last executing test programs: 5.00366232s ago: executing program 0 (id=11691): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$unix(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0}, 0x0) 4.970831952s ago: executing program 0 (id=11692): bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x5, 0xba69, 0x16d8, 0x1, 0x1, '\x00', 0x0, r1, 0x1, 0x3, 0x2, 0x3}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.430316951s ago: executing program 2 (id=11719): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r0, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0), 0x4) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)=@generic={0x0, 0x0, 0x10}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) 2.362180726s ago: executing program 0 (id=11720): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="f4ab5e29567e059a3ae10fd42e17da361a85b1d9601c28d27c2406981b0f1d30b84271a93a96aa34fac57048c4bdc94b5ac1794814c7154fa3c878ec0f7cd55a52635e99a345dd797568de92bac9277853d5dc1a618ef223eb4438555e70ad693cda68073d41fbd104bcffd0cb56469379acada8c6d6e4ec55998b4b70f5b481f9a6d521c75f6dfd39d2f8a90790b2cf9981b10c0db2279aa86c41a1a0b64967ed09843024d6063c4249ed48728042606db81771ffffcdf44c9782ec"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)=@o_path={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1", 0x1d}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x49, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r5}, &(0x7f0000000540), &(0x7f0000000600)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x58, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0xfffffffffffffceb) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x6, 0x4, 0xc0000000, 0x2042, r1, 0x3, '\x00', r9, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0xb}, 0xffffffffffffff66) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r11, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x4, 0x0, 0x7, 0x2448, 0xffffffffffffffff, 0x2400000, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x0, 0xe}, 0x48) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.349811987s ago: executing program 4 (id=11724): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0xe8034000, 0xcb, 0x0, &(0x7f0000000a40)="0040e5ca644d6c40e26225dd105d0d41a6cc4039bb1dd1b4ed799c10f3d3ee624c847692e8bc9ec4e1fa992d4ee9aa2c1b4c7f70d5af834f5f4725b0b77a421b57ca4135045b24cebccb7423775e322f98a3f0034994a692f96ea79269d98f88a6d15af6f0f76086bf6dd8249424d7b224565e4e10ab31f5cfb916984f1bbff41de90344a92c7b3fa5fdcf9ddbb9ae060bcfc99fd7e3e93c851caecb1a39f3adaa23912ac50c255db51606367cee0e800318baab6fb25368d8b028e93508aab5dca627ff502bc78ce4d929", &(0x7f00000000c0), 0x0, 0x0, 0x40000000}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x4a000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000004080)=@base={0x8, 0x4, 0x4, 0xbf22, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) 2.31255651s ago: executing program 0 (id=11725): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000380)=@framed={{}, [@printk={@ld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r4, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r5, 0x400454cd, 0x308) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x98, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000280)={'pim6reg1\x00', @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}}) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x400454d8, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r1}, 0x10) openat$cgroup_ro(r6, &(0x7f0000000300)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) (async) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) 2.309225211s ago: executing program 1 (id=11727): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xcd, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f0000000780)=""/164}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001900)={0x3, 0xc, &(0x7f00000019c0)=ANY=[@ANYRESDEC=0x0, @ANYRES64=r2, @ANYRESDEC, @ANYRES8=r0, @ANYRES32], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r5, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r6, &(0x7f0000000000), 0x2a979d) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x401c5820, 0x0) r7 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xa004}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 2.241455986s ago: executing program 2 (id=11728): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800}, 0x14423}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffff7d, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x200005, 0x5}, 0x81) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r3, 0x58, &(0x7f0000000d80)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth1_vlan\x00', 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8b0f, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x14}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x0, 0x5, 0x10000, 0x0, r3, 0x8d2, '\x00', 0x0, r8, 0x2, 0x0, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5e5, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r9, &(0x7f0000000000), 0xfffffd26) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.145680094s ago: executing program 0 (id=11729): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xb6, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0xffffffffffffffd4, 0x0, 0x10, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2040}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r3, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESDEC], 0x6a) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x10, &(0x7f00000010c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000018110000", @ANYRESOCT, @ANYBLOB="0000000000000000b7080000000000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000001000000850000008200000018220000", @ANYRES32, @ANYRESHEX=r1], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0xf}, 0x90) write$cgroup_pressure(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x5, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x20004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) write$cgroup_int(r0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x4030582b, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f0000000080)=ANY=[@ANYRES8=r4], &(0x7f0000281ffc)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00'}) 2.117985316s ago: executing program 0 (id=11730): bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x0, 0x5, 0xba69, 0x16d8, 0x1, 0x1, '\x00', 0x0, r1, 0x1, 0x3, 0x2, 0x3}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_freezer_state(r1, &(0x7f0000000000), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.110913237s ago: executing program 4 (id=11731): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x3, 0xfffffffc, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="9feb01342de9fec806c700001800000018000000ce3654fe0f00000000001c09040000000c0000000000000b0300000000305f5f09"], &(0x7f0000000580)=""/31, 0x36, 0x1f, 0x0, 0x7}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000780)={0x6, 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="209803008700000018400000030000000000000000000000a6d7ea94f827aba93ffaa7c2398a810b20e8d5e35d2c7ff47bcf28ccab2121aac20597baed4f26ec3b087e06a13757486c64f59a0b6da449a212f41e9503ef"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, &(0x7f0000000400), 0x40f00, 0x20, '\x00', 0x0, 0x25, r1, 0x8, &(0x7f0000000600)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0xe, 0x81, 0x8}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000700)=[r0, r0, r0, r0], &(0x7f0000000740)=[{0x3, 0x4, 0xf, 0xc}, {0x3, 0x2, 0x9, 0xb}], 0x10, 0x9}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x4, 0x4, 0x4, 0xbf25}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000380)={r0, &(0x7f0000002c40)="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", 0x20000000}, 0xffffffffffffffce) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000008c0)={r1, 0x20, &(0x7f0000000880)={&(0x7f0000000b00)=""/4096, 0x1000, 0x0, &(0x7f0000001b00)=""/4096, 0x1000}}, 0x10) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffef0, 0x0, r3, 0xfffffe39, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000400)=0xffffffffffffffff, 0x4) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000840)={r5}, 0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x4, 0x3, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r6}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x8c, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1ff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x10e40, 0x0, 0x0, 0x2, 0x6, 0x1, 0x5, 0x0, 0x8, 0x0, 0xc047}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x11, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000300)={r4}, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) 2.003819275s ago: executing program 3 (id=11733): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/176}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r2, @ANYRESOCT=r0, @ANYRES8=r4, @ANYRES32=r2, @ANYRESHEX=r3], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, 0x10}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/176}, 0x20) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1}, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) (async) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) (async) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16=r2, @ANYRESOCT=r0, @ANYRES8=r4, @ANYRES32=r2, @ANYRESHEX=r3], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x7, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x33, 0x0, 0x0, 0x0, 0x10}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='rss_stat\x00', r6}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) (async) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40060, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x1ff}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) (async) 1.997497637s ago: executing program 1 (id=11734): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f0000000380)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x18}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2005000, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000080005300000000faff0000940000000fad413e550000000f00000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='sched_process_wait\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) write$cgroup_int(r5, &(0x7f00000001c0), 0xfffffdef) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000006c0)='blkio.bfq.io_service_time_recursive\x00', 0x26e1, 0x0) syz_clone(0x630c0700, 0x0, 0x0, 0x0, 0x0, 0x0) 1.94693086s ago: executing program 2 (id=11735): bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000a7f1ffff00000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000024be7dcfa3f796b5"], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000440)={0x0, 0x0, 0xffffff9b, 0x7f}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x23, 0x10000, 0x0, 0x1200, 0xffffffffffffffff, 0x800, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5, 0x0, 0xb}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000500)) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x7, 0x25, &(0x7f0000000bc0)=ANY=[@ANYBLOB="180000000a41000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000e90000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000010000008500000082000000b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000a500000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000187b795d", @ANYRES32=r3, @ANYRESOCT=r1], &(0x7f0000000d00)='syzkaller\x00', 0x21, 0xe0, &(0x7f0000000a00)=""/224, 0x41100, 0x0, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x6, 0x5, 0x8}, 0x10, 0x0, r2, 0x2, &(0x7f0000000480)=[r4, r4, r4, r2, r0], &(0x7f00000004c0)=[{0x0, 0x4, 0x8, 0x5}, {0x1, 0x4, 0xe, 0x9}], 0x10, 0x8}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0x0}, 0x48) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x6, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r7}, &(0x7f0000000540), &(0x7f0000000580)=r9}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000800)='cachefiles_mark_inactive\x00'}, 0x10) ioctl$TUNSETLINK(r0, 0x400454cd, 0x338) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r7, &(0x7f0000000780)}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) r10 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x53, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r10, 0x40042408, r11) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r12, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 1.70360925s ago: executing program 4 (id=11736): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x0, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={@cgroup, 0xffffffffffffffff, 0x2f, 0x8, 0x0, @prog_fd}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x0, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000002000000008000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x5}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81, 0x81}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r1}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) socketpair(0x27, 0x4, 0x0, &(0x7f00000005c0)) 1.538049244s ago: executing program 3 (id=11737): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f80)={0xffffffffffffffff, 0xe0, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000c00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0xc4, &(0x7f0000000c80)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000cc0), &(0x7f0000000d00), 0x8, 0xbc, 0x8, 0x8, &(0x7f0000000d40)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, 0xffffffffffffffff, 0x2, '\x00', r2, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +ne\x00 '], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xfffffffd, 0x7fe2, 0x2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ff"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x498180, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYRES32=r4], 0x18}, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r4], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='mm_page_alloc\x00', r7}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r8, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x15, &(0x7f0000000200)={r9, 0x0, &(0x7f0000001780)=""/4096}, 0x20) 1.537672134s ago: executing program 4 (id=11738): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf68}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x5460, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, 0x0) openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) syz_open_procfs$namespace(0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x2, &(0x7f0000000000)=[{0x4}, {0x6, 0x6, 0x0, 0x5}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f00000006c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000100), 0x12) openat$cgroup_int(r3, &(0x7f0000000040)='cpuset.cpus\x00', 0x2, 0x0) 1.489621268s ago: executing program 2 (id=11739): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x800}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x10, 0x3, &(0x7f00000002c0)=ANY=[@ANYRES8=r2, @ANYRES8=r0, @ANYRES8], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r5}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000900)='rpcgss_oid_to_mech\x00'}, 0x10) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001403) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1802"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x67000000, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff09}, 0x90) ioctl$TUNSETOFFLOAD(r8, 0x4010744d, 0x20000000) r9 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x9, 0xffffffffffffff38, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000100)='kmem_cache_free\x00', r10}, 0xe) write$cgroup_subtree(r3, &(0x7f0000000240)=ANY=[], 0xffbf) ioctl$SIOCSIFHWADDR(r1, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 1.353160209s ago: executing program 3 (id=11740): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x5, 0x2, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x20009, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r3}, 0x10) mkdir(0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r5) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0xa, 0x7, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r8}, 0x10) close(r6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001400) write$cgroup_subtree(r5, 0x0, 0x9) sendmsg$tipc(r4, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000005000000005e002200850000006d00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r9}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22041000f3fe80000000000000110880febb0007aafe8000000000000027bfa7b09303960e2f80"], 0xfdef) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0xecd4) 1.201934411s ago: executing program 4 (id=11741): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000bc0)=@base={0xa, 0x1fd, 0x4, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000000), &(0x7f0000000380)}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000008085000000040000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x6, &(0x7f0000000040), 0x3b) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r4, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x1600, &(0x7f0000000280)="a8310016272f455e3c4d69410d771de98b355fdc2252828fb1f5fe785693329ffd53596db2a2d1173db1d287562500e76992ae13b181c078004c605ca45238f6c1a89cbd7176e86b6ed3367d22c2431e88c9872a63f1eb5b846890932837ef50c25e", 0x62, &(0x7f0000000340), &(0x7f0000000500), &(0x7f0000000680)="9ce9a0562a6568b28b1db1bfe10a1c4ebbdf86c10bf85cf6917d12f98c9031797cfc6d9e0afced3d6ce29dc402ffc4e73b6495bc1b8ab31699435e14a394e496ea0a7228ea555bec68ffb72739fc898c54b2542f363587d75ede181c7fc5d16ed81259bd42b6eedd3f631707e89f03e90e70ebb7fdf5fa15467255") bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180000000000e52e000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'geneve1\x00', 0x2}) ioctl$TUNSETOFFLOAD(r6, 0x400454c9, 0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000980)=ANY=[]) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r8, 0x8008743f, 0x2000000c) 1.016129637s ago: executing program 3 (id=11742): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x4, 0x4, 0x4, 0x1, 0x810, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001a80)={&(0x7f0000001900)=ANY=[@ANYBLOB="9feb0000020900000000000000000006000000000000"], &(0x7f00000019c0)=""/130, 0x26, 0x82, 0x1}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0xfdef) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0xb}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x3, 0x20008, 0x8, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r4, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r8}, 0x10) 991.046068ms ago: executing program 1 (id=11743): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001c00)) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x3, 