last executing test programs: 26.989342183s ago: executing program 4 (id=7306): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5f}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x95}}}, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xffe, &(0x7f0000001e40)=""/4094, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x60) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000)}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x120, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 21.190728633s ago: executing program 4 (id=7306): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5f}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x95}}}, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xffe, &(0x7f0000001e40)=""/4094, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x60) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000)}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x120, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 16.213875619s ago: executing program 4 (id=7306): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5f}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x95}}}, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xffe, &(0x7f0000001e40)=""/4094, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x60) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000)}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x120, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 10.191361713s ago: executing program 4 (id=7306): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5f}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x95}}}, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xffe, &(0x7f0000001e40)=""/4094, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x60) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000)}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x120, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 5.845949319s ago: executing program 2 (id=7808): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000980), 0x0, 0x9, 0xe8034000, 0xfffffd48, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1}, 0x50) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 5.629136153s ago: executing program 2 (id=7810): sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000"], 0x128}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000400000003"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="17fa00000000090000000400000000001c110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r4, 0x27, 0xe, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x5288000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 4.843011605s ago: executing program 4 (id=7306): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5f}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x95}}}, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xffe, &(0x7f0000001e40)=""/4094, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x60) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000)}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x120, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.736097658s ago: executing program 2 (id=7813): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702500000000fe1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0200000004000000080000000100"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000b61c0000002c7b3feabf195f07a6de638017fd80c467e03f9d1f41afc5be5c4454cfc9efc86871974df4fb0ddee4eb6fba7cc8f888"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0xd80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 2.401144573s ago: executing program 2 (id=7814): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x7, 0x4, 0x18, 0xa042, 0x0, 0xffffffffffffffff, 0x401, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 2.043625548s ago: executing program 0 (id=7817): bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0xff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x14, 0xc8, 0xffeffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0xfffffffffffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x10498a, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000500)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.818572062s ago: executing program 1 (id=7819): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.783564783s ago: executing program 1 (id=7822): bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x3, &(0x7f0000000400)=@framed, 0x0, 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0xff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x14, 0xc8, 0xffeffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0xfffffffffffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x10498a, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000500)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 1.733825313s ago: executing program 0 (id=7823): sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000"], 0x128}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000400000003"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="17fa00000000090000000400000000001c110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r4, 0x27, 0xe, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x5288000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 1.631312095s ago: executing program 2 (id=7824): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 1.484136687s ago: executing program 2 (id=7825): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000400008500000001000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0600000004000000008000005c"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002002000850000008200000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x24, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000d80)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r4}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bond_slave_1\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8922, &(0x7f0000000080)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r7, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000841}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) close(0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)=@o_path={0x0, 0x0, 0x18}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r6, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r6, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x40001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='fdb_delete\x00', r1}, 0x10) 1.455764918s ago: executing program 0 (id=7826): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702500000000fe1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000b61c0000002c7b3feabf195f07a6de638017fd80c467e03f9d1f41afc5be5c4454cfc9efc86871974df4fb0ddee4eb6fba7cc8f888"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0xd80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.399930608s ago: executing program 1 (id=7827): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r0, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) socketpair(0xf, 0x3, 0x100, &(0x7f0000000000)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES8=r1, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r3}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r5, @ANYBLOB="931e048eed8d7dd43c1f34b4a3cce65392a33b619cf9688327125f26b6a466e7502a23554abfb38db1300db057097af5972487c8e62c49eb2c62ee013549d1929a7d4c", @ANYBLOB="18000000000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) close(0xffffffffffffffff) ioctl$SIOCSIFHWADDR(r4, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) r8 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000c40), 0x12) 1.352740239s ago: executing program 3 (id=7828): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0x22, 0x0, &(0x7f0000000380)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0x66) 1.153162692s ago: executing program 0 (id=7829): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702500000000fe1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0200000004000000080000000100"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="85000000080000004e00000000000000850000007d00000095000000000000007ab9e683b171b4b09980af6c1ebeda4ac0d3e3aa71a9ab17e14e1b0be949499ca6a5b2c467b6d3d1c0ae1e9820331afd90cc832c761aa3adf9be48c401c7f893694bf8cd19b7173cd4688904f7310af046fd490d3f2cf49b5f68aecf0bc659dc3d53c2"], &(0x7f0000000140)='GPL\x00', 0x0, 0xbd, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x15) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000b61c0000002c7b3feabf195f07a6de638017fd80c467e03f9d1f41afc5be5c4454cfc9efc86871974df4fb0ddee4eb6fba7cc8f888"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0xd80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 1.053348344s ago: executing program 3 (id=7830): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8982, &(0x7f0000000080)) 761.670728ms ago: executing program 3 (id=7831): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000004f4b000000000000000000180100002020702500000000fe1f20207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b7030000fdffffff850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f00000700000000000000", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0200000004000000080000000100"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0xc, 0x10, &(0x7f0000000e40)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000001c00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0xf7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000300)='ns/net\x00') bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f00000004c0)=""/153, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000b61c0000002c7b3feabf195f07a6de638017fd80c467e03f9d1f41afc5be5c4454cfc9efc86871974df4fb0ddee4eb6fba7cc8f888"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1f, 0xf, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000008000000850000"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r1, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0xd80, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000540)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 759.355098ms ago: executing program 0 (id=7832): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x7, &(0x7f0000000240)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, r5}}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffd}], &(0x7f00000002c0)='GPL\x00', 0x8, 0x2b, &(0x7f0000000340)=""/43, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x1, 0x3}, 0x8, 0x10, &(0x7f00000008c0)={0x2, 0x1, 0x1ff, 0x3ff}, 0x10, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000900)=[{0x5, 0x3, 0xf, 0x5}], 0x10, 0x3, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x80000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r9}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x80000000}, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r10, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r11}, 0x10) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)}], 0x1, 0x0, 0x0, 0x2044}, 0x60) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r12, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) 466.705593ms ago: executing program 1 (id=7833): bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000000)='GPL\x00', 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0xff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x14, 0xc8, 0xffeffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0xfffffffffffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x10498a, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000500)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 297.319785ms ago: executing program 3 (id=7834): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) sendmsg$unix(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r3], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) close(r6) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x0) sendmsg$inet(r9, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) 141.186357ms ago: executing program 3 (id=7835): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 140.628497ms ago: executing program 1 (id=7836): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b000000080000000c0000000000008001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0x21, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000800000000000000ffff000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf2fbf0e23000000550901000000000095000000000000001826000097afd4938cb52d04ddb2e5cf6be99940837becd6467bede8b89e4474494537851aa12506d3766cf3c2e21f83ec2b082e4a8acb92992a8d9b98593012fe1ddaffb1cdc2c894e7d95d35937d472eed8d92bc04f778dc437bdcd8f209b5b7a7fc3504e74b415266777c5f0ac4565f8faeeb336417208a9573862bee94edc83d1c1dfb5d90d7db495a86b8e5e8b200620b54ba45edf5feec20fa65710172ddbc76d6e670a43b13accc0a13", @ANYRES32=r0, @ANYBLOB="000000000b0000000c7e01008100000018000000ffff0000000000000700000018420000fbffffff0000000000000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000080000008500000006000000186700000100000000000000436100009500000000000000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @cgroup_sock=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed850000006d000000a50000000500000095"], &(0x7f0000000480)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x5460, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r3}, 0x10) (async) bpf$PROG_LOAD(0x5, 0x0, 0x56) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100), 0x4) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0300000004000000030029babbe0001a00000000", @ANYRES32, @ANYBLOB="c00100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="050000000500"/28], 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000c0000000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000008000"/28], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000780)="9a8c3a38c3e3049b0da1eb12cd82378a50731d9b26a2a721b265abad07801bc40d1baa0db2565b35bf8f0000000005a0c46c3cb2a1a513bda5620a12bd7738193492bdff11c783bdf9deed70b9e68341b8db31e779f1caa5860d6136c35cc4b3e50e1a0d9d876e60", 0x433d, r4}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x22000, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) (async) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000001c0)=@nameseq={0x1e, 0x1, 0x3, {0x2, 0x2, 0x4}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10084}, 0x40) (async) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000740), &(0x7f00000007c0), 0xffffd6c0, r5, 0x0, 0xf2ffffffffffffff}, 0x38) (async) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000000000000000004b64ffed85"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) 140.410998ms ago: executing program 1 (id=7837): bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x3, 0x3, &(0x7f0000000400)=@framed, 0x0, 0x5, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x9, 0xff, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x14, 0xc8, 0xffeffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd9, 0x0, 0xfffffffffffffffd}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x4}, 0x10498a, 0xc8, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x4, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000500)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 103.091588ms ago: executing program 3 (id=7838): sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="2801000000000000"], 0x128}, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000400000003"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="17fa00000000090000000400000000001c110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_procs(r3, &(0x7f0000000280)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000610000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000a40)={r4, 0x27, 0xe, 0x0, &(0x7f0000000440)="f8ad48cc02cb29dcc8007f5b0800", 0x0, 0x4000, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) syz_clone(0x5288000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) 86.492559ms ago: executing program 0 (id=7839): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000880), 0xfffffffffffffddd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x3) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r5, 0x0, 0x22, 0x0, &(0x7f0000000380)="3d6ee2e04b91ab10143d9abe86dd", 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb5d07081196f37538e486dd63"], 0x66) 0s ago: executing program 4 (id=7306): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xf, &(0x7f0000000340)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {0x85, 0x0, 0x0, 0x5f}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x95}}}, &(0x7f0000000200)='syzkaller\x00', 0x2, 0xffe, &(0x7f0000001e40)=""/4094, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x60) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001000)}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x120, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r6 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): 0x20 [ 608.834718][T18811] ? __wake_up_klogd+0xd5/0x110 [ 608.839946][T18811] ? check_map_prog_compatibility+0x6f1/0x890 [ 609.010005][T18811] ? check_map_prog_compatibility+0x6f1/0x890 [ 609.084502][T18811] resolve_pseudo_ldimm64+0x682/0x1240 [ 609.123744][T18811] ? check_attach_btf_id+0xef0/0xef0 [ 609.252544][T18811] ? __mark_reg_known+0x1b0/0x1b0 [ 609.274603][T18811] ? security_capable+0x87/0xb0 [ 609.279500][T18811] bpf_check+0x3190/0x12c60 [ 609.369244][T18811] ? 