last executing test programs: 8.021551093s ago: executing program 2 (id=3374): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}, @call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x3100, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 7.845125922s ago: executing program 2 (id=3375): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb702000008000000b70300000000008385000000"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001180)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_type(r3, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x14, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000300)='timer_start\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x42284000, &(0x7f0000000200), 0x0, &(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000004000000ff0f", @ANYBLOB="0000000000000001c40300c100000000210f0bb645e67d6c26123576a493a52a3498b0c772d336bf04781415e6854b18e67e91e36c14f07705d7f40aac1ce74ba095", @ANYRES32, @ANYBLOB='\x00'/24], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) 5.200345388s ago: executing program 0 (id=3389): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff0000", @ANYBLOB, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) mkdir(&(0x7f0000000180)='./file0\x00', 0x80) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000000000000000000fbff56d911ffa6c0f5ffdb7e6654fe20a2c75b0000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r5) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000000b000001"], 0x48) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000010000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0x6, 0x40, 0x40, 0x41, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000180), 0x1003, r10}, 0x38) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r11}, 0x18) 4.299856913s ago: executing program 0 (id=3395): r0 = getpid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x5b) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r2, 0x0, 0x0, 0xfffffdb9, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000001080)={0x0, 0x80, 0xf6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffff00, 0x2}, 0x1882a, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x4, 0x8002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={r3, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x15, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRES32, @ANYBLOB="0000000001000000000000000000000000830b21020764cbf9367f5427529182ec2826037730e7cfe9c6b393f942b0329a5332dc41"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x72, &(0x7f0000000400)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @tracing, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) r6 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x10542}, r0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x0) 4.081043862s ago: executing program 0 (id=3396): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) close(0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 3.904290461s ago: executing program 4 (id=3397): socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000340)={0x0, r0}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x1000000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000580)="4dd36d5d24f59778c617123da0271501dcdd6daf5a62c365fd96b534f49bc416d256b461a5b810effab82e3f284396ede51b4dfd97b644590c2b321ee2cf7a30fbd02924cd902c7399827968705dfa97530e95266ae87b7672f4f042c6f5d87e2fd9bb4b4d2f7caeeccaf5e4c1c153d4ed019ef427e9e1c09edd72e4849e3f98c3971f9a20fe53a71543222d83b74b653c5acadbc0cd0749e1d1565c2b5c8b6196441d07a72db984bd3a180327b35ac30000000000000000000512c0d45adfb3fbbcadceba867bbc763c2c142248c2d0c691748b3e", &(0x7f00000004c0)=""/158}, 0x20) socketpair(0x9, 0x4, 0xfffffffa, &(0x7f00000002c0)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_DELETE_BATCH(0x18, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xe30a}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth0_vlan\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8922, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000680)='find_free_extent\x00', r2, 0x0, 0x3}, 0x18) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xd, 0x5, 0x4, 0x1, 0x0, r6, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r5}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x20005, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3.71379604s ago: executing program 3 (id=3398): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b2100000000000000000081", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0], 0x0, 0xce, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x5f, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000e00)=ANY=[@ANYBLOB="18020000feffffff00000000000000008500000041000000950000000000000080e16393b29949cb9571a6b7da5f2a73234397b846df4e2ec86bf93b1545765376913e80d9c28230f2e872c3e1ee14238d8c46fb4121d1502e4c9a6d1ca7"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="180000002000000000000000000000008500000050000000850000000e0000009500"], &(0x7f0000001640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1d, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="00000000009941361d6d18298c0000009800020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000000, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x10, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r5}, 0x10) r6 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x8000, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_pid(r7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0xe0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000cc0), 0x0, 0x6e, &(0x7f0000000d00)=[{}, {}], 0x10, 0x10, &(0x7f0000000d40), &(0x7f0000000d80), 0x8, 0xfb, 0x8, 0x8, &(0x7f0000000dc0)}}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x7480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 3.589779099s ago: executing program 1 (id=3400): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b2100000000000000000081", @ANYRES32, @ANYBLOB='\x00'/15, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r1, 0xe0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000240)=[0x0], &(0x7f0000000280)=[0x0], 0x0, 0xce, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x50, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x5f, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000e00)=ANY=[@ANYBLOB="18020000feffffff00000000000000008500000041000000950000000000000080e16393b29949cb9571a6b7da5f2a73234397b846df4e2ec86bf93b1545765376913e80d9c28230f2e872c3e1ee14238d8c46fb4121d1502e4c9a6d1ca7"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYBLOB="180000002000000000000000000000008500000050000000850000000e0000009500"], &(0x7f0000001640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1d, &(0x7f0000000780)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="00000000009941361d6d18298c0000009800020000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10000000000, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x10, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r5}, 0x10) r6 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r7, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={0xffffffffffffffff, 0xe0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000b40)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000cc0), 0x0, 0x6e, &(0x7f0000000d00)=[{}, {}], 0x10, 0x10, &(0x7f0000000d40), &(0x7f0000000d80), 0x8, 0xfb, 0x8, 0x8, &(0x7f0000000dc0)}}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x7480, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 3.457366619s ago: executing program 3 (id=3401): socketpair(0xf, 0x1, 0xb25, &(0x7f0000000280)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f0000000040)}, 0x20) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r2, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd11=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000000080)='memory.numa_stat\x00', 0x80040, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000800), &(0x7f0000001a40)) syz_open_procfs$namespace(r4, &(0x7f0000001540)='ns/net\x00') sendmsg$unix(r2, 0x0, 0x800) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800084}, 0xfffffffffffffea9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x20001400) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 3.121629027s ago: executing program 4 (id=3402): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xd, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0xd) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) 3.066950167s ago: executing program 0 (id=3403): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/cgroup\x00') r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000deab44f4850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='mm_page_alloc\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800080}, 0x10, 0x0, 0x0, 0x57, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r2, 0x40047451, 0x2000000c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.usage_percpu_user\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="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", @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) close(r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r7, 0x8982, 0x20000000) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000dd0a00000000000073018100000000009507000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0xb5, 0x10, &(0x7f0000000000), 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 3.033158856s ago: executing program 1 (id=3404): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x145}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x10, 0x3, &(0x7f0000000000)=@framed={{0x1d, 0xa, 0xa, 0x0, 0x0, 0x61, 0x10, 0x10}}, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x221, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_DETACH(0x10, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.752766585s ago: executing program 2 (id=3405): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x12, 0xb, 0x4, 0x3, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0xffffff15) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xe, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="fb", 0xfdf8}], 0x1}, 0x4084850) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180), 0xd}, 0x40000003) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000120000002400000008000000850000000500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='rss_stat\x00', r2}, 0x10) r4 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r3}, 0x8) write$cgroup_int(r4, &(0x7f00000001c0)=0x8200000000000000, 0xfffffdef) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x7, 0x0, 0x0, 0x7ffd, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0xfe, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000000)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x10}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f375ffff86dd6317ce62070000000000000000431ccaf57b00000000000000000104"], 0xfe1b) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="851000000000000018100000", @ANYRES32, @ANYBLOB="f0f605748aed0000000000000c00000045"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000380)={r5, 0x0, 0x8, 0x0, &(0x7f0000000240)="758d5afa62026f8b", 0x0, 0x80, 0x0, 0x50, 0x0, &(0x7f0000000300)="b823711b2f11966e2224073afe29ddac66a3b48e46ddf4300c856ed08bd7d47360bee9e06c573ceec44c7d4bf3d2828743829c84cc571f800a5fec5054748a6b0ce8405f4fd034a3a82a027b5c288051", 0x0, 0x2, 0x0, 0x4}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip_vti0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f2, &(0x7f0000000080)) 2.128364552s ago: executing program 4 (id=3406): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000a000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r2, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) 2.124194032s ago: executing program 1 (id=3407): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) close(0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 2.093431871s ago: executing program 0 (id=3408): ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x43) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r3}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) close(0x4) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 2.092819421s ago: executing program 3 (id=3409): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc0200000000000000ae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fc40848228567ffb400000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df2624f56da648d28ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71400fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada10eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff00000000000f000000ef0000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18aba6b16455a66c3b84b138efc20a546d3d5227e23b03f2a834391ade2ff3e93ee296c4082ee73e7c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0847a1ff2f7fc3c2b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f05c7f0be31491eb8c9ff68236c8600040000000000000000000066e034c81c3cab64e4fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f224baf1221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b5837d7603b92495d5c569f6433c3fca5206cb0000003fdbbd3892c52c2e7612e05de32322e980a3d69931e2c9312dd517c96f2ee90362476ed853c4c9b7d4ebf13cbaa795860e92a3d7d004f2c491db38eb769f094d5d48b262cc35c40682138cf13a49aa9f27abec00002f01ba1251aaf2385416ca719300"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x1, 0x100000, 0x10000, @value}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0/file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000200)=0x1, 0x12) syz_clone(0x800b4080, 0x0, 0x58, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff22) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.092048401s ago: executing program 4 (id=3410): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x7, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x2}, {0x3}, {0xd, 0x4}, {0x3, 0x5}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xe}, {0xd}, {0x3, 0x5}, {0x1, 0x5}]}]}, {0x0, [0x0, 0x0, 0x61, 0x30, 0x5f]}}, 0x0, 0x77, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) (async) unlink(&(0x7f0000000280)='./file0\x00') r1 = bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000100)}, 0xfffffffffffffc55) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='ext4_writepages_result\x00', r3}, 0x10) r5 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r4}, 0x8) close(r5) (async) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x65, '\x00', 0x0, r5, 0x5, 0x5, 0x2, 0x0, @void, @value, @void, @value}, 0x50) (async) ioctl$TUNATTACHFILTER(r0, 0x400454d1, &(0x7f00000000c0)={0x0, 0x0}) 1.956134351s ago: executing program 4 (id=3411): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1fd, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xf) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[], 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) setsockopt$sock_attach_bpf(r0, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) socketpair(0x22, 0x2, 0x4, &(0x7f0000000200)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0xd0, 0x1ac81b, 0x0, 0x0, 0x0, 0x1000000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8, 0x0, 0x0, 0x1010000}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) getpid() socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0)={0x0, r1}, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea04850000"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000003000), 0x201, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454c9, 0xb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000040)=""/155, 0x1000000, 0x9b, 0x1, 0x0, 0x0, @void, @value}, 0x20) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7903009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac"], 0xfdef) bpf$LINK_DETACH(0x22, &(0x7f0000000240)=r3, 0x4) 1.9549293s ago: executing program 3 (id=3412): r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_serviced\x00', 0x26e1, 0x0) close(r1) write$cgroup_freezer_state(r1, &(0x7f0000000000)='THAWED\x00', 0x7) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x14, 0x4, 0x4, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r2}, 0x10) 1.85714115s ago: executing program 2 (id=3413): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0xfca804a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x145}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x221, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}], {0x95, 0x0, 0x0, 0x1000000}}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.668801699s ago: executing program 3 (id=3414): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x24, 0x12506, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x7602}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) close(0x4) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) 988.637086ms ago: executing program 2 (id=3415): bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000540)='\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b00)=ANY=[@ANYRESOCT, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x26, 0x0, 0x0, 0x5, 0x0, 0x0, 0x40f00, 0x28, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000c40)={0x2, 0xc, 0x7fffffff, 0x7}, 0x10, 0x0, r4, 0x1, &(0x7f0000000c80)=[r2, r2], &(0x7f0000000c00)=[{0x0, 0x2, 0xb, 0x5}], 0x10, 0xe, @void, @value}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000f447333de39c7095758218a68bc5142f0cb2229fa6c8b0d7c8126aee6d3def94cd964218564fb1d255bce6cef9bea8322326039744a98eead8c59bc75bb5b42123eef53ae4bc331b0ad09a8efc4175c484ad74df9158ff1882cdd83c97c03a35e91c30a0"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r6}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x18}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8008a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00010400001d0000000000008100000081000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB='\x00'/28], 0x48) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0x15) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x41}, @call={0x85, 0x0, 0x0, 0xa0}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r10, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) 943.512685ms ago: executing program 4 (id=3416): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffdc, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r5}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r6, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='page_pool_state_release\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r7}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000012b30000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000a000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r9, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4}, 0x50) 942.763055ms ago: executing program 0 (id=3417): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000340)={'veth1_vlan\x00', 0x1}) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x1}, 0x10100}, 0x0, 0xaffffffeffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={r1, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000180)=[0x0, 0x0, 0x0], &(0x7f0000000200)=[0x0], 0x0, 0xda, &(0x7f00000003c0)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000400), &(0x7f0000000440), 0x8, 0x63, 0x8, 0x8, &(0x7f0000000480)}}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8b0f, &(0x7f0000000080)={'veth0_virt_wifi\x00', @random="0800000500"}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r5}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{r5, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000700)='%-5lx \x00'}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=@bloom_filter={0x1e, 