last executing test programs: 9.9715432s ago: executing program 1 (id=2557): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r1, 0x20, &(0x7f0000000380)={&(0x7f0000004000)=""/4096, 0xfffffe74, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000000000000010009107cbf00000200"/50], 0x0, 0x32, 0xfffffffffffffeea, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb87af09a673486a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910b90000ddffff1d00"/29], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xffffffffffffffb9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7}, 0xb, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000a00)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500001000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) 6.790753387s ago: executing program 1 (id=2593): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c60ebab1c176bfdbb4ddffffff7f02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc28d0072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd5adb8e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39ddbb1edb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d01006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a634b93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff6f16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c64ac4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b059bc295aa0e38ff07edc3492b96e73d2060acfd8145e4a5851bc4d6fdc5ad939db52812e07795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b59895e0309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb284fcfde9015769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a10100000000000000c9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443a6a64c7803760880af23fb3f430a5d11fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670e31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630ed5a0c2261bc2d5de6ee174534b8dfc0432ab6bbcf296d36807544aa7c3d3301ae227b713a371414c98695e559f9cbf6b046184064a5f2424cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79aa2832c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574bda31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167a9f006685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca67905e877893646d185a75582f866785af6b0149e336c31fb177e3e85f4c60cbbde4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63db66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce985a31b52703d398d52694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90a6e865225f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853b8b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3045b9c790984c6fb65fd7887bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212dedd245b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e000000000000000000000087b97a200609c77e0000000000000000d3a54ccd0900a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09ac0090609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699f61acdc8e36010d76093ddd227d9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89732c651ed2644f34cfbc32e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eebf33a260a9b2647726795617a9d1700000000000000f65d0eb4b7b077f1b4d3c5254753ddc9d5861fca4ec4205af1c89fa638b00342ff5f5994fc1f042d1b4a0000000000000070035394b646baa4ba26f70c2c2fe2bc501ecc19f538fdeb7485b73a72a3cba6c50721ce39a0dba3757fcfdb20f40fc9f7fb5d0b6100000000000000005bc7aff2c5b266f8276c6a6eebeae26b7410b7b506f7518ef70721f4315b04f1c35d5c5ab58d6d78682c21821d8e0648feddf5734daba6e219ddc4708f0de8032515fdd2825334e43786d58caeaaee3bdfcfc7e27d90f26de71d00417b23910b4f2c06d21313a73fdb069482241e09d49d37d91a43a08812df97700683e828735af95018960271e49d61fb985e088d079ee30b347952dc5ba725047cef9b0065fed61cf2a4336bd8b3dea27ab071fc2cea404b8d39b798aef5739327b0f02add98cb77ad6c6fc582798a8e5b0e7baf898efaff86d859932b903881253c3457a86fb5ff849bb51959d3d16cba8e59bc854be0509d12d800000000000000000000000000f317892775411b258f8065c160e82caabcc7b2dd9bd88d2974d465ca94431d92f2240fa8e11aec7ee5c726b2c32b749ca10490eab4194626c58ec84f9fe93551027e829e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=@framed={{0x18, 0x2}, [@printk={@ld}, @call={0x85, 0x0, 0x0, 0x7}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 6.665889937s ago: executing program 1 (id=2594): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='mm_shrink_slab_start\x00', r3, 0x0, 0x4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080900020056e57a8af8ffb900000000000007020000f8ffff080000000008000000b70400000000000085000000030000009500000000000000b742db954ade8bb4d232c6dfcc47f903b0d8ae0e1323b8c77a48cce200bdc6bc258142261c252aea61690d559b7820685511"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4}, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000}}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r2) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 6.448112066s ago: executing program 1 (id=2599): bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xb00000000000000, &(0x7f0000000800)=@base={0x8, 0x4, 0x8, 0xbf22, 0x20, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x1b, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x40086602, 0x100000000000000) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a0000000500060002000000072e000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x16, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r6, 0x0, 0xfffffffffffffffe}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYRES32, @ANYRES32=r7], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x6f, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000002200007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000b98cad95850000000300000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000000000000c50000008600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, &(0x7f0000000180)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setsockopt$sock_attach_bpf(r9, 0x1, 0x32, &(0x7f00000000c0)=r10, 0x4) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x2, 0x102, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x1001, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) sendmsg$tipc(r12, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x400c040) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x9, 0x1, 0x2, 0x401, 0x8, r11, 0x9, '\x00', 0x0, r0, 0x0, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) setsockopt$sock_attach_bpf(r12, 0x1, 0x32, &(0x7f0000000000)=r10, 0x4) 3.624762134s ago: executing program 4 (id=2619): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0500000007"], 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x0, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x5}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x800000, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r3, 0x400454d9, 0x0) ioctl$TUNSETFILTEREBPF(r3, 0x800454e1, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'vcan0\x00', 0x1000}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000000400)={0x0, 0x0}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='0'], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r5, 0x20e, 0x111, 0x0, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000}, 0x50) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000000000000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffff80850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000029c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0x2d1, 0xfffffffffffffd85, &(0x7f00000000c0)="b9ff0303000d698cb89e40f008006000fd0e00001100630a77", 0x0, 0x100, 0x2000000, 0x0, 0x0, &(0x7f0000000440)}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x11, 0xe, 0x0, &(0x7f00000009c0)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.57210674s ago: executing program 4 (id=2624): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000cb1716965b1b42d806401f5173840000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffff9396, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYRES8=r2, @ANYRES64=r3, @ANYRES64], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) 2.53960766s ago: executing program 0 (id=2625): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0900000004000000080000000c00000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='mm_shrink_slab_start\x00', r3, 0x0, 0x4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080900020056e57a8af8ffb900000000000007020000f8ffff080000000008000000b70400000000000085000000030000009500000000000000b742db954ade8bb4d232c6dfcc47f903b0d8ae0e1323b8c77a48cce200bdc6bc258142261c252aea61690d559b7820685511"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4}, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x2}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000"], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 2.4784439s ago: executing program 4 (id=2627): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1a"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="0100002010c3"}) 2.380809739s ago: executing program 4 (id=2629): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0900000004000000080000000c00000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='mm_shrink_slab_start\x00', r3, 0x0, 0x4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080900020056e57a8af8ffb900000000000007020000f8ffff080000000008000000b70400000000000085000000030000009500000000000000b742db954ade8bb4d232c6dfcc47f903b0d8ae0e1323b8c77a48cce200bdc6bc258142261c252aea61690d559b7820685511"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4}, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x2}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000"], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 2.378780339s ago: executing program 0 (id=2630): openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.throttle.io_serviced_recursive\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x2000, 0x0) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20000010) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20000014) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r4}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r5, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f00000006c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000791048000000000079111800000000009500000000000000db74589d4b38cc306ac390649f72dea0e50e2317db042855d6c74ff3493c7e31e3f6c643155a8e0c01d50bc3347475750472719cc516fa14b769e7f385ba72c60242263c05ddab05e37efe81b8bffc35cd93263ff755d611c4cca1684b14708f6a83366aa430ad2d700b186da622d6fba700000000000000000000000002000000000000f2badf9815c5000000"], &(0x7f00000001c0)='syzkaller\x00', 0x2, 0xd1, &(0x7f0000000000)=""/209, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x36) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7538e475dd6317ce6203c23c00fe80000000010000875a65969ff50be800040000000000001e04"], 0xfe1b) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x800000, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x11, 0x5, &(0x7f00000008c0)=ANY=[@ANYBLOB="00000018100000706da9fda7b7fd8477484428de72735c0ed4bfb5541743e96ab7e6d35dd33476e41a1f9ce2b3262d5a04d0aa814ff6b2181c7a649dae521f453049368ee9df857c83d6715baae8e1db6e2d1831639a3d180b07a96e0ac22991fb105867e868a08e5008701d4461faf0f04e9a66c7c5fdb46b4d373ab394547a583bc2a7639c44c8780c08e482f90690fc0923c4417c947807888f4d623d0b47e6dec0414f01492b41788675fe642cdccf905a0e8fd6e4a40a45ef6042998cd48afb7fc1e5ef", @ANYRESOCT=r0, @ANYRES8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x69) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r9, 0x89f1, &(0x7f0000000080)) bpf$ITER_CREATE(0x21, &(0x7f00000002c0), 0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f2, &(0x7f0000000080)) 2.190020838s ago: executing program 4 (id=2633): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)=""/203, 0xcb}, {&(0x7f0000000a40)=""/4096, 0x1000}], 0x2, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}, 0x22022) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x17, 0x0, 0x8400, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_DELETE_ELEM(0x15, &(0x7f0000000400)={r3, 0x0, 0x20000000}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_procs(r2, &(0x7f0000000500)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000000000000850000008600000018110000", @ANYRES32=r6, @ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000003ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0x70000000, 0x0, 0x0, 0x0, 0x0, 0x1004, 0xff600000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000}, 0x50) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r7, 0x8982, 0x20000000) 2.068153628s ago: executing program 0 (id=2635): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="050000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x840, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x5, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7, @void, @value, @void, @value}, 0x50) socketpair(0x1d, 0x231f9f5820c86967, 0x6, &(0x7f0000000280)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) 1.928574417s ago: executing program 3 (id=2637): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000cb1716965b1b42d806401f5173840000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffff9396, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYRES8=r2, @ANYRES64=r3, @ANYRES64], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) 1.872685697s ago: executing program 4 (id=2638): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r1, 0x20, &(0x7f0000000380)={&(0x7f0000004000)=""/4096, 0xfffffe74, 0x0, 0x0}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000200000000000000010009107cbf00000200"/50], 0x0, 0x32, 0xfffffffffffffeea, 0x0, 0x0, 0x0, @void, @value}, 0x28) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeb87af09a673486a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000007910b90000ddffff1d00"/29], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xffffffffffffffb9, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x7}, 0xb, 0x0, r0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x58, &(0x7f0000000a00)}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000009500001000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001600)='blkio.bfq.io_service_bytes\x00', 0x0, 0x0) close(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='blkio.bfq.avg_queue_size\x00', 0x26e1, 0x0) 1.837397437s ago: executing program 3 (id=2639): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0900000004000000080000000c00000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r1}, &(0x7f0000000040), &(0x7f00000001c0)}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x2000000000000000, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000600)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5, 0x4, 0x0, @void, @value, @void, @value}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x1}) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000400)='mm_shrink_slab_start\x00', r3, 0x0, 0x4}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080900020056e57a8af8ffb900000000000007020000f8ffff080000000008000000b70400000000000085000000030000009500000000000000b742db954ade8bb4d232c6dfcc47f903b0d8ae0e1323b8c77a48cce200bdc6bc258142261c252aea61690d559b7820685511"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r4}, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0xf, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8000}, [@ldst={0x3, 0x2, 0x3, 0x1, 0x2}]}, &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000008085000000"], &(0x7f0000000040)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0xb, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x23}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x37) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r7}, 0x10) unlink(&(0x7f0000000140)='./cgroup\x00') 1.740780747s ago: executing program 0 (id=2641): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) (fail_nth: 13) 1.643528956s ago: executing program 2 (id=2642): openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000f8ffffff850000000400000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0xa0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xff}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001411) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='!