0xffffffffa0028000 [ 609.373727][T18811] ? is_bpf_text_address+0x172/0x190 [ 609.444567][T18811] ? stack_trace_save+0x1c0/0x1c0 [ 609.450005][T18811] ? __kernel_text_address+0x9b/0x110 [ 609.466336][T18811] ? unwind_get_return_address+0x4d/0x90 [ 609.471934][T18811] ? bpf_get_btf_vmlinux+0x60/0x60 [ 609.483872][T18811] ? arch_stack_walk+0xf3/0x140 [ 609.489441][T18811] ? stack_trace_save+0x113/0x1c0 [ 609.559523][T18811] ? stack_trace_snprint+0xf0/0xf0 [ 609.565709][T18811] ? stack_trace_snprint+0xf0/0xf0 [ 609.571082][T18811] ? __stack_depot_save+0x34/0x470 [ 609.577513][T18811] ? ____kasan_kmalloc+0xed/0x110 [ 609.582713][T18811] ? ____kasan_kmalloc+0xdb/0x110 [ 609.588526][T18811] ? __kasan_kmalloc+0x9/0x10 [ 609.593324][T18811] ? kmem_cache_alloc_trace+0x11a/0x270 [ 609.614634][T18811] ? selinux_bpf_prog_alloc+0x51/0x140 [ 609.620067][T18811] ? security_bpf_prog_alloc+0x62/0x90 [ 609.634724][T18811] ? bpf_prog_load+0x9ee/0x1b50 [ 609.639648][T18811] ? __sys_bpf+0x4bc/0x760 [ 609.644019][T18811] ? __x64_sys_bpf+0x7c/0x90 [ 609.664624][T18811] ? x64_sys_call+0x87f/0x9a0 [ 609.669350][T18811] ? do_syscall_64+0x3b/0xb0 [ 609.743184][T18811] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 609.753397][T18811] ? __kasan_kmalloc+0x9/0x10 [ 609.763566][T18811] ? memset+0x35/0x40 [ 609.773777][T18811] ? bpf_obj_name_cpy+0x196/0x1e0 [ 609.784029][T18811] bpf_prog_load+0x12ac/0x1b50 [ 609.791718][T18811] ? map_freeze+0x370/0x370 [ 609.806663][T18811] ? selinux_bpf+0xcb/0x100 [ 609.824949][T18811] ? security_bpf+0x82/0xb0 [ 609.836107][T18811] __sys_bpf+0x4bc/0x760 [ 609.844642][T18811] ? bpf_link_show_fdinfo+0x300/0x300 [ 609.870619][T18811] ? __kasan_check_write+0x14/0x20 [ 609.880724][T18811] ? switch_fpu_return+0x15f/0x2e0 [ 609.894628][T18811] __x64_sys_bpf+0x7c/0x90 [ 609.933414][T18811] x64_sys_call+0x87f/0x9a0 [ 609.953777][T18811] do_syscall_64+0x3b/0xb0 [ 609.964796][T18811] ? clear_bhb_loop+0x35/0x90 [ 610.033148][T18811] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 610.062820][T18811] RIP: 0033:0x7f155f424169 [ 610.090397][T18811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 610.175372][T18811] RSP: 002b:00007f155da8e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 610.183949][T18811] RAX: ffffffffffffffda RBX: 00007f155f63cfa0 RCX: 00007f155f424169 [ 610.192955][T18811] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 610.201345][T18811] RBP: 00007f155f4a52a0 R08: 0000000000000000 R09: 0000000000000000 [ 610.211792][T18811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 610.221275][T18857] device ip6gretap0 entered promiscuous mode [ 610.234497][T18811] R13: 0000000000000000 R14: 00007f155f63cfa0 R15: 00007fff82ddbec8 [ 610.242490][T18811] [ 610.254517][T18811] ---[ end trace 433fdf4020981837 ]--- [ 611.175452][T18875] FAULT_INJECTION: forcing a failure. [ 611.175452][T18875] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 611.278532][T18875] CPU: 0 PID: 18875 Comm: syz.1.6846 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 611.289917][T18875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 611.299805][T18875] Call Trace: [ 611.302923][T18875] [ 611.305705][T18875] dump_stack_lvl+0x151/0x1c0 [ 611.310275][T18875] ? io_uring_drop_tctx_refs+0x190/0x190 [ 611.315686][T18875] ? __kasan_check_write+0x14/0x20 [ 611.320634][T18875] dump_stack+0x15/0x20 [ 611.324629][T18875] should_fail+0x3c6/0x510 [ 611.328884][T18875] should_fail_usercopy+0x1a/0x20 [ 611.333744][T18875] _copy_from_user+0x20/0xd0 [ 611.338176][T18875] sock_do_ioctl+0x229/0x5a0 [ 611.342595][T18875] ? sock_show_fdinfo+0xa0/0xa0 [ 611.347284][T18875] ? selinux_file_ioctl+0x3cc/0x540 [ 611.352310][T18875] sock_ioctl+0x455/0x740 [ 611.356482][T18875] ? sock_poll+0x400/0x400 [ 611.360742][T18875] ? __fget_files+0x31e/0x380 [ 611.365249][T18875] ? security_file_ioctl+0x84/0xb0 [ 611.370203][T18875] ? sock_poll+0x400/0x400 [ 611.374446][T18875] __se_sys_ioctl+0x114/0x190 [ 611.378957][T18875] __x64_sys_ioctl+0x7b/0x90 [ 611.383387][T18875] x64_sys_call+0x98/0x9a0 [ 611.387638][T18875] do_syscall_64+0x3b/0xb0 [ 611.391891][T18875] ? clear_bhb_loop+0x35/0x90 [ 611.396401][T18875] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 611.402130][T18875] RIP: 0033:0x7f155f424169 [ 611.406386][T18875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 611.426268][T18875] RSP: 002b:00007f155da8e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 611.434619][T18875] RAX: ffffffffffffffda RBX: 00007f155f63cfa0 RCX: 00007f155f424169 [ 611.442413][T18875] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 611.450233][T18875] RBP: 00007f155da8e090 R08: 0000000000000000 R09: 0000000000000000 [ 611.458045][T18875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 611.465857][T18875] R13: 0000000000000000 R14: 00007f155f63cfa0 R15: 00007fff82ddbec8 [ 611.473680][T18875] [ 612.048496][T18888] device ip6gretap0 entered promiscuous mode [ 613.583589][T18939] FAULT_INJECTION: forcing a failure. [ 613.583589][T18939] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 613.678685][T18939] CPU: 1 PID: 18939 Comm: syz.1.6864 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 613.690669][T18939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 613.700561][T18939] Call Trace: [ 613.703781][T18939] [ 613.706570][T18939] dump_stack_lvl+0x151/0x1c0 [ 613.711227][T18939] ? io_uring_drop_tctx_refs+0x190/0x190 [ 613.716777][T18939] dump_stack+0x15/0x20 [ 613.720761][T18939] should_fail+0x3c6/0x510 [ 613.725017][T18939] should_fail_alloc_page+0x5a/0x80 [ 613.730055][T18939] prepare_alloc_pages+0x15c/0x700 [ 613.735007][T18939] ? __alloc_pages+0x8f0/0x8f0 [ 613.739596][T18939] ? __alloc_pages_bulk+0xd80/0xd80 [ 613.744636][T18939] __alloc_pages+0x18c/0x8f0 [ 613.749053][T18939] ? prep_new_page+0x110/0x110 [ 613.753649][T18939] ? __kasan_kmalloc+0x9/0x10 [ 613.758176][T18939] ? __kmalloc_track_caller+0x13e/0x2c0 [ 613.763548][T18939] ? __kasan_check_write+0x14/0x20 [ 613.768497][T18939] ? __alloc_skb+0x355/0x550 [ 613.772923][T18939] alloc_skb_with_frags+0x1fe/0x680 [ 613.777975][T18939] sock_alloc_send_pskb+0x915/0xa50 [ 613.783003][T18939] ? sock_kzfree_s+0x60/0x60 [ 613.787428][T18939] ? stack_trace_save+0x113/0x1c0 [ 613.792300][T18939] ? iov_iter_advance+0x213/0x390 [ 613.797155][T18939] tun_get_user+0xf1b/0x3aa0 [ 613.801570][T18939] ? putname+0xfa/0x150 [ 613.805555][T18939] ? __x64_sys_openat+0x1b0/0x290 [ 613.810419][T18939] ? x64_sys_call+0x6bf/0x9a0 [ 613.814944][T18939] ? _kstrtoull+0x3a0/0x4a0 [ 613.819271][T18939] ? tun_do_read+0x2010/0x2010 [ 613.823865][T18939] ? kstrtouint_from_user+0x20a/0x2a0 [ 613.829080][T18939] ? kstrtol_from_user+0x310/0x310 [ 613.834028][T18939] ? avc_policy_seqno+0x1b/0x70 [ 613.838711][T18939] ? selinux_file_permission+0x2c4/0x570 [ 613.844176][T18939] tun_chr_write_iter+0x1e1/0x2e0 [ 613.849038][T18939] vfs_write+0xd5d/0x1110 [ 613.853222][T18939] ? file_end_write+0x1c0/0x1c0 [ 613.857899][T18939] ? __fdget_pos+0x209/0x3a0 [ 613.862317][T18939] ? ksys_write+0x77/0x2c0 [ 613.866575][T18939] ksys_write+0x199/0x2c0 [ 613.870747][T18939] ? exc_page_fault+0x47a/0x7f0 [ 613.875425][T18939] ? __ia32_sys_read+0x90/0x90 [ 613.880029][T18939] ? debug_smp_processor_id+0x17/0x20 [ 613.885236][T18939] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 613.891131][T18939] __x64_sys_write+0x7b/0x90 [ 613.895557][T18939] x64_sys_call+0x2f/0x9a0 [ 613.899940][T18939] do_syscall_64+0x3b/0xb0 [ 613.904177][T18939] ? clear_bhb_loop+0x35/0x90 [ 613.908695][T18939] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 613.914427][T18939] RIP: 0033:0x7f155f424169 [ 613.918681][T18939] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 613.938298][T18939] RSP: 002b:00007f155da6d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 613.946543][T18939] RAX: ffffffffffffffda RBX: 00007f155f63d080 RCX: 00007f155f424169 [ 613.954352][T18939] RDX: 000000000000ffdd RSI: 0000200000000240 RDI: 0000000000000004 [ 613.962152][T18939] RBP: 00007f155da6d090 R08: 0000000000000000 R09: 0000000000000000 [ 613.969966][T18939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 613.977866][T18939] R13: 0000000000000001 R14: 00007f155f63d080 R15: 00007fff82ddbec8 [ 613.985691][T18939] [ 614.084796][T18931] device syzkaller0 entered promiscuous mode [ 614.584143][T18964] device syzkaller0 entered promiscuous mode [ 614.787191][T18972] bond_slave_1: mtu less than device minimum [ 614.978067][T18976] FAULT_INJECTION: forcing a failure. [ 614.978067][T18976] name failslab, interval 1, probability 0, space 0, times 0 [ 615.019292][T18976] CPU: 1 PID: 18976 Comm: syz.2.6876 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 615.030595][T18976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 615.040487][T18976] Call Trace: [ 615.043605][T18976] [ 615.046387][T18976] dump_stack_lvl+0x151/0x1c0 [ 615.050902][T18976] ? io_uring_drop_tctx_refs+0x190/0x190 [ 615.056506][T18976] ? x64_sys_call+0x87f/0x9a0 [ 615.061080][T18976] dump_stack+0x15/0x20 [ 615.065090][T18976] should_fail+0x3c6/0x510 [ 615.069319][T18976] __should_failslab+0xa4/0xe0 [ 615.073916][T18976] should_failslab+0x9/0x20 [ 615.078413][T18976] slab_pre_alloc_hook+0x37/0xd0 [ 615.083176][T18976] ? skb_ensure_writable+0x2d0/0x440 [ 615.088295][T18976] __kmalloc_track_caller+0x6c/0x2c0 [ 615.093418][T18976] ? skb_ensure_writable+0x2d0/0x440 [ 615.098540][T18976] ? skb_ensure_writable+0x2d0/0x440 [ 615.103660][T18976] pskb_expand_head+0x113/0x1240 [ 615.108442][T18976] ? __kasan_check_write+0x14/0x20 [ 615.113378][T18976] skb_ensure_writable+0x2d0/0x440 [ 615.118340][T18976] bpf_clone_redirect+0x117/0x390 [ 615.123213][T18976] bpf_prog_6893982b85ceadf7+0x56/0xe68 [ 615.128579][T18976] ? dma_alloc_contiguous+0xc0/0x130 [ 615.133853][T18976] ? __stack_depot_save+0x34/0x470 [ 615.138796][T18976] ? __kasan_slab_alloc+0xc3/0xe0 [ 615.143639][T18976] ? __kasan_slab_alloc+0xb1/0xe0 [ 615.148502][T18976] ? slab_post_alloc_hook+0x53/0x2c0 [ 615.153633][T18976] ? kmem_cache_alloc+0xf5/0x250 [ 615.158406][T18976] ? __build_skb+0x2a/0x300 [ 615.162832][T18976] ? build_skb+0x25/0x1f0 [ 615.167003][T18976] ? bpf_prog_test_run_skb+0x38e/0x1420 [ 615.172485][T18976] ? bpf_prog_test_run+0x3b0/0x630 [ 615.177432][T18976] ? __sys_bpf+0x525/0x760 [ 615.181693][T18976] ? __x64_sys_bpf+0x7c/0x90 [ 615.186105][T18976] ? x64_sys_call+0x87f/0x9a0 [ 615.190625][T18976] ? do_syscall_64+0x3b/0xb0 [ 615.195056][T18976] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 615.201096][T18976] ? __kasan_check_read+0x11/0x20 [ 615.206005][T18976] ? bpf_test_timer_continue+0x140/0x460 [ 615.211530][T18976] bpf_test_run+0x478/0xa10 [ 615.215876][T18976] ? convert___skb_to_skb+0x570/0x570 [ 615.221087][T18976] ? eth_type_trans+0x2e4/0x620 [ 615.225771][T18976] ? eth_get_headlen+0x240/0x240 [ 615.230805][T18976] ? convert___skb_to_skb+0x44/0x570 [ 615.235915][T18976] bpf_prog_test_run_skb+0xb41/0x1420 [ 615.241131][T18976] ? __kasan_check_write+0x14/0x20 [ 615.246073][T18976] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 615.251794][T18976] ? __kasan_check_write+0x14/0x20 [ 615.256843][T18976] ? fput_many+0x160/0x1b0 [ 615.261093][T18976] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 615.266823][T18976] bpf_prog_test_run+0x3b0/0x630 [ 615.271599][T18976] ? bpf_prog_query+0x220/0x220 [ 615.276279][T18976] ? selinux_bpf+0xd2/0x100 [ 615.280626][T18976] ? security_bpf+0x82/0xb0 [ 615.285079][T18976] __sys_bpf+0x525/0x760 [ 615.289144][T18976] ? fput_many+0x160/0x1b0 [ 615.293386][T18976] ? bpf_link_show_fdinfo+0x300/0x300 [ 615.298622][T18976] ? debug_smp_processor_id+0x17/0x20 [ 615.303801][T18976] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 615.309742][T18976] __x64_sys_bpf+0x7c/0x90 [ 615.313994][T18976] x64_sys_call+0x87f/0x9a0 [ 615.318292][T18976] do_syscall_64+0x3b/0xb0 [ 615.322538][T18976] ? clear_bhb_loop+0x35/0x90 [ 615.327059][T18976] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 615.332781][T18976] RIP: 0033:0x7f00fecf3169 [ 615.337040][T18976] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 615.356610][T18976] RSP: 002b:00007f00fd35d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 615.364839][T18976] RAX: ffffffffffffffda RBX: 00007f00fef0bfa0 RCX: 00007f00fecf3169 [ 615.372735][T18976] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 615.380548][T18976] RBP: 00007f00fd35d090 R08: 0000000000000000 R09: 0000000000000000 [ 615.388361][T18976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 615.396288][T18976] R13: 0000000000000000 R14: 00007f00fef0bfa0 R15: 00007ffe3d47e9a8 [ 615.404118][T18976] [ 615.495081][T18989] FAULT_INJECTION: forcing a failure. [ 615.495081][T18989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 615.557919][T18989] CPU: 0 PID: 18989 Comm: syz.1.6879 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 615.569562][T18989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 615.579454][T18989] Call Trace: [ 615.582568][T18989] [ 615.585571][T18989] dump_stack_lvl+0x151/0x1c0 [ 615.590111][T18989] ? io_uring_drop_tctx_refs+0x190/0x190 [ 615.595574][T18989] ? vsnprintf+0x1dd/0x1c70 [ 615.599913][T18989] dump_stack+0x15/0x20 [ 615.603905][T18989] should_fail+0x3c6/0x510 [ 615.608159][T18989] should_fail_usercopy+0x1a/0x20 [ 615.613022][T18989] _copy_from_user+0x20/0xd0 [ 615.617455][T18989] kstrtouint_from_user+0xca/0x2a0 [ 615.622392][T18989] ? kstrtol_from_user+0x310/0x310 [ 615.627339][T18989] ? snprintf+0xd6/0x120 [ 615.631427][T18989] ? check_stack_object+0x114/0x130 [ 615.636455][T18989] ? __kasan_check_read+0x11/0x20 [ 615.641309][T18989] ? _copy_to_user+0x78/0x90 [ 615.645745][T18989] proc_fail_nth_write+0xa6/0x290 [ 615.650599][T18989] ? selinux_file_permission+0x2c4/0x570 [ 615.656075][T18989] ? proc_fail_nth_read+0x210/0x210 [ 615.661145][T18989] ? fsnotify_perm+0x6a/0x5b0 [ 615.665627][T18989] ? security_file_permission+0x86/0xb0 [ 615.670996][T18989] ? proc_fail_nth_read+0x210/0x210 [ 615.676154][T18989] vfs_write+0x406/0x1110 [ 615.680323][T18989] ? file_end_write+0x1c0/0x1c0 [ 615.685166][T18989] ? __kasan_check_write+0x14/0x20 [ 615.690218][T18989] ? mutex_lock+0xb6/0x1e0 [ 615.694453][T18989] ? wait_for_completion_killable_timeout+0x10/0x10 [ 615.700872][T18989] ? __fdget_pos+0x2e7/0x3a0 [ 615.705293][T18989] ? ksys_write+0x77/0x2c0 [ 615.709553][T18989] ksys_write+0x199/0x2c0 [ 615.713722][T18989] ? __ia32_sys_read+0x90/0x90 [ 615.718561][T18989] ? debug_smp_processor_id+0x17/0x20 [ 615.723877][T18989] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 615.729914][T18989] __x64_sys_write+0x7b/0x90 [ 615.734322][T18989] x64_sys_call+0x2f/0x9a0 [ 615.738686][T18989] do_syscall_64+0x3b/0xb0 [ 615.743061][T18989] ? clear_bhb_loop+0x35/0x90 [ 615.747561][T18989] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 615.753293][T18989] RIP: 0033:0x7f155f422c1f [ 615.757562][T18989] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 615.776982][T18989] RSP: 002b:00007f155da6d030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 615.785233][T18989] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f155f422c1f [ 615.793043][T18989] RDX: 0000000000000001 RSI: 00007f155da6d0a0 RDI: 0000000000000005 [ 615.800854][T18989] RBP: 00007f155da6d090 R08: 0000000000000000 R09: 0000000000000000 [ 615.808662][T18989] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 615.816466][T18989] R13: 0000000000000001 R14: 00007f155f63d080 R15: 00007fff82ddbec8 [ 615.824315][T18989] [ 616.363231][T19012] syz.0.6888[19012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.363467][T19012] syz.0.6888[19012] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 