last executing test programs: 7.727333558s ago: executing program 3 (id=7612): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000500000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x3, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="05000000010000008e000000c9e7000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000100000000000000000000000000000000020000000000000000001611fa45b49615d9abebfa384249a830567af640ee00800000bf5b5f5baf0f64532bdcda3ba896498eaec501f16068536e44"], 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r3}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r9 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_freezer_state(r9, &(0x7f00000002c0)='FROZEN\x00', 0x7) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@datasec={0x6, 0x1, 0x0, 0xf, 0x3, [{0xffffffff, 0x2, 0x2}], "8f54b7"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '@'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 6.805759413s ago: executing program 3 (id=7620): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000800)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xed, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0xc7, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x24, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0xe}, @generic={0xff, 0x5, 0x0, 0xffff, 0xfffffffa}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @ringbuf_query, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @alu={0x4, 0x0, 0x2, 0x5, 0x4, 0x6, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x835}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='GPL\x00', 0x1, 0x29, &(0x7f0000000780)=""/41, 0x41000, 0x5, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000b00)={0x4, 0x8, 0x595e, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r0, r0, r0, r0], &(0x7f0000000b80), 0x10, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) mkdir(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) 6.706091514s ago: executing program 2 (id=7622): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 6.622512804s ago: executing program 2 (id=7625): perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x27, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x90) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_lsm={0x1d, 0x17, &(0x7f0000000cc0)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0xe04f, 0x96, &(0x7f00000002c0)=""/150, 0x41100, 0x35, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0x10, 0xed5, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000880), &(0x7f0000000b00)=[{0x1, 0x1, 0x0, 0x7}, {0x3, 0x1, 0x2, 0xb}, {0x2, 0x4, 0x3, 0x8}, {0x3, 0x3, 0xd, 0x2}, {0x5, 0x1, 0x2}, {0x3, 0x4, 0x6, 0x1}], 0x10, 0x8, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r6, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) 6.028135757s ago: executing program 2 (id=7627): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xe, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x67) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x2b6, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000", @ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) socketpair(0x11, 0x3, 0x0, &(0x7f0000000600)={0x0, 0x0}) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 6.024599047s ago: executing program 0 (id=7637): perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x27, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x90) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_lsm={0x1d, 0x17, &(0x7f0000000cc0)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0xe04f, 0x96, &(0x7f00000002c0)=""/150, 0x41100, 0x35, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0x10, 0xed5, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000880), &(0x7f0000000b00)=[{0x1, 0x1, 0x0, 0x7}, {0x3, 0x1, 0x2, 0xb}, {0x2, 0x4, 0x3, 0x8}, {0x3, 0x3, 0xd, 0x2}, {0x5, 0x1, 0x2}, {0x3, 0x4, 0x6, 0x1}], 0x10, 0x8, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r6, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) 5.704710719s ago: executing program 2 (id=7628): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000200)=[{0x6c}, {0x6}]}) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 5.64410573s ago: executing program 0 (id=7629): perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x27, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x90) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_lsm={0x1d, 0x17, &(0x7f0000000cc0)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0xe04f, 0x96, &(0x7f00000002c0)=""/150, 0x41100, 0x35, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0x10, 0xed5, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000880), &(0x7f0000000b00)=[{0x1, 0x1, 0x0, 0x7}, {0x3, 0x1, 0x2, 0xb}, {0x2, 0x4, 0x3, 0x8}, {0x3, 0x3, 0xd, 0x2}, {0x5, 0x1, 0x2}, {0x3, 0x4, 0x6, 0x1}], 0x10, 0x8, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r6, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) 5.62745125s ago: executing program 2 (id=7630): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="620af8ff0c200021bfa100000000000007010000f8ffffffb702000003000000bd120000000000008500000006000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4f698393aa0f3881f9c24aa56f15199fad0093c59d66b5ece9f36c70d0f13905ea23c22624c9f87f9793f50bb546000677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64f751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07a72c234664c0af9360a1f7a5e6b607130c89f18c0c1089d8b853289d01aa27ae8b09e00e79ab20b0b8e1148f49faf2ad0000000000000006fa03c6468972089b302d7bf6023cdcedb5e0125ebbc08dee510cb2364149215108333719acd97cfa107d40224edc5467a932b77674e802a0d42bc6099ad238af770b5ed8925161729298700000080006ef6c1ff0900000000000010c63a949e8b7955394ffa82b8e942c89112f4ab87b1bfeda7be586602d985430cea0162ab3fcf4591c926abfb076719237c8d0e60b0eea24492a660583eecdbf5bcd3de3a83209da17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c95c25a573dc2edcaea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b5b7632f32030916f89c6dad7603f2ba2a790d62d6faec2fed44da4928b30142ba11de6c5d50b83bae613402216b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0eb97fca585ec6bf58351d564beb6d952aab9c70764b0a8a7583c90b3433b809b5b9fbd48bc873495cbff8a326eea31ae4e0f7505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223a0eb4fa39f6b5c02e6d6d90756ff57902a8f57000000009700cf0b4b8bc2294133000000000000000000030000000000000000000000000010008bc0d9559711e6e8861c46495ba585a4b2d02edc3e28dd271c896249ed3957f813567f7a95435ac15fc0288d9b2a169cdcacc413b48dafb7a2c8cb482bac0ac559eaf39027ceb379a902d9ba96ffffff7f0000100000000000007d5ad897ef3b7cda42013d53046da21b40216e14ba2d6ad5656bfff17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccff7a1ef3282830689da6b53b263339863297771429d120000003341bf4abacac94500fca0493cf29b33dcc9ffffffffffffffd39f6ce0c6ff01589646efd1cf870cd7bb2366fdf870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d10a64c1083d5e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78100788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4ce0232fcea69c271d7fa29822aea68a660e717a04becff0f719197724f4fce1293b62d7e8c7123d8ec571be54c72d978cf906df0042e36acd37d7f9e119f2c06f815312e0cfe222a06f56dd000c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c7df8be5877050c91301fb997316dbf17866fb84d4173731efe895ff2e1c55ef08235a0126e01254c44060926e90109b598502d3e959efc71f665c4d75cf2458e3542c9062ece84c99a861887a20639b41c8c12ee86c50804042b3eac1f879b136345cf67ca3fb5aac518a75f9e7d7101d5e186c489b3a06fb99e0aa7f23a054de2f4d92d6bd72ee2c9fdc74aaaf1e3e483b4ad05573af40326993947d9a631bcbf3583784acbda216550d7ad333545794f37331766e472391e358c3b377327ac9ecc34f24c9ae153ec60ac0694dc55bff9f5f4df90400000000000000d6b2c5ea139376f24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e66964ae09bb6d163118e4cbe024fd4500f8ff070000001e48418046c216c1f895778cb25122a2a998de0842a486721737390cbf3a74cb2003016f1514216bdf57d2a40dddb51ab63e96ec84ac3571f02f647b3385b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99b355b72d538ba2f58ea8e4aa37094191e10096e7e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df986741517abf11389b751f4e109b60000000000000000d6d5210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137abf9a404abde7750898b1bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f08fb8191bbab2dc51de3a61f0868afc4294859323e7a45319f18101288d139bd3da230ed05a8fe64680b0a3f9f2dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30235b9100000000a55f74a23641f61f2d5b308cf0d031b0c7f0ced69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821aa8e8c5c39609ff854356cb4900000000000000000000000000c1fee30a3f7a85d1b29e58c776f4b4ce07e1c6fa66fcfc7a228805f76785efc0ceb1c8e5729c66418d169fc03aa18854693ad2a182068e1e3a0e2505bc7f41019645466ac96e0d4b3bc19faa5449209b083dbd334b47f067bbab40743b2a428f1da1f68df75cf43f8ecc8d3726602111b40e761fd21081920382f14d12ca3c3431ee97471c7868dcda7e478950aa69eb7f7f80572fdd11bb1d0d1280fbc22bf73468788df51710d7d31c632fc5ed1762eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331945e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab848753203b458b97ec1afb079b4b4ba686fcdf240430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71f96756ea5cce7db3c4be290159f6bcd75f0dda9de5532e71ae9e48b0ed1254a83100000000f6fbb869604d51a36a54c832e45b2569dc0d90b075225fde44c4e0973171ad47d6b70ebc660309e1e245b0fdf9743af932cd6db49a47613808bad959719c0000000000378ac2e24c7e800003c9e8095e02985f28e678f66422436f949e2ab8f162d7e3f855e378f4a1f40b0c6fb2d4b205a800b6d713acebc5b014e61a543a5a194f9ac18d76b5440e3b1a569e7397f6ca0400966d7ba19e720413267a6ccea9c439671d2c680f2753ca184eeeb843450368acb4383a01d25eb3d1e23e0f2645d1cdfa9fa410632f95a5f622f851c66ee7e3030108000000000000c4f93c0984b5c2d4523497e4d64f95f08493564a1df87111c9bffef97dcecc467ace456597685c5870d05f88a0f463db88d377442e1349acaf766218b54a9d624778e1c4cba6e6390a9f302c6eb2df7766411bef0ebb5000000000006065d6735eb7a00e127c0000000000000000000000bfb0bba79344643b1d8daa9f38e4b62c1e2af68c6f5054b078acd74b4a9c944e4505da485a3a4154387a0a88370d9ed9467b09c5888a06431df3f68abf0b366c4d5f8bea7b29c257ed756dff7a21c6b661cbdd43de65afd7f661d5c84f915c90e3d6ea012b68b787eb01d8320000000000000060176dacba0ec503a37fae6b472ec369c79ee6a420c0fd8d8d82fe136d5af6c30bfeb0a7275babfdb96a127aa9386e0671c6454245a18c1c8c49552cff5d27b547cdc34c0858c77a47a9ff86ee9fbd9ceda428716a4218821176d8067997527230fa67d26950d3e4f2750fa7c872874ad3a2d11f9f6eb08e6d7b6fa257b04d8ce36360f524e3dfd2211641f3d2637d86b80681eca50ce0eecafdd22d41fa515c15591e70ded4b70efac3cb42fb352d82e8f7573e8ed8248da356fa91a252976d3a4d8c1843a8d5bb7f5f1028453a0562a3ea93117076dd4940b7df50d78289fe66197525f6095f8662d232970bef61b03fa83027963a1a2e07cfee30c0d0b4c5877f93b3637ca21eab5afcf5d4638dfe8f9202aaad51c979049dd76d65368cbd4187d9f74257c7c4a23ac4a34eec5aa17e78c5167216f5e72138d20f8325dd5f"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1e, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r2, @ANYRESDEC, @ANYRES16=r0], 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x21, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000280)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000001200)=ANY=[@ANYBLOB="bdaa00000000000071101b000000000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 5.127566873s ago: executing program 0 (id=7632): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000800)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xed, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0xc7, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x24, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0xe}, @generic={0xff, 0x5, 0x0, 0xffff, 0xfffffffa}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @ringbuf_query, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @alu={0x4, 0x0, 0x2, 0x5, 0x4, 0x6, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x835}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='GPL\x00', 0x1, 0x29, &(0x7f0000000780)=""/41, 0x41000, 0x5, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000b00)={0x4, 0x8, 0x595e, 0xfffffffb}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000b40)=[r0, r0, r0, r0], &(0x7f0000000b80)=[{0x5, 0x1, 0x7, 0x1}], 0x10, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) mkdir(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.813309714s ago: executing program 2 (id=7633): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000800)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xed, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0xc7, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x24, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0xe}, @generic={0xff, 0x5, 0x0, 0xffff, 0xfffffffa}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @ringbuf_query, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @alu={0x4, 0x0, 0x2, 0x5, 0x4, 0x6, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x835}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='GPL\x00', 0x1, 0x29, &(0x7f0000000780)=""/41, 0x41000, 0x5, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000b00)={0x4, 0x8, 0x595e, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r0, r0, r0, r0], &(0x7f0000000b80), 0x10, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) mkdir(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.464877896s ago: executing program 1 (id=7636): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="180200000000000000000000000000008500000028000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.134662609s ago: executing program 1 (id=7640): perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x27, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x90) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_lsm={0x1d, 0x17, &(0x7f0000000cc0)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0xe04f, 0x96, &(0x7f00000002c0)=""/150, 0x41100, 0x35, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0x10, 0xed5, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000880), &(0x7f0000000b00)=[{0x1, 0x1, 0x0, 0x7}, {0x3, 0x1, 0x2, 0xb}, {0x2, 0x4, 0x3, 0x8}, {0x3, 0x3, 0xd, 0x2}, {0x5, 0x1, 0x2}, {0x3, 0x4, 0x6, 0x1}], 0x10, 0x8, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r6, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) 2.077296729s ago: executing program 4 (id=7641): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000200)=[{0x6c}, {0x6}]}) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 2.066622019s ago: executing program 3 (id=7642): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xe, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x67) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x2b6, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000", @ANYRES16=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) socketpair(0x11, 0x3, 0x0, &(0x7f0000000600)={0x0, 0x0}) ioctl$SIOCSIFHWADDR(r4, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.977777479s ago: executing program 4 (id=7643): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 1.93728479s ago: executing program 4 (id=7644): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb3, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f0000000b00)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYBLOB="0000000000000000b702000014008000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x86, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x512f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8946, &(0x7f0000000900)={'veth1_to_hsr\x00', @random='\x00\x00\x00 \x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1e, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1.92071888s ago: executing program 3 (id=7645): perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x27, 0x6, 0x0, &(0x7f0000000040)="f8ad48cc02cb", 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x90) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_lsm={0x1d, 0x17, &(0x7f0000000cc0)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0xe04f, 0x96, &(0x7f00000002c0)=""/150, 0x41100, 0x35, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0x10, 0xed5, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000880), &(0x7f0000000b00)=[{0x1, 0x1, 0x0, 0x7}, {0x3, 0x1, 0x2, 0xb}, {0x2, 0x4, 0x3, 0x8}, {0x3, 0x3, 0xd, 0x2}, {0x5, 0x1, 0x2}, {0x3, 0x4, 0x6, 0x1}], 0x10, 0x8, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) r7 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r7, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x203) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r8, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) 1.651783271s ago: executing program 4 (id=7646): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1e, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r2, @ANYRESDEC, @ANYRES16=r0], 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x21, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000280)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000001200)=ANY=[@ANYBLOB="bdaa00000000000071101b000000000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.646220221s ago: executing program 1 (id=7656): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0x58, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x1e, 0xc, &(0x7f00000002c0)=ANY=[@ANYRESDEC=r2, @ANYRESDEC, @ANYRES16=r0], 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x21, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_QUERY_BPF(r6, 0xc008240a, &(0x7f0000000280)={0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x15, 0x3, &(0x7f0000001200)=ANY=[@ANYBLOB="bdaa00000000000071101b000000000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.213509204s ago: executing program 1 (id=7647): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xe, 0x4, 0x8, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x67) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x4, 0x6, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x11, 0x3c}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x76}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0x2b6, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.limit_in_bytes\x00', 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, &(0x7f0000000040)=""/73}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x3, 0xc, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000", @ANYRES16], 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) socketpair(0x11, 0x3, 0x0, &(0x7f0000000600)={0x0, 0x0}) ioctl$SIOCSIFHWADDR(r3, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.090663135s ago: executing program 1 (id=7648): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @xdp=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000500000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@bloom_filter={0x1e, 