\x00') ioctl$TUNSETOFFLOAD(r2, 0xc008744c, 0x20000000) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80, 0xca}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000ac0)={r0, 0x0, 0xbd, 0xad, &(0x7f00000006c0)="4f7f76beef6d69ad7fe47d1894a9a15392290ea9a6e8b00e3b945122bc5e69a5e02087fdf991463f60d6d3621d27ca722eb08c8b6f440a6d56c196d31095209d707c17e725e7e0f6ddb01897909c05551bc0052f9f808c8e8b4cdb26275edce63238623420188087b6358e481e0440c7c839071fd289b7072a026fd0c30e1bf697665256dd62996349fcac0e5b224f41e5a441bab3946190301d1f057ac16cec18f8199e3c3675366df7a96d2eaf7ea3d80d9549369c36c8a16edc0d38", &(0x7f00000008c0)=""/173, 0x8001, 0x0, 0x78, 0xa6, &(0x7f0000000980)="e79528564742f6f944db4bbb5e123656c5df1a2113bdf7d18da24853e0431c1e4dfa6b220b2fe280f59f37330557063bbb1c74b49e2540608e65a05ffaa30dad2c594862181ae9897f6719edbc7590c41ce815ff9ee7c82bb6468d59818af5e05b602a5f25a060d4f3add991022623e694752474f2ec03d4", &(0x7f0000000a00)="7e913ab6542cfb796f70d32b8843f71afed19d7f078261303ba3095b47f5ae02fab5a389afd51c3e3d3bf18b4e4b1e9e873577ec0ab401aacca2949593cdb0a4934eb813fcdb5dfbea61691a7540ad4fcb6fc33161b8cbecc5f53458b38f6f0866f557369a2f7352878a5888828fe02ae246710194996a20a78eb8cc4e087098d6efce3ac6154abc8509cdd00651ce04ebf296e18ccc0c4d75368079879f54fea856c2971680", 0x2, 0x0, 0xcaf}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r3}, &(0x7f00000002c0), &(0x7f0000000300)='%pB \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x3a0ffffffff) r6 = openat$cgroup_ro(r5, &(0x7f00000003c0)='io.stat\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000b40)=@base={0x1c, 0x4, 0x4, 0xbf25, 0x40080, r6, 0x8ca, '\x00', 0x0, r1, 0x0, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000080)={r7, &(0x7f00000000c0), 0x20000000}, 0x20) 1.583181056s ago: executing program 3 (id=2643): r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r4 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="b4050000fdff7f006110580000000000c60000000000000095000000000000009f33ef60916e6e713f1eeb0b725ad99b817fd98cd8073a46b08b94214d816f770600dcca55f21f3ca9e822d182054d54d53cd2b6db714e4beb4147000001000000008f2b9000f22425e4097ed62cbc891061017cfa6f6148a1c1e43f00001bde60beac671e8e8fdecb03588aa623fa71f31bf0f871ab5c2ff88afc60027f4e5b5271ed58e835cf0d0000000098b51fe68db8d9dbe87dcff414ed000000000000000000000000000000000000000000000000000000b347abe6352a080f8140e5fd10747b6ecdb3542646bf636e3d6e700e5b0500000000000000eb9e1403e6c8f7a187eaf60f3a17f0f046a307a403c19d9829c90bd2114252581567acae715cbe1b57d5cda432c5b910400623d24195405f2e76cc"], 0x0, 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r5, r4, 0x26, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r5}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x58, &(0x7f0000000500)}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000005c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000600)=[0x0, 0x0, 0x0], &(0x7f0000000640)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xe8, &(0x7f0000000680)=[{}, {}], 0x10, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x33, 0x8, 0x8, &(0x7f0000000740)}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001180)={{r1}, &(0x7f00000008c0), 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) close(r3) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xb, 0x9, 0x6, 0x2, 0x0, 0x2, 0x1, 0x6, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000040)}, 0x804, 0x5, 0x4, 0x3, 0xdd1, 0x2, 0x8001, 0x0, 0x6, 0x0, 0x2}, 0xffffffffffffffff, 0xe, r0, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) socketpair(0x2, 0x3, 0x0, &(0x7f0000000440)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) 851.564893ms ago: executing program 2 (id=2644): syz_clone(0x1000100, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003100)) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xecc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x6, 0x0, 0x200, 0x20, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0xa}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000380), 0x2, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500000000100000", @ANYRES32, @ANYBLOB="0000000000000000000000bc3900000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r3}, 0x10) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x6, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1802000000000000000000000000000085000000a000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f0000000080)={r4, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r5 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) write$cgroup_type(r5, &(0x7f0000000280), 0x9) r6 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0x8a91546ec0e4969, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000100018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 790.535073ms ago: executing program 1 (id=2645): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f0000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000300000000000000", @ANYRES32=0x1, @ANYBLOB="00000000000000e5000000000000f4ffffff0000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a000000010100004a97ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r1, r0}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000073050000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r7}, 0x10) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000280)={'wg2\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xc, 0xc, &(0x7f0000000080)=ANY=[@ANYRESHEX=r11], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r12}, 0x10) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0xe8, 0xeb, 0x1, 0xff, 0x0, 0xffffffffffffffff, 0x80048, 0x8, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xf, 0x1, @perf_config_ext={0x4, 0xd74}, 0x3, 0x1, 0x90000, 0x1, 0xffffffffffffffc5, 0x1, 0x0, 0x0, 0xb, 0x0, 0x46}, 0x0, 0x9, r4, 0x9) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r8, 0xe0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x5, &(0x7f0000000540)=[0x0, 0x0], &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x46, &(0x7f0000000740)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000780), &(0x7f00000007c0), 0x8, 0xf2, 0x8, 0x8, &(0x7f0000000800)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000ec0)={0xffffffffffffffff, 0x20, &(0x7f0000000e80)={&(0x7f0000000cc0)=""/189, 0xbd, 0x0, &(0x7f0000000d80)=""/238, 0xee}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001040)={0x13, 0x1, &(0x7f00000002c0)=@raw=[@jmp={0x5, 0x1, 0xd, 0x0, 0xb, 0x8}], &(0x7f00000004c0)='GPL\x00', 0x2f5, 0x0, 0x0, 0x40f00, 0x1, '\x00', r14, @fallback=0x38, 0xffffffffffffffff, 0x8, &(0x7f0000000a00)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, r15, r3, 0x9, &(0x7f0000000f00)=[r5], &(0x7f0000000f80)=[{0x0, 0x3, 0xa}, {0x0, 0x3, 0x7, 0x6}, {0x4, 0x3, 0xe, 0x2}, {0x5, 0x4, 0x3, 0x9}, {0x0, 0x1, 0xb, 0x9}, {0x0, 0x1, 0x1, 0x8}, {0x2, 0x2, 0x10, 0x5}, {0x4, 0x5, 0xf, 0x8}, {0x5, 0x3, 0x9, 0x9}], 0x10, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r13, 0x100000}, 0x10) 790.055533ms ago: executing program 2 (id=2646): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0x4, 0x6, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r0}, 0x38) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r0, &(0x7f0000000280)="a70ae5fe632d", &(0x7f0000000380)=""/195}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000073113700000000008510000002000000850000000500000095000000000040009500a50500000000dca4956e733d9bc8892aec24e77f5eca15c27bd4398ce9cb17e1081bae6676b3e1c7f6c1c724b15ad5f473d53fa1f69134408320dd289424f86c413061c9d7ec30506b7b587f4bad7529584e1f870f4d9d8743a94242c34fef6e223fd400a1390dc3963e4845d261fd72458cee68192fac30e2371a7fe51886251bf9b5e79b88d6bab76c9bdde2a6516ad9c696fe2b900000000000000000"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x4, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8922, &(0x7f0000000080)) 724.914613ms ago: executing program 2 (id=2647): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f2000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000f0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000000300000095000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r4, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0", 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 306.832641ms ago: executing program 3 (id=2648): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0xfffffffffffffff0}], {0x95, 0x0, 0x700}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 259.41261ms ago: executing program 3 (id=2649): bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000cb1716965b1b42d806401f5173840000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x11, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000013c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffff9396, @void, @value}, 0x94) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4b) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r4}, &(0x7f0000000000), &(0x7f00000005c0)=r5}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYRES8=r2, @ANYRES64=r3, @ANYRES64], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x40010) 237.32827ms ago: executing program 0 (id=2650): socketpair(0x2, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) socketpair(0x2, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) (async) 236.7332ms ago: executing program 1 (id=2651): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="050000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x840, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) ioctl$TUNATTACHFILTER(r3, 0x401054d5, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x5, 0x6, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7, @void, @value, @void, @value}, 0x50) socketpair(0x1d, 0x231f9f5820c86967, 0x6, &(0x7f0000000280)) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) 235.854731ms ago: executing program 2 (id=2652): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000f2000000000000000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000f0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002000000850000000300000095000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000001740)=ANY=[@ANYBLOB="3d6e02f01b6da52d67fe79d221bca1a4dd40ac037eece1ce3bb4878f3dc13b8272629526f6cc07910a3589d9d351f34c2066e5716af709206440ae5c16f56e8319f0640dce9f6accb2f78b6ee61cda90a0af4737ba4c5a6290ad54af1b04ad26fdf967e51d8ad215d0b78b897cf661f67acb42e53e0b7db1734d2ef2553eb12fde0b278773c645fab2a3f25eda762fcedf54376c4e4a38d1270d3754a2804ee01f5521fe6d07c4a412f51c28f43f0369ac026407aeb6bab65059cfdc0ec6e6e073b970cc65126f67af8a1db61c41739758485dab848132f9bca43024363dff67b83eae8a517a4e6cd6a3f45f36a0e431d09960e277156e3c4dd2797a64c42f2a72620b777f1494b2fd17f26c5a629dca493091b06e7cc17269a53be807a763c887c1ceb1335c98f70ceb50f035f61e6b7f2400d38bdadcd8081e4717982742351aea71044543f2fb90f213bab3cbe54cb7d7f19b242792c0c993bc2f3f24d4419aa3fe377c5d2f9bf38f0c7848650081b17ebca638e7cbc18752cc2b5b71c244ca34a8d59a84808a8d712dc23b182e7ac9e404b586bbc32a1aad87e4de15d84b0c3ded93b0295b29ab12bac611d677609f27b3af9ca5c668e069e59274965577a9555bd308e6ddc9403b381863afac4494a06a8e6e0f444b6e3042d45dadc6d64a9a192cd309ac2715b3c37116b60c963e776f072a7c80e4672c147944ae76bb193f1f17158894aea20d469cb2dc497f0391d25fe89cfa8807fb70082fa6a54d7a50b60fd58d4fe15fff51dd358ba0a0c357a61595b0c4d9447799d4411727eec4f569e44147ae81d806de4d0faf9bc49aaf2ab9eea47a134d9c46499360fa23babac70d08c954fabe4365deebe0c9b18247a77d235e2b6b507b1e4a3983e773e347a4b3723f78d5f7112b9f7d4fbde3abafa512cca3a4e5ca3bce43b7a99b486a2ef1d354f0877621a61c6e00b9a678fb5474a7e00a8cecd6ffc2d6cabefc745a060dd03a6eba971f6cf26288d68dcf43ec3b99df859850176e2e8d5714df8b50bc27dd55b30af7ef608e1c4b8c7ba62b810768760bdad3344d0766f264972ceb6076dd0fef2093d9845509b8471822bd7e47cecdcf3fe50871ea556399bcbc39745d37725704aa1325b18d49a33efd95d7fb3a9108860b869023881b34f259de71e2f78fe31c9b7d38d6d0742549f88824d7e1faaf83fb54528043113ed90d26a527aace8357782b3f09a0ac312b43544c6b358aca3cbe9ffa2b6d854fa8517351f8dbd9bc553856a16b534057ee6797e31b308d4f1880f33e28c4c7bf85d8cd1cb4eb55bf9f35d8def6820e9df6531f5bca15fae7b1510aded55b92d4fa401cf98cf1050fa67f7ce3780a3bca40aef317ad45b8053042e9eb984ed34b1a5803ebc1d51d600f25c144306aa5868fa96f5572ad9819dd25a576446d3223d787e41815b792d23486e6ef14183c69c537539e0f1383d55801fcbf16c9a00ebfc17819524fb5aa997f20408a4d0410de515ca302cb47b7a372da55f90e3a10798898af03cf433d2f9cbf49013a3e28cb31d14e790d7310c884c891b21b7eeae16237a73bec6a8e5e25099aee331f5abedd9ef8050f47c90b5f739c473947517ea5930a5c41c3d9ab9cbdf1d760f926ef6ca91a668d8b9e9699afef75ad6b6846b35c01c85c773bd1f186d28b387362831f87f7d6a390d0d2edd11e2889e209c0b10de769d2df4fe16f946fbcc03c5c867d87c477b050307af6fb9a2db18e233d23f697ca1f8530db2754158b159e912ec607a9fd8e79c245da619087e71441cef9d86028c69e208fffcbc1e54526d89bd2dc59c0f5c21ebf0b85a8c6ded738dd203e616f49813d6d786def219f9f2edd02adb3b331d44dfbb0ed4fcee162e49b2e0d8381587f52af92d36871449bb6b7a50a9f177ada1e1164eac7aff39fd655b791482b88fd94a3a2091d9b6b63960d9ee07e7609bca9736697f3f052cddb17f751fc3078674b731f84252991dc854f147c8f44ed494ae5312ce179f395eb7fcedd8b11f671a83913d286c0e9d2b460ced834e2c20cfa37254307159d774d70a9c5aea2a426e849fe2cdbbfd4ba0d4d14fd791df39c1c0e8169bfdd4210e4adf9ce809f516ca569d09766ee6e097d8ad50711c7586f9eb1ce667dda53d42369fce2bb95534d19f71db9571296840a94ed55a27623ae4f7199dda01c771a2118b8cc684bc505689d3beefdb301a917e7d037eba7274fb2805763053ef5ebba86e1ed6f89d191e473bdf41db97467f18d0a83803119715d77540917d5a368733e9bbe1f57a94c0fa4f753fee0eb5c640da856a05bae5e5595a06120e63b79225886b832cd2bb4552894a72141f562ab2c749b54c7772f0bbe4d747e3464a1550ee7c47f5e882b78e7a57a2d1bb81c601d511c569985063a2d01a585a13fd4b416977613214c506b2041c0323b34f7352a0ea1cbbee96d3248bc9a7414062539b3e11e59bae0cd48b8cb724120d66800515614340e2bef023f18c00c1459d65030e7d6cf6e3f94408f37a1f2b54db55843f1f4b85e26241f06c93ce1e1f5a045bba2d4be7556728fbf05099a6159d3a09ea07c43189bf6805e99d61caf4125e73bdd68020a2c582ad9d46def1bdc871a808d8aebfd0293d6bfd44d7c05cdb536eb666bac46d03a005c4215ee5dfb7c04461af57f1519c80c1a29a01addb8243a854b09c5eaddeccbce028f83bf8669562505396b63a278af0515e37503a4d9fdd93af81cac47c9df9d91b6e6c3d01a58fb1887dcfa39a63cdcd16d2a21bb8e7117ae9947de9619aadd361e40f004d6e152f716ec1ddef6c4d1b734b084080f0f2d7b0ad2432634e051cce2c305f08c754e2f706347032bb279e4"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x76}}, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000001240)=@base={0xf, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x37) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r4, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x32, 0x0, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0", 0x0, 0x2f, 0xe8034000, 0x0, 0x0, 0x0, 0x0, 0x5dc}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000280), &(0x7f00000002c0)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00'}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) 163.7843ms ago: executing program 0 (id=2653): mkdir(&(0x7f0000000000)='./cgroup\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x8}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) syz_clone(0x43001000, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x1, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4}, {0x0, [0x2e, 0x8d4c67e0bffa2942]}}, 0x0, 0x1c, 0x0, 0x0, 0x5, 0x10000, @value}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) 116.49385ms ago: executing program 3 (id=2654): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000080000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0xc004743e, 0x20001400) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x40086602, 0x20004002) 0s ago: executing program 2 (id=2655): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0xf, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r1}, 0x10) syz_clone(0x440c7000, 0x0, 0x0, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): ridge0: port 2(bridge_slave_1) entered forwarding state [ 25.975713][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 25.983583][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 25.992827][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.026259][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.034426][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.041262][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.048660][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.057242][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.064122][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.071299][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.079343][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.086202][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.093494][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.101891][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.108779][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.116092][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.124091][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.142443][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.150419][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.158476][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.166494][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.174702][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.182806][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.190519][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.198785][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.216301][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 26.223703][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.230978][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 26.239363][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 26.247721][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.254730][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.262206][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 26.282032][ T296] device veth0_vlan entered promiscuous mode [ 26.289185][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.297791][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.306531][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.314966][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.323328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.331017][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.339098][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.346987][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.355367][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.363195][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.370429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.377901][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.385976][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 26.394320][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 26.402697][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.409827][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.422990][ T293] device veth0_vlan entered promiscuous mode [ 