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0xe0, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffc1a}, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000680)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000005884ed9ef88731bd0000001811000039ccb694163c490f0ebdc121c10004faaa470a37a5e655452f0071c72c9c7a0778663f4905821a586cb3c778ad0dafe29ded6917ce1919e0d61e5ad778", @ANYRES16=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000280)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcff7ffa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d0f65acc0d06d1a1434e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622e03b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67e6ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c690220b87b20581e7be6ba0dc001c4510555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd713089856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cace339f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff22dc518afc9ffc2cc788bee1b47683db01a2f9398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d000000009682e24b92533ac2a997d3ae526aca54183fb01c73f979ca9857399537f5831808b0dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db00002e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e4845535a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9003f07000099d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f18215523167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3037ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cb8846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966f08294cd6f496e5dee734fe7da3770845cf442d488afd80e170000000000000000000000000000000000000000000000000000052007563885a1105000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb9aaa57a8abef8b64237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2c09000000bfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a8639034a75f4c7df3ea8fc2018d07000000ef060cd4403a099f32468f65bd06b4092140faed0c329be610c3082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbcbf2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033bb9cc16bd83a00a40e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2add58ffb25f339297729a7a51810134d3dfbf71f651600eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce1d9bc7ef3e3f40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734137ff47547f164391c673b6079e65d7295eed164ca63e4ea26d65f6b3ce0f6591d80dfb8f386bb74b5589829b6b067903000000000000003d9950d48c774eaa35b24fce696af061c9e53addddc620ce73c5d177e3d097159f2768636fc10276c6a0adc57483b3f7083f66b87ef296ee85e9bb70009a5d30f479e293a3302e11350ea857b37e76ca2f50378e4092ce2c80c57ed04dbc574ad278b9b7b717c571afb2077b019fd9d89efd59b41f051ec5a8ff87ecc8df917a1e386d849fcd10e2f9ca52e02339c2f4666b0c545e62421c28d25994be0cff7271a0dee38d7ac4ac736b090e1d29f981179186e4000000000000646174b55d251f7f8ca5ccc22a5efb33b237eff559973c3a5f3a9bb54abb40e54593e1a7ce4cfa17b3c3fe91c06363496341eae20dcc59b6179b32ddddef5c34000096a54c0c571a91878f61f74912e2299e5501d4d6943bfd74c856511732f0ac8f7d17f1c6b4451c1bcdc6b6e1700e4cd87709d97afc5423c96fa981873d4369b04bbf1fb9f68f17991540868e408201ad1a74179e489aa61f021a437a3fa935588be2068f7ff9b253106326fde795e530b93626cc68e06e602198724249b4445eef08401cd1a3e266db55474e69902e4d8f5da4e94cc36794258fd4032de7ab36bc24c5efd5c8495c1ccd580033c55725f2d60354f8ad5914a0155eaa743350ddb388f486b6de0549ef3b1b3c3b7d4d3a8340000000000000008029be3788dd8422b1ab7b4c9d5b7d8682fd750947109c713108e1386f5843a9ee29af30ecbeb26ff81f0921be501ade32a81aa175f4f8f117fc23b2adb38200f0f360e213534e14fae98502f92017d32f29777b6890ad5a103352dd80f036db18220932a2d26e0f9f807c4eb9ae9ba0b77c54bcf501873ce30286cdd633346bc11ed2259ab31f0bc2630a23738a646833b4d03f0028835f71cee1a5bafec9de0cfe4b5f0197fa9c7f5bcac99dbd85fb924db68d7384d4c5ab1087e4464592f278036d2b81e02a3be90a6b8757ece967569d66c8399796825e80f4dc6b3920ed9813a259de560000000000000000000000000000aeecc3447c907474d2129496fc6f6bc804965f8caaac7e2ef733f77708d618dbeae5352a5bc32d826a1b62cd698b4cfdc74ba5e8f18e808783fd5f32ef793a3069ac0906609aa9ca7dca982d6e903aea749f60beb35e2bee8eb43b8c65f4526c61281d6517f1f6e9741365acdaf8ae916575459f7d14087f826f97c94b09cd1275e576d17f76b39a6ac9e33030d67262209a52012dd9c9c60e45c51dd06ee7ba3d0c53a16070536d583ab8639d4fafe62997819033338a5ea4a5d2b61d05de4d5ad4c8dd0de3b98a1f4d6142851571b8d61715c7cb557373854f7eaf2f4e4bfd3dcb6c1d2e7b0bcb4d896092e90f95a61df4ffeeb64dee29de77fba312943bc53efb61138a5a82f7a828c04faf679edf2fa31cdfc57a2cb7ce03f3cdc40a1a20e82e54d10ce35579d7e065a8840abf4ce792ced89bd4288c8d427000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$ITER_CREATE(0x21, &(0x7f0000000000)={r8}, 0x8) ioctl$SIOCSIFHWADDR(r7, 0x89f0, &(0x7f0000000900)={'bridge0\x00', @random='\x00\x00\x00 \x00'}) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r10], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="a48bd904e79fd114f8426fb0937ac95870da62c3732d1f3532ebf0daca32122153861854da7e8bfca2533e0949297b9cf11890255bf422cbf3126464632a26b1361dd54d5cb32ce82757e23eb3ab7d5fa46f27ee3bba16811f1358a740e6fa38bfc9540a8f278cde4eb648743afa44858cebc240e213624d1820caf760bd25b417f0c842930db288d029a5d4", @ANYRES32=r4, @ANYRES32=r2, @ANYRESHEX=r0, @ANYBLOB="3e8754642db26c686b145ba1820ab598b33e24011fc91f18dd6c4eb467e2489dd784ae758d26dba4cd841d8a12b522cf6b4042fecd9da48950bdd1b86b8e4917e283122cdb202518c76e3364"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r11}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x7, 0x2, &(0x7f0000000680)=ANY=[], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffff40}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0x1}, &(0x7f0000000080), &(0x7f00000000c0)=r12}, 0x20) r13 = openat$cgroup_ro(r9, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) close(r13) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000540)={0xbb, 0x0}, 0x8) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1c, 0xc, &(0x7f0000000580)=ANY=[@ANYRES64=0x0], &(0x7f0000000500)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffc}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r15}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 821.144733ms ago: executing program 1 (id=11744): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.events\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) (async) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800086}, 0x10}, 0x90) (async) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x40047451, 0x2000000c) (async) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e40)={&(0x7f0000000600)='ext4_free_blocks\x00'}, 0x10) (rerun: 32) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (rerun: 64) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) (async) r5 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000400)='damon_aggregated\x00', r0}, 0x10) (async) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRESDEC], 0x6a) (async) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x11, '\x00', 0x0, 0xf, r7}, 0x90) (async) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000540), 0x81, 0x0) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@bloom_filter={0x1e, 0x0, 0xaf11, 0x4, 0x8, r4, 0x8000, '\x00', 0x0, r7, 0x2, 0x2, 0x4, 0xd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x0, 0x3, &(0x7f00000008c0)=ANY=[@ANYBLOB="8500000032d1136519365f26787c2d797cd050666407a41b72771857c960b933109c85f7c5d859387b146a26c65e70be485ee271fa317b08d2795033230d1f3799358c868398dcd1586c100ccd62fef0c53e77d0a96a7fb15833f56b8c7ceddfe383b03a43d629825b239734fb541eb4399f0dc8fb193089a9bbb133b85e691bd17dc522752773cccb223b1818350e4c743cbb6aac2ae0464e146fa45b1e7b3f9d97355476f6dc8f4ded7f3f0a95b2e4"], &(0x7f0000281ffc)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4d, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x90) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00'}) 820.411523ms ago: executing program 1 (id=11745): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x800}, 0x14423}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000540)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0xffffff7d, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x200005, 0x5}, 0x81) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000640)={r3, 0x58, &(0x7f0000000d80)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000700), 0x4) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth1_vlan\x00', 0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8b0f, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYRES32], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x14}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x0, 0x5, 0x10000, 0x0, r3, 0x8d2, '\x00', 0x0, r8, 0x2, 0x0, 0x0, 0x1}, 0x48) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5e5, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r9, &(0x7f0000000000), 0xfffffd26) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) 518.845697ms ago: executing program 2 (id=11746): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x11, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x30000000}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}, {0x95, 0x0, 0x50, 0x6000000}}, [@btf_id], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x3, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)=0x4, 0x12) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) syz_clone(0x640c7006, 0x0, 0x0, 0x0, 0x0, 0x0) 507.631088ms ago: executing program 1 (id=11747): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000de850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x2000000000000320, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x6c}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00'}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x20025, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r4, 0x4008240b, &(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}, 0x0, 0x0, 0x6, 0x2}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(0xffffffffffffffff) socketpair(0x0, 0x80005, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000002c0)='ns/pid\x00') 327.726653ms ago: executing program 4 (id=11748): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x83000000}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r2}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x19, 0x4, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x15}, 0x70) (async) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000000c0)='jbd2_write_superblock\x00', r5}, 0x10) (async) ioctl$TUNSETOFFLOAD(r4, 0x40086607, 0x20001412) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000001640)='mm_compaction_begin\x00', r8}, 0x10) (async) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x0) r9 = perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xffffff81, '\x00', 0x0, r9}, 0x48) (async) close(r1) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r1, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) (async) close(r0) 313.995294ms ago: executing program 3 (id=11749): bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00'}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x2, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800003738cbaca31b000000000000000000800000001811324fa154ccc23eeac67ad439c4f0a880ffb3ed8b905ee524e21f63191da7bcf0efdad18ffdbdbd8304b3ded49ec358957177ec119604f0a779e5c9cc9e03e822583f99dc7aebd7cfe3a782b9692da535116e9498c6ab99c576bc4c59ab13d72b2bdf8cc29e3f3b59e6aed8807aa96cb24d8d41a3e6ea1508866d587589f9ce4713f8dc5c4fce32d940c16cdb52b5337a1f0f4b432f70bb3175bd9d", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000000280), 0x82, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x0, 0x0, 0x7ffd, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x40047451, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x17) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES16, @ANYRESHEX=r6, @ANYRES8, @ANYRES16=r2], &(0x7f0000000240)='GPL\x00', 0xfffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r9}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 209.126233ms ago: executing program 2 (id=11750): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup/syz1\x00', 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x1e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x6}, 0x0, 0x0, 0xfffffffe, 0x5, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000e00)=ANY=[@ANYRESHEX], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffa6, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x7b17}, 0x90) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="62030000002072"], 0x8) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000280), 0x9) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x5b, 0x8a}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x5b, 0x8a}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000e40)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x400000}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x5b, 0x8a}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000180)={r3, r4}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000100)={r3, r2}, 0xc) bpf$PROG_BIND_MAP(0x23, &(0x7f00000001c0)={r3, r1}, 0xc) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_BIND_MAP(0x23, &(0x7f00000002c0)={r3, r5}, 0xc) syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000070000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r6, 0x0, 0x20000000}, 0x20) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000380)={r6, 0x0, 0x20000000, 0x2}, 0x20) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000240)={r6, 0x0, 0x20000000}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r6}, 0x0, 0x0}, 0x20) 0s ago: executing program 3 (id=11751): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x400c6615, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{0x1}, &(0x7f0000001040), &(0x7f0000001080)}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000010c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000001040), &(0x7f0000001080)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x11, 0x17, &(0x7f0000001240)=ANY=[@ANYBLOB="180000000008000000000000660b000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001a340001fcffffff180000000000000000000000000000002c52e0ffffffffff18150000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="000000007bab0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000ac0)='syzkaller\x00', 0x22, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000d80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001000)={0x3, 0xc, 0x0, 0x286b}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001100)=[r2], &(0x7f0000001140)=[{0x2, 0x3, 0x8}, {0x0, 0x4235, 0x5, 0x5}], 0x10, 0x40}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x11, 0x17, &(0x7f0000001240)=ANY=[@ANYBLOB="180000000008000000000000660b000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000000000550901000000000095000000000000001a340001fcffffff180000000000000000000000000000002c52e0ffffffffff18150000", @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="000000007bab0000bf91000000000000b7020000020000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000ac0)='syzkaller\x00', 0x22, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000d80)={0x8, 0x3}, 0x8, 0x10, &(0x7f0000001000)={0x3, 0xc, 0x0, 0x286b}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001100)=[r2], &(0x7f0000001140)=[{0x2, 0x3, 0x8}, {0x0, 0x4235, 0x5, 0x5}], 0x10, 0x40}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="180900000000000000000000ca00000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="180900000000000000000000ca00000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000340)={0x3, 0x4, 0x4, 0xa, 0x0, r0, 0x3f1a, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3, 0x3}, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='&b%\x00') (async) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000002c0)='&b%\x00') r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x408) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f00610dc64303a3262a8a3844c74481c93d2854538cef8f8e1731bdcd2ef853d6ba6bcda893acf4c683b10f"], 0x0, 0x34}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r9, 0x1, 0x2}, 0x48) (async) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000900)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x0, '\x00', 0x0, r9, 0x1, 0x2}, 0x48) write$cgroup_type(r8, &(0x7f0000000180), 0x40001) kernel console output (not intermixed with test programs): y [ 872.992232][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 873.000564][ T947] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.007419][ T947] bridge0: port 2(bridge_slave_1) entered forwarding state [ 873.014873][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 873.023062][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 873.031177][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 873.039242][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 873.072481][T28996] device veth0_vlan entered promiscuous mode [ 873.078786][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 873.086930][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 873.094965][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 873.102876][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 873.111179][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 873.119148][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 873.132644][T28996] device veth1_macvtap entered promiscuous mode [ 873.155936][T19656] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 873.171746][T19656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 873.187396][T19656] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 873.220211][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 873.229557][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 873.238026][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 873.246719][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 873.480274][T29025] bridge0: port 1(bridge_slave_0) entered blocking state [ 873.581428][T29025] bridge0: port 1(bridge_slave_0) entered disabled state [ 873.645016][T29025] device bridge_slave_0 entered promiscuous mode [ 873.711409][T29025] bridge0: port 2(bridge_slave_1) entered blocking state [ 873.839214][T29025] bridge0: port 2(bridge_slave_1) entered disabled state [ 873.938291][T29025] device bridge_slave_1 entered promiscuous mode [ 874.200407][T29051] cgroup: fork rejected by pids controller in /syz0 [ 875.010023][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 875.018032][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 875.025807][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 875.046820][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 875.054093][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 875.072625][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 875.081540][T17526] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.088415][T17526] bridge0: port 1(bridge_slave_0) entered forwarding state [ 875.096135][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 875.104262][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 875.113536][T17526] bridge0: port 2(bridge_slave_1) entered blocking state [ 875.120397][T17526] bridge0: port 2(bridge_slave_1) entered forwarding state [ 875.128260][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 875.379012][T29025] device veth0_vlan entered promiscuous mode [ 875.389298][T17517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 875.401490][T17517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 875.410797][T17517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 875.418984][T17517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 875.427220][T17517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 875.434490][T17517] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 875.475762][ T7] device veth0_to_batadv left promiscuous mode [ 875.481877][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 875.489329][ T7] device bridge_slave_1 left promiscuous mode [ 875.495264][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.502657][ T7] device bridge_slave_0 left promiscuous mode [ 875.508717][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.742747][T29025] device veth1_macvtap entered promiscuous mode [ 875.760691][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 875.769200][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 875.778408][T17526] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 875.809677][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 875.818053][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 875.826963][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 875.835074][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 875.930773][T29063] bridge0: port 1(bridge_slave_0) entered blocking state [ 875.966125][T29063] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.973454][T29063] device bridge_slave_0 entered promiscuous mode [ 876.197271][T29063] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.231941][T29063] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.369579][T29063] device bridge_slave_1 entered promiscuous mode [ 876.963348][T17517] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 876.993006][T17517] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 877.243637][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 877.270947][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 877.299215][T17524] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.306109][T17524] bridge0: port 1(bridge_slave_0) entered forwarding state [ 877.323441][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 877.332941][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 877.341440][T17524] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.348336][T17524] bridge0: port 2(bridge_slave_1) entered forwarding state [ 877.371112][T17524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 877.434255][ T958] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 877.458680][ T958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 877.536315][ T958] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 877.617263][ T958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 877.636368][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 877.644561][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 877.653219][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 877.661092][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 877.670940][ T958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 877.678493][ T958] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 877.712679][T29063] device veth0_vlan entered promiscuous mode [ 877.792872][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 877.811121][ T947] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 877.828067][T29063] device veth1_macvtap entered promiscuous mode [ 877.858766][T29112] device syzkaller0 entered promiscuous mode [ 877.868102][T19657] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 877.875617][T19657] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 877.903286][T19657] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 877.912084][T19657] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 877.920382][T19657] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 877.950932][T29120] device syzkaller0 entered promiscuous mode [ 878.602321][ T7] device bridge_slave_1 left promiscuous mode [ 878.664329][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 878.796171][ T7] device bridge_slave_0 left promiscuous mode [ 878.886360][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 879.036104][ T7] device veth1_macvtap left promiscuous mode [ 879.119460][ T7] device veth1_macvtap left promiscuous mode [ 879.662382][T29156] device syzkaller0 entered promiscuous mode [ 879.757397][T29158] device syzkaller0 entered promiscuous mode [ 881.524033][T29196] device syzkaller0 entered promiscuous mode [ 883.305274][T29237] device syzkaller0 entered promiscuous mode [ 885.420064][T29286] device syzkaller0 entered promiscuous mode [ 886.380376][T29321] device syzkaller0 entered promiscuous mode [ 886.788883][T29338] device pim6reg1 entered promiscuous mode [ 887.771207][T29365] device syzkaller0 entered promiscuous mode [ 888.051735][T29363] device syzkaller0 entered promiscuous mode [ 889.263493][T29395] device veth0_vlan left promiscuous mode [ 889.404408][T29395] device veth0_vlan entered promiscuous mode [ 889.631423][T29405] FAULT_INJECTION: forcing a failure. [ 889.631423][T29405] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 889.644448][T29405] CPU: 1 PID: 29405 Comm: syz.0.8913 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 889.655603][T29405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 889.665502][T29405] Call Trace: [ 889.668633][T29405] dump_stack_lvl+0x1e2/0x24b [ 889.673146][T29405] ? panic+0x812/0x812 [ 889.677046][T29405] ? bfq_pos_tree_add_move+0x43b/0x43b [ 889.682343][T29405] dump_stack+0x15/0x17 [ 889.686330][T29405] should_fail+0x3c6/0x510 [ 889.690592][T29405] should_fail_usercopy+0x1a/0x20 [ 889.695446][T29405] _copy_from_user+0x20/0xd0 [ 889.699974][T29405] perf_copy_attr+0x15e/0x760 [ 889.704575][T29405] __se_sys_perf_event_open+0xdd/0x3c30 [ 889.710000][T29405] ? kvm_sched_clock_read+0x18/0x40 [ 889.715000][T29405] ? sched_clock+0x3a/0x40 [ 889.719270][T29405] ? sched_clock_cpu+0x1b/0x3b0 [ 889.723921][T29405] ? sched_clock+0x3a/0x40 [ 889.728179][T29405] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 889.733656][T29405] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 889.739292][T29405] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 889.745284][T29405] __x64_sys_perf_event_open+0xbf/0xd0 [ 889.750583][T29405] do_syscall_64+0x34/0x70 [ 889.754829][T29405] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 889.760551][T29405] RIP: 0033:0x7efdb4e359f9 [ 889.764806][T29405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 889.784333][T29405] RSP: 002b:00007efdb3ab5048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 889.792759][T29405] RAX: ffffffffffffffda RBX: 00007efdb4fc3f80 RCX: 00007efdb4e359f9 [ 889.800579][T29405] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 889.808384][T29405] RBP: 00007efdb3ab50a0 R08: 0000000000000000 R09: 0000000000000000 [ 889.816197][T29405] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 889.824007][T29405] R13: 000000000000000b R14: 00007efdb4fc3f80 R15: 00007ffc73eb77f8 [ 891.493777][T29464] FAULT_INJECTION: forcing a failure. [ 891.493777][T29464] name failslab, interval 1, probability 0, space 0, times 0 [ 891.514322][T29464] CPU: 1 PID: 29464 Comm: syz.3.8934 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 891.525500][T29464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 891.535486][T29464] Call Trace: [ 891.538621][T29464] dump_stack_lvl+0x1e2/0x24b [ 891.543129][T29464] ? bfq_pos_tree_add_move+0x43b/0x43b [ 891.548422][T29464] dump_stack+0x15/0x17 [ 891.552409][T29464] should_fail+0x3c6/0x510 [ 891.556662][T29464] ? perf_event_alloc+0xc4/0x1970 [ 891.561590][T29464] __should_failslab+0xa4/0xe0 [ 891.566164][T29464] should_failslab+0x9/0x20 [ 891.570474][T29464] kmem_cache_alloc_trace+0x3a/0x2e0 [ 891.575661][T29464] ? __irq_exit_rcu+0x40/0x150 [ 891.580207][T29464] perf_event_alloc+0xc4/0x1970 [ 891.584879][T29464] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 891.590867][T29464] ? __se_sys_perf_event_open+0x932/0x3c30 [ 891.596504][T29464] __se_sys_perf_event_open+0xb12/0x3c30 [ 891.602064][T29464] ? ktime_get+0x10e/0x140 [ 891.606231][T29464] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 891.611697][T29464] ? hrtimer_interrupt+0x6a8/0x8b0 [ 891.616730][T29464] ? debug_smp_processor_id+0x17/0x20 [ 891.621936][T29464] __x64_sys_perf_event_open+0xbf/0xd0 [ 891.627229][T29464] do_syscall_64+0x34/0x70 [ 891.631480][T29464] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 891.637209][T29464] RIP: 0033:0x7f69131379f9 [ 891.641461][T29464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 891.660899][T29464] RSP: 002b:00007f6911db7048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 891.669144][T29464] RAX: ffffffffffffffda RBX: 00007f69132c5f80 RCX: 00007f69131379f9 [ 891.677826][T29464] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 891.685902][T29464] RBP: 00007f6911db70a0 R08: 0000000000000000 R09: 0000000000000000 [ 891.693707][T29464] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 891.701520][T29464] R13: 000000000000000b R14: 00007f69132c5f80 R15: 00007fffaccb6c18 [ 892.316523][T29483] device veth0_vlan left promiscuous mode [ 892.384797][T29483] device veth0_vlan entered promiscuous mode [ 892.499096][T19648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 892.508895][T19648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 892.516271][T19648] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 892.552213][T29494] device syzkaller0 entered promiscuous mode [ 892.567563][T29500] FAULT_INJECTION: forcing a failure. [ 892.567563][T29500] name failslab, interval 1, probability 0, space 0, times 0 [ 892.580189][T29500] CPU: 0 PID: 29500 Comm: syz.0.8947 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 892.591248][T29500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 892.601144][T29500] Call Trace: [ 892.604277][T29500] dump_stack_lvl+0x1e2/0x24b [ 892.608788][T29500] ? panic+0x812/0x812 [ 892.612689][T29500] ? __mutex_lock+0xc4e/0xf20 [ 892.617373][T29500] ? bfq_pos_tree_add_move+0x43b/0x43b [ 892.622660][T29500] ? sched_clock+0x3a/0x40 [ 892.626818][T29492] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 892.626913][T29500] dump_stack+0x15/0x17 [ 892.638383][T29500] should_fail+0x3c6/0x510 [ 892.642688][T29500] ? tracepoint_add_func+0x321/0xa30 [ 892.647738][T29500] __should_failslab+0xa4/0xe0 [ 892.652343][T29500] should_failslab+0x9/0x20 [ 892.656677][T29500] __kmalloc+0x60/0x330 [ 892.660668][T29500] tracepoint_add_func+0x321/0xa30 [ 892.665691][T29500] ? trace_event_raw_event_dwc3_log_io+0x280/0x280 [ 892.671949][T29500] ? trace_event_raw_event_dwc3_log_io+0x280/0x280 [ 892.678285][T29500] tracepoint_probe_register+0xff/0x160 [ 892.683666][T29500] ? tracepoint_probe_register_prio+0x190/0x190 [ 892.689742][T29500] ? trace_event_raw_event_dwc3_log_io+0x280/0x280 [ 892.696105][T29500] trace_event_reg+0x1b6/0x260 [ 892.700714][T29500] perf_trace_event_init+0x4a0/0x950 [ 892.705797][T29500] perf_trace_init+0x1c6/0x210 [ 892.710399][T29500] perf_tp_event_init+0x8c/0x110 [ 892.715256][T29500] perf_try_init_event+0x143/0x410 [ 892.720208][T29500] perf_event_alloc+0xcf5/0x1970 [ 892.724986][T29500] __se_sys_perf_event_open+0xb12/0x3c30 [ 892.730573][T29500] ? task_rq_lock+0x2a0/0x2a0 [ 892.735053][T29500] ? _raw_spin_unlock_irq+0x4e/0x70 [ 892.740101][T29500] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 892.745614][T29500] ? fpu__clear_all+0x20/0x20 [ 892.750071][T29500] ? __kasan_check_read+0x11/0x20 [ 892.754930][T29500] __x64_sys_perf_event_open+0xbf/0xd0 [ 892.760220][T29500] do_syscall_64+0x34/0x70 [ 892.764475][T29500] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 892.770198][T29500] RIP: 0033:0x7efdb4e359f9 [ 892.774454][T29500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 892.793892][T29500] RSP: 002b:00007efdb3ab5048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 892.802148][T29500] RAX: ffffffffffffffda RBX: 00007efdb4fc3f80 RCX: 00007efdb4e359f9 [ 892.809951][T29500] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 892.817761][T29500] RBP: 00007efdb3ab50a0 R08: 0000000000000000 R09: 0000000000000000 [ 892.825571][T29500] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 892.833381][T29500] R13: 000000000000000b R14: 00007efdb4fc3f80 R15: 00007ffc73eb77f8 [ 892.846596][T29492] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 892.855114][T29492] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 892.863908][T29491] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 892.893555][T29491] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 893.794286][T29545] FAULT_INJECTION: forcing a failure. [ 893.794286][T29545] name failslab, interval 1, probability 0, space 0, times 0 [ 893.838208][T29545] CPU: 1 PID: 29545 Comm: syz.2.8959 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 893.849472][T29545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 893.859361][T29545] Call Trace: [ 893.862496][T29545] dump_stack_lvl+0x1e2/0x24b [ 893.867005][T29545] ? bfq_pos_tree_add_move+0x43b/0x43b [ 893.872574][T29545] ? perf_event_alloc+0xd06/0x1970 [ 893.877595][T29545] ? ___ratelimit+0xb5/0x580 [ 893.881941][T29545] dump_stack+0x15/0x17 [ 893.885943][T29545] should_fail+0x3c6/0x510 [ 893.890198][T29545] ? selinux_perf_event_alloc+0x51/0x140 [ 893.895657][T29545] __should_failslab+0xa4/0xe0 [ 893.900262][T29545] should_failslab+0x9/0x20 [ 893.904599][T29545] kmem_cache_alloc_trace+0x3a/0x2e0 [ 893.909722][T29545] selinux_perf_event_alloc+0x51/0x140 [ 893.915011][T29545] security_perf_event_alloc+0x62/0x90 [ 893.920316][T29545] perf_event_alloc+0x15b6/0x1970 [ 893.925170][T29545] __se_sys_perf_event_open+0xb12/0x3c30 [ 893.930634][T29545] ? ktime_get+0x10e/0x140 [ 893.934887][T29545] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 893.940354][T29545] ? hrtimer_interrupt+0x6a8/0x8b0 [ 893.945307][T29545] ? debug_smp_processor_id+0x17/0x20 [ 893.950520][T29545] __x64_sys_perf_event_open+0xbf/0xd0 [ 893.955806][T29545] do_syscall_64+0x34/0x70 [ 893.960062][T29545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 893.965785][T29545] RIP: 0033:0x7fb56a50b9f9 [ 893.970037][T29545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 893.989478][T29545] RSP: 002b:00007fb56918b048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 893.997719][T29545] RAX: ffffffffffffffda RBX: 00007fb56a699f80 RCX: 00007fb56a50b9f9 [ 894.005532][T29545] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 894.013346][T29545] RBP: 00007fb56918b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 894.021162][T29545] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 894.028967][T29545] R13: 000000000000000b R14: 00007fb56a699f80 R15: 00007ffcf6a8b058 [ 894.985131][T29597] FAULT_INJECTION: forcing a failure. [ 894.985131][T29597] name failslab, interval 1, probability 0, space 0, times 0 [ 895.059983][T29597] CPU: 0 PID: 29597 Comm: syz.3.8974 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 895.071167][T29597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 895.081058][T29597] Call Trace: [ 895.084194][T29597] dump_stack_lvl+0x1e2/0x24b [ 895.088705][T29597] ? bfq_pos_tree_add_move+0x43b/0x43b [ 895.093998][T29597] ? kvm_sched_clock_read+0x18/0x40 [ 895.099028][T29597] ? sched_clock_cpu+0x1b/0x3b0 [ 895.103719][T29597] ? sched_clock+0x3a/0x40 [ 895.107972][T29597] dump_stack+0x15/0x17 [ 895.112046][T29597] should_fail+0x3c6/0x510 [ 895.116356][T29597] ? __d_alloc+0x2d/0x6c0 [ 895.120458][T29597] __should_failslab+0xa4/0xe0 [ 895.125056][T29597] should_failslab+0x9/0x20 [ 895.129396][T29597] kmem_cache_alloc+0x3d/0x2e0 [ 895.133999][T29597] __d_alloc+0x2d/0x6c0 [ 895.137998][T29597] d_alloc_pseudo+0x1d/0x70 [ 895.142330][T29597] alloc_file_pseudo+0x131/0x2f0 [ 895.147103][T29597] ? alloc_empty_file_noaccount+0x80/0x80 [ 895.152701][T29597] anon_inode_getfile+0xa7/0x180 [ 895.157433][T29597] __se_sys_perf_event_open+0xfe4/0x3c30 [ 895.162903][T29597] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 895.168366][T29597] ? hrtimer_interrupt+0x6a8/0x8b0 [ 895.173319][T29597] ? debug_smp_processor_id+0x17/0x20 [ 895.178525][T29597] __x64_sys_perf_event_open+0xbf/0xd0 [ 895.183837][T29597] do_syscall_64+0x34/0x70 [ 895.188089][T29597] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 895.193802][T29597] RIP: 0033:0x7f69131379f9 [ 895.198055][T29597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 895.217492][T29597] RSP: 002b:00007f6911db7048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 895.225735][T29597] RAX: ffffffffffffffda RBX: 00007f69132c5f80 RCX: 00007f69131379f9 [ 895.233545][T29597] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 895.241355][T29597] RBP: 00007f6911db70a0 R08: 0000000000000000 R09: 0000000000000000 [ 895.249168][T29597] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 895.256979][T29597] R13: 000000000000000b R14: 00007f69132c5f80 R15: 00007fffaccb6c18 [ 896.242201][T29636] device syzkaller0 entered promiscuous mode [ 897.313087][T29667] FAULT_INJECTION: forcing a failure. [ 897.313087][T29667] name failslab, interval 1, probability 0, space 0, times 0 [ 897.336891][T29667] CPU: 1 PID: 29667 Comm: syz.4.8999 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 897.348074][T29667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 897.357967][T29667] Call Trace: [ 897.361097][T29667] dump_stack_lvl+0x1e2/0x24b [ 897.365607][T29667] ? bfq_pos_tree_add_move+0x43b/0x43b [ 897.370909][T29667] dump_stack+0x15/0x17 [ 897.374900][T29667] should_fail+0x3c6/0x510 [ 897.379158][T29667] ? security_file_alloc+0x29/0x120 [ 897.384190][T29667] __should_failslab+0xa4/0xe0 [ 897.388786][T29667] should_failslab+0x9/0x20 [ 897.393121][T29667] kmem_cache_alloc+0x3d/0x2e0 [ 897.397723][T29667] ? __alloc_file+0x29/0x330 [ 897.402147][T29667] security_file_alloc+0x29/0x120 [ 897.407004][T29667] __alloc_file+0xbf/0x330 [ 897.411257][T29667] alloc_empty_file+0x95/0x180 [ 897.415857][T29667] alloc_file+0x5a/0x4e0 [ 897.419937][T29667] alloc_file_pseudo+0x259/0x2f0 [ 897.424713][T29667] ? alloc_empty_file_noaccount+0x80/0x80 [ 897.430273][T29667] anon_inode_getfile+0xa7/0x180 [ 897.435038][T29667] __se_sys_perf_event_open+0xfe4/0x3c30 [ 897.440505][T29667] ? irq_exit_rcu+0x9/0x10 [ 897.444804][T29667] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 897.450239][T29667] ? __ia32_sys_read+0x90/0x90 [ 897.454831][T29667] __x64_sys_perf_event_open+0xbf/0xd0 [ 897.460121][T29667] do_syscall_64+0x34/0x70 [ 897.464375][T29667] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 897.470102][T29667] RIP: 0033:0x7fa60b89b9f9 [ 897.474356][T29667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 897.493796][T29667] RSP: 002b:00007fa60a51b048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 897.502390][T29667] RAX: ffffffffffffffda RBX: 00007fa60ba29f80 RCX: 00007fa60b89b9f9 [ 897.510202][T29667] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 897.518017][T29667] RBP: 00007fa60a51b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 897.525820][T29667] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 897.533630][T29667] R13: 000000000000000b R14: 00007fa60ba29f80 R15: 00007ffe3dfbf298 [ 897.807718][T29687] device syzkaller0 entered promiscuous mode [ 898.084371][T29699] device syzkaller0 entered promiscuous mode [ 900.362071][T29743] device syzkaller0 entered promiscuous mode [ 900.509757][T29751] FAULT_INJECTION: forcing a failure. [ 900.509757][T29751] name failslab, interval 1, probability 0, space 0, times 0 [ 900.533152][T29751] CPU: 1 PID: 29751 Comm: syz.0.9026 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 900.544325][T29751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 900.554216][T29751] Call Trace: [ 900.557350][T29751] dump_stack_lvl+0x1e2/0x24b [ 900.561856][T29751] ? bfq_pos_tree_add_move+0x43b/0x43b [ 900.567151][T29751] dump_stack+0x15/0x17 [ 900.571138][T29751] should_fail+0x3c6/0x510 [ 900.575395][T29751] ? security_file_alloc+0x29/0x120 [ 900.580429][T29751] __should_failslab+0xa4/0xe0 [ 900.585027][T29751] should_failslab+0x9/0x20 [ 900.589370][T29751] kmem_cache_alloc+0x3d/0x2e0 [ 900.593966][T29751] ? __alloc_file+0x29/0x330 [ 900.598404][T29751] security_file_alloc+0x29/0x120 [ 900.603255][T29751] __alloc_file+0xbf/0x330 [ 900.607510][T29751] alloc_empty_file+0x95/0x180 [ 900.612108][T29751] alloc_file+0x5a/0x4e0 [ 900.616207][T29751] alloc_file_pseudo+0x259/0x2f0 [ 900.620965][T29751] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 900.626624][T29751] ? alloc_empty_file_noaccount+0x80/0x80 [ 900.632170][T29751] ? ihold+0x20/0x60 [ 900.635908][T29751] ? ihold+0x2e/0x60 [ 900.639624][T29751] anon_inode_getfile+0xa7/0x180 [ 900.644403][T29751] __se_sys_perf_event_open+0xfe4/0x3c30 [ 900.649873][T29751] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 900.655339][T29751] ? __ia32_sys_read+0x90/0x90 [ 900.659942][T29751] __x64_sys_perf_event_open+0xbf/0xd0 [ 900.665228][T29751] do_syscall_64+0x34/0x70 [ 900.669494][T29751] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 