0x0, 0x3, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="05000000010000008e000000c9e7000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000100000000000000000000000000000000020000000000000000001611fa45b49615d9abebfa384249a830567af640ee00800000bf5b5f5baf0f64532bdcda3ba896498eaec501f16068536e44"], 0x48) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a, r3}, 0x38) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r8, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) socketpair$unix(0x1, 0x0, 0x0, 0x0) r9 = openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_freezer_state(r9, &(0x7f00000002c0)='FROZEN\x00', 0x7) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x8, [@datasec={0x6, 0x1, 0x0, 0xf, 0x3, [{0xffffffff, 0x2, 0x2}], "8f54b7"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '@'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 878.781316ms ago: executing program 4 (id=7649): perf_event_open(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x27, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x50) recvmsg$unix(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/12, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000b80)=@bpf_lsm={0x1d, 0x17, &(0x7f0000000cc0)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0xe04f, 0x96, &(0x7f00000002c0)=""/150, 0x41100, 0x35, '\x00', 0x0, 0x1b, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x1, 0x10, 0xed5, 0x5}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000880), &(0x7f0000000b00)=[{0x1, 0x1, 0x0, 0x7}, {0x3, 0x1, 0x2, 0xb}, {0x2, 0x4, 0x3, 0x8}, {0x3, 0x3, 0xd, 0x2}, {0x5, 0x1, 0x2}, {0x3, 0x4, 0x6, 0x1}], 0x10, 0x8, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x3, 0x5670}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r6, 0x0) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r7, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) 427.385648ms ago: executing program 3 (id=7650): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0100000007000000ff0f0000090000000000000084169c2ec2a2a5ce933c7c253a1f163e32f38104a886c8e21cdb2fb7ab44f94eb7202bb24a93f067c79905d9744fc0f3c323235a5c7fd969a82e445213568f24b4d8f536a20b50165d9a5459a11edf0fdc91555d0ea9cd76031ea928c7f9043f9dbc070f45ec1734fe0993f65ccefc3dc004b1b648beee260e7879f3229e643306464431459040878aaf4223e4510d90ae55eb0b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb3, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f0000000b00)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYBLOB="0000000000000000b702000014008000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x86, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x512f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8946, &(0x7f0000000900)={'veth1_to_hsr\x00', @random='\x00\x00\x00 \x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1e, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 342.523658ms ago: executing program 4 (id=7651): socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4889ae50, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000200)=ANY=[], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00515900060500000000040000090000000100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000100"/28], 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000002c00)=ANY=[@ANYBLOB="9feb01001800000000000000340000003400000002000000000000000000000300000000020000000200000000000000000000000000000105da73a2400000000000000000000009"], 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r1 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x805, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000b40)) close(r3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x2, 0x8, 0x0, 0x0, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffd, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000c80)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x71, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_clone(0x2202000, &(0x7f0000000180)="a055766360d6bbb187402dac80c33bfebd716e93492b96449588", 0x1a, &(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)="8a0f0d6c0320aea09d51563ed4") bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r5, 0x0, 0x0}, 0x10) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r5, 0x0, 0x0}, 0x10) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001340)="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", 0xfef}], 0x1}, 0x20000001) recvmsg$unix(r6, &(0x7f0000000580)={0x0, 0x2000000, 0x0}, 0x10002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 245.925689ms ago: executing program 3 (id=7652): r0 = perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x8f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x8000, 0x0) r2 = perf_event_open$cgroup(&(0x7f0000000300)={0x5, 0x80, 0x4f, 0x9, 0x9, 0x9, 0x0, 0xe, 0x80a, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x1000, 0x9}, 0x10040, 0xe9e5, 0xa, 0x8, 0x5, 0x2, 0x8, 0x0, 0x9, 0x0, 0x10}, 0xffffffffffffffff, 0x2, r0, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0xc2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22ffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000001c0)={0x2, 0x0, [0x0, 0x0]}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000040), 0x4) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0xb, &(0x7f0000000b00)=@framed={{}, [@printk={@s, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x20000000}, {0x85, 0x0, 0x0, 0x72}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 204.958999ms ago: executing program 0 (id=7653): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x2, &(0x7f0000000200)=[{0x6c}, {0x6}]}) write$cgroup_type(r2, &(0x7f0000000180), 0x40010) 83.40127ms ago: executing program 1 (id=7654): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) close(0xffffffffffffffff) write$cgroup_devices(0xffffffffffffffff, 0x0, 0xffdd) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000340)={0x1b, 0x0, 0x0, 0x5, 0x0, r0, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000180)}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a80)={0xffffffffffffffff, 0xe0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000800)=[0x0], &(0x7f0000000840)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xed, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}, {}], 0x38, 0x10, &(0x7f00000008c0), &(0x7f0000000900), 0x8, 0xc7, 0x8, 0x8, &(0x7f0000000940)}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r4, 0x1, 0x2a, &(0x7f0000000100), 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000bc0)={0x11, 0x24, &(0x7f0000000580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0xe}, @generic={0xff, 0x5, 0x0, 0xffff, 0xfffffffa}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x8}, @ringbuf_query, @map_fd={0x18, 0x5, 0x1, 0x0, r1}, @alu={0x4, 0x0, 0x2, 0x5, 0x4, 0x6, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x835}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000006c0)='GPL\x00', 0x1, 0x29, &(0x7f0000000780)=""/41, 0x41000, 0x5, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000ac0)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000b00)={0x4, 0x8, 0x595e, 0xfffffffb}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000b40)=[r0, r0, r0, r0], &(0x7f0000000b80), 0x10, 0x4, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0}, 0x18) mkdir(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xd68210}], 0x1, 0x0, 0x1f00000000000000, 0x200000}, 0x1f00) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x40089000, 0x0, 0x0, 0x0, 0x0, 0x0) 65.89379ms ago: executing program 0 (id=7655): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f7ff0000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 0s ago: executing program 0 (id=7657): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00'}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0xbe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r2, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080), &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb3, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x78, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f0000000b00)=ANY=[@ANYRESDEC=r0, @ANYRES32, @ANYBLOB="0000000000000000b702000014008000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x86, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x512f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8946, &(0x7f0000000900)={'veth1_to_hsr\x00', @random='\x00\x00\x00 \x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1e, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) kernel console output (not intermixed with test programs): m with bpf_probe_write_user helper that may corrupt user memory! [ 737.803615][T15930] device wg2 left promiscuous mode [ 737.924001][T15931] device wg2 entered promiscuous mode [ 739.707057][T15977] syz.2.5514[15977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 739.707144][T15977] syz.2.5514[15977] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 739.864652][T15977] device wg2 entered promiscuous mode [ 741.649476][T16010] device wg2 left promiscuous mode [ 742.151762][T16026] syz.2.5528[16026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.151843][T16026] syz.2.5528[16026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 742.268283][T16027] device wg2 entered promiscuous mode [ 744.726450][T16067] syz.0.5542[16067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.726536][T16067] syz.0.5542[16067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 744.803981][T16067] device wg2 entered promiscuous mode [ 748.716210][T16144] device wg2 left promiscuous mode [ 748.844680][T16146] device wg2 entered promiscuous mode [ 750.091888][T16174] syz.0.5576[16174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 750.091977][T16174] syz.0.5576[16174] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 750.245258][T16177] device wg2 left promiscuous mode [ 750.402447][T16174] device wg2 entered promiscuous mode [ 751.319389][T16194] device wg2 left promiscuous mode [ 754.423614][T16258] syz.0.5600[16258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.423693][T16258] syz.0.5600[16258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.470116][T16258] device wg2 left promiscuous mode [ 754.595852][T16264] device wg2 entered promiscuous mode [ 754.605176][T16260] device wg2 left promiscuous mode [ 757.251200][T16302] device wg2 left promiscuous mode [ 757.344575][T16303] device wg2 entered promiscuous mode [ 757.753717][T16310] device wg2 left promiscuous mode [ 758.172827][T16327] syz.0.5622[16327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.172905][T16327] syz.0.5622[16327] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.308157][T16328] device wg2 left promiscuous mode [ 758.416636][T16327] device wg2 entered promiscuous mode [ 758.544319][T16335] device wg2 left promiscuous mode [ 758.607818][T16335] device wg2 entered promiscuous mode [ 758.797192][T16345] syz.3.5628[16345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.797275][T16345] syz.3.5628[16345] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 758.901429][T16345] device wg2 entered promiscuous mode [ 759.565672][T16364] device wg2 left promiscuous mode [ 760.208191][T16372] device wg2 left promiscuous mode [ 760.246757][T16378] syz.2.5636[16378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.246835][T16378] syz.2.5636[16378] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.338455][T16381] device wg2 entered promiscuous mode [ 760.372152][T16378] device wg2 entered promiscuous mode [ 760.479981][T16389] syz.2.5642[16389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.480063][T16389] syz.2.5642[16389] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 760.693762][T16389] device wg2 left promiscuous mode [ 760.822904][T16394] device wg2 entered promiscuous mode [ 762.245184][T16430] device wg2 entered promiscuous mode [ 762.334466][T16432] device wg2 entered promiscuous mode [ 764.104869][T16463] device wg2 left promiscuous mode [ 764.931445][T16485] device wg2 left promiscuous mode [ 764.994763][T16485] device wg2 entered promiscuous mode [ 765.085987][T16488] device wg2 entered promiscuous mode [ 765.292256][T16491] device wg2 left promiscuous mode [ 765.650506][T16499] device wg2 left promiscuous mode [ 765.687228][T16504] device wg2 entered promiscuous mode [ 766.354099][T16526] device wg2 left promiscuous mode [ 766.498351][T16531] device wg2 entered promiscuous mode [ 766.520271][T16530] device wg2 left promiscuous mode [ 768.375892][T16572] device wg2 left promiscuous mode [ 768.464777][T16572] device wg2 entered promiscuous mode [ 768.683607][T16576] device wg2 left promiscuous mode [ 769.230852][T16585] device wg2 entered promiscuous mode [ 769.876244][T16606] device wg2 left promiscuous mode [ 770.031831][T16607] device wg2 entered promiscuous mode [ 772.648147][T16656] device wg2 entered promiscuous mode [ 774.581277][T16698] device wg2 entered promiscuous mode [ 774.843052][T16704] device wg2 left promiscuous mode [ 774.918631][T16707] device wg2 entered promiscuous mode [ 775.390636][T16720] device wg2 left promiscuous mode [ 775.474644][T16721] device wg2 left promiscuous mode [ 775.515577][T16723] device wg2 entered promiscuous mode [ 777.117432][T16749] device wg2 left promiscuous mode [ 777.215986][T16749] device wg2 entered promiscuous mode [ 779.208913][T16796] device wg2 left promiscuous mode [ 779.356351][T16799] device wg2 entered promiscuous mode [ 781.746093][T16861] device wg2 left promiscuous mode [ 782.218082][T16874] device wg2 left promiscuous mode [ 785.784188][T16956] device wg2 left promiscuous mode [ 785.867083][T16958] device wg2 entered promiscuous mode [ 786.065657][T16965] device wg2 entered promiscuous mode [ 786.339961][T16977] device wg2 left promiscuous mode [ 787.281154][T17008] device wg2 left promiscuous mode [ 787.313781][T17012] device wg2 entered promiscuous mode [ 787.501753][T17014] device wg2 left promiscuous mode [ 787.596806][T17014] device wg2 entered promiscuous mode [ 788.955253][T17047] device wg2 left promiscuous mode [ 789.303495][T17051] device wg2 entered promiscuous mode [ 790.426138][T17071] device wg2 entered promiscuous mode [ 790.666532][T17082] device wg2 left promiscuous mode [ 790.730323][T17083] device wg2 entered promiscuous mode [ 790.787418][T17082] device wg2 entered promiscuous mode [ 793.056219][T17131] device wg2 entered promiscuous mode [ 793.277131][T17138] device wg2 left promiscuous mode [ 793.801158][T17149] device wg2 left promiscuous mode [ 793.947875][T17157] device wg2 left promiscuous mode [ 794.002902][T17158] device wg2 entered promiscuous mode [ 794.077290][T17161] device wg2 left promiscuous mode [ 794.134856][T17166] device wg2 entered promiscuous mode [ 794.236734][T17169] device wg2 entered promiscuous mode [ 794.290769][T17173] device wg2 left promiscuous mode [ 796.001425][T17218] device wg2 entered promiscuous mode [ 796.284344][T17224] device wg2 left promiscuous mode [ 797.010788][T17241] device wg2 left promiscuous mode [ 797.029044][T17235] device wg2 entered promiscuous mode [ 797.214766][T17250] device wg2 left promiscuous mode [ 797.927791][T17260] device wg2 entered promiscuous mode [ 798.028185][T17262] device wg2 left promiscuous mode [ 798.696155][T17274] device wg2 entered promiscuous mode [ 799.800119][T17300] device wg2 left promiscuous mode [ 799.936811][T17302] device wg2 entered promiscuous mode [ 800.091892][T17308] device wg2 left promiscuous mode [ 800.153400][T17308] device wg2 entered promiscuous mode [ 801.468296][T17317] bridge0: port 1(bridge_slave_0) entered blocking state [ 801.554367][T17317] bridge0: port 1(bridge_slave_0) entered disabled state [ 801.614068][T17317] device bridge_slave_0 entered promiscuous mode [ 801.695386][T17317] bridge0: port 2(bridge_slave_1) entered blocking state [ 801.809437][T17317] bridge0: port 2(bridge_slave_1) entered disabled state [ 801.889946][T17317] device bridge_slave_1 entered promiscuous mode [ 802.064087][T11044] device bridge_slave_1 left promiscuous mode [ 802.075830][T11044] bridge0: port 2(bridge_slave_1) entered disabled state [ 802.127136][T11044] device bridge_slave_0 left promiscuous mode [ 802.171314][T11044] bridge0: port 1(bridge_slave_0) entered disabled state [ 802.226006][T11044] device veth1_macvtap left promiscuous mode [ 802.267606][T11044] device veth0_vlan left promiscuous mode [ 803.126196][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 803.133962][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 803.159167][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 803.226474][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 803.234616][ T2069] bridge0: port 1(bridge_slave_0) entered blocking state [ 803.241504][ T2069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 803.295531][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 803.412455][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 803.463062][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 803.479386][ T2069] bridge0: port 2(bridge_slave_1) entered blocking state [ 803.486352][ T2069] bridge0: port 2(bridge_slave_1) entered forwarding state [ 803.630832][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 803.669322][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 803.769559][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 803.813881][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 803.858398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 803.928421][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 803.990228][T17317] device veth0_vlan entered promiscuous mode [ 803.997234][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 804.005761][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 804.106172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 804.125196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 804.137934][T17317] device veth1_macvtap entered promiscuous mode [ 804.176821][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 804.185426][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 804.193619][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 804.283502][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 804.292222][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 804.379079][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 804.400594][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 804.680850][T17374] device wg2 entered promiscuous mode [ 806.527775][T17396] device wg2 entered promiscuous mode [ 808.961669][T17449] device wg2 left promiscuous mode [ 