616.491289][T19011] device syzkaller0 entered promiscuous mode [ 617.054010][T19036] device veth0_vlan left promiscuous mode [ 617.092786][T19036] device veth0_vlan entered promiscuous mode [ 617.276020][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 617.305819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 617.324921][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 619.584142][T19085] device pim6reg1 entered promiscuous mode [ 623.771118][T19172] bond_slave_1: mtu less than device minimum [ 624.200453][T19177] device pim6reg1 entered promiscuous mode [ 627.665998][T19261] device sit0 entered promiscuous mode [ 628.326633][T19283] bond_slave_1: mtu less than device minimum [ 630.405825][T19317] device pim6reg1 entered promiscuous mode [ 633.099155][T19377] bond_slave_1: mtu less than device minimum [ 634.260730][T19415] bond_slave_1: mtu less than device minimum [ 634.308670][T19423] FAULT_INJECTION: forcing a failure. [ 634.308670][T19423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 634.406041][T19423] CPU: 0 PID: 19423 Comm: syz.0.7013 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 634.417474][T19423] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 634.427515][T19423] Call Trace: [ 634.430749][T19423] [ 634.433511][T19423] dump_stack_lvl+0x151/0x1c0 [ 634.438018][T19423] ? io_uring_drop_tctx_refs+0x190/0x190 [ 634.443496][T19423] dump_stack+0x15/0x20 [ 634.447476][T19423] should_fail+0x3c6/0x510 [ 634.451742][T19423] should_fail_alloc_page+0x5a/0x80 [ 634.456775][T19423] prepare_alloc_pages+0x15c/0x700 [ 634.461713][T19423] ? __alloc_pages+0x8f0/0x8f0 [ 634.466827][T19423] ? __alloc_pages_bulk+0xd80/0xd80 [ 634.472116][T19423] __alloc_pages+0x18c/0x8f0 [ 634.476633][T19423] ? prep_new_page+0x110/0x110 [ 634.481228][T19423] ? __kasan_kmalloc+0x9/0x10 [ 634.485914][T19423] ? __kmalloc_track_caller+0x13e/0x2c0 [ 634.491388][T19423] ? __kasan_check_write+0x14/0x20 [ 634.496335][T19423] ? __alloc_skb+0x355/0x550 [ 634.500849][T19423] alloc_skb_with_frags+0x1fe/0x680 [ 634.505880][T19423] sock_alloc_send_pskb+0x915/0xa50 [ 634.511176][T19423] ? sock_kzfree_s+0x60/0x60 [ 634.515725][T19423] ? stack_trace_save+0x113/0x1c0 [ 634.520582][T19423] ? iov_iter_advance+0x213/0x390 [ 634.525598][T19423] tun_get_user+0xf1b/0x3aa0 [ 634.530010][T19423] ? putname+0xfa/0x150 [ 634.534003][T19423] ? __x64_sys_openat+0x1b0/0x290 [ 634.538852][T19423] ? x64_sys_call+0x6bf/0x9a0 [ 634.543408][T19423] ? _kstrtoull+0x3a0/0x4a0 [ 634.547715][T19423] ? tun_do_read+0x2010/0x2010 [ 634.552309][T19423] ? kstrtouint_from_user+0x20a/0x2a0 [ 634.557869][T19423] ? kstrtol_from_user+0x310/0x310 [ 634.562824][T19423] ? avc_policy_seqno+0x1b/0x70 [ 634.567505][T19423] ? selinux_file_permission+0x2c4/0x570 [ 634.572969][T19423] tun_chr_write_iter+0x1e1/0x2e0 [ 634.577919][T19423] vfs_write+0xd5d/0x1110 [ 634.582178][T19423] ? file_end_write+0x1c0/0x1c0 [ 634.586861][T19423] ? __fdget_pos+0x209/0x3a0 [ 634.591404][T19423] ? ksys_write+0x77/0x2c0 [ 634.595661][T19423] ksys_write+0x199/0x2c0 [ 634.599942][T19423] ? __ia32_sys_read+0x90/0x90 [ 634.604534][T19423] ? debug_smp_processor_id+0x17/0x20 [ 634.609874][T19423] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 634.615864][T19423] __x64_sys_write+0x7b/0x90 [ 634.620285][T19423] x64_sys_call+0x2f/0x9a0 [ 634.624539][T19423] do_syscall_64+0x3b/0xb0 [ 634.628878][T19423] ? clear_bhb_loop+0x35/0x90 [ 634.633650][T19423] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 634.639387][T19423] RIP: 0033:0x7f5303c26169 [ 634.643637][T19423] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 634.664054][T19423] RSP: 002b:00007f5302290038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 634.672443][T19423] RAX: ffffffffffffffda RBX: 00007f5303e3efa0 RCX: 00007f5303c26169 [ 634.680385][T19423] RDX: 000000000000ffdd RSI: 00002000000002c0 RDI: 0000000000000006 [ 634.688201][T19423] RBP: 00007f5302290090 R08: 0000000000000000 R09: 0000000000000000 [ 634.696420][T19423] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 634.704381][T19423] R13: 0000000000000000 R14: 00007f5303e3efa0 R15: 00007ffe211f28b8 [ 634.712306][T19423] [ 635.228514][T19445] bond_slave_1: mtu less than device minimum [ 636.016718][T19471] FAULT_INJECTION: forcing a failure. [ 636.016718][T19471] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 636.064942][T19471] CPU: 0 PID: 19471 Comm: syz.2.7029 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 636.076198][T19471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 636.086092][T19471] Call Trace: [ 636.089216][T19471] [ 636.091994][T19471] dump_stack_lvl+0x151/0x1c0 [ 636.096509][T19471] ? io_uring_drop_tctx_refs+0x190/0x190 [ 636.101978][T19471] dump_stack+0x15/0x20 [ 636.105972][T19471] should_fail+0x3c6/0x510 [ 636.110216][T19471] should_fail_usercopy+0x1a/0x20 [ 636.115081][T19471] copy_fpstate_to_sigframe+0x708/0x9a0 [ 636.120466][T19471] ? fpregs_set+0x6f0/0x6f0 [ 636.124812][T19471] ? bpf_trace_run3+0x123/0x250 [ 636.129489][T19471] ? bpf_trace_run2+0x210/0x210 [ 636.134180][T19471] ? fpu__alloc_mathframe+0x89/0x150 [ 636.139295][T19471] get_sigframe+0x378/0x4b0 [ 636.143635][T19471] ? memcpy+0x56/0x70 [ 636.147453][T19471] ? restore_sigcontext+0x710/0x710 [ 636.152494][T19471] arch_do_signal_or_restart+0x2ad/0x1680 [ 636.158049][T19471] ? __send_signal+0x96f/0xcb0 [ 636.162655][T19471] ? get_sigframe_size+0x10/0x10 [ 636.167413][T19471] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 636.173052][T19471] ? force_sig_info_to_task+0x31c/0x440 [ 636.178441][T19471] ? force_sig+0x114/0x1d0 [ 636.182689][T19471] ? send_sig+0x60/0x60 [ 636.186684][T19471] exit_to_user_mode_loop+0xa0/0xe0 [ 636.191811][T19471] exit_to_user_mode_prepare+0x5a/0xa0 [ 636.197100][T19471] irqentry_exit_to_user_mode+0x9/0x10 [ 636.202394][T19471] irqentry_exit+0x12/0x40 [ 636.206643][T19471] exc_general_protection+0x327/0x4b0 [ 636.211853][T19471] ? __ia32_sys_read+0x90/0x90 [ 636.216454][T19471] ? debug_smp_processor_id+0x17/0x20 [ 636.221663][T19471] ? syscall_exit_to_user_mode+0x2b/0x160 [ 636.227221][T19471] asm_exc_general_protection+0x27/0x30 [ 636.232593][T19471] RIP: 0033:0x7f00feccbcb9 [ 636.236850][T19471] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 636.256298][T19471] RSP: 002b:00007f00fd35c7c8 EFLAGS: 00010283 [ 636.262190][T19471] RAX: 0000000000000999 RBX: 00007f00fd35cd30 RCX: 00007f00feed3120 [ 636.270005][T19471] RDX: 9999999999999999 RSI: 00007f00fed73fac RDI: 9999999999999999 [ 636.277812][T19471] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 636.285626][T19471] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 636.293527][T19471] R13: 00007f00fd35ceb0 R14: 9999999999999999 R15: 0000000000000000 [ 636.301344][T19471] [ 637.473938][T19493] device syzkaller0 entered promiscuous mode [ 639.941256][T19550] FAULT_INJECTION: forcing a failure. [ 639.941256][T19550] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 640.025839][T19550] CPU: 0 PID: 19550 Comm: syz.4.7051 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 640.037187][T19550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 640.047076][T19550] Call Trace: [ 640.050202][T19550] [ 640.052977][T19550] dump_stack_lvl+0x151/0x1c0 [ 640.057729][T19550] ? io_uring_drop_tctx_refs+0x190/0x190 [ 640.063866][T19550] dump_stack+0x15/0x20 [ 640.067943][T19550] should_fail+0x3c6/0x510 [ 640.072192][T19550] should_fail_usercopy+0x1a/0x20 [ 640.077240][T19550] copy_page_from_iter+0x2eb/0x640 [ 640.082317][T19550] pipe_write+0x92b/0x1930 [ 640.086681][T19550] ? pipe_read+0x1040/0x1040 [ 640.091098][T19550] ? selinux_file_permission+0x450/0x570 [ 640.096700][T19550] ? fsnotify_perm+0x6a/0x5b0 [ 640.101198][T19550] ? iov_iter_init+0x53/0x190 [ 640.106009][T19550] vfs_write+0xd5d/0x1110 [ 640.110395][T19550] ? file_end_write+0x1c0/0x1c0 [ 640.115077][T19550] ? __fdget_pos+0x209/0x3a0 [ 640.119496][T19550] ? ksys_write+0x77/0x2c0 [ 640.124207][T19550] ksys_write+0x199/0x2c0 [ 640.128385][T19550] ? __ia32_sys_read+0x90/0x90 [ 640.132970][T19550] ? debug_smp_processor_id+0x17/0x20 [ 640.138178][T19550] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 640.144092][T19550] __x64_sys_write+0x7b/0x90 [ 640.148507][T19550] x64_sys_call+0x2f/0x9a0 [ 640.152751][T19550] do_syscall_64+0x3b/0xb0 [ 640.157011][T19550] ? clear_bhb_loop+0x35/0x90 [ 640.161527][T19550] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 640.167259][T19550] RIP: 0033:0x7f4a2d4c6169 [ 640.171592][T19550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 640.191345][T19550] RSP: 002b:00007f4a2bb0f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 640.199591][T19550] RAX: ffffffffffffffda RBX: 00007f4a2d6df080 RCX: 00007f4a2d4c6169 [ 640.207405][T19550] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 640.215221][T19550] RBP: 00007f4a2bb0f090 R08: 0000000000000000 R09: 0000000000000000 [ 640.223026][T19550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 640.230829][T19550] R13: 0000000000000000 R14: 00007f4a2d6df080 R15: 00007ffdd3e6df28 [ 640.238668][T19550] [ 640.870759][T19568] bond_slave_1: mtu less than device minimum [ 644.564533][T19652] device pim6reg1 entered promiscuous mode [ 645.771986][T19698] syz.4.7099[19698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.772105][T19698] syz.4.7099[19698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.833425][T19705] device sit0 left promiscuous mode [ 645.894419][T19693] bond_slave_1: mtu less than device minimum [ 648.676848][T19769] bond_slave_1: mtu less than device minimum [ 650.455893][T19798] device syzkaller0 entered promiscuous mode [ 651.120359][T19817] bond_slave_1: mtu less than device minimum [ 655.920171][T19892] device pim6reg1 entered promiscuous mode [ 656.064713][T19894] bond_slave_1: mtu less than device minimum [ 657.023707][T19927] bond_slave_1: mtu less than device minimum [ 658.635687][T19983] ªªªªªª: renamed from vlan0 [ 658.729663][T19987] device syzkaller0 entered promiscuous mode [ 659.049753][T19996] bond_slave_1: mtu less than device minimum [ 659.534478][T20015] bond_slave_1: mtu less than device minimum [ 659.948864][T20028] FAULT_INJECTION: forcing a failure. [ 659.948864][T20028] name failslab, interval 1, probability 0, space 0, times 0 [ 660.187728][T20028] CPU: 0 PID: 20028 Comm: syz.1.7203 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 660.199025][T20028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 660.209015][T20028] Call Trace: [ 660.212137][T20028] [ 660.214900][T20028] dump_stack_lvl+0x151/0x1c0 [ 660.219419][T20028] ? io_uring_drop_tctx_refs+0x190/0x190 [ 660.224890][T20028] ? kstrtouint_from_user+0x20a/0x2a0 [ 660.230102][T20028] dump_stack+0x15/0x20 [ 660.234083][T20028] should_fail+0x3c6/0x510 [ 660.238337][T20028] __should_failslab+0xa4/0xe0 [ 660.242944][T20028] should_failslab+0x9/0x20 [ 660.247278][T20028] slab_pre_alloc_hook+0x37/0xd0 [ 660.252066][T20028] __kmalloc+0x6d/0x2c0 [ 660.256046][T20028] ? kernfs_fop_write_iter+0x151/0x410 [ 660.261337][T20028] kernfs_fop_write_iter+0x151/0x410 [ 660.266548][T20028] vfs_write+0xd5d/0x1110 [ 660.270715][T20028] ? file_end_write+0x1c0/0x1c0 [ 660.275401][T20028] ? mutex_lock+0xb6/0x1e0 [ 660.279651][T20028] ? wait_for_completion_killable_timeout+0x10/0x10 [ 660.286077][T20028] ? __fdget_pos+0x2e7/0x3a0 [ 660.290496][T20028] ? ksys_write+0x77/0x2c0 [ 660.294755][T20028] ksys_write+0x199/0x2c0 [ 660.298922][T20028] ? __ia32_sys_read+0x90/0x90 [ 660.303520][T20028] ? debug_smp_processor_id+0x17/0x20 [ 660.308731][T20028] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 660.315061][T20028] __x64_sys_write+0x7b/0x90 [ 660.319490][T20028] x64_sys_call+0x2f/0x9a0 [ 660.323741][T20028] do_syscall_64+0x3b/0xb0 [ 660.327994][T20028] ? clear_bhb_loop+0x35/0x90 [ 660.332507][T20028] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 660.338238][T20028] RIP: 0033:0x7f155f424169 [ 660.342484][T20028] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 660.361944][T20028] RSP: 002b:00007f155da8e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 660.370174][T20028] RAX: ffffffffffffffda RBX: 00007f155f63cfa0 RCX: 00007f155f424169 [ 660.377984][T20028] RDX: 000000000000003e RSI: 0000200000000080 RDI: 0000000000000004 [ 660.385799][T20028] RBP: 00007f155da8e090 R08: 0000000000000000 R09: 0000000000000000 [ 660.393713][T20028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 660.401523][T20028] R13: 0000000000000000 R14: 00007f155f63cfa0 R15: 00007fff82ddbec8 [ 660.409351][T20028] [ 661.759199][T20057] ªªªªªª: renamed from vlan0 [ 662.375392][T20079] FAULT_INJECTION: forcing a failure. [ 662.375392][T20079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 662.407687][T20079] CPU: 1 PID: 20079 Comm: syz.0.7221 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 662.413629][T20082] device syzkaller0 entered promiscuous mode [ 662.418963][T20079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 662.418989][T20079] Call Trace: [ 662.418998][T20079] [ 662.419012][T20079] dump_stack_lvl+0x151/0x1c0 [ 662.419053][T20079] ? io_uring_drop_tctx_refs+0x190/0x190 [ 662.419081][T20079] ? kstrtouint_from_user+0x20a/0x2a0 [ 662.456134][T20079] dump_stack+0x15/0x20 [ 662.460115][T20079] should_fail+0x3c6/0x510 [ 662.464363][T20079] should_fail_usercopy+0x1a/0x20 [ 662.469220][T20079] _copy_to_user+0x20/0x90 [ 662.473510][T20079] simple_read_from_buffer+0xc7/0x150 [ 662.478879][T20079] proc_fail_nth_read+0x1a3/0x210 [ 662.483712][T20079] ? proc_fault_inject_write+0x390/0x390 [ 662.489306][T20079] ? fsnotify_perm+0x269/0x5b0 [ 662.493906][T20079] ? security_file_permission+0x86/0xb0 [ 662.499511][T20079] ? proc_fault_inject_write+0x390/0x390 [ 662.504975][T20079] vfs_read+0x27d/0xd40 [ 662.508967][T20079] ? kernel_read+0x1f0/0x1f0 [ 662.513389][T20079] ? __kasan_check_write+0x14/0x20 [ 662.518338][T20079] ? mutex_lock+0xb6/0x1e0 [ 662.522591][T20079] ? wait_for_completion_killable_timeout+0x10/0x10 [ 662.529019][T20079] ? __fdget_pos+0x2e7/0x3a0 [ 662.533441][T20079] ? ksys_read+0x77/0x2c0 [ 662.537608][T20079] ksys_read+0x199/0x2c0 [ 662.541695][T20079] ? vfs_write+0x1110/0x1110 [ 662.546112][T20079] ? debug_smp_processor_id+0x17/0x20 [ 662.551338][T20079] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 662.557353][T20079] __x64_sys_read+0x7b/0x90 [ 662.561682][T20079] x64_sys_call+0x28/0x9a0 [ 662.565929][T20079] do_syscall_64+0x3b/0xb0 [ 662.570174][T20079] ? clear_bhb_loop+0x35/0x90 [ 662.574684][T20079] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 662.580430][T20079] RIP: 0033:0x7f5303c24b7c [ 662.584673][T20079] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 662.604119][T20079] RSP: 002b:00007f5302290030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 662.612357][T20079] RAX: ffffffffffffffda RBX: 00007f5303e3efa0 RCX: 00007f5303c24b7c [ 662.620330][T20079] RDX: 000000000000000f RSI: 00007f53022900a0 RDI: 0000000000000004 [ 662.628136][T20079] RBP: 00007f5302290090 R08: 0000000000000000 R09: 0000000000000000 [ 662.635951][T20079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 662.643791][T20079] R13: 0000000000000000 R14: 00007f5303e3efa0 R15: 00007ffe211f28b8 [ 662.651594][T20079] [ 663.255335][T20098] bond_slave_1: mtu less than device minimum [ 663.657058][T20113] device pim6reg1 entered promiscuous mode [ 663.972036][T20123] FAULT_INJECTION: forcing a failure. [ 663.972036][T20123] name failslab, interval 1, probability 0, space 0, times 0 [ 664.046803][T20123] CPU: 1 PID: 20123 Comm: syz.0.7233 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 664.058078][T20123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 664.067976][T20123] Call Trace: [ 664.071086][T20123] [ 664.073868][T20123] dump_stack_lvl+0x151/0x1c0 [ 664.078437][T20123] ? io_uring_drop_tctx_refs+0x190/0x190 [ 664.084643][T20123] dump_stack+0x15/0x20 [ 664.088621][T20123] should_fail+0x3c6/0x510 [ 664.092879][T20123] __should_failslab+0xa4/0xe0 [ 664.097483][T20123] ? perf_event_alloc+0x122/0x1b00 [ 664.102423][T20123] should_failslab+0x9/0x20 [ 664.106763][T20123] slab_pre_alloc_hook+0x37/0xd0 [ 664.111533][T20123] ? perf_event_alloc+0x122/0x1b00 [ 664.116499][T20123] kmem_cache_alloc+0x44/0x250 [ 664.121097][T20123] perf_event_alloc+0x122/0x1b00 [ 664.125858][T20123] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 664.131496][T20123] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 664.137494][T20123] __se_sys_perf_event_open+0xb27/0x3ce0 [ 664.143145][T20123] ? clockevents_program_event+0x22f/0x300 [ 664.148773][T20123] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 664.154256][T20123] ? sched_clock_cpu+0x18/0x3b0 [ 664.158935][T20123] __x64_sys_perf_event_open+0xbf/0xd0 [ 664.164225][T20123] x64_sys_call+0x7de/0x9a0 [ 664.168658][T20123] do_syscall_64+0x3b/0xb0 [ 664.172917][T20123] ? clear_bhb_loop+0x35/0x90 [ 664.177535][T20123] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 664.183267][T20123] RIP: 0033:0x7f5303c26169 [ 664.187518][T20123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 664.206965][T20123] RSP: 002b:00007f5302290038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 664.215203][T20123] RAX: ffffffffffffffda RBX: 00007f5303e3efa0 RCX: 00007f5303c26169 [ 664.223015][T20123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 664.230829][T20123] RBP: 00007f5302290090 R08: 0000000000000000 R09: 0000000000000000 [ 664.238642][T20123] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 664.246452][T20123] R13: 0000000000000000 R14: 00007f5303e3efa0 R15: 00007ffe211f28b8 [ 664.254272][T20123] [ 664.484128][T20121] bond_slave_1: mtu less than device minimum [ 667.945387][T20186] ÿÿÿÿÿÿ: renamed from vlan1 [ 669.130434][T20207] device syzkaller0 entered promiscuous mode [ 670.384416][T20256] ªªªªªª: renamed from vlan0 [ 671.206365][T20268] ÿÿÿÿÿÿ: renamed from vlan1 [ 672.747414][T20336] ªªªªªª: renamed from vlan0 [ 675.282761][T20357] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.300025][T20357] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.315055][T20357] device bridge_slave_0 entered promiscuous mode [ 675.383737][T20357] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.390837][T20357] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.399046][T20357] device bridge_slave_1 entered promiscuous mode [ 676.745439][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 676.765074][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 676.846865][ T311] device veth1_macvtap left promiscuous mode [ 677.362957][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 677.385535][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 677.439146][ T8587] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.446116][ T8587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 677.453531][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 677.473188][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 677.492716][ T8587] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.499738][ T8587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 677.554807][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 677.773318][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 677.796442][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 677.884488][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 677.893442][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 677.963709][T20406] ªªªªªª: renamed from vlan0 [ 678.030695][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 678.052747][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 678.192400][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 678.213594][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.240695][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.266747][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.299213][T20357] device veth0_vlan entered promiscuous mode [ 678.541917][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 678.565143][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 678.577707][T20357] device veth1_macvtap entered promiscuous mode [ 678.606984][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 678.704662][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 678.718049][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 678.762434][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 678.800951][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 679.866955][T20443] ÿÿÿÿÿÿ: renamed from vlan1 [ 680.131584][T20446] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.141088][T20446] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.148857][T20446] device bridge_slave_0 entered promiscuous mode [ 680.173566][T20446] bridge0: port 2(bridge_slave_1) entered blocking state [ 680.227218][T20446] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.237955][T20446] device bridge_slave_1 entered promiscuous mode [ 680.544347][ T311] device bridge_slave_1 left promiscuous mode [ 680.550501][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 680.588706][ T311] device bridge_slave_0 left promiscuous mode [ 680.601826][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 680.627568][ T311] device veth1_macvtap left promiscuous mode [ 680.633562][ T311] device veth0_vlan left promiscuous mode [ 681.496327][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 681.517812][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 681.558130][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 681.590976][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 681.615408][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 681.622415][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 681.780602][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 684.316277][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 684.335571][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 684.364862][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 684.371846][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 684.415638][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 684.446066][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 684.652001][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 684.675225][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 684.714018][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 684.723701][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 684.763013][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 684.771802][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 684.787288][T20446] device veth0_vlan entered promiscuous mode [ 684.812526][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 684.821047][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 684.854821][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 684.863728][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 684.884262][T20446] device veth1_macvtap entered promiscuous mode [ 684.920389][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 684.928711][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 684.944996][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 684.970762][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 684.981295][T20541] FAULT_INJECTION: forcing a failure. [ 684.981295][T20541] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 684.995948][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 685.019338][T20541] CPU: 1 PID: 20541 Comm: syz.0.7369 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 685.030917][T20541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 685.040999][T20541] Call Trace: [ 685.044110][T20541] [ 685.046894][T20541] dump_stack_lvl+0x151/0x1c0 [ 685.051406][T20541] ? io_uring_drop_tctx_refs+0x190/0x190 [ 685.056963][T20541] ? bpf_test_run+0x8de/0xa10 [ 685.061481][T20541] dump_stack+0x15/0x20 [ 685.065468][T20541] should_fail+0x3c6/0x510 [ 685.069727][T20541] should_fail_usercopy+0x1a/0x20 [ 685.074585][T20541] _copy_to_user+0x20/0x90 [ 685.078839][T20541] bpf_test_finish+0x235/0x5a0 [ 685.083453][T20541] ? convert_skb_to___skb+0x360/0x360 [ 685.088647][T20541] ? convert_skb_to___skb+0x208/0x360 [ 685.093848][T20541] bpf_prog_test_run_skb+0xd4d/0x1420 [ 685.099179][T20541] ? __kasan_check_write+0x14/0x20 [ 685.104112][T20541] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 685.110508][T20541] ? __kasan_check_write+0x14/0x20 [ 685.115527][T20541] ? fput_many+0x160/0x1b0 [ 685.119777][T20541] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 685.125504][T20541] bpf_prog_test_run+0x3b0/0x630 [ 685.130370][T20541] ? bpf_prog_query+0x220/0x220 [ 685.135220][T20541] ? selinux_bpf+0xd2/0x100 [ 685.139540][T20541] ? security_bpf+0x82/0xb0 [ 685.144038][T20541] __sys_bpf+0x525/0x760 [ 685.148083][T20541] ? fput_many+0x160/0x1b0 [ 685.152433][T20541] ? bpf_link_show_fdinfo+0x300/0x300 [ 685.157641][T20541] ? debug_smp_processor_id+0x17/0x20 [ 685.162846][T20541] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 685.168748][T20541] __x64_sys_bpf+0x7c/0x90 [ 685.173003][T20541] x64_sys_call+0x87f/0x9a0 [ 685.177335][T20541] do_syscall_64+0x3b/0xb0 [ 685.181592][T20541] ? clear_bhb_loop+0x35/0x90 [ 685.186109][T20541] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 685.192074][T20541] RIP: 0033:0x7f5303c26169 [ 685.196302][T20541] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 685.215758][T20541] RSP: 002b:00007f5302290038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 685.223999][T20541] RAX: ffffffffffffffda RBX: 00007f5303e3efa0 RCX: 00007f5303c26169 [ 685.231808][T20541] RDX: 0000000000000050 RSI: 0000200000000900 RDI: 000000000000000a [ 685.239723][T20541] RBP: 00007f5302290090 R08: 0000000000000000 R09: 0000000000000000 [ 685.247539][T20541] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 685.255517][T20541] R13: 0000000000000000 R14: 00007f5303e3efa0 R15: 00007ffe211f28b8 [ 685.263419][T20541] [ 686.336058][T20564] bridge0: port 1(bridge_slave_0) entered blocking state [ 686.343080][T20564] bridge0: port 1(bridge_slave_0) entered disabled state [ 686.351334][T20564] device bridge_slave_0 entered promiscuous mode [ 686.359467][T20564] bridge0: port 2(bridge_slave_1) entered blocking state [ 686.367269][T20564] bridge0: port 2(bridge_slave_1) entered disabled state [ 686.382723][T20564] device bridge_slave_1 entered promiscuous mode [ 686.985447][ T392] device bridge_slave_1 left promiscuous mode [ 686.991925][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 687.006463][ T392] device bridge_slave_0 left promiscuous mode [ 687.013552][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.023658][ T392] device veth1_macvtap left promiscuous mode [ 687.049457][ T392] device veth0_vlan left promiscuous mode [ 687.551852][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 687.563263][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 687.619070][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 687.645599][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 687.664394][ T8587] bridge0: port 1(bridge_slave_0) entered blocking state [ 687.671348][ T8587] bridge0: port 1(bridge_slave_0) entered forwarding state [ 687.707555][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 687.782374][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 687.809536][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 687.838343][ T8587] bridge0: port 2(bridge_slave_1) entered blocking state [ 687.845319][ T8587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 687.974992][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 687.983551][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 688.005207][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 688.026712][ T8587] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 688.090134][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 688.106039][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 688.590648][T20564] device veth0_vlan entered promiscuous mode [ 688.707088][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 688.716134][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 688.734998][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 688.743665][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 688.785250][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 688.794852][T20640] FAULT_INJECTION: forcing a failure. [ 688.794852][T20640] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 688.803976][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 688.878457][T20564] device veth1_macvtap entered promiscuous mode [ 688.884678][T20640] CPU: 1 PID: 20640 Comm: syz.2.7396 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 688.896188][T20640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 688.906351][T20640] Call Trace: [ 688.909470][T20640] [ 688.912393][T20640] dump_stack_lvl+0x151/0x1c0 [ 688.917369][T20640] ? io_uring_drop_tctx_refs+0x190/0x190 [ 688.922887][T20640] dump_stack+0x15/0x20 [ 688.926838][T20640] should_fail+0x3c6/0x510 [ 688.930326][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 688.931355][T20640] should_fail_usercopy+0x1a/0x20 [ 688.944464][T20640] copy_page_from_iter+0x2eb/0x640 [ 688.949582][T20640] pipe_write+0x92b/0x1930 [ 688.953830][T20640] ? pipe_read+0x1040/0x1040 [ 688.956018][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 688.958240][T20640] ? selinux_file_permission+0x450/0x570 [ 688.971851][T20640] ? fsnotify_perm+0x6a/0x5b0 [ 688.976595][T20640] ? iov_iter_init+0x53/0x190 [ 688.981101][T20640] vfs_write+0xd5d/0x1110 [ 688.985267][T20640] ? file_end_write+0x1c0/0x1c0 [ 688.989952][T20640] ? __fdget_pos+0x209/0x3a0 [ 688.994458][T20640] ? ksys_write+0x77/0x2c0 [ 688.998709][T20640] ksys_write+0x199/0x2c0 [ 689.002881][T20640] ? __ia32_sys_read+0x90/0x90 [ 689.007581][T20640] ? debug_smp_processor_id+0x17/0x20 [ 689.013192][T20640] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 689.019061][T20640] __x64_sys_write+0x7b/0x90 [ 689.023481][T20640] x64_sys_call+0x2f/0x9a0 [ 689.027742][T20640] do_syscall_64+0x3b/0xb0 [ 689.032073][T20640] ? clear_bhb_loop+0x35/0x90 [ 689.036587][T20640] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 689.042662][T20640] RIP: 0033:0x7f00fecf3169 [ 689.046922][T20640] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 689.066799][T20640] RSP: 002b:00007f00fd33c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 689.075037][T20640] RAX: ffffffffffffffda RBX: 00007f00fef0c080 RCX: 00007f00fecf3169 [ 689.082852][T20640] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 689.090661][T20640] RBP: 00007f00fd33c090 R08: 0000000000000000 R09: 0000000000000000 [ 689.098679][T20640] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 689.107408][T20640] R13: 0000000000000000 R14: 00007f00fef0c080 R15: 00007ffe3d47e9a8 [ 689.115222][T20640] [ 689.135247][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 689.145951][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 690.347168][T20658] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.354260][T20658] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.437461][T20658] device bridge_slave_0 entered promiscuous mode [ 690.585636][T20658] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.646802][T20658] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.656966][T20658] device bridge_slave_1 entered promiscuous mode [ 691.778025][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 691.796996][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 691.826963][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 691.865151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 691.914457][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.921340][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.991571][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 692.018392][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 692.031089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 692.060009][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 692.066932][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 692.112140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 692.144759][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 692.157617][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 692.195067][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 692.331649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 692.373825][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 692.424736][T20707] ÿÿÿÿÿÿ: renamed from vlan1 [ 692.525863][T20710] bond_slave_1: mtu less than device minimum [ 692.544720][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 692.556469][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 692.575755][T20658] device veth0_vlan entered promiscuous mode [ 692.586326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 692.635080][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 692.648254][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 692.665241][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 