900.676192][T29751] RIP: 0033:0x7efdb4e359f9 [ 900.680418][T29751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 900.699944][T29751] RSP: 002b:00007efdb3ab5048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 900.708272][T29751] RAX: ffffffffffffffda RBX: 00007efdb4fc3f80 RCX: 00007efdb4e359f9 [ 900.716085][T29751] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 900.723895][T29751] RBP: 00007efdb3ab50a0 R08: 0000000000000000 R09: 0000000000000000 [ 900.731707][T29751] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 900.739518][T29751] R13: 000000000000000b R14: 00007efdb4fc3f80 R15: 00007ffc73eb77f8 [ 902.064494][T29781] device sit0 entered promiscuous mode [ 902.851326][T29794] FAULT_INJECTION: forcing a failure. [ 902.851326][T29794] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 902.889714][T29794] CPU: 0 PID: 29794 Comm: syz.4.9041 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 902.900894][T29794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 902.910784][T29794] Call Trace: [ 902.913920][T29794] dump_stack_lvl+0x1e2/0x24b [ 902.918423][T29794] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 902.924411][T29794] ? bfq_pos_tree_add_move+0x43b/0x43b [ 902.929706][T29794] ? dump_stack+0x9/0x17 [ 902.933784][T29794] dump_stack+0x15/0x17 [ 902.937776][T29794] should_fail+0x3c6/0x510 [ 902.942039][T29794] should_fail_usercopy+0x1a/0x20 [ 902.946895][T29794] _copy_to_user+0x20/0x90 [ 902.951148][T29794] simple_read_from_buffer+0xc7/0x150 [ 902.956353][T29794] proc_fail_nth_read+0x1a3/0x210 [ 902.961212][T29794] ? proc_fault_inject_write+0x390/0x390 [ 902.966685][T29794] ? security_file_permission+0x86/0xb0 [ 902.972067][T29794] ? rw_verify_area+0x1c3/0x360 [ 902.976748][T29794] ? proc_fault_inject_write+0x390/0x390 [ 902.982218][T29794] vfs_read+0x200/0xba0 [ 902.986212][T29794] ? kernel_read+0x70/0x70 [ 902.990463][T29794] ? __kasan_check_write+0x14/0x20 [ 902.995430][T29794] ? mutex_lock+0xa5/0x110 [ 902.999672][T29794] ? mutex_trylock+0xa0/0xa0 [ 903.004098][T29794] ? __fdget_pos+0x2e7/0x3a0 [ 903.008518][T29794] ? ksys_read+0x77/0x2c0 [ 903.012686][T29794] ksys_read+0x199/0x2c0 [ 903.016765][T29794] ? vfs_write+0xe70/0xe70 [ 903.021016][T29794] __x64_sys_read+0x7b/0x90 [ 903.025354][T29794] do_syscall_64+0x34/0x70 [ 903.029608][T29794] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 903.035339][T29794] RIP: 0033:0x7fa60b89a43c [ 903.039589][T29794] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 903.059028][T29794] RSP: 002b:00007fa60a51b040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 903.067271][T29794] RAX: ffffffffffffffda RBX: 00007fa60ba29f80 RCX: 00007fa60b89a43c [ 903.075081][T29794] RDX: 000000000000000f RSI: 00007fa60a51b0b0 RDI: 0000000000000007 [ 903.082984][T29794] RBP: 00007fa60a51b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 903.090791][T29794] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 903.098604][T29794] R13: 000000000000000b R14: 00007fa60ba29f80 R15: 00007ffe3dfbf298 [ 903.128295][T29796] device syzkaller0 entered promiscuous mode [ 906.188308][T29862] device syzkaller0 entered promiscuous mode [ 907.335445][T29873] device veth0_vlan left promiscuous mode [ 907.470998][T29873] device veth0_vlan entered promiscuous mode [ 907.616421][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 907.625566][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 907.637937][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 907.896579][T29875] device wg2 entered promiscuous mode [ 908.453883][T29896] device syzkaller0 entered promiscuous mode [ 909.068892][T29908] device syzkaller0 entered promiscuous mode [ 909.811568][T29942] device syzkaller0 entered promiscuous mode [ 910.605555][T29965] device syzkaller0 entered promiscuous mode [ 911.096771][T29984] device syzkaller0 entered promiscuous mode [ 911.533364][T30004] FAULT_INJECTION: forcing a failure. [ 911.533364][T30004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 911.586159][T30004] CPU: 0 PID: 30004 Comm: syz.2.9108 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 911.597341][T30004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 911.607221][T30004] Call Trace: [ 911.610360][T30004] dump_stack_lvl+0x1e2/0x24b [ 911.614869][T30004] ? bfq_pos_tree_add_move+0x43b/0x43b [ 911.620170][T30004] ? proc_fail_nth_write+0x20b/0x290 [ 911.625293][T30004] ? security_file_permission+0x86/0xb0 [ 911.630672][T30004] dump_stack+0x15/0x17 [ 911.634674][T30004] should_fail+0x3c6/0x510 [ 911.638920][T30004] should_fail_usercopy+0x1a/0x20 [ 911.643790][T30004] _copy_from_user+0x20/0xd0 [ 911.648271][T30004] tipc_setsockopt+0x31d/0xb80 [ 911.652794][T30004] ? tipc_shutdown+0x950/0x950 [ 911.657395][T30004] ? security_socket_setsockopt+0x82/0xb0 [ 911.662948][T30004] ? tipc_shutdown+0x950/0x950 [ 911.667586][T30004] __sys_setsockopt+0x502/0x870 [ 911.672236][T30004] ? __ia32_sys_recv+0xb0/0xb0 [ 911.676837][T30004] __x64_sys_setsockopt+0xbf/0xd0 [ 911.681693][T30004] do_syscall_64+0x34/0x70 [ 911.685949][T30004] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 911.691675][T30004] RIP: 0033:0x7fb56a50b9f9 [ 911.695929][T30004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 911.715369][T30004] RSP: 002b:00007fb56918b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 911.723613][T30004] RAX: ffffffffffffffda RBX: 00007fb56a699f80 RCX: 00007fb56a50b9f9 [ 911.731433][T30004] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000006 [ 911.739236][T30004] RBP: 00007fb56918b0a0 R08: 0000000020000190 R09: 0000000000000000 [ 911.747060][T30004] R10: 0000000020000180 R11: 0000000000000246 R12: 0000000000000001 [ 911.754874][T30004] R13: 000000000000000b R14: 00007fb56a699f80 R15: 00007ffcf6a8b058 [ 912.523119][T30018] device syzkaller0 entered promiscuous mode [ 912.897518][T30033] device syzkaller0 entered promiscuous mode [ 914.164756][T30065] device sit0 left promiscuous mode [ 914.196746][T30064] device sit0 entered promiscuous mode [ 914.831899][T30077] device syzkaller0 entered promiscuous mode [ 914.924029][T30085] device syzkaller0 entered promiscuous mode [ 915.256069][T30112] device veth1_macvtap left promiscuous mode [ 915.261870][T30112] device macsec0 entered promiscuous mode [ 915.423732][T30110] device sit0 entered promiscuous mode [ 917.723467][T30145] device syzkaller0 entered promiscuous mode [ 918.014173][T30157] syz.2.9153[30157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 918.014231][T30157] syz.2.9153[30157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 918.027693][T30157] syz.2.9153[30157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 920.745136][T30202] device syzkaller0 entered promiscuous mode [ 921.452187][T30210] bridge0: port 2(bridge_slave_1) entered disabled state [ 921.459179][T30210] bridge0: port 1(bridge_slave_0) entered disabled state [ 921.788307][T30219] device pim6reg1 entered promiscuous mode [ 923.084466][T30248] device bridge_slave_1 left promiscuous mode [ 923.101628][T30248] bridge0: port 2(bridge_slave_1) entered disabled state [ 923.206316][T30248] device bridge_slave_0 left promiscuous mode [ 923.212335][T30248] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.134442][T30261] device syzkaller0 entered promiscuous mode [ 928.338879][T30309] bridge0: port 2(bridge_slave_1) entered disabled state [ 928.345919][T30309] bridge0: port 1(bridge_slave_0) entered disabled state [ 928.500881][T30312] device wg2 left promiscuous mode [ 928.513425][T30310] bridge0: port 2(bridge_slave_1) entered blocking state [ 928.522424][T30310] bridge0: port 2(bridge_slave_1) entered forwarding state [ 928.540424][T30310] bridge0: port 1(bridge_slave_0) entered blocking state [ 928.549422][T30310] bridge0: port 1(bridge_slave_0) entered forwarding state [ 928.574421][T30310] device bridge0 entered promiscuous mode [ 928.677290][T30314] device wg2 entered promiscuous mode [ 929.156011][T30325] ªªªªªª: renamed from vlan0 [ 929.567584][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 930.669721][T30379] device syzkaller0 entered promiscuous mode [ 931.290216][T30425] device syzkaller0 entered promiscuous mode [ 931.324677][T30435] device syzkaller0 entered promiscuous mode [ 932.385939][T30473] device syzkaller0 entered promiscuous mode [ 932.477909][T30473] device pim6reg1 entered promiscuous mode [ 932.715123][T30463] bridge0: port 1(bridge_slave_0) entered blocking state [ 932.802068][T30463] bridge0: port 1(bridge_slave_0) entered disabled state [ 932.909037][T30463] device bridge_slave_0 entered promiscuous mode [ 932.966344][T30463] bridge0: port 2(bridge_slave_1) entered blocking state [ 932.979424][T30463] bridge0: port 2(bridge_slave_1) entered disabled state [ 933.003784][T30463] device bridge_slave_1 entered promiscuous mode [ 933.039392][ T343] device bridge_slave_1 left promiscuous mode [ 933.045324][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 933.058375][ T343] device bridge_slave_0 left promiscuous mode [ 933.064411][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 933.158558][T30493] device macsec0 left promiscuous mode [ 933.321856][T30494] device veth1_macvtap entered promiscuous mode [ 933.332173][T30494] device macsec0 entered promiscuous mode [ 933.370204][T20581] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 933.445683][T30525] device veth0_vlan left promiscuous mode [ 933.546060][T30525] device veth0_vlan entered promiscuous mode [ 933.726225][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 933.735534][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 933.809427][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 933.912941][T30540] bridge0: port 2(bridge_slave_1) entered disabled state [ 933.919937][T30540] bridge0: port 1(bridge_slave_0) entered disabled state [ 934.234274][T30540] bridge0: port 2(bridge_slave_1) entered blocking state [ 934.243273][T30540] bridge0: port 2(bridge_slave_1) entered forwarding state [ 934.258504][T30540] bridge0: port 1(bridge_slave_0) entered blocking state [ 934.266344][T30540] bridge0: port 1(bridge_slave_0) entered forwarding state [ 934.465253][T30540] device bridge0 entered promiscuous mode [ 934.687020][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 934.694306][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 934.795467][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 934.803948][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 934.812706][T17518] bridge0: port 1(bridge_slave_0) entered blocking state [ 934.819593][T17518] bridge0: port 1(bridge_slave_0) entered forwarding state [ 934.831264][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 934.840048][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 934.848052][T17518] bridge0: port 2(bridge_slave_1) entered blocking state [ 934.854918][T17518] bridge0: port 2(bridge_slave_1) entered forwarding state [ 934.863349][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 934.889992][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 934.900460][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 934.909254][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 934.917831][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 934.945154][T30463] device veth0_vlan entered promiscuous mode [ 934.956788][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 934.964961][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 934.985472][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 935.001706][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 935.022804][T30463] device veth1_macvtap entered promiscuous mode [ 935.054171][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 935.071175][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 935.123290][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 935.207874][ T7498] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 935.381765][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 935.396269][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 935.404349][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 935.413396][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 935.421944][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 937.530150][T30628] ¯Ê®¸}p: renamed from pim6reg1 [ 940.934681][T30689] bridge0: port 2(bridge_slave_1) entered disabled state [ 940.941691][T30689] bridge0: port 1(bridge_slave_0) entered disabled state [ 943.161171][T30717] device syzkaller0 entered promiscuous mode [ 944.623443][T30780] sock: sock_set_timeout: `syz.4.9316' (pid 30780) tries to set negative timeout [ 945.336405][T30815] device pim6reg1 entered promiscuous mode [ 945.859805][T30842] syz.3.9334[30842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 945.859858][T30842] syz.3.9334[30842] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 946.103190][T30842] device syzkaller0 entered promiscuous mode [ 953.099648][T31060] device veth1_to_hsr entered promiscuous mode [ 953.142512][T31063] device syzkaller0 entered promiscuous mode [ 954.992790][T31114] device syzkaller0 entered promiscuous mode [ 955.052107][T31121] device syzkaller0 entered promiscuous mode [ 955.791873][T31141] Q±6ã×\b‹¡Y­4: renamed from lo [ 956.082610][T31177] device veth0_vlan left promiscuous mode [ 956.171788][T31177] device veth0_vlan entered promiscuous mode [ 956.412683][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 956.423048][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 956.435423][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 958.584794][T31231] device vxcan1 entered promiscuous mode [ 963.625780][T31411] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.633527][T31411] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.640944][T31411] device bridge_slave_0 entered promiscuous mode [ 963.647826][T31411] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.655070][T31411] bridge0: port 2(bridge_slave_1) entered disabled state [ 963.662394][T31411] device bridge_slave_1 entered promiscuous mode [ 963.762822][T31411] bridge0: port 2(bridge_slave_1) entered blocking state [ 963.769790][T31411] bridge0: port 2(bridge_slave_1) entered forwarding state [ 963.777031][T31411] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.783879][T31411] bridge0: port 1(bridge_slave_0) entered forwarding state [ 963.814202][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 963.830012][T17523] bridge0: port 1(bridge_slave_0) entered disabled state [ 963.837788][T17523] bridge0: port 2(bridge_slave_1) entered disabled state [ 963.867796][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 963.878752][T17523] bridge0: port 1(bridge_slave_0) entered blocking state [ 963.885598][T17523] bridge0: port 1(bridge_slave_0) entered forwarding state [ 964.016306][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 964.024895][T17523] bridge0: port 2(bridge_slave_1) entered blocking state [ 964.031758][T17523] bridge0: port 2(bridge_slave_1) entered forwarding state [ 964.039342][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 964.047196][T17523] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 964.086620][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 964.112198][T31411] device veth0_vlan entered promiscuous mode [ 964.125564][T31411] device veth1_macvtap entered promiscuous mode [ 964.147871][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 964.162282][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 964.171593][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 964.179715][T17518] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 964.200692][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 964.214105][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 965.553545][T31484] bridge0: port 3(veth0_to_batadv) entered blocking state [ 965.561114][T31484] bridge0: port 3(veth0_to_batadv) entered disabled state [ 965.570287][T31484] device veth0_to_batadv entered promiscuous mode [ 965.578853][T31484] bridge0: port 3(veth0_to_batadv) entered blocking state [ 965.585836][T31484] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 965.599380][T31489] device pim6reg1 entered promiscuous mode [ 965.608357][T31489] syz.2.9529[31489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.608401][T31489] syz.2.9529[31489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.620868][T31489] syz.2.9529[31489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.632561][T31489] syz.2.9529[31489] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 965.822199][T31499] device veth1_macvtap left promiscuous mode [ 969.049106][T31613] syz.0.9567[31613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 969.049188][T31613] syz.0.9567[31613] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 969.123073][T31617] bridge0: port 3(veth0_to_batadv) entered blocking state [ 969.161807][T31611] syz.0.9567[31611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 969.161865][T31611] syz.0.9567[31611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 969.335519][T31617] bridge0: port 3(veth0_to_batadv) entered disabled state [ 969.403063][T31617] device veth0_to_batadv entered promiscuous mode [ 969.409587][T31617] bridge0: port 3(veth0_to_batadv) entered blocking state [ 969.416575][T31617] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 969.620659][T31618] device sit0 entered promiscuous mode [ 971.936103][T31734] device syzkaller0 entered promiscuous mode [ 972.899537][T31763] device veth1_macvtap entered promiscuous mode [ 973.031349][T31763] device macsec0 entered promiscuous mode [ 973.187141][T23659] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 975.779516][T31892] device syzkaller0 entered promiscuous mode [ 979.866208][T31726] syz.2.9594 invoked oom-killer: gfp_mask=0xcc0(GFP_KERNEL), order=0, oom_score_adj=1000 [ 979.878492][T31726] CPU: 1 PID: 31726 Comm: syz.2.9594 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 979.889660][T31726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 979.899560][T31726] Call Trace: [ 979.902690][T31726] dump_stack_lvl+0x1e2/0x24b [ 979.907197][T31726] ? panic+0x812/0x812 [ 979.911100][T31726] ? bfq_pos_tree_add_move+0x43b/0x43b [ 979.916576][T31726] ? ___ratelimit+0x3f7/0x580 [ 979.921086][T31726] ? _raw_spin_lock+0xa4/0x1b0 [ 979.925683][T31726] dump_stack+0x15/0x17 [ 979.929747][T31726] dump_header+0xd8/0x6d0 [ 979.933855][T31726] oom_kill_process+0xef/0x2d0 [ 979.938449][T31726] out_of_memory+0x9bd/0xe10 [ 979.942872][T31726] ? unregister_oom_notifier+0x20/0x20 [ 979.948268][T31726] ? mutex_lock_killable+0xa5/0x110 [ 979.953313][T31726] ? __mutex_lock_interruptible_slowpath+0x10/0x10 [ 979.959647][T31726] ? sched_clock_cpu+0x1b/0x3b0 [ 979.964340][T31726] mem_cgroup_out_of_memory+0x2a8/0x380 [ 979.969717][T31726] ? mem_cgroup_oom_trylock+0x3a0/0x3a0 [ 979.975096][T31726] ? _raw_spin_trylock_bh+0x190/0x190 [ 979.980303][T31726] ? mem_cgroup_oom_trylock+0x22d/0x3a0 [ 979.985682][T31726] try_charge+0xff2/0x15f0 [ 979.989947][T31726] ? __memcg_kmem_charge+0x180/0x180 [ 979.995061][T31726] ? __kasan_check_write+0x14/0x20 [ 980.000008][T31726] ? get_mem_cgroup_from_mm+0x186/0x1a0 [ 980.005450][T31726] __mem_cgroup_charge+0x147/0x6e0 [ 980.010366][T31726] shmem_add_to_page_cache+0x6a9/0x10c0 [ 980.015725][T31726] ? shmem_alloc_page+0x420/0x420 [ 980.020667][T31726] ? _raw_spin_lock_irqsave+0x210/0x210 [ 980.026046][T31726] ? find_lock_entry+0x1df/0x200 [ 980.030817][T31726] shmem_getpage_gfp+0xa65/0x2480 [ 980.035686][T31726] ? iov_iter_advance+0x827/0xb20 [ 980.040541][T31726] ? shmem_getpage+0xa0/0xa0 [ 980.044962][T31726] ? iov_iter_fault_in_readable+0x258/0x4f0 [ 980.050691][T31726] ? __kasan_check_write+0x14/0x20 [ 980.055641][T31726] ? _raw_spin_lock+0xa4/0x1b0 [ 980.060237][T31726] ? _raw_spin_trylock_bh+0x190/0x190 [ 980.065447][T31726] shmem_write_begin+0xca/0x1b0 [ 980.070135][T31726] generic_perform_write+0x2cd/0x570 [ 980.075253][T31726] ? file_remove_privs+0x2af/0x570 [ 980.080223][T31726] ? grab_cache_page_write_begin+0xa0/0xa0 [ 980.085851][T31726] ? file_remove_privs+0x570/0x570 [ 980.090886][T31726] ? __kasan_check_write+0x14/0x20 [ 980.095829][T31726] __generic_file_write_iter+0x23c/0x560 [ 980.101295][T31726] ? generic_write_checks+0x3b9/0x470 [ 980.106504][T31726] generic_file_write_iter+0xaf/0x1c0 [ 980.111707][T31726] __kernel_write+0x5ab/0x9d0 [ 980.116237][T31726] ? vfs_read+0xba0/0xba0 [ 980.120477][T31726] ? cgroup_freezing+0x88/0xb0 [ 980.124996][T31726] ? freezing_slow_path+0x141/0x190 [ 980.130027][T31726] dump_emit+0x261/0x3a0 [ 980.134101][T31726] ? wait_for_dump_helpers+0x3b0/0x3b0 [ 980.139394][T31726] ? dump_user_range+0x12a/0x1a0 [ 980.144164][T31726] ? dump_user_range+0x141/0x1a0 [ 980.148940][T31726] dump_user_range+0x71/0x1a0 [ 980.153495][T31726] elf_core_dump+0x33bd/0x3c10 [ 980.158064][T31726] ? load_elf_binary+0x2750/0x2750 [ 980.163379][T31726] ? __fsnotify_parent+0x5ed/0x6c0 [ 980.168298][T31726] ? _raw_spin_lock+0xa4/0x1b0 [ 980.172899][T31726] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 980.179554][T31726] ? shmem_setattr+0x17e/0x8b0 [ 980.184098][T31726] ? __kasan_check_read+0x11/0x20 [ 980.188954][T31726] ? unshare_files+0x1c5/0x2c0 [ 980.193556][T31726] ? cgroup_freezing+0x88/0xb0 [ 980.198157][T31726] ? freezing_slow_path+0x141/0x190 [ 980.203190][T31726] do_coredump+0x1eb8/0x2d60 [ 980.207619][T31726] ? asm_exc_general_protection+0x1e/0x30 [ 980.213174][T31726] ? simple_acl_create+0x2c0/0x2c0 [ 980.218118][T31726] ? kmem_cache_free+0xa9/0x1e0 [ 980.222800][T31726] ? ____kasan_slab_free+0x12c/0x160 [ 980.227925][T31726] ? kmem_cache_free+0xa9/0x1e0 [ 980.232658][T31726] get_signal+0x102c/0x1410 [ 980.236987][T31726] arch_do_signal_or_restart+0xbd/0x17c0 [ 980.242419][T31726] ? __send_signal+0x8b5/0xb90 [ 980.247021][T31726] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 980.252318][T31726] ? force_sig_info_to_task+0x297/0x320 [ 980.257694][T31726] ? force_sig+0x112/0x1d0 [ 980.261946][T31726] ? send_sig+0x60/0x60 [ 980.265941][T31726] exit_to_user_mode_loop+0x9b/0xd0 [ 980.270974][T31726] irqentry_exit_to_user_mode+0x4e/0x80 [ 980.276355][T31726] irqentry_exit+0x12/0x60 [ 980.280608][T31726] exc_general_protection+0x415/0x490 [ 980.285824][T31726] ? debug_smp_processor_id+0x17/0x20 [ 980.291024][T31726] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 980.296955][T31726] ? asm_exc_general_protection+0x8/0x30 [ 980.302391][T31726] asm_exc_general_protection+0x1e/0x30 [ 980.307771][T31726] RIP: 0033:0x7fb56a50ba01 [ 980.312028][T31726] Code: 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 48 3d 01 f0 ff ff 73 01 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f [ 980.331466][T31726] RSP: 002b:0000000020000270 EFLAGS: 00010217 [ 980.337369][T31726] RAX: 0000000000000000 RBX: 00007fb56a69a058 RCX: 00007fb56a50b9f9 [ 980.345178][T31726] RDX: 00000000200002c0 RSI: 0000000020000270 RDI: 0000000000008000 [ 980.352987][T31726] RBP: 00007fb56a5798ee R08: 0000000020000340 R09: 0000000020000340 [ 980.360801][T31726] R10: 0000000020000300 R11: 0000000000000206 R12: 0000000000000000 [ 980.368612][T31726] R13: 000000000000000b R14: 00007fb56a69a058 R15: 00007ffcf6a8b058 [ 980.376814][T31726] memory: usage 307200kB, limit 307200kB, failcnt 12802 [ 980.383991][T31726] memory+swap: usage 430392kB, limit 9007199254740988kB, failcnt 0 [ 980.391822][T31726] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 [ 980.398606][T31726] Memory cgroup stats for /syz2: [ 980.398729][T31726] anon 270336 [ 980.398729][T31726] file 312508416 [ 980.398729][T31726] kernel_stack 0 [ 980.398729][T31726] percpu 0 [ 980.398729][T31726] sock 0 [ 980.398729][T31726] shmem 312238080 [ 980.398729][T31726] file_mapped 135168 [ 980.398729][T31726] file_dirty 0 [ 980.398729][T31726] file_writeback 0 [ 980.398729][T31726] anon_thp 0 [ 980.398729][T31726] inactive_anon 313843712 [ 980.398729][T31726] active_anon 540672 [ 980.398729][T31726] inactive_file 53248 [ 980.398729][T31726] active_file 200704 [ 980.398729][T31726] unevictable 0 [ 980.398729][T31726] slab_reclaimable 0 [ 980.398729][T31726] slab_unreclaimable 0 [ 980.398729][T31726] slab 0 [ 980.398729][T31726] workingset_refault_anon 33 [ 980.398729][T31726] workingset_refault_file 1485 [ 980.398729][T31726] workingset_activate_anon 0 [ 980.398729][T31726] workingset_activate_file 1254 [ 980.398729][T31726] workingset_restore_anon 0 [ 980.398729][T31726] workingset_restore_file 1122 [ 980.492617][T31726] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=syz2,mems_allowed=0,oom_memcg=/syz2,task_memcg=/syz2,task=syz.2.9594,pid=31720,uid=0 [ 980.507978][T31726] Memory cgroup out of memory: Killed process 31720 (syz.2.9594) total-vm:83060kB, anon-rss:504kB, file-rss:49680kB, shmem-rss:0kB, UID:0 pgtables:172kB oom_score_adj:1000 [ 980.526754][ T27] oom_reaper: reaped process 31720 (syz.2.9594), now anon-rss:0kB, file-rss:47232kB, shmem-rss:0kB [ 981.081388][T31989] syz.4.9673[31989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 981.081441][T31989] syz.4.9673[31989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 981.675370][T31994] device veth1_macvtap left promiscuous mode [ 981.692529][T31994] device macsec0 left promiscuous mode [ 981.997650][T31995] device veth1_macvtap entered promiscuous mode [ 982.085920][T31995] device macsec0 entered promiscuous mode [ 985.188066][T32071] device veth0_vlan left promiscuous mode [ 985.293989][T32071] device veth0_vlan entered promiscuous mode [ 985.618483][T17506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 985.636500][T17506] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 985.643938][T17506] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 985.929945][T32082] device sit0 left promiscuous mode [ 985.982982][T32081] device pim6reg1 entered promiscuous mode [ 986.197436][T32086] device syzkaller0 entered promiscuous mode [ 987.191433][T32102] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.294891][T32102] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.417846][T32102] device bridge_slave_0 entered promiscuous mode [ 987.501121][T32102] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.537447][T32102] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.554567][T32102] device bridge_slave_1 entered promiscuous mode [ 987.967842][T23659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 987.975570][T23659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 988.011000][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 988.031698][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 988.046530][T19643] bridge0: port 1(bridge_slave_0) entered blocking state [ 988.053489][T19643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 988.071566][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 988.079885][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 988.088175][T19643] bridge0: port 2(bridge_slave_1) entered blocking state [ 988.095035][T19643] bridge0: port 2(bridge_slave_1) entered forwarding state [ 988.102416][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 988.110315][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 988.118565][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 988.126536][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 988.152255][T23659] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 988.159820][T23659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 988.168480][T23659] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 988.194066][T32102] device veth0_vlan entered promiscuous mode [ 988.202247][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 988.210573][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 988.218123][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 988.233626][T32102] device veth1_macvtap entered promiscuous mode [ 988.241237][T17506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 988.280576][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 988.289191][T19643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 988.320516][T23659] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 988.328965][T23659] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 988.485507][T32200] device veth1_macvtap left promiscuous mode [ 988.577013][T32207] device veth1_macvtap entered promiscuous mode [ 988.635673][T32207] device macsec0 entered promiscuous mode [ 989.620144][T32258] device syzkaller0 entered promiscuous mode [ 989.659570][T32262] device pim6reg1 entered promiscuous mode [ 990.713943][T32320] FAULT_INJECTION: forcing a failure. [ 990.713943][T32320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 990.728047][T32320] CPU: 1 PID: 32320 Comm: syz.1.9769 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 990.739218][T32320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 990.749111][T32320] Call Trace: [ 990.752247][T32320] dump_stack_lvl+0x1e2/0x24b [ 990.756751][T32320] ? bfq_pos_tree_add_move+0x43b/0x43b [ 990.762039][T32320] ? __check_object_size+0x73/0x3c0 [ 990.767072][T32320] dump_stack+0x15/0x17 [ 990.771067][T32320] should_fail+0x3c6/0x510 [ 990.775318][T32320] should_fail_usercopy+0x1a/0x20 [ 990.780181][T32320] _copy_from_user+0x20/0xd0 [ 990.784709][T32320] __tun_chr_ioctl+0x265/0x2260 [ 990.789324][T32320] ? tun_flow_create+0x320/0x320 [ 990.794070][T32320] ? __fget_files+0x31e/0x380 [ 990.798584][T32320] tun_chr_ioctl+0x2a/0x40 [ 990.802829][T32320] ? tun_chr_poll+0x670/0x670 [ 990.807348][T32320] __se_sys_ioctl+0x114/0x190 [ 990.811860][T32320] __x64_sys_ioctl+0x7b/0x90 [ 990.816288][T32320] do_syscall_64+0x34/0x70 [ 990.820625][T32320] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 990.826352][T32320] RIP: 0033:0x7fa96ba039f9 [ 990.830611][T32320] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 990.850129][T32320] RSP: 002b:00007fa96a683048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 990.858636][T32320] RAX: ffffffffffffffda RBX: 00007fa96bb91f80 RCX: 00007fa96ba039f9 [ 990.866447][T32320] RDX: 0000000020000080 RSI: 00000000400454ca RDI: 0000000000000008 [ 990.874262][T32320] RBP: 00007fa96a6830a0 R08: 0000000000000000 R09: 0000000000000000 [ 990.882069][T32320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 990.889883][T32320] R13: 000000000000000b R14: 00007fa96bb91f80 R15: 00007fffe956fda8 [ 991.996927][T32361] FAULT_INJECTION: forcing a failure. [ 991.996927][T32361] name failslab, interval 1, probability 0, space 0, times 0 [ 992.116801][T32361] CPU: 0 PID: 32361 Comm: syz.4.9782 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 992.127982][T32361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 992.137872][T32361] Call Trace: [ 992.141004][T32361] dump_stack_lvl+0x1e2/0x24b [ 992.145510][T32361] ? panic+0x812/0x812 [ 992.149419][T32361] ? bfq_pos_tree_add_move+0x43b/0x43b [ 992.154709][T32361] ? sched_clock+0x3a/0x40 [ 992.158961][T32361] ? sched_clock_cpu+0x1b/0x3b0 [ 992.163645][T32361] ? sched_clock+0x3a/0x40 [ 992.167902][T32361] dump_stack+0x15/0x17 [ 992.171894][T32361] should_fail+0x3c6/0x510 [ 992.176150][T32361] ? __get_vm_area_node+0x116/0x470 [ 992.181182][T32361] __should_failslab+0xa4/0xe0 [ 992.185787][T32361] should_failslab+0x9/0x20 [ 992.190121][T32361] kmem_cache_alloc_trace+0x3a/0x2e0 [ 992.195242][T32361] __get_vm_area_node+0x116/0x470 [ 992.200102][T32361] ? __get_vm_area_node+0x1/0x470 [ 992.204984][T32361] __vmalloc_node_range+0xdc/0x7c0 [ 992.210091][T32361] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 992.215390][T32361] ? __kasan_check_write+0x14/0x20 [ 992.220333][T32361] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 992.225197][T32361] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 992.230229][T32361] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 992.235610][T32361] __vmalloc+0x7a/0x90 [ 992.239541][T32361] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 992.244900][T32361] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 992.250283][T32361] bpf_prog_alloc+0x21/0x1e0 [ 992.254769][T32361] __get_filter+0xfb/0x430 [ 992.258960][T32361] sk_attach_filter+0x23/0x150 [ 992.263557][T32361] tun_attach+0x35e/0x1560 [ 992.267823][T32361] ? full_name_hash+0x57/0xf0 [ 992.272324][T32361] ? selinux_tun_dev_open+0x10d/0x180 [ 992.277529][T32361] tun_set_iff+0x488/0xdb0 [ 992.281782][T32361] __tun_chr_ioctl+0x8b3/0x2260 [ 992.286469][T32361] ? tun_flow_create+0x320/0x320 [ 992.291242][T32361] ? __fget_files+0x31e/0x380 [ 992.295760][T32361] tun_chr_ioctl+0x2a/0x40 [ 992.300006][T32361] ? tun_chr_poll+0x670/0x670 [ 992.304522][T32361] __se_sys_ioctl+0x114/0x190 [ 992.309033][T32361] __x64_sys_ioctl+0x7b/0x90 [ 992.313461][T32361] do_syscall_64+0x34/0x70 [ 992.317728][T32361] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 992.323527][T32361] RIP: 0033:0x7fa60b89b9f9 [ 992.327784][T32361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 992.347222][T32361] RSP: 002b:00007fa60a51b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 992.355476][T32361] RAX: ffffffffffffffda RBX: 00007fa60ba29f80 RCX: 00007fa60b89b9f9 [ 992.363278][T32361] RDX: 0000000020000080 RSI: 00000000400454ca RDI: 0000000000000008 [ 992.371090][T32361] RBP: 00007fa60a51b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 992.378901][T32361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 992.386713][T32361] R13: 000000000000000b R14: 00007fa60ba29f80 R15: 00007ffe3dfbf298 [ 992.399141][T32361] syz.4.9782: vmalloc: allocation failure: 4096 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 992.476154][T32361] CPU: 1 PID: 32361 Comm: syz.4.9782 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 992.487331][T32361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 992.497222][T32361] Call Trace: [ 992.500379][T32361] dump_stack_lvl+0x1e2/0x24b [ 992.504954][T32361] ? wake_up_klogd+0xb8/0xf0 [ 992.509301][T32361] ? bfq_pos_tree_add_move+0x43b/0x43b [ 992.514649][T32361] ? __rcu_read_unlock+0x34/0x90 [ 992.519372][T32361] dump_stack+0x15/0x17 [ 992.523358][T32361] warn_alloc+0x21a/0x390 [ 992.527518][T32361] ? __get_vm_area_node+0x116/0x470 [ 992.532572][T32361] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 992.537941][T32361] ? __get_vm_area_node+0x34b/0x470 [ 992.543241][T32361] ? __get_vm_area_node+0x1/0x470 [ 992.548111][T32361] __vmalloc_node_range+0x287/0x7c0 [ 992.553130][T32361] ? __kasan_check_write+0x14/0x20 [ 992.558082][T32361] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 992.562935][T32361] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 992.567972][T32361] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 992.573356][T32361] __vmalloc+0x7a/0x90 [ 992.577258][T32361] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 992.582642][T32361] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 992.587849][T32361] bpf_prog_alloc+0x21/0x1e0 [ 992.592267][T32361] __get_filter+0xfb/0x430 [ 992.596540][T32361] sk_attach_filter+0x23/0x150 [ 992.601127][T32361] tun_attach+0x35e/0x1560 [ 992.605391][T32361] ? full_name_hash+0x57/0xf0 [ 992.609893][T32361] ? selinux_tun_dev_open+0x10d/0x180 [ 992.615106][T32361] tun_set_iff+0x488/0xdb0 [ 992.619357][T32361] __tun_chr_ioctl+0x8b3/0x2260 [ 992.624042][T32361] ? tun_flow_create+0x320/0x320 [ 992.628813][T32361] ? __fget_files+0x31e/0x380 [ 992.633369][T32361] tun_chr_ioctl+0x2a/0x40 [ 992.637580][T32361] ? tun_chr_poll+0x670/0x670 [ 992.642092][T32361] __se_sys_ioctl+0x114/0x190 [ 992.646604][T32361] __x64_sys_ioctl+0x7b/0x90 [ 992.651031][T32361] do_syscall_64+0x34/0x70 [ 992.655290][T32361] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 992.661183][T32361] RIP: 0033:0x7fa60b89b9f9 [ 992.665444][T32361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 992.684885][T32361] RSP: 002b:00007fa60a51b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 992.693130][T32361] RAX: ffffffffffffffda RBX: 00007fa60ba29f80 RCX: 00007fa60b89b9f9 [ 992.701022][T32361] RDX: 0000000020000080 RSI: 00000000400454ca RDI: 0000000000000008 [ 992.708920][T32361] RBP: 00007fa60a51b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 992.716733][T32361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 992.724554][T32361] R13: 000000000000000b R14: 00007fa60ba29f80 R15: 00007ffe3dfbf298 [ 993.096444][T32361] Mem-Info: [ 993.104416][T32361] active_anon:118 inactive_anon:30129 isolated_anon:0 [ 993.104416][T32361] active_file:23499 inactive_file:3278 isolated_file:0 [ 993.104416][T32361] unevictable:0 dirty:218 writeback:0 [ 993.104416][T32361] slab_reclaimable:7937 slab_unreclaimable:79007 [ 993.104416][T32361] mapped:28681 shmem:1230 pagetables:608 bounce:0 [ 993.104416][T32361] free:1538936 free_pcp:929 free_cma:0 [ 993.198582][T32361] Node 0 active_anon:472kB inactive_anon:121316kB active_file:93996kB inactive_file:13112kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114724kB dirty:872kB writeback:0kB shmem:5720kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:6496kB all_unreclaimable? no [ 993.274073][T32361] DMA32 free:2981840kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984772kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2932kB local_pcp:1488kB free_cma:0kB [ 993.337430][T32361] lowmem_reserve[]: 0 3941 3941 [ 993.342327][T32361] Normal free:3172140kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:472kB inactive_anon:122316kB active_file:93996kB inactive_file:13112kB unevictable:0kB writepending:872kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2432kB bounce:0kB free_pcp:832kB local_pcp:444kB free_cma:0kB [ 993.373033][T32361] lowmem_reserve[]: 0 0 0 [ 993.377558][T32361] DMA32: 6*4kB (UM) 3*8kB (M) 4*16kB (M) 7*32kB (UM) 8*64kB (UM) 7*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2981840kB [ 993.394101][T32361] Normal: 8*4kB (E) 325*8kB (UME) 673*16kB (ME) 635*32kB (UM) 586*64kB (UM) 354*128kB (UME) 143*256kB (UM) 73*512kB (UME) 35*1024kB (UM) 16*2048kB (UM) 711*4096kB (UM) = 3171384kB [ 993.412420][T32361] 28682 total pagecache pages [ 993.417055][T32361] 0 pages in swap cache [ 993.421033][T32361] Swap cache stats: add 32001, delete 32001, find 133/155 [ 993.428136][T32361] Free swap = 124644kB [ 993.432229][T32361] Total swap = 124996kB [ 993.436190][T32361] 2097051 pages RAM [ 993.439788][T32361] 0 pages HighMem/MovableOnly [ 993.444252][T32361] 341894 pages reserved [ 993.448296][T32361] 0 pages cma reserved [ 993.527164][T32380] syz.2.9788[32380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 993.527200][T32380] syz.2.9788[32380] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 993.541092][T32381] syz.2.9788[32381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 993.542555][T32383] : renamed from ipvlan1 [ 993.553445][T32381] syz.2.9788[32381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 994.527556][T32459] device sit0 entered promiscuous mode [ 994.619137][T32465] device veth1_macvtap left promiscuous mode [ 994.974790][T32482] device pim6reg1 entered promiscuous mode [ 995.917560][T32525] device sit0 left promiscuous mode [ 995.935005][T32525] device sit0 entered promiscuous mode [ 1002.116281][T32720] device syzkaller0 entered promiscuous mode [ 1002.152633][T32731] device pim6reg1 entered promiscuous mode [ 1002.162960][T32727] bridge0: port 3(veth0_to_batadv) entered blocking state [ 1002.170021][T32727] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1002.178225][T32727] device veth0_to_batadv entered promiscuous mode [ 1002.185392][T32727] bridge0: port 3(veth0_to_batadv) entered blocking state [ 