0x1, 0xfffffffd, 0x2, 0x23000, r6, 0x8, '\x00', r2, r4, 0x1, 0x2, 0x2, 0xb, @void, @value, @void, @value}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe4b) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000800)={'caif0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0e00000004000000040000000200020000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000000020000000000000000000000000000000000000020000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r8}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) 875.844115ms ago: executing program 1 (id=3418): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff0000", @ANYBLOB, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020100008500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) sendmsg(0xffffffffffffffff, &(0x7f0000003480)={0x0, 0x0, 0x0, 0x300, 0x0, 0x2008}, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) (fail_nth: 5) 312.072742ms ago: executing program 1 (id=3419): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r1, &(0x7f00000000c0), 0x2, 0x0) openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x18, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x6, 0x4, 0x2003, 0x2, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x100}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.swap.events\x00', 0x26e1, 0x0) ioctl$TUNSETNOCSUM(r5, 0xc0189436, 0x1ffffffe) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x2, 0x4, 0x3fd, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0xe) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018200000", @ANYRES32=r6, @ANYBLOB="000000000000000073000c000000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) write$cgroup_devices(r0, 0x0, 0xffdd) 287.649852ms ago: executing program 3 (id=3420): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r0, 0x0, 0x0}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={0xffffffffffffffff, 0x108, 0x0, 0x0, 0x0, 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r1, 0x4004743c, 0x327abfb181a5388f) 238.366642ms ago: executing program 2 (id=3421): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x20, 0xe, &(0x7f0000000d00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x200000000000009b, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_subtree(r1, 0x0, 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x5) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) socketpair(0x1, 0x2, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_clone(0x2a020600, 0x0, 0x0, &(0x7f0000000280), &(0x7f00000003c0), 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89a0, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03076844268cb89e14f008004be0ffff00124000632177fbac141416ac14141683089f034d2f87e5830c04ab845013f2325f1a39010702038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0xfe, 0x60000000}, 0x2c) 0s ago: executing program 1 (id=3422): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000711227000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x19, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000611214000000000095"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0x8002, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b700000012000000bfa30000004000007603000028feffff7a0af0fff8ffffff61a4f0ff000000005d040000000000007f000000000000002704000001ed0a002500000041806aa13e040000000000007b0300fe000000002d03000000000000c600f9ffffff00009500000000000000023bc065b7a379d17cf9333379fc9e84af69912435f1b6a693002e7f3be361917adef6ee1c8a2b4f8ef1e50b91f32050e436fe275daf51efd601b6482a0800000098efd2a102ee010400006e7a1de4a21f379dbf01de00b1b564fef3bef7054803d0d600c095199fe3ff3128e599b0eaebbdbde44cdd4627f472ba2ef58de3c1b7646cb7798b3e6440c2fbdb00a3e35208b0bbf12cd8dff095edc710e4000000000000009fbe4b61a615c6c57a2b649dc74a1a610643b08d9ec21ead2ed51b104d4d91af25b8123deda8a3658d42ecbf28bf6d8e8afcb913466aaa7f6df70252e79166d85827513acd02b5a655a314d31a76e42f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f08050e46850600000000000000d5f728d236619074d6ebdf098bc908f50ae728a40f9411fe7226a4040b96e37c4f46010400000000c3da29faf75ddd1aa96960bca97af133824b881cc1f62c0f8f8f0e8d76b86f9c45636614786f5a2cb77230a874640dcbe0b20bb77c022d4cab080078fce8c5c81b7037181fc2f18f781aaa6e2957d7e39cc1baddcb7ec6667e699f24e41697ee7ea23e4b29a8b6cc9a1f5a7b3caae05f13792292cb949b3aab06b1e042ff2164d80c605532b18ab1c156b97e5889685a96949e4cb40df77b8bb84b0e733a63784ccc214d930cbb7e090df9a2867b3acec439c163fcd7071b53ac29df826f8ae6d6e18c1eacf5bf8707f0d5217e9bb5a05d9e22ce67f1231bd236ed200073826593c4e1a0f50a74bb482e486727d970acc546087acbf30f2f8165b47ba56dfadd14b306e9978931485747292c6fe6e188750cf4f87cce2aa7d67c6133a9f05954cde298a35ea6d715ba80aee63300000000000000000000000000000000000040000000000000000386000000b854adb4f8080064e8407c6bdb37114c80fbaa4a0ec5aaf4b0ac6f2128668279eb6fc1caa80e64461c9a1be8fa0061ea9d55ee4716bea8e1cebf9ed39325ab4c5530dd6ee9fffc00000000000000d7c5af73c683625aaad5fea5004a76c9f8975ed4c5e4eb3e77e9885f69754932609f19e2f615a01cb6d17fbf5cb539403cb0572534f054d5514ad8264f7b029b2bdf2ca4958a62a6e744f9a4c1e646e1dd2ca19583f0f8b0dc53debd7d44f334e6ed7445a9580f970e483b307c4b3c018bc194b23d37e6a2e52d8288e5aab6fec586d52386e8c07a88c88e8faec5f1b16b2014f6952ce7d6be12c6bdb9651ca6fc907061be311d1354e6295698594a73136237bee068d3819400e43544830a3f74b7942f22336953978a5b2032da4238cc61162c04c1297395b73e18c9387615a2bc87d9e2445f3d323d3fac347926a4bac694c55fe9d145906d410f58f1951405d10504efe402cae085afef5dbd617e87dd4a50d7eb8e327fb5db12cbd6a9efe8e671c4f251cabdfe3400a670d14b9b3cd8d86e492997a0168c022ef3536bd1dc731f4f9f8cb6c3857fb8aaaa95024f8da775f72950212b5f6a6133ae14d1429cd4905dabb52e43af7e65acf97b4951fa1e967d16a5ed642efc855a4a46b85cd079934ad3188276efae9387eaa232697526e24b5d4fded86c3811ccd00520150b16000080122965558074956da5e4c3bbefcb64aa8be4456ed2caf0f467b6bbf3aa4371f5e76ab3f60afea80bb066aafb7517f787b090f419a20278a3c779e03afd9a6af6fd518e5dce030f88ec5a5cb7601a161da0f8089322d84ac523040d13e1f1300c2c6555bce60d95dd3288e53435713f03add23f14c8db5555c62de4f6260a483632a2ab447f88dd6efec73a0271a19ca3aa860aa4dcaeebe3d53040b853a7c02a5fcc08b3a572969bbe91c921ac1476027772c87d172ab29967e38ba49e3e57fafea83e495a6a1d1a4ebf83434986091dd66ffe3ffed0c39552a312e2db596d9c827e02f6fc13c8ddbb50bfd7dd8aa2f35f259fc83e007fe79d2d25e30830b92fca00a292dd3b856faa4b7e66e1b64505f65900839df71a97d4d07d37f7ecf8ed9a22da26ae674bba16c204f6b2f8f74fc56b7126d7c11ece6e88ec41192aaee75415c5a7264a2b6adae02c821b62428902aad499825ab85a348638384cd12e61dbde5c47056f0a20b4e2a2328d5db5cfe56557a129e6be231acf5f57995c60d9fca5f63a0dfd18054717120bda466d04774b53208ad8b022719ca77a4e0a66b4708f791d849a5e2aaa0074a9560ede2600df5a5c41392fe9460080fcb1e65233fb8dbeec4c86dbcf6a0673e38d2d3615e5bfbde44afe0fa7564231fff7e7f1f3ad68492dd2ccb1decb15b5d7d3e37e8b7d28921c4b9280979521173f522df408d9818b6cc400098abb869921911480a876fbba698801937e8b4264eb6f5137bdaa075fdd88d22230592a790000000000000000000000003527dfd01b47000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f316aa0886c174b73decb46c1c85edf50d8fcbac5ff76b365611666da86a8e65b308706bd7c000000000000003f7c54d5cb9076b81b7741ec03877afb520400000000000000c3ae49f88c462ea2050acf2d9a97d3be29a5614d1eba2c98cf0236401e02d7c445e50f76419ab4f78f67a09e63dd4faa2e7b59399fa5ee0b41e14a6fe6894e901a523fcbadfeff535f2514bc834e876810d9a6a78e70a9e22860c36a724770b4185de44db6bf21fef32a8d5b36d9014fa841061e63d40f4e536314beda5738fee012365f963b2a85e7d8075c333475b9f0284405e30700000041285fbe0bdd37220e31d4731614a50c16c6a41744c3d24eab511317f97b7b4a1c2ec33fedc46e9bf0fa640eebd3d58f0ebdb7cb8ccffd6d6ab7e0e843591d2618e2d2cdc7081c8fafffe8c350a5c554a387de4ee7aac6478d99de7dd82bef044a6d33c789d566c90c46ad581aa22f910547a77d55e26bf19f1d4661550b177ef53933a305e69b8a95119dcf5bda599d625054776151b2cd1fcde238bdc527594a6c17aa9728af24e2bb7a3830e7092b01b119ea4e7e7f0e21527d622cc29c9f0c8720195368f8374337ab4d130619d93c5ef37e7ddd0b2da147e6e513455b88753452de959a6cbfa1ffbc7ad5d8c3b48017fd31dcf72f337b639253f44cb27a12174bc4c191e21015d0c431a71906eb9c6a14c8a060459ef26787ce3d1cbfd5cc459f0048b5d06f6cbd3e9b34c89f3fb2f951ae81d7fcc8bc0000000000000000000000000000000000000000009231feef3117197c7963c2ba910969f776c8b2ea3970f358107945d9e74e9bdfa58e68b65a9201bc4b73b431df96d49f363917f90e3fa1eaf553db1c761dd9b634a9c4d7c21da4fe6d953ed9438cad0f8dfe03e5e2f73019352f1fb682a5a6ebbf24ebc49e3d7058e696ebc2ab3f4b642f36c9006c0067e24a64aa8c53df824a4ee271e35ed90000800847683c08bfda74a143c855030ae004ac797c575c202d8091eb77565212548ead770d68ad9fa2b2528798df1c36fc438d9c98f168490b41e158bb2e2d8ed19d44b9cce67c9c522b5136be09ed1b97ea3d5b317508df23e92c56fc2eb74d27d3861d91745b8fb9f6cc20e9f8b174000c62c4a2b212332a073fc5d0be7347e41454cb27e081c43e92ae7f9f046600db85d945a4666b588629ce0809d5c8506308688db21ec04d365497bf9006000000000000000000000000000000000000000000f99825021fe933e6e4eb00b0bc659effab98da1be3be18669efb195850a3771ec6ce0f338349ab210cade67d3b03df7b02c4da41d1c70cfaa046d8476dc91b1d6964567e4c73230f181d9708c6e137289ebe5be9e670508461f3fc7d1f4463"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x1000, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) kernel console output (not intermixed with test programs): e sit0 entered promiscuous mode [ 500.728764][ T28] audit: type=1400 audit(1738103813.424:146): avc: denied { ioctl } for pid=8381 comm="syz.2.2352" path="net:[4026532656]" dev="nsfs" ino=4026532656 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 500.977574][ T8390] device sit0 left promiscuous mode [ 500.996141][ T8390] device sit0 entered promiscuous mode [ 501.566310][ T8401] device sit0 left promiscuous mode [ 501.658249][ T8402] device sit0 entered promiscuous mode [ 502.581268][ T8409] device sit0 left promiscuous mode [ 502.694277][ T8412] device sit0 entered promiscuous mode [ 503.428131][ T8425] device sit0 left promiscuous mode [ 503.533872][ T8429] device sit0 entered promiscuous mode [ 508.628364][ T8494] device sit0 left promiscuous mode [ 510.167438][ T8519] device sit0 left promiscuous mode [ 510.341529][ T8521] device sit0 entered promiscuous mode [ 511.014943][ T8531] device sit0 left promiscuous mode [ 511.058716][ T8533] device sit0 left promiscuous mode [ 511.087090][ T8533] device sit0 entered promiscuous mode [ 511.904384][ T8530] device sit0 entered promiscuous mode [ 511.936334][ T8536] device sit0 left promiscuous mode [ 511.965206][ T8535] device sit0 entered promiscuous mode [ 514.942617][ T8566] device sit0 left promiscuous mode [ 514.997831][ T8568] device sit0 left promiscuous mode [ 515.104489][ T8572] device sit0 entered promiscuous mode [ 515.661661][ T8584] device sit0 entered promiscuous mode [ 515.933600][ T8582] device sit0 left promiscuous mode [ 515.982843][ T8587] device sit0 entered promiscuous mode [ 516.110765][ T8593] device sit0 left promiscuous mode [ 516.124541][ T8596] device sit0 entered promiscuous mode [ 516.668543][ T8615] device sit0 left promiscuous mode [ 516.692467][ T8600] device sit0 left promiscuous mode [ 516.702867][ T8604] device sit0 entered promiscuous mode [ 516.801511][ T8615] device sit0 entered promiscuous mode [ 517.235829][ T8626] device sit0 left promiscuous mode [ 519.383635][ T8662] device sit0 left promiscuous mode [ 519.398210][ T8664] device sit0 entered promiscuous mode [ 519.865618][ T8669] device sit0 entered promiscuous mode [ 520.430399][ T8677] device sit0 left promiscuous mode [ 520.655525][ T8680] device sit0 entered promiscuous mode [ 521.377388][ T8701] device sit0 left promiscuous mode [ 521.580454][ T8701] device sit0 entered promiscuous mode [ 522.698777][ T8719] device sit0 left promiscuous mode [ 522.831614][ T8720] device sit0 entered promiscuous mode [ 525.047549][ T8742] device sit0 left promiscuous mode [ 525.311618][ T8743] device sit0 entered promiscuous mode [ 525.896666][ T8745] device sit0 left promiscuous mode [ 525.959008][ T8747] device sit0 entered promiscuous mode [ 525.975515][ T8754] device sit0 left promiscuous mode [ 526.316980][ T8755] device sit0 entered promiscuous mode [ 526.805077][ T8764] device sit0 left promiscuous mode [ 526.911023][ T8765] device sit0 entered promiscuous mode [ 527.294922][ T8777] device sit0 left promiscuous mode [ 527.419313][ T8778] device sit0 entered promiscuous mode [ 527.816942][ T8785] device sit0 left promiscuous mode [ 527.869811][ T8786] device sit0 entered promiscuous mode [ 528.274498][ T8794] device sit0 left promiscuous mode [ 528.288529][ T8795] device sit0 entered promiscuous mode [ 528.338739][ T8803] device sit0 left promiscuous mode [ 528.373990][ T8806] device sit0 entered promiscuous mode [ 529.166832][ T8812] device sit0 left promiscuous mode [ 529.253826][ T8816] device sit0 entered promiscuous mode [ 529.365914][ T8829] device sit0 left promiscuous mode [ 529.421944][ T8831] device sit0 entered promiscuous mode [ 530.116815][ T8846] device sit0 left promiscuous mode [ 530.175900][ T8846] device sit0 entered promiscuous mode [ 530.768223][ T8865] device sit0 left promiscuous mode [ 530.797843][ T8865] device sit0 entered promiscuous mode [ 532.603631][ T8880] syz.2.2502[8880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 532.603728][ T8880] syz.2.2502[8880] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 533.775756][ T8888] syz.1.2505 (8888) used greatest stack depth: 21016 bytes left [ 534.783977][ T8942] device sit0 left promiscuous mode [ 534.931374][ T8942] device sit0 entered promiscuous mode [ 537.253090][ T8987] FAULT_INJECTION: forcing a failure. [ 537.253090][ T8987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 537.295777][ T8987] CPU: 0 PID: 8987 Comm: syz.3.2534 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 537.305431][ T8987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 537.315317][ T8987] Call Trace: [ 537.318439][ T8987] [ 537.321217][ T8987] dump_stack_lvl+0x151/0x1b7 [ 537.325729][ T8987] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 537.331023][ T8987] ? bpf_test_run+0x912/0xa40 [ 537.335537][ T8987] dump_stack+0x15/0x18 [ 537.339530][ T8987] should_fail_ex+0x3d0/0x520 [ 537.344043][ T8987] should_fail+0xb/0x10 [ 537.348035][ T8987] should_fail_usercopy+0x1a/0x20 [ 537.352895][ T8987] _copy_to_user+0x1e/0x90 [ 537.357148][ T8987] bpf_test_finish+0x56f/0x950 [ 537.361750][ T8987] ? convert_skb_to___skb+0x4f0/0x4f0 [ 537.366955][ T8987] ? __kasan_check_write+0x14/0x20 [ 537.371904][ T8987] ? _copy_from_user+0x90/0xc0 [ 537.376506][ T8987] bpf_prog_test_run_xdp+0x8ce/0x1130 [ 537.381722][ T8987] ? dev_put+0x80/0x80 [ 537.385619][ T8987] ? __kasan_check_write+0x14/0x20 [ 537.390564][ T8987] ? fput+0x15b/0x1b0 [ 537.394383][ T8987] ? dev_put+0x80/0x80 [ 537.398288][ T8987] bpf_prog_test_run+0x3b0/0x630 [ 537.403063][ T8987] ? bpf_prog_query+0x260/0x260 [ 537.407751][ T8987] ? selinux_bpf+0xd2/0x100 [ 537.412091][ T8987] ? security_bpf+0x82/0xb0 [ 537.416432][ T8987] __sys_bpf+0x59f/0x7f0 [ 537.420510][ T8987] ? bpf_link_show_fdinfo+0x300/0x300 [ 537.425721][ T8987] ? __ia32_sys_read+0x90/0x90 [ 537.430319][ T8987] ? debug_smp_processor_id+0x17/0x20 [ 537.435532][ T8987] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 537.441430][ T8987] __x64_sys_bpf+0x7c/0x90 [ 537.445684][ T8987] x64_sys_call+0x87f/0x9a0 [ 537.450023][ T8987] do_syscall_64+0x3b/0xb0 [ 537.454273][ T8987] ? clear_bhb_loop+0x55/0xb0 [ 537.458788][ T8987] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 537.464515][ T8987] RIP: 0033:0x7fd7d8f8cda9 [ 537.468769][ T8987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 537.488210][ T8987] RSP: 002b:00007fd7d9d54038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 537.496463][ T8987] RAX: ffffffffffffffda RBX: 00007fd7d91a5fa0 RCX: 00007fd7d8f8cda9 [ 537.504265][ T8987] RDX: 0000000000000050 RSI: 0000000020000c80 RDI: 000000000000000a [ 537.512078][ T8987] RBP: 00007fd7d9d54090 R08: 0000000000000000 R09: 0000000000000000 [ 537.519887][ T8987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 537.527701][ T8987] R13: 0000000000000000 R14: 00007fd7d91a5fa0 R15: 00007ffd7e4314e8 [ 537.535520][ T8987] [ 539.239433][ T9024] device sit0 entered promiscuous mode [ 540.196495][ T9033] bridge0: port 1(bridge_slave_0) entered disabled state [ 540.345564][ T9041] @ÿ: renamed from bond_slave_0 [ 540.552355][ T9048] device sit0 left promiscuous mode [ 540.825937][ T9049] device sit0 entered promiscuous mode [ 541.278758][ T9059] device sit0 left promiscuous mode [ 541.538181][ T9072] device veth0_vlan left promiscuous mode [ 541.660817][ T9072] device veth0_vlan entered promiscuous mode [ 542.059848][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 542.091427][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 542.169162][ T378] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 542.178985][ T9077] device sit0 entered promiscuous mode [ 544.647085][ T9128] device sit0 left promiscuous mode [ 544.776880][ T9132] device sit0 entered promiscuous mode [ 545.588805][ T9142] device sit0 left promiscuous mode [ 545.798483][ T9142] device sit0 entered promiscuous mode [ 546.775944][ T9181] device ip6gretap0 entered promiscuous mode [ 547.565343][ T9200] device sit0 left promiscuous mode [ 547.635463][ T9200] device sit0 entered promiscuous mode [ 548.484897][ T9214] device sit0 left promiscuous mode [ 548.535898][ T9216] device sit0 entered promiscuous mode [ 549.900782][ T9249] FAULT_INJECTION: forcing a failure. [ 549.900782][ T9249] name failslab, interval 1, probability 0, space 0, times 0 [ 549.941749][ T9249] CPU: 1 PID: 9249 Comm: syz.2.2615 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 549.951397][ T9249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 549.961291][ T9249] Call Trace: [ 549.964410][ T9249] [ 549.967190][ T9249] dump_stack_lvl+0x151/0x1b7 [ 549.971701][ T9249] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 549.976998][ T9249] dump_stack+0x15/0x18 [ 549.980985][ T9249] should_fail_ex+0x3d0/0x520 [ 549.985498][ T9249] ? getname_flags+0xba/0x520 [ 549.990014][ T9249] __should_failslab+0xaf/0xf0 [ 549.994616][ T9249] should_failslab+0x9/0x20 [ 549.998950][ T9249] kmem_cache_alloc+0x3b/0x320 [ 550.003552][ T9249] ? vfs_write+0x952/0xed0 [ 550.007805][ T9249] ? irqentry_exit+0x30/0x40 [ 550.012233][ T9249] getname_flags+0xba/0x520 [ 550.016572][ T9249] getname+0x19/0x20 [ 550.020307][ T9249] do_sys_openat2+0xe0/0x870 [ 550.024819][ T9249] ? bit_wait_io_timeout+0x120/0x120 [ 550.029939][ T9249] ? __mutex_lock_slowpath+0x10/0x10 [ 550.035060][ T9249] ? do_sys_open+0x220/0x220 [ 550.039489][ T9249] ? __this_cpu_preempt_check+0x13/0x20 [ 550.044868][ T9249] __x64_sys_openat+0x243/0x290 [ 550.049556][ T9249] ? __ia32_sys_open+0x270/0x270 [ 550.054329][ T9249] ? switch_fpu_return+0xe/0x10 [ 550.059016][ T9249] ? exit_to_user_mode_prepare+0x7e/0xa0 [ 550.064484][ T9249] x64_sys_call+0x6bf/0x9a0 [ 550.068823][ T9249] do_syscall_64+0x3b/0xb0 [ 550.073075][ T9249] ? clear_bhb_loop+0x55/0xb0 [ 550.077589][ T9249] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 550.083316][ T9249] RIP: 0033:0x7fe2f918cda9 [ 550.087575][ T9249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 550.107012][ T9249] RSP: 002b:00007fe2f9f61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 550.115260][ T9249] RAX: ffffffffffffffda RBX: 00007fe2f93a5fa0 RCX: 00007fe2f918cda9 [ 550.123086][ T9249] RDX: 00000000000026e1 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 550.130879][ T9249] RBP: 00007fe2f9f61090 R08: 0000000000000000 R09: 0000000000000000 [ 550.138692][ T9249] R10: 000003a0ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 550.146504][ T9249] R13: 0000000000000000 R14: 00007fe2f93a5fa0 R15: 00007ffffadaeea8 [ 550.154317][ T9249] [ 550.316533][ T9264] device sit0 left promiscuous mode [ 