last executing test programs: 3.101858361s ago: executing program 1 (id=4626): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x0, 0x0, 0xc22, 0xff, 0x40, 0xffffffffffffffff, 0xfffffffd, '\x00', 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.memory_spread_slab\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x9, 0x0, &(0x7f0000000100)="b9ff03316844268cb8", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8912, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x18) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x129800, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) ioctl$TUNSETQUEUE(r7, 0x400454d9, &(0x7f0000000280)={'bond_slave_0\x00', 0x400}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000006"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='(pu&\"\"\t&&') perf_event_open$cgroup(&(0x7f0000000280)={0x1, 0x80, 0xbd, 0x2, 0xab, 0x1, 0x0, 0x48, 0x20522, 0x7, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xd, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x40, 0x8, 0x9, 0x9, 0xff, 0x3ad63b8a, 0x8000, 0x0, 0x3, 0x0, 0x81f9}, r1, 0x8, r2, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) 2.900001314s ago: executing program 1 (id=4623): openat$tun(0xffffffffffffff9c, &(0x7f0000000cc0), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102033200fe08000e7f0061cd915a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000007c0)={0xffffffffffffffff, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000580)=[0x0], 0x0, 0x30, &(0x7f00000005c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000600), &(0x7f0000000640), 0x8, 0xc0000000, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000800)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0x0, '\x00', r3, r0, 0x2, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x1, 0x7fffffff, 0x3, 0x10ac, r4, 0x7fa, '\x00', 0x0, r0, 0x0, 0x2, 0x3, 0x5, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x1, 0x7fe4, 0x1, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r7 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) r8 = gettid() syz_open_procfs$namespace(r8, &(0x7f0000000380)='ns/cgroup\x00') write$cgroup_pid(r7, &(0x7f00000001c0)=r8, 0x12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000630120000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x90) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r9, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 2.166812896s ago: executing program 3 (id=4625): openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x20}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xfffff000, '\x00', r5, r6, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x15, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x81c, 0x9e, &(0x7f0000000780)=""/158, 0x40f00, 0x2a, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000340)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x10, 0x10000, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000680)=[r3], &(0x7f00000006c0)=[{0x1, 0x3, 0x0, 0x1}], 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0xffffffffffffff74}, 0x1f00) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.046066898s ago: executing program 1 (id=4628): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={0x0, r1}, 0x18) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1802000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r6}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r7) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r10}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value=0x200000, @void, @value}, 0x48) 1.91157366s ago: executing program 4 (id=4629): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x9, 0x4, 0x6, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1200, 0x0, 0x0, 0x1, 0x5}]}}, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 1.801015522s ago: executing program 4 (id=4630): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 1.314797779s ago: executing program 1 (id=4634): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xa, 0x4, 0x7fe6, 0x1, 0x180, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0a000000070000000300000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000500)={0x2, &(0x7f0000000400)=[{0x30, 0x3, 0x0, 0xfffff038}, {0x16, 0x0, 0x0, 0x10000}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="371ea51f749fc961c004637f1f12a23e135d733116d9", @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="2e0000000000000000000000000000002f110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0x100d, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x2, 0xff}, 0x1e51, 0x1, 0x0, 0x7, 0x4, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000027c0)={&(0x7f00000016c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2}, @struct]}, {0x0, [0x2e]}}, &(0x7f00000017c0)=""/4096, 0x37, 0x1000, 0x1, 0x0, 0x0, @void, @value}, 0x28) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x200000000000000, 0x15, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000020d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000180)={'batadv_slave_0\x00', 0x2}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.27458186s ago: executing program 3 (id=4635): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(0x4) 1.230151211s ago: executing program 0 (id=4636): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={0x0, r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) close(r5) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(0x0, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x2000, 0x0, @void, @value, @void, @value}, 0x48) 981.764254ms ago: executing program 0 (id=4637): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b000000b9000000010001000900000001000000", @ANYRES32, @ANYBLOB="000000000000000000e5979bed00000000000000381d80933b86047ac24891d6e8c1fe9c55eb619b859cabe89da442d2f9852c7a2a5d769a1aacaaca678a89ad09b3b9fc0d00cd83c8877b380bdcd287638096c7d4f01eb26e6b979b5a5eafbf4b093b2769814ff8519b6a64ae053c33ab3e5f6767c000bb07f486c7747b07687b44445efb03cc9d5ce963ddcc74ad0d75f62e4efdd7f0332546a3d6dda9b80c810f18a4d65571dd2cedfdc5582dd7c53c98ef67968b75f93f0d6f4d8115a0a3668a23d704239e420636c86365112b056787adcdc91911d8cc21e595e3eb9492a3389ff9d046a34c56c438", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r2}, &(0x7f00000004c0), &(0x7f0000000500)}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000400), &(0x7f0000000340)=""/173}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB="00000000000000b309bf9f92677d2157259e00"/31, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xff58) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) socketpair(0xa, 0x2, 0x0, &(0x7f0000000180)={0x0, 0x0}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000280)={'wg2\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2c}}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 981.464934ms ago: executing program 3 (id=4638): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) sendmsg$tipc(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b9cbbefce3babab}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004b74ffec850000006d000000850000000700000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000000)='mm_lru_insertion\x00', r2}, 0x10) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r3, &(0x7f0000000180), 0x40010) (fail_nth: 40) 638.8092ms ago: executing program 1 (id=4639): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18080000000000000000000000000002850000000f000000850000002a00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000005c0)='kfree_skb\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r4}, 0x10) close(r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0xffffffffffffffff, 0x8}, 0x104101, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800"/32], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r8, 0x40042408, r9) sendmsg$inet(r7, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r6, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) r11 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r12}, &(0x7f0000000180), &(0x7f00000001c0)=r11}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 605.6927ms ago: executing program 3 (id=4640): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0x8, 0x25, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x40) 566.281441ms ago: executing program 4 (id=4641): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x110c230000) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f1, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000240)={0x0, r1}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYRES8=r2], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020703400000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r6], 0x18}, 0x0) sendmsg$unix(r4, &(0x7f0000000440)={0x0, 0xfffffea5, 0x0, 0x0, &(0x7f0000000780)=ANY=[@ANYRESOCT, @ANYRES32=r6], 0x18}, 0x4000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) close(r7) socketpair$unix(0x1, 0x2, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$unix(0xffffffffffffffff, 0x0, 0x40) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=""/82, 0x119, 0x52, 0x0, 0x7, 0x0, @void, @value}, 0x28) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={r8, 0x20, &(0x7f0000000100)={&(0x7f0000000600)=""/136, 0x88, 0x0, 0x0}}, 0x10) 563.474201ms ago: executing program 3 (id=4642): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004680)={&(0x7f0000004500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x3}]}, {0x0, [0x5f, 0x2e, 0x672608233d8dd4ac]}}, 0x0, 0x29, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) (async) recvmsg$unix(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x100}, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000140)='[\x00') (async) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) close(0xffffffffffffffff) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) (async) syz_clone(0x12108800, &(0x7f0000000980)="4846a176cda6154e27f6d40cc3b721183f464797f3f289de01c4ce309607cec492baf9b7210ba866ad198811dd1ddd20ed04ab5d5c64b2b2bd085819372b4dfc7b1f5a40471c43d44fa5387826dd7c6d49afb7bc2ac3b5411d940bdf5262a5d7c8cce58bd1f14e3416873af25fc7866707ea0d5ca12d132467ab43c9216fdd994baab02822c33417698e44cc539b91fd211b0b57cd7a412c840ea0d2444c03c5915a234d135c10b0b43cb4354d8c061834fb", 0xb2, &(0x7f0000000900), &(0x7f0000000a80), &(0x7f0000000ac0)="b279944d8fb257d448f38a2cc6072f85c6137944921c6fada0d7e43cc94e34a101c34466dd93f2238ad50a75750e99826970a11c886b56eead76d9a3bda7d08318228df3a48ecb300f80ef3309a2f5c064cc17c1b73c1457d5e654c59d5f1d5597cd46970cea239569eb00f8c277115da1e3722cad976be8029e1aa6e793d74ebfccd81d08b5aa01c0084084b036995e931830f5cdccbf1fbc5d") (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000700000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a40)={&(0x7f0000000940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@union={0x1, 0x2, 0x0, 0x5, 0x0, 0x40000, [{0x1, 0x5, 0xff}, {0x5, 0x3}]}]}}, &(0x7f0000000a00), 0x3e, 0x0, 0x1, 0x200, 0x0, @void, @value}, 0x28) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x18) (async) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'veth1_macvtap\x00', 0x400}) socketpair(0x10, 0xa, 0xfffffffe, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) (async) write$cgroup_devices(r4, &(0x7f0000000740)=ANY=[@ANYBLOB="1e0308004d8c71ef2885634a8270e7000000000000000000000000000000ac1414cf143aa997628bdb04a95d90920856c0b606"], 0xffdd) 506.645392ms ago: executing program 0 (id=4644): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xf}, 0x0, 0x2000000000c8, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x7, 0x81, 0x81, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) write$cgroup_subtree(r4, &(0x7f0000000000), 0x15) 505.394092ms ago: executing program 3 (id=4645): openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x20}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x5, &(0x7f0000000180)=@framed={{}, [@map_val]}, &(0x7f0000000280)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f00000700000000000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r4, 0x58, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000200), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, r4, 0xfffff000, '\x00', r5, r6, 0x1, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x15, &(0x7f00000005c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x7fffffff}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @map_idx={0x18, 0x0, 0x5, 0x0, 0x9}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x81c, 0x9e, &(0x7f0000000780)=""/158, 0x40f00, 0x2a, '\x00', r5, 0x0, r0, 0x8, &(0x7f0000000340)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000000380)={0x3, 0x10, 0x10000, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000680)=[r3], &(0x7f00000006c0)=[{0x1, 0x3, 0x0, 0x1}], 0x10, 0x9, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x7}, 0x410, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4a, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1, 0x0, 0xffffffffffffff74}, 0x1f00) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 443.956853ms ago: executing program 1 (id=4647): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="050000ee0000000100"/20, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000000400000008000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r3, 0x0, 0x0) recvmsg(r2, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, &(0x7f00000032c0)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r2, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) 423.774083ms ago: executing program 0 (id=4648): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000300)={0x0, r0}, 0x8) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) r2 = openat$tun(0xffffffffffffff9c, 0x0, 0x400142, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x9, 0x11, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000300000000000000c2653b7b18110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018420000fcffffff0000000000000000bf91000000000000b702000000000e008500000084000000b7000000000000009500000000000000"], &(0x7f00000005c0)='syzkaller\x00', 0x4, 0x73, &(0x7f0000000600)=""/115, 0x0, 0x49, '\x00', 0x0, @cgroup_sock=0xd, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xd, 0xfe8, 0x10001}, 0x10, 0xffffffffffffffff, r0, 0x6, &(0x7f0000000700)=[0xffffffffffffffff], &(0x7f0000000740)=[{0x1, 0x5, 0x10, 0x8}, {0x1, 0x2, 0x6, 0x2}, {0x0, 0x3, 0xa, 0x6}, {0x5, 0x3, 0xf, 0x2}, {0x1, 0x5, 0x1}, {0x1, 0x2, 0xb, 0x6}], 0x10, 0xc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f00000004c0)='cq_alloc\x00', r3, 0x0, 0xfff}, 0x18) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00', 0x200}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4, 0x0, 0x1, 0xfffffefffff7bbfe, 0xfffffffb, 0x0, 0x0, 0x5fd}, 0x0, 0x8, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0e00000000000000060000100300000020050500", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000020300"/24, @ANYRES32=r1, @ANYBLOB], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r5, 0x58, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="160000000000000061b1000002"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r10, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r11, 0x0, &(0x7f0000001780)=""/4096}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xf}, 0x0, 0x2000000000c8, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r12, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40002040) 314.398635ms ago: executing program 2 (id=4649): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff85000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0xffffffffffffffe0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1842, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000004c0)}, 0x0, 0x0, 0x0, 0x6, 0x88, 0x0, 0x1, 0x0, 0xb}, 0x0, 0x3, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) r5 = gettid() syz_open_procfs$namespace(r5, &(0x7f0000000380)='ns/cgroup\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000840)=""/262, 0x37, 0x106, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r2, &(0x7f0000000500)="a6e82b1ad18e5068c70e066f1f63c9110b13f31e0b78454a9d8a13a96118e28660a9a11d2a8ca490c56a58a8a80f22e5e0bee6c141dad830c93c987c5ca50caec2d2bdf8b8c9b54809b75ca4ad5a", &(0x7f00000005c0)=""/236}, 0x20) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) 313.796145ms ago: executing program 0 (id=4650): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x58, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffef, 0x880, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xcc1, 0x8}, 0x8824, 0x96, 0x0, 0x3, 0x80, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x100000}, 0x0, 0x8, 0xffffffffffffffff, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000280"], 0x48) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1900000004000000040000000280"], 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8, 0x6}, 0xa100, 0xc8, 0xffffffff, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x2628}, 0x0, 0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0xb) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0xb) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) (async) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r1, 0x0, 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x7, 0x4011, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x10000, 0xc8, 0xfff, 0x0, 0x0, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x200003bc, &(0x7f0000000200)=ANY=[@ANYBLOB="bfd5a655a038344106bc1554f195626a2cdfe61cf651304162b88fb15a9c45e8d00f2faf2142c3df3d868d70d8fb20318345f5cd6ef9ec25577652ad21993b10c706cf77a8d52303c55a3d47db0c82d3"], &(0x7f00000001c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x200003bc, &(0x7f0000000200)=ANY=[@ANYBLOB="bfd5a655a038344106bc1554f195626a2cdfe61cf651304162b88fb15a9c45e8d00f2faf2142c3df3d868d70d8fb20318345f5cd6ef9ec25577652ad21993b10c706cf77a8d52303c55a3d47db0c82d3"], &(0x7f00000001c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300b6d664490000040000000a00000000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 292.292515ms ago: executing program 0 (id=4651): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 277.837206ms ago: executing program 2 (id=4652): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74630, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, @perf_bp={0x0, 0x2}, 0x115041, 0xc8, 0x0, 0x0, 0x0, 0x4, 0xb296, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8102033200fe08000e7f0061cd915a65969ff57b00000000000000000002000000ac1414aa"], 0xfdef) 223.202227ms ago: executing program 2 (id=4653): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYRESOCT=r0], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x9, 0x58, 0x1, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x5, 0xe729}, 0x410, 0x2000000, 0x0, 0x0, 0xffffffffeffffffe, 0xfffffffe, 0x0, 0x0, 0x205}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)='syzkaller\x00', 0xfffffff1, 0xba, &(0x7f0000000300)=""/186, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040)={0x4}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYRESDEC=r1], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e00000008000000040000000400000040400000", @ANYRES32=r1, @ANYBLOB="0200000000e486de07ab9900000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000040000000100"/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], &(0x7f0000000240)=""/252, 0x37, 0xfc, 0x1, 0x0, 0x0, @void, @value}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r6}, 0x10) syz_clone(0x4d100000, 0x0, 0x40000, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='block_split\x00', r7}, 0xe) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) 201.681237ms ago: executing program 4 (id=4654): mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8001, 0xc}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xe, 0x4, 0x0, 0x8004, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x200, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000300)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async, rerun: 64) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1700000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB="0000000000000000873300"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async, rerun: 32) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r6}, 0x10) (async) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x9, 0x40, 0x6, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async, rerun: 32) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001080)={r2, 0x58, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 32) bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=@bloom_filter={0x1e, 0xfffffff8, 0x8, 0x6, 0x40, r2, 0x4, '\x00', r8, 0xffffffffffffffff, 0x4, 0x5, 0x1, 0x9, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xc, 0x4, 0x4, 0xffff7fff, 0x0, r7, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r3) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) (async) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffc9}, 0x0) ioctl$TUNATTACHFILTER(r11, 0x401054d5, &(0x7f0000000500)={0x1, &(0x7f0000000300)=[{0x64, 0x0, 0x0, 0xc2}]}) (async) r12 = openat$tun(0xffffffffffffff9c, &(0x7f0000001140), 0x424102, 0x0) ioctl$TUNGETVNETLE(r12, 0x800454dd, &(0x7f0000001180)) 108.648588ms ago: executing program 2 (id=4655): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x8, 0x3, &(0x7f0000000000)=@framed={{0x7a, 0xa, 0x0, 0xff00, 0x0, 0x71, 0x10, 0x8c}, [], {0x95, 0x0, 0x600}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 46.851849ms ago: executing program 4 (id=4656): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x18, 0x10, &(0x7f0000000380)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0xc2}, @map_fd={0x18, 0x8, 0x1, 0x0, r0}, @printk={@u, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x18}}, @ldst={0x0, 0x2, 0x4, 0x9, 0x4, 0xfffffffffffffff4, 0xffffffffffffffff}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xfffffffffffffffa}], &(0x7f00000002c0)='GPL\x00', 0x9, 0xf4, &(0x7f0000000bc0)=""/244, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000300)={0x4, 0x3}, 0x8, 0x10, &(0x7f0000000340)={0x1, 0x7, 0xd, 0x1}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r0, 0xffffffffffffffff, r0, r0], &(0x7f0000000540)=[{0xffffffff, 0x4, 0xf, 0x6}, {0x2, 0x3, 0xf, 0x5}], 0x10, 0x6, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000b00)={r1, 0x0, 0x93, 0xa0, &(0x7f00000007c0)="f90e2c8a22634a3352c4bc344f10cd5f222d8e359482fbc7aa69b42a761581bc7dd8f01b337ab55eb414d16d9ea2cb9cd31121ea8730f097cf3383f84e324a47495b0be6809ad3547a57e9a87961d8d5ea889e21e8fecb1903e40e74bebea5005e0c498e63655597cea66b3b2d2497aeed217a73470e2472ed38ac01af44ad2eef74439c92cc35271ac31acad907c301986fda", &(0x7f0000000880)=""/160, 0x0, 0x0, 0xc1, 0x5d, &(0x7f0000000a00)="5a634d60fc3fc31858d0064127bc2c8694a4fc94c6131f06924ef24239685f22237ea2908ab2d5c00a86ffd85d3182feeac166367e2db3efd31f5c6574c45dbfef6f737512556a910add45bf75ebe804e298616e5afa44c54b4cfb335a734eca7876c57ccf759cc988db49b9bba2cbfdf9318823d0a54c96e14c7b12d1f6ee099e13cca7a93976e5e94b1b9c36b4c47cc592a08c694b3907ae7e7b7e3f6d8066243998cbeebec27aef5d5fe413438669727b61c8fb8b256e3c8ca131539d94b53a", &(0x7f0000000940)="91ac96513f05ef0552be340e58424c454c5e77f924c7a85603098ee6085d303fb0dace72e6ae683224c9346eba269ee18dfeb79315e32eee7db23c0a79247540a7362f268abfd79289fc0fc69b614bfec772cd595a9608b95d7ff378f7", 0x7, 0x0, 0x3442}, 0x50) r2 = openat$cgroup_ro(r0, &(0x7f0000000b80)='blkio.bfq.group_wait_time\x00', 0x26e1, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6c, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0xfffffffc, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110c23003f) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="181c000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000000)="bf356262aada389991c2b854fe9e", 0x3, r2}, 0x38) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r8}, &(0x7f0000001c00), &(0x7f0000001c40)=r9}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r10}, 0x10) mkdirat$cgroup(0xffffffffffffffff, &(0x7f00000001c0)='syz1\x00', 0x1ff) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000700)='signal_generate\x00', r9, 0x0, 0x74}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="180013000000000000000000002cd427ff0e7ab03a0000007112160500"/40], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 46.064459ms ago: executing program 2 (id=4657): syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/user\x00') bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xf}, 0x0, 0x2000000000c8, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000000), 0x15) 20.79961ms ago: executing program 2 (id=4658): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0b00000007000000d7e72d2ab2000000010004003b0eb1a3cd3c047f8a023d3513c441482db1cbe4a45d03e59e288091aeafecc3ef4170022b0f6c0308ba00bfb4d43eae064110ca9debcf5f207be77f4786d3b76c2c4d553ef5c2cc8b4c68e6b55804f123ff82e1402d8306f70ba00a227cf3fcae2e5eb21a", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff9, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001040)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c23003f) (async) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c23003f) write$cgroup_type(r4, &(0x7f0000000080), 0xfffffed8) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), &(0x7f00000003c0)=r6}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r1}, &(0x7f0000000200), &(0x7f00000003c0)=r6}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x80}, 0x0, 0x1, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1000000004000000080000000800", @ANYRES32, @ANYBLOB="0000f0ffffff0000000000000000000800000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000100"], 0x48) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000013c0)={&(0x7f00000011c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000005000000050000000000000c000000200061002e00c3d55b0b70c72b076dbe954e1c9fff08624bad78e12a2d5900c8f06eb235a03d540b10"], 0x0, 0x29, 0x0, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 0s ago: executing program 4 (id=4659): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="1801000000000000000000004b84ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r2, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x20000041) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1, 0x0, 0x1800}, 0x0) kernel console output (not intermixed with test programs): NF(NETDEV_CHANGE): vlan1: link becomes ready [ 190.433726][ T9049] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.266566][ T9151] FAULT_INJECTION: forcing a failure. [ 193.266566][ T9151] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 193.280096][ T9151] CPU: 1 PID: 9151 Comm: syz.1.3389 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 193.291279][ T9151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 193.301174][ T9151] Call Trace: [ 193.304309][ T9151] dump_stack_lvl+0x1e2/0x24b [ 193.308810][ T9151] ? bfq_pos_tree_add_move+0x43b/0x43b [ 193.314107][ T9151] ? bpf_trace_run2+0xf4/0x280 [ 193.318703][ T9151] dump_stack+0x15/0x17 [ 193.322698][ T9151] should_fail+0x3c6/0x510 [ 193.326952][ T9151] should_fail_usercopy+0x1a/0x20 [ 193.331811][ T9151] _copy_to_user+0x20/0x90 [ 193.336071][ T9151] simple_read_from_buffer+0xc7/0x150 [ 193.341447][ T9151] proc_fail_nth_read+0x1a3/0x210 [ 193.346311][ T9151] ? proc_fault_inject_write+0x390/0x390 [ 193.351778][ T9151] ? security_file_permission+0x86/0xb0 [ 193.357246][ T9151] ? rw_verify_area+0x1c3/0x360 [ 193.361929][ T9151] ? proc_fault_inject_write+0x390/0x390 [ 193.367405][ T9151] vfs_read+0x200/0xba0 [ 193.371393][ T9151] ? kernel_read+0x70/0x70 [ 193.375646][ T9151] ? __kasan_check_write+0x14/0x20 [ 193.380596][ T9151] ? mutex_lock+0xa5/0x110 [ 193.384847][ T9151] ? mutex_trylock+0xa0/0xa0 [ 193.389273][ T9151] ? __fdget_pos+0x2e7/0x3a0 [ 193.393698][ T9151] ? ksys_read+0x77/0x2c0 [ 193.397865][ T9151] ksys_read+0x199/0x2c0 [ 193.401947][ T9151] ? vfs_write+0xe70/0xe70 [ 193.406575][ T9151] ? debug_smp_processor_id+0x17/0x20 [ 193.411773][ T9151] __x64_sys_read+0x7b/0x90 [ 193.416189][ T9151] do_syscall_64+0x34/0x70 [ 193.420452][ T9151] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 193.426252][ T9151] RIP: 0033:0x7f4a0b94bb7c [ 193.430604][ T9151] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 193.450037][ T9151] RSP: 002b:00007f4a09fb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 193.458308][ T9151] RAX: ffffffffffffffda RBX: 00007f4a0bb65fa0 RCX: 00007f4a0b94bb7c [ 193.466087][ T9151] RDX: 000000000000000f RSI: 00007f4a09fb70a0 RDI: 0000000000000007 [ 193.473893][ T9151] RBP: 00007f4a09fb7090 R08: 0000000000000000 R09: 0000000000000000 [ 193.481713][ T9151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 193.489517][ T9151] R13: 0000000000000000 R14: 00007f4a0bb65fa0 R15: 00007fff91918f98 [ 195.441308][ T9231] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.476936][ T9231] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.504408][ T9231] device bridge_slave_0 entered promiscuous mode [ 195.511105][ T9247] FAULT_INJECTION: forcing a failure. [ 195.511105][ T9247] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 195.524533][ T9247] CPU: 0 PID: 9247 Comm: syz.3.3428 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 195.535627][ T9247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 195.545527][ T9247] Call Trace: [ 195.548828][ T9247] dump_stack_lvl+0x1e2/0x24b [ 195.553336][ T9247] ? bfq_pos_tree_add_move+0x43b/0x43b [ 195.558633][ T9247] dump_stack+0x15/0x17 [ 195.562706][ T9247] should_fail+0x3c6/0x510 [ 195.566967][ T9247] should_fail_alloc_page+0x52/0x60 [ 195.572170][ T9247] __alloc_pages_nodemask+0x1b3/0xaf0 [ 195.577464][ T9247] ? __kernel_text_address+0x9b/0x110 [ 195.582675][ T9247] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 195.588058][ T9247] ? stack_trace_save+0x113/0x1c0 [ 195.592915][ T9247] ? terminate_walk+0x407/0x4f0 [ 195.597603][ T9247] ? stack_trace_snprint+0xf0/0xf0 [ 195.602548][ T9247] skb_page_frag_refill+0x21b/0x410 [ 195.607588][ T9247] tun_get_user+0x6cb/0x38f0 [ 195.612009][ T9247] ? kmem_cache_free+0xa9/0x1e0 [ 195.616716][ T9247] ? _kstrtoull+0x3a0/0x4a0 [ 195.621041][ T9247] ? tun_do_read+0x1f60/0x1f60 [ 195.625638][ T9247] ? kstrtouint_from_user+0x20a/0x2a0 [ 195.630849][ T9247] ? kstrtol_from_user+0x310/0x310 [ 195.635798][ T9247] ? htab_map_hash+0x3a7/0x7e0 [ 195.640398][ T9247] ? avc_policy_seqno+0x1b/0x70 [ 195.645083][ T9247] ? selinux_file_permission+0x2bb/0x560 [ 195.650639][ T9247] ? fsnotify_perm+0x67/0x4e0 [ 195.655164][ T9247] tun_chr_write_iter+0x1a8/0x250 [ 195.660020][ T9247] vfs_write+0xb4c/0xe70 [ 195.664092][ T9247] ? kernel_write+0x3d0/0x3d0 [ 195.668704][ T9247] ? __fdget_pos+0x209/0x3a0 [ 195.673127][ T9247] ? ksys_write+0x77/0x2c0 [ 195.677382][ T9247] ksys_write+0x199/0x2c0 [ 195.681550][ T9247] ? __ia32_sys_read+0x90/0x90 [ 195.686189][ T9247] ? debug_smp_processor_id+0x17/0x20 [ 195.691443][ T9247] __x64_sys_write+0x7b/0x90 [ 195.695873][ T9247] do_syscall_64+0x34/0x70 [ 195.700210][ T9247] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 195.705943][ T9247] RIP: 0033:0x7f2272e2b169 [ 195.710192][ T9247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.729647][ T9247] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 195.737868][ T9247] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 195.745766][ T9247] RDX: 0000000000000013 RSI: 0000200000000200 RDI: 00000000000000c8 [ 195.753609][ T9247] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 195.761510][ T9247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.769288][ T9247] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 195.780058][ T9231] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.788426][ T9231] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.790179][ T24] audit: type=1400 audit(1743711605.530:164): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.796075][ T9231] device bridge_slave_1 entered promiscuous mode [ 195.823485][ T24] audit: type=1400 audit(1743711605.530:165): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.854141][ T24] audit: type=1400 audit(1743711605.530:166): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.952320][ T9231] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.959217][ T9231] bridge0: port 2(bridge_slave_1) entered forwarding state [ 195.966317][ T9231] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.973075][ T9231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.048639][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 196.058424][ T49] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.102055][ T49] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.148595][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 196.163597][ T49] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.170496][ T49] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.183182][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 196.191365][ T49] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.198253][ T49] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.221710][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 196.230296][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 196.260881][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 196.276631][ T311] device veth1_macvtap left promiscuous mode [ 196.282648][ T311] device veth0_vlan left promiscuous mode [ 196.467892][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 196.484129][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 196.499944][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 196.510424][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 196.528586][ T9231] device veth0_vlan entered promiscuous mode [ 196.575422][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 196.594152][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 196.635469][ T9231] device veth1_macvtap entered promiscuous mode [ 196.671629][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 196.685047][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 196.733681][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 196.770426][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 196.804849][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 196.878003][ T9296] FAULT_INJECTION: forcing a failure. [ 196.878003][ T9296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 196.892149][ T9296] CPU: 0 PID: 9296 Comm: syz.3.3446 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 196.903334][ T9296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 196.913224][ T9296] Call Trace: [ 196.916356][ T9296] dump_stack_lvl+0x1e2/0x24b [ 196.920859][ T9296] ? bfq_pos_tree_add_move+0x43b/0x43b [ 196.926164][ T9296] ? __kasan_slab_alloc+0x63/0xe0 [ 196.931031][ T9296] ? slab_post_alloc_hook+0x61/0x2f0 [ 196.936151][ T9296] dump_stack+0x15/0x17 [ 196.940136][ T9296] should_fail+0x3c6/0x510 [ 196.944388][ T9296] should_fail_alloc_page+0x52/0x60 [ 196.949424][ T9296] __alloc_pages_nodemask+0x1b3/0xaf0 [ 196.954638][ T9296] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 196.960015][ T9296] kmalloc_order+0x4c/0x170 [ 196.964355][ T9296] kmalloc_order_trace+0x18/0x90 [ 196.969134][ T9296] ? tun_get_user+0x10a6/0x38f0 [ 196.973821][ T9296] __kmalloc_track_caller+0x1dd/0x320 [ 196.979022][ T9296] ? tun_get_user+0x10a6/0x38f0 [ 196.983716][ T9296] pskb_expand_head+0x12b/0x1180 [ 196.988501][ T9296] ? __napi_alloc_skb+0x16a/0x2e0 [ 196.993343][ T9296] tun_get_user+0x10a6/0x38f0 [ 196.997949][ T9296] ? _kstrtoull+0x3a0/0x4a0 [ 197.002465][ T9296] ? tun_do_read+0x1f60/0x1f60 [ 197.007055][ T9296] ? kstrtouint_from_user+0x20a/0x2a0 [ 197.012265][ T9296] ? kstrtol_from_user+0x310/0x310 [ 197.017217][ T9296] ? avc_policy_seqno+0x1b/0x70 [ 197.021904][ T9296] ? selinux_file_permission+0x2bb/0x560 [ 197.027383][ T9296] ? fsnotify_perm+0x67/0x4e0 [ 197.031891][ T9296] tun_chr_write_iter+0x1a8/0x250 [ 197.036746][ T9296] vfs_write+0xb4c/0xe70 [ 197.040846][ T9296] ? kernel_write+0x3d0/0x3d0 [ 197.045343][ T9296] ? __fdget_pos+0x209/0x3a0 [ 197.049774][ T9296] ? ksys_write+0x77/0x2c0 [ 197.054019][ T9296] ksys_write+0x199/0x2c0 [ 197.058189][ T9296] ? __ia32_sys_read+0x90/0x90 [ 197.062788][ T9296] ? debug_smp_processor_id+0x17/0x20 [ 197.067991][ T9296] __x64_sys_write+0x7b/0x90 [ 197.072512][ T9296] do_syscall_64+0x34/0x70 [ 197.076853][ T9296] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 197.082587][ T9296] RIP: 0033:0x7f2272e2b169 [ 197.086874][ T9296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.106536][ T9296] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 197.114777][ T9296] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 197.122584][ T9296] RDX: 000000000000ffbf RSI: 0000200000000380 RDI: 0000000000000004 [ 197.130406][ T9296] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 197.138293][ T9296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.146107][ T9296] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 199.294496][ T9406] FAULT_INJECTION: forcing a failure. [ 199.294496][ T9406] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.307547][ T9406] CPU: 1 PID: 9406 Comm: syz.4.3490 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 199.318639][ T9406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 199.328534][ T9406] Call Trace: [ 199.331674][ T9406] dump_stack_lvl+0x1e2/0x24b [ 199.336179][ T9406] ? bfq_pos_tree_add_move+0x43b/0x43b [ 199.341466][ T9406] ? shmem_getpage_gfp+0x2230/0x2480 [ 199.346587][ T9406] dump_stack+0x15/0x17 [ 199.350846][ T9406] should_fail+0x3c6/0x510 [ 199.355066][ T9406] should_fail_usercopy+0x1a/0x20 [ 199.359930][ T9406] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 199.365885][ T9406] ? shmem_getpage+0xa0/0xa0 [ 199.370263][ T9406] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 199.375992][ T9406] ? memzero_page+0x100/0x100 [ 199.380504][ T9406] generic_perform_write+0x34c/0x570 [ 199.385629][ T9406] ? grab_cache_page_write_begin+0xa0/0xa0 [ 199.391260][ T9406] ? file_remove_privs+0x570/0x570 [ 199.396219][ T9406] ? __kasan_check_write+0x14/0x20 [ 199.401174][ T9406] __generic_file_write_iter+0x23c/0x560 [ 199.406713][ T9406] ? generic_write_checks+0x3b9/0x470 [ 199.411920][ T9406] generic_file_write_iter+0xaf/0x1c0 [ 199.417140][ T9406] vfs_write+0xb4c/0xe70 [ 199.421202][ T9406] ? kernel_write+0x3d0/0x3d0 [ 199.425880][ T9406] ? mutex_trylock+0xa0/0xa0 [ 199.430284][ T9406] ? __fdget_pos+0x2e7/0x3a0 [ 199.434787][ T9406] ? ksys_write+0x77/0x2c0 [ 199.439079][ T9406] ksys_write+0x199/0x2c0 [ 199.443203][ T9406] ? __ia32_sys_read+0x90/0x90 [ 199.447808][ T9406] ? debug_smp_processor_id+0x17/0x20 [ 199.453012][ T9406] __x64_sys_write+0x7b/0x90 [ 199.457440][ T9406] do_syscall_64+0x34/0x70 [ 199.461703][ T9406] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 199.467420][ T9406] RIP: 0033:0x7fec6db00169 [ 199.471708][ T9406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.491254][ T9406] RSP: 002b:00007fec6c16a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 199.499490][ T9406] RAX: ffffffffffffffda RBX: 00007fec6dd18fa0 RCX: 00007fec6db00169 [ 199.507531][ T9406] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 199.515342][ T9406] RBP: 00007fec6c16a090 R08: 0000000000000000 R09: 0000000000000000 [ 199.523152][ T9406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 199.530958][ T9406] R13: 0000000000000000 R14: 00007fec6dd18fa0 R15: 00007fffe183dc58 [ 204.901310][ T9693] geneve1: tun_chr_ioctl cmd 1074025672 [ 204.934305][ T9693] geneve1: ignored: set checksum enabled [ 204.942960][ T9693] geneve1: tun_chr_ioctl cmd 35108 [ 205.846640][ T9730] FAULT_INJECTION: forcing a failure. [ 205.846640][ T9730] name failslab, interval 1, probability 0, space 0, times 0 [ 205.859070][ T9730] CPU: 0 PID: 9730 Comm: syz.1.3616 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 205.870165][ T9730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 205.880057][ T9730] Call Trace: [ 205.883191][ T9730] dump_stack_lvl+0x1e2/0x24b [ 205.887881][ T9730] ? bfq_pos_tree_add_move+0x43b/0x43b [ 205.893166][ T9730] ? stack_trace_save+0x113/0x1c0 [ 205.898036][ T9730] dump_stack+0x15/0x17 [ 205.902030][ T9730] should_fail+0x3c6/0x510 [ 205.906286][ T9730] ? xas_create+0x65e/0x1640 [ 205.910710][ T9730] __should_failslab+0xa4/0xe0 [ 205.915311][ T9730] should_failslab+0x9/0x20 [ 205.919645][ T9730] kmem_cache_alloc+0x3d/0x2e0 [ 205.924243][ T9730] xas_create+0x65e/0x1640 [ 205.928497][ T9730] xas_create_range+0x1b2/0x670 [ 205.933185][ T9730] ? xas_start+0x27b/0x380 [ 205.937457][ T9730] shmem_add_to_page_cache+0x7e6/0x10c0 [ 205.942835][ T9730] ? shmem_alloc_page+0x420/0x420 [ 205.947706][ T9730] ? _raw_spin_lock_irqsave+0x210/0x210 [ 205.953067][ T9730] ? find_lock_entry+0x1df/0x200 [ 205.957841][ T9730] shmem_getpage_gfp+0xa65/0x2480 [ 205.962703][ T9730] ? iov_iter_advance+0x258/0xb20 [ 205.967566][ T9730] ? shmem_getpage+0xa0/0xa0 [ 205.971993][ T9730] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 205.977719][ T9730] shmem_write_begin+0xca/0x1b0 [ 205.982408][ T9730] generic_perform_write+0x2cd/0x570 [ 205.987534][ T9730] ? grab_cache_page_write_begin+0xa0/0xa0 [ 205.993179][ T9730] ? file_remove_privs+0x570/0x570 [ 205.998119][ T9730] ? __kasan_check_write+0x14/0x20 [ 206.003065][ T9730] __generic_file_write_iter+0x23c/0x560 [ 206.008623][ T9730] ? generic_write_checks+0x3b9/0x470 [ 206.013858][ T9730] generic_file_write_iter+0xaf/0x1c0 [ 206.019033][ T9730] vfs_write+0xb4c/0xe70 [ 206.023108][ T9730] ? kernel_write+0x3d0/0x3d0 [ 206.027624][ T9730] ? mutex_trylock+0xa0/0xa0 [ 206.032071][ T9730] ? __fdget_pos+0x2e7/0x3a0 [ 206.036474][ T9730] ? ksys_write+0x77/0x2c0 [ 206.041164][ T9730] ksys_write+0x199/0x2c0 [ 206.045502][ T9730] ? __ia32_sys_read+0x90/0x90 [ 206.050109][ T9730] ? debug_smp_processor_id+0x17/0x20 [ 206.055310][ T9730] __x64_sys_write+0x7b/0x90 [ 206.059737][ T9730] do_syscall_64+0x34/0x70 [ 206.064000][ T9730] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 206.069717][ T9730] RIP: 0033:0x7f4a0b94d169 [ 206.073972][ T9730] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.093419][ T9730] RSP: 002b:00007f4a09fb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 206.101673][ T9730] RAX: ffffffffffffffda RBX: 00007f4a0bb65fa0 RCX: 00007f4a0b94d169 [ 206.109570][ T9730] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 206.117370][ T9730] RBP: 00007f4a09fb7090 R08: 0000000000000000 R09: 0000000000000000 [ 206.125222][ T9730] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.132996][ T9730] R13: 0000000000000000 R14: 00007f4a0bb65fa0 R15: 00007fff91918f98 [ 207.690939][ T9794] device pim6reg1 entered promiscuous mode [ 207.797948][ T9794] device veth0_vlan left promiscuous mode [ 207.820962][ T9794] device veth0_vlan entered promiscuous mode [ 208.018413][ T9810] bridge0: port 1(bridge_slave_0) entered disabled state [ 210.086100][ T9921] device pim6reg1 entered promiscuous mode [ 211.354920][T10006] device syzkaller0 entered promiscuous mode [ 211.444736][T10006] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.451861][T10006] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.586415][T10080] FAULT_INJECTION: forcing a failure. [ 212.586415][T10080] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.606102][T10080] CPU: 0 PID: 10080 Comm: syz.1.3765 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 212.617291][T10080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 212.627273][T10080] Call Trace: [ 212.630409][T10080] dump_stack_lvl+0x1e2/0x24b [ 212.634918][T10080] ? bfq_pos_tree_add_move+0x43b/0x43b [ 212.640213][T10080] dump_stack+0x15/0x17 [ 212.644200][T10080] should_fail+0x3c6/0x510 [ 212.648453][T10080] should_fail_alloc_page+0x52/0x60 [ 212.653496][T10080] __alloc_pages_nodemask+0x1b3/0xaf0 [ 212.658705][T10080] ? do_syscall_64+0x34/0x70 [ 212.663130][T10080] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 212.669038][T10080] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 212.674418][T10080] ? avc_has_perm_noaudit+0x117/0x240 [ 212.679620][T10080] shmem_alloc_page+0x257/0x420 [ 212.684304][T10080] ? put_page+0xd0/0xd0 [ 212.688297][T10080] ? slab_post_alloc_hook+0x61/0x2f0 [ 212.693419][T10080] ? percpu_counter_add_batch+0x13d/0x160 [ 212.698979][T10080] shmem_alloc_and_acct_page+0x395/0x8e0 [ 212.704458][T10080] ? shmem_swapin_page+0x1950/0x1950 [ 212.709559][T10080] ? find_get_entry+0x44c/0x4c0 [ 212.714238][T10080] ? page_cache_prev_miss+0x410/0x410 [ 212.719446][T10080] ? down_read_trylock+0x179/0x1d0 [ 212.724406][T10080] ? find_lock_entry+0x1df/0x200 [ 212.729169][T10080] shmem_getpage_gfp+0x891/0x2480 [ 212.734040][T10080] ? __kasan_check_write+0x14/0x20 [ 212.738993][T10080] ? shmem_getpage+0xa0/0xa0 [ 212.743418][T10080] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 212.749135][T10080] shmem_write_begin+0xca/0x1b0 [ 212.753829][T10080] generic_perform_write+0x2cd/0x570 [ 212.758944][T10080] ? grab_cache_page_write_begin+0xa0/0xa0 [ 212.764582][T10080] ? file_remove_privs+0x570/0x570 [ 212.769570][T10080] ? __kasan_check_write+0x14/0x20 [ 212.774485][T10080] __generic_file_write_iter+0x23c/0x560 [ 212.779950][T10080] ? generic_write_checks+0x3b9/0x470 [ 212.785159][T10080] generic_file_write_iter+0xaf/0x1c0 [ 212.790363][T10080] vfs_write+0xb4c/0xe70 [ 212.794460][T10080] ? kernel_write+0x3d0/0x3d0 [ 212.798973][T10080] ? mutex_trylock+0xa0/0xa0 [ 212.803398][T10080] ? __fdget_pos+0x2e7/0x3a0 [ 212.807818][T10080] ? ksys_write+0x77/0x2c0 [ 212.812064][T10080] ksys_write+0x199/0x2c0 [ 212.816230][T10080] ? __ia32_sys_read+0x90/0x90 [ 212.820840][T10080] ? debug_smp_processor_id+0x17/0x20 [ 212.826037][T10080] __x64_sys_write+0x7b/0x90 [ 212.830594][T10080] do_syscall_64+0x34/0x70 [ 212.834832][T10080] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 212.840562][T10080] RIP: 0033:0x7f4a0b94d169 [ 212.844810][T10080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.864341][T10080] RSP: 002b:00007f4a09fb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 212.872585][T10080] RAX: ffffffffffffffda RBX: 00007f4a0bb65fa0 RCX: 00007f4a0b94d169 [ 212.880411][T10080] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 212.888196][T10080] RBP: 00007f4a09fb7090 R08: 0000000000000000 R09: 0000000000000000 [ 212.896011][T10080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.903829][T10080] R13: 0000000000000000 R14: 00007f4a0bb65fa0 R15: 00007fff91918f98 [ 214.458867][T10177] device wg2 entered promiscuous mode [ 214.480185][T10168] device veth0_vlan left promiscuous mode [ 214.499253][T10168] device veth0_vlan entered promiscuous mode [ 216.251479][T10236] FAULT_INJECTION: forcing a failure. [ 216.251479][T10236] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 216.289298][T10236] CPU: 0 PID: 10236 Comm: syz.3.3811 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 216.300502][T10236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 216.310390][T10236] Call Trace: [ 216.313522][T10236] dump_stack_lvl+0x1e2/0x24b [ 216.318043][T10236] ? bfq_pos_tree_add_move+0x43b/0x43b [ 216.323328][T10236] dump_stack+0x15/0x17 [ 216.327328][T10236] should_fail+0x3c6/0x510 [ 216.331589][T10236] should_fail_usercopy+0x1a/0x20 [ 216.336433][T10236] copy_page_from_iter+0x398/0x6e0 [ 216.341469][T10236] tun_get_user+0x755/0x38f0 [ 216.346084][T10236] ? _kstrtoull+0x3a0/0x4a0 [ 216.350402][T10236] ? tun_do_read+0x1f60/0x1f60 [ 216.355008][T10236] ? kstrtouint_from_user+0x20a/0x2a0 [ 216.360219][T10236] ? kstrtol_from_user+0x310/0x310 [ 216.365168][T10236] ? avc_policy_seqno+0x1b/0x70 [ 216.369854][T10236] ? selinux_file_permission+0x2bb/0x560 [ 216.375332][T10236] ? fsnotify_perm+0x67/0x4e0 [ 216.379844][T10236] tun_chr_write_iter+0x1a8/0x250 [ 216.384704][T10236] vfs_write+0xb4c/0xe70 [ 216.388930][T10236] ? kernel_write+0x3d0/0x3d0 [ 216.393435][T10236] ? __fdget_pos+0x209/0x3a0 [ 216.397867][T10236] ? ksys_write+0x77/0x2c0 [ 216.402118][T10236] ksys_write+0x199/0x2c0 [ 216.406288][T10236] ? __ia32_sys_read+0x90/0x90 [ 216.410878][T10236] ? debug_smp_processor_id+0x17/0x20 [ 216.416087][T10236] __x64_sys_write+0x7b/0x90 [ 216.420513][T10236] do_syscall_64+0x34/0x70 [ 216.424765][T10236] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 216.430492][T10236] RIP: 0033:0x7f2272e2b169 [ 216.434771][T10236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.454290][T10236] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 216.462715][T10236] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 216.470519][T10236] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 216.478331][T10236] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 216.486148][T10236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.494673][T10236] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 216.911825][ T24] audit: type=1400 audit(1743711626.650:167): avc: denied { create } for pid=10258 comm="syz.1.3819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 218.414887][T10299] FAULT_INJECTION: forcing a failure. [ 218.414887][T10299] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 218.428078][T10299] CPU: 0 PID: 10299 Comm: syz.3.3834 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 218.439258][T10299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 218.449147][T10299] Call Trace: [ 218.452280][T10299] dump_stack_lvl+0x1e2/0x24b [ 218.456791][T10299] ? bfq_pos_tree_add_move+0x43b/0x43b [ 218.462077][T10299] ? __kernel_text_address+0x9b/0x110 [ 218.467294][T10299] dump_stack+0x15/0x17 [ 218.471275][T10299] should_fail+0x3c6/0x510 [ 218.475529][T10299] should_fail_alloc_page+0x52/0x60 [ 218.480560][T10299] __alloc_pages_nodemask+0x1b3/0xaf0 [ 218.485776][T10299] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 218.491240][T10299] ? kmem_cache_free+0xa9/0x1e0 [ 218.495927][T10299] ? kasan_set_track+0x5d/0x70 [ 218.500527][T10299] ? kasan_set_track+0x4b/0x70 [ 218.505143][T10299] ? kasan_set_free_info+0x23/0x40 [ 218.510082][T10299] ? ____kasan_slab_free+0x121/0x160 [ 218.515289][T10299] ? __kasan_slab_free+0x11/0x20 [ 218.520194][T10299] ? kmem_cache_free+0xa9/0x1e0 [ 218.524868][T10299] ? putname+0xe7/0x140 [ 218.528857][T10299] ? do_sys_openat2+0x1fc/0x710 [ 218.533547][T10299] ? __x64_sys_openat+0x243/0x290 [ 218.538417][T10299] ? do_syscall_64+0x34/0x70 [ 218.542837][T10299] new_slab+0x80/0x400 [ 218.546744][T10299] ___slab_alloc+0x302/0x4b0 [ 218.551174][T10299] ? kstrtouint_from_user+0x20a/0x2a0 [ 218.556374][T10299] ? __alloc_skb+0x80/0x510 [ 218.560711][T10299] __slab_alloc+0x63/0xa0 [ 218.565076][T10299] ? __alloc_skb+0x80/0x510 [ 218.569416][T10299] ? __alloc_skb+0x80/0x510 [ 218.573760][T10299] kmem_cache_alloc+0x1b9/0x2e0 [ 218.578445][T10299] ? __alloc_skb+0x80/0x510 [ 218.582784][T10299] __alloc_skb+0x80/0x510 [ 218.586951][T10299] ppp_write+0xb7/0x360 [ 218.590953][T10299] ? ppp_read+0x8e0/0x8e0 [ 218.595109][T10299] vfs_write+0x36a/0xe70 [ 218.599189][T10299] ? kmem_cache_free+0x1c0/0x1e0 [ 218.603969][T10299] ? kernel_write+0x3d0/0x3d0 [ 218.608479][T10299] ? __fget_files+0x31e/0x380 [ 218.613009][T10299] ? __fdget_pos+0x209/0x3a0 [ 218.617517][T10299] ? ksys_write+0x77/0x2c0 [ 218.621763][T10299] ksys_write+0x199/0x2c0 [ 218.625931][T10299] ? __ia32_sys_read+0x90/0x90 [ 218.630634][T10299] ? debug_smp_processor_id+0x17/0x20 [ 218.635827][T10299] __x64_sys_write+0x7b/0x90 [ 218.640246][T10299] do_syscall_64+0x34/0x70 [ 218.644502][T10299] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 218.650227][T10299] RIP: 0033:0x7f2272e2b169 [ 218.654485][T10299] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 218.674010][T10299] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 218.682343][T10299] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 218.690152][T10299] RDX: 0000000000000017 RSI: 0000000000000000 RDI: 0000000000000003 [ 218.697964][T10299] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 218.705781][T10299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 218.713674][T10299] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 219.258122][T10344] FAULT_INJECTION: forcing a failure. [ 219.258122][T10344] name failslab, interval 1, probability 0, space 0, times 0 [ 219.271028][T10344] CPU: 0 PID: 10344 Comm: syz.2.3851 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 219.282154][T10344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 219.292047][T10344] Call Trace: [ 219.295193][T10344] dump_stack_lvl+0x1e2/0x24b [ 219.299689][T10344] ? panic+0x812/0x812 [ 219.303618][T10344] ? __kasan_check_write+0x14/0x20 [ 219.308546][T10344] ? bfq_pos_tree_add_move+0x43b/0x43b [ 219.313839][T10344] ? debug_smp_processor_id+0x17/0x20 [ 219.319045][T10344] dump_stack+0x15/0x17 [ 219.323043][T10344] should_fail+0x3c6/0x510 [ 219.327292][T10344] ? __alloc_skb+0x80/0x510 [ 219.331633][T10344] __should_failslab+0xa4/0xe0 [ 219.336418][T10344] should_failslab+0x9/0x20 [ 219.340747][T10344] kmem_cache_alloc+0x3d/0x2e0 [ 219.345348][T10344] __alloc_skb+0x80/0x510 [ 219.349512][T10344] ? _raw_write_lock_irq+0x170/0x170 [ 219.354635][T10344] ? tipc_nametbl_remove_publ+0x20b/0x1b00 [ 219.360277][T10344] tipc_buf_acquire+0x2b/0xe0 [ 219.364789][T10344] tipc_named_withdraw+0x207/0x7f0 [ 219.369738][T10344] tipc_nametbl_withdraw+0x24a/0x4c0 [ 219.374870][T10344] tipc_sk_leave+0x4a7/0x620 [ 219.379294][T10344] ? __tipc_shutdown+0x1510/0x1510 [ 219.384336][T10344] tipc_release+0xaa/0x1440 [ 219.388661][T10344] sock_close+0xdf/0x270 [ 219.392737][T10344] ? sock_mmap+0xa0/0xa0 [ 219.396817][T10344] __fput+0x33d/0x7b0 [ 219.400640][T10344] ____fput+0x15/0x20 [ 219.404461][T10344] task_work_run+0x129/0x190 [ 219.408978][T10344] exit_to_user_mode_loop+0xbf/0xd0 [ 219.414007][T10344] syscall_exit_to_user_mode+0xa2/0x1a0 [ 219.419396][T10344] do_syscall_64+0x40/0x70 [ 219.423640][T10344] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 219.429369][T10344] RIP: 0033:0x7fba8d19f169 [ 219.433802][T10344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.453262][T10344] RSP: 002b:00007fba8b809038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 219.461495][T10344] RAX: 0000000000000000 RBX: 00007fba8d3b7fa0 RCX: 00007fba8d19f169 [ 219.469308][T10344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 219.477113][T10344] RBP: 00007fba8b809090 R08: 0000000000000000 R09: 0000000000000000 [ 219.485276][T10344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.493087][T10344] R13: 0000000000000000 R14: 00007fba8d3b7fa0 R15: 00007ffcd2693328 [ 219.501035][T10344] tipc: Withdrawal distribution failure [ 219.787235][T10358] device pim6reg1 entered promiscuous mode [ 219.834765][T10360] device veth0_vlan left promiscuous mode [ 219.850372][T10360] device veth0_vlan entered promiscuous mode [ 219.885646][T10358] device veth0_vlan left promiscuous mode [ 219.898180][T10358] device veth0_vlan entered promiscuous mode [ 222.469244][T10475] device veth0_vlan left promiscuous mode [ 222.519372][T10475] device veth0_vlan entered promiscuous mode [ 222.580725][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 222.598832][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 222.628223][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 223.449454][T10519] FAULT_INJECTION: forcing a failure. [ 223.449454][T10519] name failslab, interval 1, probability 0, space 0, times 0 [ 223.540972][T10519] CPU: 1 PID: 10519 Comm: syz.0.3913 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 223.552400][T10519] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 223.562364][T10519] Call Trace: [ 223.565673][T10519] dump_stack_lvl+0x1e2/0x24b [ 223.570189][T10519] ? panic+0x812/0x812 [ 223.574095][T10519] ? bfq_pos_tree_add_move+0x43b/0x43b [ 223.579380][T10519] ? __alloc_pages_nodemask+0x435/0xaf0 [ 223.584770][T10519] dump_stack+0x15/0x17 [ 223.588752][T10519] should_fail+0x3c6/0x510 [ 223.593020][T10519] ? __build_skb+0x2a/0x300 [ 223.597350][T10519] __should_failslab+0xa4/0xe0 [ 223.601962][T10519] should_failslab+0x9/0x20 [ 223.606300][T10519] kmem_cache_alloc+0x3d/0x2e0 [ 223.610892][T10519] __build_skb+0x2a/0x300 [ 223.615062][T10519] build_skb+0x25/0x1e0 [ 223.619052][T10519] tun_get_user+0x1bd6/0x38f0 [ 223.623656][T10519] ? _kstrtoull+0x3a0/0x4a0 [ 223.628003][T10519] ? tun_do_read+0x1f60/0x1f60 [ 223.632593][T10519] ? kstrtouint_from_user+0x20a/0x2a0 [ 223.637799][T10519] ? kstrtol_from_user+0x310/0x310 [ 223.642746][T10519] ? avc_policy_seqno+0x1b/0x70 [ 223.647873][T10519] ? selinux_file_permission+0x2bb/0x560 [ 223.653341][T10519] ? fsnotify_perm+0x67/0x4e0 [ 223.658056][T10519] tun_chr_write_iter+0x1a8/0x250 [ 223.662891][T10519] vfs_write+0xb4c/0xe70 [ 223.667096][T10519] ? kernel_write+0x3d0/0x3d0 [ 223.671604][T10519] ? __fdget_pos+0x209/0x3a0 [ 223.676034][T10519] ? ksys_write+0x77/0x2c0 [ 223.680275][T10519] ksys_write+0x199/0x2c0 [ 223.684445][T10519] ? __ia32_sys_read+0x90/0x90 [ 223.689062][T10519] ? debug_smp_processor_id+0x17/0x20 [ 223.694254][T10519] __x64_sys_write+0x7b/0x90 [ 223.698693][T10519] do_syscall_64+0x34/0x70 [ 223.703052][T10519] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 223.708772][T10519] RIP: 0033:0x7f2139284169 [ 223.713020][T10519] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.732550][T10519] RSP: 002b:00007f21378ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 223.740788][T10519] RAX: ffffffffffffffda RBX: 00007f213949cfa0 RCX: 00007f2139284169 [ 223.748689][T10519] RDX: 0000000000000013 RSI: 0000200000000200 RDI: 00000000000000c8 [ 223.756498][T10519] RBP: 00007f21378ee090 R08: 0000000000000000 R09: 0000000000000000 [ 223.764327][T10519] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.772126][T10519] R13: 0000000000000000 R14: 00007f213949cfa0 R15: 00007ffdff2f8c48 [ 224.086665][T10540] FAULT_INJECTION: forcing a failure. [ 224.086665][T10540] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.184293][T10540] CPU: 0 PID: 10540 Comm: syz.4.3920 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 224.195609][T10540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 224.205744][T10540] Call Trace: [ 224.209422][T10540] dump_stack_lvl+0x1e2/0x24b [ 224.214063][T10540] ? bfq_pos_tree_add_move+0x43b/0x43b [ 224.219352][T10540] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 224.225003][T10540] dump_stack+0x15/0x17 [ 224.228988][T10540] should_fail+0x3c6/0x510 [ 224.233239][T10540] should_fail_usercopy+0x1a/0x20 [ 224.238110][T10540] _copy_to_user+0x20/0x90 [ 224.242378][T10540] simple_read_from_buffer+0xc7/0x150 [ 224.247567][T10540] proc_fail_nth_read+0x1a3/0x210 [ 224.252424][T10540] ? proc_fault_inject_write+0x390/0x390 [ 224.257894][T10540] ? security_file_permission+0x86/0xb0 [ 224.263271][T10540] ? rw_verify_area+0x1c3/0x360 [ 224.267951][T10540] ? proc_fault_inject_write+0x390/0x390 [ 224.273425][T10540] vfs_read+0x200/0xba0 [ 224.277416][T10540] ? kernel_read+0x70/0x70 [ 224.281669][T10540] ? __kasan_check_write+0x14/0x20 [ 224.286967][T10540] ? mutex_lock+0xa5/0x110 [ 224.291212][T10540] ? mutex_trylock+0xa0/0xa0 [ 224.295652][T10540] ? __fdget_pos+0x2e7/0x3a0 [ 224.300070][T10540] ? ksys_read+0x77/0x2c0 [ 224.304371][T10540] ksys_read+0x199/0x2c0 [ 224.308451][T10540] ? vfs_write+0xe70/0xe70 [ 224.312862][T10540] __x64_sys_read+0x7b/0x90 [ 224.317309][T10540] do_syscall_64+0x34/0x70 [ 224.321549][T10540] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.327274][T10540] RIP: 0033:0x7fec6dafeb7c [ 224.331544][T10540] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 224.351476][T10540] RSP: 002b:00007fec6c16a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 224.360014][T10540] RAX: ffffffffffffffda RBX: 00007fec6dd18fa0 RCX: 00007fec6dafeb7c [ 224.367789][T10540] RDX: 000000000000000f RSI: 00007fec6c16a0a0 RDI: 0000000000000008 [ 224.375750][T10540] RBP: 00007fec6c16a090 R08: 0000000000000000 R09: 0000000000000000 [ 224.383585][T10540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.391403][T10540] R13: 0000000000000000 R14: 00007fec6dd18fa0 R15: 00007fffe183dc58 [ 225.702263][T10596] device pim6reg1 entered promiscuous mode [ 225.782138][T10601] FAULT_INJECTION: forcing a failure. [ 225.782138][T10601] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 225.795145][T10601] CPU: 0 PID: 10601 Comm: syz.3.3943 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 225.806317][T10601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 225.816210][T10601] Call Trace: [ 225.819337][T10601] dump_stack_lvl+0x1e2/0x24b [ 225.823845][T10601] ? bfq_pos_tree_add_move+0x43b/0x43b [ 225.829136][T10601] ? shmem_getpage_gfp+0x2230/0x2480 [ 225.834262][T10601] dump_stack+0x15/0x17 [ 225.838250][T10601] should_fail+0x3c6/0x510 [ 225.842506][T10601] should_fail_usercopy+0x1a/0x20 [ 225.847366][T10601] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 225.853269][T10601] ? shmem_getpage+0xa0/0xa0 [ 225.857710][T10601] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 225.863436][T10601] ? memzero_page+0x100/0x100 [ 225.867949][T10601] generic_perform_write+0x34c/0x570 [ 225.873070][T10601] ? grab_cache_page_write_begin+0xa0/0xa0 [ 225.878706][T10601] ? file_remove_privs+0x570/0x570 [ 225.883683][T10601] ? __kasan_check_write+0x14/0x20 [ 225.888601][T10601] __generic_file_write_iter+0x23c/0x560 [ 225.894068][T10601] ? generic_write_checks+0x3b9/0x470 [ 225.899275][T10601] generic_file_write_iter+0xaf/0x1c0 [ 225.904483][T10601] vfs_write+0xb4c/0xe70 [ 225.908559][T10601] ? kernel_write+0x3d0/0x3d0 [ 225.913075][T10601] ? mutex_trylock+0xa0/0xa0 [ 225.917505][T10601] ? __fdget_pos+0x2e7/0x3a0 [ 225.922011][T10601] ? ksys_write+0x77/0x2c0 [ 225.926266][T10601] ksys_write+0x199/0x2c0 [ 225.930546][T10601] ? __ia32_sys_read+0x90/0x90 [ 225.935218][T10601] ? debug_smp_processor_id+0x17/0x20 [ 225.940426][T10601] __x64_sys_write+0x7b/0x90 [ 225.944937][T10601] do_syscall_64+0x34/0x70 [ 225.949278][T10601] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.955697][T10601] RIP: 0033:0x7f2272e2b169 [ 225.959949][T10601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.979488][T10601] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 225.987993][T10601] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 225.995908][T10601] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 226.003694][T10601] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 226.011606][T10601] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 226.019499][T10601] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 226.868370][T10637] device sit0 entered promiscuous mode [ 228.246678][T10700] device pim6reg1 entered promiscuous mode [ 229.946017][T10765] device syzkaller0 entered promiscuous mode [ 230.277920][T10778] FAULT_INJECTION: forcing a failure. [ 230.277920][T10778] name failslab, interval 1, probability 0, space 0, times 0 [ 230.292013][T10778] CPU: 0 PID: 10778 Comm: syz.0.4009 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 230.303203][T10778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 230.313087][T10778] Call Trace: [ 230.316321][T10778] dump_stack_lvl+0x1e2/0x24b [ 230.320839][T10778] ? panic+0x812/0x812 [ 230.324762][T10778] ? bfq_pos_tree_add_move+0x43b/0x43b [ 230.330039][T10778] ? __alloc_pages_nodemask+0x435/0xaf0 [ 230.335419][T10778] dump_stack+0x15/0x17 [ 230.339404][T10778] should_fail+0x3c6/0x510 [ 230.343655][T10778] ? __build_skb+0x2a/0x300 [ 230.348006][T10778] __should_failslab+0xa4/0xe0 [ 230.352601][T10778] should_failslab+0x9/0x20 [ 230.356942][T10778] kmem_cache_alloc+0x3d/0x2e0 [ 230.361552][T10778] __build_skb+0x2a/0x300 [ 230.365708][T10778] build_skb+0x25/0x1e0 [ 230.369699][T10778] tun_get_user+0x1bd6/0x38f0 [ 230.374227][T10778] ? _kstrtoull+0x3a0/0x4a0 [ 230.378555][T10778] ? tun_do_read+0x1f60/0x1f60 [ 230.383152][T10778] ? kstrtouint_from_user+0x20a/0x2a0 [ 230.388372][T10778] ? kstrtol_from_user+0x310/0x310 [ 230.393399][T10778] ? avc_policy_seqno+0x1b/0x70 [ 230.398177][T10778] ? selinux_file_permission+0x2bb/0x560 [ 230.403647][T10778] ? fsnotify_perm+0x67/0x4e0 [ 230.408162][T10778] tun_chr_write_iter+0x1a8/0x250 [ 230.413023][T10778] vfs_write+0xb4c/0xe70 [ 230.417103][T10778] ? kernel_write+0x3d0/0x3d0 [ 230.421722][T10778] ? __fdget_pos+0x209/0x3a0 [ 230.426141][T10778] ? ksys_write+0x77/0x2c0 [ 230.430552][T10778] ksys_write+0x199/0x2c0 [ 230.434699][T10778] ? __ia32_sys_read+0x90/0x90 [ 230.439246][T10778] ? debug_smp_processor_id+0x17/0x20 [ 230.444464][T10778] __x64_sys_write+0x7b/0x90 [ 230.448897][T10778] do_syscall_64+0x34/0x70 [ 230.453136][T10778] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 230.458861][T10778] RIP: 0033:0x7f2139284169 [ 230.463113][T10778] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 230.482558][T10778] RSP: 002b:00007f21378ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 230.490894][T10778] RAX: ffffffffffffffda RBX: 00007f213949cfa0 RCX: 00007f2139284169 [ 230.498791][T10778] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 230.506602][T10778] RBP: 00007f21378ee090 R08: 0000000000000000 R09: 0000000000000000 [ 230.514415][T10778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 230.522214][T10778] R13: 0000000000000000 R14: 00007f213949cfa0 R15: 00007ffdff2f8c48 [ 231.007109][T10809] device syzkaller0 entered promiscuous mode [ 231.894035][T10826] FAULT_INJECTION: forcing a failure. [ 231.894035][T10826] name failslab, interval 1, probability 0, space 0, times 0 [ 231.926211][T10826] CPU: 1 PID: 10826 Comm: syz.0.4025 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 231.937519][T10826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 231.947400][T10826] Call Trace: [ 231.950535][T10826] dump_stack_lvl+0x1e2/0x24b [ 231.955239][T10826] ? panic+0x812/0x812 [ 231.959138][T10826] ? bfq_pos_tree_add_move+0x43b/0x43b [ 231.964435][T10826] ? __kasan_slab_alloc+0xc3/0xe0 [ 231.969297][T10826] ? slab_post_alloc_hook+0x61/0x2f0 [ 231.974420][T10826] ? kmem_cache_alloc+0x168/0x2e0 [ 231.979281][T10826] ? security_inode_alloc+0x29/0x120 [ 231.984401][T10826] ? inode_init_always+0x767/0x9f0 [ 231.989354][T10826] dump_stack+0x15/0x17 [ 231.993482][T10826] should_fail+0x3c6/0x510 [ 231.997842][T10826] ? __alloc_skb+0x80/0x510 [ 232.002151][T10826] __should_failslab+0xa4/0xe0 [ 232.006748][T10826] should_failslab+0x9/0x20 [ 232.011172][T10826] kmem_cache_alloc+0x3d/0x2e0 [ 232.015786][T10826] __alloc_skb+0x80/0x510 [ 232.019943][T10826] ? memcpy+0x56/0x70 [ 232.023754][T10826] alloc_skb_with_frags+0xa1/0x570 [ 232.028701][T10826] ? avc_has_perm_noaudit+0x240/0x240 [ 232.033911][T10826] sock_alloc_send_pskb+0x915/0xa50 [ 232.038943][T10826] ? sock_kzfree_s+0x60/0x60 [ 232.043365][T10826] ? __kasan_check_write+0x14/0x20 [ 232.048329][T10826] ? _raw_spin_lock+0xa4/0x1b0 [ 232.052928][T10826] ? _raw_spin_trylock_bh+0x190/0x190 [ 232.058140][T10826] unix_dgram_sendmsg+0x700/0x1f90 [ 232.063079][T10826] ? selinux_socket_sendmsg+0x243/0x340 [ 232.068473][T10826] ? unix_dgram_poll+0x620/0x620 [ 232.073244][T10826] ? kmem_cache_free+0xa9/0x1e0 [ 232.077933][T10826] ? kasan_set_track+0x5d/0x70 [ 232.082692][T10826] unix_seqpacket_sendmsg+0x120/0x1f0 [ 232.087898][T10826] ? unix_dgram_peer_wake_me+0x3e0/0x3e0 [ 232.093366][T10826] ____sys_sendmsg+0x59e/0x8f0 [ 232.097967][T10826] ? __sys_sendmsg_sock+0x40/0x40 [ 232.102831][T10826] ? import_iovec+0xe5/0x120 [ 232.107252][T10826] ___sys_sendmsg+0x252/0x2e0 [ 232.111771][T10826] ? __sys_sendmsg+0x280/0x280 [ 232.116367][T10826] ? rw_verify_area+0x1c3/0x360 [ 232.121057][T10826] ? __fdget+0x1bc/0x240 [ 232.125135][T10826] __se_sys_sendmsg+0x1b1/0x280 [ 232.129823][T10826] ? __x64_sys_sendmsg+0x90/0x90 [ 232.134599][T10826] ? __bpf_trace_sys_enter+0x62/0x70 [ 232.139715][T10826] __x64_sys_sendmsg+0x7b/0x90 [ 232.144315][T10826] do_syscall_64+0x34/0x70 [ 232.148572][T10826] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 232.154298][T10826] RIP: 0033:0x7f2139284169 [ 232.158552][T10826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 232.177992][T10826] RSP: 002b:00007f21378ee038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 232.186244][T10826] RAX: ffffffffffffffda RBX: 00007f213949cfa0 RCX: 00007f2139284169 [ 232.194051][T10826] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000007 [ 232.201948][T10826] RBP: 00007f21378ee090 R08: 0000000000000000 R09: 0000000000000000 [ 232.209761][T10826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 232.217581][T10826] R13: 0000000000000000 R14: 00007f213949cfa0 R15: 00007ffdff2f8c48 [ 233.036430][T10873] dvmrp1: tun_chr_ioctl cmd 1074025681 [ 233.799424][T10898] device syzkaller0 entered promiscuous mode [ 234.561488][T10930] FAULT_INJECTION: forcing a failure. [ 234.561488][T10930] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 234.575231][T10930] CPU: 1 PID: 10930 Comm: syz.0.4062 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 234.586578][T10930] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 234.596528][T10930] Call Trace: [ 234.600190][T10930] dump_stack_lvl+0x1e2/0x24b [ 234.604692][T10930] ? panic+0x812/0x812 [ 234.608594][T10930] ? bfq_pos_tree_add_move+0x43b/0x43b [ 234.613896][T10930] ? ppp_write+0xb7/0x360 [ 234.618063][T10930] dump_stack+0x15/0x17 [ 234.622052][T10930] should_fail+0x3c6/0x510 [ 234.626307][T10930] should_fail_usercopy+0x1a/0x20 [ 234.631163][T10930] _copy_from_user+0x20/0xd0 [ 234.635594][T10930] ppp_write+0x177/0x360 [ 234.639673][T10930] ? ppp_read+0x8e0/0x8e0 [ 234.643844][T10930] vfs_write+0x36a/0xe70 [ 234.648178][T10930] ? kmem_cache_free+0x1c0/0x1e0 [ 234.652951][T10930] ? kernel_write+0x3d0/0x3d0 [ 234.657466][T10930] ? __fget_files+0x31e/0x380 [ 234.661982][T10930] ? __fdget_pos+0x209/0x3a0 [ 234.666405][T10930] ? ksys_write+0x77/0x2c0 [ 234.670670][T10930] ksys_write+0x199/0x2c0 [ 234.674833][T10930] ? __ia32_sys_read+0x90/0x90 [ 234.679516][T10930] ? debug_smp_processor_id+0x17/0x20 [ 234.684820][T10930] __x64_sys_write+0x7b/0x90 [ 234.689323][T10930] do_syscall_64+0x34/0x70 [ 234.693579][T10930] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 234.699315][T10930] RIP: 0033:0x7f2139284169 [ 234.703566][T10930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.723007][T10930] RSP: 002b:00007f21378ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 234.731249][T10930] RAX: ffffffffffffffda RBX: 00007f213949cfa0 RCX: 00007f2139284169 [ 234.739059][T10930] RDX: 0000000000000017 RSI: 0000000000000000 RDI: 0000000000000003 [ 234.747015][T10930] RBP: 00007f21378ee090 R08: 0000000000000000 R09: 0000000000000000 [ 234.754919][T10930] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 234.762722][T10930] R13: 0000000000000000 R14: 00007f213949cfa0 R15: 00007ffdff2f8c48 [ 234.862737][T10942] FAULT_INJECTION: forcing a failure. [ 234.862737][T10942] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 234.877251][T10942] CPU: 0 PID: 10942 Comm: syz.3.4067 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 234.888640][T10942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 234.898517][T10942] Call Trace: [ 234.901687][T10942] dump_stack_lvl+0x1e2/0x24b [ 234.906158][T10942] ? bfq_pos_tree_add_move+0x43b/0x43b [ 234.911465][T10942] dump_stack+0x15/0x17 [ 234.915442][T10942] should_fail+0x3c6/0x510 [ 234.919700][T10942] should_fail_alloc_page+0x52/0x60 [ 234.924733][T10942] __alloc_pages_nodemask+0x1b3/0xaf0 [ 234.929937][T10942] ? do_syscall_64+0x34/0x70 [ 234.934368][T10942] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 234.940388][T10942] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 234.945780][T10942] ? avc_has_perm_noaudit+0x117/0x240 [ 234.950974][T10942] shmem_alloc_page+0x257/0x420 [ 234.955665][T10942] ? put_page+0xd0/0xd0 [ 234.959661][T10942] ? slab_post_alloc_hook+0x61/0x2f0 [ 234.964782][T10942] ? percpu_counter_add_batch+0x13d/0x160 [ 234.970339][T10942] shmem_alloc_and_acct_page+0x395/0x8e0 [ 234.975808][T10942] ? shmem_swapin_page+0x1950/0x1950 [ 234.980925][T10942] ? find_get_entry+0x44c/0x4c0 [ 234.985616][T10942] ? page_cache_prev_miss+0x410/0x410 [ 234.990818][T10942] ? pagevec_add_and_need_flush+0x1fe/0x430 [ 234.996658][T10942] ? __kasan_check_write+0x14/0x20 [ 235.001590][T10942] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 235.006552][T10942] ? _raw_spin_lock_irqsave+0x210/0x210 [ 235.011923][T10942] ? find_lock_entry+0x1df/0x200 [ 235.016692][T10942] shmem_getpage_gfp+0x891/0x2480 [ 235.021567][T10942] ? iov_iter_advance+0x258/0xb20 [ 235.026428][T10942] ? shmem_getpage+0xa0/0xa0 [ 235.030839][T10942] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 235.036581][T10942] shmem_write_begin+0xca/0x1b0 [ 235.041258][T10942] generic_perform_write+0x2cd/0x570 [ 235.046379][T10942] ? grab_cache_page_write_begin+0xa0/0xa0 [ 235.052019][T10942] ? file_remove_privs+0x570/0x570 [ 235.056969][T10942] ? __kasan_check_write+0x14/0x20 [ 235.061938][T10942] __generic_file_write_iter+0x23c/0x560 [ 235.067399][T10942] ? generic_write_checks+0x3b9/0x470 [ 235.072602][T10942] generic_file_write_iter+0xaf/0x1c0 [ 235.077805][T10942] vfs_write+0xb4c/0xe70 [ 235.082060][T10942] ? kernel_write+0x3d0/0x3d0 [ 235.086569][T10942] ? mutex_trylock+0xa0/0xa0 [ 235.090995][T10942] ? __fdget_pos+0x2e7/0x3a0 [ 235.095420][T10942] ? ksys_write+0x77/0x2c0 [ 235.099674][T10942] ksys_write+0x199/0x2c0 [ 235.103845][T10942] ? __ia32_sys_read+0x90/0x90 [ 235.108439][T10942] ? debug_smp_processor_id+0x17/0x20 [ 235.113651][T10942] __x64_sys_write+0x7b/0x90 [ 235.118074][T10942] do_syscall_64+0x34/0x70 [ 235.122328][T10942] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 235.128054][T10942] RIP: 0033:0x7f2272e2b169 [ 235.132313][T10942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.151750][T10942] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 235.159997][T10942] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 235.167811][T10942] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 235.176141][T10942] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 235.183952][T10942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.191762][T10942] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 235.312812][T10949] device pim6reg1 entered promiscuous mode [ 235.409407][T10959] device veth0_vlan left promiscuous mode [ 235.415681][T10959] device veth0_vlan entered promiscuous mode [ 236.421851][T10990] device