9594432e2460d9d65f8d424461c05d675f1e1efb66b1705baa09d648a87b875acd8133b232e342e021f4aa1fff4d4d24d8bfa153d26bfe06039588b74c58d87500a689308c25e8ae1a4be3080fcbe8c6ae48d66302cb0ad57827fa42ab663c20e857bed2f330462595977f2d286a11f3b78717e1f433a81"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="b54594bb1789aab1f71763f5accb7d0c00000004", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x21, 0x6, 0x8000, &(0x7f0000000700)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x2b) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.current\x00', 0x275a, 0x0) 10m21.844139146s ago: executing program 4 (id=6244): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYBLOB="4a755dc62d8881dc27345d4b5748e19c18a4bcbf8978353065dfa312d1dcc1f5fa2edda9f962f8ecd0018f9facd4e39688c1eb3bac6c21dec2fed7ae468a9fb9d735870d0fc720cda89d5894a5c0eda9ea8280d554effedbed8a46ce689539e67d62e5c53ec9c6c95cae252045a795b96b4b2e8afbb7812e01f429d764a1b960109b2cdad28adb122cd8e20a61a60019562aaadf188486e1cbeeed319b0ac634b3fa382e5be18005308bf612dcda765a2e953b6f53b5fc296498087ef29260441d1134569d8476efaf7a0c9154afc16d", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000780)='f2fs_write_checkpoint\x00'}, 0xffffffffffffffae) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000200, 0x2a, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000b0000000b0000000050000000500000004000006040000000e00000080000000020000000300000001000000000000000a0000008900000012000000000000020200000001000000030000040600000010000000010000000a0000000600010000000000562100000e000000020000000000000010000000020000850a0000000500000001000000010000800d000000000000003c00000002000000030000060400000007000000ff0000000d000000fcffffff0a000000dd0000000000006100"], &(0x7f0000000540)=""/178, 0xcd, 0xb2, 0x0, 0x2, 0x10000, @value}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYRES64, @ANYRES16=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000500008004060000000096fd4fb9d16c1c44ed00010000005847328b9b38a461658fffa26590db596e91a7bf875388af67a8f589aafe0fa932dd704216ed96936251b67fd6fae6ef11a35db1ad47527cdc349fd8ce6e43cd3ec2c939b8e37696e5f24a2524a99614fcc8a9594432e2"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="b54594bb1789aab1f71763f5accb7d0c00000004", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x21, 0x6, 0x8000, &(0x7f0000000700)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x2b) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.current\x00', 0x275a, 0x0) 10m20.920843271s ago: executing program 4 (id=6251): openat$ppp(0xffffffffffffff9c, &(0x7f0000000f40), 0x80, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000070000000850000005000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000d00)=@o_path={&(0x7f0000000cc0)='./file0\x00', 0x0, 0x4008, r0}, 0x18) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x152610}], 0x1}, 0x1f00) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000ac0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r4}, 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f0000000840)=@framed={{}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='tlb_flush\x00', r5}, 0x10) syz_clone(0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x2d) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x408, 0xcd, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"/2767], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 10m18.824711653s ago: executing program 4 (id=6260): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x9) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}, @enum]}}, &(0x7f0000000080)=""/227, 0x3e, 0xe3, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) 10m18.704962663s ago: executing program 32 (id=6260): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000"], 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x9) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x1, 0x0, [{0x0, 0x2}]}, @enum]}}, &(0x7f0000000080)=""/227, 0x3e, 0xe3, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000c40), 0x12) 1m33.856554051s ago: executing program 1 (id=10625): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r2}, 0x10) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) 1m33.787267061s ago: executing program 1 (id=10627): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="0b00000005000000000400000900000001", @ANYRES32=0x0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xf7, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632f77fbac141416ac14141686089f034d2f8702890c6aab845013f2325f1a39014402038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff40000", 0x0, 0xfe, 0x60000000}, 0x50) 1m33.651996952s ago: executing program 1 (id=10638): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="170000000400000006000000050000000000000014e2adaffe3e2b05a9c7ff4b93299305b11dedffece305525b478d3a409edd48ac43fac0725b096bf02e0525faa09a9197f8510b45121058ee5126433a962ea148e19da5e9744380889445da05836dd799fa360b0024890a98f4795b9ee581f50717abd51096cb2e0ff280a7926e1efed227d2540f0993253dbb8ce14bf9614e31766ab5f6c6fc3693b1e8d7f992b7052e370502c3b642d25ed1b452819cf73f51d9071aadd1bcf28d94b8fa78435625dea5f17d6115f33ae047d58dfd29856c9f61bf86", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x5, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000200000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x64}, @initr0, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000340)='ext4_fc_commit_start\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0700000004000000200000004c163bae2b1dc35ac001000000000000005ecc477d5d15fa7270e9b11cc10d483e080d42cf9cb4b57d0bb04ed2cf3e5a3e7ef537181c3b8fdfd0a58f4fe67b4cda79bed3969467daac1598474931643c2c510ca7729d78ec0fbfbed72a4cb0de92fcf0e59176defff8ff57a50c6e91799dead0", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0x4, &(0x7f00000006c0)={r5, 0x58, &(0x7f0000000100)}, 0x87) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7ff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) 1m32.780379087s ago: executing program 1 (id=10632): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r1}, 0x10) 1m32.632647538s ago: executing program 1 (id=10633): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r3}, 0x10) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) 1m32.550545358s ago: executing program 1 (id=10635): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000002240), &(0x7f0000002300), 0x8001, r0}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffff}, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa2701, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0}, 0xa, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c4, 0x0, @perf_config_ext, 0x2000, 0x100, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$ppp(0xffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 1m17.423903802s ago: executing program 33 (id=10635): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="01000000d60000000900000005"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000002340)={0x0, 0x0, &(0x7f0000002240), &(0x7f0000002300), 0x8001, r0}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xffff}, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa2701, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0}, 0xa, 0x0, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c4, 0x0, @perf_config_ext, 0x2000, 0x100, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$ppp(0xffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) 3.67751185s ago: executing program 2 (id=11538): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x0, 0x0, &(0x7f0000000a00)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000009007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe6, 0xe6, 0xb, [@datasec={0x3, 0x4, 0x0, 0xf, 0x2, [{0x5, 0xb, 0x8}, {0x2, 0x3, 0x5}, {0x3, 0xf7, 0x8}, {0x3, 0xca4, 0xc}], "1250"}, @enum64={0x2, 0x5, 0x0, 0x13, 0x0, 0x1a, [{0xa, 0x5, 0x8}, {0x9, 0x10001, 0x9}, {0x8, 0x9, 0xffffffff}, {0x7, 0x7, 0x23f}, {0x4, 0x401, 0xb7fae619}]}, @restrict={0x5, 0x0, 0x0, 0xb, 0x4}, @const={0x10, 0x0, 0x0, 0xa, 0x2}, @type_tag={0x7, 0x0, 0x0, 0x12, 0x4}, @struct={0xa, 0x4, 0x0, 0x4, 0x0, 0x4, [{0xe, 0x2, 0x3}, {0x10, 0x5, 0x5}, {0x10, 0x3, 0x1000}, {0x9, 0x0, 0x4}]}]}, {0x0, [0x0, 0x0, 0x5f, 0x2e, 0x2e, 0x5f, 0x0, 0x0, 0x5f]}}, &(0x7f0000000c00)=""/207, 0x10b, 0xcf, 0x0, 0x8001, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffff, 0x2, '\x00', 0x0, r3, 0x4, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x88, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x6b, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) r5 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r6}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000790000000900", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYRES64=r6, @ANYRESOCT=0x0, @ANYRESDEC, @ANYRESDEC=0x0, @ANYRES32=r2, @ANYRES16=r4, @ANYRESDEC=r5, @ANYRES8=r7], 0x48) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x3cb, 0x0, 0xffffffffffffffff, 0x7, '\x00', r4, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000900)=@bpf_lsm={0x1d, 0x1e, &(0x7f00000005c0)=@raw=[@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffd}}, @call={0x85, 0x0, 0x0, 0x49}, @ldst={0x3, 0x1, 0x1, 0xa, 0x1, 0x80, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xb3}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @jmp={0x5, 0x1, 0x9, 0x4, 0x1, 0xfffffffffffffffc, 0x8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @exit, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x6d}}], &(0x7f0000000480)='GPL\x00', 0xf35, 0x54, &(0x7f00000004c0)=""/84, 0x41000, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f00000006c0)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000780)={0x1, 0x0, 0x5, 0x2}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000800)=[r1, r1, r1, r1], &(0x7f0000000840)=[{0x4, 0x4, 0x4, 0xb}, {0x1, 0x4, 0x6, 0xc}, {0x1, 0x1, 0x10, 0x8}, {0x5, 0x1, 0x7}, {0x2, 0x5, 0xd, 0x4}, {0x5, 0x5, 0x0, 0x3}, {0x2, 0x1, 0x9, 0x3}, {0x2, 0x5, 0x3, 0xf93436b08add82c}, {0x5, 0x3, 0xb, 0x5}], 0x10, 0x5, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYRES32=r0, @ANYBLOB="0000efff0000000000000000", @ANYRES32=r8, @ANYBLOB, @ANYRES64=0x0], 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={0x0}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x900) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, &(0x7f0000000380), 0xfffffffffffffeba) r10 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000700)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@fwd={0x10}, @fwd={0xd}, @const={0xb, 0x0, 0x0, 0xa, 0x2}, @decl_tag={0x3, 0x0, 0x0, 0x11, 0x4, 0x7}]}}, 0x0, 0x4e, 0x0, 0x1, 0x7, 0x10000, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b69, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x3) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 3.191461013s ago: executing program 5 (id=11547): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mkdir(0x0, 0x126) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, 0x0}, 0x20) r5 = gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0xcf, 0x7, 0x4, 0xfc, 0x0, 0x10, 0x20540, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x2}, 0xa210, 0x0, 0x6, 0x0, 0x4, 0x71, 0x8, 0x0, 0x5, 0x0, 0x1}, r5, 0xa, r2, 0xb) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000005000000030000000200000f04000000070001fea16e0000020000000000000000000000000000040000000000000061"], &(0x7f0000002200)=""/4110, 0x45, 0x100e, 0x1, 0x0, 0x0, @void, @value}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r8}, 0xc) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.650029695s ago: executing program 2 (id=11553): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYBLOB="4a755dc62d8881dc27345d4b5748e19c18a4bcbf8978353065dfa312d1dcc1f5fa2edda9f962f8ecd0018f9facd4e39688c1eb3bac6c21dec2fed7ae468a9fb9d735870d0fc720cda89d5894a5c0eda9ea8280d554effedbed8a46ce689539e67d62e5c53ec9c6c95cae252045a795b96b4b2e8afbb7812e01f429d764a1b960109b2cdad28adb122cd8e20a61a60019562aaadf188486e1cbeeed319b0ac634b3fa382e5be18005308bf612dcda765a2e953b6f53b5fc296498087ef29260441d1134569d8476efaf7a0c9154afc16d", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000780)='f2fs_write_checkpoint\x00'}, 0xffffffffffffffae) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000200, 0x2a, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000b0000000b0000000050000000500000004000006040000000e00000080000000020000000300000001000000000000000a0000008900000012000000000000020200000001000000030000040600000010000000010000000a0000000600010000000000562100000e000000020000000000000010000000020000850a0000000500000001000000010000800d000000000000003c00000002000000030000060400000007000000ff0000000d000000fcffffff0a000000dd0000000000006100"], &(0x7f0000000540)=""/178, 0xcd, 0xb2, 0x0, 0x2, 0x10000, @value}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYRES64, @ANYRES16=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000500008004060000000096fd4fb9d16c1c44ed00010000005847328b9b38a461658fffa26590db596e91a7bf875388af67a8f589aafe0fa932dd704216ed96936251b67fd6fae6ef11a35db1ad47527cdc349fd8ce6e43cd3ec2c939b8e37696e5f24a2524a99614fcc8a9594432e2"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="b54594bb1789aab1f71763f5accb7d0c00000004", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x21, 0x6, 0x8000, &(0x7f0000000700)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x2b) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.current\x00', 0x275a, 0x0) 1.966960569s ago: executing program 5 (id=11558): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x20, &(0x7f00000004c0)={&(0x7f0000000400)=""/51, 0x33, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000940)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="1800", @ANYRES32, @ANYRES32, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)='%pK \x00'}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000b40)="068e2a862fe6d35529be99b08fb640abfbf5a7c9585498a8a59e7b733f0513cf276380b77597d53950df2f7a44f34e3849e7867d11a946831c013d3ec05011b547235959a72b44c92b45fb23d086a94100bb318e862f9ce5067b23985a262bd9d73c4331740bd0587efda6955b8ed2c24d47f9df46e2bf41dd4a1bfb3e750da7fc8c4356a2b211fbcbdcc1b9a41f00f11ddcf3463d21964b3b74c92f151d40f7255a534e2d360d3a6c199161c287be9ac7d1fed77b32d296cdf3839684ee2bb537139c0ff6b8b2de54f9474e57619568ac032e9ad5113a13d6a62369ddd8930d0d8a31df9fda0f3e34342f91ecf3e0cba2ade1411053d0", &(0x7f0000000a40)=""/188, &(0x7f0000000000)="dd4a8a9dbba32c5a7556307cb9b2bfea55a4f17ca42ba38097a6007a6885", &(0x7f0000000c40)="b14a2638049b02201cf928d65faa95da132910b5d4f8f0f17f9c2cbeb1abfa125416e7b94d1d4b37e7ee7db1252d88365f93ca2d636920d33914abe78cdf475144c019b3637ad96217808ceb6dfc326f42e86ef16fea51134e0dfb4c165eb370dbf8100e7d16d4716376db19b3274224553fe017230bb15eeacf9394abbe4008", 0x1ff, r2, 0x4}, 0x38) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 1.946956499s ago: executing program 3 (id=11559): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='hrtimer_init\x00', r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.84621307s ago: executing program 0 (id=11561): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r3}, 0x10) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) 1.83569743s ago: executing program 5 (id=11562): bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 1.82245337s ago: executing program 0 (id=11563): bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000500000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r2, 0x0, 0x500000000000000}, 0x38) 1.79177356s ago: executing program 0 (id=11564): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES32=0x1, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x64}, @initr0, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000340)='ext4_fc_commit_start\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0700000004000000200000004c163bae2b1dc35ac001000000000000005ecc477d5d15fa7270e9b11cc10d483e080d42cf9cb4b57d0bb04ed2cf3e5a3e7ef537181c3b8fdfd0a58f4fe67b4cda79bed3969467daac1598474931643c2c510ca7729d78ec0fbfbed72a4cb0de92fcf0e59176defff8ff57a50c6e91799dead0", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0x4, &(0x7f00000006c0)={r5, 0x58, &(0x7f0000000100)}, 0x87) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7ff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) 1.7911619s ago: executing program 3 (id=11565): r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000b80), 0xd}, 0x20, 0x0, 0x0, 0x3, 0x2, 0x146, 0x4}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r1, &(0x7f0000000000), 0x2a979d) perf_event_open(&(0x7f0000000b00)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x369}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000c00)=',P,/}#^\xbf*\xd71\\.!\x00') perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0b00004005000001000400000900000001000000206f9accc6543614286af5327cf1ebee0000bc91684157f4987185e114e677aacc76ce17a524a284cef64f28bc04000000723d3202a094c71570a3d35c70b55a2e", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES16=r2], 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f110800", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1901], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r5) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0xc0189436, 0x1ffffffe) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000c40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x7, 0x1}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.78735506s ago: executing program 6 (id=11566): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000003c0), 0x4) write$cgroup_int(r2, &(0x7f00000001c0)=0x10000000, 0xfffffdef) ioctl$TUNSETOFFLOAD(r2, 0x541b, 0x2000fdfd) 1.76688281s ago: executing program 2 (id=11567): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = getpid() r3 = perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x4, 0x0, 0x81, 0xff, 0x0, 0x8, 0x1000, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={&(0x7f0000000200), 0x4}, 0x508, 0x2223, 0x7fff, 0x7, 0x7, 0x4, 0x0, 0x0, 0x794, 0x0, 0x8}, 0x0, 0xe, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x5, 0x6, 0x81, 0x0, 0x2, 0x1010, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x100, 0x1, 0xff, 0x7, 0x4, 0x1, 0x2, 0x0, 0x8, 0x0, 0x6}, r2, 0x8, r3, 0xa) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20f42, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000140)={'\x00', 0x6132}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000280), 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x5, 0x1, 0x8e, 0xe7c9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r5}, 0x38) 1.72570076s ago: executing program 5 (id=11568): r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x0, 0x8}, 0xc) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2, 0x1, 0x6, &(0x7f0000000140)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000700)='./cgroup.net/syz1\x00', 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000000)={0x0, 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x13, 0x4, 0xffb, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x8000}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20103, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8, 0x10001, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='sched_switch\x00', r9}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{}, 0x0, 0x0}, 0x20) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) recvmsg$unix(r5, 0x0, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x1c, &(0x7f0000000d80)=ANY=[@ANYBLOB="18080000d0ffffff000000000000001718110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b706000014000000b7030000000d00008500000005000000bca900000000000035090100000000009500000000000000b7020000000000007b6af8ff00000000b50902000f0000007baaf0ff00000000bf8700000000000007080000fffdffffbf2400000000000007060000f0ffffff740200000800000018200000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7010000080000004608f0ff76000000bf9800000000000079080000000000008500000061000000b70000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) 1.289751723s ago: executing program 2 (id=11569): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mkdir(0x0, 0x126) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, 0x0}, 0x20) r5 = gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0xcf, 0x7, 0x4, 0xfc, 0x0, 0x10, 0x20540, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x2}, 0xa210, 0x0, 0x6, 0x0, 0x4, 0x71, 0x8, 0x0, 0x5, 0x0, 0x1}, r5, 0xa, r2, 0xb) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000005000000030000000200000f04000000070001fea16e0000020000000000000000000000000000040000000000000061"], &(0x7f0000002200)=""/4110, 0x45, 0x100e, 0x1, 0x0, 0x0, @void, @value}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r8}, 0xc) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 958.444434ms ago: executing program 3 (id=11570): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4b9f, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x2, 0x0, 0xfffffffffffffffd}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r2, 0x0, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x58000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x9}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, r1, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x3, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x58000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x9, 0x9}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, r1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x4a, 0xfc, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0xe82}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003a00)={&(0x7f0000000080)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x9}}, 0x10, &(0x7f0000000b40)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000001a00), 0x101d0}], 0x4}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) recvmsg(r4, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) (async) sendmsg$tipc(r5, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) 930.919505ms ago: executing program 6 (id=11571): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r3}, 0x10) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) 918.555765ms ago: executing program 0 (id=11572): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x21680, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f00000007c0), &(0x7f0000000840)=r2}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000", @ANYRES16=0x0, @ANYRES16=r5, @ANYRES16=r5, @ANYRESOCT=r5, @ANYRESHEX=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='fib_table_lookup\x00', r3}, 0x10) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_subtree(r7, &(0x7f00000002c0), 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 884.122445ms ago: executing program 5 (id=11573): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0x20, &(0x7f00000004c0)={&(0x7f0000000400)=""/51, 0x33, 0x0, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000940)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000080)=ANY=[@ANYBLOB="1800", @ANYRES32, @ANYRES32, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000380)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)='%pK \x00'}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={&(0x7f0000000b40)="068e2a862fe6d35529be99b08fb640abfbf5a7c9585498a8a59e7b733f0513cf276380b77597d53950df2f7a44f34e3849e7867d11a946831c013d3ec05011b547235959a72b44c92b45fb23d086a94100bb318e862f9ce5067b23985a262bd9d73c4331740bd0587efda6955b8ed2c24d47f9df46e2bf41dd4a1bfb3e750da7fc8c4356a2b211fbcbdcc1b9a41f00f11ddcf3463d21964b3b74c92f151d40f7255a534e2d360d3a6c199161c287be9ac7d1fed77b32d296cdf3839684ee2bb537139c0ff6b8b2de54f9474e57619568ac032e9ad5113a13d6a62369ddd8930d0d8a31df9fda0f3e34342f91ecf3e0cba2ade1411053d03a04", &(0x7f0000000a40)=""/188, &(0x7f0000000000)="dd4a8a9dbba32c5a7556307cb9b2bfea55a4f17ca42ba38097a6007a6885", &(0x7f0000000c40)="b14a2638049b02201cf928d65faa95da132910b5d4f8f0f17f9c2cbeb1abfa125416e7b94d1d4b37e7ee7db1252d88365f93ca2d636920d33914abe78cdf475144c019b3637ad96217808ceb6dfc326f42e86ef16fea51134e0dfb4c165eb370dbf8100e7d16d4716376db19b3274224553fe017230bb15eeacf9394abbe4008", 0x1ff, r2, 0x4}, 0x38) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0x8, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x49) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 881.445245ms ago: executing program 6 (id=11574): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r3}, 