692.710558][T20658] device veth1_macvtap entered promiscuous mode [ 692.727918][ T392] device bridge_slave_1 left promiscuous mode [ 692.733869][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.785005][ T392] device bridge_slave_0 left promiscuous mode [ 692.791105][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.006018][ T392] device veth1_macvtap left promiscuous mode [ 693.012021][ T392] device veth0_vlan left promiscuous mode [ 693.275629][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 693.283354][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 693.311005][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 693.390747][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 693.405382][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 694.953922][T20749] bridge0: port 1(bridge_slave_0) entered blocking state [ 695.062304][T20749] bridge0: port 1(bridge_slave_0) entered disabled state [ 695.097782][T20749] device bridge_slave_0 entered promiscuous mode [ 695.192914][T20749] bridge0: port 2(bridge_slave_1) entered blocking state [ 695.254393][T20749] bridge0: port 2(bridge_slave_1) entered disabled state [ 695.285445][T20749] device bridge_slave_1 entered promiscuous mode [ 695.995476][ T392] device bridge_slave_1 left promiscuous mode [ 696.021798][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.166511][ T392] device bridge_slave_0 left promiscuous mode [ 696.172513][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.195840][ T392] device veth1_macvtap left promiscuous mode [ 696.214961][ T392] device veth0_vlan left promiscuous mode [ 696.648055][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 696.665963][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 696.694922][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 696.732701][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 696.755016][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.762281][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 696.779784][T20780] device veth1_macvtap left promiscuous mode [ 696.865114][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 696.884847][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 696.915609][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 696.936106][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 696.942992][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 696.985851][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 697.013920][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 697.255437][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 697.283473][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 697.328897][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 697.359437][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 697.387977][T20749] device veth0_vlan entered promiscuous mode [ 697.408291][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 697.428788][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 697.482101][T20749] device veth1_macvtap entered promiscuous mode [ 697.978349][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 698.011511][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 698.035089][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 698.084307][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 698.114932][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 698.265854][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 698.294660][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 698.325319][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 698.355440][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 700.145317][T20832] bridge0: port 1(bridge_slave_0) entered blocking state [ 700.152208][T20832] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.194900][T20832] device bridge_slave_0 entered promiscuous mode [ 700.224645][T20832] bridge0: port 2(bridge_slave_1) entered blocking state [ 700.254602][T20832] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.262089][T20832] device bridge_slave_1 entered promiscuous mode [ 700.361780][ T392] device bridge_slave_1 left promiscuous mode [ 700.371282][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 700.384779][ T392] device bridge_slave_0 left promiscuous mode [ 700.390771][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 700.420321][ T392] device veth1_macvtap left promiscuous mode [ 700.444363][ T392] device veth0_vlan left promiscuous mode [ 700.810761][T20856] device bridge0 entered promiscuous mode [ 701.575637][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 701.593959][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 701.656897][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 701.675292][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 701.703381][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 701.710275][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 701.749164][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 701.769715][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 701.794957][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 701.801828][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 701.825114][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 701.885191][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 701.924619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 701.940853][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 701.992008][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 702.722746][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 702.774913][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 702.820445][T20832] device veth0_vlan entered promiscuous mode [ 702.909860][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 702.945194][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 702.979211][T20832] device veth1_macvtap entered promiscuous mode [ 703.004794][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 703.015336][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 703.034221][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 703.065018][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 703.090651][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 703.192022][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 703.217524][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 703.264781][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 703.324656][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 704.285833][ T8] device bridge_slave_1 left promiscuous mode [ 704.291825][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 704.304867][ T8] device bridge_slave_0 left promiscuous mode [ 704.310834][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 704.335656][ T8] device veth1_macvtap left promiscuous mode [ 704.341510][ T8] device veth0_vlan left promiscuous mode [ 704.502024][T20914] device pim6reg1 entered promiscuous mode [ 705.238917][T20925] device veth1_macvtap left promiscuous mode [ 705.602886][T20920] bridge0: port 1(bridge_slave_0) entered blocking state [ 705.612941][T20920] bridge0: port 1(bridge_slave_0) entered disabled state [ 705.629846][T20920] device bridge_slave_0 entered promiscuous mode [ 705.670798][T20920] bridge0: port 2(bridge_slave_1) entered blocking state [ 705.682191][T20920] bridge0: port 2(bridge_slave_1) entered disabled state [ 705.697420][T20920] device bridge_slave_1 entered promiscuous mode [ 705.964520][T20954] device wg2 entered promiscuous mode [ 706.124402][T20920] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.131301][T20920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.138475][T20920] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.145340][T20920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 706.306013][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 706.315767][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 706.400945][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 706.414718][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 706.434746][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 706.469215][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 706.484717][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 706.491586][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 706.513646][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 706.539911][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 706.563072][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 706.570002][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 706.617073][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 706.655583][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 706.664701][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 706.697591][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 706.791821][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 706.830401][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 706.866093][T20920] device veth0_vlan entered promiscuous mode [ 706.901500][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 706.917446][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 706.938757][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 706.965743][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 706.989414][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 707.015427][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 707.044685][T20920] device veth1_macvtap entered promiscuous mode [ 707.062127][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 707.074900][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 707.083290][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 707.120042][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 707.131659][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 707.387117][T20987] bond_slave_1: mtu less than device minimum [ 708.633319][T21013] bond_slave_1: mtu less than device minimum [ 708.688019][ T8] device bridge_slave_1 left promiscuous mode [ 708.699233][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 708.712056][ T8] device bridge_slave_0 left promiscuous mode [ 708.724838][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 708.750035][ T8] device veth1_macvtap left promiscuous mode [ 708.759188][ T8] device veth0_vlan left promiscuous mode [ 709.082737][T21034] bond_slave_1: mtu less than device minimum [ 709.122841][T21014] bridge0: port 1(bridge_slave_0) entered blocking state [ 709.149349][T21014] bridge0: port 1(bridge_slave_0) entered disabled state [ 709.157137][T21014] device bridge_slave_0 entered promiscuous mode [ 709.178200][T21014] bridge0: port 2(bridge_slave_1) entered blocking state [ 709.185632][T21014] bridge0: port 2(bridge_slave_1) entered disabled state [ 709.193015][T21014] device bridge_slave_1 entered promiscuous mode [ 709.900135][T21055] device syzkaller0 entered promiscuous mode [ 709.972097][T21063] FAULT_INJECTION: forcing a failure. [ 709.972097][T21063] name failslab, interval 1, probability 0, space 0, times 0 [ 709.984631][T21063] CPU: 0 PID: 21063 Comm: syz.1.7520 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 709.995845][T21063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 710.005763][T21063] Call Trace: [ 710.008841][T21063] [ 710.011622][T21063] dump_stack_lvl+0x151/0x1c0 [ 710.016136][T21063] ? io_uring_drop_tctx_refs+0x190/0x190 [ 710.021609][T21063] ? __kernel_text_address+0x9b/0x110 [ 710.026813][T21063] ? unwind_get_return_address+0x4d/0x90 [ 710.032278][T21063] dump_stack+0x15/0x20 [ 710.036271][T21063] should_fail+0x3c6/0x510 [ 710.040523][T21063] __should_failslab+0xa4/0xe0 [ 710.045220][T21063] ? __alloc_skb+0xbe/0x550 [ 710.049554][T21063] should_failslab+0x9/0x20 [ 710.053888][T21063] slab_pre_alloc_hook+0x37/0xd0 [ 710.058680][T21063] ? __alloc_skb+0xbe/0x550 [ 710.063002][T21063] kmem_cache_alloc+0x44/0x250 [ 710.067605][T21063] __alloc_skb+0xbe/0x550 [ 710.071768][T21063] tipc_buf_acquire+0x2b/0xe0 [ 710.076280][T21063] tipc_msg_build+0x68a/0x1230 [ 710.080887][T21063] ? new_inode+0x28/0x1c0 [ 710.085051][T21063] ? __kasan_check_write+0x14/0x20 [ 710.089993][T21063] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 710.095037][T21063] ? tipc_msg_fragment+0x760/0x760 [ 710.099978][T21063] ? tipc_nametbl_lookup_mcast_nodes+0x424/0xa10 [ 710.106142][T21063] __tipc_sendmsg+0x2203/0x3240 [ 710.110837][T21063] ? avc_has_perm_noaudit+0x2dd/0x430 [ 710.116037][T21063] ? local_bh_enable+0x30/0x30 [ 710.120635][T21063] ? wait_woken+0x170/0x170 [ 710.124973][T21063] ? avc_has_perm+0x16f/0x260 [ 710.129485][T21063] ? stack_trace_save+0x1c0/0x1c0 [ 710.134348][T21063] ? avc_has_perm_noaudit+0x430/0x430 [ 710.139578][T21063] ? __kasan_check_write+0x14/0x20 [ 710.144498][T21063] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 710.149360][T21063] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 710.154394][T21063] ? __local_bh_enable_ip+0x58/0x80 [ 710.159435][T21063] ? lock_sock_nested+0x266/0x300 [ 710.164294][T21063] ? sock_init_data+0xc0/0xc0 [ 710.168803][T21063] ? kmem_cache_free+0x115/0x330 [ 710.173576][T21063] ? check_stack_object+0x114/0x130 [ 710.178610][T21063] tipc_sendmsg+0x55/0x70 [ 710.182775][T21063] ? tipc_recvmsg+0x13b0/0x13b0 [ 710.187460][T21063] ____sys_sendmsg+0x59e/0x8f0 [ 710.192065][T21063] ? __sys_sendmsg_sock+0x40/0x40 [ 710.196924][T21063] ? import_iovec+0xe5/0x120 [ 710.201353][T21063] ___sys_sendmsg+0x252/0x2e0 [ 710.205865][T21063] ? __sys_sendmsg+0x260/0x260 [ 710.210466][T21063] ? putname+0xfa/0x150 [ 710.214474][T21063] ? __fdget+0x1bc/0x240 [ 710.218532][T21063] __se_sys_sendmsg+0x19a/0x260 [ 710.223220][T21063] ? __x64_sys_sendmsg+0x90/0x90 [ 710.227990][T21063] ? ksys_write+0x260/0x2c0 [ 710.232344][T21063] ? debug_smp_processor_id+0x17/0x20 [ 710.237539][T21063] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 710.243455][T21063] __x64_sys_sendmsg+0x7b/0x90 [ 710.248046][T21063] x64_sys_call+0x16a/0x9a0 [ 710.252382][T21063] do_syscall_64+0x3b/0xb0 [ 710.256784][T21063] ? clear_bhb_loop+0x35/0x90 [ 710.261281][T21063] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 710.267007][T21063] RIP: 0033:0x7f155f424169 [ 710.271261][T21063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 710.290700][T21063] RSP: 002b:00007f155da8e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 710.298948][T21063] RAX: ffffffffffffffda RBX: 00007f155f63cfa0 RCX: 00007f155f424169 [ 710.306766][T21063] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000009 [ 710.314569][T21063] RBP: 00007f155da8e090 R08: 0000000000000000 R09: 0000000000000000 [ 710.322381][T21063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 710.330192][T21063] R13: 0000000000000000 R14: 00007f155f63cfa0 R15: 00007fff82ddbec8 [ 710.338034][T21063] [ 710.343450][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 710.351747][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 710.416656][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 710.426686][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 710.434910][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 710.441791][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 710.449271][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 710.457861][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 710.466299][ T392] bridge0: port 2(bridge_slave_1) entered blocking state [ 710.473169][ T392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 710.525155][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 710.532707][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 710.584132][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 710.599432][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 710.641065][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 710.666927][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 710.878684][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 710.894768][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 710.949598][T21014] device veth0_vlan entered promiscuous mode [ 710.962197][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 710.997033][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 711.053130][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 711.066081][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 711.111665][T21014] device veth1_macvtap entered promiscuous mode [ 711.144042][T21089] device sit0 entered promiscuous mode [ 711.180530][T21083] bond_slave_1: mtu less than device minimum [ 