syzkaller0 entered promiscuous mode [ 236.578016][T10996] FAULT_INJECTION: forcing a failure. [ 236.578016][T10996] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 236.597435][T11001] FAULT_INJECTION: forcing a failure. [ 236.597435][T11001] name failslab, interval 1, probability 0, space 0, times 0 [ 236.622021][T10996] CPU: 0 PID: 10996 Comm: syz.2.4085 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 236.633304][T10996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 236.643372][T10996] Call Trace: [ 236.646515][T10996] dump_stack_lvl+0x1e2/0x24b [ 236.651013][T10996] ? bfq_pos_tree_add_move+0x43b/0x43b [ 236.656314][T10996] dump_stack+0x15/0x17 [ 236.660308][T10996] should_fail+0x3c6/0x510 [ 236.664558][T10996] should_fail_alloc_page+0x52/0x60 [ 236.669607][T10996] __alloc_pages_nodemask+0x1b3/0xaf0 [ 236.674806][T10996] ? do_syscall_64+0x34/0x70 [ 236.679224][T10996] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 236.685151][T10996] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 236.690521][T10996] ? avc_has_perm_noaudit+0x117/0x240 [ 236.696077][T10996] shmem_alloc_page+0x257/0x420 [ 236.700756][T10996] ? put_page+0xd0/0xd0 [ 236.704748][T10996] ? slab_post_alloc_hook+0x61/0x2f0 [ 236.709871][T10996] ? percpu_counter_add_batch+0x13d/0x160 [ 236.715509][T10996] shmem_alloc_and_acct_page+0x395/0x8e0 [ 236.720976][T10996] ? shmem_swapin_page+0x1950/0x1950 [ 236.726095][T10996] ? find_get_entry+0x44c/0x4c0 [ 236.730795][T10996] ? page_cache_prev_miss+0x410/0x410 [ 236.735999][T10996] ? down_read_trylock+0x179/0x1d0 [ 236.740943][T10996] ? find_lock_entry+0x1df/0x200 [ 236.745716][T10996] shmem_getpage_gfp+0x891/0x2480 [ 236.750574][T10996] ? __kasan_check_write+0x14/0x20 [ 236.755873][T10996] ? shmem_getpage+0xa0/0xa0 [ 236.760298][T10996] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 236.766030][T10996] shmem_write_begin+0xca/0x1b0 [ 236.770719][T10996] generic_perform_write+0x2cd/0x570 [ 236.775836][T10996] ? grab_cache_page_write_begin+0xa0/0xa0 [ 236.781469][T10996] ? file_remove_privs+0x570/0x570 [ 236.786417][T10996] ? __kasan_check_write+0x14/0x20 [ 236.791481][T10996] __generic_file_write_iter+0x23c/0x560 [ 236.796939][T10996] ? generic_write_checks+0x3b9/0x470 [ 236.802132][T10996] generic_file_write_iter+0xaf/0x1c0 [ 236.807336][T10996] vfs_write+0xb4c/0xe70 [ 236.811411][T10996] ? kernel_write+0x3d0/0x3d0 [ 236.815927][T10996] ? mutex_trylock+0xa0/0xa0 [ 236.820351][T10996] ? __fdget_pos+0x2e7/0x3a0 [ 236.824777][T10996] ? ksys_write+0x77/0x2c0 [ 236.829033][T10996] ksys_write+0x199/0x2c0 [ 236.833196][T10996] ? __ia32_sys_read+0x90/0x90 [ 236.837804][T10996] ? debug_smp_processor_id+0x17/0x20 [ 236.843005][T10996] __x64_sys_write+0x7b/0x90 [ 236.847431][T10996] do_syscall_64+0x34/0x70 [ 236.851688][T10996] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 236.857422][T10996] RIP: 0033:0x7fba8d19f169 [ 236.861838][T10996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 236.881715][T10996] RSP: 002b:00007fba8b809038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 236.889957][T10996] RAX: ffffffffffffffda RBX: 00007fba8d3b7fa0 RCX: 00007fba8d19f169 [ 236.897757][T10996] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 236.905571][T10996] RBP: 00007fba8b809090 R08: 0000000000000000 R09: 0000000000000000 [ 236.913379][T10996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 236.921191][T10996] R13: 0000000000000000 R14: 00007fba8d3b7fa0 R15: 00007ffcd2693328 [ 236.952203][T11001] CPU: 0 PID: 11001 Comm: syz.0.4086 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 236.963397][T11001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 236.973283][T11001] Call Trace: [ 236.976429][T11001] dump_stack_lvl+0x1e2/0x24b [ 236.980927][T11001] ? bfq_pos_tree_add_move+0x43b/0x43b [ 236.986317][T11001] dump_stack+0x15/0x17 [ 236.990300][T11001] should_fail+0x3c6/0x510 [ 236.994559][T11001] ? tipc_msg_create+0x49/0x5d0 [ 236.999242][T11001] __should_failslab+0xa4/0xe0 [ 237.003844][T11001] should_failslab+0x9/0x20 [ 237.008182][T11001] __kmalloc_track_caller+0x5f/0x320 [ 237.013307][T11001] ? kmem_cache_alloc+0x168/0x2e0 [ 237.018161][T11001] ? __alloc_skb+0x80/0x510 [ 237.022501][T11001] ? tipc_msg_create+0x49/0x5d0 [ 237.027213][T11001] __alloc_skb+0xbc/0x510 [ 237.031361][T11001] ? bpf_trace_run1+0x210/0x210 [ 237.036050][T11001] tipc_msg_create+0x49/0x5d0 [ 237.040559][T11001] ? kfree_skbmem+0x104/0x170 [ 237.045109][T11001] tipc_group_proto_xmit+0x14a/0x890 [ 237.050281][T11001] tipc_group_delete+0x123/0x430 [ 237.055056][T11001] ? __tipc_shutdown+0xe7c/0x1510 [ 237.059914][T11001] ? tipc_group_update_member+0x3f0/0x3f0 [ 237.065469][T11001] ? __tipc_shutdown+0x122d/0x1510 [ 237.070527][T11001] ? tipc_group_self+0x27/0x1d0 [ 237.075363][T11001] tipc_sk_leave+0x140/0x620 [ 237.079792][T11001] ? __tipc_shutdown+0x1510/0x1510 [ 237.084740][T11001] tipc_release+0xaa/0x1440 [ 237.089081][T11001] sock_close+0xdf/0x270 [ 237.093506][T11001] ? sock_mmap+0xa0/0xa0 [ 237.097584][T11001] __fput+0x33d/0x7b0 [ 237.101402][T11001] ____fput+0x15/0x20 [ 237.105226][T11001] task_work_run+0x129/0x190 [ 237.109649][T11001] exit_to_user_mode_loop+0xbf/0xd0 [ 237.114692][T11001] syscall_exit_to_user_mode+0xa2/0x1a0 [ 237.120196][T11001] do_syscall_64+0x40/0x70 [ 237.124453][T11001] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 237.130185][T11001] RIP: 0033:0x7f2139284169 [ 237.134436][T11001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 237.153870][T11001] RSP: 002b:00007f21378ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 237.162117][T11001] RAX: 0000000000000000 RBX: 00007f213949cfa0 RCX: 00007f2139284169 [ 237.169928][T11001] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 237.177740][T11001] RBP: 00007f21378ee090 R08: 0000000000000000 R09: 0000000000000000 [ 237.185554][T11001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 237.193362][T11001] R13: 0000000000000000 R14: 00007f213949cfa0 R15: 00007ffdff2f8c48 [ 237.280955][T11020] device sit0 left promiscuous mode [ 237.448646][T11027] device pim6reg1 entered promiscuous mode [ 237.513132][T11030] device veth0_vlan left promiscuous mode [ 237.519478][T11030] device veth0_vlan entered promiscuous mode [ 238.573611][T11072] device veth1_macvtap left promiscuous mode [ 238.584379][T11072] device macsec0 entered promiscuous mode [ 238.592096][T11074] device wg2 left promiscuous mode [ 238.663193][T11074] device wg2 entered promiscuous mode [ 239.066308][T11091] FAULT_INJECTION: forcing a failure. [ 239.066308][T11091] name failslab, interval 1, probability 0, space 0, times 0 [ 239.094290][T11091] CPU: 0 PID: 11091 Comm: syz.2.4119 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 239.105488][T11091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 239.115375][T11091] Call Trace: [ 239.118521][T11091] dump_stack_lvl+0x1e2/0x24b [ 239.123016][T11091] ? panic+0x812/0x812 [ 239.126925][T11091] ? do_syscall_64+0x34/0x70 [ 239.131526][T11091] ? bfq_pos_tree_add_move+0x43b/0x43b [ 239.136821][T11091] dump_stack+0x15/0x17 [ 239.140802][T11091] should_fail+0x3c6/0x510 [ 239.145057][T11091] ? __get_vm_area_node+0x116/0x470 [ 239.150089][T11091] __should_failslab+0xa4/0xe0 [ 239.154697][T11091] should_failslab+0x9/0x20 [ 239.159032][T11091] kmem_cache_alloc_trace+0x3a/0x2e0 [ 239.164157][T11091] __get_vm_area_node+0x116/0x470 [ 239.169012][T11091] __vmalloc_node_range+0xdc/0x7c0 [ 239.173963][T11091] ? copy_process+0x5c8/0x3340 [ 239.178563][T11091] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 239.184549][T11091] ? dup_task_struct+0xc0/0xc30 [ 239.189239][T11091] dup_task_struct+0x429/0xc30 [ 239.193837][T11091] ? copy_process+0x5c8/0x3340 [ 239.198454][T11091] copy_process+0x5c8/0x3340 [ 239.202937][T11091] ? proc_fail_nth_write+0x20b/0x290 [ 239.207988][T11091] ? proc_fail_nth_read+0x210/0x210 [ 239.213019][T11091] ? security_file_permission+0x86/0xb0 [ 239.218403][T11091] ? rw_verify_area+0x1c3/0x360 [ 239.223085][T11091] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 239.228040][T11091] ? vfs_write+0x852/0xe70 [ 239.232295][T11091] kernel_clone+0x21e/0x9e0 [ 239.236630][T11091] ? __kasan_check_write+0x14/0x20 [ 239.241577][T11091] ? create_io_thread+0x1e0/0x1e0 [ 239.246525][T11091] __x64_sys_clone+0x23f/0x290 [ 239.251127][T11091] ? __do_sys_vfork+0x130/0x130 [ 239.255826][T11091] ? debug_smp_processor_id+0x17/0x20 [ 239.261106][T11091] do_syscall_64+0x34/0x70 [ 239.265360][T11091] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 239.271090][T11091] RIP: 0033:0x7fba8d19f169 [ 239.275432][T11091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 239.294903][T11091] RSP: 002b:00007fba8b808fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 239.303119][T11091] RAX: ffffffffffffffda RBX: 00007fba8d3b7fa0 RCX: 00007fba8d19f169 [ 239.310934][T11091] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000004d100000 [ 239.318828][T11091] RBP: 00007fba8b809090 R08: 0000000000000000 R09: 0000000000000000 [ 239.326728][T11091] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 239.334538][T11091] R13: 0000000000000000 R14: 00007fba8d3b7fa0 R15: 00007ffcd2693328 [ 239.414018][T11091] syz.2.4119: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 239.458804][T11091] CPU: 1 PID: 11091 Comm: syz.2.4119 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 239.470012][T11091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 239.480074][T11091] Call Trace: [ 239.483204][T11091] dump_stack_lvl+0x1e2/0x24b [ 239.487720][T11091] ? bfq_pos_tree_add_move+0x43b/0x43b [ 239.493008][T11091] dump_stack+0x15/0x17 [ 239.496996][T11091] warn_alloc+0x21a/0x390 [ 239.501165][T11091] ? __get_vm_area_node+0x116/0x470 [ 239.506200][T11091] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 239.511582][T11091] ? __get_vm_area_node+0x34b/0x470 [ 239.516616][T11091] __vmalloc_node_range+0x287/0x7c0 [ 239.521654][T11091] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 239.527642][T11091] ? dup_task_struct+0xc0/0xc30 [ 239.532323][T11091] dup_task_struct+0x429/0xc30 [ 239.537272][T11091] ? copy_process+0x5c8/0x3340 [ 239.541961][T11091] copy_process+0x5c8/0x3340 [ 239.546405][T11091] ? proc_fail_nth_write+0x20b/0x290 [ 239.551604][T11091] ? proc_fail_nth_read+0x210/0x210 [ 239.556647][T11091] ? security_file_permission+0x86/0xb0 [ 239.562013][T11091] ? rw_verify_area+0x1c3/0x360 [ 239.566701][T11091] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 239.571655][T11091] ? vfs_write+0x852/0xe70 [ 239.575985][T11091] kernel_clone+0x21e/0x9e0 [ 239.580328][T11091] ? __kasan_check_write+0x14/0x20 [ 239.585271][T11091] ? create_io_thread+0x1e0/0x1e0 [ 239.590135][T11091] __x64_sys_clone+0x23f/0x290 [ 239.594732][T11091] ? __do_sys_vfork+0x130/0x130 [ 239.599427][T11091] ? debug_smp_processor_id+0x17/0x20 [ 239.604718][T11091] do_syscall_64+0x34/0x70 [ 239.608968][T11091] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 239.614740][T11091] RIP: 0033:0x7fba8d19f169 [ 239.618951][T11091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 239.638660][T11091] RSP: 002b:00007fba8b808fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 239.646911][T11091] RAX: ffffffffffffffda RBX: 00007fba8d3b7fa0 RCX: 00007fba8d19f169 [ 239.654748][T11091] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000004d100000 [ 239.662618][T11091] RBP: 00007fba8b809090 R08: 0000000000000000 R09: 0000000000000000 [ 239.670427][T11091] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 239.678562][T11091] R13: 0000000000000000 R14: 00007fba8d3b7fa0 R15: 00007ffcd2693328 [ 239.697363][T11091] Mem-Info: [ 239.701107][T11091] active_anon:107 inactive_anon:12461 isolated_anon:0 [ 239.701107][T11091] active_file:22970 inactive_file:3653 isolated_file:0 [ 239.701107][T11091] unevictable:0 dirty:196 writeback:0 [ 239.701107][T11091] slab_reclaimable:7656 slab_unreclaimable:76451 [ 239.701107][T11091] mapped:29116 shmem:232 pagetables:563 bounce:0 [ 239.701107][T11091] free:1561649 free_pcp:1095 free_cma:0 [ 239.771675][T11091] Node 0 active_anon:428kB inactive_anon:35644kB active_file:91880kB inactive_file:14612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:116464kB dirty:784kB writeback:0kB shmem:928kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5216kB all_unreclaimable? no [ 239.860816][T11091] DMA32 free:2981840kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984744kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2904kB local_pcp:1448kB free_cma:0kB [ 239.892743][T11091] lowmem_reserve[]: 0 3941 3941 [ 239.895585][T11113] device sit0 entered promiscuous mode [ 239.901912][T11091] Normal free:3275920kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:440kB inactive_anon:40436kB active_file:91880kB inactive_file:14612kB unevictable:0kB writepending:828kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2288kB bounce:0kB free_pcp:1540kB local_pcp:1152kB free_cma:0kB [ 239.933561][T11091] lowmem_reserve[]: 0 0 0 [ 239.937958][T11091] DMA32: 6*4kB (UM) 5*8kB (M) 5*16kB (M) 6*32kB (UM) 8*64kB (UM) 7*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2981840kB [ 240.001876][T11091] Normal: 539*4kB (UE) 219*8kB (UME) 586*16kB (UME) 894*32kB (UME) 296*64kB (UME) 200*128kB (UM) 99*256kB (UM) 29*512kB (UME) 14*1024kB (UM) 8*2048kB (UM) 761*4096kB (UM) = 3274404kB [ 240.072509][T11091] 26858 total pagecache pages [ 240.078632][T11091] 0 pages in swap cache [ 240.082757][T11091] Swap cache stats: add 0, delete 0, find 0/0 [ 240.088722][T11091] Free swap = 124996kB [ 240.093276][T11091] Total swap = 124996kB [ 240.097826][T11091] 2097051 pages RAM [ 240.101666][T11091] 0 pages HighMem/MovableOnly [ 240.110306][T11091] 341901 pages reserved [ 240.114712][T11091] 0 pages cma reserved [ 240.153614][T11131] device veth1_macvtap entered promiscuous mode [ 240.178584][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.192219][T11131] device veth1_macvtap left promiscuous mode [ 241.376380][T11190] device pim6reg1 entered promiscuous mode [ 243.194359][T11247] FAULT_INJECTION: forcing a failure. [ 243.194359][T11247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 243.207716][T11247] CPU: 0 PID: 11247 Comm: syz.1.4172 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 243.218998][T11247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 243.228965][T11247] Call Trace: [ 243.232109][T11247] dump_stack_lvl+0x1e2/0x24b [ 243.236701][T11247] ? bfq_pos_tree_add_move+0x43b/0x43b [ 243.241995][T11247] ? __alloc_pages_nodemask+0x435/0xaf0 [ 243.247405][T11247] dump_stack+0x15/0x17 [ 243.251385][T11247] should_fail+0x3c6/0x510 [ 243.255628][T11247] should_fail_usercopy+0x1a/0x20 [ 243.260486][T11247] copy_page_from_iter+0x398/0x6e0 [ 243.265438][T11247] pipe_write+0x92b/0x18c0 [ 243.269686][T11247] ? pipe_read+0x1040/0x1040 [ 243.274111][T11247] ? fsnotify_perm+0x67/0x4e0 [ 243.278627][T11247] ? security_file_permission+0x7b/0xb0 [ 243.284005][T11247] ? security_file_permission+0x86/0xb0 [ 243.289387][T11247] ? iov_iter_init+0x3f/0x120 [ 243.293908][T11247] vfs_write+0xb4c/0xe70 [ 243.297985][T11247] ? kernel_write+0x3d0/0x3d0 [ 243.302500][T11247] ? __fdget_pos+0x209/0x3a0 [ 243.306920][T11247] ? ksys_write+0x77/0x2c0 [ 243.311187][T11247] ksys_write+0x199/0x2c0 [ 243.315341][T11247] ? __ia32_sys_read+0x90/0x90 [ 243.319942][T11247] ? debug_smp_processor_id+0x17/0x20 [ 243.325236][T11247] __x64_sys_write+0x7b/0x90 [ 243.329661][T11247] do_syscall_64+0x34/0x70 [ 243.334097][T11247] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 243.339910][T11247] RIP: 0033:0x7f4a0b94d169 [ 243.344180][T11247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.363598][T11247] RSP: 002b:00007f4a09fb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 243.371884][T11247] RAX: ffffffffffffffda RBX: 00007f4a0bb65fa0 RCX: 00007f4a0b94d169 [ 243.379657][T11247] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 243.387483][T11247] RBP: 00007f4a09fb7090 R08: 0000000000000000 R09: 0000000000000000 [ 243.395290][T11247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 243.403095][T11247] R13: 0000000000000000 R14: 00007f4a0bb65fa0 R15: 00007fff91918f98 [ 244.547747][T11293] FAULT_INJECTION: forcing a failure. [ 244.547747][T11293] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 244.613955][T11293] CPU: 1 PID: 11293 Comm: syz.4.4186 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 244.625154][T11293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 244.635040][T11293] Call Trace: [ 244.638173][T11293] dump_stack_lvl+0x1e2/0x24b [ 244.642682][T11293] ? bfq_pos_tree_add_move+0x43b/0x43b [ 244.647979][T11293] dump_stack+0x15/0x17 [ 244.651970][T11293] should_fail+0x3c6/0x510 [ 244.656224][T11293] should_fail_usercopy+0x1a/0x20 [ 244.661083][T11293] _copy_to_user+0x20/0x90 [ 244.665520][T11293] simple_read_from_buffer+0xc7/0x150 [ 244.670743][T11293] proc_fail_nth_read+0x1a3/0x210 [ 244.675587][T11293] ? proc_fault_inject_write+0x390/0x390 [ 244.681141][T11293] ? security_file_permission+0x86/0xb0 [ 244.686523][T11293] ? rw_verify_area+0x1c3/0x360 [ 244.691203][T11293] ? proc_fault_inject_write+0x390/0x390 [ 244.696670][T11293] vfs_read+0x200/0xba0 [ 244.700665][T11293] ? kernel_read+0x70/0x70 [ 244.704919][T11293] ? __kasan_check_write+0x14/0x20 [ 244.709864][T11293] ? mutex_lock+0xa5/0x110 [ 244.714117][T11293] ? mutex_trylock+0xa0/0xa0 [ 244.718551][T11293] ? __fdget_pos+0x2e7/0x3a0 [ 244.722970][T11293] ? ksys_read+0x77/0x2c0 [ 244.727138][T11293] ksys_read+0x199/0x2c0 [ 244.731216][T11293] ? vfs_write+0xe70/0xe70 [ 244.735490][T11293] ? debug_smp_processor_id+0x17/0x20 [ 244.740680][T11293] __x64_sys_read+0x7b/0x90 [ 244.745031][T11293] do_syscall_64+0x34/0x70 [ 244.749294][T11293] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 244.755013][T11293] RIP: 0033:0x7fec6dafeb7c [ 244.759790][T11293] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 244.779342][T11293] RSP: 002b:00007fec6c16a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 244.787588][T11293] RAX: ffffffffffffffda RBX: 00007fec6dd18fa0 RCX: 00007fec6dafeb7c [ 244.795395][T11293] RDX: 000000000000000f RSI: 00007fec6c16a0a0 RDI: 0000000000000006 [ 244.803214][T11293] RBP: 00007fec6c16a090 R08: 0000000000000000 R09: 0000000000000000 [ 244.811030][T11293] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 244.818842][T11293] R13: 0000000000000000 R14: 00007fec6dd18fa0 R15: 00007fffe183dc58 [ 247.491414][T11418] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 247.499127][T11422] FAULT_INJECTION: forcing a failure. [ 