550.381583][ T9272] device sit0 entered promiscuous mode [ 550.963853][ T9282] FAULT_INJECTION: forcing a failure. [ 550.963853][ T9282] name failslab, interval 1, probability 0, space 0, times 0 [ 550.976372][ T9282] CPU: 0 PID: 9282 Comm: syz.1.2626 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 550.986002][ T9282] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 550.995897][ T9282] Call Trace: [ 550.999018][ T9282] [ 551.001798][ T9282] dump_stack_lvl+0x151/0x1b7 [ 551.006319][ T9282] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 551.011622][ T9282] ? __stack_depot_save+0x36/0x480 [ 551.016555][ T9282] ? __xdp_reg_mem_model+0x1da/0x640 [ 551.021675][ T9282] dump_stack+0x15/0x18 [ 551.025670][ T9282] should_fail_ex+0x3d0/0x520 [ 551.030178][ T9282] __should_failslab+0xaf/0xf0 [ 551.034781][ T9282] ? ida_alloc_range+0x793/0xa60 [ 551.039638][ T9282] should_failslab+0x9/0x20 [ 551.043990][ T9282] __kmem_cache_alloc_node+0x3d/0x2a0 [ 551.049190][ T9282] ? ida_alloc_range+0x793/0xa60 [ 551.053962][ T9282] kmalloc_trace+0x2a/0xa0 [ 551.058233][ T9282] ida_alloc_range+0x793/0xa60 [ 551.062816][ T9282] ? idr_replace+0x230/0x230 [ 551.067242][ T9282] ? mutex_lock+0xb1/0x1e0 [ 551.071494][ T9282] ? __kasan_kmalloc+0x9c/0xb0 [ 551.076092][ T9282] ? kmalloc_trace+0x44/0xa0 [ 551.080520][ T9282] __xdp_reg_mem_model+0x216/0x640 [ 551.085469][ T9282] ? kasan_save_alloc_info+0x1f/0x30 [ 551.090587][ T9282] ? xdp_reg_mem_model+0x40/0x40 [ 551.095363][ T9282] xdp_reg_mem_model+0x25/0x40 [ 551.099964][ T9282] bpf_test_run_xdp_live+0x31f/0x1f70 [ 551.105173][ T9282] ? stack_trace_snprint+0xf0/0xf0 [ 551.110118][ T9282] ? __stack_depot_save+0x36/0x480 [ 551.115069][ T9282] ? kasan_set_track+0x60/0x70 [ 551.119665][ T9282] ? kasan_set_track+0x4b/0x70 [ 551.124267][ T9282] ? kasan_save_alloc_info+0x1f/0x30 [ 551.129387][ T9282] ? __kasan_kmalloc+0x9c/0xb0 [ 551.133991][ T9282] ? __kmalloc+0xb4/0x1e0 [ 551.138152][ T9282] ? bpf_prog_test_run_xdp+0x414/0x1130 [ 551.143534][ T9282] ? xdp_convert_md_to_buff+0x360/0x360 [ 551.148912][ T9282] ? x64_sys_call+0x87f/0x9a0 [ 551.153425][ T9282] ? do_syscall_64+0x3b/0xb0 [ 551.157856][ T9282] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 551.163762][ T9282] ? trace_raw_output_bpf_test_finish+0xd0/0xd0 [ 551.169838][ T9282] ? __kasan_check_write+0x14/0x20 [ 551.174782][ T9282] ? _copy_from_user+0x90/0xc0 [ 551.179377][ T9282] ? bpf_test_init+0x169/0x190 [ 551.183980][ T9282] ? xdp_convert_md_to_buff+0x5d/0x360 [ 551.189274][ T9282] bpf_prog_test_run_xdp+0x7d1/0x1130 [ 551.194486][ T9282] ? dev_put+0x80/0x80 [ 551.198385][ T9282] ? __kasan_check_write+0x14/0x20 [ 551.203332][ T9282] ? fput+0x15b/0x1b0 [ 551.207150][ T9282] ? dev_put+0x80/0x80 [ 551.211056][ T9282] bpf_prog_test_run+0x3b0/0x630 [ 551.215832][ T9282] ? bpf_prog_query+0x260/0x260 [ 551.220517][ T9282] ? selinux_bpf+0xd2/0x100 [ 551.224855][ T9282] ? security_bpf+0x82/0xb0 [ 551.229197][ T9282] __sys_bpf+0x59f/0x7f0 [ 551.233278][ T9282] ? bpf_link_show_fdinfo+0x300/0x300 [ 551.238489][ T9282] ? __ia32_sys_read+0x90/0x90 [ 551.243086][ T9282] ? debug_smp_processor_id+0x17/0x20 [ 551.248293][ T9282] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 551.254192][ T9282] __x64_sys_bpf+0x7c/0x90 [ 551.258449][ T9282] x64_sys_call+0x87f/0x9a0 [ 551.262786][ T9282] do_syscall_64+0x3b/0xb0 [ 551.267036][ T9282] ? clear_bhb_loop+0x55/0xb0 [ 551.271554][ T9282] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 551.277279][ T9282] RIP: 0033:0x7f3dff58cda9 [ 551.281530][ T9282] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 551.300975][ T9282] RSP: 002b:00007f3e00440038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 551.309223][ T9282] RAX: ffffffffffffffda RBX: 00007f3dff7a5fa0 RCX: 00007f3dff58cda9 [ 551.317032][ T9282] RDX: 0000000000000050 RSI: 0000000020000080 RDI: 000000000000000a [ 551.324844][ T9282] RBP: 00007f3e00440090 R08: 0000000000000000 R09: 0000000000000000 [ 551.332659][ T9282] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 551.340465][ T9282] R13: 0000000000000000 R14: 00007f3dff7a5fa0 R15: 00007ffc6e4c0d18 [ 551.348285][ T9282] [ 552.012222][ T9309] device sit0 left promiscuous mode [ 552.157652][ T9310] device sit0 entered promiscuous mode [ 552.845570][ T9337] FAULT_INJECTION: forcing a failure. [ 552.845570][ T9337] name failslab, interval 1, probability 0, space 0, times 0 [ 553.022710][ T9337] CPU: 0 PID: 9337 Comm: syz.3.2644 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 553.032364][ T9337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 553.042262][ T9337] Call Trace: [ 553.045382][ T9337] [ 553.048156][ T9337] dump_stack_lvl+0x151/0x1b7 [ 553.052672][ T9337] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 553.057959][ T9337] ? avc_has_perm+0x16f/0x260 [ 553.062475][ T9337] dump_stack+0x15/0x18 [ 553.066475][ T9337] should_fail_ex+0x3d0/0x520 [ 553.070981][ T9337] __should_failslab+0xaf/0xf0 [ 553.075581][ T9337] should_failslab+0x9/0x20 [ 553.079917][ T9337] slab_pre_alloc_hook+0x2e/0x1b0 [ 553.084782][ T9337] kmem_cache_alloc_lru+0x49/0x270 [ 553.089725][ T9337] ? sock_alloc_inode+0x28/0xc0 [ 553.094417][ T9337] sock_alloc_inode+0x28/0xc0 [ 553.098926][ T9337] ? sockfs_init_fs_context+0xb0/0xb0 [ 553.104136][ T9337] new_inode_pseudo+0x65/0x1d0 [ 553.108736][ T9337] __sock_create+0x132/0x7e0 [ 553.113164][ T9337] __sys_socketpair+0x313/0x6e0 [ 553.117851][ T9337] ? __ia32_sys_socket+0x90/0x90 [ 553.122624][ T9337] ? __ia32_sys_read+0x90/0x90 [ 553.127224][ T9337] ? debug_smp_processor_id+0x17/0x20 [ 553.132437][ T9337] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 553.138336][ T9337] __x64_sys_socketpair+0x9b/0xb0 [ 553.143200][ T9337] x64_sys_call+0x19b/0x9a0 [ 553.147532][ T9337] do_syscall_64+0x3b/0xb0 [ 553.151786][ T9337] ? clear_bhb_loop+0x55/0xb0 [ 553.156297][ T9337] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 553.162048][ T9337] RIP: 0033:0x7fd7d8f8cda9 [ 553.166280][ T9337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 553.185721][ T9337] RSP: 002b:00007fd7d9d54038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 553.193967][ T9337] RAX: ffffffffffffffda RBX: 00007fd7d91a5fa0 RCX: 00007fd7d8f8cda9 [ 553.201776][ T9337] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 553.209587][ T9337] RBP: 00007fd7d9d54090 R08: 0000000000000000 R09: 0000000000000000 [ 553.217403][ T9337] R10: 0000000020000200 R11: 0000000000000246 R12: 0000000000000001 [ 553.225213][ T9337] R13: 0000000000000000 R14: 00007fd7d91a5fa0 R15: 00007ffd7e4314e8 [ 553.233032][ T9337] [ 553.514460][ T9337] socket: no more sockets [ 553.534258][ T9358] device sit0 left promiscuous mode [ 553.616512][ T9360] device sit0 entered promiscuous mode [ 553.721621][ T9358] FAULT_INJECTION: forcing a failure. [ 553.721621][ T9358] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 553.956914][ T9358] CPU: 0 PID: 9358 Comm: syz.4.2650 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 553.966576][ T9358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 553.976452][ T9358] Call Trace: [ 553.979575][ T9358] [ 553.982354][ T9358] dump_stack_lvl+0x151/0x1b7 [ 553.986869][ T9358] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 553.992164][ T9358] ? __check_object_size+0x76/0x650 [ 553.997197][ T9358] dump_stack+0x15/0x18 [ 554.001188][ T9358] should_fail_ex+0x3d0/0x520 [ 554.005701][ T9358] should_fail+0xb/0x10 [ 554.009695][ T9358] should_fail_usercopy+0x1a/0x20 [ 554.014554][ T9358] _copy_from_user+0x1e/0xc0 [ 554.018983][ T9358] __sys_bpf+0x23b/0x7f0 [ 554.023060][ T9358] ? clockevents_program_event+0x22f/0x300 [ 554.028705][ T9358] ? bpf_link_show_fdinfo+0x300/0x300 [ 554.033914][ T9358] ? irqentry_exit+0x30/0x40 [ 554.038337][ T9358] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 554.043984][ T9358] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 554.049971][ T9358] __x64_sys_bpf+0x7c/0x90 [ 554.054223][ T9358] x64_sys_call+0x87f/0x9a0 [ 554.058560][ T9358] do_syscall_64+0x3b/0xb0 [ 554.062812][ T9358] ? clear_bhb_loop+0x55/0xb0 [ 554.067328][ T9358] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 554.073057][ T9358] RIP: 0033:0x7f70ba18cda9 [ 554.077308][ T9358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 554.096753][ T9358] RSP: 002b:00007f70bafee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 554.104996][ T9358] RAX: ffffffffffffffda RBX: 00007f70ba3a5fa0 RCX: 00007f70ba18cda9 [ 554.112806][ T9358] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000005 [ 554.120620][ T9358] RBP: 00007f70bafee090 R08: 0000000000000000 R09: 0000000000000000 [ 554.128433][ T9358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 554.136238][ T9358] R13: 0000000000000000 R14: 00007f70ba3a5fa0 R15: 00007ffd973a2e38 [ 554.144058][ T9358] [ 554.552384][ T9361] device sit0 left promiscuous mode [ 554.676682][ T9363] device sit0 entered promiscuous mode [ 554.716879][ T9373] device sit0 left promiscuous mode [ 554.773283][ T9374] device sit0 entered promiscuous mode [ 555.245192][ T9379] device sit0 left promiscuous mode [ 555.311250][ T9391] device sit0 left promiscuous mode [ 555.493258][ T9391] device sit0 entered promiscuous mode [ 556.286543][ T9414] device sit0 left promiscuous mode [ 556.315149][ T9414] device sit0 entered promiscuous mode [ 557.130170][ T9419] device sit0 left promiscuous mode [ 557.152678][ T9438] syz.2.2674[9438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.152769][ T9438] syz.2.2674[9438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.166023][ T9438] FAULT_INJECTION: forcing a failure. [ 557.166023][ T9438] name failslab, interval 1, probability 0, space 0, times 0 [ 557.189877][ T9425] device sit0 entered promiscuous mode [ 557.204426][ T9438] CPU: 1 PID: 9438 Comm: syz.2.2674 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 557.214072][ T9438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 557.223958][ T9438] Call Trace: [ 557.227083][ T9438] [ 557.229857][ T9438] dump_stack_lvl+0x151/0x1b7 [ 557.234375][ T9438] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 557.239667][ T9438] ? avc_denied+0x1b0/0x1b0 [ 557.244015][ T9438] dump_stack+0x15/0x18 [ 557.248000][ T9438] should_fail_ex+0x3d0/0x520 [ 557.252513][ T9438] ? dup_fd+0x55/0x950 [ 557.256424][ T9438] __should_failslab+0xaf/0xf0 [ 557.261018][ T9438] should_failslab+0x9/0x20 [ 557.265360][ T9438] kmem_cache_alloc+0x3b/0x320 [ 557.269959][ T9438] dup_fd+0x55/0x950 [ 557.273688][ T9438] ? audit_alloc+0xc4/0x230 [ 557.278032][ T9438] copy_files+0x76/0xe0 [ 557.282022][ T9438] copy_process+0x11e9/0x3530 [ 557.286536][ T9438] ? __kasan_check_write+0x14/0x20 [ 557.291486][ T9438] ? proc_fail_nth_write+0x20b/0x290 [ 557.296609][ T9438] ? idle_dummy+0x10/0x10 [ 557.300769][ T9438] ? vfs_write+0x952/0xed0 [ 557.305024][ T9438] ? __kasan_slab_free+0x11/0x20 [ 557.309797][ T9438] kernel_clone+0x229/0x890 [ 557.314139][ T9438] ? __kasan_check_write+0x14/0x20 [ 557.319083][ T9438] ? mutex_unlock+0xb2/0x260 [ 557.323511][ T9438] ? create_io_thread+0x180/0x180 [ 557.328375][ T9438] __x64_sys_clone+0x231/0x280 [ 557.332971][ T9438] ? __do_sys_vfork+0x110/0x110 [ 557.337657][ T9438] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 557.343558][ T9438] ? exit_to_user_mode_prepare+0x39/0xa0 [ 557.349024][ T9438] x64_sys_call+0x1b0/0x9a0 [ 557.353365][ T9438] do_syscall_64+0x3b/0xb0 [ 557.357615][ T9438] ? clear_bhb_loop+0x55/0xb0 [ 557.362152][ T9438] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 557.368119][ T9438] RIP: 0033:0x7fe2f918cda9 [ 557.372372][ T9438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 557.391819][ T9438] RSP: 002b:00007fe2f9f60fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 557.400101][ T9438] RAX: ffffffffffffffda RBX: 00007fe2f93a5fa0 RCX: 00007fe2f918cda9 [ 557.407873][ T9438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000630c1000 [ 557.415681][ T9438] RBP: 00007fe2f9f61090 R08: 0000000000000000 R09: 0000000000000000 [ 557.423493][ T9438] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 557.431308][ T9438] R13: 0000000000000000 R14: 00007fe2f93a5fa0 R15: 00007ffffadaeea8 [ 557.439122][ T9438] [ 557.505367][ T9442] device sit0 left promiscuous mode [ 557.679081][ T9455] syz.4.2679[9455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.679166][ T9455] syz.4.2679[9455] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 557.863807][ T9467] device sit0 entered promiscuous mode [ 558.697014][ T9474] device sit0 left promiscuous mode [ 558.754182][ T9475] device sit0 entered promiscuous mode [ 559.223996][ T9493] device sit0 left promiscuous mode [ 560.725996][ T9514] device sit0 entered promiscuous mode [ 561.771621][ T9520] device sit0 left promiscuous mode [ 561.878363][ T9521] device sit0 entered promiscuous mode [ 561.978124][ T9524] device sit0 left promiscuous mode [ 562.002288][ T9525] device sit0 entered promiscuous mode [ 562.163314][ T9537] device sit0 left promiscuous mode [ 562.320229][ T9540] device sit0 entered promiscuous mode [ 562.992688][ T9558] device sit0 left promiscuous mode [ 564.547464][ T9567] device sit0 entered promiscuous mode [ 564.553343][ T28] audit: type=1400 audit(1738103877.244:147): avc: denied { create } for pid=9571 comm="syz.4.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 565.644159][ T9585] bridge0: port 1(bridge_slave_0) entered blocking state [ 565.764704][ T9585] bridge0: port 1(bridge_slave_0) entered disabled state [ 565.875789][ T9585] device bridge_slave_0 entered promiscuous mode [ 565.996258][ T9585] bridge0: port 2(bridge_slave_1) entered blocking state [ 566.151875][ T9585] bridge0: port 2(bridge_slave_1) entered disabled state [ 566.276962][ T9585] device bridge_slave_1 entered promiscuous mode [ 566.341706][ T9598] device sit0 entered promiscuous mode [ 566.929459][ T9611] device sit0 left promiscuous mode [ 567.152225][ T9609] device sit0 entered promiscuous mode [ 567.931028][ T43] device veth0_vlan left promiscuous mode [ 568.733297][ T9629] device sit0 left promiscuous mode [ 568.920874][ T9632] device sit0 entered promiscuous mode [ 569.032810][ T9585] device veth0_vlan entered promiscuous mode [ 569.058334][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 569.075290][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 569.084773][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 569.093608][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 569.102608][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 569.109478][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 569.117396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 569.125806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 569.135551][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 569.142418][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 569.150271][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 569.167583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 569.175473][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 569.186724][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 569.203236][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 569.276319][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 569.388446][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 569.473687][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 569.526875][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 569.581737][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 569.642335][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 569.699447][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 569.752072][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 569.774043][ T9585] device veth1_macvtap entered promiscuous mode [ 569.781118][ T9647] device sit0 left promiscuous mode [ 569.824192][ T9649] device sit0 entered promiscuous mode [ 569.985455][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 569.993629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 570.028774][ T9656] device sit0 left promiscuous mode [ 570.051449][ T28] audit: type=1400 audit(1738103882.744:148): avc: denied { mounton } for pid=9585 comm="syz-executor" path="/root/syzkaller.h3bfvt/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 570.055250][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 570.096026][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 570.114384][ T9656] device sit0 entered promiscuous mode [ 570.116659][ T28] audit: type=1400 audit(1738103882.744:149): avc: denied { mount } for pid=9585 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 570.142453][ T28] audit: type=1400 audit(1738103882.774:150): avc: denied { mounton } for pid=9585 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=522 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 571.751305][ T9699] device sit0 entered promiscuous mode [ 572.827797][ T9725] device sit0 left promiscuous mode [ 572.930907][ T9725] device sit0 entered promiscuous mode [ 577.166373][ T9750] device sit0 left promiscuous mode [ 577.308699][ T9753] device sit0 entered promiscuous mode [ 578.010733][ T9761] device sit0 left promiscuous mode [ 578.121037][ T9758] device syz_tun entered promiscuous mode [ 578.339113][ T9766] device sit0 entered promiscuous mode [ 578.925605][ T9770] device sit0 left promiscuous mode [ 579.061600][ T9758] device sit0 entered promiscuous mode [ 579.209394][ T9777] device sit0 left promiscuous mode [ 579.243084][ T9777] device sit0 entered promiscuous mode [ 581.311896][ T9797] device sit0 left promiscuous mode [ 581.560925][ T9800] device sit0 entered promiscuous mode [ 582.233729][ T9811] syz.0.2781[9811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.233820][ T9811] syz.0.2781[9811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 584.395495][ T9837] device sit0 left promiscuous mode [ 584.574390][ T9838] device sit0 entered promiscuous mode [ 586.509821][ T9855] device sit0 left promiscuous mode [ 586.640141][ T9857] device sit0 entered promiscuous mode [ 587.758218][ T9878] device sit0 left promiscuous mode [ 587.968852][ T9879] device sit0 entered promiscuous mode [ 593.628762][ T9927] device sit0 left promiscuous mode [ 593.661493][ T9928] device sit0 entered promiscuous mode [ 595.059300][ T9964] device sit0 left promiscuous mode [ 595.187985][ T9973] device sit0 entered promiscuous mode [ 595.982125][ T9980] syz.4.2824[9980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 595.982200][ T9980] syz.4.2824[9980] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 596.028942][ T9968] device veth1_macvtap left promiscuous mode [ 596.281689][ T9990] FAULT_INJECTION: forcing a failure. [ 596.281689][ T9990] name failslab, interval 1, probability 0, space 0, times 0 [ 596.333771][ T9990] CPU: 1 PID: 9990 Comm: syz.3.2828 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 596.343417][ T9990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 596.353311][ T9990] Call Trace: [ 596.356434][ T9990] [ 596.359211][ T9990] dump_stack_lvl+0x151/0x1b7 [ 596.363727][ T9990] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 596.369025][ T9990] ? expand_files+0xd3/0x700 [ 596.373452][ T9990] dump_stack+0x15/0x18 [ 596.377443][ T9990] should_fail_ex+0x3d0/0x520 [ 596.381955][ T9990] __should_failslab+0xaf/0xf0 [ 596.386556][ T9990] should_failslab+0x9/0x20 [ 596.390895][ T9990] kmem_cache_alloc_node+0x42/0x330 [ 596.395929][ T9990] ? perf_event_alloc+0x11b/0x1840 [ 596.400876][ T9990] perf_event_alloc+0x11b/0x1840 [ 596.405650][ T9990] __se_sys_perf_event_open+0x7b4/0x3d60 [ 596.411119][ T9990] ? __mutex_lock_slowpath+0x10/0x10 [ 596.416241][ T9990] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 