711.225736][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 711.236740][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 711.257250][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 711.283600][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 711.319599][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 712.405299][ T8] device bridge_slave_1 left promiscuous mode [ 712.411300][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 712.419626][ T8] device bridge_slave_0 left promiscuous mode [ 712.425726][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 712.433918][ T8] device veth1_macvtap left promiscuous mode [ 712.440161][ T8] device veth0_vlan left promiscuous mode [ 713.312475][T21121] bridge0: port 1(bridge_slave_0) entered blocking state [ 713.474298][T21121] bridge0: port 1(bridge_slave_0) entered disabled state [ 713.481789][T21121] device bridge_slave_0 entered promiscuous mode [ 714.193874][T21121] bridge0: port 2(bridge_slave_1) entered blocking state [ 714.232583][T21121] bridge0: port 2(bridge_slave_1) entered disabled state [ 714.254877][T21121] device bridge_slave_1 entered promiscuous mode [ 714.414834][T21145] bond_slave_1: mtu less than device minimum [ 715.145439][T21163] bond_slave_1: mtu less than device minimum [ 715.158260][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 715.174712][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 715.186640][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 715.206386][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 715.235923][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 715.242822][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 715.312953][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 715.325295][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 715.353482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 715.408038][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 715.415156][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 715.432643][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 715.683953][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 715.714847][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 715.722811][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 715.751608][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 715.912391][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 715.938194][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 715.977121][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 716.004877][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 716.347457][T21121] device veth0_vlan entered promiscuous mode [ 716.430652][T21121] device veth1_macvtap entered promiscuous mode [ 716.505935][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 716.534870][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 716.574559][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 716.608862][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 716.645916][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 717.134857][T21182] device pim6reg1 entered promiscuous mode [ 717.184681][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 717.192888][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 719.204741][T21199] device pim6reg1 entered promiscuous mode [ 721.239980][T21204] bond_slave_1: mtu less than device minimum [ 723.296431][T21225] bridge0: port 1(bridge_slave_0) entered blocking state [ 723.310880][T21225] bridge0: port 1(bridge_slave_0) entered disabled state [ 723.334210][T21225] device bridge_slave_0 entered promiscuous mode [ 723.370038][T21225] bridge0: port 2(bridge_slave_1) entered blocking state [ 723.434778][T21225] bridge0: port 2(bridge_slave_1) entered disabled state [ 723.614555][T21225] device bridge_slave_1 entered promiscuous mode [ 723.685182][T21249] bond_slave_1: mtu less than device minimum [ 723.975753][ T8] device bridge_slave_1 left promiscuous mode [ 723.981756][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.008002][ T8] device bridge_slave_0 left promiscuous mode [ 724.021676][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.053060][ T8] device veth1_macvtap left promiscuous mode [ 724.066587][ T8] device veth0_vlan left promiscuous mode [ 724.563603][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 724.577347][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 724.636904][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 724.659458][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 724.669632][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.676540][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 724.700278][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 724.715190][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 724.744111][ T392] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.751017][ T392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 725.504532][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 725.560149][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 725.574763][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 725.624089][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 725.635151][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 725.668348][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 725.695521][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 726.438210][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 726.446091][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 726.472293][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 726.490053][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 726.508771][T21288] syz.0.7583[21288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.508861][T21288] syz.0.7583[21288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 726.526319][T21225] device veth0_vlan entered promiscuous mode [ 726.631262][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 726.641700][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 726.667817][T21225] device veth1_macvtap entered promiscuous mode [ 726.694113][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 726.709187][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 726.735726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 726.758109][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 727.755345][ T8] device bridge_slave_1 left promiscuous mode [ 727.761321][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 727.784767][ T8] device bridge_slave_0 left promiscuous mode [ 727.790905][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 727.855366][ T8] device veth1_macvtap left promiscuous mode [ 727.861233][ T8] device veth0_vlan left promiscuous mode [ 728.186704][T21311] syz.3.7593[21311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 728.186798][T21311] syz.3.7593[21311] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 730.295378][T21318] bridge0: port 1(bridge_slave_0) entered blocking state [ 730.364402][T21318] bridge0: port 1(bridge_slave_0) entered disabled state [ 730.396707][T21318] device bridge_slave_0 entered promiscuous mode [ 730.491089][T21318] bridge0: port 2(bridge_slave_1) entered blocking state [ 730.518936][T21318] bridge0: port 2(bridge_slave_1) entered disabled state [ 730.559958][T21318] device bridge_slave_1 entered promiscuous mode [ 731.384068][T21356] bond_slave_1: mtu less than device minimum [ 731.395553][T21364] syz.2.7606[21364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.395643][T21364] syz.2.7606[21364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 731.485099][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 731.514063][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 731.560282][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 731.575406][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 731.594665][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 731.601559][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 731.629654][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 731.652105][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 731.673792][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 731.680736][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 731.983061][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 732.003292][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 732.039373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 732.067775][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 732.720237][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 732.730728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 732.759576][T21318] device veth0_vlan entered promiscuous mode [ 732.778633][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 732.787271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 732.857304][T21387] FAULT_INJECTION: forcing a failure. [ 732.857304][T21387] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 732.919251][T21387] CPU: 1 PID: 21387 Comm: syz.2.7621 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 732.930466][T21387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 732.940363][T21387] Call Trace: [ 732.943483][T21387] [ 732.946261][T21387] dump_stack_lvl+0x151/0x1c0 [ 732.950782][T21387] ? io_uring_drop_tctx_refs+0x190/0x190 [ 732.956254][T21387] ? 0xffffffffa0028000 [ 732.960231][T21387] ? is_bpf_text_address+0x172/0x190 [ 732.965359][T21387] dump_stack+0x15/0x20 [ 732.969358][T21387] should_fail+0x3c6/0x510 [ 732.973602][T21387] should_fail_alloc_page+0x5a/0x80 [ 732.978632][T21387] prepare_alloc_pages+0x15c/0x700 [ 732.983579][T21387] ? __alloc_pages+0x8f0/0x8f0 [ 732.988188][T21387] ? __alloc_pages_bulk+0xd80/0xd80 [ 732.993221][T21387] ? pcpu_chunk_refresh_hint+0x802/0x930 [ 732.998688][T21387] __alloc_pages+0x18c/0x8f0 [ 733.003146][T21387] ? prep_new_page+0x110/0x110 [ 733.007713][T21387] ? pcpu_chunk_relocate+0x356/0x430 [ 733.012834][T21387] pcpu_populate_chunk+0x18c/0xe30 [ 733.017804][T21387] pcpu_alloc+0x984/0x13e0 [ 733.022036][T21387] __alloc_percpu_gfp+0x27/0x30 [ 733.026721][T21387] bpf_map_alloc_percpu+0xe6/0x160 [ 733.031668][T21387] array_map_alloc+0x3a5/0x6d0 [ 733.036281][T21387] map_create+0x411/0x2050 [ 733.040524][T21387] __sys_bpf+0x296/0x760 [ 733.044596][T21387] ? fput_many+0x160/0x1b0 [ 733.048851][T21387] ? bpf_link_show_fdinfo+0x300/0x300 [ 733.054331][T21387] ? debug_smp_processor_id+0x17/0x20 [ 733.059526][T21387] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 733.065430][T21387] __x64_sys_bpf+0x7c/0x90 [ 733.069700][T21387] x64_sys_call+0x87f/0x9a0 [ 733.074027][T21387] do_syscall_64+0x3b/0xb0 [ 733.078275][T21387] ? clear_bhb_loop+0x35/0x90 [ 733.082789][T21387] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 733.088515][T21387] RIP: 0033:0x7f00fecf3169 [ 733.092773][T21387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 733.112208][T21387] RSP: 002b:00007f00fd35d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 733.120458][T21387] RAX: ffffffffffffffda RBX: 00007f00fef0bfa0 RCX: 00007f00fecf3169 [ 733.128263][T21387] RDX: 0000000000000048 RSI: 0000200000000700 RDI: 2000000000000000 [ 733.136079][T21387] RBP: 00007f00fd35d090 R08: 0000000000000000 R09: 0000000000000000 [ 733.143885][T21387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 733.151699][T21387] R13: 0000000000000000 R14: 00007f00fef0bfa0 R15: 00007ffe3d47e9a8 [ 733.159518][T21387] [ 733.410539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 733.419693][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 733.476696][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 733.495209][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 733.536905][T21318] device veth1_macvtap entered promiscuous mode [ 733.584554][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 733.592463][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 733.615000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 733.760667][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 733.769076][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 735.095200][ T392] device bridge_slave_1 left promiscuous mode [ 735.101179][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 735.144804][ T392] device bridge_slave_0 left promiscuous mode [ 735.150871][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 735.175514][ T392] device veth1_macvtap left promiscuous mode [ 735.181374][ T392] device veth0_vlan left promiscuous mode [ 736.479190][T21428] bridge0: port 1(bridge_slave_0) entered blocking state [ 736.506385][T21428] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.513984][T21428] device bridge_slave_0 entered promiscuous mode [ 736.614692][T21428] bridge0: port 2(bridge_slave_1) entered blocking state [ 736.621565][T21428] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.634919][T21428] device bridge_slave_1 entered promiscuous mode [ 737.389204][T21460] bond_slave_1: mtu less than device minimum [ 738.383536][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 738.402013][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 738.428504][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 738.452177][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 738.472368][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 738.479279][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 738.545636][T21428] device veth0_vlan entered promiscuous mode [ 738.574345][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 738.642775][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 738.719746][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 738.734575][ T392] bridge0: port 2(bridge_slave_1) entered blocking state [ 738.741474][ T392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 738.758885][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 738.800518][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 738.831444][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 738.861874][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 738.882074][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 738.908126][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 738.934686][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 738.962899][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 739.003610][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 739.027773][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 739.060463][T21428] device veth1_macvtap entered promiscuous mode [ 739.667306][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 739.684564][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 739.766939][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 739.975235][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 740.004934][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 740.013289][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 740.044797][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 740.845739][ T8] device bridge_slave_1 left promiscuous mode [ 740.851715][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 740.894777][ T8] device bridge_slave_0 left promiscuous mode [ 740.900765][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 740.915408][ T8] device veth1_macvtap left promiscuous mode [ 740.921270][ T8] device veth0_vlan left promiscuous mode [ 742.445811][T21513] bridge0: port 1(bridge_slave_0) entered blocking state [ 742.452933][T21513] bridge0: port 1(bridge_slave_0) entered disabled state [ 742.511414][T21513] device bridge_slave_0 entered promiscuous mode [ 742.545215][T21513] bridge0: port 2(bridge_slave_1) entered blocking state [ 742.584535][T21513] bridge0: port 2(bridge_slave_1) entered disabled state [ 742.644205][T21513] device bridge_slave_1 entered promiscuous mode [ 743.079665][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 743.099261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 743.159912][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 743.194587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 743.212994][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 743.219908][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 743.341683][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 743.415491][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 743.434081][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 743.464600][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 743.471479][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 