247.499127][T11422] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 247.512969][T11418] syzkaller0: linktype set to 804 [ 247.528817][T11422] CPU: 0 PID: 11422 Comm: syz.0.4236 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 247.540009][T11422] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 247.549991][T11422] Call Trace: [ 247.553299][T11422] dump_stack_lvl+0x1e2/0x24b [ 247.557799][T11422] ? bfq_pos_tree_add_move+0x43b/0x43b [ 247.563092][T11422] dump_stack+0x15/0x17 [ 247.567084][T11422] should_fail+0x3c6/0x510 [ 247.571336][T11422] should_fail_alloc_page+0x52/0x60 [ 247.576373][T11422] __alloc_pages_nodemask+0x1b3/0xaf0 [ 247.581594][T11422] ? do_syscall_64+0x34/0x70 [ 247.586008][T11422] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 247.591908][T11422] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 247.597297][T11422] ? avc_has_perm_noaudit+0x117/0x240 [ 247.602510][T11422] shmem_alloc_page+0x257/0x420 [ 247.607189][T11422] ? put_page+0xd0/0xd0 [ 247.611186][T11422] ? slab_post_alloc_hook+0x61/0x2f0 [ 247.616303][T11422] ? percpu_counter_add_batch+0x13d/0x160 [ 247.621860][T11422] shmem_alloc_and_acct_page+0x395/0x8e0 [ 247.627325][T11422] ? shmem_swapin_page+0x1950/0x1950 [ 247.632452][T11422] ? find_get_entry+0x44c/0x4c0 [ 247.637132][T11422] ? page_cache_prev_miss+0x410/0x410 [ 247.642367][T11422] ? down_read_trylock+0x179/0x1d0 [ 247.647291][T11422] ? find_lock_entry+0x1df/0x200 [ 247.652063][T11422] shmem_getpage_gfp+0x891/0x2480 [ 247.656920][T11422] ? __kasan_check_write+0x14/0x20 [ 247.661884][T11422] ? shmem_getpage+0xa0/0xa0 [ 247.666297][T11422] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 247.672027][T11422] shmem_write_begin+0xca/0x1b0 [ 247.676730][T11422] generic_perform_write+0x2cd/0x570 [ 247.681851][T11422] ? grab_cache_page_write_begin+0xa0/0xa0 [ 247.687488][T11422] ? file_remove_privs+0x570/0x570 [ 247.692435][T11422] ? __kasan_check_write+0x14/0x20 [ 247.697380][T11422] __generic_file_write_iter+0x23c/0x560 [ 247.702844][T11422] ? generic_write_checks+0x3b9/0x470 [ 247.708050][T11422] generic_file_write_iter+0xaf/0x1c0 [ 247.713256][T11422] vfs_write+0xb4c/0xe70 [ 247.717336][T11422] ? kernel_write+0x3d0/0x3d0 [ 247.721935][T11422] ? mutex_trylock+0xa0/0xa0 [ 247.726370][T11422] ? __fdget_pos+0x2e7/0x3a0 [ 247.730786][T11422] ? ksys_write+0x77/0x2c0 [ 247.735041][T11422] ksys_write+0x199/0x2c0 [ 247.739206][T11422] ? __ia32_sys_read+0x90/0x90 [ 247.743920][T11422] ? debug_smp_processor_id+0x17/0x20 [ 247.749128][T11422] __x64_sys_write+0x7b/0x90 [ 247.753541][T11422] do_syscall_64+0x34/0x70 [ 247.757800][T11422] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 247.763526][T11422] RIP: 0033:0x7f2139284169 [ 247.767778][T11422] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.787216][T11422] RSP: 002b:00007f21378ee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 247.795579][T11422] RAX: ffffffffffffffda RBX: 00007f213949cfa0 RCX: 00007f2139284169 [ 247.803370][T11422] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 247.811183][T11422] RBP: 00007f21378ee090 R08: 0000000000000000 R09: 0000000000000000 [ 247.818993][T11422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 247.826807][T11422] R13: 0000000000000000 R14: 00007f213949cfa0 R15: 00007ffdff2f8c48 [ 249.136696][T11501] FAULT_INJECTION: forcing a failure. [ 249.136696][T11501] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 249.149970][T11501] CPU: 0 PID: 11501 Comm: syz.3.4270 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 249.161244][T11501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 249.171127][T11501] Call Trace: [ 249.174264][T11501] dump_stack_lvl+0x1e2/0x24b [ 249.178769][T11501] ? bfq_pos_tree_add_move+0x43b/0x43b [ 249.184266][T11501] ? stack_trace_snprint+0xf0/0xf0 [ 249.189210][T11501] dump_stack+0x15/0x17 [ 249.193224][T11501] should_fail+0x3c6/0x510 [ 249.197457][T11501] should_fail_alloc_page+0x52/0x60 [ 249.202498][T11501] __alloc_pages_nodemask+0x1b3/0xaf0 [ 249.207749][T11501] ? __get_vm_area_node+0x156/0x470 [ 249.212818][T11501] ? __vmalloc_node_range+0xdc/0x7c0 [ 249.217941][T11501] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 249.223319][T11501] ? _raw_spin_trylock_bh+0x190/0x190 [ 249.228557][T11501] __get_free_pages+0xe/0x30 [ 249.232964][T11501] kasan_populate_vmalloc_pte+0x39/0x130 [ 249.238518][T11501] ? __apply_to_page_range+0x710/0x9e0 [ 249.243810][T11501] __apply_to_page_range+0x720/0x9e0 [ 249.248931][T11501] ? kasan_populate_vmalloc+0x70/0x70 [ 249.254136][T11501] ? kasan_populate_vmalloc+0x70/0x70 [ 249.259346][T11501] apply_to_page_range+0x3b/0x50 [ 249.264135][T11501] kasan_populate_vmalloc+0x65/0x70 [ 249.269156][T11501] alloc_vmap_area+0x1944/0x1a90 [ 249.273936][T11501] ? vm_map_ram+0x9d0/0x9d0 [ 249.278270][T11501] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 249.283654][T11501] ? __get_vm_area_node+0x116/0x470 [ 249.288696][T11501] __get_vm_area_node+0x156/0x470 [ 249.293552][T11501] __vmalloc_node_range+0xdc/0x7c0 [ 249.298497][T11501] ? copy_process+0x5c8/0x3340 [ 249.303092][T11501] ? kmem_cache_alloc+0x168/0x2e0 [ 249.307952][T11501] ? __kasan_check_write+0x14/0x20 [ 249.312900][T11501] dup_task_struct+0x429/0xc30 [ 249.317519][T11501] ? copy_process+0x5c8/0x3340 [ 249.322100][T11501] copy_process+0x5c8/0x3340 [ 249.326532][T11501] ? proc_fail_nth_write+0x20b/0x290 [ 249.331648][T11501] ? proc_fail_nth_read+0x210/0x210 [ 249.336686][T11501] ? security_file_permission+0x86/0xb0 [ 249.342067][T11501] ? rw_verify_area+0x1c3/0x360 [ 249.346764][T11501] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 249.351701][T11501] ? vfs_write+0x852/0xe70 [ 249.355953][T11501] ? kmem_cache_free+0x1c0/0x1e0 [ 249.360727][T11501] kernel_clone+0x21e/0x9e0 [ 249.365069][T11501] ? __kasan_check_write+0x14/0x20 [ 249.370884][T11501] ? create_io_thread+0x1e0/0x1e0 [ 249.375747][T11501] __x64_sys_clone+0x23f/0x290 [ 249.380346][T11501] ? __do_sys_vfork+0x130/0x130 [ 249.385035][T11501] ? debug_smp_processor_id+0x17/0x20 [ 249.390239][T11501] do_syscall_64+0x34/0x70 [ 249.394496][T11501] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 249.400227][T11501] RIP: 0033:0x7f2272e2b169 [ 249.404480][T11501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 249.424025][T11501] RSP: 002b:00007f2271494fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 249.432269][T11501] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 249.440060][T11501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 249.447873][T11501] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 249.455857][T11501] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 249.463670][T11501] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 249.485494][T11501] syz.3.4270: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 249.499416][T11501] CPU: 0 PID: 11501 Comm: syz.3.4270 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 249.510594][T11501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 249.520495][T11501] Call Trace: [ 249.523625][T11501] dump_stack_lvl+0x1e2/0x24b [ 249.528127][T11501] ? wake_up_klogd+0xb8/0xf0 [ 249.532565][T11501] ? bfq_pos_tree_add_move+0x43b/0x43b [ 249.537847][T11501] ? pr_cont_kernfs_name+0xf0/0x100 [ 249.542878][T11501] dump_stack+0x15/0x17 [ 249.546955][T11501] warn_alloc+0x21a/0x390 [ 249.551120][T11501] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 249.556508][T11501] ? __get_vm_area_node+0x16c/0x470 [ 249.561537][T11501] __vmalloc_node_range+0x287/0x7c0 [ 249.566577][T11501] ? kmem_cache_alloc+0x168/0x2e0 [ 249.571435][T11501] ? __kasan_check_write+0x14/0x20 [ 249.576379][T11501] dup_task_struct+0x429/0xc30 [ 249.581067][T11501] ? copy_process+0x5c8/0x3340 [ 249.585671][T11501] copy_process+0x5c8/0x3340 [ 249.590094][T11501] ? proc_fail_nth_write+0x20b/0x290 [ 249.595214][T11501] ? proc_fail_nth_read+0x210/0x210 [ 249.600248][T11501] ? security_file_permission+0x86/0xb0 [ 249.605720][T11501] ? rw_verify_area+0x1c3/0x360 [ 249.610507][T11501] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 249.615469][T11501] ? vfs_write+0x852/0xe70 [ 249.619717][T11501] ? kmem_cache_free+0x1c0/0x1e0 [ 249.624483][T11501] kernel_clone+0x21e/0x9e0 [ 249.628823][T11501] ? __kasan_check_write+0x14/0x20 [ 249.633772][T11501] ? create_io_thread+0x1e0/0x1e0 [ 249.638632][T11501] __x64_sys_clone+0x23f/0x290 [ 249.643230][T11501] ? __do_sys_vfork+0x130/0x130 [ 249.648009][T11501] ? debug_smp_processor_id+0x17/0x20 [ 249.653218][T11501] do_syscall_64+0x34/0x70 [ 249.657473][T11501] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 249.663196][T11501] RIP: 0033:0x7f2272e2b169 [ 249.667451][T11501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 249.686890][T11501] RSP: 002b:00007f2271494fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 249.695275][T11501] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 249.703056][T11501] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 249.710856][T11501] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 249.718666][T11501] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 249.726472][T11501] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 249.741379][T11501] Mem-Info: [ 249.744398][T11501] active_anon:115 inactive_anon:6590 isolated_anon:0 [ 249.744398][T11501] active_file:22974 inactive_file:3653 isolated_file:0 [ 249.744398][T11501] unevictable:0 dirty:320 writeback:0 [ 249.744398][T11501] slab_reclaimable:7572 slab_unreclaimable:74728 [ 249.744398][T11501] mapped:29144 shmem:240 pagetables:546 bounce:0 [ 249.744398][T11501] free:1567099 free_pcp:1272 free_cma:0 [ 249.797982][T11501] Node 0 active_anon:468kB inactive_anon:26176kB active_file:91896kB inactive_file:14612kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:116588kB dirty:1280kB writeback:0kB shmem:968kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:5280kB all_unreclaimable? no [ 249.827199][T11501] DMA32 free:2981840kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984744kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2904kB local_pcp:1456kB free_cma:0kB [ 249.864595][T11501] lowmem_reserve[]: 0 3941 3941 [ 249.869870][T11501] Normal free:3286348kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:472kB inactive_anon:26828kB active_file:91896kB inactive_file:14612kB unevictable:0kB writepending:1280kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2184kB bounce:0kB free_pcp:1740kB local_pcp:944kB free_cma:0kB [ 250.076461][T11501] lowmem_reserve[]: 0 0 0 [ 250.080729][T11501] DMA32: 6*4kB (UM) 5*8kB (M) 5*16kB (M) 6*32kB (UM) 8*64kB (UM) 7*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2981840kB [ 250.097041][T11501] Normal: 80*4kB (UME) 57*8kB (UE) 527*16kB (UME) 716*32kB (UME) 492*64kB (UME) 190*128kB (UM) 99*256kB (UM) 29*512kB (UME) 14*1024kB (UM) 8*2048kB (UM) 761*4096kB (UM) = 3275896kB [ 250.124072][T11501] 26870 total pagecache pages [ 250.144935][T11501] 0 pages in swap cache [ 250.156598][T11501] Swap cache stats: add 0, delete 0, find 0/0 [ 250.175641][T11501] Free swap = 124996kB [ 250.188542][T11501] Total swap = 124996kB [ 250.201239][T11501] 2097051 pages RAM [ 250.215370][T11501] 0 pages HighMem/MovableOnly [ 250.233208][T11501] 341901 pages reserved [ 250.252998][T11501] 0 pages cma reserved [ 250.758019][T11571] device sit0 left promiscuous mode [ 251.414899][T11590] !€ÿ: renamed from bond_slave_0 [ 251.896211][T11610] bridge0: port 1(bridge_slave_0) entered blocking state [ 251.903313][T11610] bridge0: port 1(bridge_slave_0) entered disabled state [ 251.911169][T11610] device bridge_slave_0 entered promiscuous mode [ 251.925457][T11610] bridge0: port 2(bridge_slave_1) entered blocking state [ 251.943984][T11610] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.952715][T11610] device bridge_slave_1 entered promiscuous mode [ 252.005512][T11610] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.012393][T11610] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.019511][T11610] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.026277][T11610] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.121464][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 252.129226][ T325] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.136903][ T325] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.156302][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 252.164411][ T325] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.171280][ T325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 252.184993][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 252.195368][ T325] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.202216][ T325] bridge0: port 2(bridge_slave_1) entered forwarding state [ 252.210023][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 252.217902][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 252.234743][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 252.246597][T11610] device veth0_vlan entered promiscuous mode [ 252.254451][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 252.262513][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 252.284195][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 252.298654][T11610] device veth1_macvtap entered promiscuous mode [ 252.312486][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 252.344948][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 252.374213][ T325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 252.390349][ T311] device bridge_slave_1 left promiscuous mode [ 252.398285][ T311] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.407683][ T311] device bridge_slave_0 left promiscuous mode [ 252.418169][ T311] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.426870][ T311] device veth0_vlan left promiscuous mode [ 253.313624][T11677] FAULT_INJECTION: forcing a failure. [ 253.313624][T11677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 253.327576][T11677] CPU: 1 PID: 11677 Comm: syz.3.4334 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 253.338772][T11677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 253.348665][T11677] Call Trace: [ 253.351789][T11677] dump_stack_lvl+0x1e2/0x24b [ 253.356312][T11677] ? bfq_pos_tree_add_move+0x43b/0x43b [ 253.361604][T11677] dump_stack+0x15/0x17 [ 253.365601][T11677] should_fail+0x3c6/0x510 [ 253.369854][T11677] should_fail_usercopy+0x1a/0x20 [ 253.374699][T11677] _copy_to_user+0x20/0x90 [ 253.378956][T11677] simple_read_from_buffer+0xc7/0x150 [ 253.384156][T11677] proc_fail_nth_read+0x1a3/0x210 [ 253.389016][T11677] ? proc_fault_inject_write+0x390/0x390 [ 253.394488][T11677] ? security_file_permission+0x86/0xb0 [ 253.399871][T11677] ? rw_verify_area+0x1c3/0x360 [ 253.404644][T11677] ? proc_fault_inject_write+0x390/0x390 [ 253.410107][T11677] vfs_read+0x200/0xba0 [ 253.414103][T11677] ? kernel_read+0x70/0x70 [ 253.418354][T11677] ? __kasan_check_write+0x14/0x20 [ 253.423315][T11677] ? mutex_lock+0xa5/0x110 [ 253.427565][T11677] ? mutex_trylock+0xa0/0xa0 [ 253.432041][T11677] ? __fdget_pos+0x2e7/0x3a0 [ 253.436436][T11677] ? ksys_read+0x77/0x2c0 [ 253.440765][T11677] ksys_read+0x199/0x2c0 [ 253.444856][T11677] ? vfs_write+0xe70/0xe70 [ 253.449110][T11677] ? debug_smp_processor_id+0x17/0x20 [ 253.454299][T11677] __x64_sys_read+0x7b/0x90 [ 253.458647][T11677] do_syscall_64+0x34/0x70 [ 253.462892][T11677] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 253.468625][T11677] RIP: 0033:0x7f2272e29b7c [ 253.472878][T11677] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 253.492317][T11677] RSP: 002b:00007f2271495030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 253.500565][T11677] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e29b7c [ 253.508371][T11677] RDX: 000000000000000f RSI: 00007f22714950a0 RDI: 0000000000000008 [ 253.516185][T11677] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 253.524169][T11677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 253.531981][T11677] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 254.904791][T11737] FAULT_INJECTION: forcing a failure. [ 254.904791][T11737] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 254.947381][T11737] CPU: 1 PID: 11737 Comm: syz.1.4354 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 254.958583][T11737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 254.968674][T11737] Call Trace: [ 254.971791][T11737] dump_stack_lvl+0x1e2/0x24b [ 254.976381][T11737] ? bfq_pos_tree_add_move+0x43b/0x43b [ 254.981674][T11737] dump_stack+0x15/0x17 [ 254.985751][T11737] should_fail+0x3c6/0x510 [ 254.990011][T11737] should_fail_usercopy+0x1a/0x20 [ 254.994867][T11737] _copy_to_user+0x20/0x90 [ 254.999123][T11737] simple_read_from_buffer+0xc7/0x150 [ 255.004329][T11737] proc_fail_nth_read+0x1a3/0x210 [ 255.009187][T11737] ? proc_fault_inject_write+0x390/0x390 [ 255.014664][T11737] ? security_file_permission+0x86/0xb0 [ 255.020044][T11737] ? rw_verify_area+0x1c3/0x360 [ 255.024728][T11737] ? proc_fault_inject_write+0x390/0x390 [ 255.030197][T11737] vfs_read+0x200/0xba0 [ 255.034196][T11737] ? kernel_read+0x70/0x70 [ 255.038452][T11737] ? __kasan_check_write+0x14/0x20 [ 255.043391][T11737] ? mutex_lock+0xa5/0x110 [ 255.047641][T11737] ? mutex_trylock+0xa0/0xa0 [ 255.052180][T11737] ? __fdget_pos+0x2e7/0x3a0 [ 255.056585][T11737] ? ksys_read+0x77/0x2c0 [ 255.060840][T11737] ksys_read+0x199/0x2c0 [ 255.064916][T11737] ? vfs_write+0xe70/0xe70 [ 255.069166][T11737] ? debug_smp_processor_id+0x17/0x20 [ 255.074779][T11737] __x64_sys_read+0x7b/0x90 [ 255.079122][T11737] do_syscall_64+0x34/0x70 [ 255.083376][T11737] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 255.089101][T11737] RIP: 0033:0x7f4a0b94bb7c [ 255.093360][T11737] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 255.112893][T11737] RSP: 002b:00007f4a09fb7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 255.121128][T11737] RAX: ffffffffffffffda RBX: 00007f4a0bb65fa0 RCX: 00007f4a0b94bb7c [ 255.128940][T11737] RDX: 000000000000000f RSI: 00007f4a09fb70a0 RDI: 0000000000000004 [ 255.136753][T11737] RBP: 00007f4a09fb7090 R08: 0000000000000000 R09: 0000000000000000 [ 255.144565][T11737] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 255.152412][T11737] R13: 0000000000000000 R14: 00007f4a0bb65fa0 R15: 00007fff91918f98 [ 255.790969][T11776] device syzkaller0 entered promiscuous mode [ 256.385199][T11797] FAULT_INJECTION: forcing a failure. [ 256.385199][T11797] name failslab, interval 1, probability 0, space 0, times 0 [ 256.503967][T11797] CPU: 1 PID: 11797 Comm: syz.2.4376 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 