26.435982][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.444172][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.452398][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.460560][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.477830][ T293] device veth1_macvtap entered promiscuous mode [ 26.486940][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.494815][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.503363][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.511417][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.519575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.527726][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.535689][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.543728][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.551056][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.559124][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.566614][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.575794][ T292] device veth0_vlan entered promiscuous mode [ 26.586383][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.594524][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.603128][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 26.611064][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 26.619183][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 26.627359][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 26.635654][ T294] device veth0_vlan entered promiscuous mode [ 26.648776][ T296] device veth1_macvtap entered promiscuous mode [ 26.655828][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.664027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.672196][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.680266][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.703302][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.711404][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.719631][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 26.727896][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.738217][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 26.747044][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 26.756832][ T292] device veth1_macvtap entered promiscuous mode [ 26.768636][ T294] device veth1_macvtap entered promiscuous mode [ 26.775482][ T293] request_module fs-gadgetfs succeeded, but still no fs? [ 26.780993][ T295] device veth0_vlan entered promiscuous mode [ 26.789277][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.797037][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 26.805432][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.813715][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.821969][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.830571][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.838934][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 26.847142][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 26.855129][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 26.862597][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 26.887553][ T295] device veth1_macvtap entered promiscuous mode [ 26.894998][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 26.905071][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.913498][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 26.921768][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 26.930260][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 26.983244][ C1] hrtimer: interrupt took 26550 ns [ 26.989107][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 26.999676][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.008871][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.017239][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.026079][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.034654][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.122822][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.136934][ T316] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.461087][ T362] device pim6reg1 entered promiscuous mode [ 29.621119][ T369] syz.0.18 (369) used greatest stack depth: 22384 bytes left [ 29.715016][ T391] device pim6reg1 entered promiscuous mode [ 29.971324][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 29.971339][ T28] audit: type=1400 audit(1736200748.579:112): avc: denied { read } for pid=396 comm="syz.0.28" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.022252][ T28] audit: type=1400 audit(1736200748.619:113): avc: denied { open } for pid=396 comm="syz.0.28" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 30.782256][ T406] syz.3.30 (406) used greatest stack depth: 22360 bytes left [ 34.451769][ T28] audit: type=1400 audit(1736200753.059:114): avc: denied { cpu } for pid=510 comm="syz.4.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 38.806034][ T607] device pim6reg1 entered promiscuous mode [ 42.077610][ T663] syz.2.111 (663) used greatest stack depth: 22232 bytes left [ 44.963914][ T28] audit: type=1400 audit(1736200763.569:115): avc: denied { create } for pid=752 comm="syz.3.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 48.772902][ T28] audit: type=1400 audit(1736200767.389:116): avc: denied { create } for pid=846 comm="syz.3.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 48.983377][ T28] audit: type=1400 audit(1736200767.599:117): avc: denied { read } for pid=84 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 53.654539][ T986] FAULT_INJECTION: forcing a failure. [ 53.654539][ T986] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 53.832393][ T986] CPU: 0 PID: 986 Comm: syz.2.217 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 53.841882][ T986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 53.851880][ T986] Call Trace: [ 53.855013][ T986] [ 53.857778][ T986] dump_stack_lvl+0x151/0x1b7 [ 53.862293][ T986] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 53.867590][ T986] dump_stack+0x15/0x18 [ 53.871578][ T986] should_fail_ex+0x3d0/0x520 [ 53.876118][ T986] should_fail+0xb/0x10 [ 53.880081][ T986] should_fail_usercopy+0x1a/0x20 [ 53.884942][ T986] _copy_from_iter+0x18d/0xe00 [ 53.889596][ T986] ? copyout_mc+0x80/0x80 [ 53.893711][ T986] ? __check_object_size+0x48e/0x650 [ 53.898833][ T986] kernfs_fop_write_iter+0x1a0/0x410 [ 53.904227][ T986] vfs_write+0xaf6/0xed0 [ 53.908309][ T986] ? __kasan_slab_free+0x11/0x20 [ 53.913078][ T986] ? file_end_write+0x1c0/0x1c0 [ 53.917858][ T986] ? mutex_lock+0xb1/0x1e0 [ 53.922116][ T986] ? bit_wait_io_timeout+0x120/0x120 [ 53.927224][ T986] ? __fdget_pos+0x2e2/0x390 [ 53.931653][ T986] ? ksys_write+0x77/0x2c0 [ 53.935913][ T986] ksys_write+0x199/0x2c0 [ 53.940069][ T986] ? __this_cpu_preempt_check+0x13/0x20 [ 53.945452][ T986] ? __ia32_sys_read+0x90/0x90 [ 53.950048][ T986] ? debug_smp_processor_id+0x17/0x20 [ 53.955263][ T986] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 53.961157][ T986] __x64_sys_write+0x7b/0x90 [ 53.965584][ T986] x64_sys_call+0x2f/0x9a0 [ 53.969838][ T986] do_syscall_64+0x3b/0xb0 [ 53.974088][ T986] ? clear_bhb_loop+0x55/0xb0 [ 53.978604][ T986] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 53.984330][ T986] RIP: 0033:0x7ff2b3385d29 [ 53.988585][ T986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 54.008026][ T986] RSP: 002b:00007ff2b4166038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 54.016269][ T986] RAX: ffffffffffffffda RBX: 00007ff2b3575fa0 RCX: 00007ff2b3385d29 [ 54.024082][ T986] RDX: 0000000000000002 RSI: 0000000020000340 RDI: 0000000000000004 [ 54.031989][ T986] RBP: 00007ff2b4166090 R08: 0000000000000000 R09: 0000000000000000 [ 54.039893][ T986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 54.047703][ T986] R13: 0000000000000000 R14: 00007ff2b3575fa0 R15: 00007fffa886b268 [ 54.055522][ T986] [ 54.479216][ T993] syz.1.219 (993) used greatest stack depth: 21928 bytes left [ 55.620922][ T28] audit: type=1400 audit(1736200774.219:118): avc: denied { ioctl } for pid=1026 comm="syz.2.230" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0xb702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 57.631599][ T28] audit: type=1400 audit(1736200776.229:119): avc: denied { ioctl } for pid=1075 comm="syz.3.247" path="/dev/ppp" dev="devtmpfs" ino=154 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 57.778465][ T1080] Illegal XDP return value 4294967274 on prog (id 426) dev N/A, expect packet loss! [ 58.562540][ T1098] device pim6reg1 entered promiscuous mode [ 58.770558][ T1112] FAULT_INJECTION: forcing a failure. [ 58.770558][ T1112] name failslab, interval 1, probability 0, space 0, times 1 [ 58.784340][ T1112] CPU: 0 PID: 1112 Comm: syz.2.260 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 58.793892][ T1112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 58.803793][ T1112] Call Trace: [ 58.806911][ T1112] [ 58.809682][ T1112] dump_stack_lvl+0x151/0x1b7 [ 58.814196][ T1112] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 58.819488][ T1112] ? kasan_save_alloc_info+0x1f/0x30 [ 58.824611][ T1112] ? kmalloc_trace+0x44/0xa0 [ 58.829050][ T1112] ? alloc_fdtable+0xaf/0x2a0 [ 58.833727][ T1112] ? dup_fd+0x6a6/0x950 [ 58.837716][ T1112] ? copy_process+0x11e9/0x3530 [ 58.842402][ T1112] dump_stack+0x15/0x18 [ 58.846393][ T1112] should_fail_ex+0x3d0/0x520 [ 58.850909][ T1112] __should_failslab+0xaf/0xf0 [ 58.855507][ T1112] ? kvmalloc_node+0x221/0x640 [ 58.860119][ T1112] should_failslab+0x9/0x20 [ 58.864448][ T1112] __kmem_cache_alloc_node+0x3d/0x2a0 [ 58.869713][ T1112] ? kvmalloc_node+0x221/0x640 [ 58.874253][ T1112] __kmalloc_node+0xa3/0x1e0 [ 58.878683][ T1112] kvmalloc_node+0x221/0x640 [ 58.883198][ T1112] ? vm_mmap+0xb0/0xb0 [ 58.887098][ T1112] ? __kasan_kmalloc+0x30/0xb0 [ 58.891702][ T1112] ? kmalloc_trace+0x44/0xa0 [ 58.896134][ T1112] alloc_fdtable+0xeb/0x2a0 [ 58.900469][ T1112] dup_fd+0x6a6/0x950 [ 58.904288][ T1112] copy_files+0x76/0xe0 [ 58.908277][ T1112] copy_process+0x11e9/0x3530 [ 58.912794][ T1112] ? vfs_write+0x945/0xed0 [ 58.917044][ T1112] ? idle_dummy+0x10/0x10 [ 58.921209][ T1112] ? vfs_write+0x952/0xed0 [ 58.925462][ T1112] ? __hrtimer_run_queues+0x46b/0xad0 [ 58.930669][ T1112] kernel_clone+0x229/0x890 [ 58.935009][ T1112] ? __kasan_check_write+0x14/0x20 [ 58.939956][ T1112] ? mutex_unlock+0xb2/0x260 [ 58.944390][ T1112] ? create_io_thread+0x180/0x180 [ 58.949245][ T1112] __x64_sys_clone+0x231/0x280 [ 58.953863][ T1112] ? __do_sys_vfork+0x110/0x110 [ 58.958532][ T1112] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 58.964431][ T1112] ? exit_to_user_mode_prepare+0x39/0xa0 [ 58.969900][ T1112] x64_sys_call+0x1b0/0x9a0 [ 58.974241][ T1112] do_syscall_64+0x3b/0xb0 [ 58.978489][ T1112] ? clear_bhb_loop+0x55/0xb0 [ 58.983014][ T1112] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 58.988735][ T1112] RIP: 0033:0x7ff2b3385d29 [ 58.992997][ T1112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 59.012429][ T1112] RSP: 002b:00007ff2b4165fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 59.020673][ T1112] RAX: ffffffffffffffda RBX: 00007ff2b3575fa0 RCX: 00007ff2b3385d29 [ 59.028484][ T1112] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 59.036385][ T1112] RBP: 00007ff2b4166090 R08: 0000000000000000 R09: 0000000000000000 [ 59.044192][ T1112] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 59.052008][ T1112] R13: 0000000000000000 R14: 00007ff2b3575fa0 R15: 00007fffa886b268 [ 59.059819][ T1112] [ 59.112389][ T1114] device syzkaller0 entered promiscuous mode [ 60.279532][ T1142] device pim6reg1 entered promiscuous mode [ 60.483867][ T1144] device pim6reg1 entered promiscuous mode [ 63.436720][ T1209] device pim6reg1 entered promiscuous mode [ 63.705635][ T28] audit: type=1400 audit(1736200782.319:120): avc: denied { create } for pid=1218 comm="syz.3.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 66.147169][ T1277] device pim6reg1 entered promiscuous mode [ 69.288514][ T28] audit: type=1400 audit(1736200787.899:121): avc: denied { relabelfrom } for pid=1375 comm="syz.4.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 69.449990][ T28] audit: type=1400 audit(1736200787.919:122): avc: denied { relabelto } for pid=1375 comm="syz.4.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 73.052101][ C0] sched: RT throttling activated [ 74.742639][ T28] audit: type=1400 audit(1736200793.349:123): avc: denied { create } for pid=1442 comm="syz.3.375" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 75.035601][ T1463] device pim6reg1 entered promiscuous mode [ 76.148240][ T1496] device pim6reg1 entered promiscuous mode [ 76.233611][ T1497] device sit0 entered promiscuous mode [ 76.680885][ T28] audit: type=1400 audit(1736200795.279:124): avc: denied { create } for pid=1513 comm="syz.2.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 77.826981][ T1544] FAULT_INJECTION: forcing a failure. [ 77.826981][ T1544] name failslab, interval 1, probability 0, space 0, times 0 [ 77.872485][ T1544] CPU: 1 PID: 1544 Comm: syz.3.411 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 77.882051][ T1544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 77.891951][ T1544] Call Trace: [ 77.895085][ T1544] [ 77.897841][ T1544] dump_stack_lvl+0x151/0x1b7 [ 77.902361][ T1544] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 77.907651][ T1544] ? irqentry_exit+0x30/0x40 [ 77.910242][ T1542] device pim6reg1 entered promiscuous mode [ 77.912075][ T1544] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 77.912111][ T1544] dump_stack+0x15/0x18 [ 77.927352][ T1544] should_fail_ex+0x3d0/0x520 [ 77.931876][ T1544] ? vm_area_dup+0x65/0x290 [ 77.936210][ T1544] __should_failslab+0xaf/0xf0 [ 77.940892][ T1544] should_failslab+0x9/0x20 [ 77.945233][ T1544] kmem_cache_alloc+0x3b/0x320 [ 77.949836][ T1544] vm_area_dup+0x65/0x290 [ 77.954001][ T1544] copy_mm+0xd19/0x1bc0 [ 77.958000][ T1544] ? copy_signal+0x650/0x650 [ 77.962419][ T1544] ? _raw_spin_lock+0xa4/0x1b0 [ 77.967058][ T1544] ? __init_rwsem+0x130/0x240 [ 77.971532][ T1544] ? copy_signal+0x503/0x650 [ 77.975956][ T1544] copy_process+0x12b6/0x3530 [ 77.980471][ T1544] ? __kasan_check_write+0x14/0x20 [ 77.985501][ T1544] ? proc_fail_nth_write+0x20b/0x290 [ 77.990627][ T1544] ? idle_dummy+0x10/0x10 [ 77.994792][ T1544] ? vfs_write+0x952/0xed0 [ 77.999131][ T1544] ? __hrtimer_run_queues+0x46b/0xad0 [ 78.004339][ T1544] kernel_clone+0x229/0x890 [ 78.008762][ T1544] ? irqentry_exit+0x30/0x40 [ 78.013189][ T1544] ? create_io_thread+0x180/0x180 [ 78.018055][ T1544] __x64_sys_clone+0x231/0x280 [ 78.022651][ T1544] ? __do_sys_vfork+0x110/0x110 [ 78.027342][ T1544] x64_sys_call+0x1b0/0x9a0 [ 78.031677][ T1544] do_syscall_64+0x3b/0xb0 [ 78.035929][ T1544] ? clear_bhb_loop+0x55/0xb0 [ 78.040445][ T1544] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 78.046172][ T1544] RIP: 0033:0x7f0b65985d29 [ 78.050521][ T1544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 78.069961][ T1544] RSP: 002b:00007f0b66784fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 78.078209][ T1544] RAX: ffffffffffffffda RBX: 00007f0b65b75fa0 RCX: 00007f0b65985d29 [ 78.086021][ T1544] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 78.093838][ T1544] RBP: 00007f0b66785090 R08: 0000000000000000 R09: 0000000000000000 [ 78.101642][ T1544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 78.109452][ T1544] R13: 0000000000000000 R14: 00007f0b65b75fa0 R15: 00007ffdfb33aa98 [ 78.117542][ T1544] [ 78.431649][ T1549] device sit0 entered promiscuous mode [ 78.781428][ T1566] device pim6reg1 entered promiscuous mode [ 79.220221][ T1575] device pim6reg1 entered promiscuous mode [ 80.388715][ T1596] device veth0_to_bridge entered promiscuous mode [ 80.414629][ T1598] device pim6reg1 entered promiscuous mode [ 80.470257][ T28] audit: type=1400 audit(1736200799.079:125): avc: denied { create } for pid=1595 comm="syz.4.428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 80.744872][ T1609] device pim6reg1 entered promiscuous mode [ 80.980415][ T1620] device pim6reg1 entered promiscuous mode [ 81.969303][ T1653] device pim6reg1 entered promiscuous mode [ 83.105263][ T1684] device wg2 entered promiscuous mode [ 86.369502][ T1765] device pim6reg1 entered promiscuous mode [ 88.422815][ T28] audit: type=1400 audit(1736200807.039:126): avc: denied { setattr } for pid=1810 comm="syz.0.503" path="/dev/ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 88.524089][ T1813] device pim6reg1 entered promiscuous mode [ 89.633830][ T28] audit: type=1400 audit(1736200808.249:127): avc: denied { write } for pid=1824 comm="syz.0.508" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 89.717188][ T1829] syz.1.506[1829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.717271][ T1829] syz.1.506[1829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.784865][ T1825] device wg2 entered promiscuous mode [ 91.471766][ T1875] device pim6reg1 entered promiscuous mode [ 91.477898][ T28] audit: type=1400 audit(1736200810.079:128): avc: denied { append } for pid=1881 comm="syz.3.526" name="ppp" dev="devtmpfs" ino=154 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 92.183041][ T1911] FAULT_INJECTION: forcing a failure. [ 92.183041][ T1911] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 92.200601][ T1911] CPU: 1 PID: 1911 Comm: syz.1.536 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 92.210248][ T1911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 92.220141][ T1911] Call Trace: [ 92.223262][ T1911] [ 92.226125][ T1911] dump_stack_lvl+0x151/0x1b7 [ 92.230786][ T1911] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 92.236132][ T1911] dump_stack+0x15/0x18 [ 92.240114][ T1911] should_fail_ex+0x3d0/0x520 [ 92.244760][ T1911] should_fail+0xb/0x10 [ 92.248869][ T1911] should_fail_usercopy+0x1a/0x20 [ 92.253979][ T1911] _copy_to_user+0x1e/0x90 [ 92.258322][ T1911] simple_read_from_buffer+0xc7/0x150 [ 92.263525][ T1911] proc_fail_nth_read+0x1a3/0x210 [ 92.268388][ T1911] ? proc_fault_inject_write+0x390/0x390 [ 92.273944][ T1911] ? fsnotify_perm+0x269/0x5b0 [ 92.278561][ T1911] ? security_file_permission+0x86/0xb0 [ 92.283927][ T1911] ? proc_fault_inject_write+0x390/0x390 [ 92.289802][ T1911] vfs_read+0x26c/0xae0 [ 92.293732][ T1911] ? kernel_read+0x1f0/0x1f0 [ 92.298581][ T1911] ? mutex_lock+0xb1/0x1e0 [ 92.302847][ T1911] ? bit_wait_io_timeout+0x120/0x120 [ 92.308693][ T1911] ? __fdget_pos+0x2e2/0x390 [ 92.313380][ T1911] ? ksys_read+0x77/0x2c0 [ 92.317563][ T1911] ksys_read+0x199/0x2c0 [ 92.321639][ T1911] ? __this_cpu_preempt_check+0x13/0x20 [ 92.327014][ T1911] ? vfs_write+0xed0/0xed0 [ 92.331276][ T1911] ? debug_smp_processor_id+0x17/0x20 [ 92.336603][ T1911] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 92.342471][ T1911] __x64_sys_read+0x7b/0x90 [ 92.347349][ T1911] x64_sys_call+0x28/0x9a0 [ 92.351888][ T1911] do_syscall_64+0x3b/0xb0 [ 92.356137][ T1911] ? clear_bhb_loop+0x55/0xb0 [ 92.360661][ T1911] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 92.366500][ T1911] RIP: 0033:0x7f6534d8473c [ 92.371478][ T1911] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 92.392740][ T1911] RSP: 002b:00007f6535b74030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 92.401167][ T1911] RAX: ffffffffffffffda RBX: 00007f6534f75fa0 RCX: 00007f6534d8473c [ 92.409076][ T1911] RDX: 000000000000000f RSI: 00007f6535b740a0 RDI: 0000000000000005 [ 92.417050][ T1911] RBP: 00007f6535b74090 R08: 0000000000000000 R09: 0000000000000000 [ 92.424936][ T1911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 92.432754][ T1911] R13: 0000000000000000 R14: 00007f6534f75fa0 R15: 00007ffff3ef1248 [ 92.440648][ T1911] [ 93.169707][ T1934] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.178186][ T1934] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.350870][ T1934] device bridge_slave_1 left promiscuous mode [ 93.416434][ T1934] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.548032][ T1934] device bridge_slave_0 left promiscuous mode [ 93.623637][ T1934] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.885852][ T1954] device wg2 left promiscuous mode [ 96.732695][ T2020] device pim6reg1 entered promiscuous mode [ 100.025855][ T2093] device syzkaller0 entered promiscuous mode [ 101.183768][ T2143] device pim6reg1 entered promiscuous mode [ 101.285888][ T2144] device pim6reg1 entered promiscuous mode [ 102.417258][ T2186] device pim6reg1 entered promiscuous mode [ 103.622886][ T2217] device pim6reg1 entered promiscuous mode [ 104.642747][ T2247] device pim6reg1 entered promiscuous mode [ 106.163935][ T2287] device pim6reg1 entered promiscuous mode [ 106.337214][ T2304] device pim6reg1 entered promiscuous mode [ 106.356167][ T2305] device syzkaller0 entered promiscuous mode [ 107.722035][ T2343] device veth0_vlan left promiscuous mode [ 107.801814][ T2343] device veth0_vlan entered promiscuous mode [ 107.896232][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 107.933080][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 108.024278][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.141542][ T2353] device syzkaller0 entered promiscuous mode [ 110.265946][ T2401] device sit0 entered promiscuous mode [ 111.745349][ T2439] device syzkaller0 entered promiscuous mode [ 113.577244][ T2495] device pim6reg1 entered promiscuous mode [ 115.772009][ T2567] device veth0_to_bridge entered promiscuous mode [ 126.322595][ T2820] device wg2 entered promiscuous mode [ 129.026834][ T2914] device pim6reg1 entered promiscuous mode [ 132.567643][ T2997] device pim6reg1 entered promiscuous mode [ 134.758057][ T3056] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.765129][ T3056] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.274257][ T3070] syz.0.937 (3070) used greatest stack depth: 21256 bytes left [ 139.684692][ T3199] device pim6reg1 entered promiscuous mode [ 140.044542][ T3209] device wg2 left promiscuous mode [ 147.641496][ T3386] device sit0 left promiscuous mode [ 147.825996][ T3391] device sit0 entered promiscuous mode [ 150.398880][ T3454] device pim6reg1 entered promiscuous mode [ 150.868621][ T3465] device pim6reg1 entered promiscuous mode [ 152.625898][ T28] audit: type=1400 audit(1736200871.239:129): avc: denied { remove_name } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 152.798893][ T28] audit: type=1400 audit(1736200871.239:130): avc: denied { rename } for pid=84 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 153.585100][ T3540] device pim6reg1 entered promiscuous mode [ 155.788198][ T3595] device sit0 entered promiscuous mode [ 156.484913][ T3617] device pim6reg1 entered promiscuous mode [ 158.332580][ T3662] device pim6reg1 entered promiscuous mode [ 159.817658][ T3704] device pim6reg1 entered promiscuous mode [ 161.775719][ T3760] device pim6reg1 entered promiscuous mode [ 165.068117][ T28] audit: type=1400 audit(1736200883.679:131): avc: denied { write } for pid=3850 comm="syz.0.1199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 168.786939][ T3970] device veth0_vlan left promiscuous mode [ 168.921612][ T3970] device veth0_vlan entered promiscuous mode [ 174.522581][ T28] audit: type=1400 audit(1736200893.139:132): avc: denied { tracepoint } for pid=4149 comm="syz.3.1302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 174.869270][ T28] audit: type=1400 audit(1736200893.479:133): avc: denied { create } for pid=4149 comm="syz.3.1302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 175.031273][ T4166] device veth0_vlan left promiscuous mode [ 175.128282][ T4166] device veth0_vlan entered promiscuous mode [ 175.245929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 175.266895][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 175.327217][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 178.717421][ T28] audit: type=1400 audit(1736200897.329:134): avc: denied { create } for pid=4274 comm="syz.4.1341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 181.295383][ T4344] device pim6reg1 entered promiscuous mode [ 184.062975][ T4415] device syzkaller0 entered promiscuous mode [ 186.329837][ T4462] syz.1.1410[4462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 186.334336][ T4462] syz.1.1410[4462] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.788111][ T28] audit: type=1400 audit(1736200909.399:135): avc: denied { create } for pid=4638 comm="syz.0.1468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 194.945525][ T4742] FAULT_INJECTION: forcing a failure. [ 194.945525][ T4742] name failslab, interval 1, probability 0, space 0, times 0 [ 195.022141][ T4742] CPU: 1 PID: 4742 Comm: syz.3.1502 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 195.031788][ T4742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 195.041684][ T4742] Call Trace: [ 195.044897][ T4742] [ 195.047681][ T4742] dump_stack_lvl+0x151/0x1b7 [ 195.052189][ T4742] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 195.057584][ T4742] ? kasan_save_alloc_info+0x1f/0x30 [ 195.062700][ T4742] dump_stack+0x15/0x18 [ 195.066781][ T4742] should_fail_ex+0x3d0/0x520 [ 195.071288][ T4742] ? build_skb+0x2c/0x220 [ 195.075460][ T4742] __should_failslab+0xaf/0xf0 [ 195.080057][ T4742] should_failslab+0x9/0x20 [ 195.084397][ T4742] kmem_cache_alloc+0x3b/0x320 [ 195.088998][ T4742] build_skb+0x2c/0x220 [ 195.092995][ T4742] bpf_prog_test_run_skb+0x3ad/0x13a0 [ 195.098198][ T4742] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 195.104017][ T4742] ? __kasan_check_write+0x14/0x20 [ 195.108955][ T4742] ? fput+0x15b/0x1b0 [ 195.112775][ T4742] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 195.118517][ T4742] bpf_prog_test_run+0x3b0/0x630 [ 195.123281][ T4742] ? bpf_prog_query+0x260/0x260 [ 195.127966][ T4742] ? selinux_bpf+0xd2/0x100 [ 195.132306][ T4742] ? security_bpf+0x82/0xb0 [ 195.136734][ T4742] __sys_bpf+0x59f/0x7f0 [ 195.140808][ T4742] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 195.146022][ T4742] ? __ia32_sys_read+0x90/0x90 [ 195.150704][ T4742] ? debug_smp_processor_id+0x17/0x20 [ 195.155908][ T4742] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 195.161817][ T4742] __x64_sys_bpf+0x7c/0x90 [ 195.166066][ T4742] x64_sys_call+0x87f/0x9a0 [ 195.170406][ T4742] do_syscall_64+0x3b/0xb0 [ 195.174660][ T4742] ? clear_bhb_loop+0x55/0xb0 [ 195.179171][ T4742] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 195.184902][ T4742] RIP: 0033:0x7f0b65985d29 [ 195.189154][ T4742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.208684][ T4742] RSP: 002b:00007f0b66785038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 195.216929][ T4742] RAX: ffffffffffffffda RBX: 00007f0b65b75fa0 RCX: 00007f0b65985d29 [ 195.224742][ T4742] RDX: 0000000000000050 RSI: 00000000200002c0 RDI: 000000000000000a [ 195.232555][ T4742] RBP: 00007f0b66785090 R08: 0000000000000000 R09: 0000000000000000 [ 195.240369][ T4742] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 195.248173][ T4742] R13: 0000000000000000 R14: 00007f0b65b75fa0 R15: 00007ffdfb33aa98 [ 195.255996][ T4742] [ 195.706095][ T4762] FAULT_INJECTION: forcing a failure. [ 195.706095][ T4762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 195.719132][ T4762] CPU: 1 PID: 4762 Comm: syz.1.1510 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 195.728807][ T4762] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 195.738668][ T4762] Call Trace: [ 195.741789][ T4762] [ 195.744565][ T4762] dump_stack_lvl+0x151/0x1b7 [ 195.749081][ T4762] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 195.754380][ T4762] dump_stack+0x15/0x18 [ 195.758574][ T4762] should_fail_ex+0x3d0/0x520 [ 195.763056][ T4762] should_fail+0xb/0x10 [ 195.767048][ T4762] should_fail_usercopy+0x1a/0x20 [ 195.771908][ T4762] copy_page_from_iter_atomic+0x349/0x10b0 [ 195.777551][ T4762] ? shmem_get_folio+0xa0/0xa0 [ 195.782166][ T4762] ? fault_in_readable+0x172/0x2d0 [ 195.787098][ T4762] ? pipe_zero+0x220/0x220 [ 195.791352][ T4762] ? shmem_write_begin+0x1f0/0x3a0 [ 195.796304][ T4762] ? __kasan_check_write+0x14/0x20 [ 195.801245][ T4762] ? shmem_writepage+0xe00/0xe00 [ 195.806024][ T4762] generic_perform_write+0x38a/0x780 [ 195.811140][ T4762] ? generic_file_direct_write+0x6b0/0x6b0 [ 195.816778][ T4762] ? __file_remove_privs+0x640/0x640 [ 195.822074][ T4762] ? generic_write_checks+0x15c/0x1c0 [ 195.827283][ T4762] __generic_file_write_iter+0x174/0x3a0 [ 195.832758][ T4762] generic_file_write_iter+0xb1/0x310 [ 195.837965][ T4762] vfs_write+0xaf6/0xed0 [ 195.842035][ T4762] ? __kasan_slab_free+0x11/0x20 [ 195.847247][ T4762] ? file_end_write+0x1c0/0x1c0 [ 195.851933][ T4762] ? mutex_lock+0xb1/0x1e0 [ 195.856183][ T4762] ? bit_wait_io_timeout+0x120/0x120 [ 195.861502][ T4762] ? __fdget_pos+0x2e2/0x390 [ 195.865910][ T4762] ? ksys_write+0x77/0x2c0 [ 195.870157][ T4762] ksys_write+0x199/0x2c0 [ 195.874319][ T4762] ? __this_cpu_preempt_check+0x13/0x20 [ 195.879705][ T4762] ? __ia32_sys_read+0x90/0x90 [ 195.884315][ T4762] ? debug_smp_processor_id+0x17/0x20 [ 195.889531][ T4762] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 195.895427][ T4762] __x64_sys_write+0x7b/0x90 [ 195.899850][ T4762] x64_sys_call+0x2f/0x9a0 [ 195.904094][ T4762] do_syscall_64+0x3b/0xb0 [ 195.908343][ T4762] ? clear_bhb_loop+0x55/0xb0 [ 195.912859][ T4762] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 195.918590][ T4762] RIP: 0033:0x7f6534d85d29 [ 195.922835][ T4762] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 195.942712][ T4762] RSP: 002b:00007f6535b74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 195.950956][ T4762] RAX: ffffffffffffffda RBX: 00007f6534f75fa0 RCX: 00007f6534d85d29 [ 195.958766][ T4762] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 000000000000000a [ 195.966576][ T4762] RBP: 00007f6535b74090 R08: 0000000000000000 R09: 0000000000000000 [ 195.974395][ T4762] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 195.982213][ T4762] R13: 0000000000000000 R14: 00007f6534f75fa0 R15: 00007ffff3ef1248 [ 195.990021][ T4762] [ 196.180164][ T4771] syz.1.1515[4771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.180244][ T4771] syz.1.1515[4771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.192872][ T4771] syz.1.1515[4771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.204899][ T4771] syz.1.1515[4771] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.156901][ T4802] FAULT_INJECTION: forcing a failure. [ 197.156901][ T4802] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 197.242474][ T4802] CPU: 0 PID: 4802 Comm: syz.0.1527 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 197.252141][ T4802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 197.262031][ T4802] Call Trace: [ 197.265231][ T4802] [ 197.268013][ T4802] dump_stack_lvl+0x151/0x1b7 [ 197.272530][ T4802] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 197.277824][ T4802] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 197.283811][ T4802] dump_stack+0x15/0x18 [ 197.287819][ T4802] should_fail_ex+0x3d0/0x520 [ 197.292315][ T4802] should_fail+0xb/0x10 [ 197.296488][ T4802] should_fail_usercopy+0x1a/0x20 [ 197.301438][ T4802] _copy_from_user+0x1e/0xc0 [ 197.305862][ T4802] __sys_bpf+0x23b/0x7f0 [ 197.309942][ T4802] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 197.315159][ T4802] ? __ia32_sys_read+0x90/0x90 [ 197.319839][ T4802] ? debug_smp_processor_id+0x17/0x20 [ 197.325054][ T4802] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 197.330960][ T4802] __x64_sys_bpf+0x7c/0x90 [ 197.335584][ T4802] x64_sys_call+0x87f/0x9a0 [ 197.339889][ T4802] do_syscall_64+0x3b/0xb0 [ 197.344141][ T4802] ? clear_bhb_loop+0x55/0xb0 [ 197.348807][ T4802] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 197.354485][ T4802] RIP: 0033:0x7fd159585d29 [ 197.358731][ T4802] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.378260][ T4802] RSP: 002b:00007fd15a49c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 197.386770][ T4802] RAX: ffffffffffffffda RBX: 00007fd159775fa0 RCX: 00007fd159585d29 [ 197.395122][ T4802] RDX: 0000000000000050 RSI: 0000000020000d40 RDI: 000000000000000a [ 197.403554][ T4802] RBP: 00007fd15a49c090 R08: 0000000000000000 R09: 0000000000000000 [ 197.411573][ T4802] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.419577][ T4802] R13: 0000000000000000 R14: 00007fd159775fa0 R15: 00007ffd4be3d738 [ 197.427389][ T4802] [ 197.956065][ T4826] bond_slave_1: mtu less than device minimum [ 200.850181][ T4886] FAULT_INJECTION: forcing a failure. [ 200.850181][ T4886] name failslab, interval 1, probability 0, space 0, times 0 [ 200.919231][ T4886] CPU: 0 PID: 4886 Comm: syz.2.1555 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 200.928882][ T4886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 200.939122][ T4886] Call Trace: [ 200.942331][ T4886] [ 200.945109][ T4886] dump_stack_lvl+0x151/0x1b7 [ 200.949623][ T4886] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 200.954920][ T4886] ? skb_release_data+0x19e/0x840 [ 200.959775][ T4886] ? __kasan_kmalloc+0x9c/0xb0 [ 200.964380][ T4886] dump_stack+0x15/0x18 [ 200.968372][ T4886] should_fail_ex+0x3d0/0x520 [ 200.972883][ T4886] ? skb_clone+0x1f8/0x380 [ 200.977138][ T4886] __should_failslab+0xaf/0xf0 [ 200.981736][ T4886] should_failslab+0x9/0x20 [ 200.986077][ T4886] kmem_cache_alloc+0x3b/0x320 [ 200.990705][ T4886] skb_clone+0x1f8/0x380 [ 200.994849][ T4886] bpf_clone_redirect+0xa5/0x3c0 [ 200.999642][ T4886] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 201.004911][ T4886] ? layout_symtab+0x710/0x9f0 [ 201.009507][ T4886] ? __stack_depot_save+0x36/0x480 [ 201.014462][ T4886] ? kasan_set_track+0x60/0x70 [ 201.019054][ T4886] ? kasan_set_track+0x4b/0x70 [ 201.023663][ T4886] ? kasan_save_alloc_info+0x1f/0x30 [ 201.028777][ T4886] ? __kasan_slab_alloc+0x6c/0x80 [ 201.033636][ T4886] ? slab_post_alloc_hook+0x53/0x2c0 [ 201.038758][ T4886] ? kmem_cache_alloc+0x175/0x320 [ 201.043716][ T4886] ? build_skb+0x2c/0x220 [ 201.047981][ T4886] ? bpf_prog_test_run_skb+0x3ad/0x13a0 [ 201.053349][ T4886] ? bpf_prog_test_run+0x3b0/0x630 [ 201.058295][ T4886] ? __sys_bpf+0x59f/0x7f0 [ 201.062549][ T4886] ? __x64_sys_bpf+0x7c/0x90 [ 201.066984][ T4886] ? x64_sys_call+0x87f/0x9a0 [ 201.071489][ T4886] ? do_syscall_64+0x3b/0xb0 [ 201.075913][ T4886] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 201.081847][ T4886] ? __kasan_check_read+0x11/0x20 [ 201.086686][ T4886] ? bpf_test_timer_continue+0x140/0x460 [ 201.092164][ T4886] bpf_test_run+0x4ab/0xa40 [ 201.096493][ T4886] ? convert___skb_to_skb+0x670/0x670 [ 201.101691][ T4886] ? eth_type_trans+0x342/0x710 [ 201.106382][ T4886] ? eth_get_headlen+0x240/0x240 [ 201.111249][ T4886] ? convert___skb_to_skb+0x44/0x670 [ 201.116369][ T4886] ? build_skb+0xde/0x220 [ 201.120530][ T4886] bpf_prog_test_run_skb+0xaf1/0x13a0 [ 201.125746][ T4886] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 201.131556][ T4886] ? __kasan_check_write+0x14/0x20 [ 201.136497][ T4886] ? fput+0x15b/0x1b0 [ 201.140399][ T4886] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 201.146129][ T4886] bpf_prog_test_run+0x3b0/0x630 [ 201.150915][ T4886] ? bpf_prog_query+0x260/0x260 [ 201.155591][ T4886] ? selinux_bpf+0xd2/0x100 [ 201.159931][ T4886] ? security_bpf+0x82/0xb0 [ 201.164277][ T4886] __sys_bpf+0x59f/0x7f0 [ 201.168352][ T4886] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 201.173558][ T4886] ? __ia32_sys_read+0x90/0x90 [ 201.178187][ T4886] ? debug_smp_processor_id+0x17/0x20 [ 