last executing test programs: 5.087712293s ago: executing program 1 (id=4251): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x40002200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x0, 0x0, 0x0, 0x0, 0x49c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 4.667747558s ago: executing program 2 (id=4259): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x6, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000050000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000870000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x2, 0x7, 0x7, 0x800, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="9feb010018000000e5ff00000c0000000c000000062000000200000000000005000000000000312e3e002b5798f86c55345085ec5ec7e9499dd81b7f29a370748c2f2b1a01f5c1864c26c8ad9cda86215b3edad752b0cd905a8f535e5735725b4f1b76bfab54e3819945a0dfa44ddafddff26d46a255535b8e1449527c619442cb9cb5f121609285da2ba49de2ee81a3d7a83624a97a5e678b52a5f6f2b57414ea089b7f04e0d75371df75c380192d9e95d5fab2b44498a7ad17150b3957c37e4563228fe50cb4e9d527a1e5bc2ff520f6926ad7f41d0d52f14002e0eef6c62c08271014bde55c6fa553188739ce7de2bef5ba79511aa5e556bd7cc5fc9e375b92b75aaa606dc5140ce1cfec7c2496577f8f6d32ff8d587a724c627e21e8e3a765c532c0a4d982ec5a26373c6a1015aff0f1f491d4d00551cf3a8991ab28d03ef39cf6e195d2b8af885280ad20813b3500"/347], &(0x7f0000000a40)=""/4096, 0x2a, 0x1000, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x7, 0x3, 0x6}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000), 0x4) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x749c}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) 4.209031045s ago: executing program 1 (id=4264): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 36) 3.851799914s ago: executing program 1 (id=4265): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESOCT=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000004c0)='powernv_throttle\x00', r1}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff60) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x3}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x4d9}, 0x0, 0x0, r3, 0x0) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000140cc0f000000000000000018e2efff", @ANYRES32=r2, @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(r6, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fef2000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 3.814884987s ago: executing program 2 (id=4268): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x40002200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x0, 0x0, 0x0, 0x0, 0x49c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 3.77928683s ago: executing program 1 (id=4269): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0xc}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={r9, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.942262479s ago: executing program 0 (id=4275): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa1}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x4}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x15) 2.877367154s ago: executing program 2 (id=4276): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x3, 0x8b, 0x100, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3, 0xa}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000006380)={0x0, 0x0, 0x0}, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfc, 0x0, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad62c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71", 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="38000000000000000000000000000000180100002020702500000000002020207b1af8ff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f00000003c0)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x3e1c01, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000010c0)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc7", 0xb8}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x16}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 2.180620871s ago: executing program 3 (id=4280): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x3, 0x8b, 0x100, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000006380)={0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000000b00)}], 0x1}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, &(0x7f00000000c0)}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="38000000000000000000000000000000180100002020702500000000002020207b1af8ff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f00000003c0)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x3e1c01, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000070000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000010c0)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001000)={&(0x7f0000000fc0)='ext4_request_blocks\x00', r3}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001580)={0x0, 0xcb26, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfaf4ff4c44ab59fb71eca786a3596c054903474be3ddc5b069c53f90e433397b0babfd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r5, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 2.027023834s ago: executing program 0 (id=4281): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00'}, 0x10) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0xc000000, 0xfffffd26) 2.026529673s ago: executing program 2 (id=4282): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x7}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x10008, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.912440853s ago: executing program 2 (id=4284): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) close(r0) 1.860995487s ago: executing program 4 (id=4285): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x40002200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x0, 0x0, 0x0, 0x0, 0x49c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 1.850997848s ago: executing program 2 (id=4286): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000ffffffff000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) syz_clone(0x0, 0x0, 0x41, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x1000, 0x7, 0x8, 0x2, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={r6, 0xe0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x8d, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), 0x0, 0x0, 0x51, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f00000009c0)=ANY=[@ANYRESHEX=r1, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000030000007b8af8ff00000000bfa200000200000007020000f8ff000000b70400000000000085000000030000009500000000000004f83ad5357e9ce341e393491b1b17cd55e2c2cd676b1f4c7d6b2b83970dea8e7f1120f52cde04d540da8d25351211cd7b4e76c6942b22519a010cac1de7a679622b970bfa89cb796c7d4a82407c906310055e0f232d0af14680684bb1e350661a62df2d0118ef7c2bbceafface03d5a0baa0a082458255c2cebe981024e085f4ed355ef1e939d0076309205fa0e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x6, 0x0, 0x8, 0xcd, 0x4, r2, 0x63, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xffffffff, 0x1, 0x7, 0x18aa, 0x1, 0x2, '\x00', r7, 0xffffffffffffffff, 0x5, 0x4, 0x2, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000dfffffffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x13, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r7, 0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1080, 0x0, 0x0, 0x0, 0x2, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0xd, &(0x7f0000000ac0)=ANY=[@ANYBLOB="180000000068883550c78d99e4000000181100002e5243ea70ee83bcea6b5319f8311b1b831a533dd28b7d2f4a7c15aed3ab4ba56c6648cd5be2d69d6bb1b8ee78a94d18d2abb673a88f09df1748fcfbd110f4d2494d8bf1991461e1a6d1f87caceb25f3dd3698acceead82a7f7824a8c99918a0dda6159c65862279192455bbd074b186266ad28f5ded865c992883bbb23291b638805f1b4e6b054dc177379297fd4a8d67a842f426ab83ffa131f12230dab4b2d14b4a0d1380aebfa5980b5e57ad0aeaf0d4aecd4c67367c3357e98b9dd4bae226fb5f12712c80a22349a9a9f1c501d002f5bbfaa2718fcef05e452c19e2cff979f5581add7919e72a9db10162f922eb521da3ae77e0617ef7485d96b85efd1161232dad5d8f43551abfc305b8bdcc39a82fe28d4c34b4f4b56f3abd1664f67fad80d9c3bd6d2f47f3e190058fff68789822cf9904fde6190fbd9446f19acfac455b776abc574c8e4ce6b1e958d9b6b26d746b75472b6eab54265b46fcf18e4cd355c84de21dd35dea0443d9f850885f88a96ff5d5f7f09edad5895084b380", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000200000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000008500f0000700000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.185125772s ago: executing program 0 (id=4287): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r1}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r2, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) syz_clone(0x40002200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x0, 0x0, 0x0, 0x0, 0x49c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 1.178773374s ago: executing program 3 (id=4288): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000002600181100", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 1.026796865s ago: executing program 3 (id=4289): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x7}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x10008, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 986.179509ms ago: executing program 4 (id=4290): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000faffffffb703000008400000b70600000000feff850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x68}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r9, 0x0, &(0x7f0000001780)=""/4096}, 0x20) 896.024746ms ago: executing program 4 (id=4291): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x13, 0x6, &(0x7f0000000700)=ANY=[@ANYBLOB="180000000010000000000000000000000095000000000000009500"/48], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x6, '\x00', 0x0, 0x50, 0xffffffffffffffff, 0x8, &(0x7f0000000780)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000800)={0x1, 0x7, 0x2, 0x9}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000840)=[0xffffffffffffffff, r0, r0, r0, r0, 0x1], 0x0, 0x10, 0x1}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0xfd, 0x83, 0x5bf, 0x1c39, 0x1, 0x3, '\x00', 0x0, r1, 0x3, 0x4, 0x0, 0x6}, 0x48) sendmsg$inet(r1, &(0x7f00000005c0)={&(0x7f0000000280)={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000340)="da089f3e9ffcef11644c6a808781e9e843aca5ba750a1eeb7066b253ca497839e4f4f9f242c6d69d54cbf1a822247ec1cb14640c9f45a1ec6e3cc9b19a3f562d6b06b92cde459904e5365f733a10af6aa718821384debc643f11c183d6ca450cdbae11d6f767c51ae3372451ced0c201c421a622ce18ca3c3265e974d695df5720e22b4ef6b428a7d452c5f35a5149129706350aab55ebc959ad7aad8bc7437537f7a5fd05786311a3e35076c85c0ddb13dc45aa6d62817b9d89583ac2d90229befe65fe589bb4c46935a8080de3350c16dad740dae5e7f73d7516141243d94dfc050c5bcc4234671cb9d6cc139a7f7100a7e9b091a4", 0xf6}, {&(0x7f0000000440)="7d38a724a55f8f9598bb79a7bfb443a127a77fdbd68d24289c5ea90db6c16314455893592783596dfde630fd59b8f108befd66040bd46c8d61d44c88441fbd66d7b7c623b94f0f912db582f4ef5717378eebbb0a0ed3cff663b51f4cb305d7e8a525a3f3b173cde477f329c39b8307a3734cb6a6181523d9c9d77f99f3d30f58b6e05b2ac19982c7a2cda50b3819080e6b1fddaaa4e06d587bf0825cad68853755fd9c7b60da07ea6dce0a988ff628eda986e10be998fbb17f7c0cfa2fad27d98046da40c4a66a8d84d543675113adb34c3236d5d7cb5451eef9f83b016c065586920b556e10ae5c970ee8", 0xeb}], 0x2, &(0x7f0000000580)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xc2a}}], 0x18}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x3, 0xf, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="020000000000b2f17db98500000083000000bf0900ba3e0000000000550901000000009500000000000000bf91000000000000b70200080200007c3df0ac63a941593a79ec3d0406a060cdfce6000000b70000000000000000ef00000000000000000000002dbea49e4dc573142dcba0f5768b7088e70cdeb946cc788f85a1fb470dc55c8fadc8449accd39512a243bd9a38334a7d86832aac7ea2e7c3ca06ad182631d19bd88e6911616ef5f08eeb4f1885da106758797985057bc3d1312d4a363fae0bdc9fd9af7ce680d4a93708b360ba30c3ebd48eb26bbccb22d48bdf5bed2044"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000001c00000000000000000000711207000000000095000000000000001290aa8f3e4f48eaf057b13841784965fb7d411ba4fb75b64ecdf88e3429351336fdd51fc5d358cbb7b6a3bf715d8600a5500a7991ec6f747f64bbfd3e7484a99b79eb56041d9a17e13cd06ef8a29c00199d175b9c4b411b795f48f86c24f8a4af79f096ff357b25c8d54a2820d87b491ae56a1ff015652e0b408f27600ec826ba8b3684c105490af027698a949b519340d497118b717ec468f7567131583787dd5a8d3e9e6adffc8f0c4a8cddee9529fe9b8b4501271f8163d45fbf8050f8de9762"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) sendmsg$tipc(r6, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x21, &(0x7f0000000040), 0x4) sendmsg$tipc(r6, &(0x7f0000001000)={0x0, 0x0, 0x0}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000008c0)='kmem_cache_free\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x1a, 0xe, &(0x7f0000000940)=ANY=[@ANYRESDEC=r2], &(0x7f0000000340)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x3}, 0x8, 0x10, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x10, 0x6}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000980)={r7}, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r9, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x9, 0x60000000, 0x0, 0x0, &(0x7f0000000940)}, 0x50) recvmsg(r5, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/188, 0xbc}], 0x1, &(0x7f0000001140)=""/4096, 0x1000}, 0x0) sendmsg$tipc(r5, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={0x0}, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e4e69d5}, 0x90) 871.830908ms ago: executing program 3 (id=4292): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa1}, [@ldst={0x5}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r1}, 0x10) syz_clone(0xc000000, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xfe, 0x0, &(0x7f0000000100)="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", 0x0, 0x0, 0x60000000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x4}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x4, 0x4, 0x4, 0x10000, 0x808, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xffffffff}, 0x15) 851.31258ms ago: executing program 4 (id=4293): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00'}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x17, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x300}}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000}, 0x80) 772.527567ms ago: executing program 4 (id=4294): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x0, 0x7}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f00000002c0)}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000407b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x2, 0x4, 0x10008, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000000000000000000000850000006d000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 716.529671ms ago: executing program 4 (id=4295): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x3, 0x8b, 0x100, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x3, 0x3}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f0000006380)={0x0, 0x0, &(0x7f0000002e00)=[{&(0x7f0000000b00)}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f00000003c0)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x3e1c01, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000070000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000010c0)='blkio.bfq.io_service_bytes\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000001580)={0x0, 0x1f, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="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", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) recvmsg$unix(r3, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001040)=[{&(0x7f00000015c0)=""/4096, 0x7ffff000}], 0x1}, 0x40000100) 653.833116ms ago: executing program 1 (id=4296): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200000085000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000700)={0x0, 0x0, 0x0}, 0x0) close(r0) 641.219767ms ago: executing program 1 (id=4297): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x5, &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x88, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x57, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(r2) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032b00fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$ITER_CREATE(0x21, &(0x7f0000000640)={r3}, 0x8) 594.971681ms ago: executing program 0 (id=4298): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00'}, 0x10) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0xc000000, 0xfffffd26) 565.683733ms ago: executing program 3 (id=4299): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000002600181100", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) 426.229035ms ago: executing program 3 (id=4300): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRES8=r0], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x42, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0xe, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r2}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r2}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.current\x00', 0x275a, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r3, &(0x7f0000000000), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) syz_clone(0x40002200, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001580)=@base={0x0, 0x0, 0x0, 0x0, 0x49c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2}, 