1002.192374][T32727] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 1016.431578][ T24] audit: type=1400 audit(1722860620.849:182): avc: denied { create } for pid=626 comm="syz.2.9975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 1016.441600][ T623] device syzkaller0 entered promiscuous mode [ 1018.355597][ T734] syz.0.9999[734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1018.355651][ T734] syz.0.9999[734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1018.577956][ T749] syz.1.10002[749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1019.170521][ T748] device pim6reg1 entered promiscuous mode [ 1021.126107][ T808] device vxcan1 entered promiscuous mode [ 1021.517956][ T817] device syzkaller0 entered promiscuous mode [ 1031.172455][ T973] device macsec0 left promiscuous mode [ 1031.323705][ T24] audit: type=1400 audit(1722860635.739:183): avc: denied { create } for pid=982 comm="syz.0.10065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 1034.315192][ T1022] device syzkaller0 entered promiscuous mode [ 1034.438698][ T1037] device veth0_vlan left promiscuous mode [ 1034.444543][ T1037] device veth0_vlan entered promiscuous mode [ 1034.464325][T32664] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1034.473139][T32664] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1034.482480][T32664] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1034.826585][ T1067] bridge_slave_0: mtu greater than device maximum [ 1038.378407][ T1198] device wg2 left promiscuous mode [ 1038.612488][ T1202] device syzkaller0 entered promiscuous mode [ 1039.678038][ T1215] ¯Ê®¸}p: renamed from pim6reg1 [ 1040.570586][ T1225] device veth0_to_batadv left promiscuous mode [ 1040.671916][ T1225] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1041.997941][ T1266] ¯Ê®¸}p: renamed from pim6reg1 [ 1045.072399][ T1317] ¯Ê®¸}p: renamed from pim6reg1 [ 1045.528060][ T1326] device syzkaller0 entered promiscuous mode [ 1045.656561][ T1333] device sit0 left promiscuous mode [ 1045.695587][ T1340] bridge0: port 2(bridge_slave_1) entered blocking state [ 1045.702478][ T1340] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1045.709582][ T1340] bridge0: port 1(bridge_slave_0) entered blocking state [ 1045.716438][ T1340] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1045.725084][ T1340] device bridge0 entered promiscuous mode [ 1046.278039][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1047.330648][ T1377] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1047.337671][ T1377] bridge0: port 2(bridge_slave_1) entered disabled state [ 1047.344516][ T1377] bridge0: port 1(bridge_slave_0) entered disabled state [ 1047.352839][ T1377] device bridge0 left promiscuous mode [ 1047.359264][ T1379] bridge0: port 3(veth0_to_batadv) entered blocking state [ 1047.366222][ T1379] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 1047.373378][ T1379] bridge0: port 2(bridge_slave_1) entered blocking state [ 1047.380203][ T1379] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1047.387374][ T1379] bridge0: port 1(bridge_slave_0) entered blocking state [ 1047.394145][ T1379] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1047.409981][ T1379] device bridge0 entered promiscuous mode [ 1047.888136][ T1407] FAULT_INJECTION: forcing a failure. [ 1047.888136][ T1407] name failslab, interval 1, probability 0, space 0, times 0 [ 1047.937538][ T1407] CPU: 0 PID: 1407 Comm: syz.1.10183 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1047.948710][ T1407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1047.958604][ T1407] Call Trace: [ 1047.961740][ T1407] dump_stack_lvl+0x1e2/0x24b [ 1047.966338][ T1407] ? panic+0x812/0x812 [ 1047.970239][ T1407] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1047.975529][ T1407] dump_stack+0x15/0x17 [ 1047.979523][ T1407] should_fail+0x3c6/0x510 [ 1047.983778][ T1407] ? __alloc_file+0x29/0x330 [ 1047.988203][ T1407] __should_failslab+0xa4/0xe0 [ 1047.992812][ T1407] should_failslab+0x9/0x20 [ 1047.997139][ T1407] kmem_cache_alloc+0x3d/0x2e0 [ 1048.001745][ T1407] ? _raw_spin_lock+0xa4/0x1b0 [ 1048.006339][ T1407] __alloc_file+0x29/0x330 [ 1048.010590][ T1407] ? alloc_empty_file+0x42/0x180 [ 1048.015367][ T1407] alloc_empty_file+0x95/0x180 [ 1048.019968][ T1407] alloc_file+0x5a/0x4e0 [ 1048.024048][ T1407] alloc_file_pseudo+0x259/0x2f0 [ 1048.028822][ T1407] ? alloc_empty_file_noaccount+0x80/0x80 [ 1048.034378][ T1407] anon_inode_getfile+0xa7/0x180 [ 1048.039153][ T1407] __se_sys_perf_event_open+0xfe4/0x3c30 [ 1048.044616][ T1407] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1048.050085][ T1407] ? __ia32_sys_read+0x90/0x90 [ 1048.054685][ T1407] __x64_sys_perf_event_open+0xbf/0xd0 [ 1048.059977][ T1407] do_syscall_64+0x34/0x70 [ 1048.064230][ T1407] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1048.069958][ T1407] RIP: 0033:0x7fa96ba039f9 [ 1048.074214][ T1407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1048.093650][ T1407] RSP: 002b:00007fa96a683048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1048.101895][ T1407] RAX: ffffffffffffffda RBX: 00007fa96bb91f80 RCX: 00007fa96ba039f9 [ 1048.109705][ T1407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 1048.117518][ T1407] RBP: 00007fa96a6830a0 R08: 0000000000000000 R09: 0000000000000000 [ 1048.125327][ T1407] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1048.133146][ T1407] R13: 000000000000000b R14: 00007fa96bb91f80 R15: 00007fffe956fda8 [ 1048.727000][ T1420] device pim6reg1 entered promiscuous mode [ 1049.553373][ T1431] bridge0: port 2(bridge_slave_1) entered disabled state [ 1049.560362][ T1431] bridge0: port 1(bridge_slave_0) entered disabled state [ 1049.731728][ T1432] bridge0: port 2(bridge_slave_1) entered blocking state [ 1049.738587][ T1432] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1049.745697][ T1432] bridge0: port 1(bridge_slave_0) entered blocking state [ 1049.752488][ T1432] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1049.959102][ T1432] device bridge0 entered promiscuous mode [ 1050.264142][ T1443] FAULT_INJECTION: forcing a failure. [ 1050.264142][ T1443] name failslab, interval 1, probability 0, space 0, times 0 [ 1050.331202][ T1443] CPU: 0 PID: 1443 Comm: syz.0.10196 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1050.342377][ T1443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1050.352266][ T1443] Call Trace: [ 1050.355400][ T1443] dump_stack_lvl+0x1e2/0x24b [ 1050.359909][ T1443] ? panic+0x812/0x812 [ 1050.363821][ T1443] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1050.369111][ T1443] ? sched_clock+0x3a/0x40 [ 1050.373364][ T1443] ? sched_clock_cpu+0x1b/0x3b0 [ 1050.378050][ T1443] ? sched_clock+0x3a/0x40 [ 1050.382303][ T1443] dump_stack+0x15/0x17 [ 1050.386292][ T1443] should_fail+0x3c6/0x510 [ 1050.390548][ T1443] ? __alloc_file+0x29/0x330 [ 1050.394979][ T1443] __should_failslab+0xa4/0xe0 [ 1050.399573][ T1443] should_failslab+0x9/0x20 [ 1050.403909][ T1443] kmem_cache_alloc+0x3d/0x2e0 [ 1050.408515][ T1443] ? _raw_spin_lock+0xa4/0x1b0 [ 1050.413115][ T1443] __alloc_file+0x29/0x330 [ 1050.417364][ T1443] ? alloc_empty_file+0x42/0x180 [ 1050.422139][ T1443] alloc_empty_file+0x95/0x180 [ 1050.426740][ T1443] alloc_file+0x5a/0x4e0 [ 1050.430824][ T1443] alloc_file_pseudo+0x259/0x2f0 [ 1050.435593][ T1443] ? alloc_empty_file_noaccount+0x80/0x80 [ 1050.441150][ T1443] anon_inode_getfile+0xa7/0x180 [ 1050.445922][ T1443] __se_sys_perf_event_open+0xfe4/0x3c30 [ 1050.451395][ T1443] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1050.456855][ T1443] ? hrtimer_interrupt+0x6a8/0x8b0 [ 1050.461810][ T1443] ? debug_smp_processor_id+0x17/0x20 [ 1050.467020][ T1443] __x64_sys_perf_event_open+0xbf/0xd0 [ 1050.472310][ T1443] do_syscall_64+0x34/0x70 [ 1050.476566][ T1443] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1050.482284][ T1443] RIP: 0033:0x7f6dbe8509f9 [ 1050.486540][ T1443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1050.505989][ T1443] RSP: 002b:00007f6dbd4d0048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1050.514228][ T1443] RAX: ffffffffffffffda RBX: 00007f6dbe9def80 RCX: 00007f6dbe8509f9 [ 1050.522040][ T1443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000380 [ 1050.529849][ T1443] RBP: 00007f6dbd4d00a0 R08: 0000000000000000 R09: 0000000000000000 [ 1050.537661][ T1443] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1050.545472][ T1443] R13: 000000000000000b R14: 00007f6dbe9def80 R15: 00007ffc4e32e198 [ 1051.996955][ T1471] device sit0 entered promiscuous mode [ 1055.399034][ T1525] device pim6reg1 entered promiscuous mode [ 1055.841401][ T1532] syz.1.10221[1532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1055.841454][ T1532] syz.1.10221[1532] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1060.881841][ T1537] bridge0: port 1(bridge_slave_0) entered blocking state [ 1060.943443][ T1537] bridge0: port 1(bridge_slave_0) entered disabled state [ 1060.951114][ T1537] device bridge_slave_0 entered promiscuous mode [ 1061.474972][ T1537] bridge0: port 2(bridge_slave_1) entered blocking state [ 1061.516207][ T1537] bridge0: port 2(bridge_slave_1) entered disabled state [ 1061.554206][ T1537] device bridge_slave_1 entered promiscuous mode [ 1062.608267][T32667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1062.615543][T32667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1062.766669][T32670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1062.775169][T32670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1062.981574][T32670] bridge0: port 1(bridge_slave_0) entered blocking state [ 1062.988453][T32670] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1062.996011][T32670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1063.004271][T32670] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1063.012579][T32670] bridge0: port 2(bridge_slave_1) entered blocking state [ 1063.019428][T32670] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1063.026863][T32670] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1063.034761][T32670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1063.042821][T32670] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1063.051361][T32670] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1063.131277][ T1565] device sit0 entered promiscuous mode [ 1063.673506][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1063.681109][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1063.689635][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1063.704948][ T1537] device veth0_vlan entered promiscuous mode [ 1063.767796][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1063.775660][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1063.909375][ T1537] device veth1_macvtap entered promiscuous mode [ 1063.916185][T32667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1063.923547][T32667] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1064.116492][T32667] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1064.124499][T32667] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1064.397354][T32667] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1064.633435][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1064.675588][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1064.927256][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1065.126311][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1067.268247][ T1625] device sit0 entered promiscuous mode [ 1068.507968][ T7] device veth0_to_batadv left promiscuous mode [ 1068.521715][ T7] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1068.629996][ T7] device bridge_slave_1 left promiscuous mode [ 1068.731761][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1068.846334][ T7] device bridge_slave_0 left promiscuous mode [ 1068.897981][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1069.869190][ T1684] device sit0 left promiscuous mode [ 1069.933473][ T1684] device sit0 entered promiscuous mode [ 1075.264178][ T1885] bridge0: port 1(bridge_slave_0) entered blocking state [ 1075.385982][ T1885] bridge0: port 1(bridge_slave_0) entered disabled state [ 1075.476293][ T1885] device bridge_slave_0 entered promiscuous mode [ 1075.756370][ T1885] bridge0: port 2(bridge_slave_1) entered blocking state [ 1075.770584][ T1885] bridge0: port 2(bridge_slave_1) entered disabled state [ 1075.798504][ T1885] device bridge_slave_1 entered promiscuous mode [ 1076.289829][T17505] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1076.297342][T17505] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1076.364314][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1076.372508][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1076.380745][T17510] bridge0: port 1(bridge_slave_0) entered blocking state [ 1076.387591][T17510] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1076.395373][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1076.403698][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1076.411921][T17510] bridge0: port 2(bridge_slave_1) entered blocking state [ 1076.418768][T17510] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1076.596545][ T110] device bridge_slave_1 left promiscuous mode [ 1076.602483][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 1076.635727][ T110] device bridge_slave_0 left promiscuous mode [ 1076.645947][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 1076.777886][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1076.785603][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1076.794012][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1076.826407][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1076.834586][T17510] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1077.009792][ T1885] device veth0_vlan entered promiscuous mode [ 1077.015963][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1077.023665][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1077.032716][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1077.040396][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1077.103048][ T1885] device veth1_macvtap entered promiscuous mode [ 1077.197200][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1077.205284][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1077.218124][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1077.233325][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1077.311532][T17504] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1077.865392][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1077.904197][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1078.230939][ T1964] device sit0 entered promiscuous mode [ 1078.425020][ T1969] device veth1_macvtap left promiscuous mode [ 1078.595872][ T1969] device macsec0 entered promiscuous mode [ 1079.664646][ T2002] device syzkaller0 entered promiscuous mode [ 1080.812217][ T2027] syz.1.10336[2027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1080.812265][ T2027] syz.1.10336[2027] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1081.679959][ T2040] device pim6reg1 entered promiscuous mode [ 1083.256098][ T2064] device veth0_vlan left promiscuous mode [ 1083.312592][ T2064] device veth0_vlan entered promiscuous mode [ 1083.427073][T17508] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1083.435134][T17508] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1083.546518][T17508] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1083.571626][ T2073] syz.0.10347[2073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1083.571687][ T2073] syz.0.10347[2073] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1084.071070][ T2088] syz.4.10350[2088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1084.251627][ T2088] syz.4.10350[2088] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1086.564278][ T2157] bridge0: port 1(bridge_slave_0) entered disabled state [ 1086.585092][ T2158] bridge0: port 1(bridge_slave_0) entered blocking state [ 1086.591964][ T2158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1091.311431][ T2261] device pim6reg1 entered promiscuous mode [ 1091.556412][ T2270] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 1095.485715][ T2371] device syzkaller0 entered promiscuous mode [ 1099.880247][ T2481] device vxcan1 entered promiscuous mode [ 1100.324208][ T2499] device syzkaller0 entered promiscuous mode [ 1100.409439][ T2504] device sit0 left promiscuous mode [ 1100.469322][ T2511] device sit0 entered promiscuous mode [ 1111.030833][ T2902] device pim6reg1 entered promiscuous mode [ 1111.936414][ T2937] device sit0 left promiscuous mode [ 1112.023348][ T2937] device sit0 entered promiscuous mode [ 1113.772897][ T3001] syz.4.10625[3001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1113.772953][ T3001] syz.4.10625[3001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1113.829832][ T3001] syz.4.10625[3001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1113.848783][ T3001] syz.4.10625[3001] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1114.345039][ T3036] device veth1_macvtap left promiscuous mode [ 1114.517110][ T3036] device macsec0 entered promiscuous mode [ 1114.565142][ T3036] device veth1_macvtap entered promiscuous mode [ 1114.874343][ T24] audit: type=1400 audit(1722860719.289:184): avc: denied { create } for pid=3052 comm="syz.2.10643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1115.340274][ T3087] device syzkaller0 entered promiscuous mode [ 1115.735916][ T3104] device pim6reg1 entered promiscuous mode [ 1116.067499][ T3115] device sit0 left promiscuous mode [ 1116.114484][ T3115] device sit0 entered promiscuous mode [ 1117.234226][ T3164] syz.0.10673[3164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1117.234271][ T3164] syz.0.10673[3164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1118.967803][ T3225] device syzkaller0 entered promiscuous mode [ 1119.102067][ T3229] device syzkaller0 entered promiscuous mode [ 1120.279328][ T3275] device pim6reg1 entered promiscuous mode [ 1121.000923][ T3294] device syzkaller0 entered promiscuous mode [ 1122.156126][ T3319] device veth0_vlan left promiscuous mode [ 1122.341484][ T3319] device veth0_vlan entered promiscuous mode [ 1122.501771][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1122.511089][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1122.520211][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1122.529157][ T3329] device pim6reg1 entered promiscuous mode [ 1123.140100][ T3344] device syzkaller0 entered promiscuous mode [ 1125.447698][ T3390] bridge0: port 1(bridge_slave_0) entered blocking state [ 1125.454543][ T3390] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.688062][ T3390] device bridge_slave_0 entered promiscuous mode [ 1125.798121][ T3390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1125.818401][ T3390] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.825809][ T3390] device bridge_slave_1 entered promiscuous mode [ 1125.875577][ T3390] bridge0: port 2(bridge_slave_1) entered blocking state [ 1125.882450][ T3390] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1125.889560][ T3390] bridge0: port 1(bridge_slave_0) entered blocking state [ 1125.896328][ T3390] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1126.126880][T17525] bridge0: port 1(bridge_slave_0) entered disabled state [ 1126.148126][T17525] bridge0: port 2(bridge_slave_1) entered disabled state [ 1126.217638][T17525] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1126.264473][T17525] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1126.283308][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1126.291625][T17507] bridge0: port 1(bridge_slave_0) entered blocking state [ 