809.022069][T17451] device wg2 entered promiscuous mode [ 811.467520][T17488] device wg2 left promiscuous mode [ 811.490676][T17488] device wg2 entered promiscuous mode [ 812.185297][T17503] device wg2 entered promiscuous mode [ 813.733403][T17524] device wg2 left promiscuous mode [ 813.808910][T17525] device wg2 entered promiscuous mode [ 815.074593][T17543] bridge0: port 1(bridge_slave_0) entered blocking state [ 815.126779][T17543] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.170655][T17543] device bridge_slave_0 entered promiscuous mode [ 815.208576][T17543] bridge0: port 2(bridge_slave_1) entered blocking state [ 815.215648][T17543] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.223228][T17543] device bridge_slave_1 entered promiscuous mode [ 815.244735][T17558] device wg2 left promiscuous mode [ 815.283808][T11044] device bridge_slave_1 left promiscuous mode [ 815.289856][T11044] bridge0: port 2(bridge_slave_1) entered disabled state [ 815.297194][T11044] device bridge_slave_0 left promiscuous mode [ 815.303776][T11044] bridge0: port 1(bridge_slave_0) entered disabled state [ 815.319379][T11044] device veth1_macvtap left promiscuous mode [ 815.325308][T11044] device veth0_vlan left promiscuous mode [ 816.771138][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 816.794147][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 816.861627][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 816.879934][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 816.894923][ T2069] bridge0: port 1(bridge_slave_0) entered blocking state [ 816.901832][ T2069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 816.953523][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 817.059772][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 817.124690][ T2069] bridge0: port 2(bridge_slave_1) entered blocking state [ 817.131614][ T2069] bridge0: port 2(bridge_slave_1) entered forwarding state [ 817.224970][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 817.306698][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 817.328041][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 817.415379][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 817.423946][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 817.432229][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 817.441260][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 817.523387][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 817.574809][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 817.630077][T17543] device veth0_vlan entered promiscuous mode [ 817.666364][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 817.685776][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 817.750527][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 817.760558][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 817.804911][T17543] device veth1_macvtap entered promiscuous mode [ 817.847707][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 817.855805][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 817.877380][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 817.888772][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 817.912114][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 818.726232][T17612] bridge0: port 1(bridge_slave_0) entered blocking state [ 818.808765][T17612] bridge0: port 1(bridge_slave_0) entered disabled state [ 818.895034][T17612] device bridge_slave_0 entered promiscuous mode [ 818.955118][T17612] bridge0: port 2(bridge_slave_1) entered blocking state [ 819.065113][T17612] bridge0: port 2(bridge_slave_1) entered disabled state [ 819.160655][T17612] device bridge_slave_1 entered promiscuous mode [ 819.286597][T17635] syz.4.6036[17635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 819.286668][T17635] syz.4.6036[17635] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 819.301185][T17635] device wg2 entered promiscuous mode [ 820.108144][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 820.119940][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 820.182474][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 820.239756][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 820.329166][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 820.336081][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 820.450364][T11044] device bridge_slave_1 left promiscuous mode [ 820.460967][T11044] bridge0: port 2(bridge_slave_1) entered disabled state [ 820.524239][T11044] device bridge_slave_0 left promiscuous mode [ 820.560710][T11044] bridge0: port 1(bridge_slave_0) entered disabled state [ 820.583416][T11044] device veth1_macvtap left promiscuous mode [ 820.608607][T11044] device veth0_vlan left promiscuous mode [ 821.209922][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 821.226310][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 821.277147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 821.333914][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 821.340817][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 821.377042][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 821.399847][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 821.469456][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 821.541180][T17664] syz.0.6046[17664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 821.541267][T17664] syz.0.6046[17664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 821.544851][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 821.710932][T17663] device wg2 left promiscuous mode [ 821.735584][T17667] device wg2 entered promiscuous mode [ 821.748202][T17668] device wg2 entered promiscuous mode [ 821.781108][T17612] device veth0_vlan entered promiscuous mode [ 821.788325][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 821.796293][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 821.829057][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 821.852121][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 821.876620][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 821.886552][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 821.988777][T17612] device veth1_macvtap entered promiscuous mode [ 822.057383][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 822.075543][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 822.083864][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 822.124091][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 822.161681][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 823.277987][ T9047] syz-executor (9047) used greatest stack depth: 20096 bytes left [ 823.536032][T17708] device wg2 left promiscuous mode [ 823.607619][T17708] device wg2 entered promiscuous mode [ 823.675738][T17705] bridge0: port 1(bridge_slave_0) entered blocking state [ 823.727756][T17705] bridge0: port 1(bridge_slave_0) entered disabled state [ 823.819529][T17705] device bridge_slave_0 entered promiscuous mode [ 824.014363][T17705] bridge0: port 2(bridge_slave_1) entered blocking state [ 824.073426][T17705] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.139836][T17705] device bridge_slave_1 entered promiscuous mode [ 824.469347][T17724] device wg2 left promiscuous mode [ 824.704202][ T10] device bridge_slave_1 left promiscuous mode [ 824.713795][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 824.764490][ T10] device bridge_slave_0 left promiscuous mode [ 824.808591][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 824.876169][ T10] device veth1_macvtap left promiscuous mode [ 824.943316][ T10] device veth0_vlan left promiscuous mode [ 826.328726][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 826.350252][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 826.444654][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 826.499702][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 826.508881][ T2069] bridge0: port 1(bridge_slave_0) entered blocking state [ 826.515774][ T2069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 826.588968][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 826.655777][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 826.722886][ T2069] bridge0: port 2(bridge_slave_1) entered blocking state [ 826.729793][ T2069] bridge0: port 2(bridge_slave_1) entered forwarding state [ 826.830431][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 826.934192][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 827.028880][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 827.079550][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 827.196172][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 827.277648][T17705] device veth0_vlan entered promiscuous mode [ 827.330863][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 827.369871][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 827.389062][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 827.458082][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 827.580036][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 827.609765][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 827.709843][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 827.731008][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 827.772079][T17705] device veth1_macvtap entered promiscuous mode [ 827.900588][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 827.908421][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 827.970034][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 828.084677][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 828.151757][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 829.941052][ T2069] device bridge_slave_1 left promiscuous mode [ 829.950385][ T2069] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.980917][ T2069] device bridge_slave_0 left promiscuous mode [ 829.986896][ T2069] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.147370][ T2069] device veth1_macvtap left promiscuous mode [ 830.211934][ T2069] device veth0_vlan left promiscuous mode [ 831.114290][T17795] bridge0: port 1(bridge_slave_0) entered blocking state [ 831.236836][T17795] bridge0: port 1(bridge_slave_0) entered disabled state [ 831.402213][T17795] device bridge_slave_0 entered promiscuous mode [ 831.508017][T17795] bridge0: port 2(bridge_slave_1) entered blocking state [ 831.535809][T17795] bridge0: port 2(bridge_slave_1) entered disabled state [ 831.544445][T17795] device bridge_slave_1 entered promiscuous mode [ 831.723450][T17829] device wg2 left promiscuous mode [ 831.786437][T17830] device wg2 entered promiscuous mode [ 832.567834][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 832.588494][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 832.713448][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 832.762673][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 832.826913][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 832.833826][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 832.964647][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 833.053068][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 833.119792][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 833.244796][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 833.251712][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 833.420646][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 833.440259][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 833.474162][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 833.541959][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 833.551026][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 833.572392][T17795] device veth0_vlan entered promiscuous mode [ 833.606257][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 833.646864][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 833.768015][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 833.831651][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 833.960972][T17795] device veth1_macvtap entered promiscuous mode [ 834.067623][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 834.092876][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 834.184042][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 834.229732][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 834.275500][ T2069] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 838.532601][T17922] device wg2 entered promiscuous mode [ 838.844797][T17933] device wg2 entered promiscuous mode [ 840.622244][T17956] syz.3.6130[17956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 840.622326][T17956] syz.3.6130[17956] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 840.674325][T17957] device wg2 left promiscuous mode [ 840.734115][T17957] device wg2 entered promiscuous mode [ 842.140165][T17978] syz.3.6138[17978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 842.140261][T17978] syz.3.6138[17978] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 842.282218][T17981] device wg2 left promiscuous mode [ 842.516501][T17978] device wg2 entered promiscuous mode [ 843.527922][T18004] syz.1.6145[18004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 843.527995][T18004] syz.1.6145[18004] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 843.612801][T18006] device wg2 entered promiscuous mode [ 844.277321][T18020] syz.2.6150[18020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 844.277404][T18020] syz.2.6150[18020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 844.480012][T18020] device wg2 entered promiscuous mode [ 846.170066][T18051] syz.0.6159[18051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 846.170150][T18051] syz.0.6159[18051] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 846.251930][T18054] device wg2 left promiscuous mode [ 846.386802][T18051] device wg2 entered promiscuous mode [ 848.093971][T18076] device wg2 left promiscuous mode [ 848.175003][T18077] device wg2 entered promiscuous mode [ 850.086661][T18105] syz.1.6177[18105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 850.086743][T18105] syz.1.6177[18105] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 850.172025][T18105] device wg2 left promiscuous mode [ 850.192752][T18105] device wg2 entered promiscuous mode [ 851.090776][T18122] device wg2 left promiscuous mode [ 852.124817][T18153] syz.4.6190[18153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 852.124900][T18153] syz.4.6190[18153] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 852.245262][T18153] device wg2 left promiscuous mode [ 852.336851][T18157] device wg2 entered promiscuous mode [ 853.476749][T18176] device wg2 left promiscuous mode [ 854.236254][T18192] syz.2.6205[18192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 854.236339][T18192] syz.2.6205[18192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 854.321956][T18192] device wg2 entered promiscuous mode [ 854.674536][T18205] syz.2.6210[18205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 854.674617][T18205] syz.2.6210[18205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 854.783223][T18207] device wg2 left promiscuous mode [ 854.906288][T18205] device wg2 entered promiscuous mode [ 856.032877][T18237] syz.0.6220[18237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.039339][T18237] syz.0.6220[18237] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.156901][T18237] device wg2 entered promiscuous mode [ 856.318482][T18245] syz.1.6223[18245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.318561][T18245] syz.1.6223[18245] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 856.357103][T18245] device wg2 left promiscuous mode [ 856.420947][T18251] device wg2 entered promiscuous mode [ 858.740343][T18304] syz.3.6242[18304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 858.740427][T18304] syz.3.6242[18304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 858.852785][T18304] device wg2 left promiscuous mode [ 858.992071][T18307] device wg2 entered promiscuous mode [ 861.201395][T18354] syz.3.6255[18354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 861.201476][T18354] syz.3.6255[18354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 861.256834][T18354] device wg2 left promiscuous mode [ 861.320982][T18354] device wg2 entered promiscuous mode [ 863.464967][T18386] syz.4.6265[18386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.465052][T18386] syz.4.6265[18386] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.577224][T18386] device wg2 left promiscuous mode [ 863.785905][T18387] device wg2 entered promiscuous mode [ 863.964957][T18396] syz.2.6267[18396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.965033][T18396] syz.2.6267[18396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 864.093141][T18396] device wg2 left promiscuous mode [ 864.357183][T18398] device wg2 entered promiscuous mode [ 866.430519][T18448] syz.1.6282[18448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 866.430603][T18448] syz.1.6282[18448] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 866.471406][T18448] device wg2 left promiscuous mode [ 866.652401][T18448] device wg2 entered promiscuous mode [ 868.320084][T18477] syz.2.6289[18477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 868.320169][T18477] syz.2.6289[18477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 868.463980][T18479] device wg2 left promiscuous mode [ 868.546146][T18477] device wg2 entered promiscuous mode [ 869.580000][T18499] syz.4.6294[18499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 869.580079][T18499] syz.4.6294[18499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 869.737990][T18502] device wg2 left promiscuous mode [ 869.881113][T18499] device wg2 entered promiscuous mode [ 870.740849][T18530] syz.3.6300[18530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 870.740934][T18530] syz.3.6300[18530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 870.956128][T18531] device wg2 left promiscuous mode [ 871.094691][T18530] device wg2 entered promiscuous mode [ 871.241643][T18535] syz.4.6301[18535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 871.241729][T18535] syz.4.6301[18535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 871.327924][T18535] device wg2 left promiscuous mode [ 871.379713][T18535] device wg2 entered promiscuous mode [ 880.869547][T18728] syz.0.6358[18728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 880.869627][T18728] syz.0.6358[18728] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 881.098930][T18728] device wg2 left promiscuous mode [ 881.186192][T18729] device