0x48) 393.268287ms ago: executing program 0 (id=4302): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000300)=""/154}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x0, 0x7, 0x0, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='block_plug\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000200)={'geneve1\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB, @ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 0s ago: executing program 0 (id=4303): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x3b) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) close(r2) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) write$cgroup_pid(r2, &(0x7f0000001080), 0x24) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='ext4_writepages_result\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x4, 0x80, 0x40, 0x3, 0x0, 0x4, 0x0, 0x4, 0x8, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_bp={&(0x7f0000000180), 0x2}, 0x4000, 0x401, 0xff, 0x9, 0x0, 0x1ff, 0x6, 0x0, 0x3c7, 0x0, 0x6}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x99, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r6) openat$cgroup_subtree(r5, &(0x7f0000001040), 0x2, 0x0) ioctl$SIOCSIFHWADDR(r6, 0x5450, 0x0) kernel console output (not intermixed with test programs): file_ioctl+0x84/0xb0 [ 155.768659][ T6224] ? sock_poll+0x340/0x340 [ 155.773039][ T6224] __se_sys_ioctl+0x114/0x190 [ 155.777550][ T6224] __x64_sys_ioctl+0x7b/0x90 [ 155.781957][ T6224] do_syscall_64+0x34/0x70 [ 155.786229][ T6224] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 155.791950][ T6224] RIP: 0033:0x7f40af6edbd9 [ 155.796194][ T6224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 155.815636][ T6224] RSP: 002b:00007f40ae96f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 155.823873][ T6224] RAX: ffffffffffffffda RBX: 00007f40af87bf60 RCX: 00007f40af6edbd9 [ 155.831686][ T6224] RDX: 0000000020000040 RSI: 0000000000008914 RDI: 0000000000000007 [ 155.839512][ T6224] RBP: 00007f40ae96f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 155.847321][ T6224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 155.855330][ T6224] R13: 000000000000000b R14: 00007f40af87bf60 R15: 00007fff072f7ab8 [ 155.865685][ T6224] wireguard: wg2: Could not create IPv4 socket [ 155.871715][ T6224] device wg2 entered promiscuous mode [ 155.913804][ T6226] device syzkaller0 entered promiscuous mode [ 156.905391][ T6273] device syzkaller0 entered promiscuous mode [ 157.058469][ T6301] FAULT_INJECTION: forcing a failure. [ 157.058469][ T6301] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 157.075241][ T6301] CPU: 1 PID: 6301 Comm: syz.4.2287 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 157.086365][ T6301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 157.096230][ T6301] Call Trace: [ 157.099464][ T6301] dump_stack_lvl+0x1e2/0x24b [ 157.103974][ T6301] ? bfq_pos_tree_add_move+0x43b/0x43b [ 157.109270][ T6301] dump_stack+0x15/0x17 [ 157.113274][ T6301] should_fail+0x3c6/0x510 [ 157.117633][ T6301] should_fail_alloc_page+0x52/0x60 [ 157.122799][ T6301] __alloc_pages_nodemask+0x1b3/0xaf0 [ 157.128076][ T6301] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 157.133454][ T6301] ? _raw_spin_trylock_bh+0x190/0x190 [ 157.138650][ T6301] ? _raw_spin_lock+0xa4/0x1b0 [ 157.143263][ T6301] ? _raw_spin_trylock_bh+0x190/0x190 [ 157.148562][ T6301] pte_alloc_one+0x1f/0xc0 [ 157.152806][ T6301] __pte_alloc+0x75/0x2c0 [ 157.156983][ T6301] ? free_pgtables+0x3c0/0x3c0 [ 157.161575][ T6301] ? slab_post_alloc_hook+0x61/0x2f0 [ 157.166700][ T6301] copy_page_range+0x29d8/0x3020 [ 157.171471][ T6301] ? kmem_cache_alloc+0x168/0x2e0 [ 157.176329][ T6301] ? kernel_clone+0x21e/0x9e0 [ 157.180842][ T6301] ? do_syscall_64+0x34/0x70 [ 157.185280][ T6301] ? pfn_valid+0x1d0/0x1d0 [ 157.189531][ T6301] ? __kasan_check_write+0x14/0x20 [ 157.194468][ T6301] ? _raw_write_lock+0xa4/0x170 [ 157.199156][ T6301] ? _raw_write_trylock+0x1a0/0x1a0 [ 157.204209][ T6301] ? _raw_write_unlock+0x2e/0x60 [ 157.208965][ T6301] copy_mm+0xc4a/0x13a0 [ 157.212959][ T6301] ? copy_signal+0x610/0x610 [ 157.217381][ T6301] ? __init_rwsem+0xd6/0x1c0 [ 157.221807][ T6301] ? copy_signal+0x4e3/0x610 [ 157.226236][ T6301] copy_process+0x1175/0x3340 [ 157.230756][ T6301] ? proc_fail_nth_write+0x20b/0x290 [ 157.235873][ T6301] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 157.240911][ T6301] ? bpf_trace_printk+0xcca/0xd50 [ 157.245767][ T6301] kernel_clone+0x21e/0x9e0 [ 157.250105][ T6301] ? create_io_thread+0x1e0/0x1e0 [ 157.254979][ T6301] __x64_sys_clone+0x23f/0x290 [ 157.259574][ T6301] ? __do_sys_vfork+0x130/0x130 [ 157.264255][ T6301] ? __bpf_trace_sys_enter+0x62/0x70 [ 157.269374][ T6301] ? syscall_enter_from_user_mode+0x144/0x1a0 [ 157.275275][ T6301] do_syscall_64+0x34/0x70 [ 157.279524][ T6301] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.285253][ T6301] RIP: 0033:0x7efc754ecbd9 [ 157.289513][ T6301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.308958][ T6301] RSP: 002b:00007efc7476dff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 157.317296][ T6301] RAX: ffffffffffffffda RBX: 00007efc7567af60 RCX: 00007efc754ecbd9 [ 157.325089][ T6301] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 157.332902][ T6301] RBP: 00007efc7476e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 157.340799][ T6301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 157.348723][ T6301] R13: 000000000000000b R14: 00007efc7567af60 R15: 00007ffffb65c078 [ 157.940244][ T6325] device syzkaller0 entered promiscuous mode [ 157.971026][ T6337] FAULT_INJECTION: forcing a failure. [ 157.971026][ T6337] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 157.984720][ T6337] CPU: 0 PID: 6337 Comm: syz.2.2302 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 157.995972][ T6337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 158.005864][ T6337] Call Trace: [ 158.009004][ T6337] dump_stack_lvl+0x1e2/0x24b [ 158.013507][ T6337] ? bfq_pos_tree_add_move+0x43b/0x43b [ 158.018797][ T6337] dump_stack+0x15/0x17 [ 158.022795][ T6337] should_fail+0x3c6/0x510 [ 158.027065][ T6337] should_fail_usercopy+0x1a/0x20 [ 158.031917][ T6337] strncpy_from_user+0x24/0x2d0 [ 158.036600][ T6337] ? getname_flags+0xba/0x520 [ 158.041108][ T6337] getname_flags+0xf2/0x520 [ 158.045445][ T6337] user_path_create+0x28/0x50 [ 158.049961][ T6337] bpf_obj_pin_user+0x10d/0x310 [ 158.054644][ T6337] ? unwind_get_return_address+0x4d/0x90 [ 158.060123][ T6337] ? bpf_patch_insn_data+0xdf0/0xdf0 [ 158.065235][ T6337] ? selinux_bpf+0xd2/0x100 [ 158.069575][ T6337] __se_sys_bpf+0x1efe/0x11cb0 [ 158.074180][ T6337] ? stack_trace_save+0x113/0x1c0 [ 158.079033][ T6337] ? terminate_walk+0x407/0x4f0 [ 158.083722][ T6337] ? stack_trace_snprint+0xf0/0xf0 [ 158.088671][ T6337] ? kmem_cache_free+0xa9/0x1e0 [ 158.093353][ T6337] ? kmem_cache_free+0xa9/0x1e0 [ 158.098039][ T6337] ? kasan_set_track+0x5d/0x70 [ 158.102644][ T6337] ? kasan_set_track+0x4b/0x70 [ 158.107239][ T6337] ? kasan_set_free_info+0x23/0x40 [ 158.112188][ T6337] ? ____kasan_slab_free+0x121/0x160 [ 158.117306][ T6337] ? __kasan_slab_free+0x11/0x20 [ 158.122171][ T6337] ? __x64_sys_bpf+0x90/0x90 [ 158.126599][ T6337] ? do_sys_openat2+0x5e1/0x6f0 [ 158.131280][ T6337] ? __x64_sys_openat+0x243/0x290 [ 158.136144][ T6337] ? do_syscall_64+0x34/0x70 [ 158.140571][ T6337] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.146473][ T6337] ? _kstrtoull+0x3a0/0x4a0 [ 158.150812][ T6337] ? kstrtouint_from_user+0x20a/0x2a0 [ 158.156018][ T6337] ? kstrtol_from_user+0x310/0x310 [ 158.161054][ T6337] ? memset+0x35/0x40 [ 158.164871][ T6337] ? __fsnotify_parent+0x4b9/0x6c0 [ 158.169820][ T6337] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 158.176505][ T6337] ? proc_fail_nth_write+0x20b/0x290 [ 158.181623][ T6337] ? proc_fail_nth_read+0x210/0x210 [ 158.186662][ T6337] ? security_file_permission+0x86/0xb0 [ 158.192040][ T6337] ? rw_verify_area+0x1c3/0x360 [ 158.196725][ T6337] ? preempt_count_add+0x92/0x1a0 [ 158.201588][ T6337] ? vfs_write+0x854/0xe70 [ 158.205838][ T6337] ? kernel_write+0x3d0/0x3d0 [ 158.210352][ T6337] ? __kasan_check_write+0x14/0x20 [ 158.215325][ T6337] ? mutex_lock+0xa5/0x110 [ 158.219549][ T6337] ? mutex_trylock+0xa0/0xa0 [ 158.223978][ T6337] ? __kasan_check_write+0x14/0x20 [ 158.228925][ T6337] ? fput_many+0x160/0x1b0 [ 158.233182][ T6337] ? debug_smp_processor_id+0x17/0x20 [ 158.238387][ T6337] __x64_sys_bpf+0x7b/0x90 [ 158.242638][ T6337] do_syscall_64+0x34/0x70 [ 158.246891][ T6337] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.252626][ T6337] RIP: 0033:0x7fa1f836ebd9 [ 158.256962][ T6337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.276399][ T6337] RSP: 002b:00007fa1f75f0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 158.284643][ T6337] RAX: ffffffffffffffda RBX: 00007fa1f84fcf60 RCX: 00007fa1f836ebd9 [ 158.292457][ T6337] RDX: 0000000000000018 RSI: 00000000200003c0 RDI: 0000000000000006 [ 158.300265][ T6337] RBP: 00007fa1f75f00a0 R08: 0000000000000000 R09: 0000000000000000 [ 158.308079][ T6337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 158.315891][ T6337] R13: 000000000000000b R14: 00007fa1f84fcf60 R15: 00007ffe5f7ee118 [ 158.447417][ T6338] device syzkaller0 entered promiscuous mode [ 158.527008][ T6350] device syzkaller0 entered promiscuous mode [ 158.821056][ T6371] device syzkaller0 entered promiscuous mode [ 159.235635][ T6382] device syzkaller0 entered promiscuous mode [ 159.582193][ T6410] device syzkaller0 entered promiscuous mode [ 159.812799][ T6426] device syzkaller0 entered promiscuous mode [ 160.189084][ T6444] device syzkaller0 entered promiscuous mode [ 160.598355][ T6489] FAULT_INJECTION: forcing a failure. [ 160.598355][ T6489] name failslab, interval 1, probability 0, space 0, times 0 [ 160.634914][ T6487] device syzkaller0 entered promiscuous mode [ 160.657052][ T6489] CPU: 0 PID: 6489 Comm: syz.3.2361 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 160.668149][ T6489] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 160.678043][ T6489] Call Trace: [ 160.681180][ T6489] dump_stack_lvl+0x1e2/0x24b [ 160.685692][ T6489] ? panic+0x812/0x812 [ 160.689602][ T6489] ? bfq_pos_tree_add_move+0x43b/0x43b [ 160.694905][ T6489] dump_stack+0x15/0x17 [ 160.698887][ T6489] should_fail+0x3c6/0x510 [ 160.703139][ T6489] ? security_inode_alloc+0x29/0x120 [ 160.708257][ T6489] __should_failslab+0xa4/0xe0 [ 160.712846][ T6489] should_failslab+0x9/0x20 [ 160.717182][ T6489] kmem_cache_alloc+0x3d/0x2e0 [ 160.721785][ T6489] security_inode_alloc+0x29/0x120 [ 160.726731][ T6489] inode_init_always+0x767/0x9f0 [ 160.731503][ T6489] ? sockfs_init_fs_context+0xb0/0xb0 [ 160.736884][ T6489] new_inode_pseudo+0x93/0x220 [ 160.741485][ T6489] __sock_create+0x135/0x760 [ 160.745910][ T6489] __sys_socketpair+0x313/0x6e0 [ 160.750599][ T6489] ? __ia32_sys_socket+0x90/0x90 [ 160.755445][ T6489] ? __ia32_sys_read+0x90/0x90 [ 160.759975][ T6489] __x64_sys_socketpair+0x9b/0xb0 [ 160.765064][ T6489] do_syscall_64+0x34/0x70 [ 160.769389][ T6489] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 160.775111][ T6489] RIP: 0033:0x7f40af6edbd9 [ 160.779371][ T6489] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 160.798806][ T6489] RSP: 002b:00007f40ae96f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 160.807042][ T6489] RAX: ffffffffffffffda RBX: 00007f40af87bf60 RCX: 00007f40af6edbd9 [ 160.814851][ T6489] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000001e [ 160.822661][ T6489] RBP: 00007f40ae96f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 160.830487][ T6489] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 160.838296][ T6489] R13: 000000000000000b R14: 00007f40af87bf60 R15: 00007fff072f7ab8 [ 160.852690][ T6489] socket: no more sockets [ 160.914125][ T6498] device syzkaller0 entered promiscuous mode [ 160.965946][ T6510] FAULT_INJECTION: forcing a failure. [ 160.965946][ T6510] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 160.979650][ T6510] CPU: 0 PID: 6510 Comm: syz.3.2371 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 160.990732][ T6510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 161.000619][ T6510] Call Trace: [ 161.003754][ T6510] dump_stack_lvl+0x1e2/0x24b [ 161.008267][ T6510] ? bfq_pos_tree_add_move+0x43b/0x43b [ 161.013554][ T6510] dump_stack+0x15/0x17 [ 161.017545][ T6510] should_fail+0x3c6/0x510 [ 161.021803][ T6510] should_fail_alloc_page+0x52/0x60 [ 161.026836][ T6510] __alloc_pages_nodemask+0x1b3/0xaf0 [ 161.032046][ T6510] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 161.037440][ T6510] ? find_next_bit+0x7f/0x100 [ 161.042377][ T6510] pcpu_populate_chunk+0x190/0xe10 [ 161.047437][ T6510] pcpu_alloc+0xa81/0x1420 [ 161.051671][ T6510] __alloc_percpu_gfp+0x27/0x30 [ 161.056343][ T6510] prealloc_init+0x243/0x7f0 [ 161.060861][ T6510] htab_map_alloc+0x68d/0x950 [ 161.065805][ T6510] __se_sys_bpf+0x620f/0x11cb0 [ 161.070404][ T6510] ? stack_trace_save+0x113/0x1c0 [ 161.075469][ T6510] ? terminate_walk+0x407/0x4f0 [ 161.080243][ T6510] ? stack_trace_snprint+0xf0/0xf0 [ 161.085190][ T6510] ? kmem_cache_free+0xa9/0x1e0 [ 161.089868][ T6510] ? kmem_cache_free+0xa9/0x1e0 [ 161.094556][ T6510] ? kasan_set_track+0x5d/0x70 [ 161.099152][ T6510] ? kasan_set_track+0x4b/0x70 [ 161.103854][ T6510] ? kasan_set_free_info+0x23/0x40 [ 161.108789][ T6510] ? ____kasan_slab_free+0x121/0x160 [ 161.113908][ T6510] ? __kasan_slab_free+0x11/0x20 [ 161.118770][ T6510] ? __x64_sys_bpf+0x90/0x90 [ 161.123195][ T6510] ? do_sys_openat2+0x5e1/0x6f0 [ 161.127968][ T6510] ? __x64_sys_openat+0x243/0x290 [ 161.133011][ T6510] ? do_syscall_64+0x34/0x70 [ 161.137430][ T6510] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 161.143332][ T6510] ? _kstrtoull+0x3a0/0x4a0 [ 161.147672][ T6510] ? kstrtouint_from_user+0x20a/0x2a0 [ 161.152878][ T6510] ? kstrtol_from_user+0x310/0x310 [ 161.157839][ T6510] ? memset+0x35/0x40 [ 161.161645][ T6510] ? __fsnotify_parent+0x4b9/0x6c0 [ 161.166595][ T6510] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 161.173189][ T6510] ? proc_fail_nth_write+0x20b/0x290 [ 161.178309][ T6510] ? proc_fail_nth_read+0x210/0x210 [ 161.183343][ T6510] ? security_file_permission+0x86/0xb0 [ 161.188726][ T6510] ? rw_verify_area+0x1c3/0x360 [ 161.193413][ T6510] ? slab_free_freelist_hook+0xc0/0x190 [ 161.198794][ T6510] ? preempt_count_add+0x92/0x1a0 [ 161.203662][ T6510] ? vfs_write+0x854/0xe70 [ 161.207908][ T6510] ? kernel_write+0x3d0/0x3d0 [ 161.212418][ T6510] ? __kasan_check_write+0x14/0x20 [ 161.217367][ T6510] ? mutex_lock+0xa5/0x110 [ 161.221617][ T6510] ? mutex_trylock+0xa0/0xa0 [ 161.226049][ T6510] ? __kasan_check_write+0x14/0x20 [ 161.230997][ T6510] ? fput_many+0x160/0x1b0 [ 161.235252][ T6510] ? debug_smp_processor_id+0x17/0x20 [ 161.240456][ T6510] __x64_sys_bpf+0x7b/0x90 [ 161.244706][ T6510] do_syscall_64+0x34/0x70 [ 161.248961][ T6510] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 161.254685][ T6510] RIP: 0033:0x7f40af6edbd9 [ 161.258942][ T6510] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.278383][ T6510] RSP: 002b:00007f40ae96f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 161.286625][ T6510] RAX: ffffffffffffffda RBX: 00007f40af87bf60 RCX: 00007f40af6edbd9 [ 161.294437][ T6510] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 161.302252][ T6510] RBP: 00007f40ae96f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 161.310060][ T6510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 161.317890][ T6510] R13: 000000000000000b R14: 00007f40af87bf60 R15: 00007fff072f7ab8 [ 161.777759][ T6540] device syzkaller0 entered promiscuous mode [ 162.145926][ T6582] device syzkaller0 entered promiscuous mode [ 162.274081][ T24] audit: type=1400 audit(1720452805.670:149): avc: denied { create } for pid=6602 comm="syz.1.2413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 162.352448][ T6611] device syzkaller0 entered promiscuous mode [ 163.622535][ T6734] device syzkaller0 entered promiscuous mode [ 163.760146][ T24] audit: type=1400 audit(1720452807.160:150): avc: denied { create } for pid=6743 comm="syz.2.2473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 165.090172][ T6819] FAULT_INJECTION: forcing a failure. [ 165.090172][ T6819] name failslab, interval 1, probability 0, space 0, times 0 [ 165.290917][ T6819] CPU: 0 PID: 6819 Comm: syz.1.2501 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 165.302028][ T6819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 165.312167][ T6819] Call Trace: [ 165.315304][ T6819] dump_stack_lvl+0x1e2/0x24b [ 165.319813][ T6819] ? bfq_pos_tree_add_move+0x43b/0x43b [ 165.325104][ T6819] ? selinux_capable+0x2f1/0x430 [ 165.329877][ T6819] dump_stack+0x15/0x17 [ 165.333869][ T6819] should_fail+0x3c6/0x510 [ 165.338175][ T6819] ? btf_new_fd+0x112/0x9c0 [ 165.342466][ T6819] __should_failslab+0xa4/0xe0 [ 165.347072][ T6819] should_failslab+0x9/0x20 [ 165.351587][ T6819] kmem_cache_alloc_trace+0x3a/0x2e0 [ 165.356706][ T6819] btf_new_fd+0x112/0x9c0 [ 165.360864][ T6819] __se_sys_bpf+0x1aed/0x11cb0 [ 165.365507][ T6819] ? stack_trace_save+0x113/0x1c0 [ 165.370327][ T6819] ? terminate_walk+0x407/0x4f0 [ 165.375002][ T6819] ? stack_trace_snprint+0xf0/0xf0 [ 165.379955][ T6819] ? kmem_cache_free+0xa9/0x1e0 [ 165.384638][ T6819] ? kmem_cache_free+0xa9/0x1e0 [ 165.389325][ T6819] ? kasan_set_track+0x5d/0x70 [ 165.393928][ T6819] ? kasan_set_track+0x4b/0x70 [ 165.398526][ T6819] ? kasan_set_free_info+0x23/0x40 [ 165.403469][ T6819] ? ____kasan_slab_free+0x121/0x160 [ 165.408623][ T6819] ? __kasan_slab_free+0x11/0x20 [ 165.413453][ T6819] ? __x64_sys_bpf+0x90/0x90 [ 165.417879][ T6819] ? do_sys_openat2+0x5e1/0x6f0 [ 165.422563][ T6819] ? __x64_sys_openat+0x243/0x290 [ 165.427424][ T6819] ? do_syscall_64+0x34/0x70 [ 165.431853][ T6819] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 165.437759][ T6819] ? _kstrtoull+0x3a0/0x4a0 [ 165.442101][ T6819] ? kstrtouint_from_user+0x20a/0x2a0 [ 165.447304][ T6819] ? kstrtol_from_user+0x310/0x310 [ 165.452252][ T6819] ? memset+0x35/0x40 [ 165.456087][ T6819] ? __fsnotify_parent+0x4b9/0x6c0 [ 165.461017][ T6819] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 165.467618][ T6819] ? proc_fail_nth_write+0x20b/0x290 [ 165.472735][ T6819] ? proc_fail_nth_read+0x210/0x210 [ 165.477769][ T6819] ? security_file_permission+0x86/0xb0 [ 165.483153][ T6819] ? rw_verify_area+0x1c3/0x360 [ 165.487835][ T6819] ? slab_free_freelist_hook+0xc0/0x190 [ 165.493216][ T6819] ? preempt_count_add+0x92/0x1a0 [ 165.498076][ T6819] ? vfs_write+0x854/0xe70 [ 165.502330][ T6819] ? kernel_write+0x3d0/0x3d0 [ 165.506848][ T6819] ? __kasan_check_write+0x14/0x20 [ 165.511792][ T6819] ? mutex_lock+0xa5/0x110 [ 165.516043][ T6819] ? mutex_trylock+0xa0/0xa0 [ 165.520473][ T6819] ? __kasan_check_write+0x14/0x20 [ 165.525417][ T6819] ? fput_many+0x160/0x1b0 [ 165.529676][ T6819] ? debug_smp_processor_id+0x17/0x20 [ 165.534877][ T6819] __x64_sys_bpf+0x7b/0x90 [ 165.539130][ T6819] do_syscall_64+0x34/0x70 [ 165.543385][ T6819] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 165.549113][ T6819] RIP: 0033:0x7fc234ecdbd9 [ 165.553366][ T6819] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 165.572807][ T6819] RSP: 002b:00007fc23414f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 165.581049][ T6819] RAX: ffffffffffffffda RBX: 00007fc23505bf60 RCX: 00007fc234ecdbd9 [ 165.588859][ T6819] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 165.596672][ T6819] RBP: 00007fc23414f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 165.604484][ T6819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 165.612296][ T6819] R13: 000000000000000b R14: 00007fc23505bf60 R15: 00007ffff9383d28 [ 169.513938][ T7079] device pim6reg1 entered promiscuous mode [ 171.262339][ T7151] FAULT_INJECTION: forcing a failure. [ 171.262339][ T7151] name failslab, interval 1, probability 0, space 0, times 0 [ 171.302512][ T7151] CPU: 0 PID: 7151 Comm: syz.2.2642 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 171.313625][ T7151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 171.323501][ T7151] Call Trace: [ 171.326637][ T7151] dump_stack_lvl+0x1e2/0x24b [ 171.331145][ T7151] ? panic+0x812/0x812 [ 171.335151][ T7151] ? do_syscall_64+0x34/0x70 [ 171.339563][ T7151] ? bfq_pos_tree_add_move+0x43b/0x43b [ 171.344998][ T7151] dump_stack+0x15/0x17 [ 171.348977][ T7151] should_fail+0x3c6/0x510 [ 171.353357][ T7151] ? __get_vm_area_node+0x116/0x470 [ 171.358377][ T7151] __should_failslab+0xa4/0xe0 [ 171.362987][ T7151] should_failslab+0x9/0x20 [ 171.367321][ T7151] kmem_cache_alloc_trace+0x3a/0x2e0 [ 171.372438][ T7151] __get_vm_area_node+0x116/0x470 [ 171.377292][ T7151] __vmalloc_node_range+0xdc/0x7c0 [ 171.382325][ T7151] ? copy_process+0x5c8/0x3340 [ 171.387098][ T7151] ? kmem_cache_alloc+0x168/0x2e0 [ 171.391959][ T7151] ? __kasan_check_write+0x14/0x20 [ 171.396904][ T7151] dup_task_struct+0x429/0xc30 [ 171.401501][ T7151] ? copy_process+0x5c8/0x3340 [ 171.406108][ T7151] copy_process+0x5c8/0x3340 [ 171.410534][ T7151] ? proc_fail_nth_write+0x20b/0x290 [ 171.415688][ T7151] ? proc_fail_nth_read+0x210/0x210 [ 171.420703][ T7151] ? security_file_permission+0x86/0xb0 [ 171.426072][ T7151] ? rw_verify_area+0x1c3/0x360 [ 171.430756][ T7151] ? slab_free_freelist_hook+0xc0/0x190 [ 171.436135][ T7151] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 171.441082][ T7151] ? vfs_write+0x854/0xe70 [ 171.445338][ T7151] kernel_clone+0x21e/0x9e0 [ 171.449764][ T7151] ? __kasan_check_write+0x14/0x20 [ 171.454715][ T7151] ? create_io_thread+0x1e0/0x1e0 [ 171.459576][ T7151] __x64_sys_clone+0x23f/0x290 [ 171.464172][ T7151] ? __do_sys_vfork+0x130/0x130 [ 171.468865][ T7151] ? debug_smp_processor_id+0x17/0x20 [ 171.474069][ T7151] do_syscall_64+0x34/0x70 [ 171.478324][ T7151] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 171.484043][ T7151] RIP: 0033:0x7fa1f836ebd9 [ 171.488297][ T7151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.507739][ T7151] RSP: 002b:00007fa1f75efff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 171.515983][ T7151] RAX: ffffffffffffffda RBX: 00007fa1f84fcf60 RCX: 00007fa1f836ebd9 [ 171.523793][ T7151] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 171.531620][ T7151] RBP: 00007fa1f75f00a0 R08: 0000000000000000 R09: 0000000000000000 [ 171.539428][ T7151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.547229][ T7151] R13: 000000000000000b R14: 00007fa1f84fcf60 R15: 00007ffe5f7ee118 [ 171.565880][ T7151] syz.2.2642: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 171.579814][ T7151] CPU: 1 PID: 7151 Comm: syz.2.2642 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 171.590899][ T7151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 171.600783][ T7151] Call Trace: [ 171.603921][ T7151] dump_stack_lvl+0x1e2/0x24b [ 171.608430][ T7151] ? wake_up_klogd+0xb8/0xf0 [ 171.612861][ T7151] ? bfq_pos_tree_add_move+0x43b/0x43b [ 171.618151][ T7151] ? pr_cont_kernfs_name+0xf0/0x100 [ 171.623198][ T7151] dump_stack+0x15/0x17 [ 171.627198][ T7151] warn_alloc+0x21a/0x390 [ 171.631342][ T7151] ? __get_vm_area_node+0x116/0x470 [ 171.636378][ T7151] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 171.641762][ T7151] ? __get_vm_area_node+0x34b/0x470 [ 171.647021][ T7151] __vmalloc_node_range+0x287/0x7c0 [ 171.652056][ T7151] ? kmem_cache_alloc+0x168/0x2e0 [ 171.657079][ T7151] ? __kasan_check_write+0x14/0x20 [ 171.662027][ T7151] dup_task_struct+0x429/0xc30 [ 171.666632][ T7151] ? copy_process+0x5c8/0x3340 [ 171.671229][ T7151] copy_process+0x5c8/0x3340 [ 171.675649][ T7151] ? proc_fail_nth_write+0x20b/0x290 [ 171.680777][ T7151] ? proc_fail_nth_read+0x210/0x210 [ 171.685806][ T7151] ? security_file_permission+0x86/0xb0 [ 171.691191][ T7151] ? rw_verify_area+0x1c3/0x360 [ 171.695875][ T7151] ? slab_free_freelist_hook+0xc0/0x190 [ 171.701255][ T7151] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 171.706201][ T7151] ? vfs_write+0x854/0xe70 [ 171.710458][ T7151] kernel_clone+0x21e/0x9e0 [ 171.714796][ T7151] ? __kasan_check_write+0x14/0x20 [ 171.719745][ T7151] ? create_io_thread+0x1e0/0x1e0 [ 171.724605][ T7151] __x64_sys_clone+0x23f/0x290 [ 171.729204][ T7151] ? __do_sys_vfork+0x130/0x130 [ 171.733886][ T7151] ? debug_smp_processor_id+0x17/0x20 [ 171.739100][ T7151] do_syscall_64+0x34/0x70 [ 171.743348][ T7151] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 171.749073][ T7151] RIP: 0033:0x7fa1f836ebd9 [ 171.753326][ T7151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.772783][ T7151] RSP: 002b:00007fa1f75efff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 171.781018][ T7151] RAX: ffffffffffffffda RBX: 00007fa1f84fcf60 RCX: 00007fa1f836ebd9 [ 171.788881][ T7151] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 171.796639][ T7151] RBP: 00007fa1f75f00a0 R08: 0000000000000000 R09: 0000000000000000 [ 171.804438][ T7151] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.812248][ T7151] R13: 000000000000000b R14: 00007fa1f84fcf60 R15: 00007ffe5f7ee118 [ 171.838859][ T7151] Mem-Info: [ 171.842175][ T7151] active_anon:134 inactive_anon:14037 isolated_anon:0 [ 171.842175][ T7151] active_file:21442 inactive_file:4822 isolated_file:0 [ 171.842175][ T7151] unevictable:0 dirty:258 writeback:0 [ 171.842175][ T7151] slab_reclaimable:6814 slab_unreclaimable:74465 [ 171.842175][ T7151] mapped:13632 shmem:193 pagetables:502 bounce:0 [ 171.842175][ T7151] free:1576766 free_pcp:718 free_cma:0 [ 171.881419][ T7151] Node 0 active_anon:536kB inactive_anon:56180kB active_file:85768kB inactive_file:19288kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:54520kB dirty:1032kB writeback:0kB shmem:772kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4736kB all_unreclaimable? no [ 171.910737][ T7151] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984788kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1436kB local_pcp:0kB free_cma:0kB [ 172.089338][ T7151] lowmem_reserve[]: 0 3941 3941 [ 172.094592][ T7151] Normal free:3316180kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:536kB inactive_anon:56180kB active_file:85768kB inactive_file:19288kB unevictable:0kB writepending:1032kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2004kB bounce:0kB free_pcp:2152kB local_pcp:1304kB free_cma:0kB [ 172.382475][ T7151] lowmem_reserve[]: 0 0 0 [ 172.412777][ T7151] DMA32: 8*4kB (UM) 3*8kB (M) 2*16kB (M) 5*32kB (UM) 7*64kB (UM) 6*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 172.704413][ T7151] Normal: 357*4kB (UE) 248*8kB (UE) 121*16kB (UE) 275*32kB (UE) 370*64kB (UM) 103*128kB (UME) 59*256kB (UM) 29*512kB (UME) 13*1024kB (UM) 4*2048kB (UM) 785*4096kB (UM) = 3317828kB [ 172.922872][ T7151] 26459 total pagecache pages [ 172.956216][ T7151] 0 pages in swap cache [ 172.978072][ T7151] Swap cache stats: add 0, delete 0, find 0/0 [ 172.992723][ T7151] Free swap = 124996kB [ 173.001738][ T7151] Total swap = 124996kB [ 173.012077][ T7151] 2097051 pages RAM [ 173.023621][ T7151] 0 pages HighMem/MovableOnly [ 173.028327][ T7151] 341890 pages reserved [ 173.032305][ T7151] 0 pages cma reserved [ 173.426942][ T7224] FAULT_INJECTION: forcing a failure. [ 173.426942][ T7224] name failslab, interval 1, probability 0, space 0, times 0 [ 173.456138][ T7224] CPU: 0 PID: 7224 Comm: syz.4.2671 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 173.467235][ T7224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 173.477124][ T7224] Call Trace: [ 173.480259][ T7224] dump_stack_lvl+0x1e2/0x24b [ 173.484768][ T7224] ? bfq_pos_tree_add_move+0x43b/0x43b [ 173.490067][ T7224] dump_stack+0x15/0x17 [ 173.494056][ T7224] should_fail+0x3c6/0x510 [ 173.498308][ T7224] ? bpf_map_area_alloc+0x4c/0xf0 [ 173.503172][ T7224] __should_failslab+0xa4/0xe0 [ 173.508291][ T7224] should_failslab+0x9/0x20 [ 173.512626][ T7224] __kmalloc+0x60/0x330 [ 173.516620][ T7224] bpf_map_area_alloc+0x4c/0xf0 [ 173.521306][ T7224] htab_map_alloc+0x4c2/0x950 [ 173.525828][ T7224] __se_sys_bpf+0x620f/0x11cb0 [ 173.530429][ T7224] ? stack_trace_save+0x113/0x1c0 [ 173.535375][ T7224] ? terminate_walk+0x407/0x4f0 [ 173.540058][ T7224] ? stack_trace_snprint+0xf0/0xf0 [ 173.545005][ T7224] ? kmem_cache_free+0xa9/0x1e0 [ 173.549689][ T7224] ? kmem_cache_free+0xa9/0x1e0 [ 173.554380][ T7224] ? kasan_set_track+0x5d/0x70 [ 173.558991][ T7224] ? kasan_set_track+0x4b/0x70 [ 173.563667][ T7224] ? kasan_set_free_info+0x23/0x40 [ 173.568638][ T7224] ? ____kasan_slab_free+0x121/0x160 [ 173.573736][ T7224] ? __kasan_slab_free+0x11/0x20 [ 173.578513][ T7224] ? __x64_sys_bpf+0x90/0x90 [ 173.582933][ T7224] ? do_sys_openat2+0x5e1/0x6f0 [ 173.587620][ T7224] ? __x64_sys_openat+0x243/0x290 [ 173.592481][ T7224] ? do_syscall_64+0x34/0x70 [ 173.596906][ T7224] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 173.602812][ T7224] ? _kstrtoull+0x3a0/0x4a0 [ 173.607199][ T7224] ? kstrtouint_from_user+0x20a/0x2a0 [ 173.612360][ T7224] ? kstrtol_from_user+0x310/0x310 [ 173.617303][ T7224] ? memset+0x35/0x40 [ 173.621124][ T7224] ? __fsnotify_parent+0x4b9/0x6c0 [ 173.626076][ T7224] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 173.632862][ T7224] ? proc_fail_nth_write+0x20b/0x290 [ 173.637972][ T7224] ? proc_fail_nth_read+0x210/0x210 [ 173.643020][ T7224] ? security_file_permission+0x86/0xb0 [ 173.648387][ T7224] ? rw_verify_area+0x1c3/0x360 [ 173.653070][ T7224] ? slab_free_freelist_hook+0xc0/0x190 [ 173.658457][ T7224] ? preempt_count_add+0x92/0x1a0 [ 173.663311][ T7224] ? vfs_write+0x854/0xe70 [ 173.667569][ T7224] ? kernel_write+0x3d0/0x3d0 [ 173.672079][ T7224] ? __kasan_check_write+0x14/0x20 [ 173.677034][ T7224] ? mutex_lock+0xa5/0x110 [ 173.681280][ T7224] ? mutex_trylock+0xa0/0xa0 [ 173.685736][ T7224] ? __kasan_check_write+0x14/0x20 [ 173.690834][ T7224] ? fput_many+0x160/0x1b0 [ 173.695096][ T7224] ? debug_smp_processor_id+0x17/0x20 [ 173.700293][ T7224] __x64_sys_bpf+0x7b/0x90 [ 173.704551][ T7224] do_syscall_64+0x34/0x70 [ 173.708794][ T7224] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 173.714525][ T7224] RIP: 0033:0x7efc754ecbd9 [ 173.718775][ T7224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 173.738306][ T7224] RSP: 002b:00007efc7476e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 173.746549][ T7224] RAX: ffffffffffffffda RBX: 00007efc7567af60 RCX: 00007efc754ecbd9 [ 173.754361][ T7224] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 173.762263][ T7224] RBP: 00007efc7476e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 173.770072][ T7224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 173.777882][ T7224] R13: 000000000000000b R14: 00007efc7567af60 R15: 00007ffffb65c078 [ 175.276177][ T7296] FAULT_INJECTION: forcing a failure. [ 175.276177][ T7296] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 175.424890][ T7296] CPU: 0 PID: 7296 Comm: syz.3.2705 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 175.435991][ T7296] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 175.445881][ T7296] Call Trace: [ 175.449015][ T7296] dump_stack_lvl+0x1e2/0x24b [ 175.453523][ T7296] ? bfq_pos_tree_add_move+0x43b/0x43b [ 175.458817][ T7296] dump_stack+0x15/0x17 [ 175.462805][ T7296] should_fail+0x3c6/0x510 [ 175.467073][ T7296] should_fail_alloc_page+0x52/0x60 [ 175.472102][ T7296] __alloc_pages_nodemask+0x1b3/0xaf0 [ 175.477310][ T7296] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 175.482685][ T7296] kmalloc_order+0x4c/0x170 [ 175.487025][ T7296] kmalloc_order_trace+0x18/0x90 [ 175.491798][ T7296] ? alloc_skb_with_frags+0xa1/0x570 [ 175.496920][ T7296] __kmalloc_track_caller+0x1dd/0x320 [ 175.502127][ T7296] ? __alloc_skb+0x80/0x510 [ 175.506463][ T7296] ? alloc_skb_with_frags+0xa1/0x570 [ 175.511585][ T7296] __alloc_skb+0xbc/0x510 [ 175.515753][ T7296] alloc_skb_with_frags+0xa1/0x570 [ 175.520695][ T7296] ? 0xffffffffa0014000 [ 175.524693][ T7296] ? is_bpf_text_address+0x172/0x190 [ 175.529812][ T7296] ? stack_trace_save+0x1c0/0x1c0 [ 175.534674][ T7296] sock_alloc_send_pskb+0x915/0xa50 [ 175.539712][ T7296] ? __kasan_check_write+0x14/0x20 [ 175.544654][ T7296] ? sock_kzfree_s+0x60/0x60 [ 175.549078][ T7296] ? stack_trace_snprint+0xf0/0xf0 [ 175.554062][ T7296] ? __kasan_record_aux_stack+0x14/0x100 [ 175.559494][ T7296] tun_get_user+0xe90/0x38f0 [ 175.563919][ T7296] ? __kasan_check_write+0x14/0x20 [ 175.568867][ T7296] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 175.574158][ T7296] ? _kstrtoull+0x3a0/0x4a0 [ 175.578499][ T7296] ? tun_do_read+0x1f60/0x1f60 [ 175.583097][ T7296] ? kstrtouint_from_user+0x20a/0x2a0 [ 175.588313][ T7296] ? kstrtol_from_user+0x310/0x310 [ 175.593255][ T7296] ? trie_delete_elem+0x59a/0x760 [ 175.598115][ T7296] ? avc_policy_seqno+0x1b/0x70 [ 175.602802][ T7296] ? selinux_file_permission+0x2bb/0x560 [ 175.608269][ T7296] ? fsnotify_perm+0x67/0x4e0 [ 175.612803][ T7296] tun_chr_write_iter+0x1a8/0x250 [ 175.617660][ T7296] vfs_write+0xb55/0xe70 [ 175.621813][ T7296] ? kernel_write+0x3d0/0x3d0 [ 175.626328][ T7296] ? __fdget_pos+0x209/0x3a0 [ 175.630750][ T7296] ? ksys_write+0x77/0x2c0 [ 175.635000][ T7296] ksys_write+0x199/0x2c0 [ 175.639166][ T7296] ? __ia32_sys_read+0x90/0x90 [ 175.643771][ T7296] ? debug_smp_processor_id+0x17/0x20 [ 175.648975][ T7296] __x64_sys_write+0x7b/0x90 [ 175.653400][ T7296] do_syscall_64+0x34/0x70 [ 175.657655][ T7296] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 175.663386][ T7296] RIP: 0033:0x7f40af6edbd9 [ 175.667637][ T7296] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.687076][ T7296] RSP: 002b:00007f40ae96f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 175.695321][ T7296] RAX: ffffffffffffffda RBX: 00007f40af87bf60 RCX: 00007f40af6edbd9 [ 175.703131][ T7296] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 175.710944][ T7296] RBP: 00007f40ae96f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 175.718753][ T7296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.726568][ T7296] R13: 000000000000000b R14: 00007f40af87bf60 R15: 00007fff072f7ab8 [ 179.614986][ T7455] syz.3.2770[7455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 179.615042][ T7455] syz.3.2770[7455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.316880][ T7477] syz.0.2781[7477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.328144][ T7477] syz.0.2781[7477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.515183][ T7504] syz.1.2793[7504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 180.527463][ T7504] syz.1.2793[7504] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.326856][ T7535] syz.3.2805[7535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 181.432265][ T7535] syz.3.2805[7535] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.204719][ T7577] syz.2.2821[7577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.276011][ T7577] syz.2.2821[7577] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.454663][ T7587] device syzkaller0 entered promiscuous mode [ 182.509524][ T7581] bridge0: port 1(bridge_slave_0) entered blocking state [ 182.525716][ T7581] bridge0: port 1(bridge_slave_0) entered disabled state [ 182.593091][ T7581] device bridge_slave_0 entered promiscuous mode [ 182.664374][ T7581] bridge0: port 2(bridge_slave_1) entered blocking state [ 182.693574][ T7581] bridge0: port 2(bridge_slave_1) entered disabled state [ 182.729244][ T7581] device bridge_slave_1 entered promiscuous mode [ 183.110646][ T7581] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.117546][ T7581] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.124604][ T7581] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.131420][ T7581] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.244846][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 183.254200][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.280195][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 183.287694][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 183.295921][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 183.304651][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 183.313551][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 183.320430][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 183.327802][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 183.336010][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 183.344006][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 183.350864][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 183.358356][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 183.366553][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 183.375236][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 183.383538][ T290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 183.422791][ T604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 183.441459][ T604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 183.502695][ T604] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 183.553953][ T604] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.589098][ T7581] device veth0_vlan entered promiscuous mode [ 183.622801][ T7635] device syzkaller0 entered promiscuous mode [ 183.692940][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.711453][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 183.754561][ T7581] device veth1_macvtap entered promiscuous mode [ 183.810123][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 183.836006][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 183.870143][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 183.917922][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 183.926338][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 183.934586][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 183.943114][ T2814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 184.073053][ T444] device veth0_vlan left promiscuous mode [ 184.298881][ T7685] device syzkaller0 entered promiscuous mode [ 185.212636][ T7725] device syzkaller0 entered promiscuous mode [ 186.365991][ T7772] device syzkaller0 entered promiscuous mode [ 187.595865][ T7823] device syzkaller0 entered promiscuous mode [ 189.077481][ T7868] device syzkaller0 entered promiscuous mode [ 189.327251][ T7892] device syzkaller0 entered promiscuous mode [ 189.511389][ T7908] device syzkaller0 entered promiscuous mode [ 190.348520][ T7933] device syzkaller0 entered promiscuous mode [ 190.486238][ T7943] device syzkaller0 entered promiscuous mode [ 191.042874][ T7978] device syzkaller0 entered promiscuous mode [ 191.550503][ T7986] device syzkaller0 entered promiscuous mode [ 191.999588][ T8003] device syzkaller0 entered promiscuous mode [ 192.927976][ T8039] device syzkaller0 entered promiscuous mode [ 194.070794][ T8078] device syzkaller0 entered promiscuous mode [ 195.387746][ T8123] device syzkaller0 entered promiscuous mode [ 196.037730][ T8162] device syzkaller0 entered promiscuous mode [ 196.863308][ T8189] device syzkaller0 entered promiscuous mode [ 197.535539][ T8213] device syzkaller0 entered promiscuous mode [ 198.190918][ T8245] device syzkaller0 entered promiscuous mode [ 199.157102][ T8280] device syzkaller0 entered promiscuous mode [ 199.841178][ T8307] device syzkaller0 entered promiscuous mode [ 200.822525][ T8340] device syzkaller0 entered promiscuous mode [ 200.876288][ T24] audit: type=1400 audit(1720452844.280:151): avc: denied { create } for pid=8343 comm="syz.1.3147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=iucv_socket permissive=1 [ 201.892847][ T8379] device syzkaller0 entered promiscuous mode [ 202.813974][ T8428] device syzkaller0 entered promiscuous mode [ 204.117170][ T8490] FAULT_INJECTION: forcing a failure. [ 204.117170][ T8490] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 204.317824][ T8490] CPU: 0 PID: 8490 Comm: syz.2.3206 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 204.328924][ T8490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 204.338987][ T8490] Call Trace: [ 204.342123][ T8490] dump_stack_lvl+0x1e2/0x24b [ 204.346625][ T8490] ? bfq_pos_tree_add_move+0x43b/0x43b [ 204.351921][ T8490] ? stack_trace_snprint+0xf0/0xf0 [ 204.356961][ T8490] dump_stack+0x15/0x17 [ 204.360959][ T8490] should_fail+0x3c6/0x510 [ 204.365210][ T8490] should_fail_alloc_page+0x52/0x60 [ 204.370278][ T8490] __alloc_pages_nodemask+0x1b3/0xaf0 [ 204.375444][ T8490] ? __get_vm_area_node+0x156/0x470 [ 204.380476][ T8490] ? __vmalloc_node_range+0xdc/0x7c0 [ 204.385595][ T8490] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 204.390975][ T8490] ? _raw_spin_trylock_bh+0x190/0x190 [ 204.396180][ T8490] __get_free_pages+0xe/0x30 [ 204.400606][ T8490] kasan_populate_vmalloc_pte+0x39/0x130 [ 204.406073][ T8490] ? __apply_to_page_range+0x710/0x9e0 [ 204.411368][ T8490] __apply_to_page_range+0x720/0x9e0 [ 204.416487][ T8490] ? kasan_populate_vmalloc+0x70/0x70 [ 204.421695][ T8490] ? kasan_populate_vmalloc+0x70/0x70 [ 204.426904][ T8490] apply_to_page_range+0x3b/0x50 [ 204.431710][ T8490] kasan_populate_vmalloc+0x65/0x70 [ 204.436709][ T8490] alloc_vmap_area+0x1944/0x1a90 [ 204.441490][ T8490] ? vm_map_ram+0x9d0/0x9d0 [ 204.445826][ T8490] ? __kasan_kmalloc+0x9/0x10 [ 204.450336][ T8490] ? __get_vm_area_node+0x116/0x470 [ 204.455377][ T8490] __get_vm_area_node+0x156/0x470 [ 204.460233][ T8490] __vmalloc_node_range+0xdc/0x7c0 [ 204.465178][ T8490] ? btf_new_fd+0x2c3/0x9c0 [ 204.469522][ T8490] ? kmalloc_order+0x115/0x170 [ 204.474117][ T8490] ? kmalloc_order_trace+0x18/0x90 [ 204.479067][ T8490] ? btf_new_fd+0x2c3/0x9c0 [ 204.483405][ T8490] __vmalloc_node+0x81/0x90 [ 204.487745][ T8490] ? btf_new_fd+0x2c3/0x9c0 [ 204.492085][ T8490] kvmalloc_node+0xd2/0x130 [ 204.496423][ T8490] btf_new_fd+0x2c3/0x9c0 [ 204.500591][ T8490] __se_sys_bpf+0x1aed/0x11cb0 [ 204.505192][ T8490] ? stack_trace_save+0x113/0x1c0 [ 204.510059][ T8490] ? terminate_walk+0x407/0x4f0 [ 204.514736][ T8490] ? stack_trace_snprint+0xf0/0xf0 [ 204.519687][ T8490] ? kmem_cache_free+0xa9/0x1e0 [ 204.524456][ T8490] ? kmem_cache_free+0xa9/0x1e0 [ 204.529147][ T8490] ? kasan_set_track+0x5d/0x70 [ 204.533745][ T8490] ? kasan_set_track+0x4b/0x70 [ 204.538347][ T8490] ? kasan_set_free_info+0x23/0x40 [ 204.543291][ T8490] ? ____kasan_slab_free+0x121/0x160 [ 204.548413][ T8490] ? __kasan_slab_free+0x11/0x20 [ 204.553189][ T8490] ? __x64_sys_bpf+0x90/0x90 [ 204.557615][ T8490] ? do_sys_openat2+0x5e1/0x6f0 [ 204.562298][ T8490] ? __x64_sys_openat+0x243/0x290 [ 204.567163][ T8490] ? do_syscall_64+0x34/0x70 [ 204.571674][ T8490] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 204.577580][ T8490] ? _kstrtoull+0x3a0/0x4a0 [ 204.581916][ T8490] ? kstrtouint_from_user+0x20a/0x2a0 [ 204.587124][ T8490] ? kstrtol_from_user+0x310/0x310 [ 204.592070][ T8490] ? memset+0x35/0x40 [ 204.595892][ T8490] ? __fsnotify_parent+0x4b9/0x6c0 [ 204.600839][ T8490] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 204.607451][ T8490] ? proc_fail_nth_write+0x20b/0x290 [ 204.612564][ T8490] ? proc_fail_nth_read+0x210/0x210 [ 204.617602][ T8490] ? security_file_permission+0x86/0xb0 [ 204.622974][ T8490] ? rw_verify_area+0x1c3/0x360 [ 204.627666][ T8490] ? slab_free_freelist_hook+0xc0/0x190 [ 204.633149][ T8490] ? preempt_count_add+0x92/0x1a0 [ 204.638007][ T8490] ? vfs_write+0x854/0xe70 [ 204.642264][ T8490] ? kernel_write+0x3d0/0x3d0 [ 204.646773][ T8490] ? __kasan_check_write+0x14/0x20 [ 204.651744][ T8490] ? mutex_lock+0xa5/0x110 [ 204.655970][ T8490] ? mutex_trylock+0xa0/0xa0 [ 204.660402][ T8490] ? __kasan_check_write+0x14/0x20 [ 204.665348][ T8490] ? fput_many+0x160/0x1b0 [ 204.669661][ T8490] ? debug_smp_processor_id+0x17/0x20 [ 204.674848][ T8490] __x64_sys_bpf+0x7b/0x90 [ 204.679075][ T8490] do_syscall_64+0x34/0x70 [ 204.683318][ T8490] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 204.689045][ T8490] RIP: 0033:0x7fa1f836ebd9 [ 204.693302][ T8490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 204.712735][ T8490] RSP: 002b:00007fa1f75f0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 204.720979][ T8490] RAX: ffffffffffffffda RBX: 00007fa1f84fcf60 RCX: 00007fa1f836ebd9 [ 204.728791][ T8490] RDX: 0000000000000020 RSI: 0000000020003b00 RDI: 0000000000000012 [ 204.736687][ T8490] RBP: 00007fa1f75f00a0 R08: 0000000000000000 R09: 0000000000000000 [ 204.744498][ T8490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 204.752397][ T8490] R13: 000000000000000b R14: 00007fa1f84fcf60 R15: 00007ffe5f7ee118 [ 204.853186][ T8510] device syzkaller0 entered promiscuous mode [ 205.703058][ T8549] device syzkaller0 entered promiscuous mode [ 205.834229][ T8550] device syzkaller0 entered promiscuous mode [ 205.973229][ T8561] bpf_get_probe_write_proto: 4 callbacks suppressed [ 205.973240][ T8561] syz.4.3238[8561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.052514][ T8561] syz.4.3238[8561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.863017][ T8585] device syzkaller0 entered promiscuous mode [ 207.357420][ T8607] syz.4.3258[8607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.364934][ T8607] syz.4.3258[8607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.570288][ T8617] device syzkaller0 entered promiscuous mode [ 208.941861][ T8672] device syzkaller0 entered promiscuous mode [ 209.820509][ T8695] FAULT_INJECTION: forcing a failure. [ 209.820509][ T8695] name failslab, interval 1, probability 0, space 0, times 0 [ 209.868788][ T8695] CPU: 0 PID: 8695 Comm: syz.4.3289 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 209.879883][ T8695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 209.889870][ T8695] Call Trace: [ 209.893001][ T8695] dump_stack_lvl+0x1e2/0x24b [ 209.897510][ T8695] ? panic+0x812/0x812 [ 209.901414][ T8695] ? bfq_pos_tree_add_move+0x43b/0x43b [ 209.906711][ T8695] dump_stack+0x15/0x17 [ 209.910708][ T8695] should_fail+0x3c6/0x510 [ 209.915158][ T8695] ? __build_skb+0x2a/0x300 [ 209.919495][ T8695] __should_failslab+0xa4/0xe0 [ 209.924101][ T8695] should_failslab+0x9/0x20 [ 209.928444][ T8695] kmem_cache_alloc+0x3d/0x2e0 [ 209.933034][ T8695] ? __put_user_ns+0x60/0x60 [ 209.937466][ T8695] __build_skb+0x2a/0x300 [ 209.941626][ T8695] build_skb+0x25/0x1e0 [ 209.945623][ T8695] bpf_prog_test_run_skb+0x388/0x1410 [ 209.950828][ T8695] ? strncpy_from_kernel_nofault+0x92/0x1e0 [ 209.956565][ T8695] ? ex_handler_uaccess+0x3e/0xc0 [ 209.961430][ T8695] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 209.967237][ T8695] ? __kasan_check_write+0x14/0x20 [ 209.972178][ T8695] ? fput_many+0x160/0x1b0 [ 209.976435][ T8695] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 209.982163][ T8695] __se_sys_bpf+0x5235/0x11cb0 [ 209.986769][ T8695] ? stack_trace_save+0x113/0x1c0 [ 209.991624][ T8695] ? __bad_area_nosemaphore+0xcd/0x440 [ 209.996922][ T8695] ? bad_area_nosemaphore+0x2d/0x40 [ 210.001949][ T8695] ? do_kern_addr_fault+0x69/0x80 [ 210.006836][ T8695] ? __x64_sys_bpf+0x90/0x90 [ 210.011246][ T8695] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 210.017146][ T8695] ? _kstrtoull+0x3a0/0x4a0 [ 210.021480][ T8695] ? kstrtouint_from_user+0x20a/0x2a0 [ 210.026692][ T8695] ? kstrtol_from_user+0x310/0x310 [ 210.031634][ T8695] ? memset+0x35/0x40 [ 210.035456][ T8695] ? __fsnotify_parent+0x4b9/0x6c0 [ 210.040405][ T8695] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 210.046998][ T8695] ? proc_fail_nth_write+0x20b/0x290 [ 210.052115][ T8695] ? proc_fail_nth_read+0x210/0x210 [ 210.057148][ T8695] ? security_file_permission+0x86/0xb0 [ 210.062529][ T8695] ? rw_verify_area+0x1c3/0x360 [ 210.067225][ T8695] ? preempt_count_add+0x92/0x1a0 [ 210.072073][ T8695] ? vfs_write+0x854/0xe70 [ 210.076342][ T8695] ? kernel_write+0x3d0/0x3d0 [ 210.080854][ T8695] ? __kasan_check_write+0x14/0x20 [ 210.085791][ T8695] ? mutex_lock+0xa5/0x110 [ 210.090038][ T8695] ? mutex_trylock+0xa0/0xa0 [ 210.094477][ T8695] ? __kasan_check_write+0x14/0x20 [ 210.099411][ T8695] ? fput_many+0x160/0x1b0 [ 210.103810][ T8695] ? debug_smp_processor_id+0x17/0x20 [ 210.109013][ T8695] __x64_sys_bpf+0x7b/0x90 [ 210.113264][ T8695] do_syscall_64+0x34/0x70 [ 210.117520][ T8695] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 210.123248][ T8695] RIP: 0033:0x7efc754ecbd9 [ 210.127507][ T8695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.147031][ T8695] RSP: 002b:00007efc7476e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 210.155277][ T8695] RAX: ffffffffffffffda RBX: 00007efc7567af60 RCX: 00007efc754ecbd9 [ 210.163170][ T8695] RDX: 0000000000000050 RSI: 0000000020000100 RDI: 000000000000000a [ 210.170982][ T8695] RBP: 00007efc7476e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 210.178878][ T8695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.186690][ T8695] R13: 000000000000000b R14: 00007efc7567af60 R15: 00007ffffb65c078 [ 210.243831][ T8705] device syzkaller0 entered promiscuous mode [ 211.702324][ T8738] device syzkaller0 entered promiscuous mode [ 213.076809][ T8767] device syzkaller0 entered promiscuous mode [ 214.086642][ T8809] device syzkaller0 entered promiscuous mode [ 214.740697][ T8836] device syzkaller0 entered promiscuous mode [ 216.064205][ T8865] device syzkaller0 entered promiscuous mode [ 217.070474][ T8915] device syzkaller0 entered promiscuous mode [ 217.096663][ T8917] device pim6reg1 entered promiscuous mode [ 217.108331][ T8917] FAULT_INJECTION: forcing a failure. [ 217.108331][ T8917] name failslab, interval 1, probability 0, space 0, times 0 [ 217.126344][ T8917] CPU: 1 PID: 8917 Comm: syz.4.3379 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 217.137434][ T8917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 217.147414][ T8917] Call Trace: [ 217.150546][ T8917] dump_stack_lvl+0x1e2/0x24b [ 217.155048][ T8917] ? panic+0x812/0x812 [ 217.158953][ T8917] ? bfq_pos_tree_add_move+0x43b/0x43b [ 217.164248][ T8917] dump_stack+0x15/0x17 [ 217.168243][ T8917] should_fail+0x3c6/0x510 [ 217.172502][ T8917] ? fib6_info_alloc+0x33/0xe0 [ 217.177183][ T8917] __should_failslab+0xa4/0xe0 [ 217.181783][ T8917] should_failslab+0x9/0x20 [ 217.186128][ T8917] __kmalloc+0x60/0x330 [ 217.190115][ T8917] fib6_info_alloc+0x33/0xe0 [ 217.194539][ T8917] ip6_route_info_create+0x4b7/0x1440 [ 217.199750][ T8917] ip6_route_add+0x27/0x130 [ 217.204088][ T8917] addrconf_add_dev+0x415/0x610 [ 217.208774][ T8917] ? local_bh_enable+0x30/0x30 [ 217.213372][ T8917] ? addrconf_permanent_addr+0xb40/0xba0 [ 217.218845][ T8917] ? igmpv3_del_delrec+0x740/0x740 [ 217.223789][ T8917] ? __kasan_check_read+0x11/0x20 [ 217.228649][ T8917] addrconf_dev_config+0x231/0x5a0 [ 217.233595][ T8917] ? __kasan_check_write+0x14/0x20 [ 217.238550][ T8917] ? mutex_lock+0xa5/0x110 [ 217.242796][ T8917] ? init_loopback+0x1c0/0x1c0 [ 217.247396][ T8917] ? macsec_notify+0x101/0x4c0 [ 217.252000][ T8917] ? addrconf_link_ready+0xfb/0x1e0 [ 217.257032][ T8917] addrconf_notify+0x8c5/0xe90 [ 217.261725][ T8917] raw_notifier_call_chain+0x8c/0xf0 [ 217.266855][ T8917] __dev_notify_flags+0x304/0x610 [ 217.271698][ T8917] ? __dev_change_flags+0x6e0/0x6e0 [ 217.276733][ T8917] ? __dev_change_flags+0x56c/0x6e0 [ 217.281767][ T8917] ? dev_get_flags+0x1e0/0x1e0 [ 217.286369][ T8917] ? selinux_capable+0x2f1/0x430 [ 217.291228][ T8917] ? selinux_capset+0xf0/0xf0 [ 217.295750][ T8917] dev_change_flags+0xf0/0x1a0 [ 217.300341][ T8917] dev_ifsioc+0x115/0xae0 [ 217.304511][ T8917] ? dev_ioctl+0xb40/0xb40 [ 217.308761][ T8917] ? dev_get_by_name_rcu+0xc5/0xf0 [ 217.313706][ T8917] dev_ioctl+0x526/0xb40 [ 217.317787][ T8917] sock_do_ioctl+0x295/0x3a0 [ 217.322212][ T8917] ? sock_show_fdinfo+0xa0/0xa0 [ 217.326899][ T8917] ? kernel_write+0x3d0/0x3d0 [ 217.331415][ T8917] ? selinux_file_ioctl+0x3cc/0x540 [ 217.336455][ T8917] sock_ioctl+0x4a6/0x760 [ 217.340613][ T8917] ? sock_poll+0x340/0x340 [ 217.344875][ T8917] ? security_file_ioctl+0x84/0xb0 [ 217.349819][ T8917] ? sock_poll+0x340/0x340 [ 217.354067][ T8917] __se_sys_ioctl+0x114/0x190 [ 217.358580][ T8917] __x64_sys_ioctl+0x7b/0x90 [ 217.363005][ T8917] do_syscall_64+0x34/0x70 [ 217.367261][ T8917] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 217.373013][ T8917] RIP: 0033:0x7efc754ecbd9 [ 217.377243][ T8917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.396766][ T8917] RSP: 002b:00007efc7476e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 217.405013][ T8917] RAX: ffffffffffffffda RBX: 00007efc7567af60 RCX: 00007efc754ecbd9 [ 217.412823][ T8917] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000006 [ 217.420635][ T8917] RBP: 00007efc7476e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 217.428635][ T8917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 217.436442][ T8917] R13: 000000000000000b R14: 00007efc7567af60 R15: 00007ffffb65c078 [ 217.486393][ T8927] device syzkaller0 entered promiscuous mode [ 217.891457][ T8958] device syzkaller0 entered promiscuous mode [ 218.185554][ T8968] geneve1: tun_chr_ioctl cmd 1074025672 [ 218.245804][ T8968] geneve1: ignored: set checksum enabled [ 218.411884][ T8971] device syzkaller0 entered promiscuous mode [ 218.466098][ T24] audit: type=1400 audit(1720452861.860:152): avc: denied { getattr } for pid=8979 comm="syz.3.3403" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 219.422275][ T9017] device syzkaller0 entered promiscuous mode [ 219.487748][ T9024] device syzkaller0 entered promiscuous mode [ 219.759192][ T9040] syz.1.3427[9040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.759237][ T9040] syz.1.3427[9040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.786914][ T9040] syz.1.3427[9040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.815817][ T9040] syz.1.3427[9040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.518266][ T9052] device syzkaller0 entered promiscuous mode [ 220.778062][ T9074] syz.1.3441[9074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.790829][ T9074] syz.1.3441[9074] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.069858][ T9102] syz.3.3453[9102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.100569][ T9102] syz.3.3453[9102] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.981527][ T9137] syz.2.3468[9137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.095356][ T9137] syz.2.3468[9137] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.346914][ T9152] device syzkaller0 entered promiscuous mode [ 223.380395][ T9211] device syzkaller0 entered promiscuous mode [ 224.233391][ T9249] FAULT_INJECTION: forcing a failure. [ 224.233391][ T9249] name failslab, interval 1, probability 0, space 0, times 0 [ 224.249346][ T9249] CPU: 1 PID: 9249 Comm: syz.0.3508 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 224.260446][ T9249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 224.270334][ T9249] Call Trace: [ 224.273466][ T9249] dump_stack_lvl+0x1e2/0x24b [ 224.277981][ T9249] ? bfq_pos_tree_add_move+0x43b/0x43b [ 224.283271][ T9249] dump_stack+0x15/0x17 [ 224.287263][ T9249] should_fail+0x3c6/0x510 [ 224.291525][ T9249] ? kvmalloc_node+0x82/0x130 [ 224.296038][ T9249] __should_failslab+0xa4/0xe0 [ 224.300624][ T9249] should_failslab+0x9/0x20 [ 224.304965][ T9249] __kmalloc+0x60/0x330 [ 224.308976][ T9249] ? btf_check_all_metas+0x745/0x820 [ 224.314086][ T9249] ? kvmalloc_node+0x82/0x130 [ 224.318607][ T9249] kvmalloc_node+0x82/0x130 [ 224.322936][ T9249] btf_parse_type_sec+0x1fa/0x16b0 [ 224.327883][ T9249] ? __btf_verifier_log+0x120/0x120 [ 224.332917][ T9249] ? sort+0x37/0x50 [ 224.336560][ T9249] ? btf_verifier_log+0x2a0/0x2a0 [ 224.341424][ T9249] ? btf_parse_hdr+0x1d5/0x770 [ 224.346015][ T9249] ? btf_verifier_log_vsi+0x4d0/0x4d0 [ 224.351219][ T9249] ? btf_parse_hdr+0x597/0x770 [ 224.355998][ T9249] ? btf_parse_str_sec+0x1b0/0x270 [ 224.360957][ T9249] btf_new_fd+0x53b/0x9c0 [ 224.365108][ T9249] __se_sys_bpf+0x1aed/0x11cb0 [ 224.369710][ T9249] ? stack_trace_save+0x113/0x1c0 [ 224.374570][ T9249] ? terminate_walk+0x407/0x4f0 [ 224.379253][ T9249] ? stack_trace_snprint+0xf0/0xf0 [ 224.384207][ T9249] ? kmem_cache_free+0xa9/0x1e0 [ 224.388888][ T9249] ? kmem_cache_free+0xa9/0x1e0 [ 224.393575][ T9249] ? kasan_set_track+0x5d/0x70 [ 224.398176][ T9249] ? kasan_set_track+0x4b/0x70 [ 224.402775][ T9249] ? kasan_set_free_info+0x23/0x40 [ 224.407722][ T9249] ? ____kasan_slab_free+0x121/0x160 [ 224.412842][ T9249] ? __kasan_slab_free+0x11/0x20 [ 224.417619][ T9249] ? __x64_sys_bpf+0x90/0x90 [ 224.422042][ T9249] ? do_sys_openat2+0x5e1/0x6f0 [ 224.426727][ T9249] ? __x64_sys_openat+0x243/0x290 [ 224.431765][ T9249] ? do_syscall_64+0x34/0x70 [ 224.436192][ T9249] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.442096][ T9249] ? _kstrtoull+0x3a0/0x4a0 [ 224.446432][ T9249] ? kstrtouint_from_user+0x20a/0x2a0 [ 224.451651][ T9249] ? kstrtol_from_user+0x310/0x310 [ 224.456591][ T9249] ? memset+0x35/0x40 [ 224.460409][ T9249] ? __fsnotify_parent+0x4b9/0x6c0 [ 224.465355][ T9249] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 224.472037][ T9249] ? proc_fail_nth_write+0x20b/0x290 [ 224.477159][ T9249] ? proc_fail_nth_read+0x210/0x210 [ 224.482194][ T9249] ? security_file_permission+0x86/0xb0 [ 224.487573][ T9249] ? rw_verify_area+0x1c3/0x360 [ 224.492259][ T9249] ? slab_free_freelist_hook+0xc0/0x190 [ 224.497646][ T9249] ? preempt_count_add+0x92/0x1a0 [ 224.502504][ T9249] ? vfs_write+0x854/0xe70 [ 224.506756][ T9249] ? kernel_write+0x3d0/0x3d0 [ 224.511266][ T9249] ? __kasan_check_write+0x14/0x20 [ 224.516214][ T9249] ? mutex_lock+0xa5/0x110 [ 224.520503][ T9249] ? mutex_trylock+0xa0/0xa0 [ 224.524894][ T9249] ? __kasan_check_write+0x14/0x20 [ 224.529847][ T9249] ? fput_many+0x160/0x1b0 [ 224.534104][ T9249] ? debug_smp_processor_id+0x17/0x20 [ 224.539306][ T9249] __x64_sys_bpf+0x7b/0x90 [ 224.543556][ T9249] do_syscall_64+0x34/0x70 [ 224.547810][ T9249] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.553535][ T9249] RIP: 0033:0x7f07db282bd9 [ 224.557791][ T9249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 224.577232][ T9249] RSP: 002b:00007f07da504048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 224.585479][ T9249] RAX: ffffffffffffffda RBX: 00007f07db410f60 RCX: 00007f07db282bd9 [ 224.593288][ T9249] RDX: 0000000000000020 RSI: 0000000020000280 RDI: 0000000000000012 [ 224.601127][ T9249] RBP: 00007f07da5040a0 R08: 0000000000000000 R09: 0000000000000000 [ 224.608907][ T9249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 224.616720][ T9249] R13: 000000000000000b R14: 00007f07db410f60 R15: 00007ffd94e4f278 [ 224.746666][ T9272] FAULT_INJECTION: forcing a failure. [ 224.746666][ T9272] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 224.759899][ T9272] CPU: 0 PID: 9272 Comm: syz.2.3515 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 224.771066][ T9272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 224.780955][ T9272] Call Trace: [ 224.784089][ T9272] dump_stack_lvl+0x1e2/0x24b [ 224.788601][ T9272] ? bfq_pos_tree_add_move+0x43b/0x43b [ 224.793887][ T9272] ? 0xffffffffa0014000 [ 224.797883][ T9272] ? is_bpf_text_address+0x172/0x190 [ 224.803003][ T9272] ? stack_trace_save+0x1c0/0x1c0 [ 224.807861][ T9272] dump_stack+0x15/0x17 [ 224.811853][ T9272] should_fail+0x3c6/0x510 [ 224.816110][ T9272] should_fail_usercopy+0x1a/0x20 [ 224.820972][ T9272] _copy_from_user+0x20/0xd0 [ 224.825416][ T9272] __se_sys_bpf+0x232/0x11cb0 [ 224.829932][ T9272] ? stack_trace_save+0x113/0x1c0 [ 224.834779][ T9272] ? terminate_walk+0x407/0x4f0 [ 224.839462][ T9272] ? stack_trace_snprint+0xf0/0xf0 [ 224.844408][ T9272] ? kmem_cache_free+0xa9/0x1e0 [ 224.849092][ T9272] ? kmem_cache_free+0xa9/0x1e0 [ 224.853780][ T9272] ? kasan_set_track+0x5d/0x70 [ 224.858378][ T9272] ? kasan_set_track+0x4b/0x70 [ 224.862975][ T9272] ? kasan_set_free_info+0x23/0x40 [ 224.867923][ T9272] ? ____kasan_slab_free+0x121/0x160 [ 224.873042][ T9272] ? __kasan_slab_free+0x11/0x20 [ 224.877822][ T9272] ? __x64_sys_bpf+0x90/0x90 [ 224.882244][ T9272] ? do_sys_openat2+0x5e1/0x6f0 [ 224.886931][ T9272] ? __x64_sys_openat+0x243/0x290 [ 224.891794][ T9272] ? do_syscall_64+0x34/0x70 [ 224.896307][ T9272] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 224.902211][ T9272] ? _kstrtoull+0x3a0/0x4a0 [ 224.906548][ T9272] ? kstrtouint_from_user+0x20a/0x2a0 [ 224.911754][ T9272] ? kstrtol_from_user+0x310/0x310 [ 224.916709][ T9272] ? memset+0x35/0x40 [ 224.920522][ T9272] ? __fsnotify_parent+0x4b9/0x6c0 [ 224.925472][ T9272] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 224.932063][ T9272] ? proc_fail_nth_write+0x20b/0x290 [ 224.937190][ T9272] ? proc_fail_nth_read+0x210/0x210 [ 224.942221][ T9272] ? security_file_permission+0x86/0xb0 [ 224.947608][ T9272] ? rw_verify_area+0x1c3/0x360 [ 224.952286][ T9272] ? slab_free_freelist_hook+0xc0/0x190 [ 224.957668][ T9272] ? preempt_count_add+0x92/0x1a0 [ 224.962550][ T9272] ? vfs_write+0x854/0xe70 [ 224.966870][ T9272] ? kernel_write+0x3d0/0x3d0 [ 224.971392][ T9272] ? __kasan_check_write+0x14/0x20 [ 224.976332][ T9272] ? mutex_lock+0xa5/0x110 [ 224.980582][ T9272] ? mutex_trylock+0xa0/0xa0 [ 224.985009][ T9272] ? __kasan_check_write+0x14/0x20 [ 224.989956][ T9272] ? fput_many+0x160/0x1b0 [ 224.994215][ T9272] ? debug_smp_processor_id+0x17/0x20 [ 224.999419][ T9272] __x64_sys_bpf+0x7b/0x90 [ 225.003671][ T9272] do_syscall_64+0x34/0x70 [ 225.007926][ T9272] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.013648][ T9272] RIP: 0033:0x7fa1f836ebd9 [ 225.017904][ T9272] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.037343][ T9272] RSP: 002b:00007fa1f75f0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 225.045590][ T9272] RAX: ffffffffffffffda RBX: 00007fa1f84fcf60 RCX: 00007fa1f836ebd9 [ 225.053403][ T9272] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 225.061209][ T9272] RBP: 00007fa1f75f00a0 R08: 0000000000000000 R09: 0000000000000000 [ 225.069021][ T9272] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 225.076929][ T9272] R13: 000000000000000b R14: 00007fa1f84fcf60 R15: 00007ffe5f7ee118 [ 225.255046][ T9286] FAULT_INJECTION: forcing a failure. [ 225.255046][ T9286] name failslab, interval 1, probability 0, space 0, times 0 [ 225.267626][ T9286] CPU: 0 PID: 9286 Comm: syz.1.3522 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 225.278739][ T9286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 225.288631][ T9286] Call Trace: [ 225.291760][ T9286] dump_stack_lvl+0x1e2/0x24b [ 225.296267][ T9286] ? bfq_pos_tree_add_move+0x43b/0x43b [ 225.301559][ T9286] dump_stack+0x15/0x17 [ 225.305553][ T9286] should_fail+0x3c6/0x510 [ 225.309805][ T9286] ? skb_ensure_writable+0x2d0/0x440 [ 225.314927][ T9286] __should_failslab+0xa4/0xe0 [ 225.319527][ T9286] should_failslab+0x9/0x20 [ 225.323874][ T9286] __kmalloc_track_caller+0x5f/0x320 [ 225.328994][ T9286] ? skb_ensure_writable+0x2d0/0x440 [ 225.334110][ T9286] pskb_expand_head+0x12b/0x1180 [ 225.338971][ T9286] ? __kasan_check_write+0x14/0x20 [ 225.343918][ T9286] skb_ensure_writable+0x2d0/0x440 [ 225.348863][ T9286] bpf_clone_redirect+0x117/0x390 [ 225.353729][ T9286] bpf_prog_64e505a7b7f97a05+0x55/0x33c [ 225.359104][ T9286] ? __kasan_slab_alloc+0xc3/0xe0 [ 225.363963][ T9286] ? __kasan_slab_alloc+0xb1/0xe0 [ 225.368826][ T9286] ? slab_post_alloc_hook+0x61/0x2f0 [ 225.373945][ T9286] ? kmem_cache_alloc+0x168/0x2e0 [ 225.379076][ T9286] ? __build_skb+0x2a/0x300 [ 225.383405][ T9286] ? build_skb+0x25/0x1e0 [ 225.387582][ T9286] ? bpf_prog_test_run_skb+0x388/0x1410 [ 225.392952][ T9286] ? __se_sys_bpf+0x5235/0x11cb0 [ 225.397729][ T9286] ? __x64_sys_bpf+0x7b/0x90 [ 225.402152][ T9286] ? do_syscall_64+0x34/0x70 [ 225.406580][ T9286] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.412489][ T9286] ? __kasan_check_read+0x11/0x20 [ 225.417341][ T9286] ? bpf_test_timer_continue+0x140/0x440 [ 225.422824][ T9286] bpf_test_run+0x40b/0xc20 [ 225.427152][ T9286] ? convert___skb_to_skb+0x570/0x570 [ 225.432366][ T9286] ? eth_type_trans+0x2e4/0x620 [ 225.437045][ T9286] ? eth_get_headlen+0x240/0x240 [ 225.441817][ T9286] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 225.447198][ T9286] ? convert___skb_to_skb+0x44/0x570 [ 225.452320][ T9286] ? memcpy+0x56/0x70 [ 225.456141][ T9286] bpf_prog_test_run_skb+0xb6e/0x1410 [ 225.461350][ T9286] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 225.467076][ T9286] ? __kasan_check_write+0x14/0x20 [ 225.472022][ T9286] ? fput_many+0x160/0x1b0 [ 225.476275][ T9286] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 225.482005][ T9286] __se_sys_bpf+0x5235/0x11cb0 [ 225.486605][ T9286] ? stack_trace_save+0x113/0x1c0 [ 225.491550][ T9286] ? terminate_walk+0x407/0x4f0 [ 225.496239][ T9286] ? stack_trace_snprint+0xf0/0xf0 [ 225.501188][ T9286] ? kmem_cache_free+0xa9/0x1e0 [ 225.505875][ T9286] ? kmem_cache_free+0xa9/0x1e0 [ 225.510558][ T9286] ? kasan_set_track+0x5d/0x70 [ 225.515163][ T9286] ? kasan_set_track+0x4b/0x70 [ 225.519756][ T9286] ? kasan_set_free_info+0x23/0x40 [ 225.524705][ T9286] ? ____kasan_slab_free+0x121/0x160 [ 225.529826][ T9286] ? __kasan_slab_free+0x11/0x20 [ 225.534611][ T9286] ? __x64_sys_bpf+0x90/0x90 [ 225.539117][ T9286] ? do_sys_openat2+0x5e1/0x6f0 [ 225.543799][ T9286] ? __x64_sys_openat+0x243/0x290 [ 225.548660][ T9286] ? do_syscall_64+0x34/0x70 [ 225.553089][ T9286] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.558991][ T9286] ? _kstrtoull+0x3a0/0x4a0 [ 225.563334][ T9286] ? kstrtouint_from_user+0x20a/0x2a0 [ 225.568536][ T9286] ? kstrtol_from_user+0x310/0x310 [ 225.573495][ T9286] ? memset+0x35/0x40 [ 225.577304][ T9286] ? __fsnotify_parent+0x4b9/0x6c0 [ 225.582257][ T9286] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 225.588845][ T9286] ? proc_fail_nth_write+0x20b/0x290 [ 225.593975][ T9286] ? proc_fail_nth_read+0x210/0x210 [ 225.599002][ T9286] ? security_file_permission+0x86/0xb0 [ 225.604383][ T9286] ? rw_verify_area+0x1c3/0x360 [ 225.609068][ T9286] ? slab_free_freelist_hook+0xc0/0x190 [ 225.614451][ T9286] ? preempt_count_add+0x92/0x1a0 [ 225.619318][ T9286] ? vfs_write+0x854/0xe70 [ 225.623566][ T9286] ? kernel_write+0x3d0/0x3d0 [ 225.628077][ T9286] ? __kasan_check_write+0x14/0x20 [ 225.633025][ T9286] ? mutex_lock+0xa5/0x110 [ 225.637287][ T9286] ? mutex_trylock+0xa0/0xa0 [ 225.641704][ T9286] ? __kasan_check_write+0x14/0x20 [ 225.646651][ T9286] ? fput_many+0x160/0x1b0 [ 225.650913][ T9286] ? debug_smp_processor_id+0x17/0x20 [ 225.656113][ T9286] __x64_sys_bpf+0x7b/0x90 [ 225.660396][ T9286] do_syscall_64+0x34/0x70 [ 225.664621][ T9286] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 225.670348][ T9286] RIP: 0033:0x7fc234ecdbd9 [ 225.674602][ T9286] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 225.694042][ T9286] RSP: 002b:00007fc23414f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 225.702289][ T9286] RAX: ffffffffffffffda RBX: 00007fc23505bf60 RCX: 00007fc234ecdbd9 [ 225.710095][ T9286] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 225.717910][ T9286] RBP: 00007fc23414f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 225.725729][ T9286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 225.733541][ T9286] R13: 000000000000000b R14: 00007fc23505bf60 R15: 00007ffff9383d28 [ 225.936978][ T9304] bpf_get_probe_write_proto: 6 callbacks suppressed [ 225.936988][ T9304] syz.1.3526[9304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.945937][ T9304] syz.1.3526[9304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.427682][ T9333] device syzkaller0 entered promiscuous mode [ 226.445134][ T9335] syz.1.3539[9335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.445189][ T9335] syz.1.3539[9335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.989228][ T9356] device syzkaller0 entered promiscuous mode [ 227.349812][ T9364] syz.1.3550[9364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.349864][ T9364] syz.1.3550[9364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.745003][ T9391] syz.3.3561[9391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.866995][ T9391] syz.3.3561[9391] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.486196][ T9505] device syzkaller0 entered promiscuous mode [ 230.802402][ T9525] Â: renamed from pim6reg1 [ 231.667501][ T9554] device pim6reg1 entered promiscuous mode [ 232.607698][ T9591] device pim6reg1 entered promiscuous mode [ 233.752939][ T9630] device pim6reg1 entered promiscuous mode [ 234.541258][ T24] audit: type=1400 audit(1720452877.940:153): avc: denied { create } for pid=9696 comm="syz.0.3682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 234.571410][ T9698] device macsec0 entered promiscuous mode [ 234.839028][ T9702] device syzkaller0 entered promiscuous mode [ 235.608797][ T9728] device veth0_to_team entered promiscuous mode [ 236.382241][ T9748] bridge0: port 1(bridge_slave_0) entered blocking state [ 236.395956][ T9748] bridge0: port 1(bridge_slave_0) entered disabled state [ 236.421938][ T9748] device bridge_slave_0 entered promiscuous mode [ 236.530090][ T9748] bridge0: port 2(bridge_slave_1) entered blocking state [ 236.585807][ T9748] bridge0: port 2(bridge_slave_1) entered disabled state [ 236.649579][ T9748] device bridge_slave_1 entered promiscuous mode [ 236.785542][ T9770] device veth0_to_team entered promiscuous mode [ 237.022990][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 237.039865][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 237.205761][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 237.243329][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 237.314447][ T597] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.321337][ T597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 