0x10) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) 839.030786ms ago: executing program 3 (id=11575): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='hrtimer_init\x00', r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 838.011115ms ago: executing program 6 (id=11576): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x2, 0x4, 0x2, 0xc, 0x1400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001000000"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000001018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 772.860476ms ago: executing program 5 (id=11577): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYBLOB="4a755dc62d8881dc27345d4b5748e19c18a4bcbf8978353065dfa312d1dcc1f5fa2edda9f962f8ecd0018f9facd4e39688c1eb3bac6c21dec2fed7ae468a9fb9d735870d0fc720cda89d5894a5c0eda9ea8280d554effedbed8a46ce689539e67d62e5c53ec9c6c95cae252045a795b96b4b2e8afbb7812e01f429d764a1b960109b2cdad28adb122cd8e20a61a60019562aaadf188486e1cbeeed319b0ac634b3fa382e5be18005308bf612dcda765a2e953b6f53b5fc296498087ef29260441d1134569d8476efaf7a0c9154afc16d", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000e41621eb70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000780)='f2fs_write_checkpoint\x00'}, 0xffffffffffffffae) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000200, 0x2a, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[@ANYBLOB="9feb01001800000000000000b0000000b0000000050000000500000004000006040000000e00000080000000020000000300000001000000000000000a0000008900000012000000000000020200000001000000030000040600000010000000010000000a0000000600010000000000562100000e000000020000000000000010000000020000850a0000000500000001000000010000800d000000000000003c00000002000000030000060400000007000000ff0000000d000000fcffffff0a000000dd0000000000006100"], &(0x7f0000000540)=""/178, 0xcd, 0xb2, 0x0, 0x2, 0x10000, @value}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e00)=ANY=[@ANYRES64, @ANYRES16=r1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="020000000500008004060000000096fd4fb9d16c1c44ed00010000005847328b9b38a461658fffa26590db596e91a7bf875388af67a8f589aafe0fa932dd704216ed96936251b67fd6fae6ef11a35db1ad47527cdc349fd8ce6e43cd3ec2c939b8e37696e5f24a2524a99614fcc8a9594432e2"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="b54594bb1789aab1f71763f5accb7d0c00000004", @ANYRES32=r2, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000ffffffff00"/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) socketpair(0x21, 0x6, 0x8000, &(0x7f0000000700)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES8, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x2b) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x3, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0, @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"/28], 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.current\x00', 0x275a, 0x0) 725.761676ms ago: executing program 3 (id=11578): bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r3}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r4, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 672.669317ms ago: executing program 2 (id=11579): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001040)) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000c40)=r0, 0x12) r1 = perf_event_open$cgroup(&(0x7f0000000fc0)={0x5, 0x80, 0x5, 0xb5, 0xd, 0x53, 0x0, 0xdc6, 0x1208, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x169, 0x0, @perf_bp={&(0x7f0000000e40), 0xe}, 0x100000, 0x3, 0x4, 0x6, 0x0, 0xe, 0x3, 0x0, 0x4}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0xd) perf_event_open(&(0x7f0000000f40)={0x1, 0x80, 0x4, 0x4, 0x1, 0x5, 0x0, 0xc712, 0x2288, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000e00), 0xa}, 0x4886, 0x3, 0x3ff, 0x8, 0x41ac, 0x7, 0x7, 0x0, 0x7, 0x0, 0x3}, r0, 0xe, r1, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b00000000000000000000000000000100000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000500"/24], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000001080)='syzkaller\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x1af83a7195852c3, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x25, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x20007, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [@call={0x85, 0x0, 0x0, 0xaa}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @generic={0x0, 0xd, 0x2, 0xf801, 0xffffffff}, @ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8000}}, @ldst={0x0, 0x1, 0x1, 0x5, 0x1, 0x10, 0xfffffffffffffffc}, @call={0x85, 0x0, 0x0, 0xc8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='syzkaller\x00', 0xfffffeff, 0xf8, &(0x7f00000000c0)=""/248, 0x41100, 0x2a, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x2, 0xb, 0x8001, 0x8}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000400)=[r2, r2, r2, r2, r2, r2], &(0x7f0000000440)=[{0x4, 0x1, 0x4, 0x4}], 0x10, 0x100, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0500000005000000fd0900008400000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r4}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000540), 0x6c, r4}, 0x38) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{0x1, 0xffffffffffffffff}, &(0x7f0000000680), &(0x7f00000006c0)=r3}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000b00)={r2, 0x58, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d00)={&(0x7f0000000b40)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0xb, [@enum={0xb, 0x2, 0x0, 0x6, 0x4, [{0xd, 0xfffffff9}, {0x3}]}, @enum={0x2, 0x6, 0x0, 0x6, 0x4, [{0x5, 0x1}, {0x6, 0x5}, {0x3, 0x9}, {0x8, 0xc}, {0x1, 0x8}, {0x9, 0x4}]}, @ptr={0x5, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x2e, 0x30, 0x61, 0x2e, 0x5f, 0x30, 0x0, 0x5f, 0x5f]}}, &(0x7f0000000c00)=""/200, 0x87, 0xc8, 0x0, 0x5, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x6, 0x1b, &(0x7f00000008c0)=@raw=[@map_idx={0x18, 0x9, 0x5, 0x0, 0xc}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xe}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}, @call={0x85, 0x0, 0x0, 0x24}, @tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x581}}], &(0x7f00000009c0)='GPL\x00', 0x10001, 0x0, 0x0, 0x41000, 0x50, '\x00', r6, 0x25, r7, 0x8, &(0x7f0000000d40)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000d80)={0x5, 0x5, 0x0, 0x1000}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000dc0)=[r2], &(0x7f0000000e00), 0x10, 0x7, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x9, 0x3, &(0x7f0000000000)=@framed={{0x72, 0xa, 0x0, 0xffc4, 0x400, 0x69, 0x10, 0x2a, 0xffffffff}}, &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r8 = syz_clone(0x24100880, &(0x7f0000000840)="6b6cab51134c6f3c4487b9e48abbfbbc4c7fcb25a08111fccbec2c8760f9105891c8c4ffc904eb278d9aa7f1e8f83c58a5b6caccf1497a", 0x37, &(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000e00)) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r9, 0x0, 0x0) ioctl$TUNSETLINK(r9, 0x400454cd, 0x4) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x6, 0x4, 0x8, 0x1, 0x0, 0x100, 0xa100, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000540), 0x7}, 0x200, 0x8, 0x10000, 0x2, 0x2, 0x89, 0x4, 0x0, 0x5, 0x0, 0xccb000000}, r8, 0xe, r9, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)=0x1, 0x12) ioctl$SIOCSIFHWADDR(r10, 0x89f1, &(0x7f0000000900)={'ip6gre0\x00', @random="0600002000"}) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000380)={r5, &(0x7f0000000080)="cac45557e374301e6c6e196db6a276c9422d6b", &(0x7f0000000700)=""/229, 0x4}, 0x20) 670.122176ms ago: executing program 6 (id=11589): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x8, 0x8, 0xc2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@o_path={0x0, r2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xd, &(0x7f0000000f80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000085000000a00000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2100, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 550.436367ms ago: executing program 3 (id=11580): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) mkdir(0x0, 0x126) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r4}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, 0x0}, 0x20) r5 = gettid() r6 = perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0xcf, 0x7, 0x4, 0xfc, 0x0, 0x10, 0x20540, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x2}, 0xa210, 0x0, 0x6, 0x0, 0x4, 0x71, 0x8, 0x0, 0x5, 0x0, 0x1}, r5, 0xa, r2, 0xb) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000280000002800000005000000030000000200000f04000000070001fea16e0000020000000000000000000000000000040000000000000061"], &(0x7f0000002200)=""/4110, 0x45, 0x100e, 0x1, 0x0, 0x0, @void, @value}, 0x20) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r8}, 0xc) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) 435.015688ms ago: executing program 6 (id=11581): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES32=0x1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f00000003c0), 0x4) write$cgroup_int(r2, &(0x7f00000001c0)=0x10000000, 0xfffffdef) ioctl$TUNSETOFFLOAD(r2, 0x541b, 0x2000fdfd) 434.559908ms ago: executing program 0 (id=11582): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f00000002c0)='hrtimer_init\x00', r2}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) close(0xffffffffffffffff) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={&(0x7f0000000080)='./cgroup.cpu/cpuset.cpus\x00'}, 0x18) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 455.86µs ago: executing program 2 (id=11583): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYRES32=0x1, @ANYRES32, @ANYBLOB='\x00'/25], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r1, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x8, 0xa, &(0x7f0000000680)=@framed={{0x18, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x64}, @initr0, @exit]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000340)='ext4_fc_commit_start\x00', 0xffffffffffffffff, 0x0, 0x3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f00000010c0)=ANY=[@ANYBLOB="180000000400000000000000ff03000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000008510000000000000950000000000000085100000faffffff18360000030000000000000000000000bf91000000000000b7020000000800008500000084000000b70000000000000095000000000000000ba1f1d4e8694ae43f442a9455db34dd7eda82f5145a424e4f4a74463dc0e6db1ed5f0d3218c1f9cd859e2d61999311889bff320b41823c5d7be07f11799bdc84102e30f5df68e16749f05cfc6b4d831c13e00642f0d", @ANYRESDEC=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0700000004000000200000004c163bae2b1dc35ac001000000000000005ecc477d5d15fa7270e9b11cc10d483e080d42cf9cb4b57d0bb04ed2cf3e5a3e7ef537181c3b8fdfd0a58f4fe67b4cda79bed3969467daac1598474931643c2c510ca7729d78ec0fbfbed72a4cb0de92fcf0e59176defff8ff57a50c6e91799dead0", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_GET_MAP_INFO(0x4, &(0x7f00000006c0)={r5, 0x58, &(0x7f0000000100)}, 0x87) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz0\x00', 0x1ff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x7ff}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x7, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="850000009e0000006a0a00ff000000006900c00e00000000950000000000000018100000", @ANYRES32, @ANYBLOB="00000000000000000500a801000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x2, 0xffa0, &(0x7f0000000180)=""/149, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1e, 0x10, 0x0, 0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2d) 0s ago: executing program 0 (id=11584): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000240)={@cgroup, 0xffffffffffffffff, 0x22, 0x0, 0x4000, @void, @value=r1}, 0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4110, 0x0, 0x0, 0x5}, 0x0, 0x0, r2, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\t\x00'], 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8946, &(0x7f0000000900)={'veth0_vlan\x00', @random='\x00\x00\x00 \x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x783) kernel console output (not intermixed with test programs): 29297] ? __stack_depot_save+0x36/0x480 [ 1062.710058][T29297] ? kasan_set_track+0x60/0x70 [ 1062.714652][T29297] ? kasan_set_track+0x4b/0x70 [ 1062.719253][T29297] ? kasan_save_alloc_info+0x1f/0x30 [ 1062.724375][T29297] ? __kasan_slab_alloc+0x6c/0x80 [ 1062.729235][T29297] ? slab_post_alloc_hook+0x53/0x2c0 [ 1062.734353][T29297] ? kmem_cache_alloc+0x175/0x320 [ 1062.739216][T29297] ? build_skb+0x2c/0x220 [ 1062.743381][T29297] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 1062.748850][T29297] ? bpf_prog_test_run+0x3b0/0x630 [ 1062.753794][T29297] ? __sys_bpf+0x59f/0x7f0 [ 1062.758063][T29297] ? __x64_sys_bpf+0x7c/0x90 [ 1062.762475][T29297] ? x64_sys_call+0x87f/0x9a0 [ 1062.766989][T29297] ? do_syscall_64+0x3b/0xb0 [ 1062.771422][T29297] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1062.777318][T29297] ? __kasan_check_read+0x11/0x20 [ 1062.782176][T29297] ? bpf_test_timer_continue+0x140/0x460 [ 1062.787646][T29297] bpf_test_run+0x4ab/0xa40 [ 1062.791992][T29297] ? convert___skb_to_skb+0x670/0x670 [ 1062.797192][T29297] ? eth_type_trans+0x342/0x710 [ 1062.801882][T29297] ? eth_get_headlen+0x240/0x240 [ 1062.806654][T29297] ? convert___skb_to_skb+0x44/0x670 [ 1062.811771][T29297] ? build_skb+0xde/0x220 [ 1062.815940][T29297] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 1062.821153][T29297] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1062.826905][T29297] ? __kasan_check_write+0x14/0x20 [ 1062.831822][T29297] ? fput+0x15b/0x1b0 [ 1062.835640][T29297] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1062.841369][T29297] bpf_prog_test_run+0x3b0/0x630 [ 1062.846144][T29297] ? bpf_prog_query+0x260/0x260 [ 1062.850828][T29297] ? selinux_bpf+0xd2/0x100 [ 1062.855168][T29297] ? security_bpf+0x82/0xb0 [ 1062.859513][T29297] __sys_bpf+0x59f/0x7f0 [ 1062.863588][T29297] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1062.868801][T29297] ? __ia32_sys_read+0x90/0x90 [ 1062.873395][T29297] ? debug_smp_processor_id+0x17/0x20 [ 1062.878604][T29297] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1062.884508][T29297] __x64_sys_bpf+0x7c/0x90 [ 1062.888760][T29297] x64_sys_call+0x87f/0x9a0 [ 1062.893115][T29297] do_syscall_64+0x3b/0xb0 [ 1062.897351][T29297] ? clear_bhb_loop+0x55/0xb0 [ 1062.901863][T29297] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1062.907592][T29297] RIP: 0033:0x7fe531d7e759 [ 1062.911846][T29297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1062.931286][T29297] RSP: 002b:00007fe532aa8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1062.939532][T29297] RAX: ffffffffffffffda RBX: 00007fe531f35f80 RCX: 00007fe531d7e759 [ 1062.947342][T29297] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 1062.955154][T29297] RBP: 00007fe532aa8090 R08: 0000000000000000 R09: 0000000000000000 [ 1062.962968][T29297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1062.970777][T29297] R13: 0000000000000000 R14: 00007fe531f35f80 R15: 00007ffc0496a878 [ 1062.978626][T29297] [ 1062.981527][T29295] CPU: 0 PID: 29295 Comm: syz.2.8814 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1062.991175][T29295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1063.001093][T29295] Call Trace: [ 1063.004193][T29295] [ 1063.006971][T29295] dump_stack_lvl+0x151/0x1b7 [ 1063.011484][T29295] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1063.016784][T29295] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1063.022420][T29295] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1063.028411][T29295] dump_stack+0x15/0x1e [ 1063.032402][T29295] should_fail_ex+0x3d0/0x520 [ 1063.036918][T29295] should_fail+0xb/0x10 [ 1063.040906][T29295] should_fail_usercopy+0x1a/0x20 [ 1063.045767][T29295] strncpy_from_user+0x24/0x2b0 [ 1063.050456][T29295] bpf_prog_load+0x1fb/0x1bf0 [ 1063.054972][T29295] ? map_freeze+0x3a0/0x3a0 [ 1063.059316][T29295] ? selinux_bpf+0xcb/0x100 [ 1063.063648][T29295] ? security_bpf+0x82/0xb0 [ 1063.068003][T29295] __sys_bpf+0x52c/0x7f0 [ 1063.072063][T29295] ? clockevents_program_event+0x22f/0x300 [ 1063.077707][T29295] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1063.082975][T29295] ? __sched_clock_gtod_offset+0x100/0x100 [ 1063.088560][T29295] ? debug_smp_processor_id+0x17/0x20 [ 1063.093769][T29295] __x64_sys_bpf+0x7c/0x90 [ 1063.098023][T29295] x64_sys_call+0x87f/0x9a0 [ 1063.102355][T29295] do_syscall_64+0x3b/0xb0 [ 1063.106608][T29295] ? clear_bhb_loop+0x55/0xb0 [ 1063.111125][T29295] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1063.116852][T29295] RIP: 0033:0x7f667db7e759 [ 1063.121105][T29295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1063.140545][T29295] RSP: 002b:00007f667e8cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1063.148794][T29295] RAX: ffffffffffffffda RBX: 00007f667dd35f80 RCX: 00007f667db7e759 [ 1063.156606][T29295] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000005 [ 1063.164411][T29295] RBP: 00007f667e8cf090 R08: 0000000000000000 R09: 0000000000000000 [ 1063.172222][T29295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1063.180034][T29295] R13: 0000000000000000 R14: 00007f667dd35f80 R15: 00007ffc9f2f37b8 [ 1063.187855][T29295] [ 1063.383825][T29309] device pim6reg1 entered promiscuous mode [ 1066.739713][T29409] FAULT_INJECTION: forcing a failure. [ 1066.739713][T29409] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1066.793401][T29409] CPU: 0 PID: 29409 Comm: syz.2.8848 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1066.803130][T29409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1066.813033][T29409] Call Trace: [ 1066.816146][T29409] [ 1066.818929][T29409] dump_stack_lvl+0x151/0x1b7 [ 1066.823441][T29409] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1066.828858][T29409] dump_stack+0x15/0x1e [ 1066.832844][T29409] should_fail_ex+0x3d0/0x520 [ 1066.837356][T29409] should_fail+0xb/0x10 [ 1066.841348][T29409] should_fail_usercopy+0x1a/0x20 [ 1066.846207][T29409] _copy_from_user+0x1e/0xc0 [ 1066.850635][T29409] generic_map_update_batch+0x54c/0x8c0 [ 1066.856022][T29409] ? generic_map_delete_batch+0x5c0/0x5c0 [ 1066.861580][T29409] ? generic_map_delete_batch+0x5c0/0x5c0 [ 1066.867127][T29409] bpf_map_do_batch+0x4cc/0x630 [ 1066.871818][T29409] __sys_bpf+0x66b/0x7f0 [ 1066.875892][T29409] ? clockevents_program_event+0x22f/0x300 [ 1066.881532][T29409] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1066.886747][T29409] ? __sched_clock_gtod_offset+0x100/0x100 [ 1066.892385][T29409] ? debug_smp_processor_id+0x17/0x20 [ 1066.897591][T29409] __x64_sys_bpf+0x7c/0x90 [ 1066.901870][T29409] x64_sys_call+0x87f/0x9a0 [ 1066.906185][T29409] do_syscall_64+0x3b/0xb0 [ 1066.910435][T29409] ? clear_bhb_loop+0x55/0xb0 [ 1066.914950][T29409] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1066.920769][T29409] RIP: 0033:0x7f667db7e759 [ 1066.925025][T29409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1066.944457][T29409] RSP: 002b:00007f667e8cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1066.952703][T29409] RAX: ffffffffffffffda RBX: 00007f667dd35f80 RCX: 00007f667db7e759 [ 1066.960513][T29409] RDX: 0000000000000038 RSI: 0000000020000300 RDI: 000000000000001a [ 1066.968324][T29409] RBP: 00007f667e8cf090 R08: 0000000000000000 R09: 0000000000000000 [ 1066.976135][T29409] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1066.983951][T29409] R13: 0000000000000000 R14: 00007f667dd35f80 R15: 00007ffc9f2f37b8 [ 1066.991768][T29409] [ 1068.611946][T29455] Â: renamed from pim6reg1 [ 1072.982784][T29568] Â: renamed from pim6reg1 [ 1075.043251][T29652] FAULT_INJECTION: forcing a failure. [ 1075.043251][T29652] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.220018][T29652] CPU: 0 PID: 29652 Comm: syz.3.8924 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1075.229873][T29652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1075.239768][T29652] Call Trace: [ 1075.242899][T29652] [ 1075.245665][T29652] dump_stack_lvl+0x151/0x1b7 [ 1075.250178][T29652] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1075.255558][T29652] ? avc_has_perm+0x16f/0x260 [ 1075.260073][T29652] dump_stack+0x15/0x1e [ 1075.264065][T29652] should_fail_ex+0x3d0/0x520 [ 1075.268579][T29652] should_fail_alloc_page+0x68/0x90 [ 1075.273614][T29652] prepare_alloc_pages+0x14e/0x6f0 [ 1075.278556][T29652] ? string+0x28b/0x2a0 [ 1075.282557][T29652] ? __alloc_pages_bulk+0xda0/0xda0 [ 1075.287586][T29652] __alloc_pages+0x162/0x610 [ 1075.292013][T29652] ? prep_new_page+0x110/0x110 [ 1075.296614][T29652] ? scnprintf+0x105/0x170 [ 1075.300873][T29652] ? kernfs_path_from_node+0x8af/0xd20 [ 1075.306174][T29652] ? snprintf+0x120/0x120 [ 1075.310326][T29652] ? kstrtoull+0x1cd/0x2e0 [ 1075.314578][T29652] __pmd_alloc+0xb1/0x550 [ 1075.318746][T29652] ? bpf_get_current_pid_tgid+0x34/0xc0 [ 1075.324131][T29652] ? bpf_trace_run4+0x192/0x2f0 [ 1075.328815][T29652] ? __pud_alloc+0x260/0x260 [ 1075.333239][T29652] ? bpf_trace_run3+0x2e0/0x2e0 [ 1075.337925][T29652] ? __kasan_check_read+0x11/0x20 [ 1075.342783][T29652] ? hugepage_vma_check+0x182/0x4f0 [ 1075.347821][T29652] handle_mm_fault+0xca4/0x30e0 [ 1075.352512][T29652] ? numa_migrate_prep+0xe0/0xe0 [ 1075.357417][T29652] ? lock_mm_and_find_vma+0x9c/0x310 [ 1075.362530][T29652] exc_page_fault+0x24d/0x6d0 [ 1075.367041][T29652] asm_exc_page_fault+0x27/0x30 [ 1075.371727][T29652] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1075.377278][T29652] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca c3 0f 1f 44 00 00 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca c3 66 0f 1f 44 00 00 48 bb f9 ef ff ff ff 7f [ 1075.396720][T29652] RSP: 0018:ffffc90000f5fdd8 EFLAGS: 00050297 [ 1075.402624][T29652] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 1075.410435][T29652] RDX: ffff88812db18000 RSI: 0000000000000005 RDI: 0000000000000000 [ 1075.418244][T29652] RBP: ffffc90000f5fed8 R08: ffffffff8401ae3e R09: ffffed1022d5a8b5 [ 1075.426056][T29652] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 1075.433867][T29652] R13: 1ffff920001ebfc4 R14: 1ffff920001ebfcc R15: 0000000020000000 [ 1075.441680][T29652] ? __sys_socketpair+0x14e/0x6e0 [ 1075.446541][T29652] ? __sys_socketpair+0x171/0x6e0 [ 1075.451402][T29652] ? __ia32_sys_socket+0x90/0x90 [ 1075.456172][T29652] ? __ia32_sys_read+0x90/0x90 [ 1075.460875][T29652] ? debug_smp_processor_id+0x17/0x20 [ 1075.466075][T29652] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1075.471977][T29652] __x64_sys_socketpair+0x9b/0xb0 [ 1075.476836][T29652] x64_sys_call+0x19b/0x9a0 [ 1075.481179][T29652] do_syscall_64+0x3b/0xb0 [ 1075.485427][T29652] ? clear_bhb_loop+0x55/0xb0 [ 1075.489944][T29652] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1075.495688][T29652] RIP: 0033:0x7f6bcfb7e759 [ 1075.499923][T29652] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1075.519366][T29652] RSP: 002b:00007f6bd0a56038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1075.527610][T29652] RAX: ffffffffffffffda RBX: 00007f6bcfd35f80 RCX: 00007f6bcfb7e759 [ 1075.535423][T29652] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 1075.543234][T29652] RBP: 00007f6bd0a56090 R08: 0000000000000000 R09: 0000000000000000 [ 1075.551044][T29652] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 1075.558857][T29652] R13: 0000000000000001 R14: 00007f6bcfd35f80 R15: 00007ffdefa52588 [ 1075.566671][T29652] [ 1079.058400][T29748] bridge0: port 1(bridge_slave_0) entered blocking state [ 1079.118291][T29748] bridge0: port 1(bridge_slave_0) entered disabled state [ 1079.164381][T29748] device bridge_slave_0 entered promiscuous mode [ 1079.187744][T29748] bridge0: port 2(bridge_slave_1) entered blocking state [ 1079.226032][T29748] bridge0: port 2(bridge_slave_1) entered disabled state [ 1079.252160][T29748] device bridge_slave_1 entered promiscuous mode [ 1079.599934][T29748] bridge0: port 2(bridge_slave_1) entered blocking state [ 1079.606814][T29748] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1079.613923][T29748] bridge0: port 1(bridge_slave_0) entered blocking state [ 1079.620702][T29748] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1079.725620][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1079.737835][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1079.744918][T29776] FAULT_INJECTION: forcing a failure. [ 1079.744918][T29776] name failslab, interval 1, probability 0, space 0, times 0 [ 1079.758798][T29776] CPU: 0 PID: 