596.421707][ T9990] ? fput+0x15b/0x1b0 [ 596.425525][ T9990] ? __ia32_sys_read+0x90/0x90 [ 596.430128][ T9990] ? debug_smp_processor_id+0x17/0x20 [ 596.435330][ T9990] __x64_sys_perf_event_open+0xbf/0xd0 [ 596.440629][ T9990] x64_sys_call+0x7de/0x9a0 [ 596.444964][ T9990] do_syscall_64+0x3b/0xb0 [ 596.449225][ T9990] ? clear_bhb_loop+0x55/0xb0 [ 596.453736][ T9990] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 596.459460][ T9990] RIP: 0033:0x7fd7d8f8cda9 [ 596.463719][ T9990] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 596.483245][ T9990] RSP: 002b:00007fd7d9d54038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 596.491492][ T9990] RAX: ffffffffffffffda RBX: 00007fd7d91a5fa0 RCX: 00007fd7d8f8cda9 [ 596.499392][ T9990] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000180 [ 596.507197][ T9990] RBP: 00007fd7d9d54090 R08: 0000000000000000 R09: 0000000000000000 [ 596.515010][ T9990] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 596.522819][ T9990] R13: 0000000000000000 R14: 00007fd7d91a5fa0 R15: 00007ffd7e4314e8 [ 596.530641][ T9990] [ 597.185049][T10010] device sit0 left promiscuous mode [ 597.325610][T10010] device sit0 entered promiscuous mode [ 598.017827][T10018] device sit0 left promiscuous mode [ 598.044715][T10019] device sit0 entered promiscuous mode [ 599.833847][T10061] device sit0 left promiscuous mode [ 600.255509][T10065] device sit0 entered promiscuous mode [ 600.712018][T10076] device sit0 left promiscuous mode [ 600.822833][T10075] device sit0 entered promiscuous mode [ 601.200452][T10091] FAULT_INJECTION: forcing a failure. [ 601.200452][T10091] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 601.356142][T10091] CPU: 0 PID: 10091 Comm: syz.4.2857 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 601.365873][T10091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 601.375761][T10091] Call Trace: [ 601.378887][T10091] [ 601.381664][T10091] dump_stack_lvl+0x151/0x1b7 [ 601.386268][T10091] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 601.391557][T10091] ? kasan_set_track+0x60/0x70 [ 601.396161][T10091] dump_stack+0x15/0x18 [ 601.400149][T10091] should_fail_ex+0x3d0/0x520 [ 601.404664][T10091] should_fail_alloc_page+0x68/0x90 [ 601.409719][T10091] prepare_alloc_pages+0x14e/0x6f0 [ 601.414647][T10091] ? __alloc_pages_bulk+0xcc0/0xcc0 [ 601.419681][T10091] __alloc_pages+0x162/0x610 [ 601.424105][T10091] ? prep_new_page+0x110/0x110 [ 601.428713][T10091] __folio_alloc+0x15/0x40 [ 601.432958][T10091] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 601.438514][T10091] ? shmem_replace_folio+0x6a0/0x6a0 [ 601.443636][T10091] ? xas_load+0x39d/0x3b0 [ 601.447808][T10091] ? __filemap_get_folio+0xaa1/0xae0 [ 601.452922][T10091] ? page_cache_prev_miss+0x410/0x410 [ 601.458399][T10091] shmem_get_folio_gfp+0x12d4/0x24b0 [ 601.463516][T10091] ? shmem_get_folio+0xa0/0xa0 [ 601.468110][T10091] ? __kasan_check_write+0x14/0x20 [ 601.473058][T10091] shmem_fallocate+0x9b8/0xf20 [ 601.477665][T10091] ? shmem_mmap+0x340/0x340 [ 601.481996][T10091] ? avc_policy_seqno+0x1b/0x70 [ 601.486682][T10091] ? selinux_file_permission+0x2bb/0x560 [ 601.492150][T10091] ? fsnotify_perm+0x6a/0x5b0 [ 601.496668][T10091] vfs_fallocate+0x492/0x570 [ 601.501094][T10091] do_vfs_ioctl+0x2150/0x29a0 [ 601.505604][T10091] ? kstrtouint_from_user+0x124/0x180 [ 601.510812][T10091] ? __x64_compat_sys_ioctl+0x90/0x90 [ 601.516022][T10091] ? kstrtol_from_user+0x180/0x180 [ 601.520969][T10091] ? ioctl_has_perm+0x1f8/0x560 [ 601.525656][T10091] ? ioctl_has_perm+0x3f0/0x560 [ 601.530342][T10091] ? has_cap_mac_admin+0x3c0/0x3c0 [ 601.535289][T10091] ? vfs_write+0x952/0xed0 [ 601.539546][T10091] ? selinux_file_ioctl+0x3cc/0x540 [ 601.544576][T10091] ? __mutex_lock_slowpath+0x10/0x10 [ 601.549696][T10091] ? selinux_file_alloc_security+0x120/0x120 [ 601.555514][T10091] ? __fget_files+0x2cb/0x330 [ 601.560037][T10091] ? security_file_ioctl+0x84/0xb0 [ 601.564982][T10091] __se_sys_ioctl+0x99/0x190 [ 601.569409][T10091] __x64_sys_ioctl+0x7b/0x90 [ 601.573827][T10091] x64_sys_call+0x98/0x9a0 [ 601.578077][T10091] do_syscall_64+0x3b/0xb0 [ 601.582330][T10091] ? clear_bhb_loop+0x55/0xb0 [ 601.586845][T10091] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 601.592571][T10091] RIP: 0033:0x7f70ba18cda9 [ 601.596833][T10091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 601.616276][T10091] RSP: 002b:00007f70bafee038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 601.624512][T10091] RAX: ffffffffffffffda RBX: 00007f70ba3a5fa0 RCX: 00007f70ba18cda9 [ 601.632329][T10091] RDX: 0000000020000040 RSI: 000000004030582a RDI: 0000000000000009 [ 601.640142][T10091] RBP: 00007f70bafee090 R08: 0000000000000000 R09: 0000000000000000 [ 601.647947][T10091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 601.655757][T10091] R13: 0000000000000000 R14: 00007f70ba3a5fa0 R15: 00007ffd973a2e38 [ 601.663576][T10091] [ 601.688089][T10096] FAULT_INJECTION: forcing a failure. [ 601.688089][T10096] name failslab, interval 1, probability 0, space 0, times 0 [ 601.700869][T10096] CPU: 0 PID: 10096 Comm: syz.2.2858 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 601.710587][T10096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 601.720482][T10096] Call Trace: [ 601.723689][T10096] [ 601.726465][T10096] dump_stack_lvl+0x151/0x1b7 [ 601.730977][T10096] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 601.736275][T10096] dump_stack+0x15/0x18 [ 601.740266][T10096] should_fail_ex+0x3d0/0x520 [ 601.744780][T10096] ? sk_prot_alloc+0x5f/0x330 [ 601.749292][T10096] __should_failslab+0xaf/0xf0 [ 601.753890][T10096] should_failslab+0x9/0x20 [ 601.758229][T10096] kmem_cache_alloc+0x3b/0x320 [ 601.762829][T10096] sk_prot_alloc+0x5f/0x330 [ 601.767167][T10096] ? kasan_save_alloc_info+0x1f/0x30 [ 601.772291][T10096] sk_alloc+0x38/0x440 [ 601.776194][T10096] ? security_inode_alloc+0x29/0x120 [ 601.781320][T10096] tipc_sk_create+0x103/0x1ac0 [ 601.785917][T10096] ? __kasan_check_write+0x14/0x20 [ 601.790862][T10096] ? _raw_spin_trylock_bh+0x190/0x190 [ 601.796069][T10096] ? security_inode_alloc+0xc0/0x120 [ 601.801191][T10096] ? inode_init_always+0x737/0x970 [ 601.806142][T10096] __sock_create+0x3be/0x7e0 [ 601.810568][T10096] __sys_socketpair+0x313/0x6e0 [ 601.815254][T10096] ? __ia32_sys_socket+0x90/0x90 [ 601.820027][T10096] ? __ia32_sys_read+0x90/0x90 [ 601.824627][T10096] ? debug_smp_processor_id+0x17/0x20 [ 601.829844][T10096] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 601.835737][T10096] __x64_sys_socketpair+0x9b/0xb0 [ 601.840598][T10096] x64_sys_call+0x19b/0x9a0 [ 601.844940][T10096] do_syscall_64+0x3b/0xb0 [ 601.849200][T10096] ? clear_bhb_loop+0x55/0xb0 [ 601.853702][T10096] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 601.859432][T10096] RIP: 0033:0x7fe2f918cda9 [ 601.863687][T10096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 601.883127][T10096] RSP: 002b:00007fe2f9f61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 601.891370][T10096] RAX: ffffffffffffffda RBX: 00007fe2f93a5fa0 RCX: 00007fe2f918cda9 [ 601.899182][T10096] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 601.906993][T10096] RBP: 00007fe2f9f61090 R08: 0000000000000000 R09: 0000000000000000 [ 601.914805][T10096] R10: 0000000020000200 R11: 0000000000000246 R12: 0000000000000001 [ 601.922617][T10096] R13: 0000000000000000 R14: 00007fe2f93a5fa0 R15: 00007ffffadaeea8 [ 601.930433][T10096] [ 602.958727][T10120] device sit0 left promiscuous mode [ 603.063239][T10120] device sit0 entered promiscuous mode [ 603.795481][T10135] device sit0 left promiscuous mode [ 603.990111][T10139] device sit0 entered promiscuous mode [ 604.100184][T10162] syz.1.2879[10162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.100296][T10162] syz.1.2879[10162] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 604.150177][T10156] device sit0 left promiscuous mode [ 604.526758][T10138] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.575964][T10138] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.594736][T10179] FAULT_INJECTION: forcing a failure. [ 604.594736][T10179] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 604.647637][T10138] device bridge_slave_0 entered promiscuous mode [ 604.659606][T10179] CPU: 1 PID: 10179 Comm: syz.1.2884 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 604.669329][T10179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 604.679224][T10179] Call Trace: [ 604.682346][T10179] [ 604.685122][T10179] dump_stack_lvl+0x151/0x1b7 [ 604.689638][T10179] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 604.694935][T10179] ? vfs_write+0x952/0xed0 [ 604.699188][T10179] ? __kasan_slab_free+0x11/0x20 [ 604.703957][T10179] dump_stack+0x15/0x18 [ 604.707947][T10179] should_fail_ex+0x3d0/0x520 [ 604.712473][T10179] should_fail+0xb/0x10 [ 604.716457][T10179] should_fail_usercopy+0x1a/0x20 [ 604.721319][T10179] _copy_from_user+0x1e/0xc0 [ 604.725742][T10179] __sys_bpf+0x23b/0x7f0 [ 604.729823][T10179] ? bpf_link_show_fdinfo+0x300/0x300 [ 604.735051][T10179] ? __ia32_sys_read+0x90/0x90 [ 604.739630][T10179] ? debug_smp_processor_id+0x17/0x20 [ 604.744837][T10179] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 604.750739][T10179] __x64_sys_bpf+0x7c/0x90 [ 604.754992][T10179] x64_sys_call+0x87f/0x9a0 [ 604.759330][T10179] do_syscall_64+0x3b/0xb0 [ 604.763587][T10179] ? clear_bhb_loop+0x55/0xb0 [ 604.768100][T10179] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 604.773825][T10179] RIP: 0033:0x7f303118cda9 [ 604.778083][T10179] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 604.797521][T10179] RSP: 002b:00007f3030fff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 604.805767][T10179] RAX: ffffffffffffffda RBX: 00007f30313a5fa0 RCX: 00007f303118cda9 [ 604.813587][T10179] RDX: 0000000000000094 RSI: 0000000020000040 RDI: 0000000000000005 [ 604.821392][T10179] RBP: 00007f3030fff090 R08: 0000000000000000 R09: 0000000000000000 [ 604.829205][T10179] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 604.837013][T10179] R13: 0000000000000001 R14: 00007f30313a5fa0 R15: 00007ffdbe56a318 [ 604.844832][T10179] [ 604.856435][T10138] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.864649][T10138] bridge0: port 2(bridge_slave_1) entered disabled state [ 604.883114][T10138] device bridge_slave_1 entered promiscuous mode [ 605.068011][T10184] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.233947][T10195] device sit0 left promiscuous mode [ 605.410946][T10195] device sit0 entered promiscuous mode [ 606.058210][T10198] GPL: port 1(erspan0) entered blocking state [ 606.064113][T10198] GPL: port 1(erspan0) entered disabled state [ 606.076206][T10198] device erspan0 entered promiscuous mode [ 606.082724][T10192] GPL: port 1(erspan0) entered blocking state [ 606.088796][T10192] GPL: port 1(erspan0) entered forwarding state [ 606.164921][T10205] FAULT_INJECTION: forcing a failure. [ 606.164921][T10205] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 606.179308][T10205] CPU: 0 PID: 10205 Comm: syz.1.2893 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 606.189030][T10205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 606.198915][T10205] Call Trace: [ 606.202039][T10205] [ 606.204812][T10205] dump_stack_lvl+0x151/0x1b7 [ 606.209335][T10205] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 606.214622][T10205] ? __alloc_pages+0x234/0x610 [ 606.219222][T10205] dump_stack+0x15/0x18 [ 606.223221][T10205] should_fail_ex+0x3d0/0x520 [ 606.227732][T10205] should_fail+0xb/0x10 [ 606.231733][T10205] should_fail_usercopy+0x1a/0x20 [ 606.236580][T10205] _copy_from_user+0x1e/0xc0 [ 606.241007][T10205] bpf_prog_test_run_xdp+0xd70/0x1130 [ 606.246220][T10205] ? dev_put+0x80/0x80 [ 606.250126][T10205] ? __kasan_check_write+0x14/0x20 [ 606.255072][T10205] ? fput+0x15b/0x1b0 [ 606.258927][T10205] ? dev_put+0x80/0x80 [ 606.262792][T10205] bpf_prog_test_run+0x3b0/0x630 [ 606.267564][T10205] ? bpf_prog_query+0x260/0x260 [ 606.272250][T10205] ? selinux_bpf+0xd2/0x100 [ 606.276590][T10205] ? security_bpf+0x82/0xb0 [ 606.280933][T10205] __sys_bpf+0x59f/0x7f0 [ 606.285015][T10205] ? bpf_link_show_fdinfo+0x300/0x300 [ 606.290220][T10205] ? __ia32_sys_read+0x90/0x90 [ 606.294820][T10205] ? debug_smp_processor_id+0x17/0x20 [ 606.300025][T10205] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 606.305930][T10205] __x64_sys_bpf+0x7c/0x90 [ 606.310182][T10205] x64_sys_call+0x87f/0x9a0 [ 606.314521][T10205] do_syscall_64+0x3b/0xb0 [ 606.318772][T10205] ? clear_bhb_loop+0x55/0xb0 [ 606.323286][T10205] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 606.329021][T10205] RIP: 0033:0x7f303118cda9 [ 606.333268][T10205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 606.352709][T10205] RSP: 002b:00007f3030fff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 606.360964][T10205] RAX: ffffffffffffffda RBX: 00007f30313a5fa0 RCX: 00007f303118cda9 [ 606.368776][T10205] RDX: 0000000000000050 RSI: 0000000020000c80 RDI: 000000000000000a [ 606.376578][T10205] RBP: 00007f3030fff090 R08: 0000000000000000 R09: 0000000000000000 [ 606.384390][T10205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 606.392212][T10205] R13: 0000000000000000 R14: 00007f30313a5fa0 R15: 00007ffdbe56a318 [ 606.400019][T10205] [ 606.571185][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 606.593010][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 606.650759][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 606.692819][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 606.773224][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 606.780119][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 606.787412][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 606.796250][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 606.804467][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 606.811341][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 606.820094][T10219] device sit0 left promiscuous mode [ 606.866394][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 606.892610][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 606.900779][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 606.908808][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 606.917210][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 606.991588][T10219] device sit0 entered promiscuous mode [ 607.181624][T10138] device veth0_vlan entered promiscuous mode [ 607.226106][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 607.252552][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 607.275869][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 607.283901][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 607.322324][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 607.373954][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 607.434741][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 607.443157][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 607.451693][T10138] device veth1_macvtap entered promiscuous mode [ 607.480968][T10229] device sit0 left promiscuous mode [ 607.529781][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 607.547827][ T9908] device veth0_vlan left promiscuous mode [ 607.612742][T10245] FAULT_INJECTION: forcing a failure. [ 607.612742][T10245] name failslab, interval 1, probability 0, space 0, times 0 [ 607.635531][T10245] CPU: 1 PID: 10245 Comm: syz.3.2905 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 607.645268][T10245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 607.655161][T10245] Call Trace: [ 607.658286][T10245] [ 607.661058][T10245] dump_stack_lvl+0x151/0x1b7 [ 607.665573][T10245] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 607.670870][T10245] dump_stack+0x15/0x18 [ 607.674860][T10245] should_fail_ex+0x3d0/0x520 [ 607.679379][T10245] __should_failslab+0xaf/0xf0 [ 607.683973][T10245] should_failslab+0x9/0x20 [ 607.688313][T10245] kmem_cache_alloc_bulk+0x2e/0x3d0 [ 607.693348][T10245] mas_dup_build+0xac7/0x17f0 [ 607.697864][T10245] __mt_dup+0x240/0x300 [ 607.701851][T10245] ? mtree_erase+0x2c0/0x2c0 [ 607.706281][T10245] copy_mm+0x7b6/0x1bc0 [ 607.710269][T10245] ? copy_sighand+0x54/0x250 [ 607.714696][T10245] ? kasan_save_alloc_info+0x1f/0x30 [ 607.719818][T10245] ? copy_signal+0x650/0x650 [ 607.724246][T10245] ? _raw_spin_lock+0xa4/0x1b0 [ 607.728848][T10245] ? __init_rwsem+0x130/0x240 [ 607.733360][T10245] ? copy_signal+0x503/0x650 [ 607.737784][T10245] copy_process+0x12b6/0x3530 [ 607.742301][T10245] ? __kasan_check_write+0x14/0x20 [ 607.747248][T10245] ? proc_fail_nth_write+0x20b/0x290 [ 607.752366][T10245] ? idle_dummy+0x10/0x10 [ 607.756532][T10245] ? vfs_write+0x952/0xed0 [ 607.760791][T10245] ? __kasan_slab_free+0x11/0x20 [ 607.765561][T10245] kernel_clone+0x229/0x890 [ 607.769903][T10245] ? __kasan_check_write+0x14/0x20 [ 607.774845][T10245] ? mutex_unlock+0xb2/0x260 [ 607.779276][T10245] ? create_io_thread+0x180/0x180 [ 607.784141][T10245] __x64_sys_clone+0x231/0x280 [ 607.788734][T10245] ? __do_sys_vfork+0x110/0x110 [ 607.793425][T10245] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 607.799359][T10245] ? exit_to_user_mode_prepare+0x39/0xa0 [ 607.804792][T10245] x64_sys_call+0x1b0/0x9a0 [ 607.809136][T10245] do_syscall_64+0x3b/0xb0 [ 607.813384][T10245] ? clear_bhb_loop+0x55/0xb0 [ 607.817914][T10245] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 607.823627][T10245] RIP: 0033:0x7fd7d8f8cda9 [ 607.827880][T10245] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 607.847324][T10245] RSP: 002b:00007fd7d9d53fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 607.855568][T10245] RAX: ffffffffffffffda RBX: 00007fd7d91a5fa0 RCX: 00007fd7d8f8cda9 [ 607.863723][T10245] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000004d100000 [ 607.871535][T10245] RBP: 00007fd7d9d54090 R08: 0000000000000000 R09: 0000000000000000 [ 607.879346][T10245] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 607.887158][T10245] R13: 0000000000000000 R14: 00007fd7d91a5fa0 R15: 00007ffd7e4314e8 [ 607.894980][T10245] [ 609.207104][T10235] device sit0 left promiscuous mode [ 609.292579][T10246] device sit0 entered promiscuous mode [ 609.432835][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 609.454929][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 609.517437][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 609.590938][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.689593][T10277] device sit0 entered promiscuous mode [ 610.624351][T10299] device sit0 entered promiscuous mode [ 611.678820][T10314] device sit0 left promiscuous mode [ 611.819066][T10320] syz.3.2925[10320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.819162][T10320] syz.3.2925[10320] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 611.846802][T10315] device sit0 entered promiscuous mode [ 613.517770][T10355] device sit0 left promiscuous mode [ 613.695844][T10355] device sit0 entered promiscuous mode [ 616.099184][T10361] device sit0 left promiscuous mode [ 616.134754][T10362] device sit0 entered promiscuous mode [ 618.319570][T10427] device sit0 left promiscuous mode [ 619.919728][T10459] device sit0 entered promiscuous mode [ 620.079635][T10463] FAULT_INJECTION: forcing a failure. [ 620.079635][T10463] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 620.347722][T10463] CPU: 0 PID: 10463 Comm: syz.1.2963 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 620.357449][T10463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 620.367343][T10463] Call Trace: [ 620.370464][T10463] [ 620.373248][T10463] dump_stack_lvl+0x151/0x1b7 [ 