237.362553][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 237.370778][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 237.379059][ T597] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.386188][ T597] bridge0: port 2(bridge_slave_1) entered forwarding state [ 237.393623][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 237.401687][ T597] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 237.429734][ T9748] device veth0_vlan entered promiscuous mode [ 237.442146][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 237.450154][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 237.458737][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 237.466930][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 237.475074][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 237.483744][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 237.492911][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 237.514844][ T9748] device veth1_macvtap entered promiscuous mode [ 237.583621][ T9796] device syzkaller0 entered promiscuous mode [ 237.592724][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 237.607223][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 237.614402][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 237.649917][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 237.693142][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 237.703789][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 237.711927][ T442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 238.509913][ T444] device bridge_slave_1 left promiscuous mode [ 238.519422][ T444] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.646371][ T444] device bridge_slave_0 left promiscuous mode [ 238.672670][ T444] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.775395][ T444] device veth1_macvtap left promiscuous mode [ 239.384514][ T9849] device syzkaller0 entered promiscuous mode [ 242.062052][ T9964] device syzkaller0 entered promiscuous mode [ 243.392159][ T9995] FAULT_INJECTION: forcing a failure. [ 243.392159][ T9995] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 243.467491][ T9995] CPU: 1 PID: 9995 Comm: syz.3.3792 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 243.478583][ T9995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 243.488476][ T9995] Call Trace: [ 243.491609][ T9995] dump_stack_lvl+0x1e2/0x24b [ 243.496122][ T9995] ? bfq_pos_tree_add_move+0x43b/0x43b [ 243.501425][ T9995] dump_stack+0x15/0x17 [ 243.505404][ T9995] should_fail+0x3c6/0x510 [ 243.509658][ T9995] should_fail_usercopy+0x1a/0x20 [ 243.514520][ T9995] _copy_from_user+0x20/0xd0 [ 243.518947][ T9995] __se_sys_bpf+0x232/0x11cb0 [ 243.523492][ T9995] ? visit_groups_merge+0x2434/0x24b0 [ 243.528678][ T9995] ? ctx_flexible_sched_in+0x100/0x100 [ 243.533970][ T9995] ? kvm_sched_clock_read+0x18/0x40 [ 243.538998][ T9995] ? __x64_sys_bpf+0x90/0x90 [ 243.543425][ T9995] ? ctx_flexible_sched_in+0xa8/0x100 [ 243.548629][ T9995] ? ctx_pinned_sched_in+0x100/0x100 [ 243.553836][ T9995] ? kvm_sched_clock_read+0x18/0x40 [ 243.558868][ T9995] ? sched_clock+0x3a/0x40 [ 243.563130][ T9995] ? sched_clock_cpu+0x1b/0x3b0 [ 243.567810][ T9995] ? _raw_spin_lock+0xa4/0x1b0 [ 243.572411][ T9995] ? _raw_spin_trylock_bh+0x190/0x190 [ 243.577618][ T9995] ? ctx_sched_in+0x276/0x310 [ 243.582132][ T9995] ? _raw_spin_unlock+0x4d/0x70 [ 243.586831][ T9995] ? perf_event_context_sched_in+0x48f/0x580 [ 243.592635][ T9995] ? __this_cpu_preempt_check+0x13/0x20 [ 243.598015][ T9995] ? __perf_event_task_sched_in+0x219/0x2a0 [ 243.603742][ T9995] ? cgroup_rstat_updated+0xfd/0x410 [ 243.608866][ T9995] ? __cgroup_account_cputime+0xe7/0x120 [ 243.614329][ T9995] ? put_prev_entity+0x470/0x470 [ 243.619105][ T9995] ? update_curr+0x356/0x6b0 [ 243.623531][ T9995] ? pick_next_task_fair+0xa94/0xd40 [ 243.628653][ T9995] ? __update_idle_core+0x2a0/0x2a0 [ 243.633689][ T9995] ? task_rq_lock+0x2a0/0x2a0 [ 243.638200][ T9995] ? __kasan_check_read+0x11/0x20 [ 243.643250][ T9995] ? _raw_spin_unlock_irq+0x4e/0x70 [ 243.648265][ T9995] ? __schedule+0xcbc/0x1330 [ 243.652699][ T9995] ? __kasan_check_read+0x11/0x20 [ 243.657556][ T9995] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 243.663446][ T9995] __x64_sys_bpf+0x7b/0x90 [ 243.667700][ T9995] do_syscall_64+0x34/0x70 [ 243.671949][ T9995] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 243.677677][ T9995] RIP: 0033:0x7f40af6edbd9 [ 243.681936][ T9995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 243.701370][ T9995] RSP: 002b:00007f40ae96f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 243.709625][ T9995] RAX: ffffffffffffffda RBX: 00007f40af87bf60 RCX: 00007f40af6edbd9 [ 243.717423][ T9995] RDX: 0000000000000048 RSI: 00000000200004c0 RDI: 0000000000000000 [ 243.725240][ T9995] RBP: 00007f40ae96f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 243.733050][ T9995] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 243.740857][ T9995] R13: 000000000000000b R14: 00007f40af87bf60 R15: 00007fff072f7ab8 [ 244.979002][T10038] FAULT_INJECTION: forcing a failure. [ 244.979002][T10038] name failslab, interval 1, probability 0, space 0, times 0 [ 244.991521][T10038] CPU: 1 PID: 10038 Comm: syz.4.3808 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 245.002610][T10038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 245.012488][T10038] Call Trace: [ 245.015619][T10038] dump_stack_lvl+0x1e2/0x24b [ 245.020132][T10038] ? bfq_pos_tree_add_move+0x43b/0x43b [ 245.025424][T10038] dump_stack+0x15/0x17 [ 245.029506][T10038] should_fail+0x3c6/0x510 [ 245.033756][T10038] ? skb_ensure_writable+0x2d0/0x440 [ 245.038881][T10038] __should_failslab+0xa4/0xe0 [ 245.043480][T10038] should_failslab+0x9/0x20 [ 245.047905][T10038] __kmalloc_track_caller+0x5f/0x320 [ 245.053032][T10038] ? skb_ensure_writable+0x2d0/0x440 [ 245.058144][T10038] pskb_expand_head+0x12b/0x1180 [ 245.062931][T10038] ? __kasan_check_write+0x14/0x20 [ 245.067876][T10038] skb_ensure_writable+0x2d0/0x440 [ 245.072831][T10038] bpf_clone_redirect+0x117/0x390 [ 245.077684][T10038] bpf_prog_6893982b85ceadf7+0x56/0x94 [ 245.082995][T10038] ? __kasan_slab_alloc+0xc3/0xe0 [ 245.087831][T10038] ? __kasan_slab_alloc+0xb1/0xe0 [ 245.092704][T10038] ? slab_post_alloc_hook+0x61/0x2f0 [ 245.098171][T10038] ? kmem_cache_alloc+0x168/0x2e0 [ 245.103031][T10038] ? __build_skb+0x2a/0x300 [ 245.107358][T10038] ? build_skb+0x25/0x1e0 [ 245.111525][T10038] ? bpf_prog_test_run_skb+0x388/0x1410 [ 245.116903][T10038] ? __se_sys_bpf+0x5235/0x11cb0 [ 245.121677][T10038] ? __x64_sys_bpf+0x7b/0x90 [ 245.126106][T10038] ? do_syscall_64+0x34/0x70 [ 245.130533][T10038] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.136445][T10038] ? __kasan_check_read+0x11/0x20 [ 245.141295][T10038] ? bpf_test_timer_continue+0x140/0x440 [ 245.146768][T10038] bpf_test_run+0x40b/0xc20 [ 245.151107][T10038] ? convert___skb_to_skb+0x570/0x570 [ 245.156308][T10038] ? eth_type_trans+0x2e4/0x620 [ 245.160999][T10038] ? eth_get_headlen+0x240/0x240 [ 245.165953][T10038] ? convert___skb_to_skb+0x44/0x570 [ 245.171065][T10038] bpf_prog_test_run_skb+0xb6e/0x1410 [ 245.176280][T10038] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 245.182051][T10038] ? __kasan_check_write+0x14/0x20 [ 245.186955][T10038] ? fput_many+0x160/0x1b0 [ 245.191199][T10038] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 245.196926][T10038] __se_sys_bpf+0x5235/0x11cb0 [ 245.201527][T10038] ? stack_trace_save+0x113/0x1c0 [ 245.206389][T10038] ? terminate_walk+0x407/0x4f0 [ 245.211075][T10038] ? stack_trace_snprint+0xf0/0xf0 [ 245.216034][T10038] ? kmem_cache_free+0xa9/0x1e0 [ 245.220706][T10038] ? kmem_cache_free+0xa9/0x1e0 [ 245.225568][T10038] ? kasan_set_track+0x5d/0x70 [ 245.230166][T10038] ? kasan_set_track+0x4b/0x70 [ 245.234770][T10038] ? kasan_set_free_info+0x23/0x40 [ 245.239713][T10038] ? ____kasan_slab_free+0x121/0x160 [ 245.244833][T10038] ? __kasan_slab_free+0x11/0x20 [ 245.249685][T10038] ? __x64_sys_bpf+0x90/0x90 [ 245.254035][T10038] ? do_sys_openat2+0x5e1/0x6f0 [ 245.258723][T10038] ? __x64_sys_openat+0x243/0x290 [ 245.263582][T10038] ? do_syscall_64+0x34/0x70 [ 245.268012][T10038] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.273916][T10038] ? _kstrtoull+0x3a0/0x4a0 [ 245.278251][T10038] ? kstrtouint_from_user+0x20a/0x2a0 [ 245.283459][T10038] ? kstrtol_from_user+0x310/0x310 [ 245.288408][T10038] ? memset+0x35/0x40 [ 245.292227][T10038] ? __fsnotify_parent+0x4b9/0x6c0 [ 245.297176][T10038] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 245.303772][T10038] ? proc_fail_nth_write+0x20b/0x290 [ 245.308963][T10038] ? proc_fail_nth_read+0x210/0x210 [ 245.313925][T10038] ? security_file_permission+0x86/0xb0 [ 245.319306][T10038] ? rw_verify_area+0x1c3/0x360 [ 245.323992][T10038] ? slab_free_freelist_hook+0xc0/0x190 [ 245.329373][T10038] ? preempt_count_add+0x92/0x1a0 [ 245.334234][T10038] ? vfs_write+0x854/0xe70 [ 245.338490][T10038] ? kernel_write+0x3d0/0x3d0 [ 245.343004][T10038] ? __kasan_check_write+0x14/0x20 [ 245.347951][T10038] ? mutex_lock+0xa5/0x110 [ 245.352203][T10038] ? mutex_trylock+0xa0/0xa0 [ 245.356632][T10038] ? __kasan_check_write+0x14/0x20 [ 245.361574][T10038] ? fput_many+0x160/0x1b0 [ 245.365837][T10038] ? debug_smp_processor_id+0x17/0x20 [ 245.371037][T10038] __x64_sys_bpf+0x7b/0x90 [ 245.375291][T10038] do_syscall_64+0x34/0x70 [ 245.379543][T10038] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.385268][T10038] RIP: 0033:0x7fdb38e9ebd9 [ 245.389529][T10038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.408984][T10038] RSP: 002b:00007fdb38120048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 245.417300][T10038] RAX: ffffffffffffffda RBX: 00007fdb3902cf60 RCX: 00007fdb38e9ebd9 [ 245.425372][T10038] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 245.433272][T10038] RBP: 00007fdb381200a0 R08: 0000000000000000 R09: 0000000000000000 [ 245.441089][T10038] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 245.448894][T10038] R13: 000000000000000b R14: 00007fdb3902cf60 R15: 00007ffffa43d4e8 [ 246.032861][T10089] device veth0_vlan left promiscuous mode [ 246.250604][T10089] device veth0_vlan entered promiscuous mode [ 246.699173][T10125] FAULT_INJECTION: forcing a failure. [ 246.699173][T10125] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 246.712232][T10125] CPU: 0 PID: 10125 Comm: syz.1.3838 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 246.723393][T10125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 246.733286][T10125] Call Trace: [ 246.736420][T10125] dump_stack_lvl+0x1e2/0x24b [ 246.740929][T10125] ? bfq_pos_tree_add_move+0x43b/0x43b [ 246.746228][T10125] ? 0xffffffffa0014000 [ 246.750215][T10125] ? is_bpf_text_address+0x172/0x190 [ 246.755333][T10125] ? stack_trace_save+0x1c0/0x1c0 [ 246.760194][T10125] dump_stack+0x15/0x17 [ 246.764192][T10125] should_fail+0x3c6/0x510 [ 246.768442][T10125] should_fail_usercopy+0x1a/0x20 [ 246.773300][T10125] _copy_from_user+0x20/0xd0 [ 246.777830][T10125] __se_sys_bpf+0x232/0x11cb0 [ 246.782333][T10125] ? stack_trace_save+0x113/0x1c0 [ 246.787196][T10125] ? terminate_walk+0x407/0x4f0 [ 246.791876][T10125] ? stack_trace_snprint+0xf0/0xf0 [ 246.796832][T10125] ? kmem_cache_free+0xa9/0x1e0 [ 246.801507][T10125] ? kmem_cache_free+0xa9/0x1e0 [ 246.806202][T10125] ? kasan_set_track+0x5d/0x70 [ 246.810795][T10125] ? kasan_set_track+0x4b/0x70 [ 246.815406][T10125] ? kasan_set_free_info+0x23/0x40 [ 246.820344][T10125] ? ____kasan_slab_free+0x121/0x160 [ 246.825464][T10125] ? __kasan_slab_free+0x11/0x20 [ 246.830241][T10125] ? __x64_sys_bpf+0x90/0x90 [ 246.834663][T10125] ? do_sys_openat2+0x5e1/0x6f0 [ 246.839362][T10125] ? __x64_sys_openat+0x243/0x290 [ 246.844209][T10125] ? do_syscall_64+0x34/0x70 [ 246.848640][T10125] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 246.854545][T10125] ? _kstrtoull+0x3a0/0x4a0 [ 246.858883][T10125] ? kstrtouint_from_user+0x20a/0x2a0 [ 246.864087][T10125] ? kstrtol_from_user+0x310/0x310 [ 246.869034][T10125] ? memset+0x35/0x40 [ 246.872852][T10125] ? __fsnotify_parent+0x4b9/0x6c0 [ 246.877810][T10125] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 246.884404][T10125] ? proc_fail_nth_write+0x20b/0x290 [ 246.889518][T10125] ? proc_fail_nth_read+0x210/0x210 [ 246.894551][T10125] ? security_file_permission+0x86/0xb0 [ 246.899936][T10125] ? rw_verify_area+0x1c3/0x360 [ 246.904617][T10125] ? slab_free_freelist_hook+0xc0/0x190 [ 246.910002][T10125] ? preempt_count_add+0x92/0x1a0 [ 246.914858][T10125] ? vfs_write+0x854/0xe70 [ 246.919116][T10125] ? kernel_write+0x3d0/0x3d0 [ 246.923715][T10125] ? __kasan_check_write+0x14/0x20 [ 246.928659][T10125] ? mutex_lock+0xa5/0x110 [ 246.932912][T10125] ? mutex_trylock+0xa0/0xa0 [ 246.937341][T10125] ? __kasan_check_write+0x14/0x20 [ 246.942286][T10125] ? fput_many+0x160/0x1b0 [ 246.946548][T10125] ? debug_smp_processor_id+0x17/0x20 [ 246.951749][T10125] __x64_sys_bpf+0x7b/0x90 [ 246.955999][T10125] do_syscall_64+0x34/0x70 [ 246.960254][T10125] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 246.965982][T10125] RIP: 0033:0x7fc234ecdbd9 [ 246.970235][T10125] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.989680][T10125] RSP: 002b:00007fc23414f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 246.997924][T10125] RAX: ffffffffffffffda RBX: 00007fc23505bf60 RCX: 00007fc234ecdbd9 [ 247.005739][T10125] RDX: 0000000000000048 RSI: 00000000200006c0 RDI: 0000000000000000 [ 247.013543][T10125] RBP: 00007fc23414f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 247.021352][T10125] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.029171][T10125] R13: 000000000000000b R14: 00007fc23505bf60 R15: 00007ffff9383d28 [ 247.514141][T10146] device veth0_vlan left promiscuous mode [ 247.636596][T10146] device veth0_vlan entered promiscuous mode [ 248.638946][T10193] device veth0_vlan left promiscuous mode [ 248.727606][T10193] device veth0_vlan entered promiscuous mode [ 250.378793][T10241] device syzkaller0 entered promiscuous mode [ 251.251654][T10285] device syzkaller0 entered promiscuous mode [ 251.827220][ T24] audit: type=1400 audit(1720452895.230:154): avc: denied { create } for pid=10304 comm="syz.0.3907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 253.347477][T10351] device syzkaller0 entered promiscuous mode [ 254.597351][T10385] device veth0_vlan left promiscuous mode [ 254.621209][T10385] device veth0_vlan entered promiscuous mode [ 255.208216][T10439] device pim6reg1 entered promiscuous mode [ 255.226040][T10439] syz.1.3964[10439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.226097][T10439] syz.1.3964[10439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.157541][ T9748] cgroup: fork rejected by pids controller in /syz4 [ 256.493310][T10500] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.535684][T10500] bridge0: port 1(bridge_slave_0) entered disabled state [ 256.542994][T10500] device bridge_slave_0 entered promiscuous mode [ 256.586143][T10500] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.592985][T10500] bridge0: port 2(bridge_slave_1) entered disabled state [ 256.627504][T10500] device bridge_slave_1 entered promiscuous mode [ 256.811355][T10500] bridge0: port 2(bridge_slave_1) entered blocking state [ 256.818234][T10500] bridge0: port 2(bridge_slave_1) entered forwarding state [ 256.825443][T10500] bridge0: port 1(bridge_slave_0) entered blocking state [ 256.832441][T10500] bridge0: port 1(bridge_slave_0) entered forwarding state [ 256.997314][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 257.005329][ T419] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.030144][ T419] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.082147][ T1255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 257.105551][ T1255] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.112441][ T1255] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.165317][ T1255] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 257.199540][ T1255] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.206427][ T1255] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.234288][ T1255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 257.250155][ T1255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 257.289047][ T419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 257.316123][ T418] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 257.330615][ T418] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 257.351906][ T418] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 257.394612][T10500] device veth0_vlan entered promiscuous mode [ 257.411442][ T342] device bridge_slave_1 left promiscuous mode [ 257.417486][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.446354][ T342] device bridge_slave_0 left promiscuous mode [ 257.460000][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.483511][ T342] device veth1_macvtap left promiscuous mode [ 257.502782][ T342] device veth0_vlan left promiscuous mode [ 257.762287][T10500] device veth1_macvtap entered promiscuous mode [ 257.775564][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 257.788917][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 257.804841][ T332] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 257.842734][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 