256.515172][T11797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 256.525237][T11797] Call Trace: [ 256.528375][T11797] dump_stack_lvl+0x1e2/0x24b [ 256.532887][T11797] ? panic+0x812/0x812 [ 256.536792][T11797] ? bfq_pos_tree_add_move+0x43b/0x43b [ 256.542085][T11797] dump_stack+0x15/0x17 [ 256.546163][T11797] should_fail+0x3c6/0x510 [ 256.550435][T11797] ? alloc_skb_with_frags+0xa1/0x570 [ 256.555712][T11797] __should_failslab+0xa4/0xe0 [ 256.560315][T11797] should_failslab+0x9/0x20 [ 256.564651][T11797] __kmalloc_track_caller+0x5f/0x320 [ 256.569786][T11797] ? kmem_cache_alloc+0x168/0x2e0 [ 256.574668][T11797] ? __alloc_skb+0x80/0x510 [ 256.578974][T11797] ? alloc_skb_with_frags+0xa1/0x570 [ 256.584097][T11797] __alloc_skb+0xbc/0x510 [ 256.588271][T11797] ? memcpy+0x56/0x70 [ 256.592087][T11797] alloc_skb_with_frags+0xa1/0x570 [ 256.597116][T11797] ? avc_has_perm_noaudit+0x240/0x240 [ 256.602413][T11797] sock_alloc_send_pskb+0x915/0xa50 [ 256.607449][T11797] ? sock_kzfree_s+0x60/0x60 [ 256.611871][T11797] ? __kasan_check_write+0x14/0x20 [ 256.616825][T11797] ? _raw_spin_lock+0xa4/0x1b0 [ 256.621422][T11797] ? _raw_spin_trylock_bh+0x190/0x190 [ 256.626634][T11797] unix_dgram_sendmsg+0x700/0x1f90 [ 256.631921][T11797] ? selinux_socket_sendmsg+0x243/0x340 [ 256.637313][T11797] ? unix_dgram_poll+0x620/0x620 [ 256.642078][T11797] ? kmem_cache_free+0xa9/0x1e0 [ 256.646762][T11797] ? kasan_set_track+0x5d/0x70 [ 256.651424][T11797] unix_seqpacket_sendmsg+0x120/0x1f0 [ 256.656581][T11797] ? unix_dgram_peer_wake_me+0x3e0/0x3e0 [ 256.662049][T11797] ____sys_sendmsg+0x59e/0x8f0 [ 256.666642][T11797] ? __sys_sendmsg_sock+0x40/0x40 [ 256.671511][T11797] ? import_iovec+0xe5/0x120 [ 256.676019][T11797] ___sys_sendmsg+0x252/0x2e0 [ 256.680616][T11797] ? __sys_sendmsg+0x280/0x280 [ 256.685215][T11797] ? rw_verify_area+0x1c3/0x360 [ 256.690167][T11797] ? __fdget+0x1bc/0x240 [ 256.694241][T11797] __se_sys_sendmsg+0x1b1/0x280 [ 256.698920][T11797] ? __x64_sys_sendmsg+0x90/0x90 [ 256.703879][T11797] ? __bpf_trace_sys_enter+0x62/0x70 [ 256.708988][T11797] __x64_sys_sendmsg+0x7b/0x90 [ 256.713593][T11797] do_syscall_64+0x34/0x70 [ 256.717933][T11797] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 256.723657][T11797] RIP: 0033:0x7fba8d19f169 [ 256.727908][T11797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 256.747352][T11797] RSP: 002b:00007fba8b809038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 256.755601][T11797] RAX: ffffffffffffffda RBX: 00007fba8d3b7fa0 RCX: 00007fba8d19f169 [ 256.763410][T11797] RDX: 0000000000000000 RSI: 00002000000006c0 RDI: 0000000000000007 [ 256.771219][T11797] RBP: 00007fba8b809090 R08: 0000000000000000 R09: 0000000000000000 [ 256.779028][T11797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 256.786930][T11797] R13: 0000000000000000 R14: 00007fba8d3b7fa0 R15: 00007ffcd2693328 [ 258.267700][T11866] GPL: port 1(erspan0) entered blocking state [ 258.273729][T11866] GPL: port 1(erspan0) entered disabled state [ 258.282179][T11866] device erspan0 entered promiscuous mode [ 258.297385][T11866] GPL: port 1(erspan0) entered blocking state [ 258.303676][T11866] GPL: port 1(erspan0) entered forwarding state [ 258.615353][T11877] device wg2 entered promiscuous mode [ 258.882811][T11898] FAULT_INJECTION: forcing a failure. [ 258.882811][T11898] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 258.895744][T11898] CPU: 0 PID: 11898 Comm: syz.1.4411 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 258.906856][T11898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 258.916742][T11898] Call Trace: [ 258.919885][T11898] dump_stack_lvl+0x1e2/0x24b [ 258.924386][T11898] ? bfq_pos_tree_add_move+0x43b/0x43b [ 258.929679][T11898] ? shmem_getpage_gfp+0x2230/0x2480 [ 258.934802][T11898] dump_stack+0x15/0x17 [ 258.938793][T11898] should_fail+0x3c6/0x510 [ 258.943045][T11898] should_fail_usercopy+0x1a/0x20 [ 258.947907][T11898] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 258.953832][T11898] ? shmem_getpage+0xa0/0xa0 [ 258.958266][T11898] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 258.963969][T11898] ? memzero_page+0x100/0x100 [ 258.968486][T11898] generic_perform_write+0x34c/0x570 [ 258.973613][T11898] ? grab_cache_page_write_begin+0xa0/0xa0 [ 258.979252][T11898] ? file_remove_privs+0x570/0x570 [ 258.984201][T11898] ? __kasan_check_write+0x14/0x20 [ 258.989156][T11898] __generic_file_write_iter+0x23c/0x560 [ 258.994612][T11898] ? generic_write_checks+0x3b9/0x470 [ 258.999811][T11898] generic_file_write_iter+0xaf/0x1c0 [ 259.005044][T11898] vfs_write+0xb4c/0xe70 [ 259.009103][T11898] ? kernel_write+0x3d0/0x3d0 [ 259.013619][T11898] ? mutex_trylock+0xa0/0xa0 [ 259.018040][T11898] ? __fdget_pos+0x2e7/0x3a0 [ 259.022466][T11898] ? ksys_write+0x77/0x2c0 [ 259.026719][T11898] ksys_write+0x199/0x2c0 [ 259.030885][T11898] ? __ia32_sys_read+0x90/0x90 [ 259.035666][T11898] ? debug_smp_processor_id+0x17/0x20 [ 259.040869][T11898] __x64_sys_write+0x7b/0x90 [ 259.045398][T11898] do_syscall_64+0x34/0x70 [ 259.049643][T11898] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 259.055372][T11898] RIP: 0033:0x7f4a0b94d169 [ 259.059624][T11898] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 259.079323][T11898] RSP: 002b:00007f4a09fb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 259.087672][T11898] RAX: ffffffffffffffda RBX: 00007f4a0bb65fa0 RCX: 00007f4a0b94d169 [ 259.095648][T11898] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 259.103548][T11898] RBP: 00007f4a09fb7090 R08: 0000000000000000 R09: 0000000000000000 [ 259.111542][T11898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.119353][T11898] R13: 0000000000000000 R14: 00007f4a0bb65fa0 R15: 00007fff91918f98 [ 259.534486][T11921] FAULT_INJECTION: forcing a failure. [ 259.534486][T11921] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 259.547490][T11921] CPU: 0 PID: 11921 Comm: syz.0.4419 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 259.558740][T11921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 259.568625][T11921] Call Trace: [ 259.571761][T11921] dump_stack_lvl+0x1e2/0x24b [ 259.576268][T11921] ? bfq_pos_tree_add_move+0x43b/0x43b [ 259.581567][T11921] ? bpf_trace_run2+0xf4/0x280 [ 259.586166][T11921] dump_stack+0x15/0x17 [ 259.590156][T11921] should_fail+0x3c6/0x510 [ 259.594415][T11921] should_fail_usercopy+0x1a/0x20 [ 259.599356][T11921] _copy_to_user+0x20/0x90 [ 259.603615][T11921] simple_read_from_buffer+0xc7/0x150 [ 259.608819][T11921] proc_fail_nth_read+0x1a3/0x210 [ 259.613680][T11921] ? proc_fault_inject_write+0x390/0x390 [ 259.619149][T11921] ? security_file_permission+0x86/0xb0 [ 259.624634][T11921] ? rw_verify_area+0x1c3/0x360 [ 259.629304][T11921] ? proc_fault_inject_write+0x390/0x390 [ 259.634775][T11921] vfs_read+0x200/0xba0 [ 259.638762][T11921] ? kernel_read+0x70/0x70 [ 259.643020][T11921] ? __kasan_check_write+0x14/0x20 [ 259.647967][T11921] ? mutex_lock+0xa5/0x110 [ 259.652318][T11921] ? mutex_trylock+0xa0/0xa0 [ 259.656736][T11921] ? __fdget_pos+0x2e7/0x3a0 [ 259.661158][T11921] ? ksys_read+0x77/0x2c0 [ 259.665329][T11921] ksys_read+0x199/0x2c0 [ 259.669406][T11921] ? vfs_write+0xe70/0xe70 [ 259.673663][T11921] ? debug_smp_processor_id+0x17/0x20 [ 259.678865][T11921] __x64_sys_read+0x7b/0x90 [ 259.683203][T11921] do_syscall_64+0x34/0x70 [ 259.687462][T11921] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 259.693185][T11921] RIP: 0033:0x7f8127a31b7c [ 259.697443][T11921] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 259.716885][T11921] RSP: 002b:00007f812609d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 259.725129][T11921] RAX: ffffffffffffffda RBX: 00007f8127c4bfa0 RCX: 00007f8127a31b7c [ 259.732938][T11921] RDX: 000000000000000f RSI: 00007f812609d0a0 RDI: 0000000000000007 [ 259.740758][T11921] RBP: 00007f812609d090 R08: 0000000000000000 R09: 0000000000000000 [ 259.748564][T11921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 259.756379][T11921] R13: 0000000000000000 R14: 00007f8127c4bfa0 R15: 00007fff3a6830e8 [ 260.000094][T11931] device pim6reg1 entered promiscuous mode [ 260.080009][T11938] device veth0_vlan left promiscuous mode [ 260.132202][T11938] device veth0_vlan entered promiscuous mode [ 260.882118][T11966] FAULT_INJECTION: forcing a failure. [ 260.882118][T11966] name failslab, interval 1, probability 0, space 0, times 0 [ 260.894685][T11966] CPU: 0 PID: 11966 Comm: syz.3.4433 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 260.905900][T11966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 260.915793][T11966] Call Trace: [ 260.918930][T11966] dump_stack_lvl+0x1e2/0x24b [ 260.923442][T11966] ? panic+0x812/0x812 [ 260.927345][T11966] ? __kasan_check_write+0x14/0x20 [ 260.932301][T11966] ? bfq_pos_tree_add_move+0x43b/0x43b [ 260.937761][T11966] ? debug_smp_processor_id+0x17/0x20 [ 260.942968][T11966] dump_stack+0x15/0x17 [ 260.946957][T11966] should_fail+0x3c6/0x510 [ 260.951222][T11966] ? __alloc_skb+0x80/0x510 [ 260.955554][T11966] __should_failslab+0xa4/0xe0 [ 260.960162][T11966] should_failslab+0x9/0x20 [ 260.964505][T11966] kmem_cache_alloc+0x3d/0x2e0 [ 260.969093][T11966] __alloc_skb+0x80/0x510 [ 260.973281][T11966] ? _raw_write_lock_irq+0x170/0x170 [ 260.978384][T11966] ? tipc_nametbl_remove_publ+0x20b/0x1b00 [ 260.984245][T11966] tipc_buf_acquire+0x2b/0xe0 [ 260.988722][T11966] tipc_named_withdraw+0x207/0x7f0 [ 260.993678][T11966] tipc_nametbl_withdraw+0x24a/0x4c0 [ 260.998803][T11966] tipc_sk_leave+0x4a7/0x620 [ 261.003221][T11966] ? __tipc_shutdown+0x1510/0x1510 [ 261.008169][T11966] tipc_release+0xaa/0x1440 [ 261.012507][T11966] sock_close+0xdf/0x270 [ 261.016592][T11966] ? sock_mmap+0xa0/0xa0 [ 261.020661][T11966] __fput+0x33d/0x7b0 [ 261.024484][T11966] ____fput+0x15/0x20 [ 261.028300][T11966] task_work_run+0x129/0x190 [ 261.032733][T11966] exit_to_user_mode_loop+0xbf/0xd0 [ 261.037763][T11966] syscall_exit_to_user_mode+0xa2/0x1a0 [ 261.043147][T11966] do_syscall_64+0x40/0x70 [ 261.047396][T11966] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 261.053214][T11966] RIP: 0033:0x7f2272e2b169 [ 261.057646][T11966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 261.077086][T11966] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 261.085330][T11966] RAX: 0000000000000000 RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 261.093139][T11966] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 261.100961][T11966] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 261.108761][T11966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 261.116586][T11966] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 261.124423][T11966] tipc: Withdrawal distribution failure [ 261.531813][T11980] FAULT_INJECTION: forcing a failure. [ 261.531813][T11980] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 261.544978][T11980] CPU: 1 PID: 11980 Comm: syz.3.4439 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 261.556336][T11980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 261.566228][T11980] Call Trace: [ 261.569353][T11980] dump_stack_lvl+0x1e2/0x24b [ 261.573860][T11980] ? bfq_pos_tree_add_move+0x43b/0x43b [ 261.579156][T11980] ? shmem_getpage_gfp+0x2230/0x2480 [ 261.584293][T11980] dump_stack+0x15/0x17 [ 261.588263][T11980] should_fail+0x3c6/0x510 [ 261.592600][T11980] should_fail_usercopy+0x1a/0x20 [ 261.597481][T11980] iov_iter_copy_from_user_atomic+0x391/0xd80 [ 261.603386][T11980] ? shmem_getpage+0xa0/0xa0 [ 261.607801][T11980] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 261.613528][T11980] ? memzero_page+0x100/0x100 [ 261.618045][T11980] generic_perform_write+0x34c/0x570 [ 261.623172][T11980] ? grab_cache_page_write_begin+0xa0/0xa0 [ 261.628796][T11980] ? file_remove_privs+0x570/0x570 [ 261.633748][T11980] ? __kasan_check_write+0x14/0x20 [ 261.638692][T11980] __generic_file_write_iter+0x23c/0x560 [ 261.644159][T11980] ? generic_write_checks+0x3b9/0x470 [ 261.649368][T11980] generic_file_write_iter+0xaf/0x1c0 [ 261.654660][T11980] vfs_write+0xb4c/0xe70 [ 261.658742][T11980] ? kernel_write+0x3d0/0x3d0 [ 261.663256][T11980] ? mutex_trylock+0xa0/0xa0 [ 261.667685][T11980] ? __fdget_pos+0x2e7/0x3a0 [ 261.672106][T11980] ? ksys_write+0x77/0x2c0 [ 261.676361][T11980] ksys_write+0x199/0x2c0 [ 261.680527][T11980] ? __ia32_sys_read+0x90/0x90 [ 261.685129][T11980] ? debug_smp_processor_id+0x17/0x20 [ 261.690339][T11980] __x64_sys_write+0x7b/0x90 [ 261.694763][T11980] do_syscall_64+0x34/0x70 [ 261.699015][T11980] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 261.704745][T11980] RIP: 0033:0x7f2272e2b169 [ 261.709001][T11980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 261.728442][T11980] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 261.736685][T11980] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 261.744502][T11980] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 261.752307][T11980] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 261.760120][T11980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 261.767932][T11980] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 261.873283][T11992] device pim6reg1 entered promiscuous mode [ 262.005100][T12005] device veth0_vlan left promiscuous mode [ 262.010856][T12005] device veth0_vlan entered promiscuous mode [ 262.018965][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.027335][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 262.035987][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.871423][T12028] device veth0_vlan left promiscuous mode [ 262.882023][T12028] device veth0_vlan entered promiscuous mode [ 262.896126][T12028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.906936][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 262.939810][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 262.957124][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.920651][T12070] device syzkaller0 entered promiscuous mode [ 265.122013][T12124] FAULT_INJECTION: forcing a failure. [ 265.122013][T12124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 265.227835][T12124] CPU: 1 PID: 12124 Comm: syz.0.4487 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 265.239036][T12124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 265.248921][T12124] Call Trace: [ 265.252064][T12124] dump_stack_lvl+0x1e2/0x24b [ 265.256572][T12124] ? bfq_pos_tree_add_move+0x43b/0x43b [ 265.261863][T12124] ? down_read_trylock+0x179/0x1d0 [ 265.266813][T12124] ? __init_rwsem+0x1c0/0x1c0 [ 265.271325][T12124] dump_stack+0x15/0x17 [ 265.275355][T12124] should_fail+0x3c6/0x510 [ 265.279578][T12124] should_fail_alloc_page+0x52/0x60 [ 265.284605][T12124] __alloc_pages_nodemask+0x1b3/0xaf0 [ 265.289817][T12124] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 265.295199][T12124] ? copy_user_enhanced_fast_string+0xe/0x40 [ 265.301014][T12124] pipe_write+0x551/0x18c0 [ 265.305266][T12124] ? pipe_read+0x1040/0x1040 [ 265.309686][T12124] ? fsnotify_perm+0x67/0x4e0 [ 265.314204][T12124] ? security_file_permission+0x7b/0xb0 [ 265.319582][T12124] ? security_file_permission+0x86/0xb0 [ 265.324983][T12124] ? iov_iter_init+0x3f/0x120 [ 265.329491][T12124] vfs_write+0xb4c/0xe70 [ 265.333559][T12124] ? kernel_write+0x3d0/0x3d0 [ 265.338075][T12124] ? __fdget_pos+0x209/0x3a0 [ 265.342507][T12124] ? ksys_write+0x77/0x2c0 [ 265.346846][T12124] ksys_write+0x199/0x2c0 [ 265.351194][T12124] ? __ia32_sys_read+0x90/0x90 [ 265.355802][T12124] ? debug_smp_processor_id+0x17/0x20 [ 265.361003][T12124] __x64_sys_write+0x7b/0x90 [ 265.365456][T12124] do_syscall_64+0x34/0x70 [ 265.369682][T12124] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 265.375404][T12124] RIP: 0033:0x7f8127a33169 [ 265.379749][T12124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 265.399187][T12124] RSP: 002b:00007f812609d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 265.407540][T12124] RAX: ffffffffffffffda RBX: 00007f8127c4bfa0 RCX: 00007f8127a33169 [ 265.415420][T12124] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 265.423237][T12124] RBP: 00007f812609d090 R08: 0000000000000000 R09: 0000000000000000 [ 265.431039][T12124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 265.438943][T12124] R13: 0000000000000000 R14: 00007f8127c4bfa0 R15: 00007fff3a6830e8 [ 266.671545][T12179] device veth0_vlan left promiscuous mode [ 266.680786][T12179] device veth0_vlan entered promiscuous mode [ 266.699656][T12179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.709940][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 266.728789][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 266.764563][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 267.847700][T12241] FAULT_INJECTION: forcing a failure. [ 267.847700][T12241] name failslab, interval 1, probability 0, space 0, times 0 [ 267.932650][T12241] CPU: 0 PID: 12241 Comm: syz.3.4528 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 267.943854][T12241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 267.953740][T12241] Call Trace: [ 267.956876][T12241] dump_stack_lvl+0x1e2/0x24b [ 267.961381][T12241] ? panic+0x812/0x812 [ 267.965288][T12241] ? bfq_pos_tree_add_move+0x43b/0x43b [ 267.970597][T12241] ? queue_stack_map_push_elem+0x37d/0x550 [ 267.976367][T12241] dump_stack+0x15/0x17 [ 267.980351][T12241] should_fail+0x3c6/0x510 [ 267.984583][T12241] ? __alloc_skb+0x80/0x510 [ 267.988919][T12241] __should_failslab+0xa4/0xe0 [ 267.993516][T12241] should_failslab+0x9/0x20 [ 267.997856][T12241] kmem_cache_alloc+0x3d/0x2e0 [ 268.002461][T12241] __alloc_skb+0x80/0x510 [ 268.006622][T12241] ? bpf_trace_run1+0x210/0x210 [ 268.011310][T12241] tipc_msg_create+0x49/0x5d0 [ 268.015827][T12241] ? kfree_skbmem+0x104/0x170 [ 268.020427][T12241] tipc_group_proto_xmit+0x14a/0x890 [ 268.025695][T12241] tipc_group_delete+0x123/0x430 [ 268.030425][T12241] ? __tipc_shutdown+0xe7c/0x1510 [ 268.035286][T12241] ? tipc_group_update_member+0x3f0/0x3f0 [ 268.040921][T12241] ? __tipc_shutdown+0x122d/0x1510 [ 268.045874][T12241] ? tipc_group_self+0x27/0x1d0 [ 268.050564][T12241] tipc_sk_leave+0x140/0x620 [ 268.054986][T12241] ? __tipc_shutdown+0x1510/0x1510 [ 268.059943][T12241] tipc_release+0xaa/0x1440 [ 268.064278][T12241] sock_close+0xdf/0x270 [ 268.068361][T12241] ? sock_mmap+0xa0/0xa0 [ 268.072520][T12241] __fput+0x33d/0x7b0 [ 268.076428][T12241] ____fput+0x15/0x20 [ 268.080243][T12241] task_work_run+0x129/0x190 [ 268.084672][T12241] exit_to_user_mode_loop+0xbf/0xd0 [ 268.089708][T12241] syscall_exit_to_user_mode+0xa2/0x1a0 [ 268.095088][T12241] do_syscall_64+0x40/0x70 [ 268.099346][T12241] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 