wg2 entered promiscuous mode [ 885.524293][T18791] syz.4.6379[18791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.524368][T18791] syz.4.6379[18791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 885.570276][T18791] device wg2 left promiscuous mode [ 887.176369][T18821] syz.2.6386[18821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 887.176446][T18821] syz.2.6386[18821] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 887.307769][T18821] device wg2 left promiscuous mode [ 887.446509][T18828] device wg2 entered promiscuous mode [ 887.883945][T18840] syz.4.6391[18840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 887.884025][T18840] syz.4.6391[18840] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 888.071737][T18842] device wg2 entered promiscuous mode [ 890.898166][T18883] syz.0.6403[18883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 890.898239][T18883] syz.0.6403[18883] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 890.923706][T18883] device wg2 left promiscuous mode [ 893.188435][T18921] syz.2.6415[18921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.188523][T18921] syz.2.6415[18921] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.227894][T18921] device wg2 left promiscuous mode [ 893.302616][T18921] device wg2 entered promiscuous mode [ 893.365498][T18926] syz.0.6426[18926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.365570][T18926] syz.0.6426[18926] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 893.483003][T18926] device wg2 entered promiscuous mode [ 896.064176][T18965] syz.2.6429[18965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 896.064261][T18965] syz.2.6429[18965] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 896.142362][T18967] device wg2 left promiscuous mode [ 896.182417][T18970] syz.1.6430[18970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 896.182492][T18970] syz.1.6430[18970] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 896.217671][T18965] device wg2 entered promiscuous mode [ 896.329483][T18970] device wg2 left promiscuous mode [ 896.338758][T18974] device wg2 entered promiscuous mode [ 897.889631][T19019] FAULT_INJECTION: forcing a failure. [ 897.889631][T19019] name failslab, interval 1, probability 0, space 0, times 0 [ 898.045709][T19019] CPU: 1 PID: 19019 Comm: syz.4.6444 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 898.055482][T19019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 898.065355][T19019] Call Trace: [ 898.068466][T19019] [ 898.071242][T19019] dump_stack_lvl+0x151/0x1b7 [ 898.075767][T19019] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 898.081053][T19019] dump_stack+0x15/0x1e [ 898.085041][T19019] should_fail_ex+0x3d0/0x520 [ 898.089557][T19019] __should_failslab+0xaf/0xf0 [ 898.094161][T19019] should_failslab+0x9/0x20 [ 898.098495][T19019] kmem_cache_alloc_node+0x42/0x330 [ 898.103527][T19019] ? __alloc_skb+0xcc/0x2d0 [ 898.107870][T19019] __alloc_skb+0xcc/0x2d0 [ 898.112035][T19019] alloc_skb_with_frags+0xa6/0x680 [ 898.116982][T19019] ? 0xffffffffa0000950 [ 898.120979][T19019] sock_alloc_send_pskb+0x915/0xa50 [ 898.126012][T19019] ? sock_kzfree_s+0x60/0x60 [ 898.130441][T19019] ? kstrtoull+0x1cd/0x2e0 [ 898.134775][T19019] ? _parse_integer+0x40/0x40 [ 898.139295][T19019] tun_get_user+0xfaf/0x3a90 [ 898.143829][T19019] ? _kstrtol+0x150/0x150 [ 898.147992][T19019] ? tun_do_read+0x2000/0x2000 [ 898.152590][T19019] ? ref_tracker_alloc+0x31d/0x450 [ 898.157536][T19019] ? ref_tracker_dir_print+0x160/0x160 [ 898.162840][T19019] ? avc_policy_seqno+0x1b/0x70 [ 898.167526][T19019] ? tun_get+0xe9/0x120 [ 898.171515][T19019] tun_chr_write_iter+0x129/0x210 [ 898.176375][T19019] vfs_write+0xaf6/0xed0 [ 898.180448][T19019] ? __kasan_slab_free+0x11/0x20 [ 898.185230][T19019] ? file_end_write+0x1c0/0x1c0 [ 898.189912][T19019] ? __fget_files+0x2cb/0x330 [ 898.194435][T19019] ? __fdget_pos+0x204/0x390 [ 898.198867][T19019] ? ksys_write+0x77/0x2c0 [ 898.203105][T19019] ksys_write+0x199/0x2c0 [ 898.207463][T19019] ? __ia32_sys_read+0x90/0x90 [ 898.212057][T19019] ? debug_smp_processor_id+0x17/0x20 [ 898.217260][T19019] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 898.223169][T19019] __x64_sys_write+0x7b/0x90 [ 898.227648][T19019] x64_sys_call+0x2f/0x9a0 [ 898.231853][T19019] do_syscall_64+0x3b/0xb0 [ 898.236095][T19019] ? clear_bhb_loop+0x55/0xb0 [ 898.240614][T19019] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 898.246344][T19019] RIP: 0033:0x7fe528f7e759 [ 898.250597][T19019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 898.270295][T19019] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 898.278541][T19019] RAX: ffffffffffffffda RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 898.286359][T19019] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 898.294162][T19019] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 898.301973][T19019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.309782][T19019] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 898.317603][T19019] [ 898.420472][T19025] syz.1.6446[19025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 898.420558][T19025] syz.1.6446[19025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 898.437811][T19027] syz.0.6447[19027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 898.502706][T19027] syz.0.6447[19027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 898.584191][T19027] device wg2 left promiscuous mode [ 898.647253][T19033] device wg2 entered promiscuous mode [ 900.430498][T19069] FAULT_INJECTION: forcing a failure. [ 900.430498][T19069] name failslab, interval 1, probability 0, space 0, times 0 [ 900.442922][T19069] CPU: 1 PID: 19069 Comm: syz.4.6458 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 900.452648][T19069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 900.462540][T19069] Call Trace: [ 900.465657][T19069] [ 900.468437][T19069] dump_stack_lvl+0x151/0x1b7 [ 900.472949][T19069] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 900.478248][T19069] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 900.483545][T19069] ? _raw_spin_lock+0x1b0/0x1b0 [ 900.488233][T19069] ? _raw_spin_lock+0x1b0/0x1b0 [ 900.492913][T19069] dump_stack+0x15/0x1e [ 900.496902][T19069] should_fail_ex+0x3d0/0x520 [ 900.501420][T19069] __should_failslab+0xaf/0xf0 [ 900.506020][T19069] ? ref_tracker_alloc+0x138/0x450 [ 900.510964][T19069] should_failslab+0x9/0x20 [ 900.515303][T19069] __kmem_cache_alloc_node+0x3d/0x2a0 [ 900.520515][T19069] ? ref_tracker_alloc+0x138/0x450 [ 900.525458][T19069] kmalloc_trace+0x2a/0xa0 [ 900.529801][T19069] ref_tracker_alloc+0x138/0x450 [ 900.534573][T19069] ? ref_tracker_dir_print+0x160/0x160 [ 900.539868][T19069] ? __kasan_check_read+0x11/0x20 [ 900.544729][T19069] linkwatch_fire_event+0x1e4/0x240 [ 900.549764][T19069] netif_carrier_off+0xa7/0xd0 [ 900.554367][T19069] __tun_detach+0xc71/0x1510 [ 900.558784][T19069] ? bit_wait_io_timeout+0x120/0x120 [ 900.563912][T19069] tun_chr_close+0x92/0x140 [ 900.568343][T19069] ? tun_chr_open+0x530/0x530 [ 900.572857][T19069] __fput+0x1e5/0x870 [ 900.576670][T19069] ____fput+0x15/0x20 [ 900.580486][T19069] task_work_run+0x24d/0x2e0 [ 900.584919][T19069] ? task_work_cancel+0x2e0/0x2e0 [ 900.589773][T19069] ? filp_close+0x105/0x150 [ 900.594129][T19069] exit_to_user_mode_loop+0x94/0xa0 [ 900.599143][T19069] exit_to_user_mode_prepare+0x5a/0xa0 [ 900.604436][T19069] syscall_exit_to_user_mode+0x26/0x130 [ 900.609819][T19069] do_syscall_64+0x47/0xb0 [ 900.614082][T19069] ? clear_bhb_loop+0x55/0xb0 [ 900.618591][T19069] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 900.624311][T19069] RIP: 0033:0x7fe528f7e759 [ 900.628566][T19069] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 900.648100][T19069] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 900.656339][T19069] RAX: 0000000000000000 RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 900.664149][T19069] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 900.671961][T19069] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 900.679858][T19069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 900.687668][T19069] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 900.695486][T19069] [ 900.698347][T19069] memory allocation failure, unreliable refcount tracker. [ 900.775047][T19075] syz.2.6460[19075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 900.775129][T19075] syz.2.6460[19075] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 900.880997][ T28] audit: type=1400 audit(1731991585.508:142): avc: denied { create } for pid=19077 comm="syz.4.6462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 901.068024][ T28] audit: type=1400 audit(1731991585.568:143): avc: denied { create } for pid=19077 comm="syz.4.6462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 902.170266][T19098] FAULT_INJECTION: forcing a failure. [ 902.170266][T19098] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 902.319416][T19098] CPU: 1 PID: 19098 Comm: syz.3.6468 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 902.329165][T19098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 902.339153][T19098] Call Trace: [ 902.342270][T19098] [ 902.345048][T19098] dump_stack_lvl+0x151/0x1b7 [ 902.349561][T19098] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 902.354861][T19098] dump_stack+0x15/0x1e [ 902.358848][T19098] should_fail_ex+0x3d0/0x520 [ 902.363452][T19098] should_fail_alloc_page+0x68/0x90 [ 902.368482][T19098] prepare_alloc_pages+0x14e/0x6f0 [ 902.373429][T19098] ? putname+0xfa/0x150 [ 902.377423][T19098] ? __alloc_pages_bulk+0xda0/0xda0 [ 902.382456][T19098] ? _kstrtol+0x150/0x150 [ 902.386622][T19098] __alloc_pages+0x162/0x610 [ 902.391055][T19098] ? prep_new_page+0x110/0x110 [ 902.395658][T19098] __get_free_pages+0xe/0x30 [ 902.400082][T19098] mem_rw+0x8a/0x3c0 [ 902.403813][T19098] mem_write+0x33/0x40 [ 902.407707][T19098] ? mem_read+0x40/0x40 [ 902.411704][T19098] vfs_write+0x41d/0xed0 [ 902.415781][T19098] ? __kasan_slab_free+0x11/0x20 [ 902.420560][T19098] ? file_end_write+0x1c0/0x1c0 [ 902.425239][T19098] ? mutex_lock+0xb1/0x1e0 [ 902.429495][T19098] ? bit_wait_io_timeout+0x120/0x120 [ 902.434619][T19098] ? __fdget_pos+0x2e2/0x390 [ 902.439040][T19098] ? ksys_write+0x77/0x2c0 [ 902.443303][T19098] ksys_write+0x199/0x2c0 [ 902.447460][T19098] ? __this_cpu_preempt_check+0x13/0x20 [ 902.452848][T19098] ? __ia32_sys_read+0x90/0x90 [ 902.457441][T19098] ? debug_smp_processor_id+0x17/0x20 [ 902.462650][T19098] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 902.468552][T19098] __x64_sys_write+0x7b/0x90 [ 902.472977][T19098] x64_sys_call+0x2f/0x9a0 [ 902.477230][T19098] do_syscall_64+0x3b/0xb0 [ 902.481491][T19098] ? clear_bhb_loop+0x55/0xb0 [ 902.486085][T19098] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 902.491809][T19098] RIP: 0033:0x7f93f517e759 [ 902.496153][T19098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 902.515606][T19098] RSP: 002b:00007f93f5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 902.523839][T19098] RAX: ffffffffffffffda RBX: 00007f93f5335f80 RCX: 00007f93f517e759 [ 902.531651][T19098] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 902.539470][T19098] RBP: 00007f93f5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 902.547283][T19098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 902.555085][T19098] R13: 0000000000000000 R14: 00007f93f5335f80 R15: 00007ffef24d18e8 [ 902.563079][T19098] [ 902.803778][ T28] audit: type=1400 audit(1731991587.428:144): avc: denied { setopt } for pid=19107 comm="syz.1.6471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 902.863258][ T28] audit: type=1400 audit(1731991587.478:145): avc: denied { setopt } for pid=19111 comm="syz.2.6472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 902.942937][T19114] syz.1.6473[19114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 902.943022][T19114] syz.1.6473[19114] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 904.861522][T19157] device syzkaller0 entered promiscuous mode [ 904.939497][ T28] audit: type=1400 audit(1731991589.558:146): avc: denied { create } for pid=19161 comm="syz.4.6485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 905.174817][T19167] device syzkaller0 entered promiscuous mode [ 905.238657][T19165] FAULT_INJECTION: forcing a failure. [ 905.238657][T19165] name failslab, interval 1, probability 0, space 0, times 0 [ 905.251211][T19165] CPU: 1 PID: 19165 Comm: syz.3.6486 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 905.260927][T19165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 905.270826][T19165] Call Trace: [ 905.273945][T19165] [ 905.276724][T19165] dump_stack_lvl+0x151/0x1b7 [ 905.281236][T19165] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 905.286535][T19165] dump_stack+0x15/0x1e [ 905.290524][T19165] should_fail_ex+0x3d0/0x520 [ 905.295035][T19165] __should_failslab+0xaf/0xf0 [ 905.299634][T19165] ? ref_tracker_alloc+0x138/0x450 [ 905.304580][T19165] should_failslab+0x9/0x20 [ 905.308922][T19165] __kmem_cache_alloc_node+0x3d/0x2a0 [ 905.314219][T19165] ? ref_tracker_alloc+0x138/0x450 [ 905.319164][T19165] kmalloc_trace+0x2a/0xa0 [ 905.323419][T19165] ref_tracker_alloc+0x138/0x450 [ 905.328193][T19165] ? ref_tracker_dir_print+0x160/0x160 [ 905.333488][T19165] ? __kasan_check_read+0x11/0x20 [ 905.338341][T19165] linkwatch_fire_event+0x1e4/0x240 [ 905.343390][T19165] netif_carrier_off+0xa7/0xd0 [ 905.347973][T19165] __tun_detach+0xc71/0x1510 [ 905.352406][T19165] tun_chr_close+0x92/0x140 [ 905.356740][T19165] ? tun_chr_open+0x530/0x530 [ 905.361251][T19165] __fput+0x1e5/0x870 [ 905.365076][T19165] ____fput+0x15/0x20 [ 905.368903][T19165] task_work_run+0x24d/0x2e0 [ 905.373334][T19165] ? task_work_cancel+0x2e0/0x2e0 [ 905.378187][T19165] ? filp_close+0x105/0x150 [ 905.382518][T19165] exit_to_user_mode_loop+0x94/0xa0 [ 905.387552][T19165] exit_to_user_mode_prepare+0x5a/0xa0 [ 905.392845][T19165] syscall_exit_to_user_mode+0x26/0x130 [ 905.398226][T19165] do_syscall_64+0x47/0xb0 [ 905.402478][T19165] ? clear_bhb_loop+0x55/0xb0 [ 905.406996][T19165] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 905.412720][T19165] RIP: 0033:0x7f93f517e759 [ 905.416974][T19165] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 905.436416][T19165] RSP: 002b:00007f93f5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 905.444661][T19165] RAX: 0000000000000000 RBX: 00007f93f5335f80 RCX: 00007f93f517e759 [ 905.452470][T19165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 905.460284][T19165] RBP: 00007f93f5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 905.468093][T19165] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 905.475904][T19165] R13: 0000000000000000 R14: 00007f93f5335f80 R15: 00007ffef24d18e8 [ 905.483722][T19165] [ 905.521294][T19173] syz.0.6489[19173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 905.521379][T19173] syz.0.6489[19173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 905.650890][T19173] device wg2 left promiscuous mode [ 907.513594][T19204] FAULT_INJECTION: forcing a failure. [ 907.513594][T19204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 907.580941][T19204] CPU: 1 PID: 19204 Comm: syz.2.6500 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 907.590686][T19204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 907.600569][T19204] Call Trace: [ 907.603868][T19204] [ 907.606645][T19204] dump_stack_lvl+0x151/0x1b7 [ 907.611160][T19204] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 907.616456][T19204] dump_stack+0x15/0x1e [ 907.620443][T19204] should_fail_ex+0x3d0/0x520 [ 907.624958][T19204] should_fail+0xb/0x10 [ 907.628956][T19204] should_fail_usercopy+0x1a/0x20 [ 907.633925][T19204] _copy_from_user+0x1e/0xc0 [ 907.638354][T19204] get_user_ifreq+0xd5/0x230 [ 907.642776][T19204] sock_ioctl+0x60d/0x740 [ 907.646941][T19204] ? sock_poll+0x400/0x400 [ 907.651197][T19204] ? __fget_files+0x2cb/0x330 [ 907.655712][T19204] ? security_file_ioctl+0x84/0xb0 [ 907.660656][T19204] ? sock_poll+0x400/0x400 [ 907.664919][T19204] __se_sys_ioctl+0x114/0x190 [ 907.669423][T19204] __x64_sys_ioctl+0x7b/0x90 [ 907.673864][T19204] x64_sys_call+0x98/0x9a0 [ 907.678188][T19204] do_syscall_64+0x3b/0xb0 [ 907.682438][T19204] ? clear_bhb_loop+0x55/0xb0 [ 907.686952][T19204] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 907.692682][T19204] RIP: 0033:0x7fcfb257e759 [ 907.696935][T19204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 907.716377][T19204] RSP: 002b:00007fcfb23ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 907.724706][T19204] RAX: ffffffffffffffda RBX: 00007fcfb2735f80 RCX: 00007fcfb257e759 [ 907.732519][T19204] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000008 [ 907.740420][T19204] RBP: 00007fcfb23ff090 R08: 0000000000000000 R09: 0000000000000000 [ 907.748227][T19204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 907.756042][T19204] R13: 0000000000000000 R14: 00007fcfb2735f80 R15: 00007ffcc58f2d78 [ 907.763879][T19204] [ 910.011499][T19257] FAULT_INJECTION: forcing a failure. [ 910.011499][T19257] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 910.095356][T19257] CPU: 0 PID: 19257 Comm: syz.4.6516 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 910.105203][T19257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 910.115249][T19257] Call Trace: [ 910.118373][T19257] [ 910.121148][T19257] dump_stack_lvl+0x151/0x1b7 [ 910.125670][T19257] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 910.130958][T19257] ? is_bpf_text_address+0x172/0x190 [ 910.136091][T19257] dump_stack+0x15/0x1e [ 910.140177][T19257] should_fail_ex+0x3d0/0x520 [ 910.144697][T19257] should_fail_alloc_page+0x68/0x90 [ 910.149725][T19257] prepare_alloc_pages+0x14e/0x6f0 [ 910.154689][T19257] ? __alloc_pages_bulk+0xda0/0xda0 [ 910.159712][T19257] ? stack_trace_save+0x113/0x1c0 [ 910.164573][T19257] __alloc_pages+0x162/0x610 [ 910.168998][T19257] ? prep_new_page+0x110/0x110 [ 910.173612][T19257] __folio_alloc+0x15/0x40 [ 910.177848][T19257] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 910.183397][T19257] ? avc_has_perm_noaudit+0x348/0x430 [ 910.188732][T19257] ? shmem_replace_folio+0x6a0/0x6a0 [ 910.193844][T19257] ? avc_has_perm_noaudit+0x2dd/0x430 [ 910.199057][T19257] ? xas_load+0x38f/0x3b0 [ 910.203221][T19257] ? __filemap_get_folio+0xaa1/0xae0 [ 910.208346][T19257] ? page_cache_prev_miss+0x410/0x410 [ 910.213554][T19257] ? down_read_trylock+0x319/0x7d0 [ 910.218502][T19257] shmem_get_folio_gfp+0x12d4/0x24b0 [ 910.223628][T19257] ? shmem_get_folio+0xa0/0xa0 [ 