620.377757][T10463] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 620.383054][T10463] dump_stack+0x15/0x18 [ 620.387048][T10463] should_fail_ex+0x3d0/0x520 [ 620.391560][T10463] should_fail+0xb/0x10 [ 620.395549][T10463] should_fail_usercopy+0x1a/0x20 [ 620.400411][T10463] _copy_to_user+0x1e/0x90 [ 620.404663][T10463] simple_read_from_buffer+0xc7/0x150 [ 620.409875][T10463] proc_fail_nth_read+0x1a3/0x210 [ 620.414735][T10463] ? proc_fault_inject_write+0x390/0x390 [ 620.420199][T10463] ? fsnotify_perm+0x269/0x5b0 [ 620.424800][T10463] ? security_file_permission+0x86/0xb0 [ 620.430183][T10463] ? proc_fault_inject_write+0x390/0x390 [ 620.435653][T10463] vfs_read+0x26c/0xae0 [ 620.439641][T10463] ? _raw_spin_unlock+0x4c/0x70 [ 620.444333][T10463] ? kernel_read+0x1f0/0x1f0 [ 620.448754][T10463] ? mutex_lock+0xb1/0x1e0 [ 620.453034][T10463] ? bit_wait_io_timeout+0x120/0x120 [ 620.458133][T10463] ? __fdget_pos+0x2e2/0x390 [ 620.462555][T10463] ? ksys_read+0x77/0x2c0 [ 620.466721][T10463] ksys_read+0x199/0x2c0 [ 620.470802][T10463] ? __this_cpu_preempt_check+0x13/0x20 [ 620.476184][T10463] ? xfd_validate_state+0x6f/0x170 [ 620.481133][T10463] ? vfs_write+0xed0/0xed0 [ 620.485386][T10463] ? fpregs_restore_userregs+0x130/0x290 [ 620.490862][T10463] __x64_sys_read+0x7b/0x90 [ 620.495191][T10463] x64_sys_call+0x28/0x9a0 [ 620.499445][T10463] do_syscall_64+0x3b/0xb0 [ 620.503695][T10463] ? clear_bhb_loop+0x55/0xb0 [ 620.508209][T10463] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 620.513936][T10463] RIP: 0033:0x7f303118b7bc [ 620.518200][T10463] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 620.537724][T10463] RSP: 002b:00007f3030fff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 620.545967][T10463] RAX: ffffffffffffffda RBX: 00007f30313a5fa0 RCX: 00007f303118b7bc [ 620.553779][T10463] RDX: 000000000000000f RSI: 00007f3030fff0a0 RDI: 0000000000000006 [ 620.561592][T10463] RBP: 00007f3030fff090 R08: 0000000000000000 R09: 0000000000000000 [ 620.569403][T10463] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 620.577213][T10463] R13: 0000000000000000 R14: 00007f30313a5fa0 R15: 00007ffdbe56a318 [ 620.585035][T10463] [ 620.739637][T10480] device sit0 left promiscuous mode [ 620.766242][T10480] device sit0 entered promiscuous mode [ 620.948043][T10492] FAULT_INJECTION: forcing a failure. [ 620.948043][T10492] name failslab, interval 1, probability 0, space 0, times 0 [ 621.070042][T10492] CPU: 0 PID: 10492 Comm: syz.0.2969 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 621.079770][T10492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 621.089660][T10492] Call Trace: [ 621.092783][T10492] [ 621.095571][T10492] dump_stack_lvl+0x151/0x1b7 [ 621.100076][T10492] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 621.105372][T10492] ? debug_smp_processor_id+0x17/0x20 [ 621.110577][T10492] ? get_perf_callchain+0x5cb/0x810 [ 621.115613][T10492] dump_stack+0x15/0x18 [ 621.119607][T10492] should_fail_ex+0x3d0/0x520 [ 621.124118][T10492] __should_failslab+0xaf/0xf0 [ 621.128719][T10492] ? __get_vm_area_node+0x129/0x370 [ 621.133752][T10492] should_failslab+0x9/0x20 [ 621.138093][T10492] __kmem_cache_alloc_node+0x3d/0x2a0 [ 621.143299][T10492] ? irqentry_exit+0x30/0x40 [ 621.147723][T10492] ? __get_vm_area_node+0x129/0x370 [ 621.152758][T10492] kmalloc_node_trace+0x26/0xb0 [ 621.157445][T10492] __get_vm_area_node+0x129/0x370 [ 621.162306][T10492] __vmalloc_node_range+0x338/0x1560 [ 621.167517][T10492] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 621.172908][T10492] ? avc_denied+0x1b0/0x1b0 [ 621.177238][T10492] ? selinux_capable+0x158/0x430 [ 621.182016][T10492] ? selinux_capable+0x2f1/0x430 [ 621.186792][T10492] ? vmap+0x2b0/0x2b0 [ 621.190605][T10492] ? selinux_capset+0xf0/0xf0 [ 621.195125][T10492] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 621.200497][T10492] __vmalloc+0x7a/0x90 [ 621.204402][T10492] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 621.209783][T10492] bpf_prog_alloc_no_stats+0x3e/0x400 [ 621.214994][T10492] bpf_prog_alloc+0x22/0x1c0 [ 621.219415][T10492] bpf_prog_load+0x84a/0x1bf0 [ 621.223936][T10492] ? map_freeze+0x3a0/0x3a0 [ 621.228271][T10492] ? selinux_bpf+0xcb/0x100 [ 621.232606][T10492] ? security_bpf+0x82/0xb0 [ 621.236950][T10492] __sys_bpf+0x52c/0x7f0 [ 621.241026][T10492] ? bpf_link_show_fdinfo+0x300/0x300 [ 621.246237][T10492] ? __ia32_sys_read+0x90/0x90 [ 621.250835][T10492] ? debug_smp_processor_id+0x17/0x20 [ 621.256041][T10492] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 621.261945][T10492] __x64_sys_bpf+0x7c/0x90 [ 621.266199][T10492] x64_sys_call+0x87f/0x9a0 [ 621.270544][T10492] do_syscall_64+0x3b/0xb0 [ 621.274790][T10492] ? clear_bhb_loop+0x55/0xb0 [ 621.279302][T10492] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 621.285032][T10492] RIP: 0033:0x7f0d5df8cda9 [ 621.289287][T10492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 621.308727][T10492] RSP: 002b:00007f0d5edfe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 621.317011][T10492] RAX: ffffffffffffffda RBX: 00007f0d5e1a6160 RCX: 00007f0d5df8cda9 [ 621.324782][T10492] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000005 [ 621.332594][T10492] RBP: 00007f0d5edfe090 R08: 0000000000000000 R09: 0000000000000000 [ 621.340502][T10492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 621.348307][T10492] R13: 0000000000000000 R14: 00007f0d5e1a6160 R15: 00007ffcb8a38488 [ 621.356120][T10492] [ 621.360400][T10487] device sit0 left promiscuous mode [ 621.398493][T10489] device sit0 entered promiscuous mode [ 621.420492][T10492] syz.0.2969: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz0,mems_allowed=0 [ 621.575729][T10492] CPU: 0 PID: 10492 Comm: syz.0.2969 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 621.585458][T10492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 621.595355][T10492] Call Trace: [ 621.598476][T10492] [ 621.601252][T10492] dump_stack_lvl+0x151/0x1b7 [ 621.605767][T10492] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 621.611062][T10492] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 621.616706][T10492] dump_stack+0x15/0x18 [ 621.620693][T10492] warn_alloc+0x21a/0x3a0 [ 621.624858][T10492] ? should_failslab+0x9/0x20 [ 621.629376][T10492] ? zone_watermark_ok_safe+0x270/0x270 [ 621.634756][T10492] ? kmalloc_node_trace+0x3d/0xb0 [ 621.639616][T10492] ? __get_vm_area_node+0x361/0x370 [ 621.644655][T10492] __vmalloc_node_range+0x35c/0x1560 [ 621.649771][T10492] ? avc_denied+0x1b0/0x1b0 [ 621.654116][T10492] ? selinux_capable+0x158/0x430 [ 621.658885][T10492] ? selinux_capable+0x2f1/0x430 [ 621.663659][T10492] ? vmap+0x2b0/0x2b0 [ 621.667474][T10492] ? selinux_capset+0xf0/0xf0 [ 621.671989][T10492] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 621.677365][T10492] __vmalloc+0x7a/0x90 [ 621.681273][T10492] ? bpf_prog_alloc_no_stats+0x3e/0x400 [ 621.686653][T10492] bpf_prog_alloc_no_stats+0x3e/0x400 [ 621.691865][T10492] bpf_prog_alloc+0x22/0x1c0 [ 621.696289][T10492] bpf_prog_load+0x84a/0x1bf0 [ 621.700803][T10492] ? map_freeze+0x3a0/0x3a0 [ 621.705144][T10492] ? selinux_bpf+0xcb/0x100 [ 621.709482][T10492] ? security_bpf+0x82/0xb0 [ 621.713822][T10492] __sys_bpf+0x52c/0x7f0 [ 621.717903][T10492] ? bpf_link_show_fdinfo+0x300/0x300 [ 621.723110][T10492] ? __ia32_sys_read+0x90/0x90 [ 621.727709][T10492] ? debug_smp_processor_id+0x17/0x20 [ 621.732916][T10492] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 621.738819][T10492] __x64_sys_bpf+0x7c/0x90 [ 621.743073][T10492] x64_sys_call+0x87f/0x9a0 [ 621.747411][T10492] do_syscall_64+0x3b/0xb0 [ 621.751662][T10492] ? clear_bhb_loop+0x55/0xb0 [ 621.756179][T10492] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 621.761984][T10492] RIP: 0033:0x7f0d5df8cda9 [ 621.766157][T10492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 621.785599][T10492] RSP: 002b:00007f0d5edfe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 621.793850][T10492] RAX: ffffffffffffffda RBX: 00007f0d5e1a6160 RCX: 00007f0d5df8cda9 [ 621.801657][T10492] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000005 [ 621.809467][T10492] RBP: 00007f0d5edfe090 R08: 0000000000000000 R09: 0000000000000000 [ 621.817280][T10492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 621.825093][T10492] R13: 0000000000000000 R14: 00007f0d5e1a6160 R15: 00007ffcb8a38488 [ 621.832907][T10492] [ 621.836123][T10492] Mem-Info: [ 621.855883][T10492] active_anon:18321 inactive_anon:0 isolated_anon:0 [ 621.855883][T10492] active_file:25354 inactive_file:2251 isolated_file:0 [ 621.855883][T10492] unevictable:0 dirty:272 writeback:0 [ 621.855883][T10492] slab_reclaimable:8230 slab_unreclaimable:73473 [ 621.855883][T10492] mapped:30073 shmem:13137 pagetables:551 [ 621.855883][T10492] sec_pagetables:0 bounce:0 [ 621.855883][T10492] kernel_misc_reclaimable:0 [ 621.855883][T10492] free:1497921 free_pcp:16056 free_cma:0 [ 621.908729][T10492] Node 0 active_anon:67684kB inactive_anon:0kB active_file:101416kB inactive_file:9004kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:120292kB dirty:1088kB writeback:0kB shmem:46948kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4628kB pagetables:2204kB sec_pagetables:0kB all_unreclaimable? no [ 621.959718][T10492] DMA32 free:2966484kB boost:0kB min:62552kB low:78188kB high:93824kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2971536kB mlocked:0kB bounce:0kB free_pcp:5052kB local_pcp:4996kB free_cma:0kB [ 621.996540][T10492] lowmem_reserve[]: 0 3932 3932 3932 [ 622.008138][T10492] Normal free:3025200kB boost:0kB min:84900kB low:106124kB high:127348kB reserved_highatomic:0KB active_anon:55768kB inactive_anon:0kB active_file:101416kB inactive_file:9004kB unevictable:0kB writepending:1096kB present:5242880kB managed:4026400kB mlocked:0kB bounce:0kB free_pcp:78516kB local_pcp:46416kB free_cma:0kB [ 622.067535][T10492] lowmem_reserve[]: 0 0 0 0 [ 622.085761][T10492] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 2*1024kB (UM) 2*2048kB (UM) 722*4096kB (M) = 2966484kB [ 622.101524][T10492] Normal: 697*4kB (ME) 570*8kB (UME) 288*16kB (UM) 1186*32kB (UME) 1447*64kB (UM) 987*128kB (UM) 561*256kB (UM) 360*512kB (UME) 277*1024kB (UM) 5*2048kB (UM) 525*4096kB (UM) = 3041076kB [ 622.120245][T10492] 27879 total pagecache pages [ 622.124749][T10492] 0 pages in swap cache [ 622.128810][T10492] Free swap = 124996kB [ 622.133115][T10492] Total swap = 124996kB [ 622.137166][T10492] 2097051 pages RAM [ 622.140829][T10492] 0 pages HighMem/MovableOnly [ 622.145303][T10492] 347567 pages reserved [ 622.149731][T10492] 0 pages cma reserved [ 622.209607][T10509] device sit0 left promiscuous mode [ 622.240939][T10511] device sit0 left promiscuous mode [ 622.384704][T10509] device sit0 entered promiscuous mode [ 623.063379][T10516] device sit0 entered promiscuous mode [ 623.127642][T10523] device sit0 left promiscuous mode [ 623.148413][T10523] device sit0 entered promiscuous mode [ 624.675442][T10540] bridge0: port 1(bridge_slave_0) entered blocking state [ 624.916611][T10540] bridge0: port 1(bridge_slave_0) entered disabled state [ 624.997270][T10540] device bridge_slave_0 entered promiscuous mode [ 625.062980][T10558] device sit0 entered promiscuous mode [ 625.476560][T10540] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.483410][T10540] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.490749][T10540] device bridge_slave_1 entered promiscuous mode [ 625.965388][T10566] device sit0 left promiscuous mode [ 626.243631][T10567] device sit0 entered promiscuous mode [ 626.985975][T10572] FAULT_INJECTION: forcing a failure. [ 626.985975][T10572] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 627.095248][ T9900] device bridge_slave_1 left promiscuous mode [ 627.166712][ T9900] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.266780][ T9900] device bridge_slave_0 left promiscuous mode [ 627.272748][ T9900] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.276700][T10572] CPU: 1 PID: 10572 Comm: syz.2.2993 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 627.289262][T10572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 627.299155][T10572] Call Trace: [ 627.302274][T10572] [ 627.305052][T10572] dump_stack_lvl+0x151/0x1b7 [ 627.309565][T10572] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 627.314887][T10572] dump_stack+0x15/0x18 [ 627.318857][T10572] should_fail_ex+0x3d0/0x520 [ 627.323456][T10572] should_fail+0xb/0x10 [ 627.327453][T10572] should_fail_usercopy+0x1a/0x20 [ 627.332307][T10572] _copy_from_user+0x1e/0xc0 [ 627.336734][T10572] __sys_bpf+0x23b/0x7f0 [ 627.340811][T10572] ? bpf_link_show_fdinfo+0x300/0x300 [ 627.346024][T10572] ? irqentry_exit+0x30/0x40 [ 627.350452][T10572] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 627.356090][T10572] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 627.362080][T10572] __x64_sys_bpf+0x7c/0x90 [ 627.366332][T10572] x64_sys_call+0x87f/0x9a0 [ 627.370671][T10572] do_syscall_64+0x3b/0xb0 [ 627.374930][T10572] ? clear_bhb_loop+0x55/0xb0 [ 627.379438][T10572] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 627.385267][T10572] RIP: 0033:0x7fd17af8cda9 [ 627.389515][T10572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 627.408966][T10572] RSP: 002b:00007fd17adff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 627.417204][T10572] RAX: ffffffffffffffda RBX: 00007fd17b1a5fa0 RCX: 00007fd17af8cda9 [ 627.425003][T10572] RDX: 0000000000000078 RSI: 0000000020000440 RDI: 0000000000000005 [ 627.432816][T10572] RBP: 00007fd17adff090 R08: 0000000000000000 R09: 0000000000000000 [ 627.440626][T10572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 627.448436][T10572] R13: 0000000000000000 R14: 00007fd17b1a5fa0 R15: 00007ffe7f4fac48 [ 627.456258][T10572] [ 627.821445][T10572] device veth1_macvtap left promiscuous mode [ 627.856341][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 627.863660][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 627.874458][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 627.883017][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.891729][ T9908] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.898599][ T9908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.905975][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 627.941827][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 628.026928][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 628.051908][ T9897] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.058810][ T9897] bridge0: port 2(bridge_slave_1) entered forwarding state [ 628.116787][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 628.148017][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 628.155947][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 628.191821][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 628.342022][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 628.380793][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 628.438778][T10540] device veth0_vlan entered promiscuous mode [ 628.450611][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 628.505857][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 628.586576][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 628.594740][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.602362][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 628.612107][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 628.621123][T10540] device veth1_macvtap entered promiscuous mode [ 628.639242][T10595] device sit0 left promiscuous mode [ 628.656799][T10595] device sit0 entered promiscuous mode [ 629.445962][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 629.454025][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 629.462534][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 629.541554][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 629.567004][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 629.878434][T10614] device sit0 left promiscuous mode [ 629.898193][T10617] device sit0 entered promiscuous mode [ 630.898469][T10640] device sit0 left promiscuous mode [ 631.236561][T10640] device sit0 entered promiscuous mode [ 631.452269][T10653] device sit0 entered promiscuous mode [ 632.398586][T10658] device sit0 left promiscuous mode [ 632.416609][T10671] FAULT_INJECTION: forcing a failure. [ 632.416609][T10671] name failslab, interval 1, probability 0, space 0, times 0 [ 632.429195][T10671] CPU: 1 PID: 10671 Comm: syz.1.3022 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 632.438911][T10671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 632.448896][T10671] Call Trace: [ 632.452018][T10671] [ 632.454795][T10671] dump_stack_lvl+0x151/0x1b7 [ 632.459310][T10671] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 632.464609][T10671] dump_stack+0x15/0x18 [ 632.468598][T10671] should_fail_ex+0x3d0/0x520 [ 632.473110][T10671] ? getname_flags+0xba/0x520 [ 632.477621][T10671] __should_failslab+0xaf/0xf0 [ 632.482226][T10671] should_failslab+0x9/0x20 [ 632.486563][T10671] kmem_cache_alloc+0x3b/0x320 [ 632.491160][T10671] ? vfs_write+0x952/0xed0 [ 632.495413][T10671] ? __kasan_slab_free+0x11/0x20 [ 632.500190][T10671] getname_flags+0xba/0x520 [ 632.504529][T10671] getname+0x19/0x20 [ 632.508260][T10671] do_sys_openat2+0xe0/0x870 [ 632.512687][T10671] ? bit_wait_io_timeout+0x120/0x120 [ 632.517807][T10671] ? __mutex_lock_slowpath+0x10/0x10 [ 632.522939][T10671] ? do_sys_open+0x220/0x220 [ 632.527359][T10671] ? fput+0x15b/0x1b0 [ 632.531184][T10671] ? ksys_write+0x260/0x2c0 [ 632.535514][T10671] ? __this_cpu_preempt_check+0x13/0x20 [ 632.540908][T10671] __x64_sys_openat+0x243/0x290 [ 632.545587][T10671] ? __ia32_sys_open+0x270/0x270 [ 632.550356][T10671] ? debug_smp_processor_id+0x17/0x20 [ 632.555565][T10671] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 632.561467][T10671] ? exit_to_user_mode_prepare+0x39/0xa0 [ 632.566935][T10671] x64_sys_call+0x6bf/0x9a0 [ 632.571275][T10671] do_syscall_64+0x3b/0xb0 [ 632.575526][T10671] ? clear_bhb_loop+0x55/0xb0 [ 632.580038][T10671] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 632.585855][T10671] RIP: 0033:0x7f303118cda9 [ 632.590109][T10671] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 632.609638][T10671] RSP: 002b:00007f3030fff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 632.617881][T10671] RAX: ffffffffffffffda RBX: 00007f30313a5fa0 RCX: 00007f303118cda9 [ 632.625694][T10671] RDX: 000000000000275a RSI: 0000000020000080 RDI: 0000000000000007 [ 632.633507][T10671] RBP: 00007f3030fff090 R08: 0000000000000000 R09: 0000000000000000 [ 632.641318][T10671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 632.649127][T10671] R13: 0000000000000000 R14: 00007f30313a5fa0 R15: 00007ffdbe56a318 [ 632.656949][T10671] [ 632.665327][T10661] device sit0 entered promiscuous mode [ 632.754834][T10679] device sit0 left promiscuous mode [ 632.906790][T10679] device sit0 entered promiscuous mode [ 634.028890][T10705] device sit0 left promiscuous mode [ 634.166907][T10705] device sit0 entered promiscuous mode [ 634.841861][T10716] FAULT_INJECTION: forcing a failure. [ 634.841861][T10716] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 634.904520][T10716] CPU: 0 PID: 10716 Comm: syz.2.3036 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 634.914247][T10716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 634.924143][T10716] Call Trace: [ 634.927271][T10716] [ 634.930044][T10716] dump_stack_lvl+0x151/0x1b7 [ 634.934559][T10716] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 634.939853][T10716] ? _kstrtol+0x150/0x150 [ 634.944020][T10716] ? avc_has_perm_noaudit+0x348/0x430 [ 634.949250][T10716] dump_stack+0x15/0x18 [ 634.953219][T10716] should_fail_ex+0x3d0/0x520 [ 634.957740][T10716] should_fail+0xb/0x10 [ 634.961722][T10716] should_fail_usercopy+0x1a/0x20 [ 634.966583][T10716] strncpy_from_user+0x24/0x2b0 [ 634.971273][T10716] bpf_prog_load+0x1fb/0x1bf0 [ 634.975809][T10716] ? map_freeze+0x3a0/0x3a0 [ 634.980131][T10716] ? selinux_bpf+0xcb/0x100 [ 634.984463][T10716] ? security_bpf+0x82/0xb0 [ 634.988806][T10716] __sys_bpf+0x52c/0x7f0 [ 634.992881][T10716] ? bpf_link_show_fdinfo+0x300/0x300 [ 634.998099][T10716] ? __ia32_sys_read+0x90/0x90 [ 635.002691][T10716] ? debug_smp_processor_id+0x17/0x20 [ 635.007908][T10716] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 635.013799][T10716] __x64_sys_bpf+0x7c/0x90 [ 635.018055][T10716] x64_sys_call+0x87f/0x9a0 [ 635.022397][T10716] do_syscall_64+0x3b/0xb0 [ 635.026740][T10716] ? clear_bhb_loop+0x55/0xb0 [ 635.031253][T10716] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 635.036981][T10716] RIP: 0033:0x7fd17af8cda9 [ 635.041241][T10716] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 635.060676][T10716] RSP: 002b:00007fd17adff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 635.068924][T10716] RAX: ffffffffffffffda RBX: 00007fd17b1a5fa0 RCX: 00007fd17af8cda9 [ 635.076735][T10716] RDX: 0000000000000094 RSI: 0000000020000040 RDI: 0000000000000005 [ 635.084552][T10716] RBP: 00007fd17adff090 R08: 0000000000000000 R09: 0000000000000000 [ 635.092358][T10716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 635.100174][T10716] R13: 0000000000000001 R14: 00007fd17b1a5fa0 R15: 00007ffe7f4fac48 [ 635.107984][T10716] [ 635.163050][T10712] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.272263][T10718] device sit0 left promiscuous mode [ 635.808564][T10732] device sit0 entered promiscuous mode [ 636.498010][T10739] device sit0 left promiscuous mode [ 636.778007][T10740] device sit0 entered promiscuous mode [ 637.336369][T10743] device sit0 left promiscuous mode [ 637.397966][T10744] device sit0 entered promiscuous mode [ 637.686864][T10760] FAULT_INJECTION: forcing a failure. [ 637.686864][T10760] name failslab, interval 1, probability 0, space 0, times 0 [ 637.998025][T10760] CPU: 1 PID: 10760 Comm: syz.4.3051 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 638.007772][T10760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 638.017656][T10760] Call Trace: [ 638.020778][T10760] [ 638.023554][T10760] dump_stack_lvl+0x151/0x1b7 [ 638.028070][T10760] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 638.033362][T10760] ? __vmalloc_node_range+0x149b/0x1560 [ 638.038747][T10760] dump_stack+0x15/0x18 [ 638.042735][T10760] should_fail_ex+0x3d0/0x520 [ 638.047253][T10760] ? prepare_creds+0x2f/0x6a0 [ 638.051764][T10760] __should_failslab+0xaf/0xf0 [ 638.056364][T10760] should_failslab+0x9/0x20 [ 638.060703][T10760] kmem_cache_alloc+0x3b/0x320 [ 638.065302][T10760] ? __kasan_check_write+0x14/0x20 [ 638.070250][T10760] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 638.075546][T10760] prepare_creds+0x2f/0x6a0 [ 638.079891][T10760] copy_creds+0xf0/0x630 [ 638.083984][T10760] copy_process+0x855/0x3530 [ 638.088393][T10760] ? __kasan_check_write+0x14/0x20 [ 638.093346][T10760] ? proc_fail_nth_write+0x20b/0x290 [ 638.098469][T10760] ? proc_fail_nth_read+0x210/0x210 [ 638.103493][T10760] ? fsnotify_perm+0x6a/0x5b0 [ 638.108006][T10760] ? idle_dummy+0x10/0x10 [ 638.112171][T10760] ? vfs_write+0x952/0xed0 [ 638.116430][T10760] ? __kasan_slab_free+0x11/0x20 [ 638.121201][T10760] kernel_clone+0x229/0x890 [ 638.125540][T10760] ? __kasan_check_write+0x14/0x20 [ 638.130488][T10760] ? mutex_unlock+0xb2/0x260 [ 638.134910][T10760] ? create_io_thread+0x180/0x180 [ 638.139778][T10760] __x64_sys_clone+0x231/0x280 [ 638.144373][T10760] ? __do_sys_vfork+0x110/0x110 [ 638.149064][T10760] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 638.154969][T10760] ? exit_to_user_mode_prepare+0x39/0xa0 [ 638.160432][T10760] x64_sys_call+0x1b0/0x9a0 [ 638.164767][T10760] do_syscall_64+0x3b/0xb0 [ 638.169021][T10760] ? clear_bhb_loop+0x55/0xb0 [ 638.173537][T10760] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 638.179266][T10760] RIP: 0033:0x7f70ba18cda9 [ 638.183515][T10760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 638.202963][T10760] RSP: 002b:00007f70bafedfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 638.211202][T10760] RAX: ffffffffffffffda RBX: 00007f70ba3a5fa0 RCX: 00007f70ba18cda9 [ 638.219014][T10760] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000004d100000 [ 638.226833][T10760] RBP: 00007f70bafee090 R08: 0000000000000000 R09: 0000000000000000 [ 638.234637][T10760] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 638.242449][T10760] R13: 0000000000000000 R14: 00007f70ba3a5fa0 R15: 00007ffd973a2e38 [ 638.250269][T10760] [ 638.569979][T10776] device sit0 left promiscuous mode [ 638.610068][T10776] device sit0 entered promiscuous mode [ 639.147020][T10781] device sit0 left promiscuous mode [ 639.220431][T10782] device sit0 entered promiscuous mode [ 641.674249][T10829] device sit0 left promiscuous mode [ 641.828523][T10829] device sit0 entered promiscuous mode [ 642.566200][T10838] device sit0 left promiscuous mode [ 642.688495][T10838] device sit0 entered promiscuous mode [ 644.331614][T10867] device sit0 left promiscuous mode [ 644.380009][T10868] device sit0 entered promiscuous mode [ 644.953126][T10870] device sit0 left promiscuous mode [ 645.036764][T10871] device sit0 entered promiscuous mode [ 645.279800][T10875] device sit0 left promiscuous mode [ 645.295339][T10876] device sit0 entered promiscuous mode [ 645.329474][T10857] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.338748][T10857] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.346077][T10857] device bridge_slave_0 entered promiscuous mode [ 645.353124][T10857] bridge0: port 2(bridge_slave_1) entered blocking state [ 645.416619][T10857] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.445059][T10857] device bridge_slave_1 entered promiscuous mode [ 645.493518][T10882] device sit0 left promiscuous mode [ 645.540912][ T9900] GPL: port 1(erspan0) entered disabled state [ 645.579035][ T9900] device erspan0 left promiscuous mode [ 645.584330][ T9900] GPL: port 1(erspan0) entered disabled state [ 645.656738][T10883] device sit0 entered promiscuous mode [ 646.233247][T10895] device sit0 left promiscuous mode [ 646.268517][T10895] device sit0 entered promiscuous mode [ 647.285778][ T9900] device bridge_slave_1 left promiscuous mode [ 647.308846][ T9900] bridge0: port 2(bridge_slave_1) entered disabled state [ 647.425832][ T9900] device bridge_slave_0 left promiscuous mode [ 647.519004][ T9900] bridge0: port 1(bridge_slave_0) entered disabled state [ 647.759583][T10905] device sit0 left promiscuous mode [ 647.770187][T10906] device sit0 entered promiscuous mode [ 647.933686][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 647.943381][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 647.986599][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 648.067425][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 648.127738][ T43] bridge0: port 1(bridge_slave_0) entered blocking state [ 648.134819][ T43] bridge0: port 1(bridge_slave_0) entered forwarding state [ 648.357646][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 648.400465][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 648.458452][ T43] bridge0: port 2(bridge_slave_1) entered blocking state [ 648.465332][ T43] bridge0: port 2(bridge_slave_1) entered forwarding state [ 648.569611][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 648.628202][T10918] device sit0 left promiscuous mode [ 648.700621][T10919] device sit0 entered promiscuous mode [ 649.019137][T10923] device sit0 left promiscuous mode [ 649.089533][T10926] device sit0 entered promiscuous mode [ 649.636389][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 649.644474][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 649.652383][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 649.665410][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 649.696480][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 649.707038][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 652.030665][T10857] device veth0_vlan entered promiscuous mode [ 652.045795][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 652.053929][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 652.061881][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 652.069960][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 652.090743][T10857] device veth1_macvtap entered promiscuous mode [ 652.097232][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 652.105575][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 652.115310][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 652.278666][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 652.358843][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 652.367139][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 652.375272][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 652.935419][T10960] device sit0 left promiscuous mode [ 653.076442][T10964] device sit0 entered promiscuous mode [ 654.126326][T10973] device sit0 entered promiscuous mode [ 654.191324][T10989] syz.1.3114[10989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.191413][T10989] syz.1.3114[10989] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 654.826167][T11006] device veth0_vlan left promiscuous mode [ 654.848395][T11006] device veth0_vlan entered promiscuous mode [ 655.014777][T11006] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.133308][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 655.148814][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 655.218482][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 655.367606][T11014] device sit0 left promiscuous mode [ 655.484708][T11016] device sit0 entered promiscuous mode [ 656.979039][T11049] device sit0 left promiscuous mode [ 657.650735][T11052] device sit0 entered promiscuous mode [ 657.989315][T11069] device sit0 left promiscuous mode [ 658.178990][T11072] device sit0 entered promiscuous mode [ 658.455923][T11078] device sit0 left promiscuous mode [ 658.552641][T11082] device sit0 entered promiscuous mode [ 661.267917][T11102] bridge0: port 1(bridge_slave_0) entered disabled state [ 663.502543][T11121] device pim6reg1 entered promiscuous mode [ 663.707848][T11127] device sit0 left promiscuous mode [ 663.826164][T11127] device sit0 entered promiscuous mode [ 664.774093][T11136] device veth1_macvtap left promiscuous mode [ 664.909269][T11140] device sit0 left promiscuous mode [ 665.305945][T11145] device sit0 entered promiscuous mode [ 668.195998][T11198] device pim6reg1 entered promiscuous mode [ 668.528493][T11203] device sit0 left promiscuous mode [ 668.562906][T11203] device sit0 entered promiscuous mode [ 669.501527][T11217] device sit0 left promiscuous mode [ 669.531005][T11217] device sit0 entered promiscuous mode [ 670.731467][T11237] device sit0 left promiscuous mode [ 670.825229][T11237] device sit0 entered promiscuous mode [ 671.668604][T11253] FAULT_INJECTION: forcing a failure. [ 671.668604][T11253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 671.702227][T11253] CPU: 0 PID: 11253 Comm: syz.0.3189 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 671.711961][T11253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 671.721858][T11253] Call Trace: [ 671.724980][T11253] [ 671.727809][T11253] dump_stack_lvl+0x151/0x1b7 [ 671.732448][T11253] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 671.737822][T11253] ? __alloc_pages+0x234/0x610 [ 671.742445][T11253] dump_stack+0x15/0x18 [ 671.746549][T11253] should_fail_ex+0x3d0/0x520 [ 671.751307][T11253] should_fail+0xb/0x10 [ 671.755498][T11253] should_fail_usercopy+0x1a/0x20 [ 671.761009][T11253] _copy_from_user+0x1e/0xc0 [ 671.766767][T11253] bpf_prog_test_run_xdp+0xd70/0x1130 [ 671.773505][T11253] ? dev_put+0x80/0x80 [ 671.777660][T11253] ? __kasan_check_write+0x14/0x20 [ 671.784183][T11253] ? fput+0x15b/0x1b0 [ 671.788171][T11253] ? dev_put+0x80/0x80 [ 671.792434][T11253] bpf_prog_test_run+0x3b0/0x630 [ 671.797395][T11253] ? bpf_prog_query+0x260/0x260 [ 671.802139][T11253] ? selinux_bpf+0xd2/0x100 [ 671.806477][T11253] ? security_bpf+0x82/0xb0 [ 671.810817][T11253] __sys_bpf+0x59f/0x7f0 [ 671.814895][T11253] ? bpf_link_show_fdinfo+0x300/0x300 [ 671.820109][T11253] ? __ia32_sys_read+0x90/0x90 [ 671.824702][T11253] ? debug_smp_processor_id+0x17/0x20 [ 671.829912][T11253] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 671.836046][T11253] __x64_sys_bpf+0x7c/0x90 [ 671.840244][T11253] x64_sys_call+0x87f/0x9a0 [ 671.844595][T11253] do_syscall_64+0x3b/0xb0 [ 671.848852][T11253] ? clear_bhb_loop+0x55/0xb0 [ 671.853350][T11253] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 671.859080][T11253] RIP: 0033:0x7f9532d8cda9 [ 671.863493][T11253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 671.883272][T11253] RSP: 002b:00007f9533c79038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 671.891511][T11253] RAX: ffffffffffffffda RBX: 00007f9532fa5fa0 RCX: 00007f9532d8cda9 [ 671.899318][T11253] RDX: 0000000000000050 RSI: 0000000020000c80 RDI: 000000000000000a [ 671.907249][T11253] RBP: 00007f9533c79090 R08: 0000000000000000 R09: 0000000000000000 [ 671.915030][T11253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 671.922837][T11253] R13: 0000000000000000 R14: 00007f9532fa5fa0 R15: 00007fff3ee82798 [ 671.930652][T11253] [ 673.302985][T11268] device syzkaller0 entered promiscuous mode [ 673.903815][T11282] device pim6reg1 entered promiscuous mode [ 674.265912][T11306] device sit0 left promiscuous mode [ 674.338981][T11306] device sit0 entered promiscuous mode [ 675.285188][T11330] device sit0 left promiscuous mode [ 675.452520][T11339] device sit0 left promiscuous mode [ 675.617751][T11339] device sit0 entered promiscuous mode [ 676.377729][T11352] device sit0 left promiscuous mode [ 676.428276][T11355] device sit0 entered promiscuous mode [ 677.713755][T11348] bridge0: port 1(bridge_slave_0) entered blocking state [ 677.774355][T11348] bridge0: port 1(bridge_slave_0) entered disabled state [ 677.852616][T11348] device bridge_slave_0 entered promiscuous mode [ 677.895526][T11348] bridge0: port 2(bridge_slave_1) entered blocking state [ 677.963568][T11348] bridge0: port 2(bridge_slave_1) entered disabled state [ 678.024416][T11348] device bridge_slave_1 entered promiscuous mode [ 678.170161][T11388] device sit0 left promiscuous mode [ 678.303577][T11388] device sit0 entered promiscuous mode [ 679.278546][T11403] device sit0 left promiscuous mode [ 679.404405][T11402] device sit0 entered promiscuous mode [ 679.828798][T11410] FAULT_INJECTION: forcing a failure. [ 679.828798][T11410] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 679.918330][T11410] CPU: 1 PID: 11410 Comm: syz.0.3236 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 679.928057][T11410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 679.937952][T11410] Call Trace: [ 679.941071][T11410] [ 679.943854][T11410] dump_stack_lvl+0x151/0x1b7 [ 679.948455][T11410] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 679.953746][T11410] dump_stack+0x15/0x18 [ 679.957741][T11410] should_fail_ex+0x3d0/0x520 [ 679.962263][T11410] should_fail_alloc_page+0x68/0x90 [ 679.967287][T11410] prepare_alloc_pages+0x14e/0x6f0 [ 679.972234][T11410] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 679.977886][T11410] ? __alloc_pages_bulk+0xcc0/0xcc0 [ 679.982999][T11410] __alloc_pages+0x162/0x610 [ 679.987514][T11410] ? prep_new_page+0x110/0x110 [ 679.992112][T11410] ? _raw_spin_lock+0xc0/0x1b0 [ 679.996718][T11410] ? _raw_spin_trylock_bh+0x190/0x190 [ 680.001934][T11410] __get_free_pages+0xe/0x30 [ 680.006370][T11410] kasan_populate_vmalloc_pte+0x39/0x130 [ 680.011812][T11410] ? __apply_to_page_range+0x8ca/0xbe0 [ 680.017105][T11410] __apply_to_page_range+0x8dd/0xbe0 [ 680.022228][T11410] ? kasan_populate_vmalloc+0x70/0x70 [ 680.027434][T11410] ? kasan_populate_vmalloc+0x70/0x70 [ 680.032643][T11410] apply_to_page_range+0x3b/0x50 [ 680.037417][T11410] kasan_populate_vmalloc+0x65/0x70 [ 680.042458][T11410] alloc_vmap_area+0x1961/0x1aa0 [ 680.047236][T11410] ? vm_map_ram+0x940/0x940 [ 680.051653][T11410] ? __kasan_kmalloc+0x9c/0xb0 [ 680.056254][T11410] ? kmalloc_node_trace+0x3d/0xb0 [ 680.061203][T11410] __get_vm_area_node+0x171/0x370 [ 680.066156][T11410] __vmalloc_node_range+0x338/0x1560 [ 680.071440][T11410] ? reuseport_array_alloc+0xc3/0x160 [ 680.076649][T11410] ? selinux_capable+0x2f1/0x430 [ 680.081713][T11410] ? selinux_capset+0xf0/0xf0 [ 680.086217][T11410] ? vmap+0x2b0/0x2b0 [ 680.090047][T11410] ? irqentry_exit+0x30/0x40 [ 680.094463][T11410] bpf_map_area_alloc+0xdc/0xf0 [ 680.099151][T11410] ? reuseport_array_alloc+0xc3/0x160 [ 680.104358][T11410] reuseport_array_alloc+0xc3/0x160 [ 680.109396][T11410] map_create+0x44a/0xcf0 [ 680.113561][T11410] __sys_bpf+0x2e6/0x7f0 [ 680.117634][T11410] ? clockevents_program_event+0x22f/0x300 [ 680.123276][T11410] ? bpf_link_show_fdinfo+0x300/0x300 [ 680.128489][T11410] ? __sched_clock_gtod_offset+0x100/0x100 [ 680.134143][T11410] ? debug_smp_processor_id+0x17/0x20 [ 680.139343][T11410] ? perf_trace_sys_enter+0x30/0x140 [ 680.144454][T11410] __x64_sys_bpf+0x7c/0x90 [ 680.148707][T11410] x64_sys_call+0x87f/0x9a0 [ 680.153148][T11410] do_syscall_64+0x3b/0xb0 [ 680.157478][T11410] ? clear_bhb_loop+0x55/0xb0 [ 680.162008][T11410] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 680.167717][T11410] RIP: 0033:0x7f9532d8cda9 [ 680.171965][T11410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 680.191673][T11410] RSP: 002b:00007f9533c79038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 680.199913][T11410] RAX: ffffffffffffffda RBX: 00007f9532fa5fa0 RCX: 00007f9532d8cda9 [ 680.207726][T11410] RDX: 0000000000000050 RSI: 0000000020000300 RDI: 0000000000000000 [ 680.215549][T11410] RBP: 00007f9533c79090 R08: 0000000000000000 R09: 0000000000000000 [ 680.223351][T11410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 680.231162][T11410] R13: 0000000000000000 R14: 00007f9532fa5fa0 R15: 00007fff3ee82798 [ 680.239015][T11410] [ 680.250496][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 680.258081][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 680.279043][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 680.289811][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 680.298693][ T9908] bridge0: port 1(bridge_slave_0) entered blocking state [ 680.305552][ T9908] bridge0: port 1(bridge_slave_0) entered forwarding state [ 680.313661][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 680.321947][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 680.330875][ T9908] bridge0: port 2(bridge_slave_1) entered blocking state [ 680.337766][ T9908] bridge0: port 2(bridge_slave_1) entered forwarding state [ 680.361428][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 680.369774][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 680.378342][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 680.392784][ T9897] device veth0_vlan left promiscuous mode [ 680.605234][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 680.613430][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 680.637601][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 680.647429][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 680.675093][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 680.712392][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 