268.105083][T12241] RIP: 0033:0x7f2272e2b169 [ 268.109333][T12241] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.128947][T12241] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 268.137185][T12241] RAX: 0000000000000000 RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 268.145085][T12241] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 268.152920][T12241] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 268.160724][T12241] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 268.168526][T12241] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 269.106623][T12294] FAULT_INJECTION: forcing a failure. [ 269.106623][T12294] name failslab, interval 1, probability 0, space 0, times 0 [ 269.169305][T12294] CPU: 0 PID: 12294 Comm: syz.1.4546 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 269.180503][T12294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 269.190399][T12294] Call Trace: [ 269.193527][T12294] dump_stack_lvl+0x1e2/0x24b [ 269.198035][T12294] ? bfq_pos_tree_add_move+0x43b/0x43b [ 269.203341][T12294] dump_stack+0x15/0x17 [ 269.207317][T12294] should_fail+0x3c6/0x510 [ 269.211567][T12294] ? __alloc_skb+0x80/0x510 [ 269.215920][T12294] __should_failslab+0xa4/0xe0 [ 269.220507][T12294] should_failslab+0x9/0x20 [ 269.224897][T12294] kmem_cache_alloc+0x3d/0x2e0 [ 269.229452][T12294] __alloc_skb+0x80/0x510 [ 269.233791][T12294] ppp_write+0xb7/0x360 [ 269.237782][T12294] ? ppp_read+0x8e0/0x8e0 [ 269.241948][T12294] vfs_write+0x36a/0xe70 [ 269.246069][T12294] ? putname+0xe7/0x140 [ 269.250040][T12294] ? __traceiter_kmem_cache_free+0x2e/0x50 [ 269.255667][T12294] ? kmem_cache_free+0x1c0/0x1e0 [ 269.260444][T12294] ? kernel_write+0x3d0/0x3d0 [ 269.264956][T12294] ? __fget_files+0x31e/0x380 [ 269.269466][T12294] ? __fdget_pos+0x209/0x3a0 [ 269.273889][T12294] ? ksys_write+0x77/0x2c0 [ 269.278149][T12294] ksys_write+0x199/0x2c0 [ 269.282310][T12294] ? __ia32_sys_read+0x90/0x90 [ 269.286913][T12294] ? debug_smp_processor_id+0x17/0x20 [ 269.292115][T12294] __x64_sys_write+0x7b/0x90 [ 269.296541][T12294] do_syscall_64+0x34/0x70 [ 269.300795][T12294] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 269.306524][T12294] RIP: 0033:0x7f4a0b94d169 [ 269.310782][T12294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 269.330217][T12294] RSP: 002b:00007f4a09fb7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 269.338468][T12294] RAX: ffffffffffffffda RBX: 00007f4a0bb65fa0 RCX: 00007f4a0b94d169 [ 269.346276][T12294] RDX: 00000000fffffed8 RSI: 0000200000000080 RDI: 0000000000000004 [ 269.354088][T12294] RBP: 00007f4a09fb7090 R08: 0000000000000000 R09: 0000000000000000 [ 269.361901][T12294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 269.369722][T12294] R13: 0000000000000000 R14: 00007f4a0bb65fa0 R15: 00007fff91918f98 [ 269.692099][T12319] device syzkaller0 entered promiscuous mode [ 269.821474][T12333] FAULT_INJECTION: forcing a failure. [ 269.821474][T12333] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 269.873854][T12333] CPU: 0 PID: 12333 Comm: syz.0.4561 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 269.885144][T12333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 269.895030][T12333] Call Trace: [ 269.898310][T12333] dump_stack_lvl+0x1e2/0x24b [ 269.902759][T12333] ? bfq_pos_tree_add_move+0x43b/0x43b [ 269.908050][T12333] dump_stack+0x15/0x17 [ 269.912041][T12333] should_fail+0x3c6/0x510 [ 269.916349][T12333] should_fail_alloc_page+0x52/0x60 [ 269.921341][T12333] __alloc_pages_nodemask+0x1b3/0xaf0 [ 269.926546][T12333] ? __kernel_text_address+0x9b/0x110 [ 269.931777][T12333] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 269.937150][T12333] ? stack_trace_save+0x113/0x1c0 [ 269.942100][T12333] ? terminate_walk+0x407/0x4f0 [ 269.946787][T12333] ? stack_trace_snprint+0xf0/0xf0 [ 269.951746][T12333] skb_page_frag_refill+0x21b/0x410 [ 269.956771][T12333] tun_get_user+0x6cb/0x38f0 [ 269.961199][T12333] ? kmem_cache_free+0xa9/0x1e0 [ 269.965889][T12333] ? _kstrtoull+0x3a0/0x4a0 [ 269.970224][T12333] ? tun_do_read+0x1f60/0x1f60 [ 269.974823][T12333] ? kstrtouint_from_user+0x20a/0x2a0 [ 269.980068][T12333] ? kstrtol_from_user+0x310/0x310 [ 269.984982][T12333] ? avc_policy_seqno+0x1b/0x70 [ 269.989669][T12333] ? selinux_file_permission+0x2bb/0x560 [ 269.995146][T12333] ? fsnotify_perm+0x67/0x4e0 [ 269.999678][T12333] tun_chr_write_iter+0x1a8/0x250 [ 270.004523][T12333] vfs_write+0xb4c/0xe70 [ 270.008613][T12333] ? kernel_write+0x3d0/0x3d0 [ 270.013114][T12333] ? __fdget_pos+0x209/0x3a0 [ 270.017536][T12333] ? ksys_write+0x77/0x2c0 [ 270.021792][T12333] ksys_write+0x199/0x2c0 [ 270.025953][T12333] ? __ia32_sys_read+0x90/0x90 [ 270.030561][T12333] ? debug_smp_processor_id+0x17/0x20 [ 270.035768][T12333] __x64_sys_write+0x7b/0x90 [ 270.040228][T12333] do_syscall_64+0x34/0x70 [ 270.044440][T12333] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.050165][T12333] RIP: 0033:0x7f8127a33169 [ 270.054425][T12333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.074228][T12333] RSP: 002b:00007f812609d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 270.082454][T12333] RAX: ffffffffffffffda RBX: 00007f8127c4bfa0 RCX: 00007f8127a33169 [ 270.090262][T12333] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 270.098114][T12333] RBP: 00007f812609d090 R08: 0000000000000000 R09: 0000000000000000 [ 270.105886][T12333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.113700][T12333] R13: 0000000000000000 R14: 00007f8127c4bfa0 R15: 00007fff3a6830e8 [ 273.461728][T12438] device syzkaller0 entered promiscuous mode [ 275.584284][T12511] FAULT_INJECTION: forcing a failure. [ 275.584284][T12511] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 275.597599][T12511] CPU: 0 PID: 12511 Comm: syz.3.4624 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 275.608688][T12511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 275.618557][T12511] Call Trace: [ 275.621692][T12511] dump_stack_lvl+0x1e2/0x24b [ 275.626286][T12511] ? bfq_pos_tree_add_move+0x43b/0x43b [ 275.631586][T12511] dump_stack+0x15/0x17 [ 275.635579][T12511] should_fail+0x3c6/0x510 [ 275.639836][T12511] should_fail_alloc_page+0x52/0x60 [ 275.644972][T12511] __alloc_pages_nodemask+0x1b3/0xaf0 [ 275.650175][T12511] ? do_syscall_64+0x34/0x70 [ 275.654612][T12511] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 275.660505][T12511] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 275.666064][T12511] ? avc_has_perm_noaudit+0x117/0x240 [ 275.671268][T12511] shmem_alloc_page+0x257/0x420 [ 275.675958][T12511] ? put_page+0xd0/0xd0 [ 275.679950][T12511] ? slab_post_alloc_hook+0x61/0x2f0 [ 275.685073][T12511] ? percpu_counter_add_batch+0x13d/0x160 [ 275.690629][T12511] shmem_alloc_and_acct_page+0x395/0x8e0 [ 275.696096][T12511] ? shmem_swapin_page+0x1950/0x1950 [ 275.701214][T12511] ? find_get_entry+0x44c/0x4c0 [ 275.705903][T12511] ? page_cache_prev_miss+0x410/0x410 [ 275.711197][T12511] ? __kasan_check_write+0x14/0x20 [ 275.716150][T12511] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 275.721098][T12511] ? _raw_spin_lock_irqsave+0x210/0x210 [ 275.726475][T12511] ? find_lock_entry+0x1df/0x200 [ 275.731259][T12511] shmem_getpage_gfp+0x891/0x2480 [ 275.736115][T12511] ? iov_iter_advance+0x258/0xb20 [ 275.741146][T12511] ? shmem_getpage+0xa0/0xa0 [ 275.745569][T12511] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 275.751299][T12511] shmem_write_begin+0xca/0x1b0 [ 275.755989][T12511] generic_perform_write+0x2cd/0x570 [ 275.761205][T12511] ? grab_cache_page_write_begin+0xa0/0xa0 [ 275.766845][T12511] ? file_remove_privs+0x570/0x570 [ 275.771796][T12511] ? __kasan_check_write+0x14/0x20 [ 275.776746][T12511] __generic_file_write_iter+0x23c/0x560 [ 275.782211][T12511] ? generic_write_checks+0x3b9/0x470 [ 275.787418][T12511] generic_file_write_iter+0xaf/0x1c0 [ 275.792629][T12511] vfs_write+0xb4c/0xe70 [ 275.796707][T12511] ? kernel_write+0x3d0/0x3d0 [ 275.801219][T12511] ? mutex_trylock+0xa0/0xa0 [ 275.805646][T12511] ? __fdget_pos+0x2e7/0x3a0 [ 275.810072][T12511] ? ksys_write+0x77/0x2c0 [ 275.814325][T12511] ksys_write+0x199/0x2c0 [ 275.818491][T12511] ? __ia32_sys_read+0x90/0x90 [ 275.823096][T12511] ? debug_smp_processor_id+0x17/0x20 [ 275.828302][T12511] __x64_sys_write+0x7b/0x90 [ 275.832734][T12511] do_syscall_64+0x34/0x70 [ 275.837002][T12511] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 275.842723][T12511] RIP: 0033:0x7f2272e2b169 [ 275.846975][T12511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.866419][T12511] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 275.874659][T12511] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 275.882470][T12511] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000007 [ 275.890290][T12511] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 275.898173][T12511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 275.906294][T12511] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 276.205373][T12518] device pim6reg1 entered promiscuous mode [ 276.307872][T12518] device veth0_vlan left promiscuous mode [ 276.344841][T12518] device veth0_vlan entered promiscuous mode [ 276.399393][T12518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.462599][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.480681][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.520632][ T49] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 277.136127][T12550] FAULT_INJECTION: forcing a failure. [ 277.136127][T12550] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 277.182036][T12550] CPU: 0 PID: 12550 Comm: syz.3.4638 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 277.193234][T12550] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 277.203125][T12550] Call Trace: [ 277.206261][T12550] dump_stack_lvl+0x1e2/0x24b [ 277.210765][T12550] ? bfq_pos_tree_add_move+0x43b/0x43b [ 277.216065][T12550] dump_stack+0x15/0x17 [ 277.220052][T12550] should_fail+0x3c6/0x510 [ 277.224393][T12550] should_fail_alloc_page+0x52/0x60 [ 277.229423][T12550] __alloc_pages_nodemask+0x1b3/0xaf0 [ 277.234636][T12550] ? do_syscall_64+0x34/0x70 [ 277.239069][T12550] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.244960][T12550] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 277.250340][T12550] ? avc_has_perm_noaudit+0x117/0x240 [ 277.255548][T12550] shmem_alloc_page+0x257/0x420 [ 277.260229][T12550] ? put_page+0xd0/0xd0 [ 277.264226][T12550] ? slab_post_alloc_hook+0x61/0x2f0 [ 277.269349][T12550] ? percpu_counter_add_batch+0x13d/0x160 [ 277.274909][T12550] shmem_alloc_and_acct_page+0x395/0x8e0 [ 277.280378][T12550] ? shmem_swapin_page+0x1950/0x1950 [ 277.285499][T12550] ? find_get_entry+0x44c/0x4c0 [ 277.290181][T12550] ? page_cache_prev_miss+0x410/0x410 [ 277.295387][T12550] ? down_read_trylock+0x179/0x1d0 [ 277.300334][T12550] ? find_lock_entry+0x1df/0x200 [ 277.305105][T12550] shmem_getpage_gfp+0x891/0x2480 [ 277.309967][T12550] ? __kasan_check_write+0x14/0x20 [ 277.314923][T12550] ? shmem_getpage+0xa0/0xa0 [ 277.319342][T12550] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 277.325158][T12550] shmem_write_begin+0xca/0x1b0 [ 277.329842][T12550] generic_perform_write+0x2cd/0x570 [ 277.334973][T12550] ? grab_cache_page_write_begin+0xa0/0xa0 [ 277.340615][T12550] ? file_remove_privs+0x570/0x570 [ 277.345556][T12550] ? __kasan_check_write+0x14/0x20 [ 277.350521][T12550] __generic_file_write_iter+0x23c/0x560 [ 277.356166][T12550] ? generic_write_checks+0x3b9/0x470 [ 277.361381][T12550] generic_file_write_iter+0xaf/0x1c0 [ 277.366572][T12550] vfs_write+0xb4c/0xe70 [ 277.370644][T12550] ? kernel_write+0x3d0/0x3d0 [ 277.375290][T12550] ? mutex_trylock+0xa0/0xa0 [ 277.379674][T12550] ? __fdget_pos+0x2e7/0x3a0 [ 277.384094][T12550] ? ksys_write+0x77/0x2c0 [ 277.388345][T12550] ksys_write+0x199/0x2c0 [ 277.392512][T12550] ? __ia32_sys_read+0x90/0x90 [ 277.397118][T12550] ? debug_smp_processor_id+0x17/0x20 [ 277.402319][T12550] __x64_sys_write+0x7b/0x90 [ 277.406832][T12550] do_syscall_64+0x34/0x70 [ 277.411089][T12550] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.416915][T12550] RIP: 0033:0x7f2272e2b169 [ 277.421168][T12550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.440863][T12550] RSP: 002b:00007f2271495038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 277.449094][T12550] RAX: ffffffffffffffda RBX: 00007f2273043fa0 RCX: 00007f2272e2b169 [ 277.456895][T12550] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 277.464705][T12550] RBP: 00007f2271495090 R08: 0000000000000000 R09: 0000000000000000 [ 277.472515][T12550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 277.480331][T12550] R13: 0000000000000000 R14: 00007f2273043fa0 R15: 00007ffdc0565ba8 [ 277.537677][T12548] device wg2 entered promiscuous mode [ 277.714374][ T24] audit: type=1400 audit(1743711687.460:168): avc: denied { create } for pid=12571 comm="syz.2.4646" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 278.159151][T12613] ------------[ cut here ]------------ [ 278.166221][T12613] kernel BUG at kernel/bpf/arraymap.c:980! [ 278.172019][T12613] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 278.177905][T12613] CPU: 0 PID: 12613 Comm: syz.2.4658 Tainted: G W 5.10.234-syzkaller-00033-g094fc3778d6b #0 [ 278.189093][T12613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 278.199085][T12613] RIP: 0010:prog_array_map_poke_run+0x68f/0x6b0 [ 278.205333][T12613] Code: 93 e8 ff eb 05 e8 31 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 1d 93 e8 ff 0f 0b e9 de f9 ff ff e8 11 93 e8 ff <0f> 0b e8 0a 93 e8 ff 0f 0b e8 03 93 e8 ff 0f 0b e8 fc 92 e8 ff 0f [ 278.224777][T12613] RSP: 0018:ffffc9000118f720 EFLAGS: 00010293 [ 278.230675][T12613] RAX: ffffffff81822c3f RBX: 00000000fffffff0 RCX: ffff8881297c62c0 [ 278.238481][T12613] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 278.246294][T12613] RBP: ffffc9000118f7b8 R08: ffffffff818228e2 R09: fffffbfff0cdd699 [ 278.254109][T12613] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888127623600 [ 278.261918][T12613] R13: 0000000000000000 R14: ffff888120e08c00 R15: dffffc0000000000 [ 278.269738][T12613] FS: 00007fba8b7c76c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 278.278760][T12613] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 278.285177][T12613] CR2: 00007fba8b7c7d58 CR3: 000000010a752000 CR4: 00000000003506b0 [ 278.292995][T12613] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 278.300803][T12613] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 278.308700][T12613] Call Trace: [ 278.311838][T12613] ? __die_body+0x62/0xb0 [ 278.315992][T12613] ? die+0x88/0xb0 [ 278.319556][T12613] ? do_trap+0x1a4/0x310 [ 278.323636][T12613] ? prog_array_map_poke_run+0x68f/0x6b0 [ 278.329102][T12613] ? handle_invalid_op+0x95/0xc0 [ 278.333885][T12613] ? prog_array_map_poke_run+0x68f/0x6b0 [ 278.339351][T12613] ? exc_invalid_op+0x32/0x50 [ 278.343870][T12613] ? asm_exc_invalid_op+0x12/0x20 [ 278.348728][T12613] ? prog_array_map_poke_run+0x332/0x6b0 [ 278.354192][T12613] ? prog_array_map_poke_run+0x68f/0x6b0 [ 278.359663][T12613] ? prog_array_map_poke_run+0x68f/0x6b0 [ 278.365128][T12613] bpf_fd_array_map_update_elem+0x201/0x310 [ 278.370884][T12613] bpf_map_update_value+0xbc/0x420 [ 278.375802][T12613] __se_sys_bpf+0x7687/0x11cb0 [ 278.380493][T12613] ? try_invoke_on_locked_down_task+0x280/0x280 [ 278.386578][T12613] ? __kasan_check_write+0x14/0x20 [ 278.391516][T12613] ? __x64_sys_bpf+0x90/0x90 [ 278.395942][T12613] ? futex_wake+0x630/0x790 [ 278.400280][T12613] ? futex_wait+0x7c0/0x7c0 [ 278.404620][T12613] ? try_to_wake_up+0x654/0xd90 [ 278.409307][T12613] ? do_futex+0x13c5/0x17b0 [ 278.413649][T12613] ? __kasan_check_write+0x14/0x20 [ 278.418593][T12613] ? _raw_spin_lock+0xa4/0x1b0 [ 278.423191][T12613] ? __kasan_check_write+0x14/0x20 [ 278.428142][T12613] ? wake_up_q+0x125/0x1e0 [ 278.432395][T12613] ? wake_q_add+0xaf/0x100 [ 278.436668][T12613] ? futex_exit_release+0x1e0/0x1e0 [ 278.441771][T12613] ? mutex_unlock+0x40/0x40 [ 278.446115][T12613] ? mutex_unlock+0x33/0x40 [ 278.450448][T12613] ? ppp_ioctl+0x45c/0x1810 [ 278.454796][T12613] ? set_current_blocked+0x40/0x40 [ 278.459740][T12613] ? __se_sys_futex+0x355/0x470 [ 278.464427][T12613] ? __fget_files+0x31e/0x380 [ 278.469611][T12613] ? fpu__clear_all+0x20/0x20 [ 278.474180][T12613] ? __kasan_check_read+0x11/0x20 [ 278.479121][T12613] __x64_sys_bpf+0x7b/0x90 [ 278.483379][T12613] do_syscall_64+0x34/0x70 [ 278.487627][T12613] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 278.493359][T12613] RIP: 0033:0x7fba8d19f169 [ 278.497611][T12613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 278.517165][T12613] RSP: 002b:00007fba8b7c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 278.525396][T12613] RAX: ffffffffffffffda RBX: 00007fba8d3b8160 RCX: 00007fba8d19f169 [ 278.533195][T12613] RDX: 0000000000000020 RSI: 0000200000000400 RDI: 0000000000000002 [ 278.541178][T12613] RBP: 00007fba8d2202a0 R08: 0000000000000000 R09: 0000000000000000 [ 278.548997][T12613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 278.556939][T12613] R13: 0000000000000000 R14: 00007fba8d3b8160 R15: 00007ffcd2693328 [ 278.564842][T12613] Modules linked in: [ 278.603525][T12613] ---[ end trace 70fbd5f8b412f287 ]--- [ 278.608973][T12613] RIP: 0010:prog_array_map_poke_run+0x68f/0x6b0 [ 278.615836][T12613] Code: 93 e8 ff eb 05 e8 31 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 1d 93 e8 ff 0f 0b e9 de f9 ff ff e8 11 93 e8 ff <0f> 0b e8 0a 93 e8 ff 0f 0b e8 03 93 e8 ff 0f 0b e8 fc 92 e8 ff 0f [ 278.635699][T12613] RSP: 0018:ffffc9000118f720 EFLAGS: 00010293 [ 278.641688][T12613] RAX: ffffffff81822c3f RBX: 00000000fffffff0 RCX: ffff8881297c62c0 [ 278.658489][T12613] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 278.666921][T12613] RBP: ffffc9000118f7b8 R08: ffffffff818228e2 R09: fffffbfff0cdd699 [ 278.675268][T12613] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff888127623600 [ 278.683213][T12613] R13: 0000000000000000 R14: ffff888120e08c00 R15: dffffc0000000000 [ 278.703602][T12613] FS: 00007fba8b7c76c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 278.722695][T12613] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 278.729524][T12613] CR2: 00007fec6dcec178 CR3: 000000010a752000 CR4: 00000000003506b0 [ 278.744059][T12613] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 278.752166][T12613] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 278.760048][T12613] Kernel panic - not syncing: Fatal exception [ 278.766062][T12613] Kernel Offset: disabled [ 278.770283][T12613] Rebooting in 86400 seconds..