910.228230][T19257] ? fault_in_iov_iter_readable+0x49/0x290 [ 910.233983][T19257] ? fault_in_readable+0x172/0x2d0 [ 910.238935][T19257] ? fault_in_readable+0x17c/0x2d0 [ 910.243887][T19257] shmem_write_begin+0x164/0x3a0 [ 910.248648][T19257] ? shmem_writepage+0xe00/0xe00 [ 910.253432][T19257] generic_perform_write+0x2f9/0x5c0 [ 910.258546][T19257] ? generic_file_direct_write+0x6b0/0x6b0 [ 910.264190][T19257] ? __file_remove_privs+0x640/0x640 [ 910.269306][T19257] ? generic_write_checks+0x15c/0x1c0 [ 910.274526][T19257] __generic_file_write_iter+0x174/0x3a0 [ 910.279982][T19257] generic_file_write_iter+0xb1/0x310 [ 910.285190][T19257] vfs_write+0xaf6/0xed0 [ 910.289263][T19257] ? __kasan_slab_free+0x11/0x20 [ 910.294045][T19257] ? file_end_write+0x1c0/0x1c0 [ 910.298730][T19257] ? mutex_lock+0xb1/0x1e0 [ 910.302979][T19257] ? bit_wait_io_timeout+0x120/0x120 [ 910.308104][T19257] ? __fdget_pos+0x2e2/0x390 [ 910.312535][T19257] ? ksys_write+0x77/0x2c0 [ 910.316780][T19257] ksys_write+0x199/0x2c0 [ 910.320944][T19257] ? __this_cpu_preempt_check+0x13/0x20 [ 910.326328][T19257] ? __ia32_sys_read+0x90/0x90 [ 910.330926][T19257] ? debug_smp_processor_id+0x17/0x20 [ 910.336133][T19257] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 910.342036][T19257] __x64_sys_write+0x7b/0x90 [ 910.346461][T19257] x64_sys_call+0x2f/0x9a0 [ 910.350803][T19257] do_syscall_64+0x3b/0xb0 [ 910.355050][T19257] ? clear_bhb_loop+0x55/0xb0 [ 910.359564][T19257] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 910.365291][T19257] RIP: 0033:0x7fe528f7e759 [ 910.369545][T19257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 910.388986][T19257] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 910.397227][T19257] RAX: ffffffffffffffda RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 910.405040][T19257] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 0000000000000007 [ 910.412852][T19257] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 910.420664][T19257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 910.428474][T19257] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 910.436295][T19257] [ 910.536383][T19268] syz.2.6520[19268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 910.536465][T19268] syz.2.6520[19268] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 910.560948][T19268] device wg2 left promiscuous mode [ 910.865027][T19278] FAULT_INJECTION: forcing a failure. [ 910.865027][T19278] name failslab, interval 1, probability 0, space 0, times 0 [ 910.963848][T19278] CPU: 0 PID: 19278 Comm: syz.0.6525 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 910.973591][T19278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 910.983575][T19278] Call Trace: [ 910.986705][T19278] [ 910.989470][T19278] dump_stack_lvl+0x151/0x1b7 [ 910.993986][T19278] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 910.999285][T19278] dump_stack+0x15/0x1e [ 911.003269][T19278] should_fail_ex+0x3d0/0x520 [ 911.007791][T19278] __should_failslab+0xaf/0xf0 [ 911.012387][T19278] should_failslab+0x9/0x20 [ 911.016728][T19278] kmem_cache_alloc_node+0x42/0x330 [ 911.021757][T19278] ? __alloc_skb+0xcc/0x2d0 [ 911.026099][T19278] __alloc_skb+0xcc/0x2d0 [ 911.030264][T19278] alloc_skb_with_frags+0xa6/0x680 [ 911.035216][T19278] ? 0xffffffffa0001ae4 [ 911.039207][T19278] sock_alloc_send_pskb+0x915/0xa50 [ 911.044247][T19278] ? sock_kzfree_s+0x60/0x60 [ 911.048663][T19278] ? kstrtoull+0x1cd/0x2e0 [ 911.052917][T19278] ? _parse_integer+0x40/0x40 [ 911.057433][T19278] tun_get_user+0xfaf/0x3a90 [ 911.061874][T19278] ? _kstrtol+0x150/0x150 [ 911.066030][T19278] ? tun_do_read+0x2000/0x2000 [ 911.070633][T19278] ? ref_tracker_alloc+0x31d/0x450 [ 911.075569][T19278] ? ref_tracker_dir_print+0x160/0x160 [ 911.080873][T19278] ? avc_policy_seqno+0x1b/0x70 [ 911.085552][T19278] ? tun_get+0xe9/0x120 [ 911.089543][T19278] tun_chr_write_iter+0x129/0x210 [ 911.094406][T19278] vfs_write+0xaf6/0xed0 [ 911.098482][T19278] ? __kasan_slab_free+0x11/0x20 [ 911.103264][T19278] ? file_end_write+0x1c0/0x1c0 [ 911.107949][T19278] ? __fget_files+0x2cb/0x330 [ 911.112459][T19278] ? __fdget_pos+0x204/0x390 [ 911.117319][T19278] ? ksys_write+0x77/0x2c0 [ 911.121575][T19278] ksys_write+0x199/0x2c0 [ 911.125738][T19278] ? __this_cpu_preempt_check+0x13/0x20 [ 911.131120][T19278] ? __ia32_sys_read+0x90/0x90 [ 911.135719][T19278] ? debug_smp_processor_id+0x17/0x20 [ 911.140924][T19278] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 911.146833][T19278] __x64_sys_write+0x7b/0x90 [ 911.151256][T19278] x64_sys_call+0x2f/0x9a0 [ 911.155505][T19278] do_syscall_64+0x3b/0xb0 [ 911.159760][T19278] ? clear_bhb_loop+0x55/0xb0 [ 911.164273][T19278] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 911.169999][T19278] RIP: 0033:0x7f93aa37e759 [ 911.174251][T19278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 911.193699][T19278] RSP: 002b:00007f93ab235038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 911.202113][T19278] RAX: ffffffffffffffda RBX: 00007f93aa535f80 RCX: 00007f93aa37e759 [ 911.209924][T19278] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 911.217739][T19278] RBP: 00007f93ab235090 R08: 0000000000000000 R09: 0000000000000000 [ 911.225546][T19278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 911.233369][T19278] R13: 0000000000000000 R14: 00007f93aa535f80 R15: 00007fffd7e76ac8 [ 911.241177][T19278] [ 912.390449][T19306] syz.1.6534[19306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 912.390524][T19306] syz.1.6534[19306] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 912.472399][T19306] device wg2 left promiscuous mode [ 914.428721][T19357] syz.3.6548[19357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.428797][T19357] syz.3.6548[19357] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 914.459622][T19360] FAULT_INJECTION: forcing a failure. [ 914.459622][T19360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 914.493558][T19360] CPU: 0 PID: 19360 Comm: syz.2.6549 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 914.503289][T19360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 914.513184][T19360] Call Trace: [ 914.516310][T19360] [ 914.519085][T19360] dump_stack_lvl+0x151/0x1b7 [ 914.523599][T19360] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 914.528898][T19360] ? vfs_write+0x952/0xed0 [ 914.533147][T19360] ? __kasan_slab_free+0x11/0x20 [ 914.537934][T19360] dump_stack+0x15/0x1e [ 914.541912][T19360] should_fail_ex+0x3d0/0x520 [ 914.546519][T19360] should_fail+0xb/0x10 [ 914.550515][T19360] should_fail_usercopy+0x1a/0x20 [ 914.555364][T19360] _copy_from_user+0x1e/0xc0 [ 914.559794][T19360] __sys_bpf+0x23b/0x7f0 [ 914.563870][T19360] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 914.569081][T19360] ? __ia32_sys_read+0x90/0x90 [ 914.573679][T19360] ? debug_smp_processor_id+0x17/0x20 [ 914.578885][T19360] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 914.584787][T19360] __x64_sys_bpf+0x7c/0x90 [ 914.589041][T19360] x64_sys_call+0x87f/0x9a0 [ 914.593379][T19360] do_syscall_64+0x3b/0xb0 [ 914.597630][T19360] ? clear_bhb_loop+0x55/0xb0 [ 914.602149][T19360] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 914.607870][T19360] RIP: 0033:0x7fcfb257e759 [ 914.612695][T19360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 914.632225][T19360] RSP: 002b:00007fcfb23ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 914.640468][T19360] RAX: ffffffffffffffda RBX: 00007fcfb2735f80 RCX: 00007fcfb257e759 [ 914.648274][T19360] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 914.656175][T19360] RBP: 00007fcfb23ff090 R08: 0000000000000000 R09: 0000000000000000 [ 914.663985][T19360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 914.671796][T19360] R13: 0000000000000000 R14: 00007fcfb2735f80 R15: 00007ffcc58f2d78 [ 914.679614][T19360] [ 914.694820][T19357] device wg2 left promiscuous mode [ 916.982160][T19420] device wg2 entered promiscuous mode [ 917.043876][T19422] syz.4.6566[19422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 917.043960][T19422] syz.4.6566[19422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 917.134975][T19422] device wg2 left promiscuous mode [ 917.533364][T19440] syz.0.6571[19440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 917.533452][T19440] syz.0.6571[19440] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 920.539801][T19497] FAULT_INJECTION: forcing a failure. [ 920.539801][T19497] name failslab, interval 1, probability 0, space 0, times 0 [ 920.585250][T19497] CPU: 1 PID: 19497 Comm: syz.3.6591 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 920.594984][T19497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 920.604880][T19497] Call Trace: [ 920.608011][T19497] [ 920.610780][T19497] dump_stack_lvl+0x151/0x1b7 [ 920.615294][T19497] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 920.620685][T19497] ? avc_has_perm+0x16f/0x260 [ 920.625199][T19497] dump_stack+0x15/0x1e [ 920.629188][T19497] should_fail_ex+0x3d0/0x520 [ 920.633704][T19497] __should_failslab+0xaf/0xf0 [ 920.638310][T19497] should_failslab+0x9/0x20 [ 920.642645][T19497] slab_pre_alloc_hook+0x2e/0x1b0 [ 920.647503][T19497] kmem_cache_alloc_lru+0x49/0x270 [ 920.652450][T19497] ? sock_alloc_inode+0x28/0xc0 [ 920.657138][T19497] sock_alloc_inode+0x28/0xc0 [ 920.661651][T19497] ? sockfs_init_fs_context+0xb0/0xb0 [ 920.666859][T19497] new_inode_pseudo+0x65/0x1d0 [ 920.671461][T19497] __sock_create+0x135/0x760 [ 920.675889][T19497] __sys_socketpair+0x29f/0x6e0 [ 920.680585][T19497] ? __ia32_sys_socket+0x90/0x90 [ 920.685349][T19497] ? __ia32_sys_read+0x90/0x90 [ 920.689955][T19497] ? debug_smp_processor_id+0x17/0x20 [ 920.695151][T19497] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 920.701151][T19497] __x64_sys_socketpair+0x9b/0xb0 [ 920.706004][T19497] x64_sys_call+0x19b/0x9a0 [ 920.710341][T19497] do_syscall_64+0x3b/0xb0 [ 920.714594][T19497] ? clear_bhb_loop+0x55/0xb0 [ 920.719115][T19497] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 920.724834][T19497] RIP: 0033:0x7f93f517e759 [ 920.729086][T19497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 920.748533][T19497] RSP: 002b:00007f93f5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 920.756778][T19497] RAX: ffffffffffffffda RBX: 00007f93f5335f80 RCX: 00007f93f517e759 [ 920.764581][T19497] RDX: 00000000000000ff RSI: 0000000000000003 RDI: 0000000000000002 [ 920.772395][T19497] RBP: 00007f93f5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 920.780203][T19497] R10: 0000000020000040 R11: 0000000000000246 R12: 0000000000000001 [ 920.788014][T19497] R13: 0000000000000000 R14: 00007f93f5335f80 R15: 00007ffef24d18e8 [ 920.795839][T19497] [ 920.812473][T19497] socket: no more sockets [ 922.031749][T19517] device wg2 entered promiscuous mode [ 927.362105][T19616] device wg2 entered promiscuous mode [ 938.150297][T19791] syz.0.6676[19791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 938.150403][T19791] syz.0.6676[19791] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 941.370507][T19863] syz.1.6692[19863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 941.424285][T19863] syz.1.6692[19863] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 941.991837][T19885] device wg2 entered promiscuous mode [ 944.114636][T19923] FAULT_INJECTION: forcing a failure. [ 944.114636][T19923] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 944.220888][T19923] CPU: 1 PID: 19923 Comm: syz.3.6711 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 944.230632][T19923] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 944.240518][T19923] Call Trace: [ 944.243641][T19923] [ 944.246418][T19923] dump_stack_lvl+0x151/0x1b7 [ 944.250945][T19923] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 944.256225][T19923] ? __kasan_check_write+0x14/0x20 [ 944.261177][T19923] dump_stack+0x15/0x1e [ 944.265168][T19923] should_fail_ex+0x3d0/0x520 [ 944.269683][T19923] should_fail+0xb/0x10 [ 944.273677][T19923] should_fail_usercopy+0x1a/0x20 [ 944.278624][T19923] _copy_from_user+0x1e/0xc0 [ 944.283048][T19923] copy_msghdr_from_user+0xaa/0x670 [ 944.288082][T19923] ? __kasan_check_write+0x14/0x20 [ 944.293026][T19923] ? proc_fail_nth_write+0x20b/0x290 [ 944.298146][T19923] ? sendmsg_copy_msghdr+0x70/0x70 [ 944.303110][T19923] __sys_recvmsg+0x24b/0x3d0 [ 944.307523][T19923] ? ____sys_recvmsg+0x530/0x530 [ 944.312305][T19923] ? __kasan_check_write+0x14/0x20 [ 944.317277][T19923] ? __ia32_sys_read+0x90/0x90 [ 944.321848][T19923] ? debug_smp_processor_id+0x17/0x20 [ 944.327046][T19923] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 944.333042][T19923] __x64_sys_recvmsg+0x7f/0x90 [ 944.337641][T19923] x64_sys_call+0x171/0x9a0 [ 944.342102][T19923] do_syscall_64+0x3b/0xb0 [ 944.346354][T19923] ? clear_bhb_loop+0x55/0xb0 [ 944.350871][T19923] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 944.356597][T19923] RIP: 0033:0x7f93f517e759 [ 944.360859][T19923] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 944.380290][T19923] RSP: 002b:00007f93f5ebf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 944.388795][T19923] RAX: ffffffffffffffda RBX: 00007f93f5335f80 RCX: 00007f93f517e759 [ 944.396606][T19923] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 944.404423][T19923] RBP: 00007f93f5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 944.412227][T19923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 944.420059][T19923] R13: 0000000000000000 R14: 00007f93f5335f80 R15: 00007ffef24d18e8 [ 944.427858][T19923] [ 944.526628][T19933] syz.2.6713[19933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 944.526733][T19933] syz.2.6713[19933] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 946.793442][T19971] device wg2 left promiscuous mode [ 946.962446][T19972] device wg2 entered promiscuous mode [ 947.681918][T19985] device wg2 left promiscuous mode [ 947.774677][T19986] device wg2 entered promiscuous mode [ 950.754858][T20039] device wg2 left promiscuous mode [ 950.796472][T20042] device wg2 left promiscuous mode [ 950.824473][T20039] device wg2 entered promiscuous mode [ 950.865292][T20042] device wg2 entered promiscuous mode [ 954.484938][T20092] device wg2 left promiscuous mode [ 954.583359][T20094] device wg2 entered promiscuous mode [ 954.624892][T20098] device wg2 left promiscuous mode [ 954.717426][T20101] device wg2 left promiscuous mode [ 954.757468][T20099] device wg2 entered promiscuous mode [ 954.763641][T20102] device wg2 entered promiscuous mode [ 957.315159][T20141] device wg2 left promiscuous mode [ 957.354200][T20141] device wg2 entered promiscuous mode [ 959.809919][T20190] device wg2 left promiscuous mode [ 959.893796][T20192] device wg2 entered promiscuous mode [ 961.415385][T20231] device wg2 left promiscuous mode [ 961.511644][T20231] device wg2 entered promiscuous mode [ 962.813028][T20251] device wg2 entered promiscuous mode [ 963.200697][T20263] device wg2 left promiscuous mode [ 963.971915][T20266] device wg2 left promiscuous mode [ 964.018756][T20263] device wg2 entered promiscuous mode [ 966.460387][T20324] device wg2 left promiscuous mode [ 966.512303][T20324] device wg2 entered promiscuous mode [ 966.601415][T20329] device wg2 left promiscuous mode [ 966.703046][T20334] device wg2 entered promiscuous mode [ 968.947257][T20379] device wg2 left promiscuous mode [ 968.993908][T20384] device wg2 entered promiscuous mode [ 971.550322][T20429] device wg2 left promiscuous mode [ 971.609872][T20430] device wg2 entered promiscuous mode [ 971.900845][T20434] device wg2 left promiscuous mode [ 973.052439][T20472] device wg2 left promiscuous mode [ 973.086285][T20472] device wg2 entered promiscuous mode [ 973.327299][T20484] FAULT_INJECTION: forcing a failure. [ 973.327299][T20484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 973.456878][T20484] CPU: 1 PID: 20484 Comm: syz.3.6872 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 973.466620][T20484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 973.476514][T20484] Call Trace: [ 973.479637][T20484] [ 973.482416][T20484] dump_stack_lvl+0x151/0x1b7 [ 973.486930][T20484] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 973.492222][T20484] ? vfs_write+0x952/0xed0 [ 973.496472][T20484] ? __kasan_slab_free+0x11/0x20 [ 973.501246][T20484] dump_stack+0x15/0x1e [ 973.505234][T20484] should_fail_ex+0x3d0/0x520 [ 973.509839][T20484] should_fail+0xb/0x10 [ 973.513833][T20484] should_fail_usercopy+0x1a/0x20 [ 973.518690][T20484] _copy_from_user+0x1e/0xc0 [ 973.523118][T20484] __sys_bpf+0x23b/0x7f0 [ 973.527206][T20484] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 973.532408][T20484] ? __ia32_sys_read+0x90/0x90 [ 973.537008][T20484] ? debug_smp_processor_id+0x17/0x20 [ 973.542211][T20484] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 973.548116][T20484] __x64_sys_bpf+0x7c/0x90 [ 973.552369][T20484] x64_sys_call+0x87f/0x9a0 [ 973.556708][T20484] do_syscall_64+0x3b/0xb0 [ 973.560965][T20484] ? clear_bhb_loop+0x55/0xb0 [ 973.565478][T20484] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 973.571200][T20484] RIP: 0033:0x7f93f517e759 [ 973.575452][T20484] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 973.594986][T20484] RSP: 002b:00007f93f5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 973.603225][T20484] RAX: ffffffffffffffda RBX: 00007f93f5335f80 RCX: 00007f93f517e759 [ 973.611038][T20484] RDX: 0000000000000010 RSI: 0000000020000440 RDI: 0000000000000011 [ 973.618849][T20484] RBP: 00007f93f5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 973.626658][T20484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 973.634471][T20484] R13: 0000000000000000 R14: 00007f93f5335f80 R15: 00007ffef24d18e8 [ 973.642484][T20484] [ 973.929781][T20494] device wg2 entered promiscuous mode [ 974.667766][T20520] device wg2 left promiscuous mode [ 974.686493][T20520] device wg2 entered promiscuous mode [ 977.143550][T20563] device wg2 left promiscuous mode [ 977.270184][T20567] device wg2 entered promiscuous mode [ 977.965339][T20576] device syzkaller0 entered promiscuous mode [ 979.067301][T20601] device wg2 left promiscuous mode [ 979.160633][T20604] device wg2 entered promiscuous mode [ 981.394726][T20648] device wg2 entered promiscuous mode [ 981.828377][T20657] device wg2 left promiscuous mode [ 981.926814][T20659] device wg2 entered promiscuous mode [ 982.078125][T20670] : renamed from ipvlan1 [ 982.327957][T20678] device veth0_vlan left promiscuous mode [ 982.346604][T20678] device veth0_vlan entered promiscuous mode [ 984.010468][T20693] device wg2 left promiscuous mode [ 984.081127][T20696] bridge0: port 1(bridge_slave_0) entered disabled state [ 984.090394][T20699] device wg2 entered promiscuous mode [ 984.131159][T20696] bridge0: port 1(bridge_slave_0) entered blocking state [ 984.138136][T20696] bridge0: port 1(bridge_slave_0) entered forwarding state [ 984.295813][T20702] device wg2 left promiscuous mode [ 984.352000][T20706] device wg2 entered promiscuous mode [ 984.636113][T20719] FAULT_INJECTION: forcing a failure. [ 984.636113][T20719] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 984.699542][T20719] CPU: 1 PID: 20719 Comm: syz.4.6943 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 984.709281][T20719] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 984.719174][T20719] Call Trace: [ 984.722302][T20719] [ 984.725091][T20719] dump_stack_lvl+0x151/0x1b7 [ 984.729591][T20719] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 984.734885][T20719] ? vfs_write+0x952/0xed0 [ 984.739135][T20719] ? __kasan_slab_free+0x11/0x20 [ 984.743917][T20719] dump_stack+0x15/0x1e [ 984.747905][T20719] should_fail_ex+0x3d0/0x520 [ 984.752415][T20719] should_fail+0xb/0x10 [ 984.756411][T20719] should_fail_usercopy+0x1a/0x20 [ 984.761272][T20719] _copy_from_user+0x1e/0xc0 [ 984.765692][T20719] __sys_bpf+0x23b/0x7f0 [ 984.769776][T20719] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 984.775018][T20719] ? __ia32_sys_read+0x90/0x90 [ 984.779580][T20719] ? debug_smp_processor_id+0x17/0x20 [ 984.784787][T20719] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 984.790691][T20719] __x64_sys_bpf+0x7c/0x90 [ 984.794944][T20719] x64_sys_call+0x87f/0x9a0 [ 984.799280][T20719] do_syscall_64+0x3b/0xb0 [ 984.803532][T20719] ? clear_bhb_loop+0x55/0xb0 [ 984.808050][T20719] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 984.813776][T20719] RIP: 0033:0x7fe528f7e759 [ 984.818030][T20719] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 984.837468][T20719] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 984.845711][T20719] RAX: ffffffffffffffda RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 984.853521][T20719] RDX: 000000000000000c RSI: 0000000020000500 RDI: 000000000000000a [ 984.861338][T20719] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 984.869144][T20719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 984.876954][T20719] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 984.884772][T20719] [ 985.556642][T20739] device wg2 left promiscuous mode [ 985.643885][T20739] device wg2 entered promiscuous mode [ 985.993106][T20752] FAULT_INJECTION: forcing a failure. [ 985.993106][T20752] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 986.097743][T20752] CPU: 0 PID: 20752 Comm: syz.4.6952 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 986.107564][T20752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 986.117461][T20752] Call Trace: [ 986.120577][T20752] [ 986.123354][T20752] dump_stack_lvl+0x151/0x1b7 [ 986.128021][T20752] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 986.133428][T20752] ? __kasan_check_write+0x14/0x20 [ 986.138372][T20752] dump_stack+0x15/0x1e [ 986.142364][T20752] should_fail_ex+0x3d0/0x520 [ 986.146879][T20752] should_fail+0xb/0x10 [ 986.150867][T20752] should_fail_usercopy+0x1a/0x20 [ 986.155817][T20752] _copy_from_user+0x1e/0xc0 [ 986.160244][T20752] copy_msghdr_from_user+0xaa/0x670 [ 986.165275][T20752] ? __kasan_check_write+0x14/0x20 [ 986.170338][T20752] ? proc_fail_nth_write+0x20b/0x290 [ 986.175547][T20752] ? sendmsg_copy_msghdr+0x70/0x70 [ 986.180496][T20752] __sys_recvmsg+0x24b/0x3d0 [ 986.184923][T20752] ? ____sys_recvmsg+0x530/0x530 [ 986.189696][T20752] ? __kasan_check_write+0x14/0x20 [ 986.194656][T20752] ? __ia32_sys_read+0x90/0x90 [ 986.199249][T20752] ? debug_smp_processor_id+0x17/0x20 [ 986.204449][T20752] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 986.210456][T20752] __x64_sys_recvmsg+0x7f/0x90 [ 986.215050][T20752] x64_sys_call+0x171/0x9a0 [ 986.219391][T20752] do_syscall_64+0x3b/0xb0 [ 986.223645][T20752] ? clear_bhb_loop+0x55/0xb0 [ 986.228154][T20752] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 986.233880][T20752] RIP: 0033:0x7fe528f7e759 [ 986.238138][T20752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 986.257759][T20752] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 986.266091][T20752] RAX: ffffffffffffffda RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 986.273903][T20752] RDX: 0000000000000000 RSI: 0000000020000380 RDI: 0000000000000008 [ 986.281798][T20752] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 986.289607][T20752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.297419][T20752] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 986.305242][T20752] [ 986.405603][T20766] FAULT_INJECTION: forcing a failure. [ 986.405603][T20766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 986.418808][T20766] CPU: 1 PID: 20766 Comm: syz.2.6958 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 986.428531][T20766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 986.438426][T20766] Call Trace: [ 986.441553][T20766] [ 986.444327][T20766] dump_stack_lvl+0x151/0x1b7 [ 986.448840][T20766] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 986.454137][T20766] ? vfs_write+0x952/0xed0 [ 986.458381][T20766] ? __kasan_slab_free+0x11/0x20 [ 986.463159][T20766] dump_stack+0x15/0x1e [ 986.467147][T20766] should_fail_ex+0x3d0/0x520 [ 986.471665][T20766] should_fail+0xb/0x10 [ 986.475745][T20766] should_fail_usercopy+0x1a/0x20 [ 986.480605][T20766] _copy_from_user+0x1e/0xc0 [ 986.485032][T20766] __sys_bpf+0x23b/0x7f0 [ 986.489110][T20766] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 986.494324][T20766] ? __ia32_sys_read+0x90/0x90 [ 986.498919][T20766] ? debug_smp_processor_id+0x17/0x20 [ 986.504121][T20766] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 986.510027][T20766] __x64_sys_bpf+0x7c/0x90 [ 986.514280][T20766] x64_sys_call+0x87f/0x9a0 [ 986.518620][T20766] do_syscall_64+0x3b/0xb0 [ 986.522871][T20766] ? clear_bhb_loop+0x55/0xb0 [ 986.527386][T20766] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 986.533114][T20766] RIP: 0033:0x7fcfb257e759 [ 986.537365][T20766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 986.556815][T20766] RSP: 002b:00007fcfb23ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 986.565051][T20766] RAX: ffffffffffffffda RBX: 00007fcfb2735f80 RCX: 00007fcfb257e759 [ 986.572860][T20766] RDX: 0000000000000020 RSI: 0000000020000e00 RDI: 0000000000000002 [ 986.580668][T20766] RBP: 00007fcfb23ff090 R08: 0000000000000000 R09: 0000000000000000 [ 986.588482][T20766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 986.596293][T20766] R13: 0000000000000000 R14: 00007fcfb2735f80 R15: 00007ffcc58f2d78 [ 986.604113][T20766] [ 986.659956][T20780] device wg2 left promiscuous mode [ 987.045439][T20780] device wg2 entered promiscuous mode [ 988.628565][T20827] device wg2 left promiscuous mode [ 988.710132][T20828] device wg2 entered promiscuous mode [ 989.860261][T20858] device wg2 left promiscuous mode [ 990.248999][T20864] device wg2 entered promiscuous mode [ 990.289588][T20866] FAULT_INJECTION: forcing a failure. [ 990.289588][T20866] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 990.389332][T20866] CPU: 1 PID: 20866 Comm: syz.4.6993 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 990.399073][T20866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 990.408968][T20866] Call Trace: [ 990.412091][T20866] [ 990.414868][T20866] dump_stack_lvl+0x151/0x1b7 [ 990.419386][T20866] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 990.424775][T20866] ? vfs_write+0x952/0xed0 [ 990.429013][T20866] ? __kasan_slab_free+0x11/0x20 [ 990.433786][T20866] dump_stack+0x15/0x1e [ 990.437787][T20866] should_fail_ex+0x3d0/0x520 [ 990.442304][T20866] should_fail+0xb/0x10 [ 990.446291][T20866] should_fail_usercopy+0x1a/0x20 [ 990.451159][T20866] _copy_from_user+0x1e/0xc0 [ 990.455572][T20866] __sys_bpf+0x23b/0x7f0 [ 990.459650][T20866] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 990.464866][T20866] ? fpregs_restore_userregs+0x130/0x290 [ 990.470417][T20866] __x64_sys_bpf+0x7c/0x90 [ 990.474667][T20866] x64_sys_call+0x87f/0x9a0 [ 990.479005][T20866] do_syscall_64+0x3b/0xb0 [ 990.483257][T20866] ? clear_bhb_loop+0x55/0xb0 [ 990.487787][T20866] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 990.493934][T20866] RIP: 0033:0x7fe528f7e759 [ 990.498201][T20866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 990.517757][T20866] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 990.526101][T20866] RAX: ffffffffffffffda RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 990.533913][T20866] RDX: 000000000000000c RSI: 00000000200004c0 RDI: 000000000000000a [ 990.541723][T20866] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 990.549537][T20866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 990.557447][T20866] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 990.565261][T20866] [ 991.146489][T20894] device wg2 left promiscuous mode [ 991.230868][T20898] device wg2 entered promiscuous mode [ 992.113740][T20912] device wg2 left promiscuous mode [ 992.166135][T20914] device wg2 entered promiscuous mode [ 992.409067][T20920] device wg2 left promiscuous mode [ 992.476530][T20920] device wg2 entered promiscuous mode [ 993.572813][T20943] device wg2 left promiscuous mode [ 993.609832][T20944] device wg2 left promiscuous mode [ 993.704703][T20945] device wg2 entered promiscuous mode [ 993.713346][T20946] device wg2 entered promiscuous mode [ 996.063479][T20996] device wg2 left promiscuous mode [ 996.149814][T20996] device wg2 entered promiscuous mode [ 996.580828][T21010] device wg2 left promiscuous mode [ 996.652731][T21013] device wg2 entered promiscuous mode [ 996.753730][T21017] device wg2 left promiscuous mode [ 996.841289][T21021] device wg2 entered promiscuous mode [ 997.114287][T21027] FAULT_INJECTION: forcing a failure. [ 997.114287][T21027] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 997.245781][T21027] CPU: 0 PID: 21027 Comm: syz.2.7045 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 997.255515][T21027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 997.265421][T21027] Call Trace: [ 997.268531][T21027] [ 997.271311][T21027] dump_stack_lvl+0x151/0x1b7 [ 997.275822][T21027] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 997.281126][T21027] dump_stack+0x15/0x1e [ 997.285111][T21027] should_fail_ex+0x3d0/0x520 [ 997.289627][T21027] should_fail+0xb/0x10 [ 997.293614][T21027] should_fail_usercopy+0x1a/0x20 [ 997.298478][T21027] _copy_from_user+0x1e/0xc0 [ 997.302905][T21027] get_user_ifreq+0xd5/0x230 [ 997.307332][T21027] sock_do_ioctl+0x1a7/0x450 [ 997.311758][T21027] ? has_cap_mac_admin+0x3c0/0x3c0 [ 997.316710][T21027] ? sock_show_fdinfo+0xa0/0xa0 [ 997.321392][T21027] ? selinux_file_ioctl+0x3cc/0x540 [ 997.326425][T21027] sock_ioctl+0x455/0x740 [ 997.330591][T21027] ? sock_poll+0x400/0x400 [ 997.334843][T21027] ? __fget_files+0x2cb/0x330 [ 997.339356][T21027] ? security_file_ioctl+0x84/0xb0 [ 997.344302][T21027] ? sock_poll+0x400/0x400 [ 997.348556][T21027] __se_sys_ioctl+0x114/0x190 [ 997.353068][T21027] __x64_sys_ioctl+0x7b/0x90 [ 997.357495][T21027] x64_sys_call+0x98/0x9a0 [ 997.361750][T21027] do_syscall_64+0x3b/0xb0 [ 997.366002][T21027] ? clear_bhb_loop+0x55/0xb0 [ 997.370515][T21027] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 997.376243][T21027] RIP: 0033:0x7fcfb257e759 [ 997.380495][T21027] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 997.399939][T21027] RSP: 002b:00007fcfb23ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 997.408182][T21027] RAX: ffffffffffffffda RBX: 00007fcfb2735f80 RCX: 00007fcfb257e759 [ 997.415991][T21027] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000004 [ 997.423806][T21027] RBP: 00007fcfb23ff090 R08: 0000000000000000 R09: 0000000000000000 [ 997.431616][T21027] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 997.439419][T21027] R13: 0000000000000000 R14: 00007fcfb2735f80 R15: 00007ffcc58f2d78 [ 997.447240][T21027] [ 997.904512][T21043] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.914271][T21043] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.924577][T21043] device bridge_slave_1 left promiscuous mode [ 997.930621][T21043] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.987487][T21043] device bridge_slave_0 left promiscuous mode [ 998.021969][T21043] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.287475][T21064] device wg2 left promiscuous mode [ 998.361313][T21061] device wg2 left promiscuous mode [ 998.402729][T21070] device wg2 entered promiscuous mode [ 998.487383][T21069] device wg2 entered promiscuous mode [ 999.119842][T21094] device wg2 left promiscuous mode [ 999.627606][T21097] FAULT_INJECTION: forcing a failure. [ 999.627606][T21097] name failslab, interval 1, probability 0, space 0, times 0 [ 999.748911][T21097] CPU: 0 PID: 21097 Comm: syz.3.7066 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 999.758663][T21097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 999.768998][T21097] Call Trace: [ 999.772193][T21097] [ 999.774969][T21097] dump_stack_lvl+0x151/0x1b7 [ 999.779484][T21097] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 999.784778][T21097] ? sched_clock_cpu+0x71/0x2b0 [ 999.789462][T21097] ? __this_cpu_preempt_check+0x13/0x20 [ 999.794846][T21097] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 999.800922][T21097] dump_stack+0x15/0x1e [ 999.804911][T21097] should_fail_ex+0x3d0/0x520 [ 999.809429][T21097] __should_failslab+0xaf/0xf0 [ 999.814039][T21097] should_failslab+0x9/0x20 [ 999.818361][T21097] kmem_cache_alloc_node+0x42/0x330 [ 999.823394][T21097] ? dup_task_struct+0x5a/0x7d0 [ 999.828084][T21097] dup_task_struct+0x5a/0x7d0 [ 999.832597][T21097] ? __kasan_check_write+0x14/0x20 [ 999.837546][T21097] copy_process+0x5c3/0x3530 [ 999.841976][T21097] ? timerqueue_add+0x250/0x270 [ 999.846659][T21097] ? idle_dummy+0x10/0x10 [ 999.850824][T21097] ? enqueue_hrtimer+0xca/0x250 [ 999.855507][T21097] ? __hrtimer_run_queues+0x46b/0xad0 [ 999.860903][T21097] kernel_clone+0x229/0x890 [ 999.865233][T21097] ? irqentry_exit+0x30/0x40 [ 999.869656][T21097] ? create_io_thread+0x180/0x180 [ 999.874522][T21097] __x64_sys_clone+0x231/0x280 [ 999.879119][T21097] ? __do_sys_vfork+0x110/0x110 [ 999.883814][T21097] x64_sys_call+0x1b0/0x9a0 [ 999.888142][T21097] do_syscall_64+0x3b/0xb0 [ 999.892396][T21097] ? clear_bhb_loop+0x55/0xb0 [ 999.896912][T21097] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 999.902651][T21097] RIP: 0033:0x7f93f517e759 [ 999.906890][T21097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 999.926435][T21097] RSP: 002b:00007f93f5ebefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 999.934665][T21097] RAX: ffffffffffffffda RBX: 00007f93f5335f80 RCX: 00007f93f517e759 [ 999.942482][T21097] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 999.950287][T21097] RBP: 00007f93f5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 999.958095][T21097] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 999.965909][T21097] R13: 0000000000000000 R14: 00007f93f5335f80 R15: 00007ffef24d18e8 [ 999.973730][T21097] [ 1001.385202][T21130] device wg2 left promiscuous mode [ 1001.451882][T21133] device wg2 entered promiscuous mode [ 1003.276119][T21162] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.283273][T21162] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.305302][T21163] device bridge_slave_1 left promiscuous mode [ 1003.311404][T21163] bridge0: port 2(bridge_slave_1) entered disabled state [ 1003.328295][T21163] device bridge_slave_0 left promiscuous mode [ 1003.334620][T21163] bridge0: port 1(bridge_slave_0) entered disabled state [ 1003.468344][T21168] device wg2 left promiscuous mode [ 1003.484635][T21170] device wg2 entered promiscuous mode [ 1003.492573][T21172] device wg2 left promiscuous mode [ 1003.534709][T21175] device wg2 entered promiscuous mode [ 1005.088061][T21208] device wg2 left promiscuous mode [ 1005.188518][T21205] device wg2 left promiscuous mode [ 1005.247239][T21211] device wg2 entered promiscuous mode [ 1005.254806][T21210] device wg2 entered promiscuous mode [ 1005.791161][T21224] tun0: tun_chr_ioctl cmd 1074025675 [ 1005.796699][T21224] tun0: persist enabled [ 1007.324535][T21255] device wg2 left promiscuous mode [ 1007.449309][T21256] device wg2 entered promiscuous mode [ 1007.746621][T21266] device wg2 left promiscuous mode [ 1007.810298][T21266] device wg2 entered promiscuous mode [ 1008.388704][ T28] audit: type=1400 audit(1731991693.008:147): avc: denied { create } for pid=21275 comm="syz.3.7118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 1009.050251][T21287] FAULT_INJECTION: forcing a failure. [ 1009.050251][T21287] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.062685][T21287] CPU: 1 PID: 21287 Comm: syz.1.7120 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1009.072400][T21287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1009.082382][T21287] Call Trace: [ 1009.085504][T21287] [ 1009.088278][T21287] dump_stack_lvl+0x151/0x1b7 [ 1009.092798][T21287] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1009.098088][T21287] ? __kasan_check_write+0x14/0x20 [ 1009.103042][T21287] dump_stack+0x15/0x1e [ 1009.107032][T21287] should_fail_ex+0x3d0/0x520 [ 1009.111550][T21287] ? __sigqueue_alloc+0x130/0x200 [ 1009.116399][T21287] __should_failslab+0xaf/0xf0 [ 1009.121004][T21287] should_failslab+0x9/0x20 [ 1009.125340][T21287] kmem_cache_alloc+0x3b/0x320 [ 1009.129943][T21287] __sigqueue_alloc+0x130/0x200 [ 1009.134629][T21287] __send_signal_locked+0x1a3/0xc30 [ 1009.139665][T21287] send_signal_locked+0x43a/0x590 [ 1009.144524][T21287] force_sig_info_to_task+0x2fe/0x440 [ 1009.149731][T21287] force_sig+0x114/0x1d0 [ 1009.153809][T21287] ? send_sig+0x60/0x60 [ 1009.157804][T21287] ? __kasan_check_write+0x14/0x20 [ 1009.162748][T21287] ? fput+0x15b/0x1b0 [ 1009.166660][T21287] ? ksys_write+0x260/0x2c0 [ 1009.170991][T21287] exc_general_protection+0x11d/0x4c0 [ 1009.176200][T21287] ? __ia32_sys_read+0x90/0x90 [ 1009.180802][T21287] ? debug_smp_processor_id+0x17/0x20 [ 1009.186014][T21287] ? syscall_exit_to_user_mode+0x2b/0x130 [ 1009.191564][T21287] asm_exc_general_protection+0x27/0x30 [ 1009.196941][T21287] RIP: 0033:0x7f210b956ff9 [ 1009.201232][T21287] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 1009.220652][T21287] RSP: 002b:00007f210c8207c8 EFLAGS: 00010283 [ 1009.226538][T21287] RAX: 0000000000000999 RBX: 00007f210c820d30 RCX: 00007f210bafd160 [ 1009.234352][T21287] RDX: 9999999999999999 RSI: 00007f210b9f151c RDI: 9999999999999999 [ 