257.852639][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 257.861654][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 257.873151][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 258.776161][T10596] device syzkaller0 entered promiscuous mode [ 259.398044][T10635] device syzkaller0 entered promiscuous mode [ 259.416788][T10633] device syzkaller0 entered promiscuous mode [ 260.879740][T10674] device pim6reg1 entered promiscuous mode [ 260.894203][T10675] device syzkaller0 entered promiscuous mode [ 261.954119][T10715] device syzkaller0 entered promiscuous mode [ 262.007729][T10712] device pim6reg1 entered promiscuous mode [ 262.607288][T10736] FAULT_INJECTION: forcing a failure. [ 262.607288][T10736] name failslab, interval 1, probability 0, space 0, times 0 [ 262.619957][T10736] CPU: 0 PID: 10736 Comm: syz.3.4079 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 262.631079][T10736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 262.640971][T10736] Call Trace: [ 262.644103][T10736] dump_stack_lvl+0x1e2/0x24b [ 262.648665][T10736] ? bfq_pos_tree_add_move+0x43b/0x43b [ 262.653947][T10736] ? dev_queue_xmit+0x20/0x20 [ 262.658428][T10736] dump_stack+0x15/0x17 [ 262.662426][T10736] should_fail+0x3c6/0x510 [ 262.666666][T10736] ? __alloc_skb+0x80/0x510 [ 262.671009][T10736] __should_failslab+0xa4/0xe0 [ 262.675604][T10736] should_failslab+0x9/0x20 [ 262.679943][T10736] kmem_cache_alloc+0x3d/0x2e0 [ 262.684545][T10736] ? ip_finish_output2+0x7c9/0xfc0 [ 262.689492][T10736] __alloc_skb+0x80/0x510 [ 262.693659][T10736] ? local_bh_enable+0x1f/0x30 [ 262.698257][T10736] ip_frag_next+0xe2/0xa20 [ 262.702508][T10736] ? ip_fragment+0x210/0x210 [ 262.706941][T10736] ip_do_fragment+0xb4a/0x2310 [ 262.711537][T10736] ? ip_fragment+0x210/0x210 [ 262.715962][T10736] ? ip_frag_next+0xa20/0xa20 [ 262.720478][T10736] ? __local_bh_enable_ip+0x80/0x80 [ 262.725508][T10736] ? percpu_counter_add_batch+0x13d/0x160 [ 262.731063][T10736] ip_fragment+0x123/0x210 [ 262.735317][T10736] __ip_finish_output+0x557/0x740 [ 262.740177][T10736] ip_finish_output+0x34/0x1e0 [ 262.744772][T10736] ? ip_mc_output+0x699/0xa30 [ 262.749290][T10736] ip_mc_output+0x3d3/0xa30 [ 262.753649][T10736] ? ip_build_and_send_pkt+0xa80/0xa80 [ 262.758929][T10736] ? ip_mc_finish_output+0x330/0x330 [ 262.764049][T10736] ? ip_mc_output+0xa30/0xa30 [ 262.768563][T10736] ? ip_send_check+0xe0/0xe0 [ 262.773075][T10736] ? __ip_local_out+0x4f0/0x4f0 [ 262.777768][T10736] ip_local_out+0x92/0xb0 [ 262.781934][T10736] iptunnel_xmit+0x470/0x850 [ 262.786360][T10736] ip_tunnel_xmit+0x1e64/0x2760 [ 262.791048][T10736] ? tnl_update_pmtu+0xba0/0xba0 [ 262.795826][T10736] ? skb_network_protocol+0x564/0x7a0 [ 262.801036][T10736] ? skb_push+0xcf/0x120 [ 262.805103][T10736] ? gre_build_header+0x233/0x6f0 [ 262.809965][T10736] ipgre_xmit+0x87a/0xc30 [ 262.814132][T10736] dev_hard_start_xmit+0x228/0x620 [ 262.819079][T10736] __dev_queue_xmit+0x16f1/0x28e0 [ 262.823937][T10736] ? _raw_spin_unlock+0x4d/0x70 [ 262.828621][T10736] ? dev_queue_xmit+0x20/0x20 [ 262.833133][T10736] ? slab_post_alloc_hook+0x80/0x2f0 [ 262.838377][T10736] ? __kasan_check_write+0x14/0x20 [ 262.843316][T10736] ? skb_release_data+0x406/0x6f0 [ 262.848172][T10736] ? __kasan_check_write+0x14/0x20 [ 262.853207][T10736] ? pskb_expand_head+0xbcf/0x1180 [ 262.858157][T10736] dev_queue_xmit+0x17/0x20 [ 262.862516][T10736] __bpf_redirect+0x665/0xde0 [ 262.867009][T10736] bpf_clone_redirect+0x24d/0x390 [ 262.871875][T10736] bpf_prog_208b094576c80b22+0x56/0x80c [ 262.877247][T10736] ? __kasan_slab_alloc+0xc3/0xe0 [ 262.882111][T10736] ? __kasan_slab_alloc+0xb1/0xe0 [ 262.886974][T10736] ? slab_post_alloc_hook+0x61/0x2f0 [ 262.892084][T10736] ? kmem_cache_alloc+0x168/0x2e0 [ 262.896956][T10736] ? __build_skb+0x2a/0x300 [ 262.901287][T10736] ? build_skb+0x25/0x1e0 [ 262.905451][T10736] ? bpf_prog_test_run_skb+0x388/0x1410 [ 262.910839][T10736] ? __se_sys_bpf+0x5235/0x11cb0 [ 262.915780][T10736] ? __x64_sys_bpf+0x7b/0x90 [ 262.920205][T10736] ? do_syscall_64+0x34/0x70 [ 262.924639][T10736] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 262.930546][T10736] ? __kasan_check_read+0x11/0x20 [ 262.935398][T10736] ? bpf_test_timer_continue+0x140/0x440 [ 262.940875][T10736] bpf_test_run+0x40b/0xc20 [ 262.945208][T10736] ? convert___skb_to_skb+0x570/0x570 [ 262.950410][T10736] ? eth_type_trans+0x2e4/0x620 [ 262.955101][T10736] ? eth_get_headlen+0x240/0x240 [ 262.959875][T10736] ? convert___skb_to_skb+0x44/0x570 [ 262.964991][T10736] bpf_prog_test_run_skb+0xb6e/0x1410 [ 262.970211][T10736] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 262.975930][T10736] ? __kasan_check_write+0x14/0x20 [ 262.980876][T10736] ? fput_many+0x160/0x1b0 [ 262.985134][T10736] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 262.990858][T10736] __se_sys_bpf+0x5235/0x11cb0 [ 262.995458][T10736] ? stack_trace_save+0x113/0x1c0 [ 263.000323][T10736] ? terminate_walk+0x407/0x4f0 [ 263.005099][T10736] ? stack_trace_snprint+0xf0/0xf0 [ 263.010042][T10736] ? kmem_cache_free+0xa9/0x1e0 [ 263.014737][T10736] ? kmem_cache_free+0xa9/0x1e0 [ 263.019498][T10736] ? kasan_set_track+0x5d/0x70 [ 263.024098][T10736] ? kasan_set_track+0x4b/0x70 [ 263.028789][T10736] ? kasan_set_free_info+0x23/0x40 [ 263.033742][T10736] ? ____kasan_slab_free+0x121/0x160 [ 263.038853][T10736] ? __kasan_slab_free+0x11/0x20 [ 263.043661][T10736] ? __x64_sys_bpf+0x90/0x90 [ 263.048054][T10736] ? do_sys_openat2+0x5e1/0x6f0 [ 263.052744][T10736] ? __x64_sys_openat+0x243/0x290 [ 263.057603][T10736] ? do_syscall_64+0x34/0x70 [ 263.062031][T10736] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 263.067935][T10736] ? _kstrtoull+0x3a0/0x4a0 [ 263.072284][T10736] ? kstrtouint_from_user+0x20a/0x2a0 [ 263.077480][T10736] ? kstrtol_from_user+0x310/0x310 [ 263.082430][T10736] ? memset+0x35/0x40 [ 263.086250][T10736] ? __fsnotify_parent+0x4b9/0x6c0 [ 263.091196][T10736] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 263.097792][T10736] ? proc_fail_nth_write+0x20b/0x290 [ 263.102909][T10736] ? proc_fail_nth_read+0x210/0x210 [ 263.107943][T10736] ? security_file_permission+0x86/0xb0 [ 263.113323][T10736] ? rw_verify_area+0x1c3/0x360 [ 263.118014][T10736] ? slab_free_freelist_hook+0xc0/0x190 [ 263.123393][T10736] ? preempt_count_add+0x92/0x1a0 [ 263.128254][T10736] ? vfs_write+0x854/0xe70 [ 263.132596][T10736] ? kernel_write+0x3d0/0x3d0 [ 263.137127][T10736] ? __kasan_check_write+0x14/0x20 [ 263.142053][T10736] ? mutex_lock+0xa5/0x110 [ 263.146311][T10736] ? mutex_trylock+0xa0/0xa0 [ 263.150736][T10736] ? __kasan_check_write+0x14/0x20 [ 263.155772][T10736] ? fput_many+0x160/0x1b0 [ 263.160051][T10736] ? debug_smp_processor_id+0x17/0x20 [ 263.165227][T10736] __x64_sys_bpf+0x7b/0x90 [ 263.169483][T10736] do_syscall_64+0x34/0x70 [ 263.173732][T10736] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 263.179459][T10736] RIP: 0033:0x7f40af6edbd9 [ 263.183722][T10736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.203161][T10736] RSP: 002b:00007f40ae96f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 263.211403][T10736] RAX: ffffffffffffffda RBX: 00007f40af87bf60 RCX: 00007f40af6edbd9 [ 263.219213][T10736] RDX: 0000000000000048 RSI: 0000000020000080 RDI: 000000000000000a [ 263.227021][T10736] RBP: 00007f40ae96f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 263.234834][T10736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 263.242646][T10736] R13: 000000000000000b R14: 00007f40af87bf60 R15: 00007fff072f7ab8 [ 263.393329][T10744] syz.1.4083[10744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.393384][T10744] syz.1.4083[10744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.479094][T10744] syz.1.4083[10744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.566021][T10744] syz.1.4083[10744] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.916264][T10786] FAULT_INJECTION: forcing a failure. [ 263.916264][T10786] name failslab, interval 1, probability 0, space 0, times 0 [ 263.939948][T10786] CPU: 1 PID: 10786 Comm: syz.0.4101 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 263.951070][T10786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 263.960951][T10786] Call Trace: [ 263.964086][T10786] dump_stack_lvl+0x1e2/0x24b [ 263.968597][T10786] ? panic+0x812/0x812 [ 263.972590][T10786] ? bfq_pos_tree_add_move+0x43b/0x43b [ 263.977880][T10786] dump_stack+0x15/0x17 [ 263.981968][T10786] should_fail+0x3c6/0x510 [ 263.986307][T10786] ? fdb_notify+0x77/0x120 [ 263.990563][T10786] __should_failslab+0xa4/0xe0 [ 263.995162][T10786] should_failslab+0x9/0x20 [ 263.999509][T10786] __kmalloc_track_caller+0x5f/0x320 [ 264.004620][T10786] ? kmem_cache_alloc+0x168/0x2e0 [ 264.009480][T10786] ? __alloc_skb+0x80/0x510 [ 264.013829][T10786] ? fdb_notify+0x77/0x120 [ 264.018082][T10786] __alloc_skb+0xbc/0x510 [ 264.022328][T10786] fdb_notify+0x77/0x120 [ 264.026406][T10786] fdb_delete+0x839/0xac0 [ 264.030575][T10786] fdb_delete_local+0x3ce/0x470 [ 264.035260][T10786] br_fdb_changeaddr+0x1bb/0x1c0 [ 264.040039][T10786] br_device_event+0x3c6/0x7c0 [ 264.044635][T10786] ? br_boolopt_multi_get+0xc0/0xc0 [ 264.049763][T10786] ? packet_notifier+0x8af/0x8c0 [ 264.054529][T10786] ? ipv6_mc_netdev_event+0x91/0x2f0 [ 264.059648][T10786] raw_notifier_call_chain+0x8c/0xf0 [ 264.064777][T10786] dev_set_mac_address+0x325/0x470 [ 264.069725][T10786] ? dev_pre_changeaddr_notify+0x220/0x220 [ 264.075361][T10786] dev_set_mac_address_user+0x31/0x50 [ 264.080569][T10786] dev_ifsioc+0x657/0xae0 [ 264.084730][T10786] ? dev_ioctl+0xb40/0xb40 [ 264.089072][T10786] ? __rcu_read_unlock+0x1/0x90 [ 264.093770][T10786] dev_ioctl+0x526/0xb40 [ 264.097844][T10786] sock_do_ioctl+0x295/0x3a0 [ 264.102261][T10786] ? sock_show_fdinfo+0xa0/0xa0 [ 264.106951][T10786] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 264.112592][T10786] ? sock_ioctl+0x199/0x760 [ 264.116936][T10786] ? sock_ioctl+0x491/0x760 [ 264.121276][T10786] sock_ioctl+0x4a6/0x760 [ 264.125437][T10786] ? sock_poll+0x340/0x340 [ 264.129695][T10786] ? security_file_ioctl+0x84/0xb0 [ 264.134637][T10786] ? sock_poll+0x340/0x340 [ 264.138892][T10786] __se_sys_ioctl+0x114/0x190 [ 264.143402][T10786] __x64_sys_ioctl+0x7b/0x90 [ 264.148005][T10786] do_syscall_64+0x34/0x70 [ 264.152257][T10786] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 264.157983][T10786] RIP: 0033:0x7f07db282bd9 [ 264.162237][T10786] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.181684][T10786] RSP: 002b:00007f07da504048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.189924][T10786] RAX: ffffffffffffffda RBX: 00007f07db410f60 RCX: 00007f07db282bd9 [ 264.197739][T10786] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000008 [ 264.205550][T10786] RBP: 00007f07da5040a0 R08: 0000000000000000 R09: 0000000000000000 [ 264.213361][T10786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.221171][T10786] R13: 000000000000000b R14: 00007f07db410f60 R15: 00007ffd94e4f278 [ 264.349651][T10801] syz.0.4106[10801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.349698][T10801] syz.0.4106[10801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.860318][T10986] device syzkaller0 entered promiscuous mode [ 269.935391][ T24] audit: type=1400 audit(1720452913.330:155): avc: denied { append } for pid=11028 comm="syz.2.4197" name="ppp" dev="devtmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 269.980929][T11032] FAULT_INJECTION: forcing a failure. [ 269.980929][T11032] name failslab, interval 1, probability 0, space 0, times 0 [ 269.996460][T11033] FAULT_INJECTION: forcing a failure. [ 269.996460][T11033] name failslab, interval 1, probability 0, space 0, times 0 [ 270.008981][T11033] CPU: 0 PID: 11033 Comm: syz.2.4198 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 270.020144][T11033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 270.030043][T11033] Call Trace: [ 270.033175][T11033] dump_stack_lvl+0x1e2/0x24b [ 270.037684][T11033] ? panic+0x812/0x812 [ 270.041589][T11033] ? bfq_pos_tree_add_move+0x43b/0x43b [ 270.046877][T11033] ? kfree_skbmem+0x104/0x170 [ 270.051395][T11033] dump_stack+0x15/0x17 [ 270.055382][T11033] should_fail+0x3c6/0x510 [ 270.059676][T11033] ? skb_clone+0x1de/0x370 [ 270.063921][T11033] __should_failslab+0xa4/0xe0 [ 270.068492][T11033] should_failslab+0x9/0x20 [ 270.072838][T11033] kmem_cache_alloc+0x3d/0x2e0 [ 270.077429][T11033] ? __bpf_redirect+0x940/0xde0 [ 270.082120][T11033] skb_clone+0x1de/0x370 [ 270.086285][T11033] bpf_clone_redirect+0xa6/0x390 [ 270.091063][T11033] bpf_prog_75ceb9a54645e0a9+0x5c/0x1d8 [ 270.096453][T11033] ? __kasan_slab_alloc+0xc3/0xe0 [ 270.101296][T11033] ? __kasan_slab_alloc+0xb1/0xe0 [ 270.106159][T11033] ? slab_post_alloc_hook+0x61/0x2f0 [ 270.111287][T11033] ? kmem_cache_alloc+0x168/0x2e0 [ 270.116223][T11033] ? __build_skb+0x2a/0x300 [ 270.120566][T11033] ? build_skb+0x25/0x1e0 [ 270.124731][T11033] ? bpf_prog_test_run_skb+0x388/0x1410 [ 270.130114][T11033] ? __se_sys_bpf+0x5235/0x11cb0 [ 270.134887][T11033] ? __x64_sys_bpf+0x7b/0x90 [ 270.139313][T11033] ? do_syscall_64+0x34/0x70 [ 270.143739][T11033] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.149663][T11033] ? __kasan_check_read+0x11/0x20 [ 270.154512][T11033] ? bpf_test_timer_continue+0x140/0x440 [ 270.160058][T11033] bpf_test_run+0x40b/0xc20 [ 270.164401][T11033] ? convert___skb_to_skb+0x570/0x570 [ 270.169604][T11033] ? eth_type_trans+0x2e4/0x620 [ 270.174294][T11033] ? eth_get_headlen+0x240/0x240 [ 270.179065][T11033] ? convert___skb_to_skb+0x44/0x570 [ 270.184273][T11033] bpf_prog_test_run_skb+0xb6e/0x1410 [ 270.189493][T11033] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 270.195211][T11033] ? __kasan_check_write+0x14/0x20 [ 270.200153][T11033] ? fput_many+0x160/0x1b0 [ 270.204408][T11033] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 270.210136][T11033] __se_sys_bpf+0x5235/0x11cb0 [ 270.214736][T11033] ? stack_trace_save+0x113/0x1c0 [ 270.219609][T11033] ? terminate_walk+0x407/0x4f0 [ 270.224286][T11033] ? stack_trace_snprint+0xf0/0xf0 [ 270.229247][T11033] ? kmem_cache_free+0xa9/0x1e0 [ 270.233915][T11033] ? kmem_cache_free+0xa9/0x1e0 [ 270.238604][T11033] ? kasan_set_track+0x5d/0x70 [ 270.243224][T11033] ? kasan_set_track+0x4b/0x70 [ 270.247806][T11033] ? kasan_set_free_info+0x23/0x40 [ 270.252750][T11033] ? ____kasan_slab_free+0x121/0x160 [ 270.257872][T11033] ? __kasan_slab_free+0x11/0x20 [ 270.262651][T11033] ? __x64_sys_bpf+0x90/0x90 [ 270.267160][T11033] ? do_sys_openat2+0x5e1/0x6f0 [ 270.271844][T11033] ? __x64_sys_openat+0x243/0x290 [ 270.276706][T11033] ? do_syscall_64+0x34/0x70 [ 270.281136][T11033] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.287065][T11033] ? _kstrtoull+0x3a0/0x4a0 [ 270.291420][T11033] ? kstrtouint_from_user+0x20a/0x2a0 [ 270.296582][T11033] ? kstrtol_from_user+0x310/0x310 [ 270.301531][T11033] ? memset+0x35/0x40 [ 270.305350][T11033] ? __fsnotify_parent+0x4b9/0x6c0 [ 270.310303][T11033] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 270.316893][T11033] ? proc_fail_nth_write+0x20b/0x290 [ 270.322018][T11033] ? proc_fail_nth_read+0x210/0x210 [ 270.327050][T11033] ? security_file_permission+0x86/0xb0 [ 270.332431][T11033] ? rw_verify_area+0x1c3/0x360 [ 270.337116][T11033] ? preempt_count_add+0x92/0x1a0 [ 270.341974][T11033] ? vfs_write+0x854/0xe70 [ 270.346230][T11033] ? kernel_write+0x3d0/0x3d0 [ 270.350741][T11033] ? __kasan_check_write+0x14/0x20 [ 270.355689][T11033] ? mutex_lock+0xa5/0x110 [ 270.359941][T11033] ? mutex_trylock+0xa0/0xa0 [ 270.364371][T11033] ? __kasan_check_write+0x14/0x20 [ 270.369317][T11033] ? fput_many+0x160/0x1b0 [ 270.373577][T11033] ? debug_smp_processor_id+0x17/0x20 [ 270.378781][T11033] __x64_sys_bpf+0x7b/0x90 [ 270.383049][T11033] do_syscall_64+0x34/0x70 [ 270.387285][T11033] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.393014][T11033] RIP: 0033:0x7fa1f836ebd9 [ 270.397264][T11033] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.416709][T11033] RSP: 002b:00007fa1f75f0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.424949][T11033] RAX: ffffffffffffffda RBX: 00007fa1f84fcf60 RCX: 00007fa1f836ebd9 [ 270.432761][T11033] RDX: 0000000000000023 RSI: 0000000020000240 RDI: 000000000000000a [ 270.440573][T11033] RBP: 00007fa1f75f00a0 R08: 0000000000000000 R09: 0000000000000000 [ 270.448382][T11033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.456284][T11033] R13: 000000000000000b R14: 00007fa1f84fcf60 R15: 00007ffe5f7ee118 [ 270.484889][T11032] CPU: 0 PID: 11032 Comm: syz.4.4199 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 270.496091][T11032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 270.505963][T11032] Call Trace: [ 270.509099][T11032] dump_stack_lvl+0x1e2/0x24b [ 270.513608][T11032] ? bfq_pos_tree_add_move+0x43b/0x43b [ 270.518905][T11032] ? find_next_bit+0xc7/0x100 [ 270.523415][T11032] ? cpumask_next+0x11/0x30 [ 270.527760][T11032] dump_stack+0x15/0x17 [ 270.531742][T11032] should_fail+0x3c6/0x510 [ 270.536017][T11032] ? cpu_map_update_elem+0x5e7/0xe30 [ 270.541122][T11032] __should_failslab+0xa4/0xe0 [ 270.545724][T11032] should_failslab+0x9/0x20 [ 270.550059][T11032] kmem_cache_alloc_trace+0x3a/0x2e0 [ 270.555179][T11032] cpu_map_update_elem+0x5e7/0xe30 [ 270.560131][T11032] ? cpu_map_lookup_elem+0x100/0x100 [ 270.565250][T11032] bpf_map_update_value+0x1a8/0x420 [ 270.570285][T11032] __se_sys_bpf+0x7687/0x11cb0 [ 270.574881][T11032] ? stack_trace_snprint+0xf0/0xf0 [ 270.579833][T11032] ? kmem_cache_free+0xa9/0x1e0 [ 270.584514][T11032] ? kmem_cache_free+0xa9/0x1e0 [ 270.589203][T11032] ? kasan_set_track+0x5d/0x70 [ 270.593799][T11032] ? kasan_set_track+0x4b/0x70 [ 270.598404][T11032] ? kasan_set_free_info+0x23/0x40 [ 270.603357][T11032] ? ____kasan_slab_free+0x121/0x160 [ 270.608471][T11032] ? __kasan_slab_free+0x11/0x20 [ 270.613252][T11032] ? __x64_sys_bpf+0x90/0x90 [ 270.617670][T11032] ? do_sys_openat2+0x5e1/0x6f0 [ 270.622460][T11032] ? __x64_sys_openat+0x243/0x290 [ 270.627313][T11032] ? do_syscall_64+0x34/0x70 [ 270.631740][T11032] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.637640][T11032] ? _kstrtoull+0x3a0/0x4a0 [ 270.641987][T11032] ? kstrtouint_from_user+0x20a/0x2a0 [ 270.647192][T11032] ? kstrtol_from_user+0x310/0x310 [ 270.652139][T11032] ? memset+0x35/0x40 [ 270.655955][T11032] ? __fsnotify_parent+0x4b9/0x6c0 [ 270.660905][T11032] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 270.667500][T11032] ? proc_fail_nth_write+0x20b/0x290 [ 270.672796][T11032] ? proc_fail_nth_read+0x210/0x210 [ 270.677835][T11032] ? security_file_permission+0x86/0xb0 [ 270.683215][T11032] ? rw_verify_area+0x1c3/0x360 [ 270.687897][T11032] ? slab_free_freelist_hook+0xc0/0x190 [ 270.693276][T11032] ? preempt_count_add+0x92/0x1a0 [ 270.698262][T11032] ? vfs_write+0x854/0xe70 [ 270.702516][T11032] ? kernel_write+0x3d0/0x3d0 [ 270.707116][T11032] ? __kasan_check_write+0x14/0x20 [ 270.712144][T11032] ? mutex_lock+0xa5/0x110 [ 270.716409][T11032] ? mutex_trylock+0xa0/0xa0 [ 270.720827][T11032] ? __kasan_check_write+0x14/0x20 [ 270.725773][T11032] ? fput_many+0x160/0x1b0 [ 270.730032][T11032] ? debug_smp_processor_id+0x17/0x20 [ 270.735233][T11032] __x64_sys_bpf+0x7b/0x90 [ 270.739488][T11032] do_syscall_64+0x34/0x70 [ 270.743740][T11032] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.749465][T11032] RIP: 0033:0x7fc861fedbd9 [ 270.753720][T11032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.773164][T11032] RSP: 002b:00007fc86126f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.781408][T11032] RAX: ffffffffffffffda RBX: 00007fc86217bf60 RCX: 00007fc861fedbd9 [ 270.789217][T11032] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 270.797027][T11032] RBP: 00007fc86126f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 270.804839][T11032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.812745][T11032] R13: 000000000000000b R14: 00007fc86217bf60 R15: 00007ffe44666368 [ 271.152511][T11057] FAULT_INJECTION: forcing a failure. [ 271.152511][T11057] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 271.345935][T11057] CPU: 0 PID: 11057 Comm: syz.0.4208 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 271.357129][T11057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 271.367016][T11057] Call Trace: [ 271.370167][T11057] dump_stack_lvl+0x1e2/0x24b [ 271.374672][T11057] ? bfq_pos_tree_add_move+0x43b/0x43b [ 271.379966][T11057] dump_stack+0x15/0x17 [ 271.383960][T11057] should_fail+0x3c6/0x510 [ 271.388209][T11057] should_fail_usercopy+0x1a/0x20 [ 271.393067][T11057] _copy_to_user+0x20/0x90 [ 271.397319][T11057] simple_read_from_buffer+0xc7/0x150 [ 271.402523][T11057] proc_fail_nth_read+0x1a3/0x210 [ 271.407383][T11057] ? security_file_permission+0x7b/0xb0 [ 271.412782][T11057] ? proc_fault_inject_write+0x390/0x390 [ 271.418234][T11057] ? security_file_permission+0x86/0xb0 [ 271.423617][T11057] ? rw_verify_area+0x1c3/0x360 [ 271.428301][T11057] ? proc_fault_inject_write+0x390/0x390 [ 271.433766][T11057] vfs_read+0x204/0xbb0 [ 271.437763][T11057] ? kernel_read+0x70/0x70 [ 271.442016][T11057] ? __kasan_check_write+0x14/0x20 [ 271.446963][T11057] ? mutex_lock+0xa5/0x110 [ 271.451212][T11057] ? mutex_trylock+0xa0/0xa0 [ 271.455640][T11057] ? __fdget_pos+0x2e7/0x3a0 [ 271.460063][T11057] ? ksys_read+0x77/0x2c0 [ 271.464233][T11057] ksys_read+0x199/0x2c0 [ 271.468315][T11057] ? vfs_write+0xe70/0xe70 [ 271.472565][T11057] ? debug_smp_processor_id+0x17/0x20 [ 271.477774][T11057] __x64_sys_read+0x7b/0x90 [ 271.482108][T11057] do_syscall_64+0x34/0x70 [ 271.486363][T11057] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 271.492088][T11057] RIP: 0033:0x7f07db2816bc [ 271.496340][T11057] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 271.515784][T11057] RSP: 002b:00007f07da504040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 271.524030][T11057] RAX: ffffffffffffffda RBX: 00007f07db410f60 RCX: 00007f07db2816bc [ 271.531841][T11057] RDX: 000000000000000f RSI: 00007f07da5040b0 RDI: 0000000000000006 [ 271.539662][T11057] RBP: 00007f07da5040a0 R08: 0000000000000000 R09: 0000000000000000 [ 271.547465][T11057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 271.555275][T11057] R13: 000000000000000b R14: 00007f07db410f60 R15: 00007ffd94e4f278 [ 271.838238][T11064] bridge0: port 2(bridge_slave_1) entered disabled state [ 271.845305][T11064] bridge0: port 1(bridge_slave_0) entered disabled state [ 271.870776][T11070] bridge0: port 3(veth0_to_batadv) entered blocking state [ 271.877901][T11070] bridge0: port 3(veth0_to_batadv) entered disabled state [ 271.895979][T11070] device veth0_to_batadv entered promiscuous mode [ 271.902557][T11070] bridge0: port 3(veth0_to_batadv) entered blocking state [ 271.909532][T11070] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 272.903372][T11101] FAULT_INJECTION: forcing a failure. [ 272.903372][T11101] name failslab, interval 1, probability 0, space 0, times 0 [ 272.940607][T11101] CPU: 0 PID: 11101 Comm: syz.2.4225 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 272.951782][T11101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 272.962107][T11101] Call Trace: [ 272.965241][T11101] dump_stack_lvl+0x1e2/0x24b [ 272.969748][T11101] ? bfq_pos_tree_add_move+0x43b/0x43b [ 272.975041][T11101] dump_stack+0x15/0x17 [ 272.979122][T11101] should_fail+0x3c6/0x510 [ 272.983384][T11101] ? kvmalloc_node+0x82/0x130 [ 272.987888][T11101] __should_failslab+0xa4/0xe0 [ 272.992485][T11101] should_failslab+0x9/0x20 [ 272.996913][T11101] __kmalloc+0x60/0x330 [ 273.000910][T11101] kvmalloc_node+0x82/0x130 [ 273.005245][T11101] cpu_map_update_elem+0x69b/0xe30 [ 273.010197][T11101] ? cpu_map_lookup_elem+0x100/0x100 [ 273.015331][T11101] bpf_map_update_value+0x1a8/0x420 [ 273.020360][T11101] __se_sys_bpf+0x7687/0x11cb0 [ 273.024951][T11101] ? stack_trace_snprint+0xf0/0xf0 [ 273.029992][T11101] ? kmem_cache_free+0xa9/0x1e0 [ 273.034762][T11101] ? kmem_cache_free+0xa9/0x1e0 [ 273.039446][T11101] ? kasan_set_track+0x5d/0x70 [ 273.044044][T11101] ? kasan_set_track+0x4b/0x70 [ 273.048648][T11101] ? kasan_set_free_info+0x23/0x40 [ 273.053594][T11101] ? ____kasan_slab_free+0x121/0x160 [ 273.058725][T11101] ? __kasan_slab_free+0x11/0x20 [ 273.063575][T11101] ? __x64_sys_bpf+0x90/0x90 [ 273.068002][T11101] ? do_sys_openat2+0x5e1/0x6f0 [ 273.072688][T11101] ? __x64_sys_openat+0x243/0x290 [ 273.077548][T11101] ? do_syscall_64+0x34/0x70 [ 273.081977][T11101] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 273.087897][T11101] ? _kstrtoull+0x3a0/0x4a0 [ 273.092230][T11101] ? kstrtouint_from_user+0x20a/0x2a0 [ 273.097436][T11101] ? kstrtol_from_user+0x310/0x310 [ 273.102375][T11101] ? memset+0x35/0x40 [ 273.106200][T11101] ? __fsnotify_parent+0x4b9/0x6c0 [ 273.111143][T11101] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 273.117735][T11101] ? proc_fail_nth_write+0x20b/0x290 [ 273.122943][T11101] ? proc_fail_nth_read+0x210/0x210 [ 273.127979][T11101] ? security_file_permission+0x86/0xb0 [ 273.133366][T11101] ? rw_verify_area+0x1c3/0x360 [ 273.138158][T11101] ? slab_free_freelist_hook+0xc0/0x190 [ 273.143604][T11101] ? preempt_count_add+0x92/0x1a0 [ 273.148465][T11101] ? vfs_write+0x854/0xe70 [ 273.152731][T11101] ? kernel_write+0x3d0/0x3d0 [ 273.157229][T11101] ? __kasan_check_write+0x14/0x20 [ 273.162173][T11101] ? mutex_lock+0xa5/0x110 [ 273.166429][T11101] ? mutex_trylock+0xa0/0xa0 [ 273.170896][T11101] ? __kasan_check_write+0x14/0x20 [ 273.175816][T11101] ? fput_many+0x160/0x1b0 [ 273.180071][T11101] ? debug_smp_processor_id+0x17/0x20 [ 273.185262][T11101] __x64_sys_bpf+0x7b/0x90 [ 273.189514][T11101] do_syscall_64+0x34/0x70 [ 273.193771][T11101] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 273.199505][T11101] RIP: 0033:0x7fa1f836ebd9 [ 273.203746][T11101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 273.223291][T11101] RSP: 002b:00007fa1f75f0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.231518][T11101] RAX: ffffffffffffffda RBX: 00007fa1f84fcf60 RCX: 00007fa1f836ebd9 [ 273.239329][T11101] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 273.247144][T11101] RBP: 00007fa1f75f00a0 R08: 0000000000000000 R09: 0000000000000000 [ 273.254953][T11101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.262765][T11101] R13: 000000000000000b R14: 00007fa1f84fcf60 R15: 00007ffe5f7ee118 [ 273.353182][T11112] device wg2 entered promiscuous mode [ 273.633106][T11136] device pim6reg1 entered promiscuous mode [ 274.537527][T11165] device pim6reg1 entered promiscuous mode [ 275.250701][T11197] FAULT_INJECTION: forcing a failure. [ 275.250701][T11197] name failslab, interval 1, probability 0, space 0, times 0 [ 275.315995][T11197] CPU: 0 PID: 11197 Comm: syz.1.4264 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 275.327177][T11197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 275.337071][T11197] Call Trace: [ 275.340199][T11197] dump_stack_lvl+0x1e2/0x24b [ 275.344727][T11197] ? bfq_pos_tree_add_move+0x43b/0x43b [ 275.350011][T11197] ? pfn_valid+0x1d0/0x1d0 [ 275.354257][T11197] dump_stack+0x15/0x17 [ 275.358348][T11197] should_fail+0x3c6/0x510 [ 275.362593][T11197] ? vm_area_dup+0x26/0x270 [ 275.366934][T11197] __should_failslab+0xa4/0xe0 [ 275.371534][T11197] should_failslab+0x9/0x20 [ 275.375874][T11197] kmem_cache_alloc+0x3d/0x2e0 [ 275.380474][T11197] ? __kasan_check_read+0x11/0x20 [ 275.385334][T11197] vm_area_dup+0x26/0x270 [ 275.389589][T11197] copy_mm+0x8ac/0x13a0 [ 275.393589][T11197] ? copy_signal+0x610/0x610 [ 275.398009][T11197] ? __init_rwsem+0xd6/0x1c0 [ 275.402433][T11197] ? copy_signal+0x4e3/0x610 [ 275.406860][T11197] copy_process+0x1175/0x3340 [ 275.411373][T11197] ? proc_fail_nth_write+0x20b/0x290 [ 275.416504][T11197] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 275.421442][T11197] ? bpf_trace_printk+0xcca/0xd50 [ 275.426303][T11197] kernel_clone+0x21e/0x9e0 [ 275.430628][T11197] ? create_io_thread+0x1e0/0x1e0 [ 275.435618][T11197] __x64_sys_clone+0x23f/0x290 [ 275.440206][T11197] ? __do_sys_vfork+0x130/0x130 [ 275.444921][T11197] ? __bpf_trace_sys_enter+0x62/0x70 [ 275.450011][T11197] ? syscall_enter_from_user_mode+0x144/0x1a0 [ 275.455910][T11197] do_syscall_64+0x34/0x70 [ 275.460165][T11197] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 275.465896][T11197] RIP: 0033:0x7fc234ecdbd9 [ 275.470150][T11197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 275.489587][T11197] RSP: 002b:00007fc23414eff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 275.497829][T11197] RAX: ffffffffffffffda RBX: 00007fc23505bf60 RCX: 00007fc234ecdbd9 [ 275.505729][T11197] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 275.513552][T11197] RBP: 00007fc23414f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 275.521352][T11197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 275.529162][T11197] R13: 000000000000000b R14: 00007fc23505bf60 R15: 00007ffff9383d28 [ 275.645942][T11204] FAULT_INJECTION: forcing a failure. [ 275.645942][T11204] name failslab, interval 1, probability 0, space 0, times 0 [ 275.747143][T11210] device pim6reg1 entered promiscuous mode [ 275.798017][T11204] CPU: 1 PID: 11204 Comm: syz.3.4267 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 275.809205][T11204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 275.819094][T11204] Call Trace: [ 275.822234][T11204] dump_stack_lvl+0x1e2/0x24b [ 275.826742][T11204] ? panic+0x812/0x812 [ 275.830670][T11204] ? bfq_pos_tree_add_move+0x43b/0x43b [ 275.835940][T11204] dump_stack+0x15/0x17 [ 275.840015][T11204] should_fail+0x3c6/0x510 [ 275.844265][T11204] ? __d_alloc+0x2d/0x6c0 [ 275.848431][T11204] __should_failslab+0xa4/0xe0 [ 275.853118][T11204] should_failslab+0x9/0x20 [ 275.857456][T11204] kmem_cache_alloc+0x3d/0x2e0 [ 275.862080][T11204] __d_alloc+0x2d/0x6c0 [ 275.866050][T11204] d_alloc+0x4b/0x1d0 [ 275.869872][T11204] __lookup_hash+0xe7/0x290 [ 275.874208][T11204] filename_create+0x202/0x750 [ 275.878810][T11204] ? kern_path_create+0x40/0x40 [ 275.883492][T11204] ? strncpy_from_user+0x18e/0x2d0 [ 275.888444][T11204] ? getname_flags+0x1fd/0x520 [ 275.893044][T11204] user_path_create+0x39/0x50 [ 275.897561][T11204] bpf_obj_pin_user+0x10d/0x310 [ 275.902360][T11204] ? unwind_get_return_address+0x4d/0x90 [ 275.907840][T11204] ? bpf_patch_insn_data+0xdf0/0xdf0 [ 275.912952][T11204] ? selinux_bpf+0xd2/0x100 [ 275.917317][T11204] __se_sys_bpf+0x1efe/0x11cb0 [ 275.921887][T11204] ? stack_trace_save+0x113/0x1c0 [ 275.926751][T11204] ? terminate_walk+0x407/0x4f0 [ 275.931435][T11204] ? stack_trace_snprint+0xf0/0xf0 [ 275.936384][T11204] ? kmem_cache_free+0xa9/0x1e0 [ 275.941069][T11204] ? kmem_cache_free+0xa9/0x1e0 [ 275.945757][T11204] ? kasan_set_track+0x5d/0x70 [ 275.950354][T11204] ? kasan_set_track+0x4b/0x70 [ 275.954955][T11204] ? kasan_set_free_info+0x23/0x40 [ 275.959903][T11204] ? ____kasan_slab_free+0x121/0x160 [ 275.965114][T11204] ? __kasan_slab_free+0x11/0x20 [ 275.969893][T11204] ? __x64_sys_bpf+0x90/0x90 [ 275.974570][T11204] ? do_sys_openat2+0x5e1/0x6f0 [ 275.979257][T11204] ? __x64_sys_openat+0x243/0x290 [ 275.984122][T11204] ? do_syscall_64+0x34/0x70 [ 275.988546][T11204] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 275.994534][T11204] ? _kstrtoull+0x3a0/0x4a0 [ 275.998882][T11204] ? kstrtouint_from_user+0x20a/0x2a0 [ 276.004081][T11204] ? kstrtol_from_user+0x310/0x310 [ 276.009029][T11204] ? memset+0x35/0x40 [ 276.012847][T11204] ? __fsnotify_parent+0x4b9/0x6c0 [ 276.017800][T11204] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 276.024390][T11204] ? proc_fail_nth_write+0x20b/0x290 [ 276.029509][T11204] ? proc_fail_nth_read+0x210/0x210 [ 276.034544][T11204] ? security_file_permission+0x86/0xb0 [ 276.040362][T11204] ? rw_verify_area+0x1c3/0x360 [ 276.045135][T11204] ? preempt_count_add+0x92/0x1a0 [ 276.050029][T11204] ? vfs_write+0x854/0xe70 [ 276.054250][T11204] ? kernel_write+0x3d0/0x3d0 [ 276.058814][T11204] ? __kasan_check_write+0x14/0x20 [ 276.063716][T11204] ? mutex_lock+0xa5/0x110 [ 276.067959][T11204] ? mutex_trylock+0xa0/0xa0 [ 276.072506][T11204] ? __kasan_check_write+0x14/0x20 [ 276.077444][T11204] ? fput_many+0x160/0x1b0 [ 276.081700][T11204] ? debug_smp_processor_id+0x17/0x20 [ 276.086910][T11204] __x64_sys_bpf+0x7b/0x90 [ 276.091154][T11204] do_syscall_64+0x34/0x70 [ 276.095407][T11204] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 276.101133][T11204] RIP: 0033:0x7f40af6edbd9 [ 276.105392][T11204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 276.124829][T11204] RSP: 002b:00007f40ae96f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 276.133072][T11204] RAX: ffffffffffffffda RBX: 00007f40af87bf60 RCX: 00007f40af6edbd9 [ 276.140884][T11204] RDX: 0000000000000018 RSI: 00000000200003c0 RDI: 0000000000000006 [ 276.148699][T11204] RBP: 00007f40ae96f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 276.156504][T11204] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 276.164404][T11204] R13: 000000000000000b R14: 00007f40af87bf60 R15: 00007fff072f7ab8 SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 280.686475][ T9] device bridge_slave_1 left promiscuous mode [ 280.692392][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 280.699669][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 280.707081][ T9] device veth1_macvtap left promiscuous mode [ 281.936953][ T9] device veth0_to_batadv left promiscuous mode [ 281.942949][ T9] bridge0: port 3(veth0_to_batadv) entered disabled state [ 281.950376][ T9] device bridge_slave_1 left promiscuous mode [ 281.956328][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.963383][ T9] device bridge_slave_0 left promiscuous mode [ 281.969487][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 281.977055][ T9] device bridge_slave_1 left promiscuous mode [ 281.982970][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 281.990153][ T9] device bridge_slave_0 left promiscuous mode [ 281.996077][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.003605][ T9] device bridge_slave_1 left promiscuous mode [ 282.009640][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.016897][ T9] device bridge_slave_0 left promiscuous mode [ 282.022820][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.030622][ T9] device bridge_slave_1 left promiscuous mode [ 282.036913][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 282.044059][ T9] device bridge_slave_0 left promiscuous mode [ 282.050132][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 282.057967][ T9] device veth1_macvtap left promiscuous mode [ 282.063863][ T9] device veth1_macvtap left promiscuous mode [ 282.069726][ T9] device veth0_vlan left promiscuous mode [ 282.075891][ T9] device veth1_macvtap left promiscuous mode [ 282.081776][ T9] device veth1_macvtap left promiscuous mode