743.512007][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 743.543709][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 743.593570][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 743.619440][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 743.660364][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 743.668301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 743.694104][T21513] device veth0_vlan entered promiscuous mode [ 743.738795][T21513] device veth1_macvtap entered promiscuous mode [ 743.775160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 743.808742][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 743.847604][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 743.877597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 743.908326][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 744.292702][T21544] bond_slave_1: mtu less than device minimum [ 744.297054][T21558] syz.2.7668[21558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.298586][T21558] syz.2.7668[21558] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.970047][ T392] device bridge_slave_1 left promiscuous mode [ 745.014600][ T392] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.034504][ T392] device bridge_slave_0 left promiscuous mode [ 745.054373][ T392] bridge0: port 1(bridge_slave_0) entered disabled state [ 745.065590][ T392] device veth1_macvtap left promiscuous mode [ 745.071435][ T392] device veth0_vlan left promiscuous mode [ 746.291945][T21584] bridge0: port 1(bridge_slave_0) entered blocking state [ 746.300041][T21584] bridge0: port 1(bridge_slave_0) entered disabled state [ 746.309476][T21584] device bridge_slave_0 entered promiscuous mode [ 746.317682][T21584] bridge0: port 2(bridge_slave_1) entered blocking state [ 746.324766][T21584] bridge0: port 2(bridge_slave_1) entered disabled state [ 746.332173][T21584] device bridge_slave_1 entered promiscuous mode [ 746.585380][T21605] syz.2.7672[21605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 746.585458][T21605] syz.2.7672[21605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 747.270242][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 747.294900][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 747.380780][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 747.394984][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 747.422921][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 747.429841][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 747.472163][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 747.515544][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 747.523726][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 747.530603][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 747.562469][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 747.580852][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 747.594833][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 747.615490][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 747.626823][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 747.641875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 747.661881][T21584] device veth0_vlan entered promiscuous mode [ 747.708810][T21584] device veth1_macvtap entered promiscuous mode [ 747.726235][T21623] bond_slave_1: mtu less than device minimum [ 747.735587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 747.743254][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 747.771834][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 747.792403][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 747.814074][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 747.833322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 747.852879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 747.874543][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 747.890506][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 747.994070][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 748.012600][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 749.193534][ T311] device bridge_slave_1 left promiscuous mode [ 749.199548][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.206934][ T311] device bridge_slave_0 left promiscuous mode [ 749.212897][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.220879][ T311] device veth1_macvtap left promiscuous mode [ 749.227384][ T311] device veth0_vlan left promiscuous mode [ 749.973786][T21647] syz.3.7685[21647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 749.973873][T21647] syz.3.7685[21647] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.022850][T21663] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.054830][T21663] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.062231][T21663] device bridge_slave_0 entered promiscuous mode [ 752.069766][T21663] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.098213][T21663] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.116462][T21663] device bridge_slave_1 entered promiscuous mode [ 752.610240][T21663] bridge0: port 2(bridge_slave_1) entered blocking state [ 752.617148][T21663] bridge0: port 2(bridge_slave_1) entered forwarding state [ 752.624375][T21663] bridge0: port 1(bridge_slave_0) entered blocking state [ 752.631234][T21663] bridge0: port 1(bridge_slave_0) entered forwarding state [ 752.806966][T21693] bond_slave_1: mtu less than device minimum [ 752.854537][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.863993][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.974547][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 752.994504][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 753.152619][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 753.164661][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 753.175469][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 753.182328][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 753.289709][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 753.304736][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 753.334420][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 753.341298][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 753.491671][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 753.515153][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 753.554605][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 753.604725][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 754.198342][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 754.212378][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 754.237531][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 754.253254][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 754.318564][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 754.328467][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 754.359984][T21663] device veth0_vlan entered promiscuous mode [ 754.438654][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 754.454776][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 754.477615][T21663] device veth1_macvtap entered promiscuous mode [ 754.522967][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 754.534822][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 754.565253][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 754.630505][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 754.659227][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 754.676958][T21732] FAULT_INJECTION: forcing a failure. [ 754.676958][T21732] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 754.711152][T21732] CPU: 1 PID: 21732 Comm: syz.1.7708 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 754.722379][T21732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 754.732280][T21732] Call Trace: [ 754.735391][T21732] [ 754.738173][T21732] dump_stack_lvl+0x151/0x1c0 [ 754.742684][T21732] ? io_uring_drop_tctx_refs+0x190/0x190 [ 754.748155][T21732] ? perf_swevent_put_recursion_context+0xb0/0xb0 [ 754.754401][T21732] dump_stack+0x15/0x20 [ 754.758391][T21732] should_fail+0x3c6/0x510 [ 754.762646][T21732] should_fail_alloc_page+0x5a/0x80 [ 754.767679][T21732] prepare_alloc_pages+0x15c/0x700 [ 754.772630][T21732] ? __alloc_pages_bulk+0xd80/0xd80 [ 754.777665][T21732] __alloc_pages+0x18c/0x8f0 [ 754.782101][T21732] ? prep_new_page+0x110/0x110 [ 754.786697][T21732] shmem_alloc_and_acct_page+0x4bd/0xa80 [ 754.792163][T21732] ? shmem_swapin_page+0x1680/0x1680 [ 754.797283][T21732] ? xas_start+0x32c/0x3f0 [ 754.801532][T21732] ? xas_load+0x2b7/0x2d0 [ 754.805694][T21732] ? pagecache_get_page+0xdc2/0xeb0 [ 754.810729][T21732] ? page_cache_prev_miss+0x410/0x410 [ 754.815941][T21732] shmem_getpage_gfp+0x1388/0x23c0 [ 754.820895][T21732] ? shmem_getpage+0xa0/0xa0 [ 754.825308][T21732] ? fault_in_safe_writeable+0x240/0x240 [ 754.830785][T21732] shmem_write_begin+0xca/0x1b0 [ 754.835467][T21732] generic_perform_write+0x2de/0x750 [ 754.840588][T21732] ? grab_cache_page_write_begin+0xa0/0xa0 [ 754.846231][T21732] ? file_remove_privs+0x610/0x610 [ 754.851174][T21732] ? rwsem_write_trylock+0x153/0x340 [ 754.856295][T21732] ? rwsem_mark_wake+0x770/0x770 [ 754.861070][T21732] __generic_file_write_iter+0x25b/0x4b0 [ 754.866538][T21732] generic_file_write_iter+0xaf/0x1c0 [ 754.871746][T21732] vfs_write+0xd5d/0x1110 [ 754.875923][T21732] ? file_end_write+0x1c0/0x1c0 [ 754.880593][T21732] ? mutex_lock+0xb6/0x1e0 [ 754.884847][T21732] ? wait_for_completion_killable_timeout+0x10/0x10 [ 754.891272][T21732] ? __fdget_pos+0x2e7/0x3a0 [ 754.895697][T21732] ? ksys_write+0x77/0x2c0 [ 754.899954][T21732] ksys_write+0x199/0x2c0 [ 754.904117][T21732] ? __ia32_sys_read+0x90/0x90 [ 754.908720][T21732] ? debug_smp_processor_id+0x17/0x20 [ 754.913927][T21732] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 754.919833][T21732] __x64_sys_write+0x7b/0x90 [ 754.924254][T21732] x64_sys_call+0x2f/0x9a0 [ 754.928505][T21732] do_syscall_64+0x3b/0xb0 [ 754.932755][T21732] ? clear_bhb_loop+0x35/0x90 [ 754.937269][T21732] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 754.943085][T21732] RIP: 0033:0x7f155f424169 [ 754.947339][T21732] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 754.966780][T21732] RSP: 002b:00007f155da8e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 754.975024][T21732] RAX: ffffffffffffffda RBX: 00007f155f63cfa0 RCX: 00007f155f424169 [ 754.982836][T21732] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 754.990646][T21732] RBP: 00007f155da8e090 R08: 0000000000000000 R09: 0000000000000000 [ 754.998469][T21732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 755.006273][T21732] R13: 0000000000000000 R14: 00007f155f63cfa0 R15: 00007fff82ddbec8 [ 755.014100][T21732] [ 756.296923][ T45] device bridge_slave_1 left promiscuous mode [ 756.302958][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 756.310348][ T45] device bridge_slave_0 left promiscuous mode [ 756.316383][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 756.324165][ T45] device veth1_macvtap left promiscuous mode [ 756.330030][ T45] device veth0_vlan left promiscuous mode [ 757.841339][T21758] bridge0: port 1(bridge_slave_0) entered blocking state [ 757.875073][T21758] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.882523][T21758] device bridge_slave_0 entered promiscuous mode [ 757.964432][T21758] bridge0: port 2(bridge_slave_1) entered blocking state [ 758.012986][T21758] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.034961][T21758] device bridge_slave_1 entered promiscuous mode [ 758.052175][T21782] bridge0: port 2(bridge_slave_1) entered disabled state [ 758.059803][T21782] bridge0: port 1(bridge_slave_0) entered disabled state [ 758.164814][T21782] bridge0: port 2(bridge_slave_1) entered blocking state [ 758.171975][T21782] bridge0: port 2(bridge_slave_1) entered forwarding state [ 758.181635][T21782] bridge0: port 1(bridge_slave_0) entered blocking state [ 758.188915][T21782] bridge0: port 1(bridge_slave_0) entered forwarding state [ 758.222217][T21782] device bridge0 entered promiscuous mode [ 758.287810][T21788] bond_slave_1: mtu less than device minimum [ 758.824625][T21806] syz.2.7732[21806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.824713][T21806] syz.2.7732[21806] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.841190][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 758.924108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 758.940614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 758.970418][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 758.998939][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 759.005841][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 759.224443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 759.241427][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 759.269859][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 759.276761][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 759.364668][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 759.374587][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 759.382565][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 759.391556][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 759.400796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 759.442799][T21758] device veth0_vlan entered promiscuous mode [ 759.459437][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 759.475316][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 759.495855][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 759.513879][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 759.527064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 759.576203][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 759.612744][T21758] device veth1_macvtap entered promiscuous mode [ 760.066639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 760.084821][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 760.197703][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 760.224953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 760.253926][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 760.314644][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 762.871987][ T45] device bridge_slave_1 left promiscuous mode [ 762.878009][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 762.885624][ T45] device bridge_slave_0 left promiscuous mode [ 762.891545][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 762.900762][ T45] device veth1_macvtap left promiscuous mode [ 762.907267][ T45] device veth0_vlan left promiscuous mode [ 763.281721][T21848] bridge0: port 1(bridge_slave_0) entered blocking state [ 763.301420][T21848] bridge0: port 1(bridge_slave_0) entered disabled state [ 763.318894][T21848] device bridge_slave_0 entered promiscuous mode [ 763.853868][T21848] bridge0: port 2(bridge_slave_1) entered blocking state [ 763.860888][T21848] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.874750][T21848] device bridge_slave_1 entered promiscuous mode [ 763.884531][T21860] bridge0: port 2(bridge_slave_1) entered disabled state [ 763.899422][T21860] bridge0: port 1(bridge_slave_0) entered disabled state [ 764.308179][T21865] bridge0: port 2(bridge_slave_1) entered blocking state [ 764.315084][T21865] bridge0: port 2(bridge_slave_1) entered forwarding state [ 764.322216][T21865] bridge0: port 1(bridge_slave_0) entered blocking state [ 764.329098][T21865] bridge0: port 1(bridge_slave_0) entered forwarding state [ 764.354736][T21865] device bridge0 entered promiscuous mode [ 764.709287][T21885] bond_slave_1: mtu less than device minimum [ 764.729518][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 764.747168][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 764.811188][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 764.829654][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 764.857684][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 764.864585][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 764.924438][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 764.954695][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 764.984543][ T392] bridge0: port 2(bridge_slave_1) entered blocking state [ 764.991434][ T392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 765.024578][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 765.464288][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 765.472627][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 