29776 Comm: syz.5.8960 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1079.768512][T29776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1079.778405][T29776] Call Trace: [ 1079.781527][T29776] [ 1079.784307][T29776] dump_stack_lvl+0x151/0x1b7 [ 1079.788825][T29776] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1079.794118][T29776] dump_stack+0x15/0x1e [ 1079.798106][T29776] should_fail_ex+0x3d0/0x520 [ 1079.802620][T29776] __should_failslab+0xaf/0xf0 [ 1079.807221][T29776] should_failslab+0x9/0x20 [ 1079.811564][T29776] kmem_cache_alloc_node+0x42/0x330 [ 1079.816592][T29776] ? alloc_vmap_area+0x1a5/0x1aa0 [ 1079.821455][T29776] alloc_vmap_area+0x1a5/0x1aa0 [ 1079.826148][T29776] ? vm_map_ram+0x940/0x940 [ 1079.830486][T29776] ? __kasan_kmalloc+0x9c/0xb0 [ 1079.835079][T29776] ? kmalloc_node_trace+0x3d/0xb0 [ 1079.839954][T29776] __get_vm_area_node+0x171/0x370 [ 1079.844802][T29776] __vmalloc_node_range+0x338/0x1560 [ 1079.849921][T29776] ? copy_process+0x5c3/0x3530 [ 1079.854526][T29776] ? putname+0xfa/0x150 [ 1079.858516][T29776] ? __kasan_slab_alloc+0x6c/0x80 [ 1079.863379][T29776] ? vmap+0x2b0/0x2b0 [ 1079.867194][T29776] ? __slab_alloc+0x6a/0xa0 [ 1079.871533][T29776] ? arch_dup_task_struct+0x3f/0x90 [ 1079.876569][T29776] ? memcpy+0x56/0x70 [ 1079.880393][T29776] dup_task_struct+0x3d6/0x7d0 [ 1079.884988][T29776] ? copy_process+0x5c3/0x3530 [ 1079.889591][T29776] copy_process+0x5c3/0x3530 [ 1079.894019][T29776] ? __kasan_check_write+0x14/0x20 [ 1079.898961][T29776] ? proc_fail_nth_write+0x20b/0x290 [ 1079.904082][T29776] ? selinux_file_permission+0x2bb/0x560 [ 1079.909573][T29776] ? proc_fail_nth_read+0x210/0x210 [ 1079.914582][T29776] ? fsnotify_perm+0x6a/0x5b0 [ 1079.919104][T29776] ? idle_dummy+0x10/0x10 [ 1079.923263][T29776] ? vfs_write+0x952/0xed0 [ 1079.927518][T29776] ? __kasan_slab_free+0x11/0x20 [ 1079.932290][T29776] kernel_clone+0x229/0x890 [ 1079.936630][T29776] ? __kasan_check_write+0x14/0x20 [ 1079.941577][T29776] ? mutex_unlock+0xb2/0x260 [ 1079.946001][T29776] ? create_io_thread+0x180/0x180 [ 1079.950867][T29776] __x64_sys_clone+0x231/0x280 [ 1079.955461][T29776] ? __do_sys_vfork+0x110/0x110 [ 1079.960154][T29776] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1079.966049][T29776] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1079.971519][T29776] x64_sys_call+0x1b0/0x9a0 [ 1079.975859][T29776] do_syscall_64+0x3b/0xb0 [ 1079.980113][T29776] ? clear_bhb_loop+0x55/0xb0 [ 1079.984628][T29776] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1079.990372][T29776] RIP: 0033:0x7f3ba9f7e759 [ 1079.994606][T29776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1080.014048][T29776] RSP: 002b:00007f3baad14fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1080.022291][T29776] RAX: ffffffffffffffda RBX: 00007f3baa135f80 RCX: 00007f3ba9f7e759 [ 1080.030106][T29776] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1080.037915][T29776] RBP: 00007f3baad15090 R08: 0000000000000000 R09: 0000000000000000 [ 1080.045988][T29776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1080.053802][T29776] R13: 0000000000000000 R14: 00007f3baa135f80 R15: 00007ffcf355d1a8 [ 1080.061616][T29776] [ 1080.069726][T29776] syz.5.8960: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz5,mems_allowed=0 [ 1080.084856][T29776] CPU: 0 PID: 29776 Comm: syz.5.8960 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1080.094566][T29776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1080.104459][T29776] Call Trace: [ 1080.107583][T29776] [ 1080.110358][T29776] dump_stack_lvl+0x151/0x1b7 [ 1080.114870][T29776] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1080.120345][T29776] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1080.125982][T29776] dump_stack+0x15/0x1e [ 1080.129972][T29776] warn_alloc+0x21a/0x3a0 [ 1080.134140][T29776] ? zone_watermark_ok_safe+0x270/0x270 [ 1080.139524][T29776] ? __get_vm_area_node+0x186/0x370 [ 1080.144556][T29776] ? __get_vm_area_node+0x186/0x370 [ 1080.149593][T29776] __vmalloc_node_range+0x35c/0x1560 [ 1080.154715][T29776] ? putname+0xfa/0x150 [ 1080.158702][T29776] ? __kasan_slab_alloc+0x6c/0x80 [ 1080.163567][T29776] ? vmap+0x2b0/0x2b0 [ 1080.167394][T29776] ? __slab_alloc+0x6a/0xa0 [ 1080.171721][T29776] ? arch_dup_task_struct+0x3f/0x90 [ 1080.176753][T29776] ? memcpy+0x56/0x70 [ 1080.180573][T29776] dup_task_struct+0x3d6/0x7d0 [ 1080.185171][T29776] ? copy_process+0x5c3/0x3530 [ 1080.189776][T29776] copy_process+0x5c3/0x3530 [ 1080.194202][T29776] ? __kasan_check_write+0x14/0x20 [ 1080.199150][T29776] ? proc_fail_nth_write+0x20b/0x290 [ 1080.204267][T29776] ? selinux_file_permission+0x2bb/0x560 [ 1080.209739][T29776] ? proc_fail_nth_read+0x210/0x210 [ 1080.214768][T29776] ? fsnotify_perm+0x6a/0x5b0 [ 1080.219286][T29776] ? idle_dummy+0x10/0x10 [ 1080.223462][T29776] ? vfs_write+0x952/0xed0 [ 1080.227700][T29776] ? __kasan_slab_free+0x11/0x20 [ 1080.232478][T29776] kernel_clone+0x229/0x890 [ 1080.236824][T29776] ? __kasan_check_write+0x14/0x20 [ 1080.241762][T29776] ? mutex_unlock+0xb2/0x260 [ 1080.246194][T29776] ? create_io_thread+0x180/0x180 [ 1080.251053][T29776] __x64_sys_clone+0x231/0x280 [ 1080.255654][T29776] ? __do_sys_vfork+0x110/0x110 [ 1080.260340][T29776] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1080.266242][T29776] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1080.271719][T29776] x64_sys_call+0x1b0/0x9a0 [ 1080.276045][T29776] do_syscall_64+0x3b/0xb0 [ 1080.280298][T29776] ? clear_bhb_loop+0x55/0xb0 [ 1080.284815][T29776] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1080.290541][T29776] RIP: 0033:0x7f3ba9f7e759 [ 1080.294792][T29776] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1080.314236][T29776] RSP: 002b:00007f3baad14fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1080.322481][T29776] RAX: ffffffffffffffda RBX: 00007f3baa135f80 RCX: 00007f3ba9f7e759 [ 1080.330288][T29776] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1080.338101][T29776] RBP: 00007f3baad15090 R08: 0000000000000000 R09: 0000000000000000 [ 1080.345913][T29776] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1080.353723][T29776] R13: 0000000000000000 R14: 00007f3baa135f80 R15: 00007ffcf355d1a8 [ 1080.361542][T29776] [ 1080.400118][T29776] Mem-Info: [ 1080.403113][T29776] active_anon:26846 inactive_anon:0 isolated_anon:0 [ 1080.403113][T29776] active_file:25292 inactive_file:2334 isolated_file:0 [ 1080.403113][T29776] unevictable:0 dirty:238 writeback:0 [ 1080.403113][T29776] slab_reclaimable:7557 slab_unreclaimable:77998 [ 1080.403113][T29776] mapped:21444 shmem:213 pagetables:574 [ 1080.403113][T29776] sec_pagetables:0 bounce:0 [ 1080.403113][T29776] kernel_misc_reclaimable:0 [ 1080.403113][T29776] free:1494246 free_pcp:17171 free_cma:0 [ 1080.506794][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1080.547865][T29776] Node 0 active_anon:109084kB inactive_anon:0kB active_file:101168kB inactive_file:9336kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:87776kB dirty:952kB writeback:0kB shmem:852kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4512kB pagetables:2196kB sec_pagetables:0kB all_unreclaimable? no [ 1080.589793][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1080.617419][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1080.633245][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1080.643735][ T719] bridge0: port 1(bridge_slave_0) entered blocking state [ 1080.650616][ T719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1080.659297][T29776] DMA32 free:2966484kB boost:0kB min:62552kB low:78188kB high:93824kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971552kB mlocked:0kB bounce:0kB free_pcp:5068kB local_pcp:5012kB free_cma:0kB [ 1080.661439][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1080.706441][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1080.714583][ T719] bridge0: port 2(bridge_slave_1) entered blocking state [ 1080.720746][T29776] lowmem_reserve[]: 0 3932 3932 3932 [ 1080.721450][ T719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1080.726527][T29776] Normal free:3009224kB boost:0kB min:84900kB low:106124kB high:127348kB reserved_highatomic:0KB active_anon:115684kB inactive_anon:0kB active_file:101168kB inactive_file:9336kB unevictable:0kB writepending:952kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:57348kB local_pcp:37900kB free_cma:0kB [ 1080.824807][T29776] lowmem_reserve[]: 0 0 0 0 [ 1080.829193][T29776] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 722*4096kB (M) = 2966484kB [ 1080.849416][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1080.865808][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1080.873431][T29776] Normal: 61*4kB (ME) 106*8kB (ME) 1311*16kB (UME) 1123*32kB (UME) 831*64kB (UME) 219*128kB (UME) 196*256kB (UME) 86*512kB (UME) 57*1024kB (UME) 3*2048kB (UE) 662*4096kB (UM) = 3009492kB [ 1081.000058][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1081.039337][T29776] 27845 total pagecache pages [ 1081.053305][T29776] 0 pages in swap cache [ 1081.057272][T29776] Free swap = 124996kB [ 1081.063303][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1081.080804][T29776] Total swap = 124996kB [ 1081.114686][T29776] 2097051 pages RAM [ 1081.126942][T29776] 0 pages HighMem/MovableOnly [ 1081.136760][T29776] 347563 pages reserved [ 1081.140973][T29776] 0 pages cma reserved [ 1081.172637][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1081.208108][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1081.270775][T29748] device veth0_vlan entered promiscuous mode [ 1081.288923][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1081.303424][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1081.339162][T29748] device veth1_macvtap entered promiscuous mode [ 1081.429399][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1081.447275][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1081.505806][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1081.568275][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1081.630527][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1081.737464][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1081.748423][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1081.807794][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1081.841599][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1082.150948][ T198] bridge0: port 3(gretap0) entered disabled state [ 1082.192554][ T198] device gretap0 left promiscuous mode [ 1082.250405][ T198] bridge0: port 3(gretap0) entered disabled state [ 1082.319904][T29814] syz.1.8974[29814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1082.319977][T29814] syz.1.8974[29814] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1082.714296][ T198] device bridge_slave_1 left promiscuous mode [ 1082.745731][ T198] bridge0: port 2(bridge_slave_1) entered disabled state [ 1082.814979][ T198] device bridge_slave_0 left promiscuous mode [ 1082.839698][ T198] bridge0: port 1(bridge_slave_0) entered disabled state [ 1082.847714][ T198] device veth1_macvtap left promiscuous mode [ 1082.859380][ T198] device veth0_vlan left promiscuous mode [ 1083.057035][T29822] device syzkaller0 entered promiscuous mode [ 1083.071776][T29836] device pim6reg1 entered promiscuous mode [ 1083.098057][T29816] bridge0: port 1(bridge_slave_0) entered blocking state [ 1083.110753][T29816] bridge0: port 1(bridge_slave_0) entered disabled state [ 1083.118034][T29816] device bridge_slave_0 entered promiscuous mode [ 1083.146188][T29816] bridge0: port 2(bridge_slave_1) entered blocking state [ 1083.153154][T29816] bridge0: port 2(bridge_slave_1) entered disabled state [ 1083.160844][T29816] device bridge_slave_1 entered promiscuous mode [ 1083.331397][T29816] bridge0: port 2(bridge_slave_1) entered blocking state [ 1083.338350][T29816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1083.345511][T29816] bridge0: port 1(bridge_slave_0) entered blocking state [ 1083.352369][T29816] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1083.441919][ T719] bridge0: port 1(bridge_slave_0) entered disabled state [ 1083.469901][ T719] bridge0: port 2(bridge_slave_1) entered disabled state [ 1083.583985][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1083.601832][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1083.654473][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1083.678642][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1083.709989][ T719] bridge0: port 1(bridge_slave_0) entered blocking state [ 1083.716865][ T719] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1083.760326][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1083.822682][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1083.885663][ T719] bridge0: port 2(bridge_slave_1) entered blocking state [ 1083.892558][ T719] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1084.007746][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1084.042426][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1084.110004][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1084.185596][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1084.465245][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1084.525068][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1084.598011][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1084.638024][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1084.884829][T29816] device veth0_vlan entered promiscuous mode [ 1084.899134][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1084.910090][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1084.942082][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1084.980590][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1085.002431][T29886] syz.2.8993[29886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1085.002509][T29886] syz.2.8993[29886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1085.017338][T29887] device pim6reg1 entered promiscuous mode [ 1085.056189][T29816] device veth1_macvtap entered promiscuous mode [ 1085.163447][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1085.171362][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1085.180302][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1085.188908][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1085.197515][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1085.439446][T29886] device syzkaller0 entered promiscuous mode [ 1085.533480][ T198] device bridge_slave_1 left promiscuous mode [ 1085.539845][ T198] bridge0: port 2(bridge_slave_1) entered disabled state [ 1085.547503][ T198] device bridge_slave_0 left promiscuous mode [ 1085.556945][ T198] bridge0: port 1(bridge_slave_0) entered disabled state [ 1085.565113][ T198] device veth1_macvtap left promiscuous mode [ 1085.571214][ T198] device veth0_vlan left promiscuous mode [ 1086.596750][T29925] bridge0: port 1(bridge_slave_0) entered blocking state [ 1086.629423][T29925] bridge0: port 1(bridge_slave_0) entered disabled state [ 1086.636942][T29925] device bridge_slave_0 entered promiscuous mode [ 1086.644198][T29925] bridge0: port 2(bridge_slave_1) entered blocking state [ 1086.651551][T29925] bridge0: port 2(bridge_slave_1) entered disabled state [ 1086.688822][T29925] device bridge_slave_1 entered promiscuous mode [ 1087.041979][ T198] device veth1_macvtap left promiscuous mode [ 1087.051232][ T198] device veth0_vlan left promiscuous mode [ 1087.504267][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1087.517836][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1087.554288][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1087.591276][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1087.623500][T28304] bridge0: port 1(bridge_slave_0) entered blocking state [ 1087.630375][T28304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1087.637840][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1087.646120][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1087.654389][T28304] bridge0: port 2(bridge_slave_1) entered blocking state [ 1087.661244][T28304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1087.668652][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1087.688112][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1087.705436][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1087.754107][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1087.788057][T29925] device veth0_vlan entered promiscuous mode [ 1087.816051][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1087.855562][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1087.931380][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1088.016536][T29925] device veth1_macvtap entered promiscuous mode [ 1088.093967][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1088.119873][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1088.209468][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1088.355207][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1088.429857][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1088.481092][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1088.491700][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1088.935887][T29995] syz.0.9020[29995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1088.935991][T29995] syz.0.9020[29995] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1089.457016][T29999] device syzkaller0 entered promiscuous mode [ 1092.568828][T30043] bridge0: port 1(bridge_slave_0) entered blocking state [ 1092.579075][T30043] bridge0: port 1(bridge_slave_0) entered disabled state [ 1092.597531][T30043] device bridge_slave_0 entered promiscuous mode [ 1092.638508][T30043] bridge0: port 2(bridge_slave_1) entered blocking state [ 1092.647842][T30043] bridge0: port 2(bridge_slave_1) entered disabled state [ 1092.669858][T30043] device bridge_slave_1 entered promiscuous mode [ 1093.346204][ T324] device bridge_slave_1 left promiscuous mode [ 1093.353306][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 1093.364694][ T324] device bridge_slave_0 left promiscuous mode [ 1093.376736][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 1093.406208][ T324] device veth1_macvtap left promiscuous mode [ 1093.416418][ T324] device veth0_vlan left promiscuous mode [ 1093.681922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1093.694990][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1093.779888][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1093.845421][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1093.884076][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 1093.891042][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1093.923778][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1093.932178][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1093.940391][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 1093.947243][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1093.954699][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1093.962912][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1094.011787][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1094.141217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1094.153140][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1094.178945][T30043] device veth0_vlan entered promiscuous mode [ 1094.246675][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1094.257777][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1094.273811][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1094.282967][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1094.362449][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1094.372137][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1094.396596][T30043] device veth1_macvtap entered promiscuous mode [ 1094.539086][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1094.562895][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1094.585989][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1094.664636][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1094.732542][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1098.531434][T30193] bond_slave_1: mtu less than device minimum [ 1101.830064][T30261] device pim6reg1 entered promiscuous mode [ 1102.116214][T30267] FAULT_INJECTION: forcing a failure. [ 1102.116214][T30267] name failslab, interval 1, probability 0, space 0, times 0 [ 1102.191215][T30267] CPU: 1 PID: 30267 Comm: syz.1.9096 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1102.201085][T30267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1102.210970][T30267] Call Trace: [ 1102.214091][T30267] [ 1102.216869][T30267] dump_stack_lvl+0x151/0x1b7 [ 1102.221403][T30267] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1102.226795][T30267] dump_stack+0x15/0x1e [ 1102.230785][T30267] should_fail_ex+0x3d0/0x520 [ 1102.235301][T30267] __should_failslab+0xaf/0xf0 [ 1102.239899][T30267] ? security_prepare_creds+0x4d/0x140 [ 1102.245193][T30267] should_failslab+0x9/0x20 [ 1102.249650][T30267] __kmem_cache_alloc_node+0x3d/0x2a0 [ 1102.254855][T30267] ? security_prepare_creds+0x4d/0x140 [ 1102.260146][T30267] __kmalloc+0xa3/0x1e0 [ 1102.264144][T30267] ? prepare_creds+0x2f/0x6a0 [ 1102.268674][T30267] security_prepare_creds+0x4d/0x140 [ 1102.273779][T30267] prepare_creds+0x472/0x6a0 [ 1102.278204][T30267] copy_creds+0xf0/0x630 [ 1102.282287][T30267] copy_process+0x855/0x3530 [ 1102.286711][T30267] ? __kasan_check_write+0x14/0x20 [ 1102.291655][T30267] ? proc_fail_nth_write+0x20b/0x290 [ 1102.296778][T30267] ? proc_fail_nth_read+0x210/0x210 [ 1102.301813][T30267] ? fsnotify_perm+0x6a/0x5b0 [ 1102.306323][T30267] ? idle_dummy+0x10/0x10 [ 1102.310488][T30267] ? vfs_write+0x952/0xed0 [ 1102.314742][T30267] ? __kasan_slab_free+0x11/0x20 [ 1102.319521][T30267] kernel_clone+0x229/0x890 [ 1102.323857][T30267] ? __kasan_check_write+0x14/0x20 [ 1102.328802][T30267] ? mutex_unlock+0xb2/0x260 [ 1102.333231][T30267] ? create_io_thread+0x180/0x180 [ 1102.338094][T30267] __x64_sys_clone+0x231/0x280 [ 1102.342690][T30267] ? __do_sys_vfork+0x110/0x110 [ 1102.347377][T30267] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1102.353277][T30267] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1102.358747][T30267] x64_sys_call+0x1b0/0x9a0 [ 1102.363085][T30267] do_syscall_64+0x3b/0xb0 [ 1102.367338][T30267] ? clear_bhb_loop+0x55/0xb0 [ 1102.371851][T30267] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1102.377589][T30267] RIP: 0033:0x7f5af057e759 [ 1102.381838][T30267] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1102.401282][T30267] RSP: 002b:00007f5af133efe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1102.409520][T30267] RAX: ffffffffffffffda RBX: 00007f5af0735f80 RCX: 00007f5af057e759 [ 1102.417344][T30267] RDX: 0000000020000180 RSI: 00000000200000c0 RDI: 0000000041002000 [ 1102.425145][T30267] RBP: 00007f5af133f090 R08: 0000000020000200 R09: 0000000020000200 [ 1102.432954][T30267] R10: 00000000200001c0 R11: 0000000000000206 R12: 0000000000000001 [ 1102.440768][T30267] R13: 0000000000000001 R14: 00007f5af0735f80 R15: 00007fff337db6a8 [ 1102.448583][T30267] [ 1105.309768][T30332] veth1_to_batadv: mtu greater than device maximum [ 1106.997760][T30369] device sit0 left promiscuous mode [ 1107.223153][T30369] device sit0 entered promiscuous mode [ 1114.065000][T30527] device sit0 left promiscuous mode [ 1118.912474][T30617] device pim6reg1 entered promiscuous mode [ 1121.433278][T30692] device veth0_vlan left promiscuous mode [ 1121.489970][T30692] device veth0_vlan entered promiscuous mode [ 1121.562523][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1121.572985][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1121.608033][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1121.967339][T30702] FAULT_INJECTION: forcing a failure. [ 1121.967339][T30702] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.099487][T30702] CPU: 0 PID: 30702 Comm: syz.5.9228 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1122.109230][T30702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1122.119123][T30702] Call Trace: [ 1122.122244][T30702] [ 1122.125024][T30702] dump_stack_lvl+0x151/0x1b7 [ 1122.129549][T30702] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1122.134832][T30702] dump_stack+0x15/0x1e [ 1122.138832][T30702] should_fail_ex+0x3d0/0x520 [ 1122.143339][T30702] __should_failslab+0xaf/0xf0 [ 1122.147943][T30702] ? page_pool_create+0x70/0x610 [ 1122.152708][T30702] should_failslab+0x9/0x20 [ 1122.157055][T30702] __kmem_cache_alloc_node+0x3d/0x2a0 [ 1122.162256][T30702] ? __kernel_text_address+0xd/0x40 [ 1122.167286][T30702] ? page_pool_create+0x70/0x610 [ 1122.172063][T30702] kmalloc_node_trace+0x26/0xb0 [ 1122.176750][T30702] page_pool_create+0x70/0x610 [ 1122.181368][T30702] bpf_test_run_xdp_live+0x2d6/0x1f70 [ 1122.186571][T30702] ? stack_trace_snprint+0xf0/0xf0 [ 1122.191507][T30702] ? __stack_depot_save+0x36/0x480 [ 1122.196453][T30702] ? kasan_set_track+0x60/0x70 [ 1122.201054][T30702] ? kasan_set_track+0x4b/0x70 [ 1122.205650][T30702] ? kasan_save_alloc_info+0x1f/0x30 [ 1122.210773][T30702] ? __kasan_kmalloc+0x9c/0xb0 [ 1122.215598][T30702] ? __kmalloc+0xb4/0x1e0 [ 1122.219779][T30702] ? bpf_prog_test_run_xdp+0x414/0x1130 [ 1122.225148][T30702] ? xdp_convert_md_to_buff+0x360/0x360 [ 1122.230533][T30702] ? x64_sys_call+0x87f/0x9a0 [ 1122.235049][T30702] ? do_syscall_64+0x3b/0xb0 [ 1122.239673][T30702] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1122.245575][T30702] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 1122.251660][T30702] ? __kasan_check_write+0x14/0x20 [ 1122.256586][T30702] ? _copy_from_user+0x90/0xc0 [ 1122.261198][T30702] ? bpf_test_init+0x169/0x190 [ 1122.265796][T30702] ? xdp_convert_md_to_buff+0x5d/0x360 [ 1122.271080][T30702] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 1122.276290][T30702] ? dev_put+0x80/0x80 [ 1122.280194][T30702] ? __kasan_check_write+0x14/0x20 [ 1122.285141][T30702] ? fput+0x15b/0x1b0 [ 1122.288962][T30702] ? dev_put+0x80/0x80 [ 1122.292867][T30702] bpf_prog_test_run+0x3b0/0x630 [ 1122.297640][T30702] ? bpf_prog_query+0x260/0x260 [ 1122.302327][T30702] ? selinux_bpf+0xd2/0x100 [ 1122.306665][T30702] ? security_bpf+0x82/0xb0 [ 1122.311012][T30702] __sys_bpf+0x59f/0x7f0 [ 1122.315084][T30702] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1122.320294][T30702] ? __ia32_sys_read+0x90/0x90 [ 1122.324893][T30702] ? debug_smp_processor_id+0x17/0x20 [ 1122.330099][T30702] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1122.336005][T30702] __x64_sys_bpf+0x7c/0x90 [ 1122.340254][T30702] x64_sys_call+0x87f/0x9a0 [ 1122.344593][T30702] do_syscall_64+0x3b/0xb0 [ 1122.348856][T30702] ? clear_bhb_loop+0x55/0xb0 [ 1122.353360][T30702] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1122.359089][T30702] RIP: 0033:0x7f3ba9f7e759 [ 1122.363339][T30702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1122.382798][T30702] RSP: 002b:00007f3baad15038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1122.391027][T30702] RAX: ffffffffffffffda RBX: 00007f3baa135f80 RCX: 00007f3ba9f7e759 [ 1122.398839][T30702] RDX: 0000000000000050 RSI: 00000000200000c0 RDI: 000000000000000a [ 1122.406650][T30702] RBP: 00007f3baad15090 R08: 0000000000000000 R09: 0000000000000000 [ 1122.414471][T30702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1122.422280][T30702] R13: 0000000000000000 R14: 00007f3baa135f80 R15: 00007ffcf355d1a8 [ 1122.430088][T30702] [ 1123.246895][T30721] device sit0 entered promiscuous mode [ 1123.850130][T30728] bridge0: port 1(bridge_slave_0) entered blocking state [ 1123.859265][T30728] bridge0: port 1(bridge_slave_0) entered disabled state [ 1123.869823][T30728] device bridge_slave_0 entered promiscuous mode [ 1123.876648][T30728] bridge0: port 2(bridge_slave_1) entered blocking state [ 1123.891109][T30728] bridge0: port 2(bridge_slave_1) entered disabled state [ 1123.924257][T30728] device bridge_slave_1 entered promiscuous mode [ 1124.179926][T30728] bridge0: port 2(bridge_slave_1) entered blocking state [ 1124.182911][T30757] FAULT_INJECTION: forcing a failure. [ 1124.182911][T30757] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.186804][T30728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1124.206366][T30728] bridge0: port 1(bridge_slave_0) entered blocking state [ 1124.213236][T30728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1124.224774][T30757] CPU: 0 PID: 30757 Comm: syz.1.9244 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1124.234510][T30757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1124.244406][T30757] Call Trace: [ 1124.247562][T30757] [ 1124.250304][T30757] dump_stack_lvl+0x151/0x1b7 [ 1124.254838][T30757] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1124.260117][T30757] dump_stack+0x15/0x1e [ 1124.264260][T30757] should_fail_ex+0x3d0/0x520 [ 1124.268775][T30757] ? __alloc_file+0x29/0x2a0 [ 1124.273198][T30757] __should_failslab+0xaf/0xf0 [ 1124.277819][T30757] should_failslab+0x9/0x20 [ 1124.282130][T30757] kmem_cache_alloc+0x3b/0x320 [ 1124.286733][T30757] ? _raw_spin_trylock_bh+0x190/0x190 [ 1124.291969][T30757] __alloc_file+0x29/0x2a0 [ 1124.296192][T30757] alloc_empty_file+0x95/0x180 [ 1124.300795][T30757] alloc_file+0x5a/0x5e0 [ 1124.304875][T30757] alloc_file_pseudo+0x259/0x2f0 [ 1124.309651][T30757] ? alloc_empty_file_noaccount+0x80/0x80 [ 1124.315203][T30757] anon_inode_getfile+0xa7/0x180 [ 1124.319976][T30757] __se_sys_perf_event_open+0x1006/0x3d60 [ 1124.325530][T30757] ? mutex_lock+0x1d1/0x1e0 [ 1124.329873][T30757] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1124.335335][T30757] ? fput+0x15b/0x1b0 [ 1124.339162][T30757] ? __ia32_sys_read+0x90/0x90 [ 1124.343755][T30757] ? debug_smp_processor_id+0x17/0x20 [ 1124.349083][T30757] __x64_sys_perf_event_open+0xbf/0xd0 [ 1124.354394][T30757] x64_sys_call+0x7de/0x9a0 [ 1124.358705][T30757] do_syscall_64+0x3b/0xb0 [ 1124.362955][T30757] ? clear_bhb_loop+0x55/0xb0 [ 1124.367468][T30757] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1124.373207][T30757] RIP: 0033:0x7f5af057e759 [ 1124.377485][T30757] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1124.396894][T30757] RSP: 002b:00007f5af133f038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1124.405142][T30757] RAX: ffffffffffffffda RBX: 00007f5af0735f80 RCX: 00007f5af057e759 [ 1124.412948][T30757] RDX: bfffffffffffffff RSI: 0000000000000000 RDI: 0000000020000180 [ 1124.420759][T30757] RBP: 00007f5af133f090 R08: 0000000000000000 R09: 0000000000000000 [ 1124.428572][T30757] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1124.436381][T30757] R13: 0000000000000000 R14: 00007f5af0735f80 R15: 00007fff337db6a8 [ 1124.444198][T30757] [ 1124.470112][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1124.498876][ T198] bridge0: port 1(bridge_slave_0) entered disabled state [ 1124.580511][ T198] bridge0: port 2(bridge_slave_1) entered disabled state [ 1124.729388][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1124.737600][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1124.745660][ T198] bridge0: port 1(bridge_slave_0) entered blocking state [ 1124.752515][ T198] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1124.760600][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1124.768837][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1124.777246][ T198] bridge0: port 2(bridge_slave_1) entered blocking state [ 1124.784096][ T198] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1124.800248][ T28] audit: type=1400 audit(1732004359.517:165): avc: denied { create } for pid=30771 comm="syz.3.9250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 1124.851406][T30772] tun0: tun_chr_ioctl cmd 1074025675 [ 1124.856543][T30772] tun0: persist enabled [ 1124.892130][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1124.914061][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1124.974078][ T10] device bridge_slave_1 left promiscuous mode [ 1124.988681][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.001735][ T10] device bridge_slave_0 left promiscuous mode [ 1125.007831][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.015728][ T10] device veth0_vlan left promiscuous mode [ 1125.243008][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1125.251888][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1125.260300][T30782] bond_slave_1: mtu less than device minimum [ 1125.319189][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1125.329615][ T198] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1125.383402][T30728] device veth0_vlan entered promiscuous mode [ 1125.420851][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1125.432351][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1125.458039][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1125.480723][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1125.552996][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1125.609845][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1125.704919][T30728] device veth1_macvtap entered promiscuous mode [ 1125.728197][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1125.747951][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1125.781640][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1125.795094][ T324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1127.672318][ T28] audit: type=1400 audit(1732004362.387:166): avc: denied { create } for pid=30834 comm="syz.0.9267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1128.938978][T30866] tun0: tun_chr_ioctl cmd 1074025675 [ 1128.955010][T30866] tun0: persist enabled [ 1131.918087][T30917] FAULT_INJECTION: forcing a failure. [ 1131.918087][T30917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1131.987018][T30917] CPU: 0 PID: 30917 Comm: syz.1.9292 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1131.996756][T30917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1132.006734][T30917] Call Trace: [ 1132.009863][T30917] [ 1132.012635][T30917] dump_stack_lvl+0x151/0x1b7 [ 1132.017149][T30917] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1132.022447][T30917] dump_stack+0x15/0x1e [ 1132.026436][T30917] should_fail_ex+0x3d0/0x520 [ 1132.030953][T30917] should_fail_alloc_page+0x68/0x90 [ 1132.035985][T30917] prepare_alloc_pages+0x14e/0x6f0 [ 1132.040939][T30917] ? __alloc_pages_bulk+0xda0/0xda0 [ 1132.045964][T30917] ? flush_tlb_one_user+0x50/0x50 [ 1132.050830][T30917] __alloc_pages+0x162/0x610 [ 1132.055374][T30917] ? prep_new_page+0x110/0x110 [ 1132.060236][T30917] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1132.066433][T30917] __folio_alloc+0x15/0x40 [ 1132.070689][T30917] wp_page_copy+0x23b/0x1690 [ 1132.075120][T30917] ? fault_dirty_shared_page+0x300/0x300 [ 1132.080747][T30917] ? vm_normal_page+0x1de/0x1f0 [ 1132.085430][T30917] do_wp_page+0xc5c/0xf30 [ 1132.089604][T30917] handle_mm_fault+0x15e0/0x30e0 [ 1132.094377][T30917] ? numa_migrate_prep+0xe0/0xe0 [ 1132.099144][T30917] ? down_read_trylock+0x319/0x7d0 [ 1132.104094][T30917] ? lock_mm_and_find_vma+0x9c/0x310 [ 1132.109214][T30917] exc_page_fault+0x24d/0x6d0 [ 1132.113723][T30917] asm_exc_page_fault+0x27/0x30 [ 1132.118414][T30917] RIP: 0010:copy_user_enhanced_fast_string+0xa/0x40 [ 1132.124832][T30917] Code: ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 8d 0c ca 89 ca eb 20 0f 01 cb 83 fa 40 72 38 89 d1 a4 31 c0 0f 01 ca c3 89 ca eb 0a 66 2e 0f 1f 84 00 00 00 00 00 [ 1132.144273][T30917] RSP: 0018:ffffc90002047708 EFLAGS: 00050206 [ 1132.150175][T30917] RAX: ffffffff82758301 RBX: 00007ffffffeee30 RCX: 000000000000d5d0 [ 1132.158084][T30917] RDX: 00000000000101d0 RSI: ffff88812cc22cc8 RDI: 0000000020003000 [ 1132.165895][T30917] RBP: ffffc90002047730 R08: dffffc0000000000 R09: ffffed1025986053 [ 1132.173708][T30917] R10: 0000000000000003 R11: dffffc0000000001 R12: 00000000000101d0 [ 1132.181517][T30917] R13: dffffc0000000000 R14: 0000000020000400 R15: ffff88812cc200c8 [ 1132.189334][T30917] ? copy_pipe_to_iter+0x191/0x230 [ 1132.194278][T30917] ? copyout+0x74/0x90 [ 1132.198180][T30917] _copy_to_iter+0x3dc/0xe10 [ 1132.202612][T30917] ? _raw_spin_unlock_bh+0x50/0x60 [ 1132.207559][T30917] ? iov_iter_init+0x1c0/0x1c0 [ 1132.212157][T30917] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1132.217802][T30917] ? __kasan_check_read+0x11/0x20 [ 1132.222659][T30917] ? __check_object_size+0x48e/0x650 [ 1132.227780][T30917] simple_copy_to_iter+0x50/0x70 [ 1132.232552][T30917] __skb_datagram_iter+0xd4/0x780 [ 1132.237413][T30917] ? tipc_sk_anc_data_recv+0xbd/0x990 [ 1132.242655][T30917] ? irqentry_exit+0x30/0x40 [ 1132.247048][T30917] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1132.252689][T30917] ? skb_copy_datagram_iter+0x180/0x180 [ 1132.258070][T30917] skb_copy_datagram_iter+0x43/0x180 [ 1132.263207][T30917] tipc_recvstream+0x7a4/0xf70 [ 1132.267797][T30917] ? tipc_sendstream+0x70/0x70 [ 1132.272390][T30917] ? security_socket_recvmsg+0x87/0xb0 [ 1132.277688][T30917] ? tipc_sendstream+0x70/0x70 [ 1132.282287][T30917] ____sys_recvmsg+0x285/0x530 [ 1132.286888][T30917] ? __sys_recvmsg_sock+0x50/0x50 [ 1132.291750][T30917] __sys_recvmsg+0x2e9/0x3d0 [ 1132.296174][T30917] ? ____sys_recvmsg+0x530/0x530 [ 1132.300948][T30917] ? __kasan_check_write+0x14/0x20 [ 1132.305895][T30917] ? __ia32_sys_read+0x90/0x90 [ 1132.310493][T30917] ? debug_smp_processor_id+0x17/0x20 [ 1132.315701][T30917] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1132.321601][T30917] __x64_sys_recvmsg+0x7f/0x90 [ 1132.326203][T30917] x64_sys_call+0x171/0x9a0 [ 1132.330543][T30917] do_syscall_64+0x3b/0xb0 [ 1132.334793][T30917] ? clear_bhb_loop+0x55/0xb0 [ 1132.339315][T30917] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1132.345036][T30917] RIP: 0033:0x7f5af057e759 [ 1132.349291][T30917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1132.368735][T30917] RSP: 002b:00007f5af133f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1132.376977][T30917] RAX: ffffffffffffffda RBX: 00007f5af0735f80 RCX: 00007f5af057e759 [ 1132.384786][T30917] RDX: 0000000000001f00 RSI: 0000000020000500 RDI: 0000000000000004 [ 1132.392597][T30917] RBP: 00007f5af133f090 R08: 0000000000000000 R09: 0000000000000000 [ 1132.400411][T30917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1132.408221][T30917] R13: 0000000000000000 R14: 00007f5af0735f80 R15: 00007fff337db6a8 [ 1132.416039][T30917] [ 1132.730183][T30945] FAULT_INJECTION: forcing a failure. [ 1132.730183][T30945] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.742926][T30945] CPU: 0 PID: 30945 Comm: syz.3.9300 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1132.752639][T30945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1132.762533][T30945] Call Trace: [ 1132.765655][T30945] [ 1132.768435][T30945] dump_stack_lvl+0x151/0x1b7 [ 1132.772958][T30945] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1132.778246][T30945] dump_stack+0x15/0x1e [ 1132.782235][T30945] should_fail_ex+0x3d0/0x520 [ 1132.786749][T30945] __should_failslab+0xaf/0xf0 [ 1132.791347][T30945] should_failslab+0x9/0x20 [ 1132.795725][T30945] kmem_cache_alloc_node+0x42/0x330 [ 1132.800725][T30945] ? __alloc_skb+0xcc/0x2d0 [ 1132.805175][T30945] ? ____kasan_slab_free+0x13c/0x180 [ 1132.810286][T30945] __alloc_skb+0xcc/0x2d0 [ 1132.814460][T30945] ? inetdev_event+0x7f7/0x1110 [ 1132.819143][T30945] inet_netconf_notify_devconf+0x173/0x230 [ 1132.824784][T30945] inetdev_event+0x823/0x1110 [ 1132.829300][T30945] ? ipv4_doint_and_flush+0x150/0x150 [ 1132.834505][T30945] ? arp_netdev_event+0xd4/0x2a0 [ 1132.839280][T30945] raw_notifier_call_chain+0x8c/0xf0 [ 1132.844397][T30945] unregister_netdevice_many+0xe25/0x1730 [ 1132.849955][T30945] ? alloc_netdev_mqs+0xf90/0xf90 [ 1132.854814][T30945] ? __kasan_check_write+0x14/0x20 [ 1132.859761][T30945] ? _raw_spin_lock+0xa4/0x1b0 [ 1132.864363][T30945] ? __kasan_check_read+0x11/0x20 [ 1132.869223][T30945] unregister_netdevice_queue+0x2e6/0x350 [ 1132.874773][T30945] ? list_netdevice+0x710/0x710 [ 1132.879463][T30945] ? netif_set_real_num_tx_queues+0xad/0x770 [ 1132.885279][T30945] ? __kasan_check_write+0x14/0x20 [ 1132.890240][T30945] __tun_detach+0xd14/0x1510 [ 1132.894650][T30945] ? bit_wait_io_timeout+0x120/0x120 [ 1132.899778][T30945] tun_chr_close+0x92/0x140 [ 1132.904109][T30945] ? tun_chr_open+0x530/0x530 [ 1132.908641][T30945] __fput+0x1e5/0x870 [ 1132.912443][T30945] ____fput+0x15/0x20 [ 1132.916259][T30945] task_work_run+0x24d/0x2e0 [ 1132.920690][T30945] ? task_work_cancel+0x2e0/0x2e0 [ 1132.925548][T30945] ? filp_close+0x105/0x150 [ 1132.929890][T30945] exit_to_user_mode_loop+0x94/0xa0 [ 1132.934919][T30945] exit_to_user_mode_prepare+0x5a/0xa0 [ 1132.940220][T30945] syscall_exit_to_user_mode+0x26/0x130 [ 1132.945598][T30945] do_syscall_64+0x47/0xb0 [ 1132.949876][T30945] ? clear_bhb_loop+0x55/0xb0 [ 1132.954360][T30945] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1132.960094][T30945] RIP: 0033:0x7f075417e759 [ 1132.964347][T30945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1132.983787][T30945] RSP: 002b:00007f0754fea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 1132.992029][T30945] RAX: 0000000000000000 RBX: 00007f0754335f80 RCX: 00007f075417e759 [ 1132.999844][T30945] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 1133.007654][T30945] RBP: 00007f0754fea090 R08: 0000000000000000 R09: 0000000000000000 [ 1133.015465][T30945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.023277][T30945] R13: 0000000000000000 R14: 00007f0754335f80 R15: 00007fff7bc1aee8 [ 1133.031098][T30945] [ 1134.616818][T30996] syz.1.9317[30996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1134.616894][T30996] syz.1.9317[30996] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1134.645118][T30996] device wg2 entered promiscuous mode [ 1135.065613][T31022] FAULT_INJECTION: forcing a failure. [ 1135.065613][T31022] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1135.079689][T31022] CPU: 1 PID: 31022 Comm: syz.2.9325 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1135.089416][T31022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1135.099306][T31022] Call Trace: [ 1135.102428][T31022] [ 1135.105203][T31022] dump_stack_lvl+0x151/0x1b7 [ 1135.109723][T31022] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1135.115362][T31022] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1135.120657][T31022] ? __wake_up_klogd+0xd5/0x110 [ 1135.125342][T31022] dump_stack+0x15/0x1e [ 1135.129339][T31022] should_fail_ex+0x3d0/0x520 [ 1135.133848][T31022] should_fail+0xb/0x10 [ 1135.137838][T31022] should_fail_usercopy+0x1a/0x20 [ 1135.142700][T31022] _copy_from_user+0x1e/0xc0 [ 1135.147128][T31022] generic_map_update_batch+0x4d9/0x8c0 [ 1135.152510][T31022] ? generic_map_delete_batch+0x5c0/0x5c0 [ 1135.158063][T31022] ? bpf_map_do_batch+0x37c/0x630 [ 1135.162923][T31022] ? bpf_map_do_batch+0x3ea/0x630 [ 1135.167781][T31022] ? generic_map_delete_batch+0x5c0/0x5c0 [ 1135.173340][T31022] bpf_map_do_batch+0x4cc/0x630 [ 1135.178025][T31022] __sys_bpf+0x66b/0x7f0 [ 1135.182134][T31022] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1135.187314][T31022] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1135.193309][T31022] __x64_sys_bpf+0x7c/0x90 [ 1135.197551][T31022] x64_sys_call+0x87f/0x9a0 [ 1135.201891][T31022] do_syscall_64+0x3b/0xb0 [ 1135.206381][T31022] ? clear_bhb_loop+0x55/0xb0 [ 1135.210862][T31022] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1135.216543][T31022] RIP: 0033:0x7f53ec37e759 [ 1135.220800][T31022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1135.240241][T31022] RSP: 002b:00007f53ec1ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1135.248486][T31022] RAX: ffffffffffffffda RBX: 00007f53ec535f80 RCX: 00007f53ec37e759 [ 1135.256296][T31022] RDX: 0000000000000038 RSI: 0000000020000500 RDI: 000000000000001a [ 1135.264108][T31022] RBP: 00007f53ec1ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1135.271924][T31022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1135.279736][T31022] R13: 0000000000000000 R14: 00007f53ec535f80 R15: 00007ffe02620768 [ 1135.287551][T31022] [ 1135.580178][T31032] device wg2 entered promiscuous mode [ 1136.499502][T31060] device pim6reg1 entered promiscuous mode [ 1137.337343][T31081] syz.1.9343[31081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1137.337414][T31081] syz.1.9343[31081] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1137.531080][T31086] device wg2 left promiscuous mode [ 1137.592375][T31081] device wg2 entered promiscuous mode [ 1140.581772][T31179] device veth1_macvtap left promiscuous mode [ 1141.775680][T31207] device pim6reg1 entered promiscuous mode [ 1141.821067][T31210] FAULT_INJECTION: forcing a failure. [ 1141.821067][T31210] name failslab, interval 1, probability 0, space 0, times 0 [ 1141.913598][T31212] syz.2.9379[31212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1141.913665][T31212] syz.2.9379[31212] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1141.950034][T31210] CPU: 0 PID: 31210 Comm: syz.3.9378 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1141.971131][T31210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1141.981026][T31210] Call Trace: [ 1141.984147][T31210] [ 1141.986924][T31210] dump_stack_lvl+0x151/0x1b7 [ 1141.991440][T31210] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1141.996740][T31210] dump_stack+0x15/0x1e [ 1142.000724][T31210] should_fail_ex+0x3d0/0x520 [ 1142.005242][T31210] ? security_inode_alloc+0x29/0x120 [ 1142.010364][T31210] __should_failslab+0xaf/0xf0 [ 1142.014961][T31210] should_failslab+0x9/0x20 [ 1142.019302][T31210] kmem_cache_alloc+0x3b/0x320 [ 1142.023918][T31210] security_inode_alloc+0x29/0x120 [ 1142.028850][T31210] inode_init_always+0x720/0x970 [ 1142.033620][T31210] ? sockfs_init_fs_context+0xb0/0xb0 [ 1142.038830][T31210] new_inode_pseudo+0x98/0x1d0 [ 1142.043431][T31210] __sock_create+0x135/0x760 [ 1142.047868][T31210] __sys_socketpair+0x313/0x6e0 [ 1142.052572][T31210] ? __ia32_sys_socket+0x90/0x90 [ 1142.057315][T31210] ? __ia32_sys_read+0x90/0x90 [ 1142.061920][T31210] ? debug_smp_processor_id+0x17/0x20 [ 1142.067124][T31210] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1142.073213][T31210] __x64_sys_socketpair+0x9b/0xb0 [ 1142.078074][T31210] x64_sys_call+0x19b/0x9a0 [ 1142.082497][T31210] do_syscall_64+0x3b/0xb0 [ 1142.086748][T31210] ? clear_bhb_loop+0x55/0xb0 [ 1142.091262][T31210] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1142.096994][T31210] RIP: 0033:0x7f075417e759 [ 1142.101243][T31210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1142.120688][T31210] RSP: 002b:00007f0754fea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1142.128932][T31210] RAX: ffffffffffffffda RBX: 00007f0754335f80 RCX: 00007f075417e759 [ 1142.136743][T31210] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000011 [ 1142.144555][T31210] RBP: 00007f0754fea090 R08: 0000000000000000 R09: 0000000000000000 [ 1142.152367][T31210] R10: 0000000020001080 R11: 0000000000000246 R12: 0000000000000001 [ 1142.160174][T31210] R13: 0000000000000000 R14: 00007f0754335f80 R15: 00007fff7bc1aee8 [ 1142.167995][T31210] [ 1142.269279][T31210] socket: no more sockets [ 1142.362414][T31212] device wg2 entered promiscuous mode [ 1145.196583][T31283] device wg2 left promiscuous mode [ 1145.281568][T31283] device wg2 entered promiscuous mode [ 1146.975245][T31307] device wg2 left promiscuous mode [ 1147.868249][T31332] syz.1.9415[31332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1147.868320][T31332] syz.1.9415[31332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1147.932928][T31332] device wg2 left promiscuous mode [ 1147.973848][T31332] device wg2 entered promiscuous mode [ 1149.165727][T31369] device sit0 entered promiscuous mode [ 1152.395961][T31457] Â: renamed from pim6reg1 [ 1152.428139][T31458] FAULT_INJECTION: forcing a failure. [ 1152.428139][T31458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1152.561755][T31458] CPU: 1 PID: 31458 Comm: syz.2.9454 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1152.571493][T31458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1152.581383][T31458] Call Trace: [ 1152.584505][T31458] [ 1152.587280][T31458] dump_stack_lvl+0x151/0x1b7 [ 1152.591798][T31458] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1152.597095][T31458] dump_stack+0x15/0x1e [ 1152.601081][T31458] should_fail_ex+0x3d0/0x520 [ 1152.605596][T31458] should_fail+0xb/0x10 [ 1152.609590][T31458] should_fail_usercopy+0x1a/0x20 [ 1152.614450][T31458] _copy_from_user+0x1e/0xc0 [ 1152.618883][T31458] generic_map_update_batch+0x4d9/0x8c0 [ 1152.624259][T31458] ? generic_map_delete_batch+0x5c0/0x5c0 [ 