1126.298491][T17507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1126.400477][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1126.463459][T17507] bridge0: port 2(bridge_slave_1) entered blocking state [ 1126.470415][T17507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1126.569917][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1126.587980][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1126.611783][ T2597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1126.623406][ T2597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1126.681288][ T3390] device veth0_vlan entered promiscuous mode [ 1126.688505][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1126.696558][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1126.714252][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1126.722224][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1126.730166][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1126.738973][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1126.748771][ T3390] device veth1_macvtap entered promiscuous mode [ 1126.851460][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1126.886345][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1126.908712][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1127.035417][ T2597] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1127.076760][ T2597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1127.627859][ T3444] device syzkaller0 entered promiscuous mode [ 1128.040251][ T3466] device veth0_vlan left promiscuous mode [ 1128.208588][ T3466] device veth0_vlan entered promiscuous mode [ 1128.608681][ T3479] device pim6reg1 entered promiscuous mode [ 1129.889801][ T3525] device veth0_vlan left promiscuous mode [ 1129.965910][ T3525] device veth0_vlan entered promiscuous mode [ 1130.244695][T17519] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1130.253294][T17519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1130.260903][T17519] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1130.531842][ T3542] geneve1: tun_chr_ioctl cmd 1074025698 [ 1132.002957][ T3564] device syzkaller0 entered promiscuous mode [ 1133.774708][ T3605] device syzkaller0 entered promiscuous mode [ 1137.366566][ T3752] syz.2.10845[3752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1137.366624][ T3752] syz.2.10845[3752] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1137.866541][ T3755] bridge0: port 2(bridge_slave_1) entered disabled state [ 1137.884809][ T3755] bridge0: port 1(bridge_slave_0) entered disabled state [ 1146.153285][ T3982] device syzkaller0 entered promiscuous mode [ 1148.799043][ T4048] syz.2.10930[4048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1148.799074][ T4049] syz.2.10930[4049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1148.799080][ T4048] syz.2.10930[4048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1148.862785][ T4050] syz.2.10930[4050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1148.903679][ T4050] syz.2.10930[4050] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1151.226010][ T4109] bridge0: port 1(bridge_slave_0) entered blocking state [ 1151.255758][ T4109] bridge0: port 1(bridge_slave_0) entered disabled state [ 1151.263176][ T4109] device bridge_slave_0 entered promiscuous mode [ 1151.389304][ T4109] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.396167][ T4109] bridge0: port 2(bridge_slave_1) entered disabled state [ 1151.403462][ T4109] device bridge_slave_1 entered promiscuous mode [ 1151.847352][ T4109] bridge0: port 2(bridge_slave_1) entered blocking state [ 1151.854209][ T4109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1151.861492][ T4109] bridge0: port 1(bridge_slave_0) entered blocking state [ 1151.868328][ T4109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1152.039726][ T4106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1152.049172][ T4106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1152.076511][ T4106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1152.106206][ T4106] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1152.616347][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1152.626974][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1152.709503][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1152.738674][T32671] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1152.968869][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1152.978152][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1152.986584][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1152.994614][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1153.035181][ T4109] device veth0_vlan entered promiscuous mode [ 1153.106452][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1153.114018][T32672] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1153.192788][ T4109] device veth1_macvtap entered promiscuous mode [ 1153.208415][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1153.244345][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1153.338584][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1153.407561][ T4180] device sit0 left promiscuous mode [ 1153.457048][T32673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1153.523399][T32673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1153.595703][T32673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1153.670764][T32673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1153.751351][ T4182] device sit0 entered promiscuous mode [ 1157.305857][ T4284] device sit0 left promiscuous mode [ 1158.926869][ T4328] device sit0 left promiscuous mode [ 1159.027957][ T4329] device sit0 entered promiscuous mode [ 1161.125905][ T4386] device sit0 left promiscuous mode [ 1161.752508][ T4386] device sit0 entered promiscuous mode [ 1162.071092][ T4415] device veth0_vlan left promiscuous mode [ 1162.078460][ T4415] device veth0_vlan entered promiscuous mode [ 1162.089999][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1162.104081][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1162.117051][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1162.447142][ T4438] device veth0_vlan left promiscuous mode [ 1162.549400][ T4438] device veth0_vlan entered promiscuous mode [ 1162.840284][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1162.848478][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1162.856083][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1162.881764][ T4441] device syzkaller0 entered promiscuous mode [ 1163.595956][ T4483] device sit0 left promiscuous mode [ 1163.811054][ T4483] device sit0 entered promiscuous mode [ 1164.433012][ T4500] syz.4.11065[4500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1164.433067][ T4500] syz.4.11065[4500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1164.637215][ T4500] syz.4.11065[4500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1164.821506][ T4500] syz.4.11065[4500] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1168.000378][ T4643] device sit0 left promiscuous mode [ 1171.386225][ T4734] device veth1_macvtap left promiscuous mode [ 1171.622982][ T4750] device pim6reg1 entered promiscuous mode [ 1173.473939][ T4824] device syzkaller0 entered promiscuous mode [ 1176.978531][ T4971] bridge0: port 1(bridge_slave_0) entered blocking state [ 1176.985763][ T4971] bridge0: port 1(bridge_slave_0) entered disabled state [ 1176.994167][ T4971] device bridge_slave_0 entered promiscuous mode [ 1177.001720][ T4971] bridge0: port 2(bridge_slave_1) entered blocking state [ 1177.009167][ T4971] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.019527][ T4971] device bridge_slave_1 entered promiscuous mode [ 1177.054414][ T4989] syz.0.11209[4989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1177.054467][ T4989] syz.0.11209[4989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1177.064394][ T4971] bridge0: port 2(bridge_slave_1) entered blocking state [ 1177.083797][ T4971] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1177.090908][ T4971] bridge0: port 1(bridge_slave_0) entered blocking state [ 1177.098046][ T4971] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1177.123238][ T4253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1177.131163][ T4993] syz.0.11209[4993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1177.131242][ T4993] syz.0.11209[4993] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1177.151430][ T4253] bridge0: port 1(bridge_slave_0) entered disabled state [ 1177.170349][ T4253] bridge0: port 2(bridge_slave_1) entered disabled state [ 1177.201170][T23650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1177.216577][T23650] bridge0: port 1(bridge_slave_0) entered blocking state [ 1177.223436][T23650] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1177.286299][T23650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1177.294304][T23650] bridge0: port 2(bridge_slave_1) entered blocking state [ 1177.301156][T23650] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1177.419928][ T4105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1177.518754][ T4105] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1177.528605][ T4105] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1177.657345][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1177.665259][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1177.674300][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1177.793021][ T4971] device veth0_vlan entered promiscuous mode [ 1178.567438][ T4971] device veth1_macvtap entered promiscuous mode [ 1178.580021][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1178.591240][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1178.647180][T32674] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1178.879104][T32675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1178.887549][T32675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1178.896267][T32675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1178.904550][T32675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1180.493422][ T5067] device vxcan1 entered promiscuous mode [ 1181.337167][ T343] device veth0_to_batadv left promiscuous mode [ 1181.343217][ T343] bridge0: port 3(veth0_to_batadv) entered disabled state [ 1181.454463][ T343] device bridge_slave_1 left promiscuous mode [ 1181.513206][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 1181.564394][ T343] device bridge_slave_0 left promiscuous mode [ 1181.659660][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 1181.846748][ T5109] FAULT_INJECTION: forcing a failure. [ 1181.846748][ T5109] name failslab, interval 1, probability 0, space 0, times 0 [ 1181.908897][ T5109] CPU: 0 PID: 5109 Comm: syz.2.11246 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1181.920083][ T5109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1181.929971][ T5109] Call Trace: [ 1181.933106][ T5109] dump_stack_lvl+0x1e2/0x24b [ 1181.937610][ T5109] ? panic+0x812/0x812 [ 1181.941516][ T5109] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1181.946813][ T5109] dump_stack+0x15/0x17 [ 1181.950801][ T5109] should_fail+0x3c6/0x510 [ 1181.955061][ T5109] ? __alloc_file+0x29/0x330 [ 1181.959484][ T5109] __should_failslab+0xa4/0xe0 [ 1181.964085][ T5109] should_failslab+0x9/0x20 [ 1181.968426][ T5109] kmem_cache_alloc+0x3d/0x2e0 [ 1181.973030][ T5109] ? _raw_spin_lock+0xa4/0x1b0 [ 1181.977626][ T5109] __alloc_file+0x29/0x330 [ 1181.981874][ T5109] ? alloc_empty_file+0x42/0x180 [ 1181.986651][ T5109] alloc_empty_file+0x95/0x180 [ 1181.991253][ T5109] alloc_file+0x5a/0x4e0 [ 1181.995332][ T5109] alloc_file_pseudo+0x259/0x2f0 [ 1182.000105][ T5109] ? __kasan_check_write+0x14/0x20 [ 1182.005059][ T5109] ? alloc_empty_file_noaccount+0x80/0x80 [ 1182.010611][ T5109] anon_inode_getfile+0xa7/0x180 [ 1182.015379][ T5109] __se_sys_perf_event_open+0xfe4/0x3c30 [ 1182.020852][ T5109] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1182.026319][ T5109] ? __ia32_sys_read+0x90/0x90 [ 1182.030922][ T5109] __x64_sys_perf_event_open+0xbf/0xd0 [ 1182.036209][ T5109] do_syscall_64+0x34/0x70 [ 1182.040464][ T5109] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1182.046189][ T5109] RIP: 0033:0x7fb56a50b9f9 [ 1182.050443][ T5109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1182.069884][ T5109] RSP: 002b:00007fb56918b048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1182.078131][ T5109] RAX: ffffffffffffffda RBX: 00007fb56a699f80 RCX: 00007fb56a50b9f9 [ 1182.085937][ T5109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 1182.093749][ T5109] RBP: 00007fb56918b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 1182.101563][ T5109] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1182.109375][ T5109] R13: 000000000000000b R14: 00007fb56a699f80 R15: 00007ffcf6a8b058 [ 1182.365570][ T5139] device veth1_macvtap left promiscuous mode [ 1182.545292][ T5141] device veth1_macvtap entered promiscuous mode [ 1182.580412][ T5141] device macsec0 entered promiscuous mode [ 1182.925453][ T5151] FAULT_INJECTION: forcing a failure. [ 1182.925453][ T5151] name failslab, interval 1, probability 0, space 0, times 0 [ 1182.952742][ T5151] CPU: 1 PID: 5151 Comm: syz.0.11261 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1182.963921][ T5151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1182.973809][ T5151] Call Trace: [ 1182.976957][ T5151] dump_stack_lvl+0x1e2/0x24b [ 1182.981460][ T5151] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1182.986747][ T5151] dump_stack+0x15/0x17 [ 1182.990733][ T5151] should_fail+0x3c6/0x510 [ 1182.994997][ T5151] ? security_file_alloc+0x29/0x120 [ 1183.000024][ T5151] __should_failslab+0xa4/0xe0 [ 1183.004620][ T5151] should_failslab+0x9/0x20 [ 1183.008960][ T5151] kmem_cache_alloc+0x3d/0x2e0 [ 1183.013559][ T5151] ? __alloc_file+0x29/0x330 [ 1183.017992][ T5151] security_file_alloc+0x29/0x120 [ 1183.022846][ T5151] __alloc_file+0xbf/0x330 [ 1183.027103][ T5151] alloc_empty_file+0x95/0x180 [ 1183.031699][ T5151] alloc_file+0x5a/0x4e0 [ 1183.035781][ T5151] alloc_file_pseudo+0x259/0x2f0 [ 1183.040555][ T5151] ? __kasan_check_write+0x14/0x20 [ 1183.045501][ T5151] ? alloc_empty_file_noaccount+0x80/0x80 [ 1183.051059][ T5151] anon_inode_getfile+0xa7/0x180 [ 1183.055834][ T5151] __se_sys_perf_event_open+0xfe4/0x3c30 [ 1183.061301][ T5151] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 1183.066769][ T5151] ? __ia32_sys_read+0x90/0x90 [ 1183.071371][ T5151] __x64_sys_perf_event_open+0xbf/0xd0 [ 1183.076659][ T5151] do_syscall_64+0x34/0x70 [ 1183.080913][ T5151] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1183.086637][ T5151] RIP: 0033:0x7f6dbe8509f9 [ 1183.090893][ T5151] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1183.110334][ T5151] RSP: 002b:00007f6dbd4d0048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 1183.118578][ T5151] RAX: ffffffffffffffda RBX: 00007f6dbe9def80 RCX: 00007f6dbe8509f9 [ 1183.126387][ T5151] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 1183.134199][ T5151] RBP: 00007f6dbd4d00a0 R08: 0000000000000000 R09: 0000000000000000 [ 1183.142011][ T5151] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1183.149821][ T5151] R13: 000000000000000b R14: 00007f6dbe9def80 R15: 00007ffc4e32e198 [ 1183.257317][ T5165] FAULT_INJECTION: forcing a failure. [ 1183.257317][ T5165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1183.283622][ T5165] CPU: 0 PID: 5165 Comm: syz.4.11274 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1183.294801][ T5165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1183.304694][ T5165] Call Trace: [ 1183.307827][ T5165] dump_stack_lvl+0x1e2/0x24b [ 1183.312342][ T5165] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1183.317637][ T5165] ? __kasan_record_aux_stack+0xd3/0x100 [ 1183.323105][ T5165] dump_stack+0x15/0x17 [ 1183.327093][ T5165] should_fail+0x3c6/0x510 [ 1183.331345][ T5165] should_fail_usercopy+0x1a/0x20 [ 1183.336206][ T5165] _copy_to_user+0x20/0x90 [ 1183.340459][ T5165] simple_read_from_buffer+0xc7/0x150 [ 1183.345662][ T5165] proc_fail_nth_read+0x1a3/0x210 [ 1183.350520][ T5165] ? proc_fault_inject_write+0x390/0x390 [ 1183.355990][ T5165] ? security_file_permission+0x86/0xb0 [ 1183.361371][ T5165] ? rw_verify_area+0x1c3/0x360 [ 1183.366149][ T5165] ? proc_fault_inject_write+0x390/0x390 [ 1183.371612][ T5165] vfs_read+0x200/0xba0 [ 1183.375602][ T5165] ? __kasan_check_read+0x11/0x20 [ 1183.380465][ T5165] ? kernel_read+0x70/0x70 [ 1183.384716][ T5165] ? __kasan_check_write+0x14/0x20 [ 1183.389667][ T5165] ? mutex_lock+0xa5/0x110 [ 1183.393916][ T5165] ? mutex_trylock+0xa0/0xa0 [ 1183.398345][ T5165] ? __fdget_pos+0x2e7/0x3a0 [ 1183.402772][ T5165] ? ksys_read+0x77/0x2c0 [ 1183.406935][ T5165] ksys_read+0x199/0x2c0 [ 1183.411016][ T5165] ? vfs_write+0xe70/0xe70 [ 1183.415267][ T5165] ? ____fput+0x15/0x20 [ 1183.419264][ T5165] ? debug_smp_processor_id+0x17/0x20 [ 1183.424467][ T5165] __x64_sys_read+0x7b/0x90 [ 1183.428810][ T5165] do_syscall_64+0x34/0x70 [ 1183.433064][ T5165] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1183.438788][ T5165] RIP: 0033:0x7f3d73a8f43c [ 1183.443042][ T5165] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 1183.462481][ T5165] RSP: 002b:00007f3d72710040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1183.470727][ T5165] RAX: ffffffffffffffda RBX: 00007f3d73c1ef80 RCX: 00007f3d73a8f43c [ 1183.478538][ T5165] RDX: 000000000000000f RSI: 00007f3d727100b0 RDI: 0000000000000005 [ 1183.486348][ T5165] RBP: 00007f3d727100a0 R08: 0000000000000000 R09: 0000000000000000 [ 1183.494161][ T5165] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 1183.501971][ T5165] R13: 000000000000000b R14: 00007f3d73c1ef80 R15: 00007ffeea37cbc8 [ 1183.526800][ T5167] device syzkaller0 entered promiscuous mode [ 1183.989045][ T5189] device pim6reg1 entered promiscuous mode [ 1184.313084][ T5197] device macsec0 left promiscuous mode [ 1184.397481][ T5198] device veth1_macvtap entered promiscuous mode [ 1184.415934][ T5198] device macsec0 entered promiscuous mode [ 1184.460770][T32675] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1184.589063][ T343] device bridge_slave_1 left promiscuous mode [ 1184.595054][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 1184.602998][ T343] device bridge_slave_0 left promiscuous mode [ 1184.609072][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 1184.616732][ T343] device veth1_macvtap left promiscuous mode [ 1184.809898][ T5219] device syzkaller0 entered promiscuous mode [ 1187.384466][ T343] device bridge_slave_1 left promiscuous mode [ 1187.403728][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 1187.594836][ T343] device bridge_slave_0 left promiscuous mode [ 1187.668255][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 1187.678773][ T343] device bridge_slave_1 left promiscuous mode [ 1187.688139][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 1187.696599][ T343] device bridge_slave_0 left promiscuous mode [ 1187.796937][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 1187.859062][ T343] device veth1_macvtap left promiscuous mode [ 1187.889864][ T343] device veth1_macvtap left promiscuous mode [ 1187.910756][ T343] device veth1_macvtap left promiscuous mode [ 1187.927387][ T343] device veth0_vlan left promiscuous mode [ 1188.138782][ T5317] device wg2 entered promiscuous mode [ 1188.198239][ T5365] syz.1.11329[5365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1188.198297][ T5365] syz.1.11329[5365] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1188.408011][ T5380] device sit0 left promiscuous mode [ 1188.579357][ T5380] device sit0 entered promiscuous mode [ 1188.921922][ T5391] device syzkaller0 entered promiscuous mode [ 1189.070116][ T5410] device