1009.242162][T21287] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 1009.249973][T21287] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 1009.257871][T21287] R13: 00007f210c820eb0 R14: 9999999999999999 R15: 0000000000000000 [ 1009.265693][T21287] [ 1010.603960][T21317] device wg2 left promiscuous mode [ 1010.653580][T21317] device wg2 entered promiscuous mode [ 1011.621451][T21328] device wg2 left promiscuous mode [ 1011.905466][T21331] device wg2 entered promiscuous mode [ 1014.924439][T21386] device wg2 entered promiscuous mode [ 1018.342693][T21443] device wg2 left promiscuous mode [ 1018.381811][T21447] device wg2 entered promiscuous mode [ 1021.668575][T21529] device wg2 left promiscuous mode [ 1021.749936][T21529] device wg2 entered promiscuous mode [ 1024.418563][T21573] device wg2 left promiscuous mode [ 1024.834295][T21574] device wg2 entered promiscuous mode [ 1025.113475][T21580] device wg2 left promiscuous mode [ 1025.246714][T21585] device wg2 entered promiscuous mode [ 1025.744316][T21605] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.751328][T21605] bridge0: port 1(bridge_slave_0) entered disabled state [ 1025.816294][T21605] device bridge_slave_1 left promiscuous mode [ 1025.877818][T21605] bridge0: port 2(bridge_slave_1) entered disabled state [ 1025.953696][T21605] device bridge_slave_0 left promiscuous mode [ 1025.983145][T21605] bridge0: port 1(bridge_slave_0) entered disabled state [ 1026.091632][T21613] FAULT_INJECTION: forcing a failure. [ 1026.091632][T21613] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1026.104746][T21613] CPU: 0 PID: 21613 Comm: syz.1.7211 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1026.114463][T21613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1026.124353][T21613] Call Trace: [ 1026.127478][T21613] [ 1026.130259][T21613] dump_stack_lvl+0x151/0x1b7 [ 1026.134773][T21613] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1026.140069][T21613] ? __kasan_check_write+0x14/0x20 [ 1026.145020][T21613] dump_stack+0x15/0x1e [ 1026.149003][T21613] should_fail_ex+0x3d0/0x520 [ 1026.153530][T21613] should_fail+0xb/0x10 [ 1026.157509][T21613] should_fail_usercopy+0x1a/0x20 [ 1026.162373][T21613] _copy_from_user+0x1e/0xc0 [ 1026.166797][T21613] copy_msghdr_from_user+0xaa/0x670 [ 1026.171830][T21613] ? __kasan_check_write+0x14/0x20 [ 1026.176779][T21613] ? proc_fail_nth_write+0x20b/0x290 [ 1026.181900][T21613] ? sendmsg_copy_msghdr+0x70/0x70 [ 1026.186855][T21613] __sys_recvmsg+0x24b/0x3d0 [ 1026.191481][T21613] ? ____sys_recvmsg+0x530/0x530 [ 1026.196249][T21613] ? __kasan_check_write+0x14/0x20 [ 1026.201195][T21613] ? __ia32_sys_read+0x90/0x90 [ 1026.205788][T21613] ? debug_smp_processor_id+0x17/0x20 [ 1026.211081][T21613] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1026.217003][T21613] __x64_sys_recvmsg+0x7f/0x90 [ 1026.221587][T21613] x64_sys_call+0x171/0x9a0 [ 1026.225922][T21613] do_syscall_64+0x3b/0xb0 [ 1026.230175][T21613] ? clear_bhb_loop+0x55/0xb0 [ 1026.234694][T21613] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1026.240418][T21613] RIP: 0033:0x7f210b97e759 [ 1026.244676][T21613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1026.264114][T21613] RSP: 002b:00007f210c821038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1026.272362][T21613] RAX: ffffffffffffffda RBX: 00007f210bb35f80 RCX: 00007f210b97e759 [ 1026.280292][T21613] RDX: 0000000000001f00 RSI: 0000000020000500 RDI: 0000000000000003 [ 1026.288093][T21613] RBP: 00007f210c821090 R08: 0000000000000000 R09: 0000000000000000 [ 1026.296021][T21613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1026.303839][T21613] R13: 0000000000000000 R14: 00007f210bb35f80 R15: 00007ffd98900ee8 [ 1026.311746][T21613] [ 1026.477276][T21625] device wg2 left promiscuous mode [ 1026.512677][T21625] device wg2 entered promiscuous mode [ 1027.457045][T21636] device wg2 left promiscuous mode [ 1027.502176][T21636] device wg2 entered promiscuous mode [ 1027.886615][T21644] device wg2 left promiscuous mode [ 1027.957535][T21645] device wg2 entered promiscuous mode [ 1028.141062][T21651] device wg2 left promiscuous mode [ 1028.227949][T21651] device wg2 entered promiscuous mode [ 1030.763427][T21705] device wg2 left promiscuous mode [ 1030.796674][T21707] device wg2 entered promiscuous mode [ 1032.716627][T21748] device wg2 left promiscuous mode [ 1032.795889][T21750] device wg2 entered promiscuous mode [ 1033.391562][T21760] device wg2 left promiscuous mode [ 1033.458833][T21763] device wg2 entered promiscuous mode [ 1033.735977][T21770] device wg2 left promiscuous mode [ 1033.840958][T21775] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.847979][T21775] bridge0: port 1(bridge_slave_0) entered disabled state [ 1033.925148][T21776] device wg2 entered promiscuous mode [ 1033.950017][T21779] device bridge_slave_1 left promiscuous mode [ 1033.956257][T21779] bridge0: port 2(bridge_slave_1) entered disabled state [ 1033.966233][T21779] bridge0: port 1(bridge_slave_0) entered disabled state [ 1035.834008][T21826] device wg2 left promiscuous mode [ 1035.924302][T21829] device wg2 entered promiscuous mode [ 1037.994815][T21880] device wg2 left promiscuous mode [ 1038.062704][T21880] device wg2 entered promiscuous mode [ 1038.151092][T21885] device wg2 left promiscuous mode [ 1038.206270][T21887] device wg2 entered promiscuous mode [ 1039.191149][T21903] device wg2 left promiscuous mode [ 1039.332741][T21904] device wg2 entered promiscuous mode [ 1040.127346][T21925] device wg2 left promiscuous mode [ 1040.180343][T21928] device wg2 left promiscuous mode [ 1040.236570][T21927] device wg2 entered promiscuous mode [ 1040.354388][T21931] device wg2 left promiscuous mode [ 1040.516793][T21942] bridge0: port 2(bridge_slave_1) entered disabled state [ 1040.523841][T21942] bridge0: port 1(bridge_slave_0) entered disabled state [ 1040.576906][T21940] device wg2 entered promiscuous mode [ 1040.956568][T21942] device bridge_slave_1 left promiscuous mode [ 1040.964092][T21942] bridge0: port 2(bridge_slave_1) entered disabled state [ 1040.971770][T21942] device bridge_slave_0 left promiscuous mode [ 1040.977897][T21942] bridge0: port 1(bridge_slave_0) entered disabled state [ 1041.867464][T21968] device wg2 left promiscuous mode [ 1041.927320][T21968] device wg2 entered promiscuous mode [ 1042.575754][T21982] device wg2 entered promiscuous mode [ 1042.795481][T21989] device wg2 left promiscuous mode [ 1042.876365][T21989] device wg2 entered promiscuous mode [ 1044.172406][T22012] FAULT_INJECTION: forcing a failure. [ 1044.172406][T22012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1044.351876][T22012] CPU: 1 PID: 22012 Comm: syz.2.7324 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1044.361622][T22012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1044.371701][T22012] Call Trace: [ 1044.374815][T22012] [ 1044.377596][T22012] dump_stack_lvl+0x151/0x1b7 [ 1044.382107][T22012] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1044.387403][T22012] dump_stack+0x15/0x1e [ 1044.391394][T22012] should_fail_ex+0x3d0/0x520 [ 1044.395905][T22012] should_fail+0xb/0x10 [ 1044.399897][T22012] should_fail_usercopy+0x1a/0x20 [ 1044.404846][T22012] _copy_from_user+0x1e/0xc0 [ 1044.409272][T22012] get_user_ifreq+0xd5/0x230 [ 1044.413699][T22012] sock_do_ioctl+0x1a7/0x450 [ 1044.418126][T22012] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1044.423075][T22012] ? sock_show_fdinfo+0xa0/0xa0 [ 1044.427760][T22012] ? selinux_file_ioctl+0x3cc/0x540 [ 1044.432812][T22012] sock_ioctl+0x455/0x740 [ 1044.436965][T22012] ? sock_poll+0x400/0x400 [ 1044.441211][T22012] ? __fget_files+0x2cb/0x330 [ 1044.445727][T22012] ? security_file_ioctl+0x84/0xb0 [ 1044.450670][T22012] ? sock_poll+0x400/0x400 [ 1044.454927][T22012] __se_sys_ioctl+0x114/0x190 [ 1044.459439][T22012] __x64_sys_ioctl+0x7b/0x90 [ 1044.463914][T22012] x64_sys_call+0x98/0x9a0 [ 1044.468118][T22012] do_syscall_64+0x3b/0xb0 [ 1044.472370][T22012] ? clear_bhb_loop+0x55/0xb0 [ 1044.476884][T22012] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1044.482614][T22012] RIP: 0033:0x7fcfb257e759 [ 1044.486952][T22012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1044.506480][T22012] RSP: 002b:00007fcfb23ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1044.514725][T22012] RAX: ffffffffffffffda RBX: 00007fcfb2735f80 RCX: 00007fcfb257e759 [ 1044.522538][T22012] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000005 [ 1044.530349][T22012] RBP: 00007fcfb23ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1044.538158][T22012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1044.545989][T22012] R13: 0000000000000000 R14: 00007fcfb2735f80 R15: 00007ffcc58f2d78 [ 1044.553790][T22012] [ 1046.033189][T22045] device veth0_vlan left promiscuous mode [ 1046.081102][T22045] device veth0_vlan entered promiscuous mode [ 1046.157540][T22046] device wg2 left promiscuous mode [ 1046.724318][T22061] device wg2 left promiscuous mode [ 1046.816712][T22063] device wg2 entered promiscuous mode [ 1050.018356][T22164] device wg2 left promiscuous mode [ 1052.586643][T22208] device veth1_macvtap left promiscuous mode [ 1054.126535][ T28] audit: type=1400 audit(1731991738.748:148): avc: denied { create } for pid=22249 comm="syz.1.7403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 1055.532214][T22271] device veth1_macvtap left promiscuous mode [ 1055.793063][T22288] FAULT_INJECTION: forcing a failure. [ 1055.793063][T22288] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1055.871605][T22287] device wg2 entered promiscuous mode [ 1055.959790][T22288] CPU: 0 PID: 22288 Comm: syz.0.7413 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1055.969632][T22288] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1055.979785][T22288] Call Trace: [ 1055.982905][T22288] [ 1055.985684][T22288] dump_stack_lvl+0x151/0x1b7 [ 1055.990197][T22288] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1055.995496][T22288] dump_stack+0x15/0x1e [ 1055.999484][T22288] should_fail_ex+0x3d0/0x520 [ 1056.003999][T22288] should_fail+0xb/0x10 [ 1056.007989][T22288] should_fail_usercopy+0x1a/0x20 [ 1056.012857][T22288] _copy_from_user+0x1e/0xc0 [ 1056.017287][T22288] get_user_ifreq+0xd5/0x230 [ 1056.021708][T22288] sock_do_ioctl+0x1a7/0x450 [ 1056.026260][T22288] ? has_cap_mac_admin+0x3c0/0x3c0 [ 1056.031193][T22288] ? sock_show_fdinfo+0xa0/0xa0 [ 1056.035882][T22288] ? selinux_file_ioctl+0x3cc/0x540 [ 1056.041000][T22288] sock_ioctl+0x455/0x740 [ 1056.045164][T22288] ? sock_poll+0x400/0x400 [ 1056.049506][T22288] ? __fget_files+0x2cb/0x330 [ 1056.054020][T22288] ? security_file_ioctl+0x84/0xb0 [ 1056.058965][T22288] ? sock_poll+0x400/0x400 [ 1056.063391][T22288] __se_sys_ioctl+0x114/0x190 [ 1056.067905][T22288] __x64_sys_ioctl+0x7b/0x90 [ 1056.072334][T22288] x64_sys_call+0x98/0x9a0 [ 1056.076586][T22288] do_syscall_64+0x3b/0xb0 [ 1056.080836][T22288] ? clear_bhb_loop+0x55/0xb0 [ 1056.085354][T22288] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1056.091076][T22288] RIP: 0033:0x7f93aa37e759 [ 1056.095332][T22288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1056.114783][T22288] RSP: 002b:00007f93ab235038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1056.123017][T22288] RAX: ffffffffffffffda RBX: 00007f93aa535f80 RCX: 00007f93aa37e759 [ 1056.130830][T22288] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000009 [ 1056.138641][T22288] RBP: 00007f93ab235090 R08: 0000000000000000 R09: 0000000000000000 [ 1056.146453][T22288] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1056.154264][T22288] R13: 0000000000000000 R14: 00007f93aa535f80 R15: 00007fffd7e76ac8 [ 1056.162082][T22288] [ 1057.071521][T22304] device wg2 entered promiscuous mode [ 1057.260366][T22308] FAULT_INJECTION: forcing a failure. [ 1057.260366][T22308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1057.295982][T22308] CPU: 1 PID: 22308 Comm: syz.2.7420 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1057.305728][T22308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1057.315617][T22308] Call Trace: [ 1057.318742][T22308] [ 1057.321522][T22308] dump_stack_lvl+0x151/0x1b7 [ 1057.326034][T22308] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1057.331379][T22308] ? vfs_write+0x952/0xed0 [ 1057.335578][T22308] dump_stack+0x15/0x1e [ 1057.339575][T22308] should_fail_ex+0x3d0/0x520 [ 1057.344087][T22308] should_fail+0xb/0x10 [ 1057.348082][T22308] should_fail_usercopy+0x1a/0x20 [ 1057.352937][T22308] _copy_from_user+0x1e/0xc0 [ 1057.357366][T22308] __sys_bpf+0x23b/0x7f0 [ 1057.361442][T22308] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1057.366846][T22308] ? __ia32_sys_read+0x90/0x90 [ 1057.371436][T22308] ? debug_smp_processor_id+0x17/0x20 [ 1057.376643][T22308] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1057.382549][T22308] __x64_sys_bpf+0x7c/0x90 [ 1057.386797][T22308] x64_sys_call+0x87f/0x9a0 [ 1057.391136][T22308] do_syscall_64+0x3b/0xb0 [ 1057.395391][T22308] ? clear_bhb_loop+0x55/0xb0 [ 1057.399903][T22308] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1057.405716][T22308] RIP: 0033:0x7fcfb257e759 [ 1057.409991][T22308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1057.429411][T22308] RSP: 002b:00007fcfb23ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1057.437671][T22308] RAX: ffffffffffffffda RBX: 00007fcfb2735f80 RCX: 00007fcfb257e759 [ 1057.445470][T22308] RDX: 0000000000000048 RSI: 0000000020000000 RDI: 000000000000000a [ 1057.453285][T22308] RBP: 00007fcfb23ff090 R08: 0000000000000000 R09: 0000000000000000 [ 1057.461096][T22308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1057.468900][T22308] R13: 0000000000000000 R14: 00007fcfb2735f80 R15: 00007ffcc58f2d78 [ 1057.476732][T22308] [ 1057.504353][ T28] audit: type=1400 audit(1731991742.128:149): avc: denied { attach_queue } for pid=22313 comm="syz.0.7423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1058.688091][T22342] FAULT_INJECTION: forcing a failure. [ 1058.688091][T22342] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1058.750180][T22342] CPU: 1 PID: 22342 Comm: syz.3.7432 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1058.760010][T22342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1058.769908][T22342] Call Trace: [ 1058.773023][T22342] [ 1058.775802][T22342] dump_stack_lvl+0x151/0x1b7 [ 1058.780319][T22342] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1058.785703][T22342] ? ioctl_has_perm+0x3f0/0x560 [ 1058.790388][T22342] dump_stack+0x15/0x1e [ 1058.794397][T22342] should_fail_ex+0x3d0/0x520 [ 1058.798900][T22342] should_fail+0xb/0x10 [ 1058.802885][T22342] should_fail_usercopy+0x1a/0x20 [ 1058.807746][T22342] _copy_from_user+0x1e/0xc0 [ 1058.812280][T22342] __tun_chr_ioctl+0x28c/0x22d0 [ 1058.816951][T22342] ? tun_flow_create+0x320/0x320 [ 1058.821722][T22342] ? __fget_files+0x2cb/0x330 [ 1058.826234][T22342] tun_chr_ioctl+0x2a/0x40 [ 1058.830481][T22342] ? tun_chr_poll+0x670/0x670 [ 1058.835007][T22342] __se_sys_ioctl+0x114/0x190 [ 1058.839516][T22342] __x64_sys_ioctl+0x7b/0x90 [ 1058.843935][T22342] x64_sys_call+0x98/0x9a0 [ 1058.848199][T22342] do_syscall_64+0x3b/0xb0 [ 1058.852440][T22342] ? clear_bhb_loop+0x55/0xb0 [ 1058.856956][T22342] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1058.862686][T22342] RIP: 0033:0x7f93f517e759 [ 1058.866976][T22342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1058.886379][T22342] RSP: 002b:00007f93f5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1058.894624][T22342] RAX: ffffffffffffffda RBX: 00007f93f5335f80 RCX: 00007f93f517e759 [ 1058.902436][T22342] RDX: 0000000020000100 RSI: 00000000400454d9 RDI: 0000000000000008 [ 1058.910331][T22342] RBP: 00007f93f5ebf090 R08: 0000000000000000 R09: 0000000000000000 [ 1058.918143][T22342] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1058.926043][T22342] R13: 0000000000000000 R14: 00007f93f5335f80 R15: 00007ffef24d18e8 [ 1058.933872][T22342] [ 1058.943393][T22345] device wg2 left promiscuous mode [ 1058.996283][T22356] device wg2 entered promiscuous mode [ 1059.391453][T22366] FAULT_INJECTION: forcing a failure. [ 1059.391453][T22366] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1059.442527][T22366] CPU: 1 PID: 22366 Comm: syz.0.7440 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1059.452515][T22366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1059.462411][T22366] Call Trace: [ 1059.465540][T22366] [ 1059.468313][T22366] dump_stack_lvl+0x151/0x1b7 [ 1059.472824][T22366] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1059.478483][T22366] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1059.483760][T22366] ? __wake_up_klogd+0xd5/0x110 [ 1059.488535][T22366] dump_stack+0x15/0x1e [ 1059.492528][T22366] should_fail_ex+0x3d0/0x520 [ 1059.497178][T22366] should_fail+0xb/0x10 [ 1059.501119][T22366] should_fail_usercopy+0x1a/0x20 [ 1059.505975][T22366] _copy_from_user+0x1e/0xc0 [ 1059.510578][T22366] __sys_bpf+0x23b/0x7f0 [ 1059.515178][T22366] ? clockevents_program_event+0x22f/0x300 [ 1059.520827][T22366] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1059.526034][T22366] ? __sched_clock_gtod_offset+0x100/0x100 [ 1059.531698][T22366] ? debug_smp_processor_id+0x17/0x20 [ 1059.536966][T22366] __x64_sys_bpf+0x7c/0x90 [ 1059.541215][T22366] x64_sys_call+0x87f/0x9a0 [ 1059.545645][T22366] do_syscall_64+0x3b/0xb0 [ 1059.549892][T22366] ? clear_bhb_loop+0x55/0xb0 [ 1059.554411][T22366] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1059.560142][T22366] RIP: 0033:0x7f93aa37e759 [ 1059.564393][T22366] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1059.583830][T22366] RSP: 002b:00007f93ab235038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1059.592073][T22366] RAX: ffffffffffffffda RBX: 00007f93aa535f80 RCX: 00007f93aa37e759 [ 1059.599887][T22366] RDX: 0000000000000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 1059.607701][T22366] RBP: 00007f93ab235090 R08: 0000000000000000 R09: 0000000000000000 [ 1059.615507][T22366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1059.623323][T22366] R13: 0000000000000000 R14: 00007f93aa535f80 R15: 00007fffd7e76ac8 [ 1059.631225][T22366] [ 1060.294575][T22388] FAULT_INJECTION: forcing a failure. [ 1060.294575][T22388] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1060.402650][T22388] CPU: 1 PID: 22388 Comm: syz.4.7447 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1060.412392][T22388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1060.422291][T22388] Call Trace: [ 1060.425406][T22388] [ 1060.428186][T22388] dump_stack_lvl+0x151/0x1b7 [ 