1152.629838][T31458] ? generic_map_delete_batch+0x5c0/0x5c0 [ 1152.635368][T31458] bpf_map_do_batch+0x4cc/0x630 [ 1152.640057][T31458] __sys_bpf+0x66b/0x7f0 [ 1152.644133][T31458] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1152.649347][T31458] ? __ia32_sys_read+0x90/0x90 [ 1152.653941][T31458] ? debug_smp_processor_id+0x17/0x20 [ 1152.659244][T31458] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1152.665144][T31458] __x64_sys_bpf+0x7c/0x90 [ 1152.669401][T31458] x64_sys_call+0x87f/0x9a0 [ 1152.673737][T31458] do_syscall_64+0x3b/0xb0 [ 1152.677990][T31458] ? clear_bhb_loop+0x55/0xb0 [ 1152.682502][T31458] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1152.688231][T31458] RIP: 0033:0x7f53ec37e759 [ 1152.692483][T31458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1152.711926][T31458] RSP: 002b:00007f53ec1de038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1152.720168][T31458] RAX: ffffffffffffffda RBX: 00007f53ec536058 RCX: 00007f53ec37e759 [ 1152.727980][T31458] RDX: 0000000000000038 RSI: 0000000020002340 RDI: 000000000000001a [ 1152.735791][T31458] RBP: 00007f53ec1de090 R08: 0000000000000000 R09: 0000000000000000 [ 1152.743603][T31458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1152.751425][T31458] R13: 0000000000000000 R14: 00007f53ec536058 R15: 00007ffe02620768 [ 1152.759324][T31458] [ 1153.694064][T31490] bridge0: port 1(bridge_slave_0) entered disabled state [ 1153.776566][T31490] bridge0: port 1(bridge_slave_0) entered blocking state [ 1153.784571][T31490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1155.064097][T31528] device pim6reg1 entered promiscuous mode [ 1156.460551][T31556] syz.5.9486[31556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1156.460621][T31556] syz.5.9486[31556] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1156.556280][T31556] device pim6reg1 entered promiscuous mode [ 1157.854346][T31598] syz.2.9499[31598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1157.854415][T31598] syz.2.9499[31598] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1158.179237][T31599] device syzkaller0 entered promiscuous mode [ 1158.227371][T31597] device pim6reg1 entered promiscuous mode [ 1159.452189][T31636] device veth0_vlan left promiscuous mode [ 1159.475287][T31636] device veth0_vlan entered promiscuous mode [ 1165.064532][T31806] device pim6reg1 entered promiscuous mode [ 1165.273246][T31813] FAULT_INJECTION: forcing a failure. [ 1165.273246][T31813] name failslab, interval 1, probability 0, space 0, times 0 [ 1165.302089][T31813] CPU: 0 PID: 31813 Comm: syz.3.9563 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1165.311809][T31813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1165.321702][T31813] Call Trace: [ 1165.324826][T31813] [ 1165.327602][T31813] dump_stack_lvl+0x151/0x1b7 [ 1165.332118][T31813] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1165.337416][T31813] dump_stack+0x15/0x1e [ 1165.341401][T31813] should_fail_ex+0x3d0/0x520 [ 1165.345935][T31813] ? sk_prot_alloc+0x5f/0x330 [ 1165.350427][T31813] __should_failslab+0xaf/0xf0 [ 1165.355029][T31813] should_failslab+0x9/0x20 [ 1165.359373][T31813] kmem_cache_alloc+0x3b/0x320 [ 1165.363967][T31813] ? __kasan_slab_alloc+0x6c/0x80 [ 1165.368833][T31813] sk_prot_alloc+0x5f/0x330 [ 1165.373171][T31813] sk_alloc+0x38/0x440 [ 1165.377079][T31813] unix_create1+0xb8/0x870 [ 1165.381336][T31813] unix_create+0x15f/0x210 [ 1165.385592][T31813] __sock_create+0x3a6/0x760 [ 1165.390013][T31813] __sys_socketpair+0x29f/0x6e0 [ 1165.394700][T31813] ? __ia32_sys_socket+0x90/0x90 [ 1165.399663][T31813] ? __ia32_sys_read+0x90/0x90 [ 1165.404258][T31813] ? debug_smp_processor_id+0x17/0x20 [ 1165.409465][T31813] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1165.415369][T31813] __x64_sys_socketpair+0x9b/0xb0 [ 1165.420229][T31813] x64_sys_call+0x19b/0x9a0 [ 1165.424566][T31813] do_syscall_64+0x3b/0xb0 [ 1165.428818][T31813] ? clear_bhb_loop+0x55/0xb0 [ 1165.433332][T31813] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1165.439062][T31813] RIP: 0033:0x7f075417e759 [ 1165.443313][T31813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1165.462752][T31813] RSP: 002b:00007f0754fea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 1165.470997][T31813] RAX: ffffffffffffffda RBX: 00007f0754335f80 RCX: 00007f075417e759 [ 1165.478811][T31813] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 1165.486620][T31813] RBP: 00007f0754fea090 R08: 0000000000000000 R09: 0000000000000000 [ 1165.494432][T31813] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 1165.502242][T31813] R13: 0000000000000000 R14: 00007f0754335f80 R15: 00007fff7bc1aee8 [ 1165.510061][T31813] [ 1165.715735][T31824] device veth0_vlan left promiscuous mode [ 1165.816709][T31824] device veth0_vlan entered promiscuous mode [ 1166.025276][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1166.062198][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1166.122921][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1166.311690][T31841] device syzkaller0 entered promiscuous mode [ 1166.371744][T31841] FAULT_INJECTION: forcing a failure. [ 1166.371744][T31841] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1166.387736][T31841] CPU: 1 PID: 31841 Comm: syz.2.9573 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1166.397481][T31841] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1166.407358][T31841] Call Trace: [ 1166.410484][T31841] [ 1166.413257][T31841] dump_stack_lvl+0x151/0x1b7 [ 1166.417777][T31841] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1166.423064][T31841] ? perf_swevent_hrtimer+0x449/0x4f0 [ 1166.428277][T31841] dump_stack+0x15/0x1e [ 1166.432265][T31841] should_fail_ex+0x3d0/0x520 [ 1166.436785][T31841] should_fail+0xb/0x10 [ 1166.440772][T31841] should_fail_usercopy+0x1a/0x20 [ 1166.445638][T31841] _copy_to_user+0x1e/0x90 [ 1166.449888][T31841] simple_read_from_buffer+0xc7/0x150 [ 1166.455093][T31841] proc_fail_nth_read+0x1a3/0x210 [ 1166.459955][T31841] ? proc_fault_inject_write+0x390/0x390 [ 1166.465419][T31841] ? fsnotify_perm+0x269/0x5b0 [ 1166.470025][T31841] ? security_file_permission+0x86/0xb0 [ 1166.475402][T31841] ? proc_fault_inject_write+0x390/0x390 [ 1166.480871][T31841] vfs_read+0x26c/0xae0 [ 1166.484866][T31841] ? kernel_read+0x1f0/0x1f0 [ 1166.489293][T31841] ? mutex_lock+0xb1/0x1e0 [ 1166.493542][T31841] ? bit_wait_io_timeout+0x120/0x120 [ 1166.498670][T31841] ? __fdget_pos+0x2e2/0x390 [ 1166.503086][T31841] ? ksys_read+0x77/0x2c0 [ 1166.507258][T31841] ksys_read+0x199/0x2c0 [ 1166.511338][T31841] ? vfs_write+0xed0/0xed0 [ 1166.515589][T31841] ? debug_smp_processor_id+0x17/0x20 [ 1166.520810][T31841] __x64_sys_read+0x7b/0x90 [ 1166.525150][T31841] x64_sys_call+0x28/0x9a0 [ 1166.529392][T31841] do_syscall_64+0x3b/0xb0 [ 1166.533668][T31841] ? clear_bhb_loop+0x55/0xb0 [ 1166.538156][T31841] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1166.543883][T31841] RIP: 0033:0x7f53ec37d19c [ 1166.548132][T31841] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1166.567572][T31841] RSP: 002b:00007f53ec1ff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1166.575817][T31841] RAX: ffffffffffffffda RBX: 00007f53ec535f80 RCX: 00007f53ec37d19c [ 1166.583629][T31841] RDX: 000000000000000f RSI: 00007f53ec1ff0a0 RDI: 000000000000000a [ 1166.591448][T31841] RBP: 00007f53ec1ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1166.599252][T31841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1166.607063][T31841] R13: 0000000000000000 R14: 00007f53ec535f80 R15: 00007ffe02620768 [ 1166.614880][T31841] [ 1167.139819][T31855] device syzkaller0 entered promiscuous mode [ 1168.704626][T31890] device sit0 entered promiscuous mode [ 1170.610325][T31938] FAULT_INJECTION: forcing a failure. [ 1170.610325][T31938] name failslab, interval 1, probability 0, space 0, times 0 [ 1170.754325][T31938] CPU: 1 PID: 31938 Comm: syz.0.9601 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1170.764067][T31938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1170.773957][T31938] Call Trace: [ 1170.777079][T31938] [ 1170.779872][T31938] dump_stack_lvl+0x151/0x1b7 [ 1170.784374][T31938] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1170.789670][T31938] dump_stack+0x15/0x1e [ 1170.793656][T31938] should_fail_ex+0x3d0/0x520 [ 1170.798176][T31938] __should_failslab+0xaf/0xf0 [ 1170.802771][T31938] ? alloc_fdtable+0xaf/0x2a0 [ 1170.807298][T31938] should_failslab+0x9/0x20 [ 1170.811621][T31938] __kmem_cache_alloc_node+0x3d/0x2a0 [ 1170.816834][T31938] ? alloc_fdtable+0xaf/0x2a0 [ 1170.821343][T31938] kmalloc_trace+0x2a/0xa0 [ 1170.825597][T31938] alloc_fdtable+0xaf/0x2a0 [ 1170.829938][T31938] dup_fd+0x5f5/0x960 [ 1170.834011][T31938] ? memset+0x35/0x40 [ 1170.837832][T31938] copy_files+0xe6/0x200 [ 1170.841910][T31938] ? dup_task_struct+0x7d0/0x7d0 [ 1170.846682][T31938] ? security_task_alloc+0xf9/0x130 [ 1170.851713][T31938] copy_process+0x11e9/0x3530 [ 1170.856229][T31938] ? __kasan_check_write+0x14/0x20 [ 1170.861177][T31938] ? proc_fail_nth_write+0x20b/0x290 [ 1170.866298][T31938] ? idle_dummy+0x10/0x10 [ 1170.870463][T31938] ? vfs_write+0x952/0xed0 [ 1170.874717][T31938] ? __kasan_slab_free+0x11/0x20 [ 1170.879493][T31938] kernel_clone+0x229/0x890 [ 1170.883866][T31938] ? __kasan_check_write+0x14/0x20 [ 1170.888777][T31938] ? mutex_unlock+0xb2/0x260 [ 1170.893208][T31938] ? create_io_thread+0x180/0x180 [ 1170.898068][T31938] __x64_sys_clone+0x231/0x280 [ 1170.902663][T31938] ? __do_sys_vfork+0x110/0x110 [ 1170.907351][T31938] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1170.913252][T31938] ? exit_to_user_mode_prepare+0x39/0xa0 [ 1170.918721][T31938] x64_sys_call+0x1b0/0x9a0 [ 1170.923060][T31938] do_syscall_64+0x3b/0xb0 [ 1170.927308][T31938] ? clear_bhb_loop+0x55/0xb0 [ 1170.931827][T31938] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1170.937554][T31938] RIP: 0033:0x7fea34f7e759 [ 1170.941807][T31938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1170.961249][T31938] RSP: 002b:00007fea35de3fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 1170.969498][T31938] RAX: ffffffffffffffda RBX: 00007fea35135f80 RCX: 00007fea34f7e759 [ 1170.977305][T31938] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000025001200 [ 1170.985119][T31938] RBP: 00007fea35de4090 R08: 0000000000000000 R09: 0000000000000000 [ 1170.992927][T31938] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 1171.000735][T31938] R13: 0000000000000000 R14: 00007fea35135f80 R15: 00007ffd7ccb3a98 [ 1171.008557][T31938] [ 1172.981212][T31987] device sit0 left promiscuous mode [ 1173.044876][T31988] device sit0 entered promiscuous mode [ 1177.385663][T32090] device sit0 left promiscuous mode [ 1177.499278][T32090] device sit0 entered promiscuous mode [ 1177.866262][T32096] device sit0 left promiscuous mode [ 1177.902559][T32098] device sit0 entered promiscuous mode [ 1178.728481][T32121] device sit0 entered promiscuous mode [ 1180.933116][T32164] device sit0 left promiscuous mode [ 1181.100783][T32164] device sit0 entered promiscuous mode [ 1187.347853][T32324] device sit0 left promiscuous mode [ 1187.424517][T32324] device sit0 entered promiscuous mode [ 1198.164988][T32590] syz.3.9798[32590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1198.165078][T32590] syz.3.9798[32590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1198.264184][T32590] syz.3.9798[32590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1198.409623][T32590] syz.3.9798[32590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1199.231336][T32613] FAULT_INJECTION: forcing a failure. [ 1199.231336][T32613] name failslab, interval 1, probability 0, space 0, times 0 [ 1199.429504][T32613] CPU: 0 PID: 32613 Comm: syz.5.9804 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1199.439246][T32613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1199.449144][T32613] Call Trace: [ 1199.452263][T32613] [ 1199.455058][T32613] dump_stack_lvl+0x151/0x1b7 [ 1199.459556][T32613] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1199.464847][T32613] ? stack_trace_save+0x113/0x1c0 [ 1199.469711][T32613] dump_stack+0x15/0x1e [ 1199.473699][T32613] should_fail_ex+0x3d0/0x520 [ 1199.478211][T32613] __should_failslab+0xaf/0xf0 [ 1199.482827][T32613] should_failslab+0x9/0x20 [ 1199.487148][T32613] slab_pre_alloc_hook+0x2e/0x1b0 [ 1199.492012][T32613] ? delete_node+0x736/0x790 [ 1199.496439][T32613] ? kasan_save_alloc_info+0x1f/0x30 [ 1199.501559][T32613] kmem_cache_alloc_lru+0x49/0x270 [ 1199.506504][T32613] ? __d_alloc+0x34/0x700 [ 1199.510675][T32613] __d_alloc+0x34/0x700 [ 1199.514666][T32613] ? radix_tree_iter_tag_clear+0x69/0x80 [ 1199.520135][T32613] d_alloc_pseudo+0x1d/0x70 [ 1199.524472][T32613] alloc_file_pseudo+0x131/0x2f0 [ 1199.529279][T32613] ? alloc_empty_file_noaccount+0x80/0x80 [ 1199.534803][T32613] ? __kasan_check_write+0x14/0x20 [ 1199.539751][T32613] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1199.544607][T32613] anon_inode_getfile+0xa7/0x180 [ 1199.549384][T32613] bpf_link_prime+0xed/0x250 [ 1199.553829][T32613] bpf_tracing_prog_attach+0x7c6/0xff0 [ 1199.559104][T32613] ? putname+0xfa/0x150 [ 1199.563096][T32613] ? bpf_raw_tp_link_attach+0x6b0/0x6b0 [ 1199.568476][T32613] ? _kstrtol+0x150/0x150 [ 1199.572652][T32613] ? memcpy+0x56/0x70 [ 1199.576462][T32613] ? avc_has_perm_noaudit+0x2dd/0x430 [ 1199.581669][T32613] bpf_raw_tp_link_attach+0x428/0x6b0 [ 1199.586875][T32613] ? bpf_insn_prepare_dump+0x950/0x950 [ 1199.592194][T32613] ? __kasan_check_write+0x14/0x20 [ 1199.597115][T32613] ? fput+0x15b/0x1b0 [ 1199.600937][T32613] bpf_raw_tracepoint_open+0x22d/0x4a0 [ 1199.606232][T32613] ? bpf_obj_get_info_by_fd+0x3e60/0x3e60 [ 1199.611784][T32613] ? selinux_bpf+0xd2/0x100 [ 1199.616126][T32613] ? security_bpf+0x82/0xb0 [ 1199.620466][T32613] __sys_bpf+0x4f5/0x7f0 [ 1199.624543][T32613] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1199.629759][T32613] ? __ia32_sys_read+0x90/0x90 [ 1199.634352][T32613] ? debug_smp_processor_id+0x17/0x20 [ 1199.639563][T32613] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1199.645461][T32613] __x64_sys_bpf+0x7c/0x90 [ 1199.649716][T32613] x64_sys_call+0x87f/0x9a0 [ 1199.654055][T32613] do_syscall_64+0x3b/0xb0 [ 1199.658307][T32613] ? clear_bhb_loop+0x55/0xb0 [ 1199.662819][T32613] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1199.668547][T32613] RIP: 0033:0x7fddddd7e759 [ 1199.672800][T32613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1199.692242][T32613] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1199.700487][T32613] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1199.708297][T32613] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 0000000000000011 [ 1199.716108][T32613] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1199.723939][T32613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1199.731732][T32613] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1199.739552][T32613] [ 1202.244229][T32684] syz.0.9826[32684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1202.244326][T32684] syz.0.9826[32684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1202.368547][T32684] syz.0.9826[32684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1202.539997][T32684] syz.0.9826[32684] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1203.157173][T32691] device syzkaller0 entered promiscuous mode [ 1203.294619][T32697] device veth1_macvtap left promiscuous mode [ 1206.734872][ T334] device veth1_macvtap left promiscuous mode [ 1208.520833][ T394] syz.3.9882[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1208.520942][ T394] syz.3.9882[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1208.646117][ T394] syz.3.9882[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1208.658143][ T394] syz.3.9882[394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1213.263220][ T560] device sit0 left promiscuous mode [ 1215.184879][ T629] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1217.719717][ T702] FAULT_INJECTION: forcing a failure. [ 1217.719717][ T702] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1217.921416][ T702] CPU: 0 PID: 702 Comm: syz.5.9980 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1217.931062][ T702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1217.940967][ T702] Call Trace: [ 1217.944081][ T702] [ 1217.946856][ T702] dump_stack_lvl+0x151/0x1b7 [ 1217.951381][ T702] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1217.956671][ T702] ? __kasan_check_write+0x14/0x20 [ 1217.961617][ T702] dump_stack+0x15/0x1e [ 1217.965605][ T702] should_fail_ex+0x3d0/0x520 [ 1217.970122][ T702] should_fail+0xb/0x10 [ 1217.974112][ T702] should_fail_usercopy+0x1a/0x20 [ 1217.978975][ T702] _copy_from_user+0x1e/0xc0 [ 1217.983403][ T702] copy_msghdr_from_user+0xaa/0x670 [ 1217.988439][ T702] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1217.994426][ T702] ? sendmsg_copy_msghdr+0x70/0x70 [ 1217.999384][ T702] __sys_recvmsg+0x24b/0x3d0 [ 1218.003806][ T702] ? ____sys_recvmsg+0x530/0x530 [ 1218.008572][ T702] ? __kasan_check_write+0x14/0x20 [ 1218.013525][ T702] ? __ia32_sys_read+0x90/0x90 [ 1218.018126][ T702] ? debug_smp_processor_id+0x17/0x20 [ 1218.023324][ T702] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1218.029229][ T702] __x64_sys_recvmsg+0x7f/0x90 [ 1218.033827][ T702] x64_sys_call+0x171/0x9a0 [ 1218.038167][ T702] do_syscall_64+0x3b/0xb0 [ 1218.042418][ T702] ? clear_bhb_loop+0x55/0xb0 [ 1218.046934][ T702] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1218.052660][ T702] RIP: 0033:0x7fddddd7e759 [ 1218.056921][ T702] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1218.076355][ T702] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1218.084600][ T702] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1218.092411][ T702] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000003 [ 1218.100261][ T702] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1218.108049][ T702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1218.115848][ T702] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1218.123663][ T702] [ 1218.578666][ T732] device syzkaller0 entered promiscuous mode [ 1218.698375][ T725] GPL: port 1(erspan0) entered blocking state [ 1218.716078][ T725] GPL: port 1(erspan0) entered disabled state [ 1218.743611][ T725] device erspan0 entered promiscuous mode [ 1218.805016][ T737] GPL: port 1(erspan0) entered blocking state [ 1218.810963][ T737] GPL: port 1(erspan0) entered forwarding state [ 1220.240813][ T783] syz.0.10006[783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1220.240879][ T783] syz.0.10006[783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1221.173926][ T807] FAULT_INJECTION: forcing a failure. [ 1221.173926][ T807] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1221.363397][ T807] CPU: 1 PID: 807 Comm: syz.5.10013 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1221.373144][ T807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1221.383046][ T807] Call Trace: [ 1221.386158][ T807] [ 1221.388941][ T807] dump_stack_lvl+0x151/0x1b7 [ 1221.393571][ T807] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1221.398871][ T807] dump_stack+0x15/0x1e [ 1221.402855][ T807] should_fail_ex+0x3d0/0x520 [ 1221.407369][ T807] should_fail+0xb/0x10 [ 1221.411362][ T807] should_fail_usercopy+0x1a/0x20 [ 1221.416223][ T807] _copy_to_user+0x1e/0x90 [ 1221.420484][ T807] simple_read_from_buffer+0xc7/0x150 [ 1221.425691][ T807] proc_fail_nth_read+0x1a3/0x210 [ 1221.430552][ T807] ? proc_fault_inject_write+0x390/0x390 [ 1221.436009][ T807] ? fsnotify_perm+0x269/0x5b0 [ 1221.440610][ T807] ? security_file_permission+0x86/0xb0 [ 1221.445988][ T807] ? proc_fault_inject_write+0x390/0x390 [ 1221.451468][ T807] vfs_read+0x26c/0xae0 [ 1221.455453][ T807] ? kernel_read+0x1f0/0x1f0 [ 1221.459885][ T807] ? mutex_lock+0xb1/0x1e0 [ 1221.464128][ T807] ? bit_wait_io_timeout+0x120/0x120 [ 1221.469257][ T807] ? __fdget_pos+0x2e2/0x390 [ 1221.473676][ T807] ? ksys_read+0x77/0x2c0 [ 1221.477842][ T807] ksys_read+0x199/0x2c0 [ 1221.481950][ T807] ? __this_cpu_preempt_check+0x13/0x20 [ 1221.487302][ T807] ? vfs_write+0xed0/0xed0 [ 1221.491555][ T807] ? debug_smp_processor_id+0x17/0x20 [ 1221.496765][ T807] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1221.502666][ T807] __x64_sys_read+0x7b/0x90 [ 1221.507005][ T807] x64_sys_call+0x28/0x9a0 [ 1221.511259][ T807] do_syscall_64+0x3b/0xb0 [ 1221.515537][ T807] ? clear_bhb_loop+0x55/0xb0 [ 1221.520028][ T807] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1221.525752][ T807] RIP: 0033:0x7fddddd7d19c [ 1221.530007][ T807] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1221.549448][ T807] RSP: 002b:00007fdddead7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1221.557693][ T807] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7d19c [ 1221.565503][ T807] RDX: 000000000000000f RSI: 00007fdddead70a0 RDI: 0000000000000005 [ 1221.573318][ T807] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1221.581124][ T807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1221.588938][ T807] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1221.596755][ T807] [ 1225.122090][ T880] device syzkaller0 entered promiscuous mode [ 1227.312725][ T944] syz.3.10053[944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1227.312788][ T944] syz.3.10053[944] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1227.654514][ T965] device pim6reg1 entered promiscuous mode [ 1227.705507][ T965] FAULT_INJECTION: forcing a failure. [ 1227.705507][ T965] name failslab, interval 1, probability 0, space 0, times 0 [ 1227.718063][ T965] CPU: 1 PID: 965 Comm: syz.5.10058 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1227.727642][ T965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1227.737547][ T965] Call Trace: [ 1227.740659][ T965] [ 1227.743440][ T965] dump_stack_lvl+0x151/0x1b7 [ 1227.747962][ T965] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1227.753254][ T965] ? ip6_route_info_create+0xa56/0x14c0 [ 1227.758629][ T965] ? ip6_route_add+0x27/0x130 [ 1227.763146][ T965] ? addrconf_add_linklocal+0x5c8/0x9e0 [ 1227.768519][ T965] ? addrconf_init_auto_addrs+0xb96/0x1050 [ 1227.774160][ T965] dump_stack+0x15/0x1e [ 1227.778154][ T965] should_fail_ex+0x3d0/0x520 [ 1227.782669][ T965] __should_failslab+0xaf/0xf0 [ 1227.787270][ T965] should_failslab+0x9/0x20 [ 1227.791605][ T965] kmem_cache_alloc_node+0x42/0x330 [ 1227.796640][ T965] ? __alloc_skb+0xcc/0x2d0 [ 1227.800983][ T965] __alloc_skb+0xcc/0x2d0 [ 1227.805146][ T965] inet6_rt_notify+0x2db/0x560 [ 1227.809747][ T965] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1227.815649][ T965] ? rt6_nh_dump_exceptions+0x650/0x650 [ 1227.821031][ T965] fib6_add+0x23ac/0x3df0 [ 1227.825209][ T965] ? skb_gro_incr_csum_unnecessary+0x330/0x330 [ 1227.831193][ T965] ? ipv6_addr_prefix+0x42/0x180 [ 1227.835962][ T965] ? fib6_update_sernum_stub+0x1a0/0x1a0 [ 1227.841429][ T965] ? __kasan_check_write+0x14/0x20 [ 1227.846373][ T965] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1227.851243][ T965] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1227.856272][ T965] ip6_route_add+0x8a/0x130 [ 1227.860609][ T965] addrconf_add_linklocal+0x5c8/0x9e0 [ 1227.865817][ T965] ? inet6_addr_del+0x550/0x550 [ 1227.870511][ T965] ? memcpy+0x56/0x70 [ 1227.874322][ T965] ? ipv6_generate_eui64+0x7b3/0x1080 [ 1227.879532][ T965] addrconf_addr_gen+0x57f/0xcf0 [ 1227.884305][ T965] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 1227.889856][ T965] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 1227.894727][ T965] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 1227.899759][ T965] ? __kasan_check_write+0x14/0x20 [ 1227.904696][ T965] ? ip6_route_add+0x102/0x130 [ 1227.909309][ T965] ? addrconf_add_dev+0x419/0x5f0 [ 1227.914158][ T965] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 1227.919375][ T965] ? __kasan_check_read+0x11/0x20 [ 1227.924234][ T965] addrconf_init_auto_addrs+0xb96/0x1050 [ 1227.929697][ T965] ? addrconf_dad_run+0x610/0x610 [ 1227.934551][ T965] ? __local_bh_enable_ip+0x58/0x80 [ 1227.939678][ T965] ? _raw_write_unlock_bh+0x32/0x50 [ 1227.944704][ T965] ? addrconf_permanent_addr+0xb40/0xba0 [ 1227.950176][ T965] ? __kasan_check_write+0x14/0x20 [ 1227.955122][ T965] ? addrconf_notify+0xe10/0xe10 [ 1227.959893][ T965] ? igmpv3_del_delrec+0x740/0x740 [ 1227.964852][ T965] ? __local_bh_enable_ip+0x58/0x80 [ 1227.969879][ T965] ? __kasan_check_write+0x14/0x20 [ 1227.974822][ T965] ? mutex_unlock+0xb2/0x260 [ 1227.979253][ T965] ? tun_device_event+0x3ef/0xf80 [ 1227.984110][ T965] ? __mutex_lock_slowpath+0x10/0x10 [ 1227.989241][ T965] ? macsec_notify+0x101/0x4c0 [ 1227.993830][ T965] ? addrconf_link_ready+0xfb/0x1e0 [ 1227.998876][ T965] addrconf_notify+0x976/0xe10 [ 1228.003480][ T965] raw_notifier_call_chain+0x8c/0xf0 [ 1228.008592][ T965] __dev_notify_flags+0x304/0x610 [ 1228.013449][ T965] ? __dev_change_flags+0x6e0/0x6e0 [ 1228.018482][ T965] ? __dev_change_flags+0x569/0x6e0 [ 1228.023517][ T965] ? dev_get_flags+0x1e0/0x1e0 [ 1228.028141][ T965] ? kstrtouint+0xf6/0x180 [ 1228.032370][ T965] dev_change_flags+0xf0/0x1a0 [ 1228.036969][ T965] dev_ifsioc+0x177/0x1150 [ 1228.041221][ T965] ? dev_ioctl+0xe60/0xe60 [ 1228.045471][ T965] ? __kasan_check_write+0x14/0x20 [ 1228.050418][ T965] ? mutex_lock+0xb1/0x1e0 [ 1228.054672][ T965] ? bit_wait_io_timeout+0x120/0x120 [ 1228.059800][ T965] dev_ioctl+0x543/0xe60 [ 1228.063915][ T965] sock_do_ioctl+0x26b/0x450 [ 1228.068305][ T965] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1228.073247][ T965] ? sock_show_fdinfo+0xa0/0xa0 [ 1228.077936][ T965] ? selinux_file_ioctl+0x3cc/0x540 [ 1228.082968][ T965] sock_ioctl+0x455/0x740 [ 1228.087136][ T965] ? sock_poll+0x400/0x400 [ 1228.091387][ T965] ? __fget_files+0x2cb/0x330 [ 1228.095912][ T965] ? security_file_ioctl+0x84/0xb0 [ 1228.100847][ T965] ? sock_poll+0x400/0x400 [ 1228.105102][ T965] __se_sys_ioctl+0x114/0x190 [ 1228.109616][ T965] __x64_sys_ioctl+0x7b/0x90 [ 1228.114040][ T965] x64_sys_call+0x98/0x9a0 [ 1228.118292][ T965] do_syscall_64+0x3b/0xb0 [ 1228.122545][ T965] ? clear_bhb_loop+0x55/0xb0 [ 1228.127158][ T965] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1228.132874][ T965] RIP: 0033:0x7fddddd7e759 [ 1228.137126][ T965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1228.156566][ T965] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1228.164811][ T965] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1228.172633][ T965] RDX: 0000000020000140 RSI: 0000000000008914 RDI: 0000000000000009 [ 1228.180440][ T965] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1228.188274][ T965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1228.196060][ T965] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1228.203875][ T965] [ 1238.310677][ T1252] FAULT_INJECTION: forcing a failure. [ 1238.310677][ T1252] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1238.419758][ T1252] CPU: 0 PID: 1252 Comm: syz.2.10150 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1238.429616][ T1252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1238.439507][ T1252] Call Trace: [ 1238.442630][ T1252] [ 1238.445407][ T1252] dump_stack_lvl+0x151/0x1b7 [ 1238.449930][ T1252] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1238.455215][ T1252] ? __schedule+0xcbd/0x1560 [ 1238.459646][ T1252] dump_stack+0x15/0x1e [ 1238.463640][ T1252] should_fail_ex+0x3d0/0x520 [ 1238.468151][ T1252] should_fail+0xb/0x10 [ 1238.472140][ T1252] should_fail_usercopy+0x1a/0x20 [ 1238.476996][ T1252] _copy_from_user+0x1e/0xc0 [ 1238.481437][ T1252] ip6_tnl_siocdevprivate+0x472/0x16e0 [ 1238.486721][ T1252] ? __kasan_check_read+0x11/0x20 [ 1238.491580][ T1252] ? __mutex_lock+0x6c8/0x1ca0 [ 1238.496181][ T1252] ? ip6_tnl_start_xmit+0x1580/0x1580 [ 1238.501392][ T1252] ? full_name_hash+0x9d/0xf0 [ 1238.505901][ T1252] dev_ifsioc+0xd40/0x1150 [ 1238.510152][ T1252] ? ioctl_has_perm+0x3f0/0x560 [ 1238.514851][ T1252] ? dev_ioctl+0xe60/0xe60 [ 1238.519094][ T1252] ? __mutex_lock_slowpath+0xe/0x10 [ 1238.524127][ T1252] ? mutex_lock+0x130/0x1e0 [ 1238.528476][ T1252] ? bit_wait_io_timeout+0x120/0x120 [ 1238.533595][ T1252] dev_ioctl+0x5e9/0xe60 [ 1238.537672][ T1252] sock_ioctl+0x665/0x740 [ 1238.541836][ T1252] ? sock_poll+0x400/0x400 [ 1238.546102][ T1252] ? __fget_files+0x2cb/0x330 [ 1238.550606][ T1252] ? security_file_ioctl+0x84/0xb0 [ 1238.555547][ T1252] ? sock_poll+0x400/0x400 [ 1238.559814][ T1252] __se_sys_ioctl+0x114/0x190 [ 1238.564314][ T1252] __x64_sys_ioctl+0x7b/0x90 [ 1238.568744][ T1252] x64_sys_call+0x98/0x9a0 [ 1238.572989][ T1252] do_syscall_64+0x3b/0xb0 [ 1238.577243][ T1252] ? clear_bhb_loop+0x55/0xb0 [ 1238.581757][ T1252] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1238.587484][ T1252] RIP: 0033:0x7f53ec37e759 [ 1238.591738][ T1252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1238.611183][ T1252] RSP: 002b:00007f53ec1ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1238.619426][ T1252] RAX: ffffffffffffffda RBX: 00007f53ec535f80 RCX: 00007f53ec37e759 [ 1238.627240][ T1252] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 1238.635048][ T1252] RBP: 00007f53ec1ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1238.642857][ T1252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1238.650674][ T1252] R13: 0000000000000000 R14: 00007f53ec535f80 R15: 00007ffe02620768 [ 1238.658488][ T1252] [ 1239.291802][ T28] audit: type=1400 audit(1732004473.967:167): avc: denied { create } for pid=1276 comm="syz.2.10160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 1249.488059][ T1559] syz.0.10255[1559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1249.488133][ T1559] syz.0.10255[1559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1250.014399][ T1560] device syzkaller0 entered promiscuous mode [ 1252.619745][ T1631] device syzkaller0 entered promiscuous mode [ 1252.626910][ T1631] FAULT_INJECTION: forcing a failure. [ 1252.626910][ T1631] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1252.644646][ T1631] CPU: 1 PID: 1631 Comm: syz.5.10280 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1252.654367][ T1631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1252.664267][ T1631] Call Trace: [ 1252.667383][ T1631] [ 1252.670197][ T1631] dump_stack_lvl+0x151/0x1b7 [ 1252.674676][ T1631] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1252.679974][ T1631] dump_stack+0x15/0x1e [ 1252.683971][ T1631] should_fail_ex+0x3d0/0x520 [ 1252.688476][ T1631] should_fail+0xb/0x10 [ 1252.692467][ T1631] should_fail_usercopy+0x1a/0x20 [ 1252.697357][ T1631] _copy_from_iter+0x18d/0xe00 [ 1252.701930][ T1631] ? _parse_integer_limit+0x19b/0x1e0 [ 1252.707139][ T1631] ? copyout_mc+0x80/0x80 [ 1252.711301][ T1631] ? kstrtoull+0x1cd/0x2e0 [ 1252.715558][ T1631] ? _parse_integer+0x40/0x40 [ 1252.720069][ T1631] tun_get_user+0x489/0x3a90 [ 1252.724511][ T1631] ? kstrtouint+0xf6/0x180 [ 1252.728755][ T1631] ? kasan_save_free_info+0x2b/0x40 [ 1252.733781][ T1631] ? _kstrtol+0x150/0x150 [ 1252.737953][ T1631] ? tun_do_read+0x2000/0x2000 [ 1252.742550][ T1631] ? ref_tracker_alloc+0x31d/0x450 [ 1252.747495][ T1631] ? ref_tracker_dir_print+0x160/0x160 [ 1252.752797][ T1631] ? avc_policy_seqno+0x1b/0x70 [ 1252.757479][ T1631] ? tun_get+0xe9/0x120 [ 1252.761469][ T1631] tun_chr_write_iter+0x129/0x210 [ 1252.766332][ T1631] vfs_write+0xaf6/0xed0 [ 1252.770406][ T1631] ? __kasan_slab_free+0x11/0x20 [ 1252.775191][ T1631] ? file_end_write+0x1c0/0x1c0 [ 1252.779877][ T1631] ? __fget_files+0x2cb/0x330 [ 1252.784414][ T1631] ? __fdget_pos+0x204/0x390 [ 1252.788805][ T1631] ? ksys_write+0x77/0x2c0 [ 1252.793057][ T1631] ksys_write+0x199/0x2c0 [ 1252.797222][ T1631] ? __this_cpu_preempt_check+0x13/0x20 [ 1252.802604][ T1631] ? xfd_validate_state+0x6f/0x170 [ 1252.807559][ T1631] ? __ia32_sys_read+0x90/0x90 [ 1252.812153][ T1631] ? debug_smp_processor_id+0x17/0x20 [ 1252.817370][ T1631] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1252.823262][ T1631] __x64_sys_write+0x7b/0x90 [ 1252.827707][ T1631] x64_sys_call+0x2f/0x9a0 [ 1252.831980][ T1631] do_syscall_64+0x3b/0xb0 [ 1252.836194][ T1631] ? clear_bhb_loop+0x55/0xb0 [ 1252.840707][ T1631] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1252.846434][ T1631] RIP: 0033:0x7fddddd7e759 [ 1252.850688][ T1631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1252.870130][ T1631] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1252.878374][ T1631] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1252.886188][ T1631] RDX: 000000000000ffdd RSI: 0000000020000740 RDI: 0000000000000006 [ 1252.893997][ T1631] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1252.901808][ T1631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1252.909625][ T1631] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1252.917444][ T1631] [ 1252.991548][ T1635] device syzkaller0 entered promiscuous mode [ 1254.104870][ T1669] device syzkaller0 entered promiscuous mode [ 1254.584649][ T1680] device syzkaller0 entered promiscuous mode [ 1254.991051][ T1686] device sit0 left promiscuous mode [ 1257.313840][ T1743] device syzkaller0 entered promiscuous mode [ 1259.203835][ T1841] device sit0 entered promiscuous mode [ 1260.070390][ T1884] tun0: tun_chr_ioctl cmd 1074025677 [ 1260.139739][ T1884] tun0: linktype set to 65534 [ 1261.229343][ T1899] FAULT_INJECTION: forcing a failure. [ 1261.229343][ T1899] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1261.280193][ T1899] CPU: 1 PID: 1899 Comm: syz.0.10374 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1261.290021][ T1899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1261.299915][ T1899] Call Trace: [ 1261.303040][ T1899] [ 1261.305815][ T1899] dump_stack_lvl+0x151/0x1b7 [ 1261.310330][ T1899] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1261.315628][ T1899] ? bpf_test_run+0x912/0xa40 [ 1261.320141][ T1899] dump_stack+0x15/0x1e [ 1261.324138][ T1899] should_fail_ex+0x3d0/0x520 [ 1261.328647][ T1899] should_fail+0xb/0x10 [ 1261.332638][ T1899] should_fail_usercopy+0x1a/0x20 [ 1261.337516][ T1899] _copy_to_user+0x1e/0x90 [ 1261.341758][ T1899] bpf_test_finish+0x56f/0x950 [ 1261.346354][ T1899] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1261.351989][ T1899] ? convert_skb_to___skb+0x4f0/0x4f0 [ 1261.357202][ T1899] bpf_prog_test_run_skb+0xcfd/0x13a0 [ 1261.362412][ T1899] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1261.368133][ T1899] ? __kasan_check_write+0x14/0x20 [ 1261.373082][ T1899] ? fput+0x15b/0x1b0 [ 1261.376898][ T1899] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1261.382629][ T1899] bpf_prog_test_run+0x3b0/0x630 [ 1261.387401][ T1899] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1261.393388][ T1899] ? bpf_prog_query+0x260/0x260 [ 1261.398075][ T1899] ? selinux_bpf+0xd2/0x100 [ 1261.402417][ T1899] ? security_bpf+0x82/0xb0 [ 1261.406767][ T1899] __sys_bpf+0x59f/0x7f0 [ 1261.410836][ T1899] ? clockevents_program_event+0x22f/0x300 [ 1261.416475][ T1899] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1261.421687][ T1899] ? __sched_clock_gtod_offset+0x100/0x100 [ 1261.427325][ T1899] ? debug_smp_processor_id+0x17/0x20 [ 1261.432541][ T1899] __x64_sys_bpf+0x7c/0x90 [ 1261.436823][ T1899] x64_sys_call+0x87f/0x9a0 [ 1261.441123][ T1899] do_syscall_64+0x3b/0xb0 [ 1261.445375][ T1899] ? clear_bhb_loop+0x55/0xb0 [ 1261.449892][ T1899] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1261.455620][ T1899] RIP: 0033:0x7fea34f7e759 [ 1261.459882][ T1899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1261.479314][ T1899] RSP: 002b:00007fea35de4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1261.487558][ T1899] RAX: ffffffffffffffda RBX: 00007fea35135f80 RCX: 00007fea34f7e759 [ 1261.495370][ T1899] RDX: 0000000000000048 RSI: 00000000200002c0 RDI: 000000000000000a [ 1261.503189][ T1899] RBP: 00007fea35de4090 R08: 0000000000000000 R09: 0000000000000000 [ 1261.511008][ T1899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1261.518807][ T1899] R13: 0000000000000000 R14: 00007fea35135f80 R15: 00007ffd7ccb3a98 [ 1261.526623][ T1899] [ 1264.172231][ T1964] FAULT_INJECTION: forcing a failure. [ 1264.172231][ T1964] name failslab, interval 1, probability 0, space 0, times 0 [ 1264.191227][ T1964] CPU: 1 PID: 1964 Comm: syz.1.10395 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1264.200954][ T1964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1264.210841][ T1964] Call Trace: [ 1264.213965][ T1964] [ 1264.216749][ T1964] dump_stack_lvl+0x151/0x1b7 [ 1264.221258][ T1964] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1264.226550][ T1964] ? _parse_integer+0x2a/0x40 [ 1264.231066][ T1964] ? kstrtoull+0x1cd/0x2e0 [ 1264.235347][ T1964] dump_stack+0x15/0x1e [ 1264.239312][ T1964] should_fail_ex+0x3d0/0x520 [ 1264.243830][ T1964] __should_failslab+0xaf/0xf0 [ 1264.248423][ T1964] ? bpf_test_init+0xf1/0x190 [ 1264.252944][ T1964] should_failslab+0x9/0x20 [ 1264.257277][ T1964] __kmem_cache_alloc_node+0x3d/0x2a0 [ 1264.262494][ T1964] ? bpf_test_init+0xf1/0x190 [ 1264.266996][ T1964] __kmalloc+0xa3/0x1e0 [ 1264.270992][ T1964] bpf_test_init+0xf1/0x190 [ 1264.275329][ T1964] bpf_prog_test_run_xdp+0x414/0x1130 [ 1264.280538][ T1964] ? avc_denied+0x1b0/0x1b0 [ 1264.284880][ T1964] ? dev_put+0x80/0x80 [ 1264.288789][ T1964] ? __kasan_check_write+0x14/0x20 [ 1264.293726][ T1964] ? fput+0x15b/0x1b0 [ 1264.297547][ T1964] ? dev_put+0x80/0x80 [ 1264.301459][ T1964] bpf_prog_test_run+0x3b0/0x630 [ 1264.306225][ T1964] ? bpf_prog_query+0x260/0x260 [ 1264.310923][ T1964] ? selinux_bpf+0xd2/0x100 [ 1264.315252][ T1964] ? security_bpf+0x82/0xb0 [ 1264.319595][ T1964] __sys_bpf+0x59f/0x7f0 [ 1264.323678][ T1964] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1264.328885][ T1964] ? __ia32_sys_read+0x90/0x90 [ 1264.333480][ T1964] ? debug_smp_processor_id+0x17/0x20 [ 1264.338705][ T1964] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1264.344622][ T1964] __x64_sys_bpf+0x7c/0x90 [ 1264.348843][ T1964] x64_sys_call+0x87f/0x9a0 [ 1264.353181][ T1964] do_syscall_64+0x3b/0xb0 [ 1264.357433][ T1964] ? clear_bhb_loop+0x55/0xb0 [ 1264.361947][ T1964] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1264.367673][ T1964] RIP: 0033:0x7f5af057e759 [ 1264.371931][ T1964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1264.391547][ T1964] RSP: 002b:00007f5af133f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1264.399796][ T1964] RAX: ffffffffffffffda RBX: 00007f5af0735f80 RCX: 00007f5af057e759 [ 1264.407603][ T1964] RDX: 0000000000000050 RSI: 0000000020000080 RDI: 000000000000000a [ 1264.416019][ T1964] RBP: 00007f5af133f090 R08: 0000000000000000 R09: 0000000000000000 [ 1264.423831][ T1964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1264.431641][ T1964] R13: 0000000000000000 R14: 00007f5af0735f80 R15: 00007fff337db6a8 [ 1264.439462][ T1964] [ 1270.762803][ T2144] device pim6reg1 entered promiscuous mode [ 1271.889961][ T2185] bridge0: port 2(bridge_slave_1) entered disabled state [ 1271.896969][ T2185] bridge0: port 1(bridge_slave_0) entered disabled state [ 1271.961351][ T2188] device bridge_slave_1 left promiscuous mode [ 1271.972843][ T2188] bridge0: port 2(bridge_slave_1) entered disabled state [ 1272.024484][ T2188] device bridge_slave_0 left promiscuous mode [ 1272.043473][ T2188] bridge0: port 1(bridge_slave_0) entered disabled state [ 1275.072115][ T2268] FAULT_INJECTION: forcing a failure. [ 1275.072115][ T2268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1275.204359][ T2268] CPU: 1 PID: 2268 Comm: syz.5.10508 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1275.214093][ T2268] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1275.223990][ T2268] Call Trace: [ 1275.227223][ T2268] [ 1275.229987][ T2268] dump_stack_lvl+0x151/0x1b7 [ 1275.230516][ T2270] device pim6reg1 entered promiscuous mode [ 1275.234499][ T2268] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1275.245439][ T2268] ? kasan_set_track+0x60/0x70 [ 1275.250041][ T2268] dump_stack+0x15/0x1e [ 1275.254029][ T2268] should_fail_ex+0x3d0/0x520 [ 1275.258544][ T2268] should_fail_alloc_page+0x68/0x90 [ 1275.263586][ T2268] prepare_alloc_pages+0x14e/0x6f0 [ 1275.268540][ T2268] ? __alloc_pages_bulk+0xda0/0xda0 [ 1275.273570][ T2268] __alloc_pages+0x162/0x610 [ 1275.277986][ T2268] ? prep_new_page+0x110/0x110 [ 1275.282594][ T2268] __folio_alloc+0x15/0x40 [ 1275.286837][ T2268] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 1275.292393][ T2268] ? mem_cgroup_swap_full+0x1a0/0x1a0 [ 1275.297601][ T2268] ? shmem_replace_folio+0x6a0/0x6a0 [ 1275.302759][ T2268] ? xas_load+0x39d/0x3b0 [ 1275.306888][ T2268] ? __filemap_get_folio+0xaa1/0xae0 [ 1275.312013][ T2268] ? page_cache_prev_miss+0x410/0x410 [ 1275.317226][ T2268] ? down_read_trylock+0x319/0x7d0 [ 1275.322177][ T2268] shmem_get_folio_gfp+0x12d4/0x24b0 [ 1275.327302][ T2268] ? shmem_get_folio+0xa0/0xa0 [ 1275.331883][ T2268] ? fault_in_iov_iter_readable+0x49/0x290 [ 1275.337536][ T2268] ? fault_in_readable+0x172/0x2d0 [ 1275.342509][ T2268] ? fault_in_readable+0x17c/0x2d0 [ 1275.347423][ T2268] shmem_write_begin+0x164/0x3a0 [ 1275.352193][ T2268] ? __kasan_check_write+0x14/0x20 [ 1275.357138][ T2268] ? shmem_writepage+0xe00/0xe00 [ 1275.361916][ T2268] generic_perform_write+0x2f9/0x5c0 [ 1275.367037][ T2268] ? generic_file_direct_write+0x6b0/0x6b0 [ 1275.372676][ T2268] ? __file_remove_privs+0x640/0x640 [ 1275.377796][ T2268] ? generic_write_checks+0x15c/0x1c0 [ 1275.383005][ T2268] __generic_file_write_iter+0x174/0x3a0 [ 1275.388478][ T2268] generic_file_write_iter+0xb1/0x310 [ 1275.393681][ T2268] vfs_write+0xaf6/0xed0 [ 1275.397761][ T2268] ? __kasan_slab_free+0x11/0x20 [ 1275.402537][ T2268] ? file_end_write+0x1c0/0x1c0 [ 1275.407217][ T2268] ? mutex_lock+0xb1/0x1e0 [ 1275.411473][ T2268] ? bit_wait_io_timeout+0x120/0x120 [ 1275.416615][ T2268] ? __fdget_pos+0x2e2/0x390 [ 1275.421018][ T2268] ? ksys_write+0x77/0x2c0 [ 1275.425272][ T2268] ksys_write+0x199/0x2c0 [ 1275.429439][ T2268] ? __this_cpu_preempt_check+0x13/0x20 [ 1275.434820][ T2268] ? __ia32_sys_read+0x90/0x90 [ 1275.439420][ T2268] ? debug_smp_processor_id+0x17/0x20 [ 1275.444626][ T2268] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1275.450528][ T2268] __x64_sys_write+0x7b/0x90 [ 1275.454972][ T2268] x64_sys_call+0x2f/0x9a0 [ 1275.459208][ T2268] do_syscall_64+0x3b/0xb0 [ 1275.463458][ T2268] ? clear_bhb_loop+0x55/0xb0 [ 1275.467972][ T2268] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1275.473698][ T2268] RIP: 0033:0x7fddddd7e759 [ 1275.477953][ T2268] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1275.497393][ T2268] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1275.505638][ T2268] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1275.513460][ T2268] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 1275.521262][ T2268] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1275.529075][ T2268] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1275.536884][ T2268] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1275.544703][ T2268] [ 1277.067210][ T2322] FAULT_INJECTION: forcing a failure. [ 1277.067210][ T2322] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1277.086500][ T2322] CPU: 0 PID: 2322 Comm: syz.3.10524 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1277.096219][ T2322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1277.106115][ T2322] Call Trace: [ 1277.109243][ T2322] [ 1277.112026][ T2322] dump_stack_lvl+0x151/0x1b7 [ 1277.116529][ T2322] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1277.121925][ T2322] dump_stack+0x15/0x1e [ 1277.125919][ T2322] should_fail_ex+0x3d0/0x520 [ 1277.130432][ T2322] should_fail+0xb/0x10 [ 1277.134518][ T2322] should_fail_usercopy+0x1a/0x20 [ 1277.139370][ T2322] _copy_from_user+0x1e/0xc0 [ 1277.143799][ T2322] generic_map_update_batch+0x4d9/0x8c0 [ 1277.149185][ T2322] ? generic_map_delete_batch+0x5c0/0x5c0 [ 1277.154730][ T2322] ? generic_map_delete_batch+0x5c0/0x5c0 [ 1277.160285][ T2322] bpf_map_do_batch+0x4cc/0x630 [ 1277.164973][ T2322] __sys_bpf+0x66b/0x7f0 [ 1277.169063][ T2322] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1277.174271][ T2322] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1277.180267][ T2322] __x64_sys_bpf+0x7c/0x90 [ 1277.184509][ T2322] x64_sys_call+0x87f/0x9a0 [ 1277.188869][ T2322] do_syscall_64+0x3b/0xb0 [ 1277.193091][ T2322] ? clear_bhb_loop+0x55/0xb0 [ 1277.197604][ T2322] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1277.203347][ T2322] RIP: 0033:0x7f075417e759 [ 1277.207588][ T2322] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1277.227029][ T2322] RSP: 002b:00007f0754fea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1277.235283][ T2322] RAX: ffffffffffffffda RBX: 00007f0754335f80 RCX: 00007f075417e759 [ 1277.243098][ T2322] RDX: 0000000000000038 RSI: 0000000020002340 RDI: 000000000000001a [ 1277.250932][ T2322] RBP: 00007f0754fea090 R08: 0000000000000000 R09: 0000000000000000 [ 1277.258715][ T2322] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1277.266516][ T2322] R13: 0000000000000000 R14: 00007f0754335f80 R15: 00007fff7bc1aee8 [ 1277.274333][ T2322] [ 1277.453320][ T2335] FAULT_INJECTION: forcing a failure. [ 1277.453320][ T2335] name failslab, interval 1, probability 0, space 0, times 0 [ 1277.521031][ T2335] CPU: 0 PID: 2335 Comm: syz.2.10527 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1277.530760][ T2335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1277.540654][ T2335] Call Trace: [ 1277.543779][ T2335] [ 1277.546557][ T2335] dump_stack_lvl+0x151/0x1b7 [ 1277.551071][ T2335] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1277.556367][ T2335] ? skb_release_data+0x19e/0x840 [ 1277.561224][ T2335] ? __kasan_kmalloc+0x9c/0xb0 [ 1277.565849][ T2335] dump_stack+0x15/0x1e [ 1277.569821][ T2335] should_fail_ex+0x3d0/0x520 [ 1277.574335][ T2335] ? skb_clone+0x1f8/0x380 [ 1277.578584][ T2335] __should_failslab+0xaf/0xf0 [ 1277.583183][ T2335] should_failslab+0x9/0x20 [ 1277.587527][ T2335] kmem_cache_alloc+0x3b/0x320 [ 1277.592134][ T2335] skb_clone+0x1f8/0x380 [ 1277.596206][ T2335] bpf_clone_redirect+0xa5/0x3c0 [ 1277.600983][ T2335] bpf_prog_64e505a7b7f97a05+0x55/0x5a [ 1277.606270][ T2335] ? module_enable_x+0x150/0x170 [ 1277.611046][ T2335] ? __stack_depot_save+0x36/0x480 [ 1277.615994][ T2335] ? kasan_set_track+0x60/0x70 [ 1277.620590][ T2335] ? kasan_set_track+0x4b/0x70 [ 1277.625192][ T2335] ? kasan_save_alloc_info+0x1f/0x30 [ 1277.630315][ T2335] ? __kasan_slab_alloc+0x6c/0x80 [ 1277.635173][ T2335] ? slab_post_alloc_hook+0x53/0x2c0 [ 1277.640314][ T2335] ? kmem_cache_alloc+0x175/0x320 [ 1277.645162][ T2335] ? build_skb+0x2c/0x220 [ 1277.649436][ T2335] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 1277.654815][ T2335] ? bpf_prog_test_run+0x3b0/0x630 [ 1277.659772][ T2335] ? __sys_bpf+0x59f/0x7f0 [ 1277.664015][ T2335] ? __x64_sys_bpf+0x7c/0x90 [ 1277.668440][ T2335] ? x64_sys_call+0x87f/0x9a0 [ 1277.672952][ T2335] ? do_syscall_64+0x3b/0xb0 [ 1277.677379][ T2335] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1277.683292][ T2335] ? __kasan_check_read+0x11/0x20 [ 1277.688147][ T2335] ? bpf_test_timer_continue+0x140/0x460 [ 1277.693612][ T2335] ? kvm_sched_clock_read+0x18/0x40 [ 1277.698643][ T2335] ? sched_clock+0x9/0x10 [ 1277.702812][ T2335] bpf_test_run+0x6b0/0xa40 [ 1277.707175][ T2335] ? convert___skb_to_skb+0x670/0x670 [ 1277.712359][ T2335] ? eth_type_trans+0x342/0x710 [ 1277.717048][ T2335] ? eth_get_headlen+0x240/0x240 [ 1277.721820][ T2335] ? bpf_prog_test_run_skb+0x7ab/0x13a0 [ 1277.727201][ T2335] ? convert___skb_to_skb+0x44/0x670 [ 1277.732322][ T2335] ? memcpy+0x56/0x70 [ 1277.736140][ T2335] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 1277.741357][ T2335] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1277.747074][ T2335] ? __kasan_check_write+0x14/0x20 [ 1277.752021][ T2335] ? fput+0x15b/0x1b0 [ 1277.755862][ T2335] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 1277.761569][ T2335] bpf_prog_test_run+0x3b0/0x630 [ 1277.766343][ T2335] ? bpf_prog_query+0x260/0x260 [ 1277.771029][ T2335] ? selinux_bpf+0xd2/0x100 [ 1277.775374][ T2335] ? security_bpf+0x82/0xb0 [ 1277.779715][ T2335] __sys_bpf+0x59f/0x7f0 [ 1277.783800][ T2335] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1277.789004][ T2335] ? __ia32_sys_read+0x90/0x90 [ 1277.793598][ T2335] ? debug_smp_processor_id+0x17/0x20 [ 1277.798807][ T2335] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1277.804705][ T2335] __x64_sys_bpf+0x7c/0x90 [ 1277.808972][ T2335] x64_sys_call+0x87f/0x9a0 [ 1277.813296][ T2335] do_syscall_64+0x3b/0xb0 [ 1277.817549][ T2335] ? clear_bhb_loop+0x55/0xb0 [ 1277.822067][ T2335] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1277.827806][ T2335] RIP: 0033:0x7f53ec37e759 [ 1277.832055][ T2335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1277.851488][ T2335] RSP: 002b:00007f53ec1ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1277.859736][ T2335] RAX: ffffffffffffffda RBX: 00007f53ec535f80 RCX: 00007f53ec37e759 [ 1277.867544][ T2335] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 1277.875354][ T2335] RBP: 00007f53ec1ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1277.883174][ T2335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1277.890980][ T2335] R13: 0000000000000000 R14: 00007f53ec535f80 R15: 00007ffe02620768 [ 1277.898798][ T2335] [ 1277.947382][ T2344] bridge0: port 2(bridge_slave_1) entered disabled state [ 1277.954405][ T2344] bridge0: port 1(bridge_slave_0) entered disabled state [ 1278.024254][ T2344] device bridge_slave_1 left promiscuous mode [ 1278.080736][ T2344] bridge0: port 2(bridge_slave_1) entered disabled state [ 1278.224262][ T2344] device bridge_slave_0 left promiscuous mode [ 1278.265599][ T2344] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.742058][ T2439] device syzkaller0 entered promiscuous mode [ 1286.448265][ T2581] device syzkaller0 entered promiscuous mode [ 1286.607301][ T2581] device wg2 entered promiscuous mode [ 1288.093696][ T2632] FAULT_INJECTION: forcing a failure. [ 1288.093696][ T2632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1288.217394][ T2632] CPU: 1 PID: 2632 Comm: syz.5.10636 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1288.227280][ T2632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1288.237177][ T2632] Call Trace: [ 1288.240293][ T2632] [ 1288.243071][ T2632] dump_stack_lvl+0x151/0x1b7 [ 1288.247586][ T2632] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1288.252883][ T2632] ? vfs_write+0x952/0xed0 [ 1288.257134][ T2632] dump_stack+0x15/0x1e [ 1288.261136][ T2632] should_fail_ex+0x3d0/0x520 [ 1288.265645][ T2632] should_fail+0xb/0x10 [ 1288.269638][ T2632] should_fail_usercopy+0x1a/0x20 [ 1288.274489][ T2632] _copy_from_user+0x1e/0xc0 [ 1288.278916][ T2632] __sys_bpf+0x23b/0x7f0 [ 1288.283028][ T2632] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1288.288205][ T2632] ? fpregs_restore_userregs+0x130/0x290 [ 1288.293669][ T2632] __x64_sys_bpf+0x7c/0x90 [ 1288.297933][ T2632] x64_sys_call+0x87f/0x9a0 [ 1288.302262][ T2632] do_syscall_64+0x3b/0xb0 [ 1288.306515][ T2632] ? clear_bhb_loop+0x55/0xb0 [ 1288.311026][ T2632] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1288.316754][ T2632] RIP: 0033:0x7fddddd7e759 [ 1288.321009][ T2632] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1288.340449][ T2632] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1288.348726][ T2632] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1288.356505][ T2632] RDX: 0000000000000090 RSI: 0000000020000840 RDI: 0000000000000005 [ 1288.364317][ T2632] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1288.372141][ T2632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1288.379939][ T2632] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1288.387757][ T2632] [ 1288.517732][ T2629] device syzkaller0 entered promiscuous mode [ 1295.380485][ T2658] FAULT_INJECTION: forcing a failure. [ 1295.380485][ T2658] name failslab, interval 1, probability 0, space 0, times 0 [ 1295.392958][ T2658] CPU: 1 PID: 2658 Comm: syz.5.10643 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1295.402635][ T2658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1295.412520][ T2658] Call Trace: [ 1295.415647][ T2658] [ 1295.418433][ T2658] dump_stack_lvl+0x151/0x1b7 [ 1295.422939][ T2658] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1295.428234][ T2658] dump_stack+0x15/0x1e [ 1295.432222][ T2658] should_fail_ex+0x3d0/0x520 [ 1295.436741][ T2658] __should_failslab+0xaf/0xf0 [ 1295.441347][ T2658] ? __get_vm_area_node+0x129/0x370 [ 1295.446371][ T2658] should_failslab+0x9/0x20 [ 1295.450710][ T2658] __kmem_cache_alloc_node+0x3d/0x2a0 [ 1295.455919][ T2658] ? 0xffffffffa0000664 [ 1295.459913][ T2658] ? __get_vm_area_node+0x129/0x370 [ 1295.464943][ T2658] kmalloc_node_trace+0x26/0xb0 [ 1295.469636][ T2658] __get_vm_area_node+0x129/0x370 [ 1295.474490][ T2658] __vmalloc_node_range+0x338/0x1560 [ 1295.479612][ T2658] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1295.484993][ T2658] ? avc_denied+0x1b0/0x1b0 [ 1295.489333][ T2658] ? kstrtoull+0x1cd/0x2e0 [ 1295.493588][ T2658] ? selinux_capable+0x2f1/0x430 [ 1295.498357][ T2658] ? vmap+0x2b0/0x2b0 [ 1295.502176][ T2658] ? selinux_capset+0xf0/0xf0 [ 1295.506691][ T2658] ? avc_has_perm_noaudit+0x348/0x430 [ 1295.511911][ T2658] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1295.517306][ T2658] __vmalloc+0x7a/0x90 [ 1295.521183][ T2658] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1295.526566][ T2658] bpf_prog_alloc_no_stats+0x3e/0x400 [ 1295.531776][ T2658] bpf_prog_alloc+0x22/0x1c0 [ 1295.536200][ T2658] bpf_prog_load+0x84a/0x1bf0 [ 1295.540735][ T2658] ? map_freeze+0x3a0/0x3a0 [ 1295.545058][ T2658] ? selinux_bpf+0xcb/0x100 [ 1295.549410][ T2658] ? security_bpf+0x82/0xb0 [ 1295.553730][ T2658] __sys_bpf+0x52c/0x7f0 [ 1295.557838][ T2658] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1295.563023][ T2658] ? __ia32_sys_read+0x90/0x90 [ 1295.567619][ T2658] ? debug_smp_processor_id+0x17/0x20 [ 1295.572827][ T2658] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1295.578730][ T2658] __x64_sys_bpf+0x7c/0x90 [ 1295.582985][ T2658] x64_sys_call+0x87f/0x9a0 [ 1295.587318][ T2658] do_syscall_64+0x3b/0xb0 [ 1295.591572][ T2658] ? clear_bhb_loop+0x55/0xb0 [ 1295.596088][ T2658] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1295.601814][ T2658] RIP: 0033:0x7fddddd7e759 [ 1295.606068][ T2658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1295.625507][ T2658] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1295.633753][ T2658] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1295.641568][ T2658] RDX: 0000000000000090 RSI: 0000000020000840 RDI: 0000000000000005 [ 1295.649377][ T2658] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1295.657189][ T2658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1295.664999][ T2658] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1295.672819][ T2658] [ 1295.739532][ T2658] syz.5.10643: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz5,mems_allowed=0 [ 1295.979260][ T2658] CPU: 0 PID: 2658 Comm: syz.5.10643 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1295.989001][ T2658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1295.998895][ T2658] Call Trace: [ 1296.002014][ T2658] [ 1296.004801][ T2658] dump_stack_lvl+0x151/0x1b7 [ 1296.009308][ T2658] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1296.014600][ T2658] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 1296.020284][ T2658] dump_stack+0x15/0x1e [ 1296.024233][ T2658] warn_alloc+0x21a/0x3a0 [ 1296.028400][ T2658] ? should_failslab+0x9/0x20 [ 1296.032915][ T2658] ? zone_watermark_ok_safe+0x270/0x270 [ 1296.038333][ T2658] ? kmalloc_node_trace+0x3d/0xb0 [ 1296.043155][ T2658] ? __get_vm_area_node+0x361/0x370 [ 1296.048194][ T2658] __vmalloc_node_range+0x35c/0x1560 [ 1296.053310][ T2658] ? avc_denied+0x1b0/0x1b0 [ 1296.057647][ T2658] ? kstrtoull+0x1cd/0x2e0 [ 1296.061907][ T2658] ? selinux_capable+0x2f1/0x430 [ 1296.066686][ T2658] ? vmap+0x2b0/0x2b0 [ 1296.070493][ T2658] ? selinux_capset+0xf0/0xf0 [ 1296.075009][ T2658] ? avc_has_perm_noaudit+0x348/0x430 [ 1296.080227][ T2658] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1296.085595][ T2658] __vmalloc+0x7a/0x90 [ 1296.089508][ T2658] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 1296.094883][ T2658] bpf_prog_alloc_no_stats+0x3e/0x400 [ 1296.100092][ T2658] bpf_prog_alloc+0x22/0x1c0 [ 1296.104520][ T2658] bpf_prog_load+0x84a/0x1bf0 [ 1296.109040][ T2658] ? map_freeze+0x3a0/0x3a0 [ 1296.113415][ T2658] ? selinux_bpf+0xcb/0x100 [ 1296.117710][ T2658] ? security_bpf+0x82/0xb0 [ 1296.122078][ T2658] __sys_bpf+0x52c/0x7f0 [ 1296.126129][ T2658] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1296.131343][ T2658] ? __ia32_sys_read+0x90/0x90 [ 1296.135957][ T2658] ? debug_smp_processor_id+0x17/0x20 [ 1296.141187][ T2658] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1296.147044][ T2658] __x64_sys_bpf+0x7c/0x90 [ 1296.151298][ T2658] x64_sys_call+0x87f/0x9a0 [ 1296.155667][ T2658] do_syscall_64+0x3b/0xb0 [ 1296.159892][ T2658] ? clear_bhb_loop+0x55/0xb0 [ 1296.164413][ T2658] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1296.170133][ T2658] RIP: 0033:0x7fddddd7e759 [ 1296.174387][ T2658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1296.193827][ T2658] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1296.202073][ T2658] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1296.209886][ T2658] RDX: 0000000000000090 RSI: 0000000020000840 RDI: 0000000000000005 [ 1296.217732][ T2658] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1296.225517][ T2658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1296.233320][ T2658] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1296.241134][ T2658] [ 1296.292750][ T2658] Mem-Info: [ 1296.297310][ T2658] active_anon:26461 inactive_anon:0 isolated_anon:0 [ 1296.297310][ T2658] active_file:25346 inactive_file:2427 isolated_file:0 [ 1296.297310][ T2658] unevictable:0 dirty:301 writeback:0 [ 1296.297310][ T2658] slab_reclaimable:7702 slab_unreclaimable:78277 [ 1296.297310][ T2658] mapped:21484 shmem:221 pagetables:565 [ 1296.297310][ T2658] sec_pagetables:0 bounce:0 [ 1296.297310][ T2658] kernel_misc_reclaimable:0 [ 1296.297310][ T2658] free:1490455 free_pcp:22765 free_cma:0 [ 1296.373261][ T2658] Node 0 active_anon:106044kB inactive_anon:0kB active_file:101384kB inactive_file:9708kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:85936kB dirty:1204kB writeback:0kB shmem:884kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4168kB pagetables:2460kB sec_pagetables:0kB all_unreclaimable? no [ 1296.538458][ T2671] FAULT_INJECTION: forcing a failure. [ 1296.538458][ T2671] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1296.647666][ T2671] CPU: 0 PID: 2671 Comm: syz.3.10649 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1296.657487][ T2671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1296.667380][ T2671] Call Trace: [ 1296.670503][ T2671] [ 1296.673280][ T2671] dump_stack_lvl+0x151/0x1b7 [ 1296.677800][ T2671] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1296.683091][ T2671] ? kasan_set_track+0x60/0x70 [ 1296.687692][ T2671] dump_stack+0x15/0x1e [ 1296.691679][ T2671] should_fail_ex+0x3d0/0x520 [ 1296.696193][ T2671] should_fail_alloc_page+0x68/0x90 [ 1296.699329][ T2658] DMA32 free:2966484kB boost:0kB min:62552kB low:78188kB high:93824kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971552kB mlocked:0kB bounce:0kB free_pcp:5068kB local_pcp:5012kB free_cma:0kB [ 1296.701222][ T2671] prepare_alloc_pages+0x14e/0x6f0 [ 1296.734134][ T2671] ? __alloc_pages_bulk+0xda0/0xda0 [ 1296.739163][ T2671] __alloc_pages+0x162/0x610 [ 1296.743582][ T2671] ? prep_new_page+0x110/0x110 [ 1296.748186][ T2671] __folio_alloc+0x15/0x40 [ 1296.752434][ T2671] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 1296.757992][ T2671] ? mem_cgroup_swap_full+0x1a0/0x1a0 [ 1296.763209][ T2671] ? shmem_replace_folio+0x6a0/0x6a0 [ 1296.768328][ T2671] ? xas_load+0x39d/0x3b0 [ 1296.772485][ T2671] ? __filemap_get_folio+0xaa1/0xae0 [ 1296.777606][ T2671] ? page_cache_prev_miss+0x410/0x410 [ 1296.782822][ T2671] ? down_read_trylock+0x319/0x7d0 [ 1296.787761][ T2671] shmem_get_folio_gfp+0x12d4/0x24b0 [ 1296.792889][ T2671] ? shmem_get_folio+0xa0/0xa0 [ 1296.797482][ T2671] ? fault_in_iov_iter_readable+0x49/0x290 [ 1296.803120][ T2671] ? fault_in_readable+0x172/0x2d0 [ 1296.808068][ T2671] ? fault_in_readable+0x17c/0x2d0 [ 1296.813024][ T2671] shmem_write_begin+0x164/0x3a0 [ 1296.817800][ T2671] ? __kasan_check_write+0x14/0x20 [ 1296.822759][ T2671] ? shmem_writepage+0xe00/0xe00 [ 1296.827522][ T2671] generic_perform_write+0x2f9/0x5c0 [ 1296.832633][ T2671] ? generic_file_direct_write+0x6b0/0x6b0 [ 1296.838272][ T2671] ? __file_remove_privs+0x640/0x640 [ 1296.843407][ T2671] ? generic_write_checks+0x15c/0x1c0 [ 1296.848610][ T2671] __generic_file_write_iter+0x174/0x3a0 [ 1296.854070][ T2671] generic_file_write_iter+0xb1/0x310 [ 1296.859279][ T2671] vfs_write+0xaf6/0xed0 [ 1296.863356][ T2671] ? __kasan_slab_free+0x11/0x20 [ 1296.868133][ T2671] ? file_end_write+0x1c0/0x1c0 [ 1296.872824][ T2671] ? mutex_lock+0xb1/0x1e0 [ 1296.877070][ T2671] ? bit_wait_io_timeout+0x120/0x120 [ 1296.882194][ T2671] ? __fdget_pos+0x2e2/0x390 [ 1296.886627][ T2671] ? ksys_write+0x77/0x2c0 [ 1296.890872][ T2671] ksys_write+0x199/0x2c0 [ 1296.895032][ T2671] ? __this_cpu_preempt_check+0x13/0x20 [ 1296.900435][ T2671] ? __ia32_sys_read+0x90/0x90 [ 1296.901378][ T2658] lowmem_reserve[]: 0 3932 [ 1296.905013][ T2671] ? debug_smp_processor_id+0x17/0x20 [ 1296.914474][ T2671] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1296.920378][ T2671] __x64_sys_write+0x7b/0x90 [ 1296.924804][ T2671] x64_sys_call+0x2f/0x9a0 [ 1296.929058][ T2671] do_syscall_64+0x3b/0xb0 [ 1296.933312][ T2671] ? clear_bhb_loop+0x55/0xb0 [ 1296.937824][ T2671] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1296.943561][ T2671] RIP: 0033:0x7f075417e759 [ 1296.947803][ T2671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1296.962241][ T2658] 3932 3932 [ 1296.967242][ T2671] RSP: 002b:00007f0754fea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1296.978530][ T2671] RAX: ffffffffffffffda RBX: 00007f0754335f80 RCX: 00007f075417e759 [ 1296.986345][ T2671] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000009 [ 1296.994152][ T2671] RBP: 00007f0754fea090 R08: 0000000000000000 R09: 0000000000000000 [ 1297.001962][ T2671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1297.009781][ T2671] R13: 0000000000000000 R14: 00007f0754335f80 R15: 00007fff7bc1aee8 [ 1297.017597][ T2671] [ 1297.027757][ T2658] [ 1297.061921][ T2658] Normal free:2995464kB boost:0kB min:84900kB low:106124kB high:127348kB reserved_highatomic:0KB active_anon:105536kB inactive_anon:0kB active_file:101384kB inactive_file:9708kB unevictable:0kB writepending:1304kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:85860kB local_pcp:52512kB free_cma:0kB [ 1297.222712][ T2658] lowmem_reserve[]: 0 0 0 0 [ 1297.227098][ T2658] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 722*4096kB (M) = 2966484kB [ 1297.242847][ T2658] Normal: 1010*4kB (UE) 2132*8kB (UME) 614*16kB (UE) 438*32kB (UME) 941*64kB (UME) 227*128kB (UME) 196*256kB (UME) 92*512kB (UME) 61*1024kB (UME) 7*2048kB (UME) 656*4096kB (UM) = 2995272kB [ 1297.355073][ T2658] 27994 total pagecache pages [ 1297.374514][ T2658] 0 pages in swap cache [ 1297.425737][ T2658] Free swap = 124996kB [ 1297.459394][ T2658] Total swap = 124996kB [ 1297.489709][ T2658] 2097051 pages RAM [ 1297.543785][ T2658] 0 pages HighMem/MovableOnly [ 1297.548385][ T2658] 347563 pages reserved [ 1297.552731][ T2658] 0 pages cma reserved [ 1304.392301][ T2828] bridge0: port 1(bridge_slave_0) entered blocking state [ 1304.437106][ T2828] bridge0: port 1(bridge_slave_0) entered disabled state [ 1304.504646][ T2828] device bridge_slave_0 entered promiscuous mode [ 1304.596909][ T2828] bridge0: port 2(bridge_slave_1) entered blocking state [ 1304.625306][ T2828] bridge0: port 2(bridge_slave_1) entered disabled state [ 1304.714258][ T2828] device bridge_slave_1 entered promiscuous mode [ 1305.496512][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1305.503881][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1305.512519][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1305.520754][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1305.528787][T28304] bridge0: port 1(bridge_slave_0) entered blocking state [ 1305.535649][T28304] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1305.556778][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1305.564233][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1305.572644][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1305.580783][T28304] bridge0: port 2(bridge_slave_1) entered blocking state [ 1305.587603][T28304] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1305.600455][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1305.611919][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1305.624446][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1305.647920][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1305.655827][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1305.663274][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1305.676298][ T2828] device veth0_vlan entered promiscuous mode [ 1305.686857][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1305.695912][ T2828] device veth1_macvtap entered promiscuous mode [ 1305.727188][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1305.735628][T28304] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1306.240276][T18723] device bridge_slave_1 left promiscuous mode [ 1306.248170][T18723] bridge0: port 2(bridge_slave_1) entered disabled state [ 1306.283258][T18723] device bridge_slave_0 left promiscuous mode [ 1306.289308][T18723] bridge0: port 1(bridge_slave_0) entered disabled state [ 1315.780273][ T3139] FAULT_INJECTION: forcing a failure. [ 1315.780273][ T3139] name failslab, interval 1, probability 0, space 0, times 0 [ 1315.954351][ T3139] CPU: 1 PID: 3139 Comm: syz.5.10814 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1315.964083][ T3139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1315.973977][ T3139] Call Trace: [ 1315.977101][ T3139] [ 1315.979884][ T3139] dump_stack_lvl+0x151/0x1b7 [ 1315.984396][ T3139] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1315.989689][ T3139] ? mutex_unlock+0xb2/0x260 [ 1315.994113][ T3139] ? bit_wait_io_timeout+0x120/0x120 [ 1315.999234][ T3139] ? __mutex_lock_slowpath+0x10/0x10 [ 1316.004358][ T3139] dump_stack+0x15/0x1e [ 1316.008346][ T3139] should_fail_ex+0x3d0/0x520 [ 1316.012898][ T3139] ? getname_flags+0xba/0x520 [ 1316.017374][ T3139] __should_failslab+0xaf/0xf0 [ 1316.021977][ T3139] should_failslab+0x9/0x20 [ 1316.026316][ T3139] kmem_cache_alloc+0x3b/0x320 [ 1316.030911][ T3139] ? __ia32_sys_read+0x90/0x90 [ 1316.035515][ T3139] getname_flags+0xba/0x520 [ 1316.039867][ T3139] __x64_sys_mkdirat+0x7c/0xa0 [ 1316.044452][ T3139] x64_sys_call+0x6c6/0x9a0 [ 1316.048793][ T3139] do_syscall_64+0x3b/0xb0 [ 1316.053041][ T3139] ? clear_bhb_loop+0x55/0xb0 [ 1316.057558][ T3139] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1316.063285][ T3139] RIP: 0033:0x7fddddd7e759 [ 1316.067538][ T3139] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1316.087096][ T3139] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 1316.095337][ T3139] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1316.103235][ T3139] RDX: 00000000000001ff RSI: 0000000020000000 RDI: ffffffffffffff9c [ 1316.111045][ T3139] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1316.118861][ T3139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1316.126670][ T3139] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1316.134486][ T3139] [ 1316.784883][ T3178] FAULT_INJECTION: forcing a failure. [ 1316.784883][ T3178] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1316.821252][ T3178] CPU: 1 PID: 3178 Comm: syz.6.10828 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1316.830978][ T3178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1316.840871][ T3178] Call Trace: [ 1316.844004][ T3178] [ 1316.846778][ T3178] dump_stack_lvl+0x151/0x1b7 [ 1316.851291][ T3178] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1316.856582][ T3178] ? lruvec_init+0x240/0x240 [ 1316.861009][ T3178] dump_stack+0x15/0x1e [ 1316.865004][ T3178] should_fail_ex+0x3d0/0x520 [ 1316.869517][ T3178] should_fail+0xb/0x10 [ 1316.873505][ T3178] should_fail_usercopy+0x1a/0x20 [ 1316.878365][ T3178] _copy_from_iter+0x18d/0xe00 [ 1316.882967][ T3178] ? avc_denied+0x1b0/0x1b0 [ 1316.887304][ T3178] ? kstrtoull+0x1cd/0x2e0 [ 1316.891560][ T3178] ? copyout_mc+0x80/0x80 [ 1316.895728][ T3178] ? __alloc_pages+0x234/0x610 [ 1316.900326][ T3178] ? prep_new_page+0x110/0x110 [ 1316.904925][ T3178] ? __kasan_check_write+0x14/0x20 [ 1316.909875][ T3178] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 1316.914821][ T3178] ? _raw_spin_lock_irqsave+0x210/0x210 [ 1316.920203][ T3178] copy_page_from_iter+0x1d7/0x2b0 [ 1316.925146][ T3178] pipe_write+0x7c1/0x1990 [ 1316.929409][ T3178] ? pipe_read+0x1040/0x1040 [ 1316.933836][ T3178] ? selinux_file_permission+0x440/0x560 [ 1316.939296][ T3178] ? fsnotify_perm+0x6a/0x5b0 [ 1316.943819][ T3178] vfs_write+0xaf6/0xed0 [ 1316.947887][ T3178] ? __kasan_slab_free+0x11/0x20 [ 1316.952663][ T3178] ? file_end_write+0x1c0/0x1c0 [ 1316.957349][ T3178] ? __fget_files+0x2cb/0x330 [ 1316.961866][ T3178] ? __fdget_pos+0x204/0x390 [ 1316.966286][ T3178] ? ksys_write+0x77/0x2c0 [ 1316.970543][ T3178] ksys_write+0x199/0x2c0 [ 1316.974706][ T3178] ? __this_cpu_preempt_check+0x13/0x20 [ 1316.980095][ T3178] ? __ia32_sys_read+0x90/0x90 [ 1316.984689][ T3178] ? debug_smp_processor_id+0x17/0x20 [ 1316.989907][ T3178] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1316.995799][ T3178] __x64_sys_write+0x7b/0x90 [ 1317.000222][ T3178] x64_sys_call+0x2f/0x9a0 [ 1317.004478][ T3178] do_syscall_64+0x3b/0xb0 [ 1317.008745][ T3178] ? clear_bhb_loop+0x55/0xb0 [ 1317.013243][ T3178] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1317.018973][ T3178] RIP: 0033:0x7f0b25f7e759 [ 1317.023227][ T3178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1317.042667][ T3178] RSP: 002b:00007f0b26d1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1317.050909][ T3178] RAX: ffffffffffffffda RBX: 00007f0b26135f80 RCX: 00007f0b25f7e759 [ 1317.058741][ T3178] RDX: 0000000000000012 RSI: 0000000020000c00 RDI: 0000000000000000 [ 1317.066535][ T3178] RBP: 00007f0b26d1f090 R08: 0000000000000000 R09: 0000000000000000 [ 1317.074343][ T3178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1317.082155][ T3178] R13: 0000000000000000 R14: 00007f0b26135f80 R15: 00007ffcf7d27ea8 [ 1317.089973][ T3178] [ 1320.531406][ T3302] FAULT_INJECTION: forcing a failure. [ 1320.531406][ T3302] name failslab, interval 1, probability 0, space 0, times 0 [ 1320.676061][ T3302] CPU: 1 PID: 3302 Comm: syz.5.10874 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1320.685808][ T3302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1320.695706][ T3302] Call Trace: [ 1320.698821][ T3302] [ 1320.701604][ T3302] dump_stack_lvl+0x151/0x1b7 [ 1320.706117][ T3302] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1320.711415][ T3302] ? __stack_depot_save+0x36/0x480 [ 1320.716356][ T3302] dump_stack+0x15/0x1e [ 1320.720345][ T3302] should_fail_ex+0x3d0/0x520 [ 1320.724861][ T3302] __should_failslab+0xaf/0xf0 [ 1320.729460][ T3302] ? process_preds+0x446/0x3580 [ 1320.734147][ T3302] should_failslab+0x9/0x20 [ 1320.738489][ T3302] __kmem_cache_alloc_node+0x3d/0x2a0 [ 1320.743695][ T3302] ? process_preds+0x446/0x3580 [ 1320.748376][ T3302] __kmalloc+0xa3/0x1e0 [ 1320.752374][ T3302] process_preds+0x446/0x3580 [ 1320.756886][ T3302] ? create_filter_start+0x176/0x2f0 [ 1320.762181][ T3302] ? create_filter_start+0x2f0/0x2f0 [ 1320.767295][ T3302] ? __kasan_kmalloc+0x9c/0xb0 [ 1320.771898][ T3302] ? kmalloc_trace+0x44/0xa0 [ 1320.776327][ T3302] ftrace_profile_set_filter+0x1ec/0x3e0 [ 1320.781799][ T3302] ? ftrace_profile_free_filter+0x140/0x140 [ 1320.787520][ T3302] ? __mutex_lock_slowpath+0x10/0x10 [ 1320.792642][ T3302] ? _copy_from_user+0x90/0xc0 [ 1320.797243][ T3302] ? memdup_user+0x9e/0xc0 [ 1320.801494][ T3302] perf_ioctl+0x1562/0x20c0 [ 1320.805837][ T3302] ? ioctl_has_perm+0x44d/0x560 [ 1320.810521][ T3302] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1320.815465][ T3302] ? vfs_write+0x952/0xed0 [ 1320.819721][ T3302] ? perf_poll+0x1b0/0x1b0 [ 1320.823978][ T3302] ? selinux_file_ioctl+0x3cc/0x540 [ 1320.829009][ T3302] ? __mutex_lock_slowpath+0x10/0x10 [ 1320.834124][ T3302] ? selinux_file_alloc_security+0x120/0x120 [ 1320.839945][ T3302] ? __fget_files+0x2cb/0x330 [ 1320.844459][ T3302] ? security_file_ioctl+0x84/0xb0 [ 1320.849402][ T3302] ? perf_poll+0x1b0/0x1b0 [ 1320.853657][ T3302] __se_sys_ioctl+0x114/0x190 [ 1320.858171][ T3302] __x64_sys_ioctl+0x7b/0x90 [ 1320.862594][ T3302] x64_sys_call+0x98/0x9a0 [ 1320.866850][ T3302] do_syscall_64+0x3b/0xb0 [ 1320.871100][ T3302] ? clear_bhb_loop+0x55/0xb0 [ 1320.875615][ T3302] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1320.881343][ T3302] RIP: 0033:0x7fddddd7e759 [ 1320.885593][ T3302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1320.905036][ T3302] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1320.913281][ T3302] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1320.921092][ T3302] RDX: 00000000200001c0 RSI: 0000000040082406 RDI: 0000000000000006 [ 1320.928912][ T3302] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1320.936722][ T3302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1320.944544][ T3302] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1320.952353][ T3302] [ 1322.839849][ T28] audit: type=1400 audit(1732004557.547:168): avc: denied { create } for pid=3396 comm="syz.0.10907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_dnrt_socket permissive=1 [ 1323.469604][ T3433] device sit0 entered promiscuous mode [ 1324.469661][ T3478] device veth1_macvtap left promiscuous mode [ 1324.582926][ T3489] device sit0 left promiscuous mode [ 1324.601174][ T3489] device sit0 entered promiscuous mode [ 1325.890457][ T3526] tun0: tun_chr_ioctl cmd 1074025675 [ 1325.895803][ T3526] tun0: persist enabled [ 1327.886842][ T3596] syz.3.10984[3596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1327.886914][ T3596] syz.3.10984[3596] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1332.781392][ T3752] tun1: tun_chr_ioctl cmd 1074025675 [ 1332.829261][ T3752] tun1: persist enabled [ 1338.332833][ T3961] device syzkaller0 entered promiscuous mode [ 1347.008908][ T4208] FAULT_INJECTION: forcing a failure. [ 1347.008908][ T4208] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1347.022190][ T4208] CPU: 0 PID: 4208 Comm: syz.5.11199 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1347.032446][ T4208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1347.042537][ T4208] Call Trace: [ 1347.045924][ T4208] [ 1347.048697][ T4208] dump_stack_lvl+0x151/0x1b7 [ 1347.053211][ T4208] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1347.058506][ T4208] ? kasan_set_track+0x60/0x70 [ 1347.063105][ T4208] dump_stack+0x15/0x1e [ 1347.067094][ T4208] should_fail_ex+0x3d0/0x520 [ 1347.071616][ T4208] should_fail_alloc_page+0x68/0x90 [ 1347.076647][ T4208] prepare_alloc_pages+0x14e/0x6f0 [ 1347.081594][ T4208] ? __alloc_pages_bulk+0xda0/0xda0 [ 1347.086628][ T4208] __alloc_pages+0x162/0x610 [ 1347.091052][ T4208] ? prep_new_page+0x110/0x110 [ 1347.095658][ T4208] __folio_alloc+0x15/0x40 [ 1347.099903][ T4208] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 1347.105460][ T4208] ? mem_cgroup_swap_full+0x1a0/0x1a0 [ 1347.110674][ T4208] ? shmem_replace_folio+0x6a0/0x6a0 [ 1347.115796][ T4208] ? xas_load+0x39d/0x3b0 [ 1347.119957][ T4208] ? __filemap_get_folio+0xaa1/0xae0 [ 1347.125093][ T4208] ? page_cache_prev_miss+0x410/0x410 [ 1347.130392][ T4208] ? down_read_trylock+0x319/0x7d0 [ 1347.135324][ T4208] shmem_get_folio_gfp+0x12d4/0x24b0 [ 1347.140446][ T4208] ? shmem_get_folio+0xa0/0xa0 [ 1347.145036][ T4208] ? fault_in_iov_iter_readable+0x49/0x290 [ 1347.150678][ T4208] ? fault_in_readable+0x172/0x2d0 [ 1347.155637][ T4208] ? fault_in_readable+0x17c/0x2d0 [ 1347.160644][ T4208] shmem_write_begin+0x164/0x3a0 [ 1347.165348][ T4208] ? __kasan_check_write+0x14/0x20 [ 1347.170303][ T4208] ? shmem_writepage+0xe00/0xe00 [ 1347.175070][ T4208] generic_perform_write+0x2f9/0x5c0 [ 1347.180281][ T4208] ? generic_file_direct_write+0x6b0/0x6b0 [ 1347.185931][ T4208] ? __file_remove_privs+0x640/0x640 [ 1347.191122][ T4208] ? generic_write_checks+0x15c/0x1c0 [ 1347.196526][ T4208] __generic_file_write_iter+0x174/0x3a0 [ 1347.202127][ T4208] generic_file_write_iter+0xb1/0x310 [ 1347.207316][ T4208] vfs_write+0xaf6/0xed0 [ 1347.211391][ T4208] ? __kasan_slab_free+0x11/0x20 [ 1347.216171][ T4208] ? file_end_write+0x1c0/0x1c0 [ 1347.220850][ T4208] ? mutex_lock+0xb1/0x1e0 [ 1347.225108][ T4208] ? bit_wait_io_timeout+0x120/0x120 [ 1347.230230][ T4208] ? __fdget_pos+0x2e2/0x390 [ 1347.234772][ T4208] ? ksys_write+0x77/0x2c0 [ 1347.239018][ T4208] ksys_write+0x199/0x2c0 [ 1347.243182][ T4208] ? __this_cpu_preempt_check+0x13/0x20 [ 1347.248585][ T4208] ? __ia32_sys_read+0x90/0x90 [ 1347.253347][ T4208] ? debug_smp_processor_id+0x17/0x20 [ 1347.258555][ T4208] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1347.264456][ T4208] __x64_sys_write+0x7b/0x90 [ 1347.269049][ T4208] x64_sys_call+0x2f/0x9a0 [ 1347.273304][ T4208] do_syscall_64+0x3b/0xb0 [ 1347.277553][ T4208] ? clear_bhb_loop+0x55/0xb0 [ 1347.282069][ T4208] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1347.287795][ T4208] RIP: 0033:0x7fddddd7e759 [ 1347.292046][ T4208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1347.312306][ T4208] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1347.320551][ T4208] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1347.328360][ T4208] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000008 [ 1347.336173][ T4208] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1347.343982][ T4208] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1347.351815][ T4208] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1347.359698][ T4208] [ 1350.143350][ T4235] device veth1_macvtap entered promiscuous mode [ 1350.150452][ T4235] device macsec0 entered promiscuous mode [ 1350.162076][ T719] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1350.178430][ T4235] geneve1: tun_chr_ioctl cmd 1074025677 [ 1350.184024][ T4235] geneve1: linktype set to 6 [ 1350.635267][ T4255] device sit0 entered promiscuous mode [ 1352.604995][ T4286] device veth0_vlan left promiscuous mode [ 1352.618356][ T4286] device veth0_vlan entered promiscuous mode [ 1352.666917][T18723] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1352.680080][T18723] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1352.722505][T18723] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1353.098156][ T4310] device sit0 left promiscuous mode [ 1353.243337][ T4310] device sit0 entered promiscuous mode [ 1354.667690][ T4380] device sit0 left promiscuous mode [ 1354.723184][ T4373] device veth0_vlan left promiscuous mode [ 1354.752479][ T4373] device veth0_vlan entered promiscuous mode [ 1354.957984][ T4380] device sit0 entered promiscuous mode [ 1357.156513][ T4483] FAULT_INJECTION: forcing a failure. [ 1357.156513][ T4483] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1357.176887][ T4484] device pim6reg1 entered promiscuous mode [ 1357.179275][ T4483] CPU: 1 PID: 4483 Comm: syz.5.11291 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1357.192357][ T4483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1357.202260][ T4483] Call Trace: [ 1357.205379][ T4483] [ 1357.208153][ T4483] dump_stack_lvl+0x151/0x1b7 [ 1357.212665][ T4483] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1357.217961][ T4483] ? kstrtoull+0x1cd/0x2e0 [ 1357.222215][ T4483] ? _parse_integer+0x40/0x40 [ 1357.226730][ T4483] dump_stack+0x15/0x1e [ 1357.230717][ T4483] should_fail_ex+0x3d0/0x520 [ 1357.235238][ T4483] should_fail+0xb/0x10 [ 1357.239221][ T4483] should_fail_usercopy+0x1a/0x20 [ 1357.244083][ T4483] _copy_from_user+0x1e/0xc0 [ 1357.248606][ T4483] iovec_from_user+0xc7/0x320 [ 1357.253111][ T4483] __import_iovec+0x70/0x430 [ 1357.257566][ T4483] ? kstrtouint_from_user+0x124/0x180 [ 1357.262767][ T4483] import_iovec+0xe5/0x120 [ 1357.267003][ T4483] copy_msghdr_from_user+0x527/0x670 [ 1357.272116][ T4483] ? __kasan_check_write+0x14/0x20 [ 1357.277072][ T4483] ? sendmsg_copy_msghdr+0x70/0x70 [ 1357.282014][ T4483] __sys_recvmsg+0x24b/0x3d0 [ 1357.286437][ T4483] ? ____sys_recvmsg+0x530/0x530 [ 1357.291213][ T4483] ? __kasan_check_write+0x14/0x20 [ 1357.296159][ T4483] ? __ia32_sys_read+0x90/0x90 [ 1357.300849][ T4483] ? debug_smp_processor_id+0x17/0x20 [ 1357.306053][ T4483] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1357.311970][ T4483] __x64_sys_recvmsg+0x7f/0x90 [ 1357.316556][ T4483] x64_sys_call+0x171/0x9a0 [ 1357.320993][ T4483] do_syscall_64+0x3b/0xb0 [ 1357.325248][ T4483] ? clear_bhb_loop+0x55/0xb0 [ 1357.329945][ T4483] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1357.335774][ T4483] RIP: 0033:0x7fddddd7e759 [ 1357.340030][ T4483] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1357.359469][ T4483] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1357.367714][ T4483] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1357.375525][ T4483] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000004 [ 1357.383338][ T4483] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1357.391148][ T4483] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1357.398971][ T4483] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1357.406783][ T4483] [ 1357.535595][ T4500] FAULT_INJECTION: forcing a failure. [ 1357.535595][ T4500] name failslab, interval 1, probability 0, space 0, times 0 [ 1357.571203][ T4498] device wg2 left promiscuous mode [ 1357.576457][ T4500] CPU: 0 PID: 4500 Comm: syz.5.11297 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1357.586172][ T4500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1357.596236][ T4500] Call Trace: [ 1357.599356][ T4500] [ 1357.602133][ T4500] dump_stack_lvl+0x151/0x1b7 [ 1357.606651][ T4500] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1357.611946][ T4500] dump_stack+0x15/0x1e [ 1357.615936][ T4500] should_fail_ex+0x3d0/0x520 [ 1357.620453][ T4500] __should_failslab+0xaf/0xf0 [ 1357.625054][ T4500] ? trace_probe_init+0x2c1/0x390 [ 1357.629917][ T4500] should_failslab+0x9/0x20 [ 1357.634252][ T4500] __kmem_cache_alloc_node+0x3d/0x2a0 [ 1357.639544][ T4500] ? trace_probe_init+0x58/0x390 [ 1357.644313][ T4500] ? trace_probe_init+0x2c1/0x390 [ 1357.649174][ T4500] __kmalloc_node_track_caller+0xa2/0x1e0 [ 1357.654728][ T4500] kstrdup+0x39/0x70 [ 1357.658466][ T4500] trace_probe_init+0x2c1/0x390 [ 1357.663148][ T4500] create_local_trace_uprobe+0x18c/0x710 [ 1357.668621][ T4500] ? bpf_get_uprobe_info+0x540/0x540 [ 1357.673742][ T4500] perf_uprobe_init+0xfa/0x1a0 [ 1357.678334][ T4500] perf_uprobe_event_init+0x106/0x190 [ 1357.683544][ T4500] perf_try_init_event+0x143/0x410 [ 1357.688493][ T4500] perf_event_alloc+0x1029/0x1840 [ 1357.693352][ T4500] __se_sys_perf_event_open+0xb27/0x3d60 [ 1357.698821][ T4500] ? mutex_lock+0x1d1/0x1e0 [ 1357.703161][ T4500] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1357.708634][ T4500] ? fput+0x15b/0x1b0 [ 1357.712445][ T4500] ? __ia32_sys_read+0x90/0x90 [ 1357.717048][ T4500] ? debug_smp_processor_id+0x17/0x20 [ 1357.722251][ T4500] __x64_sys_perf_event_open+0xbf/0xd0 [ 1357.727549][ T4500] x64_sys_call+0x7de/0x9a0 [ 1357.731887][ T4500] do_syscall_64+0x3b/0xb0 [ 1357.736136][ T4500] ? clear_bhb_loop+0x55/0xb0 [ 1357.740654][ T4500] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1357.746378][ T4500] RIP: 0033:0x7fddddd7e759 [ 1357.750632][ T4500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1357.770077][ T4500] RSP: 002b:00007fdddead7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1357.778320][ T4500] RAX: ffffffffffffffda RBX: 00007fddddf35f80 RCX: 00007fddddd7e759 [ 1357.786128][ T4500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020001080 [ 1357.793948][ T4500] RBP: 00007fdddead7090 R08: 0000000000000000 R09: 0000000000000000 [ 1357.801756][ T4500] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1357.809912][ T4500] R13: 0000000000000000 R14: 00007fddddf35f80 R15: 00007fff3ad02f68 [ 1357.817733][ T4500] [ 1357.849435][ T4500] trace_uprobe: Failed to allocate trace_uprobe.(-12) [ 1358.050650][ T4521] netpci0: tun_chr_ioctl cmd 1074025677 [ 1358.056262][ T4521] netpci0: linktype set to 769 [ 1359.059759][ T4568] ip6_vti0: mtu greater than device maximum [ 1360.015120][ T4616] FAULT_INJECTION: forcing a failure. [ 1360.015120][ T4616] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1360.049217][ T4616] CPU: 1 PID: 4616 Comm: syz.0.11337 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1360.059070][ T4616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1360.068957][ T4616] Call Trace: [ 1360.072081][ T4616] [ 1360.074857][ T4616] dump_stack_lvl+0x151/0x1b7 [ 1360.079386][ T4616] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1360.084670][ T4616] dump_stack+0x15/0x1e [ 1360.088657][ T4616] should_fail_ex+0x3d0/0x520 [ 1360.093178][ T4616] should_fail_alloc_page+0x68/0x90 [ 1360.098208][ T4616] prepare_alloc_pages+0x14e/0x6f0 [ 1360.103155][ T4616] ? __alloc_pages_bulk+0xda0/0xda0 [ 1360.108366][ T4616] ? slab_post_alloc_hook+0x53/0x2c0 [ 1360.113481][ T4616] ? alloc_vmap_area+0x1a5/0x1aa0 [ 1360.118343][ T4616] ? __get_vm_area_node+0x171/0x370 [ 1360.123373][ T4616] ? __vmalloc_node_range+0x338/0x1560 [ 1360.128678][ T4616] __alloc_pages+0x162/0x610 [ 1360.133100][ T4616] ? prep_new_page+0x110/0x110 [ 1360.137698][ T4616] ? _raw_spin_trylock_bh+0x190/0x190 [ 1360.142906][ T4616] ? memset+0x35/0x40 [ 1360.146816][ T4616] __get_free_pages+0xe/0x30 [ 1360.151248][ T4616] kasan_populate_vmalloc_pte+0x39/0x130 [ 1360.156702][ T4616] ? __apply_to_page_range+0x8ca/0xbe0 [ 1360.161999][ T4616] __apply_to_page_range+0x8dd/0xbe0 [ 1360.167118][ T4616] ? kasan_populate_vmalloc+0x70/0x70 [ 1360.172328][ T4616] ? kasan_populate_vmalloc+0x70/0x70 [ 1360.177532][ T4616] apply_to_page_range+0x3b/0x50 [ 1360.182310][ T4616] kasan_populate_vmalloc+0x65/0x70 [ 1360.187429][ T4616] alloc_vmap_area+0x1961/0x1aa0 [ 1360.192210][ T4616] ? vm_map_ram+0x940/0x940 [ 1360.196887][ T4616] ? __kasan_kmalloc+0x9c/0xb0 [ 1360.201491][ T4616] ? kmalloc_node_trace+0x3d/0xb0 [ 1360.206480][ T4616] __get_vm_area_node+0x171/0x370 [ 1360.211340][ T4616] __vmalloc_node_range+0x338/0x1560 [ 1360.216626][ T4616] ? array_map_alloc+0x278/0x6d0 [ 1360.221443][ T4616] ? selinux_capable+0x2f1/0x430 [ 1360.226256][ T4616] ? selinux_capset+0xf0/0xf0 [ 1360.230762][ T4616] ? vmap+0x2b0/0x2b0 [ 1360.234539][ T4616] ? irqentry_exit+0x30/0x40 [ 1360.238966][ T4616] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1360.244688][ T4616] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1360.250881][ T4616] bpf_map_area_alloc+0xdc/0xf0 [ 1360.255542][ T4616] ? array_map_alloc+0x278/0x6d0 [ 1360.260312][ T4616] array_map_alloc+0x278/0x6d0 [ 1360.264919][ T4616] map_create+0x44a/0xcf0 [ 1360.269084][ T4616] __sys_bpf+0x2e6/0x7f0 [ 1360.273362][ T4616] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1360.278552][ T4616] ? bpf_trace_run1+0x240/0x240 [ 1360.283317][ T4616] ? __ia32_sys_read+0x90/0x90 [ 1360.287924][ T4616] ? debug_smp_processor_id+0x17/0x20 [ 1360.293202][ T4616] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1360.299105][ T4616] __x64_sys_bpf+0x7c/0x90 [ 1360.303370][ T4616] x64_sys_call+0x87f/0x9a0 [ 1360.307956][ T4616] do_syscall_64+0x3b/0xb0 [ 1360.312218][ T4616] ? clear_bhb_loop+0x55/0xb0 [ 1360.316732][ T4616] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1360.322452][ T4616] RIP: 0033:0x7fea34f7e759 [ 1360.326746][ T4616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1360.346360][ T4616] RSP: 002b:00007fea35dc3038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1360.354562][ T4616] RAX: ffffffffffffffda RBX: 00007fea35136058 RCX: 00007fea34f7e759 [ 1360.362375][ T4616] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 0000000000000000 [ 1360.370187][ T4616] RBP: 00007fea35dc3090 R08: 0000000000000000 R09: 0000000000000000 [ 1360.377996][ T4616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1360.385904][ T4616] R13: 0000000000000000 R14: 00007fea35136058 R15: 00007ffd7ccb3a98 [ 1360.393717][ T4616] [ 1360.940659][ T4635] device wg2 entered promiscuous mode [ 1361.190324][ T4667] syz.2.11357[4667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1361.190402][ T4667] syz.2.11357[4667] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1361.212526][ T4667] device wg2 left promiscuous mode [ 1361.241730][ T4667] device wg2 entered promiscuous mode [ 1361.329925][ T4678] FAULT_INJECTION: forcing a failure. [ 1361.329925][ T4678] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1361.348089][ T4678] CPU: 1 PID: 4678 Comm: syz.0.11362 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1361.357826][ T4678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1361.367722][ T4678] Call Trace: [ 1361.370847][ T4678] [ 1361.373623][ T4678] dump_stack_lvl+0x151/0x1b7 [ 1361.378137][ T4678] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1361.383430][ T4678] ? __kmem_cache_free+0x21d/0x410 [ 1361.388376][ T4678] ? bpf_prog_test_run_xdp+0xa80/0x1130 [ 1361.393759][ T4678] dump_stack+0x15/0x1e [ 1361.397748][ T4678] should_fail_ex+0x3d0/0x520 [ 1361.402266][ T4678] should_fail+0xb/0x10 [ 1361.406261][ T4678] should_fail_usercopy+0x1a/0x20 [ 1361.411115][ T4678] _copy_to_user+0x1e/0x90 [ 1361.415369][ T4678] simple_read_from_buffer+0xc7/0x150 [ 1361.420578][ T4678] proc_fail_nth_read+0x1a3/0x210 [ 1361.425438][ T4678] ? proc_fault_inject_write+0x390/0x390 [ 1361.430905][ T4678] ? fsnotify_perm+0x269/0x5b0 [ 1361.435518][ T4678] ? security_file_permission+0x86/0xb0 [ 1361.440893][ T4678] ? proc_fault_inject_write+0x390/0x390 [ 1361.446353][ T4678] vfs_read+0x26c/0xae0 [ 1361.450349][ T4678] ? kernel_read+0x1f0/0x1f0 [ 1361.454774][ T4678] ? mutex_lock+0xb1/0x1e0 [ 1361.459025][ T4678] ? bit_wait_io_timeout+0x120/0x120 [ 1361.464159][ T4678] ? __fdget_pos+0x2e2/0x390 [ 1361.468571][ T4678] ? ksys_read+0x77/0x2c0 [ 1361.472741][ T4678] ksys_read+0x199/0x2c0 [ 1361.476821][ T4678] ? vfs_write+0xed0/0xed0 [ 1361.481072][ T4678] ? debug_smp_processor_id+0x17/0x20 [ 1361.486281][ T4678] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1361.492190][ T4678] __x64_sys_read+0x7b/0x90 [ 1361.496524][ T4678] x64_sys_call+0x28/0x9a0 [ 1361.500775][ T4678] do_syscall_64+0x3b/0xb0 [ 1361.505024][ T4678] ? clear_bhb_loop+0x55/0xb0 [ 1361.509539][ T4678] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1361.515280][ T4678] RIP: 0033:0x7fea34f7d19c [ 1361.519521][ T4678] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 1361.539147][ T4678] RSP: 002b:00007fea35de4030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1361.547478][ T4678] RAX: ffffffffffffffda RBX: 00007fea35135f80 RCX: 00007fea34f7d19c [ 1361.555376][ T4678] RDX: 000000000000000f RSI: 00007fea35de40a0 RDI: 0000000000000009 [ 1361.563274][ T4678] RBP: 00007fea35de4090 R08: 0000000000000000 R09: 0000000000000000 [ 1361.571193][ T4678] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1361.579005][ T4678] R13: 0000000000000000 R14: 00007fea35135f80 R15: 00007ffd7ccb3a98 [ 1361.586825][ T4678] [ 1362.621432][ T4724] bridge0: port 3(team_slave_1) entered blocking state [ 1362.628674][ T4724] bridge0: port 3(team_slave_1) entered disabled state [ 1362.684385][ T4724] device team_slave_1 entered promiscuous mode [ 1363.821479][ T4767] FAULT_INJECTION: forcing a failure. [ 1363.821479][ T4767] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.834062][ T4767] CPU: 0 PID: 4767 Comm: syz.6.11396 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1363.843973][ T4767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1363.853853][ T4767] Call Trace: [ 1363.857083][ T4767] [ 1363.859847][ T4767] dump_stack_lvl+0x151/0x1b7 [ 1363.864367][ T4767] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1363.869661][ T4767] dump_stack+0x15/0x1e [ 1363.873764][ T4767] should_fail_ex+0x3d0/0x520 [ 1363.878446][ T4767] __should_failslab+0xaf/0xf0 [ 1363.883212][ T4767] should_failslab+0x9/0x20 [ 1363.887543][ T4767] kmem_cache_alloc_node+0x42/0x330 [ 1363.892589][ T4767] ? __alloc_skb+0xcc/0x2d0 [ 1363.896918][ T4767] __alloc_skb+0xcc/0x2d0 [ 1363.901090][ T4767] alloc_skb_with_frags+0xa6/0x680 [ 1363.906042][ T4767] ? 0xffffffffa000064c [ 1363.910021][ T4767] sock_alloc_send_pskb+0x915/0xa50 [ 1363.915082][ T4767] ? sock_kzfree_s+0x60/0x60 [ 1363.919483][ T4767] ? kstrtoull+0x1cd/0x2e0 [ 1363.923734][ T4767] ? _parse_integer+0x40/0x40 [ 1363.928247][ T4767] tun_get_user+0xfaf/0x3a90 [ 1363.932675][ T4767] ? _kstrtol+0x150/0x150 [ 1363.936843][ T4767] ? tun_do_read+0x2000/0x2000 [ 1363.941439][ T4767] ? ref_tracker_alloc+0x31d/0x450 [ 1363.946385][ T4767] ? ref_tracker_dir_print+0x160/0x160 [ 1363.951683][ T4767] ? avc_policy_seqno+0x1b/0x70 [ 1363.956368][ T4767] ? tun_get+0xe9/0x120 [ 1363.960362][ T4767] tun_chr_write_iter+0x129/0x210 [ 1363.965219][ T4767] vfs_write+0xaf6/0xed0 [ 1363.969299][ T4767] ? __kasan_slab_free+0x11/0x20 [ 1363.974078][ T4767] ? file_end_write+0x1c0/0x1c0 [ 1363.978759][ T4767] ? __fget_files+0x2cb/0x330 [ 1363.983275][ T4767] ? __fdget_pos+0x204/0x390 [ 1363.987704][ T4767] ? ksys_write+0x77/0x2c0 [ 1363.991962][ T4767] ksys_write+0x199/0x2c0 [ 1363.996206][ T4767] ? __this_cpu_preempt_check+0x13/0x20 [ 1364.001591][ T4767] ? __ia32_sys_read+0x90/0x90 [ 1364.006187][ T4767] ? debug_smp_processor_id+0x17/0x20 [ 1364.011393][ T4767] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1364.017296][ T4767] __x64_sys_write+0x7b/0x90 [ 1364.021722][ T4767] x64_sys_call+0x2f/0x9a0 [ 1364.025982][ T4767] do_syscall_64+0x3b/0xb0 [ 1364.030225][ T4767] ? clear_bhb_loop+0x55/0xb0 [ 1364.035000][ T4767] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1364.040727][ T4767] RIP: 0033:0x7f0b25f7e759 [ 1364.044981][ T4767] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1364.064436][ T4767] RSP: 002b:00007f0b26d1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1364.072668][ T4767] RAX: ffffffffffffffda RBX: 00007f0b26135f80 RCX: 00007f0b25f7e759 [ 1364.080490][ T4767] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 1364.088292][ T4767] RBP: 00007f0b26d1f090 R08: 0000000000000000 R09: 0000000000000000 [ 1364.096105][ T4767] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1364.103917][ T4767] R13: 0000000000000000 R14: 00007f0b26135f80 R15: 00007ffcf7d27ea8 [ 1364.111738][ T4767] [ 1365.939297][ T4851] FAULT_INJECTION: forcing a failure. [ 1365.939297][ T4851] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1365.954423][ T4851] CPU: 1 PID: 4851 Comm: syz.6.11423 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1365.964147][ T4851] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1365.974038][ T4851] Call Trace: [ 1365.977175][ T4851] [ 1365.979944][ T4851] dump_stack_lvl+0x151/0x1b7 [ 1365.984454][ T4851] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1365.989750][ T4851] ? group_send_sig_info+0x131/0x320 [ 1365.994959][ T4851] dump_stack+0x15/0x1e [ 1365.998947][ T4851] should_fail_ex+0x3d0/0x520 [ 1366.003472][ T4851] should_fail+0xb/0x10 [ 1366.007453][ T4851] should_fail_usercopy+0x1a/0x20 [ 1366.012312][ T4851] _copy_from_user+0x1e/0xc0 [ 1366.016743][ T4851] __sys_bpf+0x23b/0x7f0 [ 1366.020820][ T4851] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1366.026034][ T4851] ? __ia32_sys_read+0x90/0x90 [ 1366.030628][ T4851] ? debug_smp_processor_id+0x17/0x20 [ 1366.035864][ T4851] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1366.041741][ T4851] __x64_sys_bpf+0x7c/0x90 [ 1366.045997][ T4851] x64_sys_call+0x87f/0x9a0 [ 1366.050332][ T4851] do_syscall_64+0x3b/0xb0 [ 1366.054587][ T4851] ? clear_bhb_loop+0x55/0xb0 [ 1366.059103][ T4851] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1366.064831][ T4851] RIP: 0033:0x7f0b25f7e759 [ 1366.069081][ T4851] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1366.088527][ T4851] RSP: 002b:00007f0b26d1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1366.096765][ T4851] RAX: ffffffffffffffda RBX: 00007f0b26135f80 RCX: 00007f0b25f7e759 [ 1366.104575][ T4851] RDX: 0000000000000028 RSI: 0000000020000080 RDI: 000000000000000a [ 1366.112385][ T4851] RBP: 00007f0b26d1f090 R08: 0000000000000000 R09: 0000000000000000 [ 1366.120198][ T4851] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1366.128014][ T4851] R13: 0000000000000000 R14: 00007f0b26135f80 R15: 00007ffcf7d27ea8 [ 1366.136004][ T4851] [ 1367.880660][ T4924] device pim6reg1 entered promiscuous mode [ 1368.133004][ T4943] device pim6reg1 entered promiscuous mode [ 1378.933001][ T5244] device veth0_vlan left promiscuous mode [ 1379.040709][ T5244] device veth0_vlan entered promiscuous mode