680.772979][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 680.845603][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 680.914800][T11348] device veth0_vlan entered promiscuous mode [ 680.993448][T11436] device sit0 left promiscuous mode [ 681.048498][ T28] audit: type=1400 audit(1738103993.734:151): avc: denied { read } for pid=11431 comm="syz.0.3242" name="cgroup.subtree_control" dev="cgroup2" ino=271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 681.084465][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 681.118428][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 681.145745][T11348] device veth1_macvtap entered promiscuous mode [ 681.149616][ T28] audit: type=1400 audit(1738103993.754:152): avc: denied { ioctl } for pid=11431 comm="syz.0.3242" path="" dev="cgroup2" ino=271 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 681.181543][T11436] device sit0 entered promiscuous mode [ 681.622564][T11440] device sit0 left promiscuous mode [ 681.655135][T11441] device sit0 entered promiscuous mode [ 681.996690][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 682.038039][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 682.046693][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 682.054869][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 682.063253][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 683.991134][T11495] device veth0_vlan left promiscuous mode [ 684.056931][T11495] device veth0_vlan entered promiscuous mode [ 685.271249][T11521] device sit0 left promiscuous mode [ 685.619990][T11530] device sit0 entered promiscuous mode [ 685.662619][T11532] device sit0 left promiscuous mode [ 685.759941][T11534] device sit0 entered promiscuous mode [ 686.594251][T11555] device veth0_vlan left promiscuous mode [ 686.619167][T11555] device veth0_vlan entered promiscuous mode [ 686.670913][T11555] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 686.700914][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 686.757133][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 686.764250][ T9897] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 686.950784][T11568] device wg2 entered promiscuous mode [ 687.278567][T11579] bridge0: port 1(bridge_slave_0) entered disabled state [ 687.282702][T11583] FAULT_INJECTION: forcing a failure. [ 687.282702][T11583] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 687.300075][T11583] CPU: 0 PID: 11583 Comm: syz.3.3286 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 687.309798][T11583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 687.319691][T11583] Call Trace: [ 687.322810][T11583] [ 687.325594][T11583] dump_stack_lvl+0x151/0x1b7 [ 687.330103][T11583] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 687.335416][T11583] dump_stack+0x15/0x18 [ 687.339574][T11583] should_fail_ex+0x3d0/0x520 [ 687.344078][T11583] should_fail_alloc_page+0x68/0x90 [ 687.349118][T11583] prepare_alloc_pages+0x14e/0x6f0 [ 687.354087][T11583] ? __alloc_pages_bulk+0xcc0/0xcc0 [ 687.359704][T11583] __alloc_pages+0x162/0x610 [ 687.364129][T11583] ? prep_new_page+0x110/0x110 [ 687.368730][T11583] ? refcount_dec_and_lock_irqsave+0xe1/0x160 [ 687.374630][T11583] ? copy_user_enhanced_fast_string+0xa/0x40 [ 687.380453][T11583] bpf_prog_test_run_xdp+0xc56/0x1130 [ 687.385656][T11583] ? dev_put+0x80/0x80 [ 687.389651][T11583] ? __kasan_check_write+0x14/0x20 [ 687.394680][T11583] ? fput+0x15b/0x1b0 [ 687.398935][T11583] ? dev_put+0x80/0x80 [ 687.402846][T11583] bpf_prog_test_run+0x3b0/0x630 [ 687.407715][T11583] ? bpf_prog_query+0x260/0x260 [ 687.412390][T11583] ? selinux_bpf+0xd2/0x100 [ 687.416725][T11583] ? security_bpf+0x82/0xb0 [ 687.421066][T11583] __sys_bpf+0x59f/0x7f0 [ 687.425146][T11583] ? bpf_link_show_fdinfo+0x300/0x300 [ 687.430356][T11583] ? __ia32_sys_read+0x90/0x90 [ 687.434953][T11583] ? debug_smp_processor_id+0x17/0x20 [ 687.440167][T11583] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 687.446063][T11583] __x64_sys_bpf+0x7c/0x90 [ 687.450322][T11583] x64_sys_call+0x87f/0x9a0 [ 687.454833][T11583] do_syscall_64+0x3b/0xb0 [ 687.459352][T11583] ? clear_bhb_loop+0x55/0xb0 [ 687.463862][T11583] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 687.469580][T11583] RIP: 0033:0x7fbc55f8cda9 [ 687.473835][T11583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 687.493364][T11583] RSP: 002b:00007fbc56edb038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 687.501616][T11583] RAX: ffffffffffffffda RBX: 00007fbc561a5fa0 RCX: 00007fbc55f8cda9 [ 687.509513][T11583] RDX: 0000000000000050 RSI: 0000000020000c80 RDI: 000000000000000a [ 687.517320][T11583] RBP: 00007fbc56edb090 R08: 0000000000000000 R09: 0000000000000000 [ 687.525135][T11583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 687.532942][T11583] R13: 0000000000000000 R14: 00007fbc561a5fa0 R15: 00007ffc6e67bae8 [ 687.540763][T11583] [ 688.702351][T11636] FAULT_INJECTION: forcing a failure. [ 688.702351][T11636] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 688.751813][T11634] device sit0 left promiscuous mode [ 688.764221][T11632] device pim6reg1 entered promiscuous mode [ 688.776524][T11637] device sit0 entered promiscuous mode [ 688.783185][T11636] CPU: 0 PID: 11636 Comm: syz.4.3306 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 688.792982][T11636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 688.802881][T11636] Call Trace: [ 688.805999][T11636] [ 688.808777][T11636] dump_stack_lvl+0x151/0x1b7 [ 688.813387][T11636] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 688.818686][T11636] dump_stack+0x15/0x18 [ 688.822672][T11636] should_fail_ex+0x3d0/0x520 [ 688.827189][T11636] should_fail_alloc_page+0x68/0x90 [ 688.832219][T11636] prepare_alloc_pages+0x14e/0x6f0 [ 688.837172][T11636] ? __alloc_pages_bulk+0xcc0/0xcc0 [ 688.842219][T11636] __alloc_pages+0x162/0x610 [ 688.846631][T11636] ? prep_new_page+0x110/0x110 [ 688.851227][T11636] ? refcount_dec_and_lock_irqsave+0xe1/0x160 [ 688.857135][T11636] ? copy_user_enhanced_fast_string+0xa/0x40 [ 688.863170][T11636] bpf_prog_test_run_xdp+0xc56/0x1130 [ 688.868391][T11636] ? dev_put+0x80/0x80 [ 688.872280][T11636] ? __kasan_check_write+0x14/0x20 [ 688.877322][T11636] ? fput+0x15b/0x1b0 [ 688.881163][T11636] ? dev_put+0x80/0x80 [ 688.885039][T11636] bpf_prog_test_run+0x3b0/0x630 [ 688.889811][T11636] ? bpf_prog_query+0x260/0x260 [ 688.894495][T11636] ? selinux_bpf+0xd2/0x100 [ 688.898853][T11636] ? security_bpf+0x82/0xb0 [ 688.903173][T11636] __sys_bpf+0x59f/0x7f0 [ 688.907253][T11636] ? bpf_link_show_fdinfo+0x300/0x300 [ 688.912466][T11636] ? __ia32_sys_read+0x90/0x90 [ 688.917065][T11636] ? debug_smp_processor_id+0x17/0x20 [ 688.922268][T11636] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 688.928170][T11636] __x64_sys_bpf+0x7c/0x90 [ 688.932425][T11636] x64_sys_call+0x87f/0x9a0 [ 688.936770][T11636] do_syscall_64+0x3b/0xb0 [ 688.941029][T11636] ? clear_bhb_loop+0x55/0xb0 [ 688.945531][T11636] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 688.951257][T11636] RIP: 0033:0x7f0e9e38cda9 [ 688.955509][T11636] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 688.974954][T11636] RSP: 002b:00007f0e9e1ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 688.983198][T11636] RAX: ffffffffffffffda RBX: 00007f0e9e5a5fa0 RCX: 00007f0e9e38cda9 [ 688.991010][T11636] RDX: 0000000000000050 RSI: 0000000020000600 RDI: 000000000000000a [ 688.998822][T11636] RBP: 00007f0e9e1ff090 R08: 0000000000000000 R09: 0000000000000000 [ 689.006633][T11636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 689.014459][T11636] R13: 0000000000000000 R14: 00007f0e9e5a5fa0 R15: 00007ffd8c5d8a88 [ 689.022262][T11636] [ 690.531394][T11673] device veth0_vlan left promiscuous mode [ 690.590476][T11673] device veth0_vlan entered promiscuous mode [ 690.765656][T11673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 690.909614][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 690.939114][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 690.946212][ T9908] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 690.959189][T11681] : renamed from ipvlan1 [ 692.261801][T11705] device wg2 entered promiscuous mode [ 692.410551][T11712] device sit0 left promiscuous mode [ 693.706034][ T28] audit: type=1400 audit(1738104006.394:153): avc: denied { setattr } for pid=11737 comm="syz.0.3336" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 693.789495][T11738] device syzkaller0 entered promiscuous mode [ 693.858125][ T28] audit: type=1400 audit(1738104006.434:154): avc: denied { create } for pid=11737 comm="syz.0.3336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 693.878993][T11740] device sit0 left promiscuous mode [ 694.004502][T11746] device sit0 entered promiscuous mode [ 694.611660][ T28] audit: type=1400 audit(1738104007.304:155): avc: denied { create } for pid=11760 comm="syz.4.3342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=decnet_socket permissive=1 [ 695.850227][T11804] : renamed from ipvlan1 [ 696.011361][T11811] device sit0 left promiscuous mode [ 696.169981][T11812] device sit0 entered promiscuous mode [ 698.140403][T11854] FAULT_INJECTION: forcing a failure. [ 698.140403][T11854] name failslab, interval 1, probability 0, space 0, times 0 [ 698.264893][T11854] CPU: 0 PID: 11854 Comm: syz.3.3371 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 698.274635][T11854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 698.284649][T11854] Call Trace: [ 698.287848][T11854] [ 698.290861][T11854] dump_stack_lvl+0x151/0x1b7 [ 698.295543][T11854] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 698.300833][T11854] ? addrconf_ifdown+0x1866/0x1ab0 [ 698.305796][T11854] dump_stack+0x15/0x18 [ 698.310025][T11854] should_fail_ex+0x3d0/0x520 [ 698.314730][T11854] __should_failslab+0xaf/0xf0 [ 698.319336][T11854] should_failslab+0x9/0x20 [ 698.323661][T11854] kmem_cache_alloc_node+0x42/0x330 [ 698.329404][T11854] ? __alloc_skb+0xcc/0x2d0 [ 698.333845][T11854] __alloc_skb+0xcc/0x2d0 [ 698.338002][T11854] rtmsg_ifinfo_build_skb+0x7f/0x180 [ 698.343697][T11854] unregister_netdevice_many+0xeb8/0x1730 [ 698.349252][T11854] ? alloc_netdev_mqs+0xf90/0xf90 [ 698.354369][T11854] ? __kasan_slab_free+0x11/0x20 [ 698.360821][T11854] ? kmem_cache_free+0x291/0x560 [ 698.365848][T11854] ? __kasan_check_read+0x11/0x20 [ 698.371175][T11854] unregister_netdevice_queue+0x2e6/0x350 [ 698.376824][T11854] ? list_netdevice+0x710/0x710 [ 698.381825][T11854] br_dev_delete+0xf9/0x110 [ 698.386655][T11854] ? br_del_bridge+0xb1/0xf0 [ 698.391074][T11854] br_del_bridge+0xbb/0xf0 [ 698.395419][T11854] br_ioctl_stub+0x3fb/0x940 [ 698.399934][T11854] ? has_cap_mac_admin+0x3c0/0x3c0 [ 698.405708][T11854] ? vfs_write+0x952/0xed0 [ 698.409928][T11854] ? br_dev_read_uargs+0x3f0/0x3f0 [ 698.416701][T11854] ? __mutex_lock_slowpath+0xe/0x10 [ 698.421728][T11854] ? mutex_lock+0x130/0x1e0 [ 698.426339][T11854] ? bit_wait_io_timeout+0x120/0x120 [ 698.431454][T11854] ? selinux_file_ioctl+0x3cc/0x540 [ 698.436489][T11854] ? br_dev_read_uargs+0x3f0/0x3f0 [ 698.441440][T11854] sock_ioctl+0x291/0x740 [ 698.445690][T11854] ? sock_poll+0x400/0x400 [ 698.450224][T11854] ? __fget_files+0x2cb/0x330 [ 698.454711][T11854] ? security_file_ioctl+0x84/0xb0 [ 698.460007][T11854] ? sock_poll+0x400/0x400 [ 698.464968][T11854] __se_sys_ioctl+0x114/0x190 [ 698.470258][T11854] __x64_sys_ioctl+0x7b/0x90 [ 698.474856][T11854] x64_sys_call+0x98/0x9a0 [ 698.480548][T11854] do_syscall_64+0x3b/0xb0 [ 698.487574][T11854] ? clear_bhb_loop+0x55/0xb0 [ 698.493042][T11854] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 698.499926][T11854] RIP: 0033:0x7fbc55f8cda9 [ 698.505344][T11854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 698.526608][T11854] RSP: 002b:00007fbc56eba038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 698.534847][T11854] RAX: ffffffffffffffda RBX: 00007fbc561a6080 RCX: 00007fbc55f8cda9 [ 698.542658][T11854] RDX: 0000000020000080 RSI: 00000000000089a1 RDI: 0000000000000004 [ 698.550576][T11854] RBP: 00007fbc56eba090 R08: 0000000000000000 R09: 0000000000000000 [ 698.558388][T11854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 698.566354][T11854] R13: 0000000000000000 R14: 00007fbc561a6080 R15: 00007ffc6e67bae8 [ 698.574530][T11854] [ 698.717261][T11852] device sit0 entered promiscuous mode [ 698.827365][T11871] device sit0 left promiscuous mode [ 700.435080][T11890] device syzkaller0 entered promiscuous mode [ 701.422698][T11923] bridge0: port 3(veth0_vlan) entered blocking state [ 701.447560][T11923] bridge0: port 3(veth0_vlan) entered disabled state [ 701.528598][T11923] bridge0: port 3(veth0_vlan) entered blocking state [ 701.535112][T11923] bridge0: port 3(veth0_vlan) entered forwarding state [ 703.067791][T11955] device sit0 entered promiscuous mode [ 704.016187][T11991] device veth1_macvtap left promiscuous mode [ 704.100190][T11990] device sit0 left promiscuous mode [ 704.164146][T11993] device sit0 entered promiscuous mode [ 705.025448][T12005] FAULT_INJECTION: forcing a failure. [ 705.025448][T12005] name failslab, interval 1, probability 0, space 0, times 0 [ 705.127443][T12005] CPU: 0 PID: 12005 Comm: syz.1.3418 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 705.137360][T12005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 705.147395][T12005] Call Trace: [ 705.150591][T12005] [ 705.153367][T12005] dump_stack_lvl+0x151/0x1b7 [ 705.157879][T12005] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 705.163188][T12005] ? avc_has_perm+0x16f/0x260 [ 705.167694][T12005] dump_stack+0x15/0x18 [ 705.171699][T12005] should_fail_ex+0x3d0/0x520 [ 705.176201][T12005] __should_failslab+0xaf/0xf0 [ 705.180916][T12005] ? kernfs_fop_open+0x350/0xb10 [ 705.185909][T12005] should_failslab+0x9/0x20 [ 705.191323][T12005] __kmem_cache_alloc_node+0x3d/0x2a0 [ 705.196532][T12005] ? kernfs_fop_open+0x350/0xb10 [ 705.201738][T12005] kmalloc_trace+0x2a/0xa0 [ 705.206110][T12005] kernfs_fop_open+0x350/0xb10 [ 705.210676][T12005] ? fsnotify_perm+0x269/0x5b0 [ 705.215277][T12005] ? kernfs_fop_mmap+0x480/0x480 [ 705.220138][T12005] do_dentry_open+0x891/0x1250 [ 705.224740][T12005] vfs_open+0x73/0x80 [ 705.228556][T12005] path_openat+0x2532/0x2d60 [ 705.232985][T12005] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 705.238908][T12005] ? do_filp_open+0x480/0x480 [ 705.243401][T12005] do_filp_open+0x230/0x480 [ 705.247741][T12005] ? vfs_tmpfile+0x480/0x480 [ 705.252269][T12005] ? alloc_fd+0x4fe/0x5a0 [ 705.256429][T12005] do_sys_openat2+0x151/0x870 [ 705.260932][T12005] ? bit_wait_io_timeout+0x120/0x120 [ 705.266139][T12005] ? __mutex_lock_slowpath+0x10/0x10 [ 705.271348][T12005] ? do_sys_open+0x220/0x220 [ 705.275778][T12005] ? fput+0x15b/0x1b0 [ 705.279595][T12005] ? ksys_write+0x260/0x2c0 [ 705.284042][T12005] ? __this_cpu_preempt_check+0x13/0x20 [ 705.289492][T12005] __x64_sys_openat+0x243/0x290 [ 705.294262][T12005] ? __ia32_sys_open+0x270/0x270 [ 705.299045][T12005] ? debug_smp_processor_id+0x17/0x20 [ 705.304242][T12005] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 705.310241][T12005] ? exit_to_user_mode_prepare+0x39/0xa0 [ 705.315718][T12005] x64_sys_call+0x6bf/0x9a0 [ 705.320038][T12005] do_syscall_64+0x3b/0xb0 [ 705.324550][T12005] ? clear_bhb_loop+0x55/0xb0 [ 705.329066][T12005] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 705.334794][T12005] RIP: 0033:0x7f303118cda9 [ 705.339048][T12005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 705.358748][T12005] RSP: 002b:00007f3030fff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 705.366995][T12005] RAX: ffffffffffffffda RBX: 00007f30313a5fa0 RCX: 00007f303118cda9 [ 705.374984][T12005] RDX: 000000000000275a RSI: 0000000020000080 RDI: 0000000000000007 [ 705.383239][T12005] RBP: 00007f3030fff090 R08: 0000000000000000 R09: 0000000000000000 [ 705.391332][T12005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 705.399569][T12005] R13: 0000000000000000 R14: 00007f30313a5fa0 R15: 00007ffdbe56a318 [ 705.409776][T12005] [ 705.630648][T12010] syz.3.3420 (12010) used obsolete PPPIOCDETACH ioctl [ 805.716287][ C1] rcu: INFO: rcu_preempt detected stalls on CPUs/tasks: [ 805.723062][ C1] rcu: 0-...!: (0 ticks this GP) idle=74c4/1/0x4000000000000000 softirq=59122/59122 fqs=0 [ 805.732856][ C1] (detected by 1, t=10002 jiffies, g=87233, q=113 ncpus=2) [ 805.739980][ C1] Sending NMI from CPU 1 to CPUs 0: [ 805.745053][ C0] NMI backtrace for cpu 0 [ 805.745066][ C0] CPU: 0 PID: 12001 Comm: syz.4.3416 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 805.745083][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 805.745094][ C0] RIP: 0010:kvm_wait+0x117/0x180 [ 805.745117][ C0] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d da de 50 04 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 805.745131][ C0] RSP: 0018:ffffc90002ecf2e0 EFLAGS: 00000046 [ 805.745146][ C0] RAX: 0000000000000003 RBX: 1ffff920005d9e60 RCX: ffffffff8522775c [ 805.745158][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f6e27b80 [ 805.745169][ C0] RBP: ffffc90002ecf390 R08: dffffc0000000000 R09: ffffed103edc4f71 [ 805.745181][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 805.745193][ C0] R13: ffff8881f6e27b80 R14: 0000000000000003 R15: 1ffff920005d9e64 [ 805.745204][ C0] FS: 00007f0e9e1ff6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 805.745219][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 805.745230][ C0] CR2: 0000001b3100bff8 CR3: 0000000174612000 CR4: 00000000003506b0 [ 805.745245][ C0] DR0: 0000000000000000 DR1: 0000000000000003 DR2: 0000000000000000 [ 805.745255][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 805.745266][ C0] Call Trace: [ 805.745273][ C0] [ 805.745282][ C0] ? show_regs+0x58/0x60 [ 805.745314][ C0] ? nmi_cpu_backtrace+0x285/0x2f0 [ 805.745336][ C0] ? nmi_trigger_cpumask_backtrace+0x3b0/0x3b0 [ 805.745360][ C0] ? kvm_wait+0x117/0x180 [ 805.745374][ C0] ? kvm_wait+0x117/0x180 [ 805.745388][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 805.745406][ C0] ? nmi_handle+0xa7/0x280 [ 805.745422][ C0] ? kvm_wait+0x117/0x180 [ 805.745436][ C0] ? default_do_nmi+0x69/0x160 [ 805.745456][ C0] ? exc_nmi+0xad/0x100 [ 805.745474][ C0] ? end_repeat_nmi+0x16/0x31 [ 805.745497][ C0] ? __pv_queued_spin_lock_slowpath+0x67c/0xda0 [ 805.745517][ C0] ? kvm_wait+0x117/0x180 [ 805.745531][ C0] ? kvm_wait+0x117/0x180 [ 805.745545][ C0] ? kvm_wait+0x117/0x180 [ 805.745559][ C0] [ 805.745564][ C0] [ 805.745570][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 805.745586][ C0] ? pv_hash+0x86/0x150 [ 805.745606][ C0] __pv_queued_spin_lock_slowpath+0x6de/0xda0 [ 805.745626][ C0] ? 