1060.432706][T22388] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1060.438010][T22388] dump_stack+0x15/0x1e [ 1060.441985][T22388] should_fail_ex+0x3d0/0x520 [ 1060.446505][T22388] should_fail+0xb/0x10 [ 1060.450489][T22388] should_fail_usercopy+0x1a/0x20 [ 1060.455350][T22388] _copy_from_user+0x1e/0xc0 [ 1060.459778][T22388] __sys_bpf+0x23b/0x7f0 [ 1060.463855][T22388] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1060.469068][T22388] ? __ia32_sys_read+0x90/0x90 [ 1060.473755][T22388] ? debug_smp_processor_id+0x17/0x20 [ 1060.478958][T22388] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1060.484862][T22388] __x64_sys_bpf+0x7c/0x90 [ 1060.489202][T22388] x64_sys_call+0x87f/0x9a0 [ 1060.493538][T22388] do_syscall_64+0x3b/0xb0 [ 1060.497800][T22388] ? clear_bhb_loop+0x55/0xb0 [ 1060.502351][T22388] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1060.508042][T22388] RIP: 0033:0x7fe528f7e759 [ 1060.512292][T22388] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1060.531904][T22388] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1060.540153][T22388] RAX: ffffffffffffffda RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 1060.547955][T22388] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1060.555769][T22388] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1060.563580][T22388] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1060.571391][T22388] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 1060.579298][T22388] [ 1060.783683][T22397] device wg2 left promiscuous mode [ 1060.892769][T22401] device wg2 entered promiscuous mode [ 1062.063468][T22437] FAULT_INJECTION: forcing a failure. [ 1062.063468][T22437] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1062.141295][T22437] CPU: 1 PID: 22437 Comm: syz.0.7459 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1062.151038][T22437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1062.160954][T22437] Call Trace: [ 1062.164053][T22437] [ 1062.166885][T22437] dump_stack_lvl+0x151/0x1b7 [ 1062.171346][T22437] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1062.176645][T22437] dump_stack+0x15/0x1e [ 1062.180642][T22437] should_fail_ex+0x3d0/0x520 [ 1062.185210][T22437] should_fail+0xb/0x10 [ 1062.189137][T22437] should_fail_usercopy+0x1a/0x20 [ 1062.193998][T22437] _copy_from_user+0x1e/0xc0 [ 1062.198426][T22437] __sys_bpf+0x23b/0x7f0 [ 1062.202501][T22437] ? clockevents_program_event+0x22f/0x300 [ 1062.208235][T22437] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1062.213561][T22437] ? __sched_clock_gtod_offset+0x100/0x100 [ 1062.219198][T22437] ? debug_smp_processor_id+0x17/0x20 [ 1062.224401][T22437] __x64_sys_bpf+0x7c/0x90 [ 1062.228658][T22437] x64_sys_call+0x87f/0x9a0 [ 1062.233081][T22437] do_syscall_64+0x3b/0xb0 [ 1062.237340][T22437] ? clear_bhb_loop+0x55/0xb0 [ 1062.241845][T22437] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1062.247572][T22437] RIP: 0033:0x7f93aa37e759 [ 1062.251826][T22437] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1062.271271][T22437] RSP: 002b:00007f93ab235038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1062.279515][T22437] RAX: ffffffffffffffda RBX: 00007f93aa535f80 RCX: 00007f93aa37e759 [ 1062.287328][T22437] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 1062.295139][T22437] RBP: 00007f93ab235090 R08: 0000000000000000 R09: 0000000000000000 [ 1062.302947][T22437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1062.310762][T22437] R13: 0000000000000000 R14: 00007f93aa535f80 R15: 00007fffd7e76ac8 [ 1062.318580][T22437] [ 1062.377922][T22446] device veth0_vlan left promiscuous mode [ 1062.387003][T22446] device veth0_vlan entered promiscuous mode [ 1062.420957][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1062.432368][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1062.451731][T11044] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1062.655507][T22449] device wg2 left promiscuous mode [ 1062.733435][T22456] device wg2 entered promiscuous mode [ 1062.799872][T22454] device veth1_macvtap left promiscuous mode [ 1063.309923][T22472] device wg2 left promiscuous mode [ 1063.453093][T22474] device wg2 entered promiscuous mode [ 1063.900121][T22492] FAULT_INJECTION: forcing a failure. [ 1063.900121][T22492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1064.014801][T22492] CPU: 1 PID: 22492 Comm: syz.4.7476 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1064.024541][T22492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1064.034433][T22492] Call Trace: [ 1064.037560][T22492] [ 1064.040337][T22492] dump_stack_lvl+0x151/0x1b7 [ 1064.044950][T22492] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1064.050244][T22492] ? __kasan_check_write+0x14/0x20 [ 1064.055200][T22492] dump_stack+0x15/0x1e [ 1064.059181][T22492] should_fail_ex+0x3d0/0x520 [ 1064.063698][T22492] should_fail+0xb/0x10 [ 1064.067695][T22492] should_fail_usercopy+0x1a/0x20 [ 1064.072545][T22492] _copy_from_user+0x1e/0xc0 [ 1064.076969][T22492] copy_msghdr_from_user+0xaa/0x670 [ 1064.082006][T22492] ? __kasan_check_write+0x14/0x20 [ 1064.086948][T22492] ? proc_fail_nth_write+0x20b/0x290 [ 1064.092077][T22492] ? sendmsg_copy_msghdr+0x70/0x70 [ 1064.097021][T22492] __sys_recvmsg+0x24b/0x3d0 [ 1064.101448][T22492] ? ____sys_recvmsg+0x530/0x530 [ 1064.106224][T22492] ? __kasan_check_write+0x14/0x20 [ 1064.111167][T22492] ? __ia32_sys_read+0x90/0x90 [ 1064.115767][T22492] ? debug_smp_processor_id+0x17/0x20 [ 1064.120975][T22492] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1064.126877][T22492] __x64_sys_recvmsg+0x7f/0x90 [ 1064.131475][T22492] x64_sys_call+0x171/0x9a0 [ 1064.135822][T22492] do_syscall_64+0x3b/0xb0 [ 1064.140067][T22492] ? clear_bhb_loop+0x55/0xb0 [ 1064.144581][T22492] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1064.150310][T22492] RIP: 0033:0x7fe528f7e759 [ 1064.154563][T22492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1064.174003][T22492] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 1064.182249][T22492] RAX: ffffffffffffffda RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 1064.190057][T22492] RDX: 0000000000000100 RSI: 0000000020000440 RDI: 0000000000000004 [ 1064.197885][T22492] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1064.205790][T22492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1064.213595][T22492] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 1064.221420][T22492] [ 1066.217358][T22526] device wg2 left promiscuous mode [ 1066.606916][T22540] device wg2 left promiscuous mode [ 1066.688004][T22542] device wg2 entered promiscuous mode [ 1066.732606][T22546] FAULT_INJECTION: forcing a failure. [ 1066.732606][T22546] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1066.851863][T22546] CPU: 0 PID: 22546 Comm: syz.1.7489 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1066.861610][T22546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1066.871494][T22546] Call Trace: [ 1066.874622][T22546] [ 1066.877397][T22546] dump_stack_lvl+0x151/0x1b7 [ 1066.881995][T22546] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1066.887296][T22546] dump_stack+0x15/0x1e [ 1066.891281][T22546] should_fail_ex+0x3d0/0x520 [ 1066.895796][T22546] should_fail+0xb/0x10 [ 1066.899787][T22546] should_fail_usercopy+0x1a/0x20 [ 1066.904648][T22546] _copy_from_user+0x1e/0xc0 [ 1066.909073][T22546] get_user_ifreq+0xd5/0x230 [ 1066.913501][T22546] sock_ioctl+0x60d/0x740 [ 1066.917674][T22546] ? sock_poll+0x400/0x400 [ 1066.921924][T22546] ? __fget_files+0x2cb/0x330 [ 1066.926437][T22546] ? security_file_ioctl+0x84/0xb0 [ 1066.931384][T22546] ? sock_poll+0x400/0x400 [ 1066.935636][T22546] __se_sys_ioctl+0x114/0x190 [ 1066.940148][T22546] __x64_sys_ioctl+0x7b/0x90 [ 1066.944610][T22546] x64_sys_call+0x98/0x9a0 [ 1066.948827][T22546] do_syscall_64+0x3b/0xb0 [ 1066.953078][T22546] ? clear_bhb_loop+0x55/0xb0 [ 1066.957592][T22546] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1066.963321][T22546] RIP: 0033:0x7f210b97e759 [ 1066.967574][T22546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1066.987016][T22546] RSP: 002b:00007f210c821038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1066.995267][T22546] RAX: ffffffffffffffda RBX: 00007f210bb35f80 RCX: 00007f210b97e759 [ 1067.003077][T22546] RDX: 0000000020000080 RSI: 00000000000089f3 RDI: 0000000000000006 [ 1067.010896][T22546] RBP: 00007f210c821090 R08: 0000000000000000 R09: 0000000000000000 [ 1067.018695][T22546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1067.026942][T22546] R13: 0000000000000000 R14: 00007f210bb35f80 R15: 00007ffd98900ee8 [ 1067.034760][T22546] [ 1070.501867][T22612] device wg2 left promiscuous mode [ 1070.613208][T22613] device wg2 entered promiscuous mode [ 1071.387524][T22643] device wg2 left promiscuous mode [ 1071.481230][T22645] device wg2 entered promiscuous mode [ 1071.841291][T22654] device veth1_macvtap left promiscuous mode [ 1073.507700][T22673] device wg2 left promiscuous mode [ 1073.627543][T22675] device wg2 entered promiscuous mode [ 1073.866880][T22679] device wg2 left promiscuous mode [ 1074.186026][T22683] device wg2 entered promiscuous mode [ 1075.034294][T22700] device wg2 entered promiscuous mode [ 1075.193837][T22702] device wg2 left promiscuous mode [ 1075.240714][T22702] device wg2 entered promiscuous mode [ 1075.579835][T22711] device wg2 left promiscuous mode [ 1075.665142][T22712] device wg2 entered promiscuous mode [ 1075.938306][ T28] audit: type=1400 audit(1731991760.558:150): avc: denied { create } for pid=22713 comm="syz.2.7537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1076.440865][T22726] device wg2 left promiscuous mode [ 1076.511078][T22726] device wg2 entered promiscuous mode [ 1077.134037][T22735] device wg2 left promiscuous mode [ 1077.214889][T22739] device wg2 entered promiscuous mode [ 1077.590006][T22749] device wg2 left promiscuous mode [ 1077.627018][T22749] device wg2 entered promiscuous mode [ 1080.420718][T22798] device wg2 left promiscuous mode [ 1080.503501][T22800] device wg2 entered promiscuous mode [ 1081.399241][T22813] device wg2 left promiscuous mode [ 1081.495746][T22817] device wg2 entered promiscuous mode [ 1083.236060][T22861] device wg2 left promiscuous mode [ 1083.281765][T22861] device wg2 entered promiscuous mode [ 1084.669798][T22908] device wg2 left promiscuous mode [ 1084.742058][T22908] device wg2 entered promiscuous mode [ 1086.153581][T22955] device wg2 left promiscuous mode [ 1086.208565][T22955] device wg2 entered promiscuous mode [ 1087.557696][T23004] device wg2 left promiscuous mode [ 1087.608439][T23004] device wg2 entered promiscuous mode [ 1087.623032][T23012] FAULT_INJECTION: forcing a failure. [ 1087.623032][T23012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1087.690726][T23012] CPU: 0 PID: 23012 Comm: syz.4.7624 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1087.700469][T23012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1087.710360][T23012] Call Trace: [ 1087.713481][T23012] [ 1087.716257][T23012] dump_stack_lvl+0x151/0x1b7 [ 1087.720772][T23012] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 1087.726064][T23012] ? vfs_write+0x952/0xed0 [ 1087.730318][T23012] ? __kasan_slab_free+0x11/0x20 [ 1087.735092][T23012] dump_stack+0x15/0x1e [ 1087.739082][T23012] should_fail_ex+0x3d0/0x520 [ 1087.743600][T23012] should_fail+0xb/0x10 [ 1087.747588][T23012] should_fail_usercopy+0x1a/0x20 [ 1087.752451][T23012] _copy_from_user+0x1e/0xc0 [ 1087.756878][T23012] __sys_bpf+0x23b/0x7f0 [ 1087.760957][T23012] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1087.766168][T23012] ? __ia32_sys_read+0x90/0x90 [ 1087.770765][T23012] ? debug_smp_processor_id+0x17/0x20 [ 1087.775973][T23012] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 1087.781966][T23012] __x64_sys_bpf+0x7c/0x90 [ 1087.786211][T23012] x64_sys_call+0x87f/0x9a0 [ 1087.790551][T23012] do_syscall_64+0x3b/0xb0 [ 1087.794803][T23012] ? clear_bhb_loop+0x55/0xb0 [ 1087.799317][T23012] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1087.805133][T23012] RIP: 0033:0x7fe528f7e759 [ 1087.809385][T23012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1087.828834][T23012] RSP: 002b:00007fe529d5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1087.837072][T23012] RAX: ffffffffffffffda RBX: 00007fe529135f80 RCX: 00007fe528f7e759 [ 1087.844886][T23012] RDX: 0000000000000050 RSI: 00000000200002c0 RDI: 000000000000000a [ 1087.852695][T23012] RBP: 00007fe529d5f090 R08: 0000000000000000 R09: 0000000000000000 [ 1087.860507][T23012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1087.868317][T23012] R13: 0000000000000000 R14: 00007fe529135f80 R15: 00007fffcb885ac8 [ 1087.876149][T23012] [ 1092.392568][T23080] device wg2 left promiscuous mode [ 1092.465997][T23080] device wg2 entered promiscuous mode [ 1094.271709][T23107] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 1094.283366][T23107] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 1094.291619][T23107] CPU: 0 PID: 23107 Comm: syz.3.7652 Not tainted 6.1.112-syzkaller-00019-g6cf2e7d96862 #0 [ 1094.301333][T23107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024 [ 1094.311230][T23107] RIP: 0010:dev_map_enqueue+0x31/0x340 [ 1094.316519][T23107] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 e6 fb dd ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 80 67 25 00 4c 8b 33 48 83 c3 20 [ 1094.335971][T23107] RSP: 0018:ffffc90002ee75f8 EFLAGS: 00010246 [ 1094.342067][T23107] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000040000 [ 1094.349874][T23107] RDX: ffffc9000adc9000 RSI: 000000000000017d RDI: 000000000000017e [ 1094.357689][T23107] RBP: ffffc90002ee7638 R08: ffffffff84145572 R09: ffffffff84145492 [ 1094.365498][T23107] R10: 0000000000000004 R11: ffff88811c676540 R12: dffffc0000000000 [ 1094.373311][T23107] R13: 1ffff1103edc6e15 R14: 1ffff1103edc6e15 R15: ffff8881231fc070 [ 1094.381123][T23107] FS: 00007f93f5ebf6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1094.389890][T23107] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1094.396307][T23107] CR2: 0000000100000000 CR3: 000000013e5bb000 CR4: 00000000003506b0 [ 1094.404126][T23107] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1094.411933][T23107] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1094.419743][T23107] Call Trace: [ 1094.422868][T23107] [ 1094.425646][T23107] ? __die_body+0x62/0xb0 [ 1094.429818][T23107] ? die_addr+0x9f/0xd0 [ 1094.433805][T23107] ? exc_general_protection+0x317/0x4c0 [ 1094.439193][T23107] ? asm_exc_general_protection+0x27/0x30 [ 1094.444739][T23107] ? xdp_do_redirect_frame+0x1b2/0x800 [ 1094.450124][T23107] ? xdp_do_redirect_frame+0x292/0x800 [ 1094.455417][T23107] ? dev_map_enqueue+0x31/0x340 [ 1094.460101][T23107] ? dev_map_enqueue+0x2a/0x340 [ 1094.464792][T23107] xdp_do_redirect_frame+0x2b5/0x800 [ 1094.469914][T23107] bpf_test_run_xdp_live+0xc30/0x1f70 [ 1094.475217][T23107] ? bpf_test_run_xdp_live+0x7ae/0x1f70 [ 1094.480587][T23107] ? xdp_convert_md_to_buff+0x360/0x360 [ 1094.485967][T23107] ? x64_sys_call+0x87f/0x9a0 [ 1094.490476][T23107] ? do_syscall_64+0x3b/0xb0 [ 1094.494902][T23107] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1094.500822][T23107] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 1094.506883][T23107] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 1094.512524][T23107] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 1094.518517][T23107] ? bpf_test_init+0x13b/0x190 [ 1094.523114][T23107] ? xdp_convert_md_to_buff+0x5d/0x360 [ 1094.528408][T23107] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 1094.533624][T23107] ? dev_put+0x80/0x80 [ 1094.537523][T23107] ? __kasan_check_write+0x14/0x20 [ 1094.542472][T23107] ? fput+0x15b/0x1b0 [ 1094.546283][T23107] ? dev_put+0x80/0x80 [ 1094.550195][T23107] bpf_prog_test_run+0x3b0/0x630 [ 1094.554966][T23107] ? bpf_prog_query+0x260/0x260 [ 1094.559655][T23107] ? __sanitizer_cov_trace_switch+0xf/0xe0 [ 1094.565294][T23107] __sys_bpf+0x59f/0x7f0 [ 1094.569380][T23107] ? clockevents_program_event+0x22f/0x300 [ 1094.575015][T23107] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 1094.580232][T23107] ? __sched_clock_gtod_offset+0x100/0x100 [ 1094.585868][T23107] ? debug_smp_processor_id+0x17/0x20 [ 1094.591075][T23107] __x64_sys_bpf+0x7c/0x90 [ 1094.595326][T23107] x64_sys_call+0x87f/0x9a0 [ 1094.599673][T23107] do_syscall_64+0x3b/0xb0 [ 1094.604034][T23107] ? clear_bhb_loop+0x55/0xb0 [ 1094.608520][T23107] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 1094.614250][T23107] RIP: 0033:0x7f93f517e759 [ 1094.618498][T23107] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1094.637938][T23107] RSP: 002b:00007f93f5ebf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1094.646181][T23107] RAX: ffffffffffffffda RBX: 00007f93f5335f80 RCX: 00007f93f517e759 [ 1094.654108][T23107] RDX: 0000000000000050 RSI: 0000000020000240 RDI: 000000000000000a [ 1094.661927][T23107] RBP: 00007f93f51f175e R08: 0000000000000000 R09: 0000000000000000 [ 1094.669728][T23107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1094.677624][T23107] R13: 0000000000000000 R14: 00007f93f5335f80 R15: 00007ffef24d18e8 [ 1094.685541][T23107] [ 1094.688389][T23107] Modules linked in: [ 1094.692204][T23107] ---[ end trace 0000000000000000 ]--- [ 1094.697838][T23107] RIP: 0010:dev_map_enqueue+0x31/0x340 [ 1094.703268][T23107] Code: 56 41 55 41 54 53 48 83 ec 18 48 89 55 c0 49 89 f7 48 89 fb 49 bc 00 00 00 00 00 fc ff df e8 e6 fb dd ff 48 89 d8 48 c1 e8 03 <42> 80 3c 20 00 74 08 48 89 df e8 80 67 25 00 4c 8b 33 48 83 c3 20 [ 1094.722866][T23107] RSP: 0018:ffffc90002ee75f8 EFLAGS: 00010246 [ 1094.728907][T23107] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000040000 [ 1094.736847][T23107] RDX: ffffc9000adc9000 RSI: 000000000000017d RDI: 000000000000017e [ 1094.745366][T23107] RBP: ffffc90002ee7638 R08: ffffffff84145572 R09: ffffffff84145492 [ 1094.753377][T23107] R10: 0000000000000004 R11: ffff88811c676540 R12: dffffc0000000000 [ 1094.761548][T23107] R13: 1ffff1103edc6e15 R14: 1ffff1103edc6e15 R15: ffff8881231fc070 [ 1094.769681][T23107] FS: 00007f93f5ebf6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 1094.778567][T23107] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1094.785243][T23107] CR2: 0000000100000000 CR3: 000000013e5bb000 CR4: 00000000003506b0 [ 1094.793304][T23107] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1094.801288][T23107] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1094.809304][T23107] Kernel panic - not syncing: Fatal exception in interrupt [ 1094.816665][T23107] Kernel Offset: disabled [ 1094.820801][T23107] Rebooting in 86400 seconds..