syzkaller0 entered promiscuous mode [ 1189.140790][ T5419] device veth1_macvtap entered promiscuous mode [ 1189.154312][ T5419] device macsec0 entered promiscuous mode [ 1189.182407][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1189.547612][ T5465] device syzkaller0 entered promiscuous mode [ 1190.223959][ T5510] device syzkaller0 entered promiscuous mode [ 1190.320844][ T5522] device syzkaller0 entered promiscuous mode [ 1190.329665][ T5520] device pim6reg1 entered promiscuous mode [ 1191.105400][ T5572] syz.4.11400[5572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1191.105453][ T5572] syz.4.11400[5572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1191.236182][ T5579] FAULT_INJECTION: forcing a failure. [ 1191.236182][ T5579] name failslab, interval 1, probability 0, space 0, times 0 [ 1191.262712][ T5579] CPU: 1 PID: 5579 Comm: syz.0.11402 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1191.273885][ T5579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1191.283784][ T5579] Call Trace: [ 1191.286915][ T5579] dump_stack_lvl+0x1e2/0x24b [ 1191.291424][ T5579] ? panic+0x812/0x812 [ 1191.295323][ T5579] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1191.300624][ T5579] ? avc_has_perm+0x14d/0x400 [ 1191.305135][ T5579] ? memcpy+0x56/0x70 [ 1191.308952][ T5579] dump_stack+0x15/0x17 [ 1191.312941][ T5579] should_fail+0x3c6/0x510 [ 1191.317229][ T5579] ? __alloc_skb+0x80/0x510 [ 1191.321545][ T5579] __should_failslab+0xa4/0xe0 [ 1191.326137][ T5579] should_failslab+0x9/0x20 [ 1191.330481][ T5579] kmem_cache_alloc+0x3d/0x2e0 [ 1191.335081][ T5579] __alloc_skb+0x80/0x510 [ 1191.339249][ T5579] alloc_skb_with_frags+0xa1/0x570 [ 1191.344193][ T5579] ? is_bpf_text_address+0x172/0x190 [ 1191.349314][ T5579] sock_alloc_send_pskb+0x915/0xa50 [ 1191.354341][ T5579] ? sock_kzfree_s+0x60/0x60 [ 1191.358769][ T5579] ? stack_trace_save+0x113/0x1c0 [ 1191.363635][ T5579] tun_get_user+0xe90/0x38f0 [ 1191.368055][ T5579] ? sched_clock_cpu+0x1b/0x3b0 [ 1191.372743][ T5579] ? tun_do_read+0x1f60/0x1f60 [ 1191.377340][ T5579] ? asm_sysvec_call_function_single+0x12/0x20 [ 1191.383334][ T5579] ? __fsnotify_parent+0x194/0x6c0 [ 1191.388279][ T5579] ? avc_policy_seqno+0x1b/0x70 [ 1191.392961][ T5579] ? selinux_file_permission+0x2bb/0x560 [ 1191.398432][ T5579] ? fsnotify_perm+0x67/0x4e0 [ 1191.402946][ T5579] tun_chr_write_iter+0x1a8/0x250 [ 1191.407806][ T5579] vfs_write+0xb4c/0xe70 [ 1191.411884][ T5579] ? kernel_write+0x3d0/0x3d0 [ 1191.416400][ T5579] ? __fdget_pos+0x209/0x3a0 [ 1191.420823][ T5579] ? ksys_write+0x77/0x2c0 [ 1191.425074][ T5579] ksys_write+0x199/0x2c0 [ 1191.429244][ T5579] ? __ia32_sys_read+0x90/0x90 [ 1191.433846][ T5579] ? debug_smp_processor_id+0x17/0x20 [ 1191.439054][ T5579] __x64_sys_write+0x7b/0x90 [ 1191.443482][ T5579] do_syscall_64+0x34/0x70 [ 1191.447819][ T5579] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1191.453544][ T5579] RIP: 0033:0x7f6dbe8509f9 [ 1191.457797][ T5579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1191.477246][ T5579] RSP: 002b:00007f6dbd4d0048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1191.485483][ T5579] RAX: ffffffffffffffda RBX: 00007f6dbe9def80 RCX: 00007f6dbe8509f9 [ 1191.493379][ T5579] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 1191.501189][ T5579] RBP: 00007f6dbd4d00a0 R08: 0000000000000000 R09: 0000000000000000 [ 1191.509001][ T5579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1191.516814][ T5579] R13: 000000000000000b R14: 00007f6dbe9def80 R15: 00007ffc4e32e198 [ 1192.157103][ T5639] FAULT_INJECTION: forcing a failure. [ 1192.157103][ T5639] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1192.170209][ T5639] CPU: 1 PID: 5639 Comm: syz.1.11417 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1192.181297][ T5639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1192.191190][ T5639] Call Trace: [ 1192.194323][ T5639] dump_stack_lvl+0x1e2/0x24b [ 1192.198832][ T5639] ? bfq_pos_tree_add_move+0x43b/0x43b [ 1192.204127][ T5639] dump_stack+0x15/0x17 [ 1192.208115][ T5639] should_fail+0x3c6/0x510 [ 1192.212372][ T5639] should_fail_alloc_page+0x52/0x60 [ 1192.217406][ T5639] __alloc_pages_nodemask+0x1b3/0xaf0 [ 1192.222622][ T5639] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 1192.227997][ T5639] kmalloc_order+0x4c/0x170 [ 1192.232329][ T5639] kmalloc_order_trace+0x18/0x90 [ 1192.237104][ T5639] ? alloc_skb_with_frags+0xa1/0x570 [ 1192.242225][ T5639] __kmalloc_track_caller+0x1dd/0x320 [ 1192.247430][ T5639] ? __alloc_skb+0x80/0x510 [ 1192.251770][ T5639] ? alloc_skb_with_frags+0xa1/0x570 [ 1192.256890][ T5639] __alloc_skb+0xbc/0x510 [ 1192.261062][ T5639] alloc_skb_with_frags+0xa1/0x570 [ 1192.266009][ T5639] ? is_bpf_text_address+0x172/0x190 [ 1192.271132][ T5639] sock_alloc_send_pskb+0x915/0xa50 [ 1192.276164][ T5639] ? sock_kzfree_s+0x60/0x60 [ 1192.280585][ T5639] ? stack_trace_save+0x113/0x1c0 [ 1192.285448][ T5639] ? terminate_walk+0x407/0x4f0 [ 1192.290133][ T5639] ? stack_trace_snprint+0xf0/0xf0 [ 1192.295091][ T5639] tun_get_user+0xe90/0x38f0 [ 1192.299596][ T5639] ? kmem_cache_free+0xa9/0x1e0 [ 1192.304279][ T5639] ? do_sys_openat2+0x1fc/0x710 [ 1192.308970][ T5639] ? _kstrtoull+0x3a0/0x4a0 [ 1192.313308][ T5639] ? tun_do_read+0x1f60/0x1f60 [ 1192.317905][ T5639] ? kstrtouint_from_user+0x20a/0x2a0 [ 1192.323115][ T5639] ? kstrtol_from_user+0x310/0x310 [ 1192.328065][ T5639] ? avc_policy_seqno+0x1b/0x70 [ 1192.332750][ T5639] ? selinux_file_permission+0x2bb/0x560 [ 1192.338219][ T5639] ? fsnotify_perm+0x67/0x4e0 [ 1192.342733][ T5639] tun_chr_write_iter+0x1a8/0x250 [ 1192.347592][ T5639] vfs_write+0xb4c/0xe70 [ 1192.351670][ T5639] ? kernel_write+0x3d0/0x3d0 [ 1192.356189][ T5639] ? __fdget_pos+0x209/0x3a0 [ 1192.360606][ T5639] ? ksys_write+0x77/0x2c0 [ 1192.364862][ T5639] ksys_write+0x199/0x2c0 [ 1192.369034][ T5639] ? __ia32_sys_read+0x90/0x90 [ 1192.373629][ T5639] ? debug_smp_processor_id+0x17/0x20 [ 1192.378846][ T5639] __x64_sys_write+0x7b/0x90 [ 1192.383261][ T5639] do_syscall_64+0x34/0x70 [ 1192.387518][ T5639] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1192.393244][ T5639] RIP: 0033:0x7f4a89d529f9 [ 1192.397498][ T5639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1192.417109][ T5639] RSP: 002b:00007f4a889d2048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1192.425355][ T5639] RAX: ffffffffffffffda RBX: 00007f4a89ee0f80 RCX: 00007f4a89d529f9 [ 1192.433172][ T5639] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 1192.440975][ T5639] RBP: 00007f4a889d20a0 R08: 0000000000000000 R09: 0000000000000000 [ 1192.448876][ T5639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1192.456686][ T5639] R13: 000000000000000b R14: 00007f4a89ee0f80 R15: 00007ffd3e535508 [ 1193.673099][ T5683] device pim6reg1 entered promiscuous mode [ 1194.354493][ T5696] device veth1_macvtap left promiscuous mode [ 1194.360394][ T5696] device macsec0 left promiscuous mode [ 1194.409108][ T5706] device veth1_macvtap entered promiscuous mode [ 1194.417171][ T5706] device macsec0 entered promiscuous mode [ 1194.531295][ T5710] device syzkaller0 entered promiscuous mode [ 1194.792889][ T5721] bridge0: port 1(bridge_slave_0) entered blocking state [ 1194.799856][ T5721] bridge0: port 1(bridge_slave_0) entered disabled state [ 1194.806971][ T5721] device bridge_slave_0 entered promiscuous mode [ 1194.839093][ T5721] bridge0: port 2(bridge_slave_1) entered blocking state [ 1194.874163][ T5721] bridge0: port 2(bridge_slave_1) entered disabled state [ 1195.036521][ T5721] device bridge_slave_1 entered promiscuous mode [ 1196.029062][ T2608] device bridge_slave_1 left promiscuous mode [ 1196.035101][ T2608] bridge0: port 2(bridge_slave_1) entered disabled state [ 1196.126436][ T2608] device bridge_slave_0 left promiscuous mode [ 1196.184886][ T2608] bridge0: port 1(bridge_slave_0) entered disabled state [ 1196.265025][ T2608] device veth1_macvtap left promiscuous mode [ 1196.522672][ T5785] device veth1_macvtap left promiscuous mode [ 1196.533139][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1196.540812][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1196.566793][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1196.574898][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1196.584101][T17507] bridge0: port 1(bridge_slave_0) entered blocking state [ 1196.590959][T17507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1196.599306][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1196.609589][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1196.617879][T17507] bridge0: port 2(bridge_slave_1) entered blocking state [ 1196.624816][T17507] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1196.634320][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1196.642626][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1196.650681][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1196.658902][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1196.675770][ T4106] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1197.188104][ T5787] device syzkaller0 entered promiscuous mode [ 1197.266748][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1197.274974][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1197.287240][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1197.295001][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1197.305110][ T5721] device veth0_vlan entered promiscuous mode [ 1197.568485][ T5804] ªªªªªª: renamed from vlan0 [ 1197.581005][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1197.611404][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1197.636185][ T5721] device veth1_macvtap entered promiscuous mode [ 1197.678217][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1197.687161][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1197.695146][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1197.703168][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1197.711539][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1197.720053][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1197.728710][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1197.898563][ T5820] device syzkaller0 entered promiscuous mode [ 1199.120970][ T5862] device veth1_macvtap left promiscuous mode [ 1199.142827][ T5866] device veth1_macvtap entered promiscuous mode [ 1199.149247][ T5866] device macsec0 entered promiscuous mode [ 1200.695986][ T5913] device macsec0 left promiscuous mode [ 1200.727573][ T5913] device veth1_macvtap entered promiscuous mode [ 1200.734245][ T5913] device macsec0 entered promiscuous mode [ 1200.740844][T17507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1200.814582][ T5923] device syzkaller0 entered promiscuous mode [ 1201.325551][ T5981] device syzkaller0 entered promiscuous mode [ 1202.625312][ T6056] device veth1_macvtap left promiscuous mode [ 1202.642407][ T6056] device macsec0 left promiscuous mode [ 1202.667773][ T6056] device veth1_macvtap entered promiscuous mode [ 1202.695643][ T6056] device macsec0 entered promiscuous mode [ 1203.342101][ T6120] syz.0.11556[6120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1203.342157][ T6120] syz.0.11556[6120] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 1203.437082][ T6136] device veth1_macvtap left promiscuous mode [ 1203.581532][ T6136] device macsec0 left promiscuous mode [ 1203.668468][ T6139] device veth1_macvtap entered promiscuous mode [ 1203.736385][ T6139] device macsec0 entered promiscuous mode [ 1204.193940][ T6161] device veth1_macvtap left promiscuous mode [ 1204.210102][ T6161] device macsec0 left promiscuous mode [ 1204.229906][ T6161] device veth1_macvtap entered promiscuous mode [ 1204.275947][ T6161] device macsec0 entered promiscuous mode [ 1204.638521][ T6203] device veth1_macvtap left promiscuous mode [ 1204.862284][ T6203] device veth1_macvtap entered promiscuous mode [ 1204.869173][ T6203] device macsec0 entered promiscuous mode [ 1205.376072][ T6272] device veth0_vlan left promiscuous mode [ 1205.528048][ T6272] device veth0_vlan entered promiscuous mode [ 1205.856987][T32675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1205.865000][T32675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1205.957443][T32675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1206.835692][ T6315] device pim6reg1 entered promiscuous mode [ 1207.373951][ T6352] device syzkaller0 entered promiscuous mode [ 1209.747244][ T6420] device syzkaller0 entered promiscuous mode [ 1210.708761][ T6462] device pim6reg1 entered promiscuous mode [ 1210.756736][ T6468] device syzkaller0 entered promiscuous mode [ 1210.790714][ T6466] device syzkaller0 entered promiscuous mode [ 1211.591212][ T6519] device veth1_macvtap left promiscuous mode [ 1211.649687][ T6519] device macsec0 left promiscuous mode [ 1211.824202][ T6520] device syzkaller0 entered promiscuous mode [ 1211.925290][ T6521] device veth1_macvtap entered promiscuous mode [ 1212.000781][ T6521] device macsec0 entered promiscuous mode [ 1212.073373][ T6524] device macsec0 left promiscuous mode [ 1212.752177][ T6555] device pim6reg1 entered promiscuous mode [ 1213.547948][ T6576] Â: renamed from pim6reg1 [ 1213.729283][ T6590] device syzkaller0 entered promiscuous mode [ 1213.751199][ T6595] device veth1_macvtap left promiscuous mode [ 1213.757499][ T6595] device macsec0 left promiscuous mode [ 1214.267814][ T6621] device sit0 entered promiscuous mode [ 1215.369946][ T6648] device syzkaller0 entered promiscuous mode [ 1215.649635][ T6678] device pim6reg1 entered promiscuous mode [ 1216.422816][ T6710] device syzkaller0 entered promiscuous mode [ 1216.716932][ T6735] device veth0_vlan left promiscuous mode [ 1216.768166][ T6735] device veth0_vlan entered promiscuous mode [ 1216.990652][ T4253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1216.999735][ T4253] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 1217.030524][ T4253] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1217.498275][ T6781] device syzkaller0 entered promiscuous mode [ 1217.904452][ T6794] device syzkaller0 entered promiscuous mode [ 1218.245380][ T6807] geneve1: tun_chr_ioctl cmd 1074025681 [ 1218.831458][ T6824] ------------[ cut here ]------------ [ 1218.988498][ T6824] kernel BUG at kernel/bpf/arraymap.c:990! [ 1219.053608][ T6824] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 1219.059495][ T6824] CPU: 0 PID: 6824 Comm: syz.3.11751 Tainted: G W 5.10.222-syzkaller-01494-gfd58936f3c1f #0 [ 1219.070677][ T6824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 1219.080686][ T6824] RIP: 0010:prog_array_map_poke_run+0x696/0x6b0 [ 1219.086655][ T6824] Code: 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff 0f 0b e8 da 92 e8 ff <0f> 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f 0b 66 2e 0f 1f 84 00 [ 1219.106096][ T6824] RSP: 0018:ffffc90000f6f790 EFLAGS: 00010293 [ 1219.111996][ T6824] RAX: ffffffff81821626 RBX: ffff88810c061fd0 RCX: ffff888122f08000 [ 1219.119806][ T6824] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 1219.127618][ T6824] RBP: ffffc90000f6f828 R08: ffffffff818213b1 R09: fffffbfff0cdd669 [ 1219.135427][ T6824] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810aff8700 [ 1219.143257][ T6824] R13: dffffc0000000000 R14: ffff888115e9cc00 R15: 00000000fffffff0 [ 1219.151060][ T6824] FS: 00007f57e4b4f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 1219.159828][ T6824] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1219.166237][ T6824] CR2: ffffffffde000000 CR3: 00000001063bd000 CR4: 00000000003506b0 [ 1219.174054][ T6824] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1219.181861][ T6824] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1219.189668][ T6824] Call Trace: [ 1219.192805][ T6824] ? __die_body+0x62/0xb0 [ 1219.196966][ T6824] ? die+0x88/0xb0 [ 1219.200523][ T6824] ? do_trap+0x1a4/0x310 [ 1219.204605][ T6824] ? prog_array_map_poke_run+0x696/0x6b0 [ 1219.210072][ T6824] ? handle_invalid_op+0x95/0xc0 [ 1219.214847][ T6824] ? prog_array_map_poke_run+0x696/0x6b0 [ 1219.220320][ T6824] ? exc_invalid_op+0x32/0x50 [ 1219.224827][ T6824] ? asm_exc_invalid_op+0x12/0x20 [ 1219.229689][ T6824] ? prog_array_map_poke_run+0x421/0x6b0 [ 1219.235157][ T6824] ? prog_array_map_poke_run+0x696/0x6b0 [ 1219.240628][ T6824] ? prog_array_map_poke_run+0x696/0x6b0 [ 1219.246094][ T6824] ? bpf_prog_6913d187295c7c4d+0xb/0x208 [ 1219.251563][ T6824] fd_array_map_delete_elem+0x154/0x250 [ 1219.256953][ T6824] __se_sys_bpf+0x6ef6/0x11cb0 [ 1219.261616][ T6824] ? futex_wait+0x6a0/0x7c0 [ 1219.265890][ T6824] ? __x64_sys_bpf+0x90/0x90 [ 1219.270306][ T6824] ? do_futex+0x17b0/0x17b0 [ 1219.274655][ T6824] ? bpf_probe_read_compat+0x15c/0x180 [ 1219.279948][ T6824] ? do_futex+0x139a/0x17b0 [ 1219.284283][ T6824] ? bpf_trace_run1+0x210/0x210 [ 1219.289055][ T6824] ? kmem_cache_free+0xa9/0x1e0 [ 1219.293741][ T6824] ? getname_flags+0x258/0x520 [ 1219.298516][ T6824] ? ____kasan_slab_free+0x12c/0x160 [ 1219.303722][ T6824] ? getname_flags+0x258/0x520 [ 1219.308326][ T6824] ? __bpf_trace_kmem_free+0x6f/0x90 [ 1219.313639][ T6824] ? futex_exit_release+0x1e0/0x1e0 [ 1219.318653][ T6824] ? getname_flags+0x258/0x520 [ 1219.323256][ T6824] ? set_current_blocked+0x40/0x40 [ 1219.328204][ T6824] ? __se_sys_futex+0x355/0x470 [ 1219.332883][ T6824] ? __fget_files+0x31e/0x380 [ 1219.337404][ T6824] ? fpu__clear_all+0x20/0x20 [ 1219.341913][ T6824] ? __kasan_check_read+0x11/0x20 [ 1219.346771][ T6824] __x64_sys_bpf+0x7b/0x90 [ 1219.351028][ T6824] do_syscall_64+0x34/0x70 [ 1219.355280][ T6824] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 1219.361005][ T6824] RIP: 0033:0x7f57e5ecf9f9 [ 1219.365259][ T6824] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1219.384703][ T6824] RSP: 002b:00007f57e4b4f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1219.392970][ T6824] RAX: ffffffffffffffda RBX: 00007f57e605df80 RCX: 00007f57e5ecf9f9 [ 1219.400757][ T6824] RDX: 0000000000000020 RSI: 00000000200007c0 RDI: 0000000000000003 [ 1219.408658][ T6824] RBP: 00007f57e5f3d8ee R08: 0000000000000000 R09: 0000000000000000 [ 1219.416650][ T6824] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1219.424464][ T6824] R13: 000000000000000b R14: 00007f57e605df80 R15: 00007fff86b50a88 [ 1219.432267][ T6824] Modules linked in: [ 1219.748577][ T6824] ---[ end trace 54d39ca12ad3376f ]--- [ 1219.805504][ T6824] RIP: 0010:prog_array_map_poke_run+0x696/0x6b0 [ 1219.932446][ T6824] Code: 93 e8 ff 48 83 c4 70 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 ed 92 e8 ff 0f 0b e9 de f9 ff ff e8 e1 92 e8 ff 0f 0b e8 da 92 e8 ff <0f> 0b e8 d3 92 e8 ff 0f 0b e8 cc 92 e8 ff 0f 0b 66 2e 0f 1f 84 00 [ 1220.117411][ T6824] RSP: 0018:ffffc90000f6f790 EFLAGS: 00010293 [ 1220.123494][ T6824] RAX: ffffffff81821626 RBX: ffff88810c061fd0 RCX: ffff888122f08000 [ 1220.131376][ T6824] RDX: 0000000000000000 RSI: 00000000fffffff0 RDI: 00000000ffffffea [ 1220.139152][ T6824] RBP: ffffc90000f6f828 R08: ffffffff818213b1 R09: fffffbfff0cdd669 [ 1220.246345][ T6824] R10: 0000000000000000 R11: dffffc0000000001 R12: ffff88810aff8700 [ 1220.254226][ T6824] R13: dffffc0000000000 R14: ffff888115e9cc00 R15: 00000000fffffff0 [ 1220.381492][ T6824] FS: 00007f57e4b4f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 1220.466757][ T6824] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1220.473158][ T6824] CR2: 00007f4a89eae178 CR3: 00000001063bd000 CR4: 00000000003506a0 [ 1220.517302][ T6824] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1220.572790][ T6824] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1220.580895][ T6824] Kernel panic - not syncing: Fatal exception [ 1220.587165][ T6824] Kernel Offset: disabled [ 1220.591303][ T6824] Rebooting in 86400 seconds..