0xffffffffa00007ec [ 805.745639][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 805.745667][ C0] ? __kernel_text_address+0xd/0x40 [ 805.745682][ C0] ? unwind_get_return_address+0x4d/0x90 [ 805.745703][ C0] _raw_spin_lock_irqsave+0x1a0/0x210 [ 805.745722][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 805.745739][ C0] ? stack_trace_save+0x113/0x1c0 [ 805.745756][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 805.745774][ C0] lock_timer_base+0x12f/0x270 [ 805.745794][ C0] __mod_timer+0x1c9/0xcf0 [ 805.745837][ C0] ? kasan_save_stack+0x4d/0x60 [ 805.745857][ C0] ? kasan_save_stack+0x3b/0x60 [ 805.745876][ C0] ? __kasan_record_aux_stack+0xb4/0xc0 [ 805.745891][ C0] ? kasan_record_aux_stack_noalloc+0xb/0x10 [ 805.745907][ C0] ? bpf_prog_00ae76e1971628b5+0x3d/0x41 [ 805.745922][ C0] ? bpf_trace_run3+0x233/0x2e0 [ 805.745936][ C0] ? __bpf_trace_timer_start+0x2b/0x40 [ 805.745955][ C0] ? __mod_timer+0x8d3/0xcf0 [ 805.745973][ C0] ? mod_timer+0x1f/0x30 [ 805.745991][ C0] ? mod_timer_pending+0x30/0x30 [ 805.746010][ C0] ? do_syscall_64+0x3b/0xb0 [ 805.746026][ C0] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 805.746050][ C0] add_timer+0x68/0x80 [ 805.746068][ C0] __queue_delayed_work+0x16d/0x1f0 [ 805.746088][ C0] queue_delayed_work_on+0x10f/0x180 [ 805.746107][ C0] ? delayed_work_timer_fn+0x80/0x80 [ 805.746128][ C0] kvfree_call_rcu+0x490/0x800 [ 805.746146][ C0] ? __kasan_check_write+0x14/0x20 [ 805.746162][ C0] ? call_rcu+0x10f0/0x10f0 [ 805.746180][ C0] ? longest_prefix_match+0x331/0x650 [ 805.746204][ C0] trie_delete_elem+0x5a6/0x760 [ 805.746228][ C0] bpf_prog_00ae76e1971628b5+0x3d/0x41 [ 805.746243][ C0] bpf_trace_run3+0x233/0x2e0 [ 805.746259][ C0] ? bpf_trace_run2+0x290/0x290 [ 805.746272][ C0] ? calc_wheel_index+0x40c/0xa50 [ 805.746293][ C0] ? timer_update_keys+0xb0/0xb0 [ 805.746313][ C0] ? debug_smp_processor_id+0x17/0x20 [ 805.746333][ C0] ? get_nohz_timer_target+0x79/0x740 [ 805.746366][ C0] __bpf_trace_timer_start+0x2b/0x40 [ 805.746386][ C0] enqueue_timer+0x303/0x480 [ 805.746407][ C0] __mod_timer+0x8d3/0xcf0 [ 805.746428][ C0] ? mod_timer_pending+0x30/0x30 [ 805.746448][ C0] ? selinux_socket_post_create+0x2fe/0x500 [ 805.746467][ C0] ? selinux_socket_create+0x330/0x330 [ 805.746485][ C0] mod_timer+0x1f/0x30 [ 805.746503][ C0] sk_reset_timer+0x22/0xb0 [ 805.746522][ C0] tipc_sk_finish_conn+0x164/0x860 [ 805.746545][ C0] tipc_socketpair+0x2a8/0x4f0 [ 805.746565][ C0] __sys_socketpair+0x3e0/0x6e0 [ 805.746585][ C0] ? __ia32_sys_socket+0x90/0x90 [ 805.746607][ C0] ? fpregs_restore_userregs+0x130/0x290 [ 805.746626][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 805.746647][ C0] x64_sys_call+0x19b/0x9a0 [ 805.746663][ C0] do_syscall_64+0x3b/0xb0 [ 805.746680][ C0] ? clear_bhb_loop+0x55/0xb0 [ 805.746699][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 805.746719][ C0] RIP: 0033:0x7f0e9e38cda9 [ 805.746731][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 805.746745][ C0] RSP: 002b:00007f0e9e1ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 805.746761][ C0] RAX: ffffffffffffffda RBX: 00007f0e9e5a5fa0 RCX: 00007f0e9e38cda9 [ 805.746773][ C0] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 805.746783][ C0] RBP: 00007f0e9e40e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 805.746793][ C0] R10: 0000000020000940 R11: 0000000000000246 R12: 0000000000000000 [ 805.746804][ C0] R13: 0000000000000000 R14: 00007f0e9e5a5fa0 R15: 00007ffd8c5d8a88 [ 805.746902][ C0] [ 805.747020][ C1] rcu: rcu_preempt kthread starved for 10002 jiffies! g87233 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=1 [ 806.336044][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 806.345853][ C1] rcu: RCU grace-period kthread stack dump: [ 806.351700][ C1] task:rcu_preempt state:R running task stack:27000 pid:14 ppid:2 flags:0x00004000 [ 806.362776][ C1] Call Trace: [ 806.365901][ C1] [ 806.368861][ C1] __schedule+0xcb5/0x1560 [ 806.373156][ C1] ? __sched_text_start+0x8/0x8 [ 806.377837][ C1] ? __kasan_check_write+0x14/0x20 [ 806.382787][ C1] schedule+0xc3/0x180 [ 806.386686][ C1] schedule_timeout+0x18c/0x380 [ 806.391371][ C1] ? _raw_spin_unlock_irq+0x4d/0x70 [ 806.396404][ C1] ? console_conditional_schedule+0x10/0x10 [ 806.402135][ C1] ? update_process_times+0x1b0/0x1b0 [ 806.407341][ C1] ? prepare_to_swait_event+0x308/0x320 [ 806.412727][ C1] rcu_gp_fqs_loop+0x2ed/0x10a0 [ 806.417414][ C1] ? _raw_spin_unlock_irq+0x4d/0x70 [ 806.422442][ C1] ? rcu_gp_init+0xc7f/0xfa0 [ 806.426871][ C1] ? rcu_gp_init+0xfa0/0xfa0 [ 806.431297][ C1] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 806.436940][ C1] ? finish_swait+0x17d/0x1b0 [ 806.441457][ C1] rcu_gp_kthread+0xa3/0x3a0 [ 806.445880][ C1] ? queued_spin_lock_slowpath+0x50/0x50 [ 806.451345][ C1] ? set_cpus_allowed_ptr+0xa4/0xe0 [ 806.456466][ C1] ? __kasan_check_read+0x11/0x20 [ 806.461330][ C1] ? __kthread_parkme+0x12d/0x180 [ 806.466187][ C1] kthread+0x26d/0x300 [ 806.470102][ C1] ? queued_spin_lock_slowpath+0x50/0x50 [ 806.475575][ C1] ? kthread_blkcg+0xd0/0xd0 [ 806.479986][ C1] ret_from_fork+0x1f/0x30 [ 806.484244][ C1] [ 806.487108][ C1] rcu: Stack dump where RCU GP kthread last ran: [ 806.493270][ C1] CPU: 1 PID: 12009 Comm: syz.3.3420 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 806.503227][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 806.513114][ C1] RIP: 0010:smp_call_function_many_cond+0x84f/0x930 [ 806.519537][ C1] Code: 3e 44 89 fe 83 e6 01 31 ff e8 dd 9b 09 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 0a e8 18 98 09 00 e9 2f ff ff ff f3 90 <42> 0f b6 04 3b 84 c0 75 14 41 f7 06 01 00 00 00 0f 84 12 ff ff ff [ 806.538997][ C1] RSP: 0018:ffffc90003bef960 EFLAGS: 00000293 [ 806.544891][ C1] RAX: ffffffff816bfcca RBX: 1ffff1103edc7a99 RCX: ffff88812998a880 [ 806.552691][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 806.560503][ C1] RBP: ffffc90003befa78 R08: ffffffff816bfc93 R09: ffffed103ede71fb [ 806.568439][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 806.576217][ C1] R13: 0000000800000000 R14: ffff8881f6e3d4c8 R15: dffffc0000000000 [ 806.584024][ C1] FS: 0000555557681500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 806.592791][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 806.599213][ C1] CR2: 0000000000000000 CR3: 000000017374b000 CR4: 00000000003506a0 [ 806.607027][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 806.614840][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 806.622647][ C1] Call Trace: [ 806.625772][ C1] [ 806.628562][ C1] ? show_regs+0x58/0x60 [ 806.632638][ C1] ? dump_cpu_task+0x3c/0x70 [ 806.637057][ C1] ? rcu_check_gp_kthread_starvation+0x1d1/0x240 [ 806.643223][ C1] ? print_other_cpu_stall+0x1140/0x1300 [ 806.648690][ C1] ? print_cpu_stall+0x590/0x590 [ 806.653462][ C1] ? acct_account_cputime+0xf7/0x2c0 [ 806.658583][ C1] ? rcu_sched_clock_irq+0xb19/0x1350 [ 806.663791][ C1] ? rcu_boost_kthread_setaffinity+0x590/0x590 [ 806.669797][ C1] ? hrtimer_run_queues+0x15f/0x440 [ 806.674824][ C1] ? update_wall_time+0x25/0x30 [ 806.679499][ C1] ? update_process_times+0x149/0x1b0 [ 806.684709][ C1] ? tick_sched_timer+0x188/0x240 [ 806.689566][ C1] ? tick_setup_sched_timer+0x490/0x490 [ 806.694961][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 806.700159][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 806.705102][ C1] ? clockevents_program_event+0x22f/0x300 [ 806.710745][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 806.716649][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 806.721600][ C1] ? __sysvec_apic_timer_interrupt+0xfb/0x3f0 [ 806.727497][ C1] ? sysvec_apic_timer_interrupt+0xa4/0xc0 [ 806.733138][ C1] [ 806.735915][ C1] [ 806.738702][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 806.744683][ C1] ? smp_call_function_many_cond+0x833/0x930 [ 806.750498][ C1] ? smp_call_function_many_cond+0x86a/0x930 [ 806.756314][ C1] ? smp_call_function_many_cond+0x84f/0x930 [ 806.762139][ C1] ? text_poke_sync+0x30/0x30 [ 806.766646][ C1] ? smp_call_function_many+0x40/0x40 [ 806.771854][ C1] ? text_poke_sync+0x30/0x30 [ 806.776449][ C1] on_each_cpu_cond_mask+0x40/0x80 [ 806.781399][ C1] ? bpf_prog_run_clear_cb+0x56/0x1a0 [ 806.786602][ C1] text_poke_bp_batch+0x1e9/0x730 [ 806.791467][ C1] ? text_poke_loc_init+0x680/0x680 [ 806.796498][ C1] ? mutex_lock+0xb1/0x1e0 [ 806.800751][ C1] ? __mutex_lock_slowpath+0x10/0x10 [ 806.805873][ C1] ? bit_wait_io_timeout+0x120/0x120 [ 806.810993][ C1] ? bpf_prog_run_clear_cb+0x56/0x1a0 [ 806.816201][ C1] ? text_poke_queue+0xe4/0x1a0 [ 806.820887][ C1] text_poke_finish+0x1a/0x30 [ 806.825404][ C1] arch_jump_label_transform_apply+0x15/0x30 [ 806.831216][ C1] __jump_label_update+0x36a/0x380 [ 806.836164][ C1] jump_label_update+0x3af/0x450 [ 806.840949][ C1] ? bpf_perf_link_release+0x1/0x80 [ 806.845970][ C1] __static_key_slow_dec_cpuslocked+0x112/0x170 [ 806.852134][ C1] ? bpf_perf_link_dealloc+0x20/0x20 [ 806.857255][ C1] static_key_slow_dec+0x52/0xa0 [ 806.862027][ C1] bpf_stats_release+0x21/0x40 [ 806.866634][ C1] __fput+0x1e5/0x870 [ 806.870450][ C1] ____fput+0x15/0x20 [ 806.874268][ C1] task_work_run+0x24d/0x2e0 [ 806.878693][ C1] ? task_work_cancel+0x2e0/0x2e0 [ 806.883554][ C1] ? close_fd+0x2f0/0x2f0 [ 806.887720][ C1] exit_to_user_mode_loop+0x94/0xa0 [ 806.892756][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 806.898047][ C1] syscall_exit_to_user_mode+0x26/0x130 [ 806.903430][ C1] do_syscall_64+0x47/0xb0 [ 806.907681][ C1] ? clear_bhb_loop+0x55/0xb0 [ 806.912196][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 806.917924][ C1] RIP: 0033:0x7fbc55f8cda9 [ 806.922199][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 806.941967][ C1] RSP: 002b:00007ffc6e67bc48 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 806.950320][ C1] RAX: 0000000000000000 RBX: 00000000000ac438 RCX: 00007fbc55f8cda9 [ 806.958294][ C1] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 806.966097][ C1] RBP: 00007fbc561a7ba0 R08: 0000000000000001 R09: 00007ffc6e67bf4f [ 806.973911][ C1] R10: 00007fbc55c00000 R11: 0000000000000246 R12: 00000000000ac480 [ 806.981814][ C1] R13: 00007fbc561a5fa0 R14: 0000000000000032 R15: ffffffffffffffff [ 806.989708][ C1] [ 947.073295][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 226s! [syz.3.3420:12009] [ 947.081451][ C1] Modules linked in: [ 947.085184][ C1] CPU: 1 PID: 12009 Comm: syz.3.3420 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 947.094902][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 947.104798][ C1] RIP: 0010:smp_call_function_many_cond+0x84f/0x930 [ 947.111223][ C1] Code: 3e 44 89 fe 83 e6 01 31 ff e8 dd 9b 09 00 41 83 e7 01 49 bf 00 00 00 00 00 fc ff df 75 0a e8 18 98 09 00 e9 2f ff ff ff f3 90 <42> 0f b6 04 3b 84 c0 75 14 41 f7 06 01 00 00 00 0f 84 12 ff ff ff [ 947.131011][ C1] RSP: 0018:ffffc90003bef960 EFLAGS: 00000293 [ 947.136912][ C1] RAX: ffffffff816bfcca RBX: 1ffff1103edc7a99 RCX: ffff88812998a880 [ 947.144721][ C1] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000 [ 947.152537][ C1] RBP: ffffc90003befa78 R08: ffffffff816bfc93 R09: ffffed103ede71fb [ 947.160347][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 947.168156][ C1] R13: 0000000800000000 R14: ffff8881f6e3d4c8 R15: dffffc0000000000 [ 947.175990][ C1] FS: 0000555557681500(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 947.184735][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 947.191157][ C1] CR2: 0000000000000000 CR3: 000000017374b000 CR4: 00000000003506a0 [ 947.198976][ C1] DR0: 0000000020000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 947.206792][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 947.214592][ C1] Call Trace: [ 947.217718][ C1] [ 947.220412][ C1] ? show_regs+0x58/0x60 [ 947.224485][ C1] ? watchdog_timer_fn+0x4b1/0x5f0 [ 947.229433][ C1] ? proc_watchdog_cpumask+0xf0/0xf0 [ 947.234558][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 947.239769][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 947.244710][ C1] ? clockevents_program_event+0x22f/0x300 [ 947.250351][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 947.256254][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 947.261204][ C1] ? __sysvec_apic_timer_interrupt+0xfb/0x3f0 [ 947.267104][ C1] ? sysvec_apic_timer_interrupt+0xa4/0xc0 [ 947.272746][ C1] [ 947.275540][ C1] [ 947.278302][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 947.284401][ C1] ? smp_call_function_many_cond+0x833/0x930 [ 947.290211][ C1] ? smp_call_function_many_cond+0x86a/0x930 [ 947.296021][ C1] ? smp_call_function_many_cond+0x84f/0x930 [ 947.301837][ C1] ? text_poke_sync+0x30/0x30 [ 947.306348][ C1] ? smp_call_function_many+0x40/0x40 [ 947.311564][ C1] ? text_poke_sync+0x30/0x30 [ 947.316071][ C1] on_each_cpu_cond_mask+0x40/0x80 [ 947.321018][ C1] ? bpf_prog_run_clear_cb+0x56/0x1a0 [ 947.326310][ C1] text_poke_bp_batch+0x1e9/0x730 [ 947.331186][ C1] ? text_poke_loc_init+0x680/0x680 [ 947.336206][ C1] ? mutex_lock+0xb1/0x1e0 [ 947.340463][ C1] ? __mutex_lock_slowpath+0x10/0x10 [ 947.345581][ C1] ? bit_wait_io_timeout+0x120/0x120 [ 947.350699][ C1] ? bpf_prog_run_clear_cb+0x56/0x1a0 [ 947.356441][ C1] ? text_poke_queue+0xe4/0x1a0 [ 947.361124][ C1] text_poke_finish+0x1a/0x30 [ 947.365634][ C1] arch_jump_label_transform_apply+0x15/0x30 [ 947.371446][ C1] __jump_label_update+0x36a/0x380 [ 947.376405][ C1] jump_label_update+0x3af/0x450 [ 947.381164][ C1] ? bpf_perf_link_release+0x1/0x80 [ 947.386200][ C1] __static_key_slow_dec_cpuslocked+0x112/0x170 [ 947.392277][ C1] ? bpf_perf_link_dealloc+0x20/0x20 [ 947.397394][ C1] static_key_slow_dec+0x52/0xa0 [ 947.402171][ C1] bpf_stats_release+0x21/0x40 [ 947.406771][ C1] __fput+0x1e5/0x870 [ 947.410606][ C1] ____fput+0x15/0x20 [ 947.414406][ C1] task_work_run+0x24d/0x2e0 [ 947.418836][ C1] ? task_work_cancel+0x2e0/0x2e0 [ 947.423698][ C1] ? close_fd+0x2f0/0x2f0 [ 947.427869][ C1] exit_to_user_mode_loop+0x94/0xa0 [ 947.432896][ C1] exit_to_user_mode_prepare+0x5a/0xa0 [ 947.438194][ C1] syscall_exit_to_user_mode+0x26/0x130 [ 947.443572][ C1] do_syscall_64+0x47/0xb0 [ 947.447824][ C1] ? clear_bhb_loop+0x55/0xb0 [ 947.452338][ C1] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 947.458064][ C1] RIP: 0033:0x7fbc55f8cda9 [ 947.462318][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 947.481768][ C1] RSP: 002b:00007ffc6e67bc48 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 947.490008][ C1] RAX: 0000000000000000 RBX: 00000000000ac438 RCX: 00007fbc55f8cda9 [ 947.497817][ C1] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 947.505628][ C1] RBP: 00007fbc561a7ba0 R08: 0000000000000001 R09: 00007ffc6e67bf4f [ 947.513439][ C1] R10: 00007fbc55c00000 R11: 0000000000000246 R12: 00000000000ac480 [ 947.521254][ C1] R13: 00007fbc561a5fa0 R14: 0000000000000032 R15: ffffffffffffffff [ 947.529124][ C1] [ 947.532016][ C1] Sending NMI from CPU 1 to CPUs 0: [ 947.537108][ C0] NMI backtrace for cpu 0 [ 947.537119][ C0] CPU: 0 PID: 12001 Comm: syz.4.3416 Not tainted 6.1.124-syzkaller-00111-g1ffc24e7e898 #0 [ 947.537136][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 947.537146][ C0] RIP: 0010:kvm_wait+0x117/0x180 [ 947.537167][ C0] Code: 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 53 41 0f b6 45 00 44 38 f0 0f 85 63 ff ff ff 66 90 0f 00 2d da de 50 04 f4 54 ff ff ff fa 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b [ 947.537181][ C0] RSP: 0018:ffffc90002ecf2e0 EFLAGS: 00000046 [ 947.537196][ C0] RAX: 0000000000000003 RBX: 1ffff920005d9e60 RCX: ffffffff8522775c [ 947.537208][ C0] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff8881f6e27b80 [ 947.537220][ C0] RBP: ffffc90002ecf390 R08: dffffc0000000000 R09: ffffed103edc4f71 [ 947.537231][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 947.537242][ C0] R13: ffff8881f6e27b80 R14: 0000000000000003 R15: 1ffff920005d9e64 [ 947.537253][ C0] FS: 00007f0e9e1ff6c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 947.537269][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 947.537280][ C0] CR2: 0000001b3100bff8 CR3: 0000000174612000 CR4: 00000000003506b0 [ 947.537296][ C0] DR0: 0000000000000000 DR1: 0000000000000003 DR2: 0000000000000000 [ 947.537305][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 947.537315][ C0] Call Trace: [ 947.537323][ C0] [ 947.537330][ C0] ? show_regs+0x58/0x60 [ 947.537364][ C0] ? nmi_cpu_backtrace+0x285/0x2f0 [ 947.537414][ C0] ? nmi_trigger_cpumask_backtrace+0x3b0/0x3b0 [ 947.537466][ C0] ? kvm_wait+0x117/0x180 [ 947.537479][ C0] ? kvm_wait+0x117/0x180 [ 947.537494][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 947.537511][ C0] ? nmi_handle+0xa7/0x280 [ 947.537528][ C0] ? kvm_wait+0x117/0x180 [ 947.537541][ C0] ? kvm_wait+0x117/0x180 [ 947.537555][ C0] ? default_do_nmi+0x69/0x160 [ 947.537587][ C0] ? exc_nmi+0xad/0x100 [ 947.537605][ C0] ? end_repeat_nmi+0x16/0x31 [ 947.537628][ C0] ? __pv_queued_spin_lock_slowpath+0x67c/0xda0 [ 947.537648][ C0] ? kvm_wait+0x117/0x180 [ 947.537662][ C0] ? kvm_wait+0x117/0x180 [ 947.537677][ C0] ? kvm_wait+0x117/0x180 [ 947.537692][ C0] [ 947.537696][ C0] [ 947.537702][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 947.537719][ C0] ? pv_hash+0x86/0x150 [ 947.537738][ C0] __pv_queued_spin_lock_slowpath+0x6de/0xda0 [ 947.537758][ C0] ? 0xffffffffa00007ec [ 947.537771][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 947.537790][ C0] ? __kernel_text_address+0xd/0x40 [ 947.537805][ C0] ? unwind_get_return_address+0x4d/0x90 [ 947.537826][ C0] _raw_spin_lock_irqsave+0x1a0/0x210 [ 947.537845][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 947.537862][ C0] ? stack_trace_save+0x113/0x1c0 [ 947.537879][ C0] ? stack_trace_snprint+0xf0/0xf0 [ 947.537896][ C0] lock_timer_base+0x12f/0x270 [ 947.537917][ C0] __mod_timer+0x1c9/0xcf0 [ 947.537935][ C0] ? kasan_save_stack+0x4d/0x60 [ 947.537954][ C0] ? kasan_save_stack+0x3b/0x60 [ 947.537980][ C0] ? __kasan_record_aux_stack+0xb4/0xc0 [ 947.537995][ C0] ? kasan_record_aux_stack_noalloc+0xb/0x10 [ 947.538010][ C0] ? bpf_prog_00ae76e1971628b5+0x3d/0x41 [ 947.538025][ C0] ? bpf_trace_run3+0x233/0x2e0 [ 947.538046][ C0] ? __bpf_trace_timer_start+0x2b/0x40 [ 947.538064][ C0] ? __mod_timer+0x8d3/0xcf0 [ 947.538082][ C0] ? mod_timer+0x1f/0x30 [ 947.538101][ C0] ? mod_timer_pending+0x30/0x30 [ 947.538119][ C0] ? do_syscall_64+0x3b/0xb0 [ 947.538137][ C0] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 947.538165][ C0] add_timer+0x68/0x80 [ 947.538183][ C0] __queue_delayed_work+0x16d/0x1f0 [ 947.538202][ C0] queue_delayed_work_on+0x10f/0x180 [ 947.538221][ C0] ? delayed_work_timer_fn+0x80/0x80 [ 947.538241][ C0] kvfree_call_rcu+0x490/0x800 [ 947.538258][ C0] ? __kasan_check_write+0x14/0x20 [ 947.538274][ C0] ? call_rcu+0x10f0/0x10f0 [ 947.538291][ C0] ? longest_prefix_match+0x331/0x650 [ 947.538314][ C0] trie_delete_elem+0x5a6/0x760 [ 947.538337][ C0] bpf_prog_00ae76e1971628b5+0x3d/0x41 [ 947.538352][ C0] bpf_trace_run3+0x233/0x2e0 [ 947.538367][ C0] ? bpf_trace_run2+0x290/0x290 [ 947.538381][ C0] ? calc_wheel_index+0x40c/0xa50 [ 947.538401][ C0] ? timer_update_keys+0xb0/0xb0 [ 947.538420][ C0] ? debug_smp_processor_id+0x17/0x20 [ 947.538440][ C0] ? get_nohz_timer_target+0x79/0x740 [ 947.538460][ C0] __bpf_trace_timer_start+0x2b/0x40 [ 947.538479][ C0] enqueue_timer+0x303/0x480 [ 947.538504][ C0] __mod_timer+0x8d3/0xcf0 [ 947.538526][ C0] ? mod_timer_pending+0x30/0x30 [ 947.538545][ C0] ? selinux_socket_post_create+0x2fe/0x500 [ 947.538565][ C0] ? selinux_socket_create+0x330/0x330 [ 947.538583][ C0] mod_timer+0x1f/0x30 [ 947.538601][ C0] sk_reset_timer+0x22/0xb0 [ 947.538620][ C0] tipc_sk_finish_conn+0x164/0x860 [ 947.538643][ C0] tipc_socketpair+0x2a8/0x4f0 [ 947.538664][ C0] __sys_socketpair+0x3e0/0x6e0 [ 947.538686][ C0] ? __ia32_sys_socket+0x90/0x90 [ 947.538707][ C0] ? fpregs_restore_userregs+0x130/0x290 [ 947.538726][ C0] __x64_sys_socketpair+0x9b/0xb0 [ 947.538747][ C0] x64_sys_call+0x19b/0x9a0 [ 947.538764][ C0] do_syscall_64+0x3b/0xb0 [ 947.538782][ C0] ? clear_bhb_loop+0x55/0xb0 [ 947.538802][ C0] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 947.538821][ C0] RIP: 0033:0x7f0e9e38cda9 [ 947.538833][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 947.538846][ C0] RSP: 002b:00007f0e9e1ff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 947.538863][ C0] RAX: ffffffffffffffda RBX: 00007f0e9e5a5fa0 RCX: 00007f0e9e38cda9 [ 947.538875][ C0] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 947.538884][ C0] RBP: 00007f0e9e40e2a0 R08: 0000000000000000 R09: 0000000000000000 [ 947.538895][ C0] R10: 0000000020000940 R11: 0000000000000246 R12: 0000000000000000 [ 947.538905][ C0] R13: 0000000000000000 R14: 00007f0e9e5a5fa0 R15: 00007ffd8c5d8a88 [ 947.538920][ C0]