765.518431][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 765.554711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 765.606783][T21848] device veth0_vlan entered promiscuous mode [ 765.635403][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 765.653772][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 765.674089][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 765.694065][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 765.735622][T21848] device veth1_macvtap entered promiscuous mode [ 765.755760][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 765.763954][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 765.785345][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 765.826160][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 765.845000][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 765.859168][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 765.868462][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 766.645472][ T8] device bridge_slave_1 left promiscuous mode [ 766.651596][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.664805][ T8] device bridge_slave_0 left promiscuous mode [ 766.670774][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.679181][ T8] device veth1_macvtap left promiscuous mode [ 766.685070][ T8] device veth0_vlan left promiscuous mode [ 769.004102][T21920] bridge0: port 1(bridge_slave_0) entered blocking state [ 769.014530][T21920] bridge0: port 1(bridge_slave_0) entered disabled state [ 769.064879][T21920] device bridge_slave_0 entered promiscuous mode [ 769.092441][T21920] bridge0: port 2(bridge_slave_1) entered blocking state [ 769.525441][T21920] bridge0: port 2(bridge_slave_1) entered disabled state [ 769.576022][T21920] device bridge_slave_1 entered promiscuous mode [ 769.884260][T21947] bridge0: port 2(bridge_slave_1) entered disabled state [ 769.892305][T21947] bridge0: port 1(bridge_slave_0) entered disabled state [ 769.973905][T21953] bridge0: port 2(bridge_slave_1) entered blocking state [ 769.980836][T21953] bridge0: port 2(bridge_slave_1) entered forwarding state [ 769.988006][T21953] bridge0: port 1(bridge_slave_0) entered blocking state [ 769.994911][T21953] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.098123][T21953] device bridge0 entered promiscuous mode [ 770.349490][T21958] bond_slave_1: mtu less than device minimum [ 770.530826][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 770.539039][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 770.588352][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 770.621418][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 770.639721][ T392] bridge0: port 1(bridge_slave_0) entered blocking state [ 770.646729][ T392] bridge0: port 1(bridge_slave_0) entered forwarding state [ 770.670889][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 770.685155][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 770.694673][ T392] bridge0: port 2(bridge_slave_1) entered blocking state [ 770.701545][ T392] bridge0: port 2(bridge_slave_1) entered forwarding state [ 770.719557][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 770.794479][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 770.802495][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 770.811482][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 770.946860][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 770.964819][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 770.975380][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 770.993078][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 771.010672][T21920] device veth0_vlan entered promiscuous mode [ 771.623644][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 771.652192][ T392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 771.685449][T21920] device veth1_macvtap entered promiscuous mode [ 771.743111][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 771.764745][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 771.784746][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 771.859477][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 771.874798][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 773.164926][ T8] device bridge_slave_1 left promiscuous mode [ 773.170968][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 773.178780][ T8] device bridge_slave_0 left promiscuous mode [ 773.184902][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 773.192924][ T8] device veth1_macvtap left promiscuous mode [ 773.199107][ T8] device veth0_vlan left promiscuous mode [ 774.205949][T22008] FAULT_INJECTION: forcing a failure. [ 774.205949][T22008] name failslab, interval 1, probability 0, space 0, times 0 [ 774.241434][T22008] CPU: 1 PID: 22008 Comm: syz.2.7792 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 774.252651][T22008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 774.262544][T22008] Call Trace: [ 774.265665][T22008] [ 774.268444][T22008] dump_stack_lvl+0x151/0x1c0 [ 774.272954][T22008] ? io_uring_drop_tctx_refs+0x190/0x190 [ 774.278513][T22008] dump_stack+0x15/0x20 [ 774.282522][T22008] should_fail+0x3c6/0x510 [ 774.286759][T22008] __should_failslab+0xa4/0xe0 [ 774.291354][T22008] ? getname_flags+0xba/0x520 [ 774.295870][T22008] should_failslab+0x9/0x20 [ 774.300211][T22008] slab_pre_alloc_hook+0x37/0xd0 [ 774.304983][T22008] ? getname_flags+0xba/0x520 [ 774.309493][T22008] kmem_cache_alloc+0x44/0x250 [ 774.314097][T22008] getname_flags+0xba/0x520 [ 774.318438][T22008] __x64_sys_mkdirat+0x7c/0xa0 [ 774.323037][T22008] x64_sys_call+0x6c6/0x9a0 [ 774.327373][T22008] do_syscall_64+0x3b/0xb0 [ 774.331627][T22008] ? clear_bhb_loop+0x35/0x90 [ 774.336143][T22008] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 774.341865][T22008] RIP: 0033:0x7f00fecf3169 [ 774.346122][T22008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 774.365567][T22008] RSP: 002b:00007f00fd35d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 774.373811][T22008] RAX: ffffffffffffffda RBX: 00007f00fef0bfa0 RCX: 00007f00fecf3169 [ 774.381617][T22008] RDX: 00000000000001ff RSI: 0000200000000000 RDI: ffffffffffffff9c [ 774.389430][T22008] RBP: 00007f00fd35d090 R08: 0000000000000000 R09: 0000000000000000 [ 774.397242][T22008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 774.405066][T22008] R13: 0000000000000000 R14: 00007f00fef0bfa0 R15: 00007ffe3d47e9a8 [ 774.412874][T22008] [ 775.011171][T22016] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.021239][T22016] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.034807][T22016] device bridge_slave_0 entered promiscuous mode [ 775.042133][T22016] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.051316][T22016] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.086538][T22016] device bridge_slave_1 entered promiscuous mode [ 775.431986][T22036] bridge0: port 2(bridge_slave_1) entered disabled state [ 775.439749][T22036] bridge0: port 1(bridge_slave_0) entered disabled state [ 775.449765][T22036] device bridge0 left promiscuous mode [ 775.529972][T22039] bridge0: port 2(bridge_slave_1) entered blocking state [ 775.537037][T22039] bridge0: port 2(bridge_slave_1) entered forwarding state [ 775.544315][T22039] bridge0: port 1(bridge_slave_0) entered blocking state [ 775.551285][T22039] bridge0: port 1(bridge_slave_0) entered forwarding state [ 775.558862][T22039] device bridge0 entered promiscuous mode [ 775.898092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 775.915796][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 775.964342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 775.974716][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 775.994849][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 776.001719][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 776.024770][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 776.032959][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 776.039894][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 776.057735][T22052] bond_slave_1: mtu less than device minimum [ 776.063966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 776.073261][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 776.081819][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 776.138124][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 776.165922][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 776.198136][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 776.213340][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 776.234866][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 776.253311][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 776.306580][T22016] device veth0_vlan entered promiscuous mode [ 776.328562][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 776.351572][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 776.373386][T22016] device veth1_macvtap entered promiscuous mode [ 776.455677][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 776.464584][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 776.483042][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 776.491596][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 776.504547][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 778.175496][ T45] device bridge_slave_1 left promiscuous mode [ 778.181428][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 778.188843][ T45] device bridge_slave_0 left promiscuous mode [ 778.194861][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 778.202686][ T45] device veth1_macvtap left promiscuous mode [ 778.208557][ T45] device veth0_vlan left promiscuous mode [ 779.867641][T22092] FAULT_INJECTION: forcing a failure. [ 779.867641][T22092] name failslab, interval 1, probability 0, space 0, times 0 [ 779.890499][T22092] CPU: 0 PID: 22092 Comm: syz.1.7815 Tainted: G W 5.15.178-syzkaller-00034-g5e1b899f19c3 #0 [ 779.901718][T22092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 779.911603][T22092] Call Trace: [ 779.914729][T22092] [ 779.917505][T22092] dump_stack_lvl+0x151/0x1c0 [ 779.922028][T22092] ? io_uring_drop_tctx_refs+0x190/0x190 [ 779.927489][T22092] dump_stack+0x15/0x20 [ 779.931479][T22092] should_fail+0x3c6/0x510 [ 779.935733][T22092] __should_failslab+0xa4/0xe0 [ 779.940339][T22092] ? security_file_alloc+0x29/0x120 [ 779.945366][T22092] should_failslab+0x9/0x20 [ 779.949707][T22092] slab_pre_alloc_hook+0x37/0xd0 [ 779.954482][T22092] ? security_file_alloc+0x29/0x120 [ 779.959511][T22092] kmem_cache_alloc+0x44/0x250 [ 779.964116][T22092] security_file_alloc+0x29/0x120 [ 779.968973][T22092] __alloc_file+0xb2/0x2a0 [ 779.973312][T22092] alloc_empty_file+0x95/0x180 [ 779.977915][T22092] alloc_file+0x5a/0x4e0 [ 779.982005][T22092] alloc_file_pseudo+0x259/0x2f0 [ 779.986774][T22092] ? alloc_empty_file_noaccount+0x80/0x80 [ 779.992328][T22092] ? put_pid+0xc3/0x110 [ 779.996319][T22092] sock_alloc_file+0xbb/0x260 [ 780.000829][T22092] __sys_socketpair+0x4c3/0x6e0 [ 780.005513][T22092] ? __ia32_sys_socket+0x90/0x90 [ 780.010285][T22092] ? kvm_sched_clock_read+0x18/0x40 [ 780.015320][T22092] ? sched_clock+0x9/0x10 [ 780.019490][T22092] ? sched_clock_cpu+0x18/0x3b0 [ 780.024174][T22092] ? debug_smp_processor_id+0x17/0x20 [ 780.029381][T22092] __x64_sys_socketpair+0x9b/0xb0 [ 780.034246][T22092] x64_sys_call+0x19b/0x9a0 [ 780.038590][T22092] do_syscall_64+0x3b/0xb0 [ 780.042832][T22092] ? clear_bhb_loop+0x35/0x90 [ 780.047347][T22092] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 780.053073][T22092] RIP: 0033:0x7f155f424169 [ 780.057329][T22092] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 780.076784][T22092] RSP: 002b:00007f155da8e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 780.085015][T22092] RAX: ffffffffffffffda RBX: 00007f155f63cfa0 RCX: 00007f155f424169 [ 780.092828][T22092] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000001 [ 780.100640][T22092] RBP: 00007f155da8e090 R08: 0000000000000000 R09: 0000000000000000 [ 780.108449][T22092] R10: 00002000000002c0 R11: 0000000000000246 R12: 0000000000000002 [ 780.116259][T22092] R13: 0000000000000000 R14: 00007f155f63cfa0 R15: 00007fff82ddbec8 [ 780.124081][T22092] [ 780.144087][T22078] bridge0: port 1(bridge_slave_0) entered blocking state [ 780.174541][T22078] bridge0: port 1(bridge_slave_0) entered disabled state [ 780.240111][T22078] device bridge_slave_0 entered promiscuous mode [ 780.316664][T22078] bridge0: port 2(bridge_slave_1) entered blocking state [ 780.323539][T22078] bridge0: port 2(bridge_slave_1) entered disabled state [ 780.360468][T22078] device bridge_slave_1 entered promiscuous mode [ 780.805646][T22119] bond_slave_1: mtu less than device minimum [ 780.977217][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 780.990325][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 781.022580][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 781.038862][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 781.054619][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 781.061543][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 781.088808][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 781.098158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 781.108143][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 781.115039][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 781.159707][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 781.232152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 781.241466][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 781.253938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 781.266567][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 781.437090][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 781.450011][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 781.550566][T22078] device veth0_vlan entered promiscuous mode [ 781.717584][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 781.726375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 781.743082][T22078] device veth1_macvtap entered promiscuous mode [ 781.896985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 781.905541][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 781.912938][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 781.941121][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 781.949497][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 781.958361][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 781.966672][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: ebtable checkpoint: socket(AF_INET, SOCK_STREAM, IPPROTO_TCP) (errno 1: Operation not permitted) loop exited with status 67 SYZFAIL: repeatedly failed to execute the program proc=4 req=7306 state=3 status=67 (errno 11: Resource temporarily unavailable) [ 783.144954][ T45] device bridge_slave_1 left promiscuous mode [ 783.150886][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 783.158835][ T45] device bridge_slave_0 left promiscuous mode [ 783.164859][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 783.172455][ T45] device veth1_macvtap left promiscuous mode [ 783.178348][ T45] device veth0_vlan left promiscuous mode [ 784.215916][ T45] GPL: port 1(erspan0) entered disabled state [ 784.224152][ T45] device erspan0 left promiscuous mode [ 784.229487][ T45] GPL: port 1(erspan0) entered disabled state [ 784.535994][ T45] device bridge_slave_1 left promiscuous mode [ 784.541926][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 784.549310][ T45] device bridge_slave_0 left promiscuous mode [ 784.555252][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 784.563228][ T45] device bridge_slave_1 left promiscuous mode [ 784.569249][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 784.576712][ T45] device bridge_slave_0 left promiscuous mode [ 784.582667][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 784.590775][ T45] device bridge_slave_1 left promiscuous mode [ 784.596764][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 784.603916][ T45] device bridge_slave_0 left promiscuous mode [ 784.609899][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 784.617786][ T45] device bridge_slave_1 left promiscuous mode [ 784.623701][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 784.630935][ T45] device bridge_slave_0 left promiscuous mode [ 784.636916][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 784.646035][ T45] device veth1_macvtap left promiscuous mode [ 784.652081][ T45] device veth1_macvtap left promiscuous mode