201.183364][ T4886] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 201.189268][ T4886] __x64_sys_bpf+0x7c/0x90 [ 201.193523][ T4886] x64_sys_call+0x87f/0x9a0 [ 201.197871][ T4886] do_syscall_64+0x3b/0xb0 [ 201.202120][ T4886] ? clear_bhb_loop+0x55/0xb0 [ 201.206637][ T4886] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 201.212350][ T4886] RIP: 0033:0x7ff2b3385d29 [ 201.216617][ T4886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.236052][ T4886] RSP: 002b:00007ff2b4166038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.244296][ T4886] RAX: ffffffffffffffda RBX: 00007ff2b3575fa0 RCX: 00007ff2b3385d29 [ 201.252113][ T4886] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 201.259912][ T4886] RBP: 00007ff2b4166090 R08: 0000000000000000 R09: 0000000000000000 [ 201.267734][ T4886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 201.275535][ T4886] R13: 0000000000000000 R14: 00007ff2b3575fa0 R15: 00007fffa886b268 [ 201.283356][ T4886] [ 203.643831][ T4966] FAULT_INJECTION: forcing a failure. [ 203.643831][ T4966] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 203.750772][ T4966] CPU: 0 PID: 4966 Comm: syz.2.1587 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 203.760423][ T4966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 203.770319][ T4966] Call Trace: [ 203.773450][ T4966] [ 203.776313][ T4966] dump_stack_lvl+0x151/0x1b7 [ 203.780824][ T4966] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 203.786119][ T4966] ? vfs_write+0x952/0xed0 [ 203.790465][ T4966] ? __kasan_slab_free+0x11/0x20 [ 203.795240][ T4966] dump_stack+0x15/0x18 [ 203.799230][ T4966] should_fail_ex+0x3d0/0x520 [ 203.803747][ T4966] should_fail+0xb/0x10 [ 203.807753][ T4966] should_fail_usercopy+0x1a/0x20 [ 203.812712][ T4966] _copy_from_user+0x1e/0xc0 [ 203.817196][ T4966] __sys_bpf+0x23b/0x7f0 [ 203.821365][ T4966] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 203.826660][ T4966] ? __ia32_sys_read+0x90/0x90 [ 203.831261][ T4966] ? debug_smp_processor_id+0x17/0x20 [ 203.836462][ T4966] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 203.842367][ T4966] __x64_sys_bpf+0x7c/0x90 [ 203.846621][ T4966] x64_sys_call+0x87f/0x9a0 [ 203.850958][ T4966] do_syscall_64+0x3b/0xb0 [ 203.855209][ T4966] ? clear_bhb_loop+0x55/0xb0 [ 203.859811][ T4966] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 203.865551][ T4966] RIP: 0033:0x7ff2b3385d29 [ 203.869795][ T4966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 203.889235][ T4966] RSP: 002b:00007ff2b4166038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 203.897586][ T4966] RAX: ffffffffffffffda RBX: 00007ff2b3575fa0 RCX: 00007ff2b3385d29 [ 203.905475][ T4966] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 000000000000000f [ 203.913287][ T4966] RBP: 00007ff2b4166090 R08: 0000000000000000 R09: 0000000000000000 [ 203.921099][ T4966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 203.928998][ T4966] R13: 0000000000000000 R14: 00007ff2b3575fa0 R15: 00007fffa886b268 [ 203.936813][ T4966] [ 204.042247][ T4975] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 206.500481][ T28] audit: type=1400 audit(1736200925.109:136): avc: denied { write } for pid=5053 comm="syz.4.1619" name="cgroup.subtree_control" dev="cgroup2" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 206.622184][ T28] audit: type=1400 audit(1736200925.109:137): avc: denied { open } for pid=5053 comm="syz.4.1619" path="" dev="cgroup2" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 208.190103][ T5112] FAULT_INJECTION: forcing a failure. [ 208.190103][ T5112] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 208.292276][ T5112] CPU: 0 PID: 5112 Comm: syz.1.1640 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 208.301932][ T5112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 208.311827][ T5112] Call Trace: [ 208.314947][ T5112] [ 208.317726][ T5112] dump_stack_lvl+0x151/0x1b7 [ 208.322242][ T5112] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 208.327533][ T5112] ? vfs_write+0x952/0xed0 [ 208.331782][ T5112] ? __kasan_slab_free+0x11/0x20 [ 208.336585][ T5112] dump_stack+0x15/0x18 [ 208.340556][ T5112] should_fail_ex+0x3d0/0x520 [ 208.345066][ T5112] should_fail+0xb/0x10 [ 208.349054][ T5112] should_fail_usercopy+0x1a/0x20 [ 208.353916][ T5112] _copy_from_user+0x1e/0xc0 [ 208.358349][ T5112] __sys_bpf+0x23b/0x7f0 [ 208.362424][ T5112] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 208.367725][ T5112] ? __ia32_sys_read+0x90/0x90 [ 208.372321][ T5112] ? debug_smp_processor_id+0x17/0x20 [ 208.377613][ T5112] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 208.383600][ T5112] __x64_sys_bpf+0x7c/0x90 [ 208.387859][ T5112] x64_sys_call+0x87f/0x9a0 [ 208.392345][ T5112] do_syscall_64+0x3b/0xb0 [ 208.396534][ T5112] ? clear_bhb_loop+0x55/0xb0 [ 208.401044][ T5112] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 208.406772][ T5112] RIP: 0033:0x7f6534d85d29 [ 208.411033][ T5112] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 208.430470][ T5112] RSP: 002b:00007f6535b74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 208.438721][ T5112] RAX: ffffffffffffffda RBX: 00007f6534f75fa0 RCX: 00007f6534d85d29 [ 208.446527][ T5112] RDX: 0000000000000037 RSI: 0000000020000380 RDI: 000000000000000a [ 208.454331][ T5112] RBP: 00007f6535b74090 R08: 0000000000000000 R09: 0000000000000000 [ 208.462148][ T5112] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 208.469958][ T5112] R13: 0000000000000000 R14: 00007f6534f75fa0 R15: 00007ffff3ef1248 [ 208.477880][ T5112] [ 210.064770][ T5161] device wg2 left promiscuous mode [ 210.113702][ T5161] device wg2 entered promiscuous mode [ 211.390100][ T5204] FAULT_INJECTION: forcing a failure. [ 211.390100][ T5204] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.512471][ T5204] CPU: 1 PID: 5204 Comm: syz.0.1673 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 211.522123][ T5204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 211.532050][ T5204] Call Trace: [ 211.535157][ T5204] [ 211.538005][ T5204] dump_stack_lvl+0x151/0x1b7 [ 211.542603][ T5204] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 211.547899][ T5204] dump_stack+0x15/0x18 [ 211.551886][ T5204] should_fail_ex+0x3d0/0x520 [ 211.556403][ T5204] should_fail+0xb/0x10 [ 211.560456][ T5204] should_fail_usercopy+0x1a/0x20 [ 211.565270][ T5204] _copy_from_user+0x1e/0xc0 [ 211.569678][ T5204] perf_copy_attr+0x163/0x880 [ 211.574196][ T5204] __se_sys_perf_event_open+0xd7/0x3d60 [ 211.579575][ T5204] ? clockevents_program_event+0x22f/0x300 [ 211.585215][ T5204] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 211.590702][ T5204] ? __x64_sys_perf_event_open+0x20/0xd0 [ 211.596151][ T5204] __x64_sys_perf_event_open+0xbf/0xd0 [ 211.601532][ T5204] x64_sys_call+0x7de/0x9a0 [ 211.605873][ T5204] do_syscall_64+0x3b/0xb0 [ 211.610129][ T5204] ? clear_bhb_loop+0x55/0xb0 [ 211.614730][ T5204] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 211.620452][ T5204] RIP: 0033:0x7fd159585d29 [ 211.624715][ T5204] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.644331][ T5204] RSP: 002b:00007fd15a49c038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 211.652575][ T5204] RAX: ffffffffffffffda RBX: 00007fd159775fa0 RCX: 00007fd159585d29 [ 211.660382][ T5204] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000040 [ 211.668232][ T5204] RBP: 00007fd15a49c090 R08: 0000000000000000 R09: 0000000000000000 [ 211.676009][ T5204] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 211.683907][ T5204] R13: 0000000000000000 R14: 00007fd159775fa0 R15: 00007ffd4be3d738 [ 211.691732][ T5204] [ 212.381569][ T5228] device pim6reg1 entered promiscuous mode [ 212.452689][ T5232] FAULT_INJECTION: forcing a failure. [ 212.452689][ T5232] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 212.487041][ T5232] CPU: 1 PID: 5232 Comm: syz.4.1684 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 212.496711][ T5232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 212.506850][ T5232] Call Trace: [ 212.510063][ T5232] [ 212.513006][ T5232] dump_stack_lvl+0x151/0x1b7 [ 212.517616][ T5232] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 212.522992][ T5232] dump_stack+0x15/0x18 [ 212.527078][ T5232] should_fail_ex+0x3d0/0x520 [ 212.531589][ T5232] should_fail+0xb/0x10 [ 212.535795][ T5232] should_fail_usercopy+0x1a/0x20 [ 212.540982][ T5232] _copy_from_user+0x1e/0xc0 [ 212.545399][ T5232] get_user_ifreq+0xd5/0x230 [ 212.549814][ T5232] sock_do_ioctl+0x1a7/0x450 [ 212.554238][ T5232] ? has_cap_mac_admin+0x3c0/0x3c0 [ 212.559299][ T5232] ? sock_show_fdinfo+0xa0/0xa0 [ 212.563968][ T5232] ? selinux_file_ioctl+0x3cc/0x540 [ 212.569081][ T5232] sock_ioctl+0x455/0x740 [ 212.573346][ T5232] ? sock_poll+0x400/0x400 [ 212.577585][ T5232] ? __fget_files+0x2cb/0x330 [ 212.582117][ T5232] ? security_file_ioctl+0x84/0xb0 [ 212.587219][ T5232] ? sock_poll+0x400/0x400 [ 212.591473][ T5232] __se_sys_ioctl+0x114/0x190 [ 212.595990][ T5232] __x64_sys_ioctl+0x7b/0x90 [ 212.600501][ T5232] x64_sys_call+0x98/0x9a0 [ 212.604994][ T5232] do_syscall_64+0x3b/0xb0 [ 212.609351][ T5232] ? clear_bhb_loop+0x55/0xb0 [ 212.613867][ T5232] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 212.619594][ T5232] RIP: 0033:0x7f8437785d29 [ 212.623850][ T5232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.643648][ T5232] RSP: 002b:00007f843865d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 212.651893][ T5232] RAX: ffffffffffffffda RBX: 00007f8437975fa0 RCX: 00007f8437785d29 [ 212.659702][ T5232] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 212.667685][ T5232] RBP: 00007f843865d090 R08: 0000000000000000 R09: 0000000000000000 [ 212.675586][ T5232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 212.683451][ T5232] R13: 0000000000000000 R14: 00007f8437975fa0 R15: 00007ffe15e7e9a8 [ 212.691217][ T5232] [ 214.141975][ T5284] FAULT_INJECTION: forcing a failure. [ 214.141975][ T5284] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 214.222577][ T5284] CPU: 0 PID: 5284 Comm: syz.3.1705 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 214.232437][ T5284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 214.242419][ T5284] Call Trace: [ 214.245538][ T5284] [ 214.248327][ T5284] dump_stack_lvl+0x151/0x1b7 [ 214.252826][ T5284] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 214.258121][ T5284] ? vfs_write+0x952/0xed0 [ 214.262370][ T5284] ? __kasan_slab_free+0x11/0x20 [ 214.267143][ T5284] dump_stack+0x15/0x18 [ 214.271144][ T5284] should_fail_ex+0x3d0/0x520 [ 214.275659][ T5284] should_fail+0xb/0x10 [ 214.279655][ T5284] should_fail_usercopy+0x1a/0x20 [ 214.284592][ T5284] _copy_from_user+0x1e/0xc0 [ 214.289016][ T5284] __sys_bpf+0x23b/0x7f0 [ 214.293112][ T5284] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 214.298469][ T5284] ? __ia32_sys_read+0x90/0x90 [ 214.303055][ T5284] ? debug_smp_processor_id+0x17/0x20 [ 214.308259][ T5284] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 214.314165][ T5284] __x64_sys_bpf+0x7c/0x90 [ 214.318509][ T5284] x64_sys_call+0x87f/0x9a0 [ 214.322839][ T5284] do_syscall_64+0x3b/0xb0 [ 214.327101][ T5284] ? clear_bhb_loop+0x55/0xb0 [ 214.331608][ T5284] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 214.338402][ T5284] RIP: 0033:0x7f0b65985d29 [ 214.342646][ T5284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.362612][ T5284] RSP: 002b:00007f0b66785038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 214.370968][ T5284] RAX: ffffffffffffffda RBX: 00007f0b65b75fa0 RCX: 00007f0b65985d29 [ 214.378851][ T5284] RDX: 0000000000000037 RSI: 0000000020000380 RDI: 000000000000000a [ 214.386671][ T5284] RBP: 00007f0b66785090 R08: 0000000000000000 R09: 0000000000000000 [ 214.394727][ T5284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.402821][ T5284] R13: 0000000000000000 R14: 00007f0b65b75fa0 R15: 00007ffdfb33aa98 [ 214.410620][ T5284] [ 214.906441][ T5318] FAULT_INJECTION: forcing a failure. [ 214.906441][ T5318] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 215.040104][ T5318] CPU: 1 PID: 5318 Comm: syz.3.1716 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 215.049761][ T5318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 215.059658][ T5318] Call Trace: [ 215.062780][ T5318] [ 215.065551][ T5318] dump_stack_lvl+0x151/0x1b7 [ 215.070068][ T5318] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 215.075363][ T5318] ? vfs_write+0x952/0xed0 [ 215.079621][ T5318] ? __kasan_slab_free+0x11/0x20 [ 215.084836][ T5318] dump_stack+0x15/0x18 [ 215.088816][ T5318] should_fail_ex+0x3d0/0x520 [ 215.093328][ T5318] should_fail+0xb/0x10 [ 215.097317][ T5318] should_fail_usercopy+0x1a/0x20 [ 215.102178][ T5318] _copy_from_user+0x1e/0xc0 [ 215.106605][ T5318] __sys_bpf+0x23b/0x7f0 [ 215.110685][ T5318] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 215.115896][ T5318] ? __ia32_sys_read+0x90/0x90 [ 215.120496][ T5318] ? debug_smp_processor_id+0x17/0x20 [ 215.125698][ T5318] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 215.131606][ T5318] __x64_sys_bpf+0x7c/0x90 [ 215.135858][ T5318] x64_sys_call+0x87f/0x9a0 [ 215.140201][ T5318] do_syscall_64+0x3b/0xb0 [ 215.144449][ T5318] ? clear_bhb_loop+0x55/0xb0 [ 215.148966][ T5318] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 215.154701][ T5318] RIP: 0033:0x7f0b65985d29 [ 215.158941][ T5318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.178385][ T5318] RSP: 002b:00007f0b66785038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 215.186631][ T5318] RAX: ffffffffffffffda RBX: 00007f0b65b75fa0 RCX: 00007f0b65985d29 [ 215.194441][ T5318] RDX: 0000000000000010 RSI: 00000000200000c0 RDI: 0000000000000011 [ 215.202251][ T5318] RBP: 00007f0b66785090 R08: 0000000000000000 R09: 0000000000000000 [ 215.210058][ T5318] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 215.217874][ T5318] R13: 0000000000000000 R14: 00007f0b65b75fa0 R15: 00007ffdfb33aa98 [ 215.225727][ T5318] [ 215.594475][ T28] audit: type=1400 audit(1736200934.209:138): avc: denied { create } for pid=5334 comm="syz.1.1725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 215.728558][ T28] audit: type=1400 audit(1736200934.339:139): avc: denied { create } for pid=5334 comm="syz.1.1725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 216.362861][ T28] audit: type=1400 audit(1736200934.979:140): avc: denied { create } for pid=5346 comm="syz.4.1729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 216.459990][ T28] audit: type=1400 audit(1736200934.979:141): avc: denied { setopt } for pid=5346 comm="syz.4.1729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 218.020377][ T28] audit: type=1400 audit(1736200936.629:142): avc: denied { write } for pid=5399 comm="syz.4.1747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 219.636323][ T28] audit: type=1400 audit(1736200938.249:143): avc: denied { create } for pid=5453 comm="syz.0.1765" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 220.598306][ T5488] FAULT_INJECTION: forcing a failure. [ 220.598306][ T5488] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 220.643037][ T5488] CPU: 1 PID: 5488 Comm: syz.2.1777 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 220.652777][ T5488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 220.662846][ T5488] Call Trace: [ 220.665973][ T5488] [ 220.668841][ T5488] dump_stack_lvl+0x151/0x1b7 [ 220.673360][ T5488] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 220.678653][ T5488] ? vfs_write+0x952/0xed0 [ 220.682904][ T5488] ? __kasan_slab_free+0x11/0x20 [ 220.687681][ T5488] dump_stack+0x15/0x18 [ 220.691932][ T5488] should_fail_ex+0x3d0/0x520 [ 220.696546][ T5488] should_fail+0xb/0x10 [ 220.700533][ T5488] should_fail_usercopy+0x1a/0x20 [ 220.705399][ T5488] _copy_from_user+0x1e/0xc0 [ 220.709820][ T5488] __sys_bpf+0x23b/0x7f0 [ 220.713928][ T5488] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 220.719111][ T5488] ? __ia32_sys_read+0x90/0x90 [ 220.723704][ T5488] ? debug_smp_processor_id+0x17/0x20 [ 220.728911][ T5488] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 220.734819][ T5488] __x64_sys_bpf+0x7c/0x90 [ 220.739067][ T5488] x64_sys_call+0x87f/0x9a0 [ 220.743524][ T5488] do_syscall_64+0x3b/0xb0 [ 220.747786][ T5488] ? clear_bhb_loop+0x55/0xb0 [ 220.752291][ T5488] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 220.758024][ T5488] RIP: 0033:0x7ff2b3385d29 [ 220.762278][ T5488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.781717][ T5488] RSP: 002b:00007ff2b4166038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 220.790045][ T5488] RAX: ffffffffffffffda RBX: 00007ff2b3575fa0 RCX: 00007ff2b3385d29 [ 220.797855][ T5488] RDX: 0000000000000037 RSI: 0000000020000380 RDI: 000000000000000a [ 220.805665][ T5488] RBP: 00007ff2b4166090 R08: 0000000000000000 R09: 0000000000000000 [ 220.813477][ T5488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.821380][ T5488] R13: 0000000000000000 R14: 00007ff2b3575fa0 R15: 00007fffa886b268 [ 220.829206][ T5488] [ 223.273420][ T5566] FAULT_INJECTION: forcing a failure. [ 223.273420][ T5566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 223.397080][ T5566] CPU: 0 PID: 5566 Comm: syz.0.1804 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 223.406830][ T5566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 223.416813][ T5566] Call Trace: [ 223.419929][ T5566] [ 223.422708][ T5566] dump_stack_lvl+0x151/0x1b7 [ 223.427221][ T5566] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 223.432516][ T5566] ? vfs_write+0x952/0xed0 [ 223.436768][ T5566] ? __kasan_slab_free+0x11/0x20 [ 223.441547][ T5566] dump_stack+0x15/0x18 [ 223.445538][ T5566] should_fail_ex+0x3d0/0x520 [ 223.450136][ T5566] should_fail+0xb/0x10 [ 223.454126][ T5566] should_fail_usercopy+0x1a/0x20 [ 223.458996][ T5566] _copy_from_user+0x1e/0xc0 [ 223.463413][ T5566] __sys_bpf+0x23b/0x7f0 [ 223.467491][ T5566] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 223.472706][ T5566] ? __ia32_sys_read+0x90/0x90 [ 223.477310][ T5566] ? debug_smp_processor_id+0x17/0x20 [ 223.482508][ T5566] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 223.488413][ T5566] __x64_sys_bpf+0x7c/0x90 [ 223.492673][ T5566] x64_sys_call+0x87f/0x9a0 [ 223.497015][ T5566] do_syscall_64+0x3b/0xb0 [ 223.501258][ T5566] ? clear_bhb_loop+0x55/0xb0 [ 223.505782][ T5566] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 223.511584][ T5566] RIP: 0033:0x7fd159585d29 [ 223.515843][ T5566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.535370][ T5566] RSP: 002b:00007fd15a49c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 223.543610][ T5566] RAX: ffffffffffffffda RBX: 00007fd159775fa0 RCX: 00007fd159585d29 [ 223.551424][ T5566] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 223.559238][ T5566] RBP: 00007fd15a49c090 R08: 0000000000000000 R09: 0000000000000000 [ 223.567045][ T5566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 223.574979][ T5566] R13: 0000000000000000 R14: 00007fd159775fa0 R15: 00007ffd4be3d738 [ 223.582759][ T5566] [ 224.806145][ T28] audit: type=1400 audit(1736200943.419:144): avc: denied { read } for pid=5607 comm="syz.4.1820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 224.838210][ T5606] device veth0_vlan left promiscuous mode [ 224.925218][ T5606] device veth0_vlan entered promiscuous mode [ 225.237934][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 225.265555][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 225.348958][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 225.535272][ T5624] device wg2 entered promiscuous mode [ 227.915975][ T5700] device wg2 entered promiscuous mode [ 228.317384][ T5718] device wg2 entered promiscuous mode [ 233.103727][ T5830] device veth0_vlan left promiscuous mode [ 233.161806][ T5830] device veth0_vlan entered promiscuous mode [ 234.623660][ T5876] FAULT_INJECTION: forcing a failure. [ 234.623660][ T5876] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 234.682990][ T5876] CPU: 0 PID: 5876 Comm: syz.0.1908 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 234.692772][ T5876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 234.702667][ T5876] Call Trace: [ 234.705782][ T5876] [ 234.708558][ T5876] dump_stack_lvl+0x151/0x1b7 [ 234.713170][ T5876] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 234.718542][ T5876] dump_stack+0x15/0x18 [ 234.722617][ T5876] should_fail_ex+0x3d0/0x520 [ 234.727308][ T5876] should_fail_alloc_page+0x68/0x90 [ 234.732599][ T5876] prepare_alloc_pages+0x14e/0x6f0 [ 234.737549][ T5876] ? __alloc_pages_bulk+0xda0/0xda0 [ 234.742586][ T5876] __alloc_pages+0x162/0x610 [ 234.747008][ T5876] ? prep_new_page+0x110/0x110 [ 234.751621][ T5876] __folio_alloc+0x15/0x40 [ 234.755862][ T5876] shmem_alloc_and_acct_folio+0x78c/0xa50 [ 234.761595][ T5876] ? mem_cgroup_swap_full+0x1a0/0x1a0 [ 234.766798][ T5876] ? shmem_replace_folio+0x6a0/0x6a0 [ 234.771955][ T5876] ? xas_load+0x39d/0x3b0 [ 234.776084][ T5876] ? __filemap_get_folio+0xaa1/0xae0 [ 234.781208][ T5876] ? page_cache_prev_miss+0x410/0x410 [ 234.786416][ T5876] ? down_read_trylock+0x319/0x7d0 [ 234.791450][ T5876] shmem_get_folio_gfp+0x12d4/0x24b0 [ 234.796575][ T5876] ? shmem_get_folio+0xa0/0xa0 [ 234.801166][ T5876] ? fault_in_iov_iter_readable+0x49/0x290 [ 234.806806][ T5876] ? fault_in_readable+0x172/0x2d0 [ 234.811767][ T5876] ? fault_in_readable+0x17c/0x2d0 [ 234.816700][ T5876] shmem_write_begin+0x164/0x3a0 [ 234.821474][ T5876] ? __kasan_check_write+0x14/0x20 [ 234.826425][ T5876] ? shmem_writepage+0xe00/0xe00 [ 234.831200][ T5876] generic_perform_write+0x318/0x780 [ 234.836322][ T5876] ? __mnt_drop_write_file+0xc3/0x100 [ 234.841532][ T5876] ? generic_file_direct_write+0x6b0/0x6b0 [ 234.847167][ T5876] ? __file_remove_privs+0x640/0x640 [ 234.852286][ T5876] ? generic_write_checks+0x15c/0x1c0 [ 234.857504][ T5876] __generic_file_write_iter+0x174/0x3a0 [ 234.862975][ T5876] generic_file_write_iter+0xb1/0x310 [ 234.868178][ T5876] vfs_write+0xaf6/0xed0 [ 234.872248][ T5876] ? __kasan_slab_free+0x11/0x20 [ 234.877025][ T5876] ? file_end_write+0x1c0/0x1c0 [ 234.881740][ T5876] ? mutex_lock+0xb1/0x1e0 [ 234.885970][ T5876] ? bit_wait_io_timeout+0x120/0x120 [ 234.891088][ T5876] ? __fdget_pos+0x2e2/0x390 [ 234.895504][ T5876] ? ksys_write+0x77/0x2c0 [ 234.899786][ T5876] ksys_write+0x199/0x2c0 [ 234.903928][ T5876] ? __this_cpu_preempt_check+0x13/0x20 [ 234.909309][ T5876] ? __ia32_sys_read+0x90/0x90 [ 234.913917][ T5876] ? debug_smp_processor_id+0x17/0x20 [ 234.919115][ T5876] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 234.925225][ T5876] __x64_sys_write+0x7b/0x90 [ 234.929649][ T5876] x64_sys_call+0x2f/0x9a0 [ 234.933994][ T5876] do_syscall_64+0x3b/0xb0 [ 234.938247][ T5876] ? clear_bhb_loop+0x55/0xb0 [ 234.942762][ T5876] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 234.948485][ T5876] RIP: 0033:0x7fd159585d29 [ 234.953101][ T5876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 234.972540][ T5876] RSP: 002b:00007fd15a49c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 234.980785][ T5876] RAX: ffffffffffffffda RBX: 00007fd159775fa0 RCX: 00007fd159585d29 [ 234.988683][ T5876] RDX: 0000000000040010 RSI: 0000000020000180 RDI: 000000000000000a [ 234.996503][ T5876] RBP: 00007fd15a49c090 R08: 0000000000000000 R09: 0000000000000000 [ 235.004307][ T5876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 235.012381][ T5876] R13: 0000000000000000 R14: 00007fd159775fa0 R15: 00007ffd4be3d738 [ 235.020283][ T5876] [ 236.198522][ T5912] syz.2.1920[5912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.198632][ T5912] syz.2.1920[5912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.250113][ T5912] syz.2.1920[5912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.289585][ T5912] syz.2.1920[5912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.561964][ T6164] device wg2 left promiscuous mode [ 255.545432][ T6391] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 263.360565][ T6634] FAULT_INJECTION: forcing a failure. [ 263.360565][ T6634] name failslab, interval 1, probability 0, space 0, times 0 [ 263.442205][ T6634] CPU: 0 PID: 6634 Comm: syz.4.2155 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 263.452035][ T6634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 263.461925][ T6634] Call Trace: [ 263.465047][ T6634] [ 263.467827][ T6634] dump_stack_lvl+0x151/0x1b7 [ 263.472346][ T6634] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 263.477643][ T6634] ? _parse_integer+0x2a/0x40 [ 263.482146][ T6634] ? kstrtoull+0x1cd/0x2e0 [ 263.486402][ T6634] dump_stack+0x15/0x18 [ 263.490394][ T6634] should_fail_ex+0x3d0/0x520 [ 263.495620][ T6634] __should_failslab+0xaf/0xf0 [ 263.500647][ T6634] ? bpf_test_init+0xf1/0x190 [ 263.505418][ T6634] should_failslab+0x9/0x20 [ 263.509758][ T6634] __kmem_cache_alloc_node+0x3d/0x2a0 [ 263.515057][ T6634] ? bpf_test_init+0xf1/0x190 [ 263.519605][ T6634] __kmalloc+0xa3/0x1e0 [ 263.523560][ T6634] bpf_test_init+0xf1/0x190 [ 263.527898][ T6634] bpf_prog_test_run_xdp+0x414/0x1130 [ 263.533191][ T6634] ? avc_denied+0x1b0/0x1b0 [ 263.537534][ T6634] ? dev_put+0x80/0x80 [ 263.541442][ T6634] ? __kasan_check_write+0x14/0x20 [ 263.546380][ T6634] ? fput+0x15b/0x1b0 [ 263.550199][ T6634] ? dev_put+0x80/0x80 [ 263.554133][ T6634] bpf_prog_test_run+0x3b0/0x630 [ 263.558885][ T6634] ? bpf_prog_query+0x260/0x260 [ 263.563567][ T6634] ? selinux_bpf+0xd2/0x100 [ 263.567906][ T6634] ? security_bpf+0x82/0xb0 [ 263.572249][ T6634] __sys_bpf+0x59f/0x7f0 [ 263.576369][ T6634] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 263.581571][ T6634] ? __ia32_sys_read+0x90/0x90 [ 263.586338][ T6634] ? debug_smp_processor_id+0x17/0x20 [ 263.592327][ T6634] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 263.601702][ T6634] __x64_sys_bpf+0x7c/0x90 [ 263.606210][ T6634] x64_sys_call+0x87f/0x9a0 [ 263.610641][ T6634] do_syscall_64+0x3b/0xb0 [ 263.614884][ T6634] ? clear_bhb_loop+0x55/0xb0 [ 263.619516][ T6634] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 263.625412][ T6634] RIP: 0033:0x7f8437785d29 [ 263.629658][ T6634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.649186][ T6634] RSP: 002b:00007f843865d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 263.657557][ T6634] RAX: ffffffffffffffda RBX: 00007f8437975fa0 RCX: 00007f8437785d29 [ 263.665455][ T6634] RDX: 0000000000000050 RSI: 0000000020000340 RDI: 000000000000000a [ 263.673264][ T6634] RBP: 00007f843865d090 R08: 0000000000000000 R09: 0000000000000000 [ 263.681068][ T6634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.688882][ T6634] R13: 0000000000000000 R14: 00007f8437975fa0 R15: 00007ffe15e7e9a8 [ 263.696699][ T6634] [ 265.771103][ T6699] FAULT_INJECTION: forcing a failure. [ 265.771103][ T6699] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 265.868160][ T6699] CPU: 1 PID: 6699 Comm: syz.0.2177 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 265.877827][ T6699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 265.887736][ T6699] Call Trace: [ 265.890843][ T6699] [ 265.893615][ T6699] dump_stack_lvl+0x151/0x1b7 [ 265.898131][ T6699] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 265.903425][ T6699] dump_stack+0x15/0x18 [ 265.907495][ T6699] should_fail_ex+0x3d0/0x520 [ 265.912021][ T6699] should_fail+0xb/0x10 [ 265.916003][ T6699] should_fail_usercopy+0x1a/0x20 [ 265.920862][ T6699] _copy_from_user+0x1e/0xc0 [ 265.925292][ T6699] bpf_obj_get_info_by_fd+0x452/0x3e60 [ 265.930589][ T6699] ? kstrtouint+0xf6/0x180 [ 265.934837][ T6699] ? kasan_set_track+0x4b/0x70 [ 265.939442][ T6699] ? avc_has_perm_noaudit+0x348/0x430 [ 265.944644][ T6699] ? memcpy+0x56/0x70 [ 265.948466][ T6699] ? bpf_map_get_fd_by_id+0x350/0x350 [ 265.953670][ T6699] ? avc_denied+0x1b0/0x1b0 [ 265.958025][ T6699] ? cap_capable+0x1d2/0x270 [ 265.962440][ T6699] ? selinux_bpf+0xd2/0x100 [ 265.966775][ T6699] ? security_bpf+0x82/0xb0 [ 265.971118][ T6699] __sys_bpf+0x479/0x7f0 [ 265.975194][ T6699] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 265.980412][ T6699] ? __ia32_sys_read+0x90/0x90 [ 265.985006][ T6699] ? debug_smp_processor_id+0x17/0x20 [ 265.990308][ T6699] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 265.996198][ T6699] __x64_sys_bpf+0x7c/0x90 [ 266.000453][ T6699] x64_sys_call+0x87f/0x9a0 [ 266.004806][ T6699] do_syscall_64+0x3b/0xb0 [ 266.009048][ T6699] ? clear_bhb_loop+0x55/0xb0 [ 266.013559][ T6699] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 266.019375][ T6699] RIP: 0033:0x7fd159585d29 [ 266.023627][ T6699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 266.043072][ T6699] RSP: 002b:00007fd15a49c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 266.051408][ T6699] RAX: ffffffffffffffda RBX: 00007fd159775fa0 RCX: 00007fd159585d29 [ 266.059740][ T6699] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 000000000000000f [ 266.067731][ T6699] RBP: 00007fd15a49c090 R08: 0000000000000000 R09: 0000000000000000 [ 266.075622][ T6699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 266.083426][ T6699] R13: 0000000000000000 R14: 00007fd159775fa0 R15: 00007ffd4be3d738 [ 266.091249][ T6699] [ 266.297237][ T6701] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.305716][ T6701] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.354585][ T6704] device bridge_slave_1 left promiscuous mode [ 266.360912][ T6704] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.389522][ T6704] device bridge_slave_0 left promiscuous mode [ 266.433628][ T6704] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.962145][ T6734] syz.2.2187 (6734) used obsolete PPPIOCDETACH ioctl [ 269.597595][ T6786] device pim6reg1 entered promiscuous mode [ 270.212629][ T6810] FAULT_INJECTION: forcing a failure. [ 270.212629][ T6810] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 270.226287][ T6810] CPU: 0 PID: 6810 Comm: syz.2.2215 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 270.235935][ T6810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 270.245837][ T6810] Call Trace: [ 270.248950][ T6810] [ 270.251795][ T6810] dump_stack_lvl+0x151/0x1b7 [ 270.256343][ T6810] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 270.261628][ T6810] dump_stack+0x15/0x18 [ 270.265614][ T6810] should_fail_ex+0x3d0/0x520 [ 270.270137][ T6810] should_fail+0xb/0x10 [ 270.274120][ T6810] should_fail_usercopy+0x1a/0x20 [ 270.278995][ T6810] _copy_to_user+0x1e/0x90 [ 270.283231][ T6810] bpf_prog_test_run_raw_tp+0x52e/0x6d0 [ 270.288616][ T6810] ? bpf_prog_test_run_tracing+0x760/0x760 [ 270.294274][ T6810] ? __kasan_check_write+0x14/0x20 [ 270.299203][ T6810] ? fput+0x15b/0x1b0 [ 270.303019][ T6810] ? bpf_prog_test_run_tracing+0x760/0x760 [ 270.308668][ T6810] bpf_prog_test_run+0x3b0/0x630 [ 270.313435][ T6810] ? bpf_prog_query+0x260/0x260 [ 270.318130][ T6810] ? selinux_bpf+0xd2/0x100 [ 270.322472][ T6810] ? security_bpf+0x82/0xb0 [ 270.326803][ T6810] __sys_bpf+0x59f/0x7f0 [ 270.330882][ T6810] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 270.336093][ T6810] ? __ia32_sys_read+0x90/0x90 [ 270.340687][ T6810] ? debug_smp_processor_id+0x17/0x20 [ 270.345902][ T6810] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 270.351803][ T6810] __x64_sys_bpf+0x7c/0x90 [ 270.356052][ T6810] x64_sys_call+0x87f/0x9a0 [ 270.360390][ T6810] do_syscall_64+0x3b/0xb0 [ 270.364643][ T6810] ? clear_bhb_loop+0x55/0xb0 [ 270.369255][ T6810] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 270.374986][ T6810] RIP: 0033:0x7ff2b3385d29 [ 270.379234][ T6810] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.398683][ T6810] RSP: 002b:00007ff2b4166038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.406945][ T6810] RAX: ffffffffffffffda RBX: 00007ff2b3575fa0 RCX: 00007ff2b3385d29 [ 270.414757][ T6810] RDX: 0000000000000037 RSI: 0000000020000380 RDI: 000000000000000a [ 270.422637][ T6810] RBP: 00007ff2b4166090 R08: 0000000000000000 R09: 0000000000000000 [ 270.430444][ T6810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 270.438345][ T6810] R13: 0000000000000000 R14: 00007ff2b3575fa0 R15: 00007fffa886b268 [ 270.446159][ T6810] [ 270.472401][ T6819] bridge0: port 3(dummy0) entered blocking state [ 270.480972][ T6819] bridge0: port 3(dummy0) entered disabled state [ 270.488973][ T6819] device dummy0 entered promiscuous mode [ 270.497148][ T6819] bridge0: port 3(dummy0) entered blocking state [ 270.503426][ T6819] bridge0: port 3(dummy0) entered forwarding state [ 270.662555][ T6821] device dummy0 left promiscuous mode [ 271.160189][ T6821] bridge0: port 3(dummy0) entered disabled state [ 274.364129][ T6916] device syzkaller0 entered promiscuous mode [ 276.234223][ T28] audit: type=1400 audit(1736200994.839:145): avc: denied { create } for pid=6949 comm="syz.3.2257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 279.207875][ T28] audit: type=1400 audit(1736200997.799:146): avc: denied { create } for pid=7001 comm="syz.1.2274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 282.738673][ T7091] FAULT_INJECTION: forcing a failure. [ 282.738673][ T7091] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 282.860713][ T7091] CPU: 1 PID: 7091 Comm: syz.1.2302 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 282.870361][ T7091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 282.880258][ T7091] Call Trace: [ 282.883376][ T7091] [ 282.886152][ T7091] dump_stack_lvl+0x151/0x1b7 [ 282.890674][ T7091] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 282.895975][ T7091] ? bpf_test_run+0x912/0xa40 [ 282.900577][ T7091] dump_stack+0x15/0x18 [ 282.904556][ T7091] should_fail_ex+0x3d0/0x520 [ 282.909069][ T7091] should_fail+0xb/0x10 [ 282.913058][ T7091] should_fail_usercopy+0x1a/0x20 [ 282.918004][ T7091] _copy_to_user+0x1e/0x90 [ 282.922265][ T7091] bpf_test_finish+0x2f3/0x950 [ 282.926859][ T7091] ? convert_skb_to___skb+0x4f0/0x4f0 [ 282.932066][ T7091] ? convert_skb_to___skb+0x2da/0x4f0 [ 282.937276][ T7091] bpf_prog_test_run_skb+0xcfd/0x13a0 [ 282.942582][ T7091] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 282.948303][ T7091] ? __kasan_check_write+0x14/0x20 [ 282.953250][ T7091] ? fput+0x15b/0x1b0 [ 282.957067][ T7091] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 282.962799][ T7091] bpf_prog_test_run+0x3b0/0x630 [ 282.967631][ T7091] ? bpf_prog_query+0x260/0x260 [ 282.972257][ T7091] ? selinux_bpf+0xd2/0x100 [ 282.976599][ T7091] ? security_bpf+0x82/0xb0 [ 282.980939][ T7091] __sys_bpf+0x59f/0x7f0 [ 282.985025][ T7091] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 282.990239][ T7091] ? __ia32_sys_read+0x90/0x90 [ 282.994825][ T7091] ? debug_smp_processor_id+0x17/0x20 [ 283.000032][ T7091] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 283.006531][ T7091] __x64_sys_bpf+0x7c/0x90 [ 283.010779][ T7091] x64_sys_call+0x87f/0x9a0 [ 283.015135][ T7091] do_syscall_64+0x3b/0xb0 [ 283.019368][ T7091] ? clear_bhb_loop+0x55/0xb0 [ 283.023884][ T7091] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 283.029625][ T7091] RIP: 0033:0x7f6534d85d29 [ 283.033864][ T7091] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 283.053916][ T7091] RSP: 002b:00007f6535b74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 283.062422][ T7091] RAX: ffffffffffffffda RBX: 00007f6534f75fa0 RCX: 00007f6534d85d29 [ 283.070229][ T7091] RDX: 0000000000000050 RSI: 00000000200002c0 RDI: 000000000000000a [ 283.078129][ T7091] RBP: 00007f6535b74090 R08: 0000000000000000 R09: 0000000000000000 [ 283.085938][ T7091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.093752][ T7091] R13: 0000000000000000 R14: 00007f6534f75fa0 R15: 00007ffff3ef1248 [ 283.101571][ T7091] [ 286.039410][ T7164] FAULT_INJECTION: forcing a failure. [ 286.039410][ T7164] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 286.082052][ T7164] CPU: 0 PID: 7164 Comm: syz.3.2322 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 286.091708][ T7164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 286.101600][ T7164] Call Trace: [ 286.104726][ T7164] [ 286.107498][ T7164] dump_stack_lvl+0x151/0x1b7 [ 286.112017][ T7164] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 286.117310][ T7164] dump_stack+0x15/0x18 [ 286.121295][ T7164] should_fail_ex+0x3d0/0x520 [ 286.125810][ T7164] should_fail+0xb/0x10 [ 286.129799][ T7164] should_fail_usercopy+0x1a/0x20 [ 286.134659][ T7164] _copy_from_user+0x1e/0xc0 [ 286.139087][ T7164] bpf_test_init+0x12e/0x190 [ 286.143708][ T7164] bpf_prog_test_run_xdp+0x414/0x1130 [ 286.148904][ T7164] ? avc_denied+0x1b0/0x1b0 [ 286.153249][ T7164] ? dev_put+0x80/0x80 [ 286.157153][ T7164] ? __kasan_check_write+0x14/0x20 [ 286.162099][ T7164] ? fput+0x15b/0x1b0 [ 286.165912][ T7164] ? dev_put+0x80/0x80 [ 286.169908][ T7164] bpf_prog_test_run+0x3b0/0x630 [ 286.174687][ T7164] ? bpf_prog_query+0x260/0x260 [ 286.179369][ T7164] ? selinux_bpf+0xd2/0x100 [ 286.183708][ T7164] ? security_bpf+0x82/0xb0 [ 286.188045][ T7164] __sys_bpf+0x59f/0x7f0 [ 286.192125][ T7164] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 286.197503][ T7164] ? __ia32_sys_read+0x90/0x90 [ 286.202380][ T7164] ? debug_smp_processor_id+0x17/0x20 [ 286.207557][ T7164] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 286.213460][ T7164] __x64_sys_bpf+0x7c/0x90 [ 286.217717][ T7164] x64_sys_call+0x87f/0x9a0 [ 286.222044][ T7164] do_syscall_64+0x3b/0xb0 [ 286.226299][ T7164] ? clear_bhb_loop+0x55/0xb0 [ 286.230816][ T7164] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 286.236541][ T7164] RIP: 0033:0x7f0b65985d29 [ 286.240795][ T7164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.260371][ T7164] RSP: 002b:00007f0b66785038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.268571][ T7164] RAX: ffffffffffffffda RBX: 00007f0b65b75fa0 RCX: 00007f0b65985d29 [ 286.276379][ T7164] RDX: 0000000000000050 RSI: 0000000020000340 RDI: 000000000000000a [ 286.284196][ T7164] RBP: 00007f0b66785090 R08: 0000000000000000 R09: 0000000000000000 [ 286.292160][ T7164] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.299967][ T7164] R13: 0000000000000000 R14: 00007f0b65b75fa0 R15: 00007ffdfb33aa98 [ 286.307787][ T7164] [ 287.544478][ T7209] FAULT_INJECTION: forcing a failure. [ 287.544478][ T7209] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 287.636309][ T7209] CPU: 0 PID: 7209 Comm: syz.4.2336 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 287.645962][ T7209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 287.655860][ T7209] Call Trace: [ 287.659072][ T7209] [ 287.661943][ T7209] dump_stack_lvl+0x151/0x1b7 [ 287.666452][ T7209] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 287.671866][ T7209] dump_stack+0x15/0x18 [ 287.675854][ T7209] should_fail_ex+0x3d0/0x520 [ 287.680364][ T7209] should_fail+0xb/0x10 [ 287.684375][ T7209] should_fail_usercopy+0x1a/0x20 [ 287.689212][ T7209] _copy_to_user+0x1e/0x90 [ 287.693468][ T7209] bpf_obj_get_info_by_fd+0x3072/0x3e60 [ 287.698857][ T7209] ? bpf_map_get_fd_by_id+0x350/0x350 [ 287.704082][ T7209] ? avc_denied+0x1b0/0x1b0 [ 287.708415][ T7209] ? cap_capable+0x1d2/0x270 [ 287.712823][ T7209] ? selinux_bpf+0xd2/0x100 [ 287.717165][ T7209] ? security_bpf+0x82/0xb0 [ 287.721503][ T7209] __sys_bpf+0x479/0x7f0 [ 287.725579][ T7209] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 287.730792][ T7209] ? __ia32_sys_read+0x90/0x90 [ 287.735395][ T7209] ? debug_smp_processor_id+0x17/0x20 [ 287.740595][ T7209] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 287.746587][ T7209] __x64_sys_bpf+0x7c/0x90 [ 287.750840][ T7209] x64_sys_call+0x87f/0x9a0 [ 287.755262][ T7209] do_syscall_64+0x3b/0xb0 [ 287.759525][ T7209] ? clear_bhb_loop+0x55/0xb0 [ 287.764031][ T7209] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 287.769770][ T7209] RIP: 0033:0x7f8437785d29 [ 287.774020][ T7209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 287.793454][ T7209] RSP: 002b:00007f843863c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 287.801795][ T7209] RAX: ffffffffffffffda RBX: 00007f8437976080 RCX: 00007f8437785d29 [ 287.809604][ T7209] RDX: 0000000000000010 RSI: 0000000020000040 RDI: 000000000000000f [ 287.817503][ T7209] RBP: 00007f843863c090 R08: 0000000000000000 R09: 0000000000000000 [ 287.825402][ T7209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 287.833249][ T7209] R13: 0000000000000000 R14: 00007f8437976080 R15: 00007ffe15e7e9a8 [ 287.841033][ T7209] [ 290.328251][ T7238] FAULT_INJECTION: forcing a failure. [ 290.328251][ T7238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.374007][ T7238] CPU: 0 PID: 7238 Comm: syz.2.2346 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 290.383750][ T7238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 290.394051][ T7238] Call Trace: [ 290.397113][ T7238] [ 290.399890][ T7238] dump_stack_lvl+0x151/0x1b7 [ 290.404400][ T7238] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 290.409697][ T7238] dump_stack+0x15/0x18 [ 290.414468][ T7238] should_fail_ex+0x3d0/0x520 [ 290.419071][ T7238] should_fail+0xb/0x10 [ 290.423062][ T7238] should_fail_usercopy+0x1a/0x20 [ 290.427922][ T7238] _copy_to_user+0x1e/0x90 [ 290.432261][ T7238] simple_read_from_buffer+0xc7/0x150 [ 290.437472][ T7238] proc_fail_nth_read+0x1a3/0x210 [ 290.442335][ T7238] ? proc_fault_inject_write+0x390/0x390 [ 290.447795][ T7238] ? fsnotify_perm+0x269/0x5b0 [ 290.452488][ T7238] ? security_file_permission+0x86/0xb0 [ 290.457864][ T7238] ? proc_fault_inject_write+0x390/0x390 [ 290.463419][ T7238] vfs_read+0x26c/0xae0 [ 290.467413][ T7238] ? __kasan_check_write+0x14/0x20 [ 290.472359][ T7238] ? kernel_read+0x1f0/0x1f0 [ 290.476786][ T7238] ? mutex_lock+0xb1/0x1e0 [ 290.481036][ T7238] ? bit_wait_io_timeout+0x120/0x120 [ 290.486259][ T7238] ? __fdget_pos+0x2e2/0x390 [ 290.490781][ T7238] ? ksys_read+0x77/0x2c0 [ 290.494931][ T7238] ksys_read+0x199/0x2c0 [ 290.499014][ T7238] ? vfs_write+0xed0/0xed0 [ 290.503621][ T7238] ? debug_smp_processor_id+0x17/0x20 [ 290.508826][ T7238] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 290.514733][ T7238] __x64_sys_read+0x7b/0x90 [ 290.519067][ T7238] x64_sys_call+0x28/0x9a0 [ 290.523321][ T7238] do_syscall_64+0x3b/0xb0 [ 290.527576][ T7238] ? clear_bhb_loop+0x55/0xb0 [ 290.532083][ T7238] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 290.537814][ T7238] RIP: 0033:0x7ff2b338473c [ 290.542067][ T7238] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 290.561692][ T7238] RSP: 002b:00007ff2b4166030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 290.569959][ T7238] RAX: ffffffffffffffda RBX: 00007ff2b3575fa0 RCX: 00007ff2b338473c [ 290.577748][ T7238] RDX: 000000000000000f RSI: 00007ff2b41660a0 RDI: 0000000000000005 [ 290.585557][ T7238] RBP: 00007ff2b4166090 R08: 0000000000000000 R09: 0000000000000000 [ 290.593361][ T7238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.601276][ T7238] R13: 0000000000000000 R14: 00007ff2b3575fa0 R15: 00007fffa886b268 [ 290.609086][ T7238] [ 292.545359][ T7284] FAULT_INJECTION: forcing a failure. [ 292.545359][ T7284] name failslab, interval 1, probability 0, space 0, times 0 [ 292.570894][ T7284] CPU: 0 PID: 7284 Comm: syz.3.2361 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 292.580551][ T7284] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 292.590534][ T7284] Call Trace: [ 292.593652][ T7284] [ 292.596431][ T7284] dump_stack_lvl+0x151/0x1b7 [ 292.600950][ T7284] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 292.606242][ T7284] ? arch_stack_walk+0xf3/0x140 [ 292.610927][ T7284] dump_stack+0x15/0x18 [ 292.614921][ T7284] should_fail_ex+0x3d0/0x520 [ 292.619518][ T7284] __should_failslab+0xaf/0xf0 [ 292.624124][ T7284] ? mq_init+0x157/0x6b0 [ 292.628196][ T7284] should_failslab+0x9/0x20 [ 292.632548][ T7284] __kmem_cache_alloc_node+0x3d/0x2a0 [ 292.637760][ T7284] ? mq_init+0x157/0x6b0 [ 292.641996][ T7284] __kmalloc+0xa3/0x1e0 [ 292.646021][ T7284] mq_init+0x157/0x6b0 [ 292.649898][ T7284] ? dev_ifsioc+0x177/0x1150 [ 292.654325][ T7284] ? sock_do_ioctl+0x26b/0x450 [ 292.658918][ T7284] ? sock_ioctl+0x455/0x740 [ 292.663266][ T7284] ? x64_sys_call+0x98/0x9a0 [ 292.667702][ T7284] ? do_syscall_64+0x3b/0xb0 [ 292.672116][ T7284] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 292.678042][ T7284] ? qdisc_alloc+0x7a/0x780 [ 292.682441][ T7284] ? trace_net_dev_xmit_timeout+0x140/0x140 [ 292.688180][ T7284] ? __kasan_check_write+0x14/0x20 [ 292.693121][ T7284] ? qdisc_alloc+0x5a0/0x780 [ 292.697545][ T7284] ? tun_device_event+0x3e5/0xf80 [ 292.702404][ T7284] qdisc_create_dflt+0x144/0x3e0 [ 292.707174][ T7284] ? _raw_spin_lock+0xa4/0x1b0 [ 292.711783][ T7284] dev_activate+0x159/0x1130 [ 292.716212][ T7284] ? __local_bh_enable_ip+0x58/0x80 [ 292.721236][ T7284] ? _raw_spin_unlock_bh+0x50/0x60 [ 292.726188][ T7284] ? dev_set_rx_mode+0x249/0x2d0 [ 292.730969][ T7284] __dev_open+0x3c7/0x4e0 [ 292.735122][ T7284] ? dev_open+0x260/0x260 [ 292.739296][ T7284] ? _raw_spin_unlock_bh+0x50/0x60 [ 292.744326][ T7284] ? dev_set_rx_mode+0x249/0x2d0 [ 292.749185][ T7284] ? __kasan_check_read+0x11/0x20 [ 292.754053][ T7284] __dev_change_flags+0x1db/0x6e0 [ 292.758991][ T7284] ? avc_denied+0x1b0/0x1b0 [ 292.763331][ T7284] ? dev_get_flags+0x1e0/0x1e0 [ 292.767936][ T7284] ? kstrtouint+0xf6/0x180 [ 292.772274][ T7284] dev_change_flags+0x8c/0x1a0 [ 292.776969][ T7284] dev_ifsioc+0x177/0x1150 [ 292.781221][ T7284] ? dev_ioctl+0xe60/0xe60 [ 292.785476][ T7284] ? __kasan_check_write+0x14/0x20 [ 292.790588][ T7284] ? mutex_lock+0xb1/0x1e0 [ 292.794843][ T7284] ? bit_wait_io_timeout+0x120/0x120 [ 292.799963][ T7284] dev_ioctl+0x543/0xe60 [ 292.804055][ T7284] sock_do_ioctl+0x26b/0x450 [ 292.808902][ T7284] ? has_cap_mac_admin+0x3c0/0x3c0 [ 292.813945][ T7284] ? sock_show_fdinfo+0xa0/0xa0 [ 292.818641][ T7284] ? selinux_file_ioctl+0x3cc/0x540 [ 292.823656][ T7284] sock_ioctl+0x455/0x740 [ 292.827905][ T7284] ? sock_poll+0x400/0x400 [ 292.832161][ T7284] ? __fget_files+0x2cb/0x330 [ 292.836673][ T7284] ? security_file_ioctl+0x84/0xb0 [ 292.841969][ T7284] ? sock_poll+0x400/0x400 [ 292.846221][ T7284] __se_sys_ioctl+0x114/0x190 [ 292.850735][ T7284] __x64_sys_ioctl+0x7b/0x90 [ 292.855160][ T7284] x64_sys_call+0x98/0x9a0 [ 292.859413][ T7284] do_syscall_64+0x3b/0xb0 [ 292.863662][ T7284] ? clear_bhb_loop+0x55/0xb0 [ 292.868387][ T7284] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 292.874113][ T7284] RIP: 0033:0x7f0b65985d29 [ 292.878364][ T7284] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 292.897980][ T7284] RSP: 002b:00007f0b66785038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 292.906138][ T7284] RAX: ffffffffffffffda RBX: 00007f0b65b75fa0 RCX: 00007f0b65985d29 [ 292.913963][ T7284] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 292.921761][ T7284] RBP: 00007f0b66785090 R08: 0000000000000000 R09: 0000000000000000 [ 292.929572][ T7284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.937471][ T7284] R13: 0000000000000000 R14: 00007f0b65b75fa0 R15: 00007ffdfb33aa98 [ 292.945291][ T7284] [ 293.292202][ T7284] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 293.302636][ T7284] device pim6reg1 entered promiscuous mode [ 293.463341][ T7286] device veth0_vlan left promiscuous mode [ 293.479338][ T7286] device veth0_vlan entered promiscuous mode [ 293.655081][ T506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 293.707542][ T506] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 293.795418][ T506] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 294.511631][ T7313] device veth0_vlan left promiscuous mode [ 294.547526][ T7313] device veth0_vlan entered promiscuous mode [ 294.615473][ T506] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 294.646256][ T506] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 294.684343][ T506] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 297.011538][ T7361] device bridge_slave_1 left promiscuous mode [ 297.095246][ T7361] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.161413][ T7361] device bridge_slave_0 left promiscuous mode [ 297.233830][ T7361] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.964142][ T7393] FAULT_INJECTION: forcing a failure. [ 297.964142][ T7393] name failslab, interval 1, probability 0, space 0, times 0 [ 298.072266][ T7393] CPU: 1 PID: 7393 Comm: syz.4.2397 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 298.082018][ T7393] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 298.091915][ T7393] Call Trace: [ 298.095043][ T7393] [ 298.097814][ T7393] dump_stack_lvl+0x151/0x1b7 [ 298.102330][ T7393] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 298.107624][ T7393] dump_stack+0x15/0x18 [ 298.111619][ T7393] should_fail_ex+0x3d0/0x520 [ 298.116139][ T7393] ? vm_area_dup+0x65/0x290 [ 298.120472][ T7393] __should_failslab+0xaf/0xf0 [ 298.125068][ T7393] should_failslab+0x9/0x20 [ 298.129410][ T7393] kmem_cache_alloc+0x3b/0x320 [ 298.134015][ T7393] vm_area_dup+0x65/0x290 [ 298.138174][ T7393] copy_mm+0xd19/0x1bc0 [ 298.142174][ T7393] ? copy_signal+0x650/0x650 [ 298.146593][ T7393] ? _raw_spin_lock+0xa4/0x1b0 [ 298.151199][ T7393] ? __init_rwsem+0x130/0x240 [ 298.155706][ T7393] ? copy_signal+0x503/0x650 [ 298.160273][ T7393] copy_process+0x12b6/0x3530 [ 298.164738][ T7393] ? timerqueue_add+0x250/0x270 [ 298.169418][ T7393] ? idle_dummy+0x10/0x10 [ 298.173675][ T7393] ? enqueue_hrtimer+0xca/0x250 [ 298.178363][ T7393] ? __hrtimer_run_queues+0x46b/0xad0 [ 298.183650][ T7393] kernel_clone+0x229/0x890 [ 298.187991][ T7393] ? create_io_thread+0x180/0x180 [ 298.192847][ T7393] ? clockevents_program_event+0x22f/0x300 [ 298.198492][ T7393] __x64_sys_clone+0x231/0x280 [ 298.203091][ T7393] ? __do_sys_vfork+0x110/0x110 [ 298.207782][ T7393] x64_sys_call+0x1b0/0x9a0 [ 298.212120][ T7393] do_syscall_64+0x3b/0xb0 [ 298.216801][ T7393] ? clear_bhb_loop+0x55/0xb0 [ 298.221314][ T7393] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 298.227044][ T7393] RIP: 0033:0x7f8437785d29 [ 298.231304][ T7393] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 298.251177][ T7393] RSP: 002b:00007f843865cfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 298.259423][ T7393] RAX: ffffffffffffffda RBX: 00007f8437975fa0 RCX: 00007f8437785d29 [ 298.267227][ T7393] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 298.275038][ T7393] RBP: 00007f843865d090 R08: 0000000000000000 R09: 0000000000000000 [ 298.282855][ T7393] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 298.290660][ T7393] R13: 0000000000000000 R14: 00007f8437975fa0 R15: 00007ffe15e7e9a8 [ 298.298477][ T7393] [ 300.776950][ T7475] device pim6reg1 entered promiscuous mode [ 300.792139][ T7475] FAULT_INJECTION: forcing a failure. [ 300.792139][ T7475] name failslab, interval 1, probability 0, space 0, times 0 [ 300.812115][ T7475] CPU: 0 PID: 7475 Comm: syz.1.2418 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 300.821769][ T7475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 300.831660][ T7475] Call Trace: [ 300.834787][ T7475] [ 300.837561][ T7475] dump_stack_lvl+0x151/0x1b7 [ 300.842076][ T7475] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 300.847369][ T7475] dump_stack+0x15/0x18 [ 300.851361][ T7475] should_fail_ex+0x3d0/0x520 [ 300.855876][ T7475] __should_failslab+0xaf/0xf0 [ 300.860473][ T7475] ? ____ip_mc_inc_group+0x215/0x8d0 [ 300.865593][ T7475] should_failslab+0x9/0x20 [ 300.869939][ T7475] __kmem_cache_alloc_node+0x3d/0x2a0 [ 300.875142][ T7475] ? ____ip_mc_inc_group+0x215/0x8d0 [ 300.880262][ T7475] kmalloc_trace+0x2a/0xa0 [ 300.884523][ T7475] ____ip_mc_inc_group+0x215/0x8d0 [ 300.889472][ T7475] ? __ip_mc_inc_group+0x30/0x30 [ 300.894320][ T7475] ? __kasan_check_write+0x14/0x20 [ 300.899271][ T7475] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 300.904562][ T7475] ? __kasan_check_read+0x11/0x20 [ 300.909423][ T7475] ip_mc_up+0x10f/0x1e0 [ 300.913414][ T7475] inetdev_event+0xc80/0x1110 [ 300.917929][ T7475] ? devinet_exit_net+0x230/0x230 [ 300.922791][ T7475] ? arp_netdev_event+0xd4/0x2a0 [ 300.927592][ T7475] raw_notifier_call_chain+0x8c/0xf0 [ 300.932683][ T7475] __dev_notify_flags+0x304/0x610 [ 300.937547][ T7475] ? __dev_change_flags+0x6e0/0x6e0 [ 300.942576][ T7475] ? __dev_change_flags+0x569/0x6e0 [ 300.947610][ T7475] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 300.954211][ T7475] ? dev_get_flags+0x1e0/0x1e0 [ 300.958809][ T7475] ? __request_module+0x3fa/0x8d0 [ 300.963669][ T7475] dev_change_flags+0xf0/0x1a0 [ 300.968269][ T7475] dev_ifsioc+0x177/0x1150 [ 300.972523][ T7475] ? dev_ioctl+0xe60/0xe60 [ 300.976776][ T7475] ? __mutex_lock_slowpath+0xe/0x10 [ 300.981893][ T7475] ? mutex_lock+0x130/0x1e0 [ 300.986240][ T7475] ? bit_wait_io_timeout+0x120/0x120 [ 300.991372][ T7475] ? security_capable+0x87/0xb0 [ 300.996050][ T7475] dev_ioctl+0x543/0xe60 [ 301.000123][ T7475] sock_do_ioctl+0x26b/0x450 [ 301.004551][ T7475] ? has_cap_mac_admin+0x3c0/0x3c0 [ 301.009494][ T7475] ? sock_show_fdinfo+0xa0/0xa0 [ 301.014185][ T7475] ? selinux_file_ioctl+0x3cc/0x540 [ 301.019220][ T7475] sock_ioctl+0x455/0x740 [ 301.023384][ T7475] ? sock_poll+0x400/0x400 [ 301.027636][ T7475] ? __fget_files+0x2cb/0x330 [ 301.032150][ T7475] ? security_file_ioctl+0x84/0xb0 [ 301.037097][ T7475] ? sock_poll+0x400/0x400 [ 301.041346][ T7475] __se_sys_ioctl+0x114/0x190 [ 301.045868][ T7475] __x64_sys_ioctl+0x7b/0x90 [ 301.050288][ T7475] x64_sys_call+0x98/0x9a0 [ 301.054541][ T7475] do_syscall_64+0x3b/0xb0 [ 301.058793][ T7475] ? clear_bhb_loop+0x55/0xb0 [ 301.063305][ T7475] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 301.069034][ T7475] RIP: 0033:0x7f6534d85d29 [ 301.073810][ T7475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 301.093249][ T7475] RSP: 002b:00007f6535b53038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.101590][ T7475] RAX: ffffffffffffffda RBX: 00007f6534f76080 RCX: 00007f6534d85d29 [ 301.109394][ T7475] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 301.117292][ T7475] RBP: 00007f6535b53090 R08: 0000000000000000 R09: 0000000000000000 [ 301.125104][ T7475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 301.132913][ T7475] R13: 0000000000000000 R14: 00007f6534f76080 R15: 00007ffff3ef1248 [ 301.140732][ T7475] [ 301.597072][ T7489] device wg2 entered promiscuous mode [ 303.162997][ T7539] Â: renamed from pim6reg1 [ 304.938777][ T7595] device pim6reg1 entered promiscuous mode [ 305.577258][ T7635] device pim6reg1 entered promiscuous mode [ 306.685763][ T7658] device pim6reg1 entered promiscuous mode [ 308.214529][ T7722] FAULT_INJECTION: forcing a failure. [ 308.214529][ T7722] name failslab, interval 1, probability 0, space 0, times 0 [ 308.279886][ T7722] CPU: 1 PID: 7722 Comm: syz.1.2500 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 308.289566][ T7722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 308.299628][ T7722] Call Trace: [ 308.302882][ T7722] [ 308.305679][ T7722] dump_stack_lvl+0x151/0x1b7 [ 308.310264][ T7722] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 308.315685][ T7722] ? kstrtoull+0x1cd/0x2e0 [ 308.319933][ T7722] ? _parse_integer+0x40/0x40 [ 308.324535][ T7722] dump_stack+0x15/0x18 [ 308.328525][ T7722] should_fail_ex+0x3d0/0x520 [ 308.333055][ T7722] __should_failslab+0xaf/0xf0 [ 308.337811][ T7722] ? bpf_test_init+0xf1/0x190 [ 308.342324][ T7722] should_failslab+0x9/0x20 [ 308.346689][ T7722] __kmem_cache_alloc_node+0x3d/0x2a0 [ 308.351954][ T7722] ? avc_has_perm_noaudit+0x348/0x430 [ 308.357247][ T7722] ? bpf_test_init+0xf1/0x190 [ 308.361762][ T7722] __kmalloc+0xa3/0x1e0 [ 308.365767][ T7722] bpf_test_init+0xf1/0x190 [ 308.370180][ T7722] bpf_prog_test_run_skb+0x297/0x13a0 [ 308.375396][ T7722] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 308.381289][ T7722] ? __kasan_check_write+0x14/0x20 [ 308.386237][ T7722] ? fput+0x15b/0x1b0 [ 308.390051][ T7722] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 308.396045][ T7722] bpf_prog_test_run+0x3b0/0x630 [ 308.400824][ T7722] ? bpf_prog_query+0x260/0x260 [ 308.405590][ T7722] ? selinux_bpf+0xd2/0x100 [ 308.409933][ T7722] ? security_bpf+0x82/0xb0 [ 308.414276][ T7722] __sys_bpf+0x59f/0x7f0 [ 308.418349][ T7722] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 308.423653][ T7722] ? __ia32_sys_read+0x90/0x90 [ 308.428247][ T7722] ? debug_smp_processor_id+0x17/0x20 [ 308.433462][ T7722] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 308.439365][ T7722] __x64_sys_bpf+0x7c/0x90 [ 308.443607][ T7722] x64_sys_call+0x87f/0x9a0 [ 308.448086][ T7722] do_syscall_64+0x3b/0xb0 [ 308.452457][ T7722] ? clear_bhb_loop+0x55/0xb0 [ 308.456972][ T7722] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 308.462789][ T7722] RIP: 0033:0x7f6534d85d29 [ 308.467039][ T7722] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.486563][ T7722] RSP: 002b:00007f6535b74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 308.494892][ T7722] RAX: ffffffffffffffda RBX: 00007f6534f75fa0 RCX: 00007f6534d85d29 [ 308.502792][ T7722] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 308.510602][ T7722] RBP: 00007f6535b74090 R08: 0000000000000000 R09: 0000000000000000 [ 308.518499][ T7722] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.526353][ T7722] R13: 0000000000000000 R14: 00007f6534f75fa0 R15: 00007ffff3ef1248 [ 308.534137][ T7722] [ 308.569555][ T7725] FAULT_INJECTION: forcing a failure. [ 308.569555][ T7725] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 308.589657][ T7725] CPU: 0 PID: 7725 Comm: syz.2.2501 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 308.599361][ T7725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 308.609201][ T7725] Call Trace: [ 308.612842][ T7725] [ 308.615623][ T7725] dump_stack_lvl+0x151/0x1b7 [ 308.620134][ T7725] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 308.625430][ T7725] ? bpf_test_run+0x912/0xa40 [ 308.629944][ T7725] dump_stack+0x15/0x18 [ 308.633937][ T7725] should_fail_ex+0x3d0/0x520 [ 308.638567][ T7725] should_fail+0xb/0x10 [ 308.642535][ T7725] should_fail_usercopy+0x1a/0x20 [ 308.647392][ T7725] _copy_to_user+0x1e/0x90 [ 308.651638][ T7725] bpf_test_finish+0x22c/0x950 [ 308.656587][ T7725] ? convert_skb_to___skb+0x4f0/0x4f0 [ 308.661799][ T7725] ? __kasan_check_write+0x14/0x20 [ 308.666824][ T7725] ? _copy_from_user+0x90/0xc0 [ 308.671429][ T7725] bpf_prog_test_run_xdp+0x8ce/0x1130 [ 308.676639][ T7725] ? dev_put+0x80/0x80 [ 308.680540][ T7725] ? __kasan_check_write+0x14/0x20 [ 308.685497][ T7725] ? fput+0x15b/0x1b0 [ 308.689345][ T7725] ? dev_put+0x80/0x80 [ 308.693211][ T7725] bpf_prog_test_run+0x3b0/0x630 [ 308.697981][ T7725] ? bpf_prog_query+0x260/0x260 [ 308.702676][ T7725] ? selinux_bpf+0xd2/0x100 [ 308.707013][ T7725] ? security_bpf+0x82/0xb0 [ 308.711347][ T7725] __sys_bpf+0x59f/0x7f0 [ 308.715430][ T7725] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 308.720640][ T7725] ? __ia32_sys_read+0x90/0x90 [ 308.725238][ T7725] ? debug_smp_processor_id+0x17/0x20 [ 308.730444][ T7725] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 308.736353][ T7725] __x64_sys_bpf+0x7c/0x90 [ 308.740596][ T7725] x64_sys_call+0x87f/0x9a0 [ 308.744935][ T7725] do_syscall_64+0x3b/0xb0 [ 308.749197][ T7725] ? clear_bhb_loop+0x55/0xb0 [ 308.753702][ T7725] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 308.759430][ T7725] RIP: 0033:0x7ff2b3385d29 [ 308.763683][ T7725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.783338][ T7725] RSP: 002b:00007ff2b4145038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 308.791547][ T7725] RAX: ffffffffffffffda RBX: 00007ff2b3576080 RCX: 00007ff2b3385d29 [ 308.799367][ T7725] RDX: 0000000000000050 RSI: 0000000020000340 RDI: 000000000000000a [ 308.807873][ T7725] RBP: 00007ff2b4145090 R08: 0000000000000000 R09: 0000000000000000 [ 308.815854][ T7725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.824362][ T7725] R13: 0000000000000000 R14: 00007ff2b3576080 R15: 00007fffa886b268 [ 308.832180][ T7725] [ 310.355326][ T7772] device wg2 left promiscuous mode [ 310.429378][ T7778] device wg2 entered promiscuous mode [ 310.676985][ T7791] FAULT_INJECTION: forcing a failure. [ 310.676985][ T7791] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 310.702265][ T7791] CPU: 1 PID: 7791 Comm: syz.3.2526 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 310.711919][ T7791] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 310.721807][ T7791] Call Trace: [ 310.725026][ T7791] [ 310.727803][ T7791] dump_stack_lvl+0x151/0x1b7 [ 310.732310][ T7791] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 310.737600][ T7791] ? vsnprintf+0x1b93/0x1c70 [ 310.742034][ T7791] dump_stack+0x15/0x18 [ 310.746017][ T7791] should_fail_ex+0x3d0/0x520 [ 310.750541][ T7791] should_fail+0xb/0x10 [ 310.754533][ T7791] should_fail_usercopy+0x1a/0x20 [ 310.759388][ T7791] _copy_to_user+0x1e/0x90 [ 310.763649][ T7791] bpf_verifier_vlog+0x181/0x390 [ 310.768420][ T7791] btf_verifier_log+0x1f9/0x2a0 [ 310.773099][ T7791] ? bpf_verifier_vlog+0x1c6/0x390 [ 310.778046][ T7791] ? btf_func_proto_log+0x34b/0x900 [ 310.783078][ T7791] ? btf_find_kptr+0xaf0/0xaf0 [ 310.787677][ T7791] ? __btf_verifier_log+0xd1/0x120 [ 310.792627][ T7791] ? btf_check_sec_info+0x4f0/0x4f0 [ 310.797665][ T7791] btf_func_proto_log+0x4c3/0x900 [ 310.802525][ T7791] __btf_verifier_log_type+0x4e7/0x770 [ 310.807818][ T7791] ? sort_r+0x1398/0x13b0 [ 310.811985][ T7791] ? btf_func_proto_check_meta+0xd3/0x160 [ 310.817545][ T7791] ? sort_r+0x276/0x13b0 [ 310.821616][ T7791] ? btf_int_show+0x2850/0x2850 [ 310.826308][ T7791] btf_func_proto_check_meta+0xf0/0x160 [ 310.831692][ T7791] btf_check_all_metas+0x342/0xa50 [ 310.836638][ T7791] btf_parse_type_sec+0x144/0x1a20 [ 310.841582][ T7791] ? __btf_verifier_log+0xd1/0x120 [ 310.846530][ T7791] ? btf_check_sec_info+0x371/0x4f0 [ 310.851558][ T7791] ? btf_verifier_log+0x2a0/0x2a0 [ 310.856419][ T7791] ? kvmalloc_node+0x26c/0x640 [ 310.861023][ T7791] ? __btf_type_is_scalar_struct+0x8c0/0x8c0 [ 310.866835][ T7791] ? btf_parse_hdr+0x5e9/0x7c0 [ 310.871440][ T7791] ? btf_parse_str_sec+0x20e/0x2a0 [ 310.876383][ T7791] btf_new_fd+0x4af/0x7c0 [ 310.880553][ T7791] bpf_btf_load+0x6f/0x90 [ 310.884713][ T7791] __sys_bpf+0x586/0x7f0 [ 310.888893][ T7791] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 310.894118][ T7791] ? __ia32_sys_read+0x90/0x90 [ 310.898686][ T7791] ? debug_smp_processor_id+0x17/0x20 [ 310.903902][ T7791] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 310.909798][ T7791] __x64_sys_bpf+0x7c/0x90 [ 310.914050][ T7791] x64_sys_call+0x87f/0x9a0 [ 310.918389][ T7791] do_syscall_64+0x3b/0xb0 [ 310.922654][ T7791] ? clear_bhb_loop+0x55/0xb0 [ 310.927164][ T7791] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 310.932974][ T7791] RIP: 0033:0x7f0b65985d29 [ 310.937226][ T7791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.956764][ T7791] RSP: 002b:00007f0b66785038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 310.965009][ T7791] RAX: ffffffffffffffda RBX: 00007f0b65b75fa0 RCX: 00007f0b65985d29 [ 310.972825][ T7791] RDX: 0000000000000028 RSI: 00000000200004c0 RDI: 0000000000000012 [ 310.980629][ T7791] RBP: 00007f0b66785090 R08: 0000000000000000 R09: 0000000000000000 [ 310.988538][ T7791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 310.996338][ T7791] R13: 0000000000000000 R14: 00007f0b65b75fa0 R15: 00007ffdfb33aa98 [ 311.004162][ T7791] [ 311.580576][ T7812] device wg2 left promiscuous mode [ 311.588157][ T7815] device wg2 entered promiscuous mode [ 311.785167][ T7820] syz.2.2536 uses obsolete (PF_INET,SOCK_PACKET) [ 312.186081][ T7850] FAULT_INJECTION: forcing a failure. [ 312.186081][ T7850] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 312.232244][ T7850] CPU: 1 PID: 7850 Comm: syz.1.2546 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 312.241891][ T7850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 312.251989][ T7850] Call Trace: [ 312.255082][ T7850] [ 312.257870][ T7850] dump_stack_lvl+0x151/0x1b7 [ 312.262373][ T7850] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 312.267674][ T7850] dump_stack+0x15/0x18 [ 312.271855][ T7850] should_fail_ex+0x3d0/0x520 [ 312.276365][ T7850] should_fail+0xb/0x10 [ 312.280355][ T7850] should_fail_usercopy+0x1a/0x20 [ 312.285217][ T7850] _copy_from_user+0x1e/0xc0 [ 312.289637][ T7850] bpf_test_init+0x12e/0x190 [ 312.294066][ T7850] bpf_prog_test_run_skb+0x297/0x13a0 [ 312.299279][ T7850] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 312.305036][ T7850] ? __kasan_check_write+0x14/0x20 [ 312.310017][ T7850] ? fput+0x15b/0x1b0 [ 312.313767][ T7850] ? __bpf_prog_test_run_raw_tp+0x2e0/0x2e0 [ 312.319594][ T7850] bpf_prog_test_run+0x3b0/0x630 [ 312.324354][ T7850] ? bpf_prog_query+0x260/0x260 [ 312.329042][ T7850] ? selinux_bpf+0xd2/0x100 [ 312.333508][ T7850] ? security_bpf+0x82/0xb0 [ 312.337926][ T7850] __sys_bpf+0x59f/0x7f0 [ 312.342007][ T7850] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 312.347220][ T7850] ? __ia32_sys_read+0x90/0x90 [ 312.351823][ T7850] ? debug_smp_processor_id+0x17/0x20 [ 312.357127][ T7850] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 312.363011][ T7850] __x64_sys_bpf+0x7c/0x90 [ 312.367274][ T7850] x64_sys_call+0x87f/0x9a0 [ 312.371701][ T7850] do_syscall_64+0x3b/0xb0 [ 312.376028][ T7850] ? clear_bhb_loop+0x55/0xb0 [ 312.380468][ T7850] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 312.386283][ T7850] RIP: 0033:0x7f6534d85d29 [ 312.390532][ T7850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 312.410066][ T7850] RSP: 002b:00007f6535b74038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 312.418307][ T7850] RAX: ffffffffffffffda RBX: 00007f6534f75fa0 RCX: 00007f6534d85d29 [ 312.426122][ T7850] RDX: 0000000000000050 RSI: 00000000200002c0 RDI: 000000000000000a [ 312.433927][ T7850] RBP: 00007f6535b74090 R08: 0000000000000000 R09: 0000000000000000 [ 312.441744][ T7850] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 312.449986][ T7850] R13: 0000000000000000 R14: 00007f6534f75fa0 R15: 00007ffff3ef1248 [ 312.457993][ T7850] [ 313.183002][ T7874] device veth0_vlan left promiscuous mode [ 313.218208][ T7874] device veth0_vlan entered promiscuous mode [ 313.296871][ T7890] FAULT_INJECTION: forcing a failure. [ 313.296871][ T7890] name failslab, interval 1, probability 0, space 0, times 0 [ 313.333712][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.350956][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.382120][ T7890] CPU: 1 PID: 7890 Comm: syz.0.2561 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 313.391863][ T7890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 313.401756][ T7890] Call Trace: [ 313.404963][ T7890] [ 313.407743][ T7890] dump_stack_lvl+0x151/0x1b7 [ 313.412262][ T7890] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 313.417558][ T7890] dump_stack+0x15/0x18 [ 313.421635][ T7890] should_fail_ex+0x3d0/0x520 [ 313.426142][ T7890] __should_failslab+0xaf/0xf0 [ 313.430740][ T7890] ? call_usermodehelper_setup+0x8f/0x220 [ 313.436388][ T7890] should_failslab+0x9/0x20 [ 313.440723][ T7890] __kmem_cache_alloc_node+0x3d/0x2a0 [ 313.445935][ T7890] ? call_usermodehelper_setup+0x8f/0x220 [ 313.451484][ T7890] kmalloc_trace+0x2a/0xa0 [ 313.455738][ T7890] call_usermodehelper_setup+0x8f/0x220 [ 313.461117][ T7890] ? __request_module+0x8d0/0x8d0 [ 313.465979][ T7890] __request_module+0x37d/0x8d0 [ 313.470752][ T7890] ? capable+0x78/0xe0 [ 313.474667][ T7890] ? _trace_android_vh_delayacct_wpcopy_end+0x120/0x120 [ 313.481437][ T7890] ? security_capable+0x87/0xb0 [ 313.486206][ T7890] dev_load+0x5b/0xb0 [ 313.490024][ T7890] dev_ioctl+0x52c/0xe60 [ 313.494101][ T7890] sock_do_ioctl+0x26b/0x450 [ 313.498522][ T7890] ? has_cap_mac_admin+0x3c0/0x3c0 [ 313.503473][ T7890] ? sock_show_fdinfo+0xa0/0xa0 [ 313.508170][ T7890] ? selinux_file_ioctl+0x3cc/0x540 [ 313.513192][ T7890] sock_ioctl+0x455/0x740 [ 313.517361][ T7890] ? sock_poll+0x400/0x400 [ 313.521653][ T7890] ? __fget_files+0x2cb/0x330 [ 313.526130][ T7890] ? security_file_ioctl+0x84/0xb0 [ 313.531073][ T7890] ? sock_poll+0x400/0x400 [ 313.535325][ T7890] __se_sys_ioctl+0x114/0x190 [ 313.539843][ T7890] __x64_sys_ioctl+0x7b/0x90 [ 313.544277][ T7890] x64_sys_call+0x98/0x9a0 [ 313.548516][ T7890] do_syscall_64+0x3b/0xb0 [ 313.552771][ T7890] ? clear_bhb_loop+0x55/0xb0 [ 313.557284][ T7890] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 313.563008][ T7890] RIP: 0033:0x7fd159585d29 [ 313.567268][ T7890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 313.586709][ T7890] RSP: 002b:00007fd15a47b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 313.594949][ T7890] RAX: ffffffffffffffda RBX: 00007fd159776080 RCX: 00007fd159585d29 [ 313.602761][ T7890] RDX: 0000000020000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 313.610570][ T7890] RBP: 00007fd15a47b090 R08: 0000000000000000 R09: 0000000000000000 [ 313.618387][ T7890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 313.626717][ T7890] R13: 0000000000000000 R14: 00007fd159776080 R15: 00007ffd4be3d738 [ 313.634535][ T7890] [ 313.648546][ T28] audit: type=1400 audit(1736201032.259:147): avc: denied { sys_module } for pid=7886 comm="syz.0.2561" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 313.670245][ T323] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.786191][ T7890] device pim6reg1 entered promiscuous mode [ 313.980792][ T7904] FAULT_INJECTION: forcing a failure. [ 313.980792][ T7904] name failslab, interval 1, probability 0, space 0, times 0 [ 314.112624][ T7904] CPU: 0 PID: 7904 Comm: syz.0.2567 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 314.122363][ T7904] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 314.132263][ T7904] Call Trace: [ 314.135385][ T7904] [ 314.138264][ T7904] dump_stack_lvl+0x151/0x1b7 [ 314.142771][ T7904] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 314.148056][ T7904] ? kmalloc_trace+0x44/0xa0 [ 314.152480][ T7904] ? security_perf_event_alloc+0x62/0x90 [ 314.158043][ T7904] ? perf_event_alloc+0x1544/0x1840 [ 314.163076][ T7904] ? __se_sys_perf_event_open+0xb27/0x3d60 [ 314.168724][ T7904] ? x64_sys_call+0x7de/0x9a0 [ 314.173226][ T7904] ? do_syscall_64+0x3b/0xb0 [ 314.177651][ T7904] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 314.183556][ T7904] dump_stack+0x15/0x18 [ 314.187548][ T7904] should_fail_ex+0x3d0/0x520 [ 314.192063][ T7904] __should_failslab+0xaf/0xf0 [ 314.196657][ T7904] should_failslab+0x9/0x20 [ 314.201003][ T7904] slab_pre_alloc_hook+0x2e/0x1b0 [ 314.205865][ T7904] kmem_cache_alloc_lru+0x49/0x270 [ 314.210804][ T7904] ? __d_alloc+0x34/0x700 [ 314.214972][ T7904] __d_alloc+0x34/0x700 [ 314.218968][ T7904] ? perf_event_exit_event+0x530/0x530 [ 314.224259][ T7904] d_alloc_pseudo+0x1d/0x70 [ 314.228602][ T7904] alloc_file_pseudo+0x131/0x2f0 [ 314.233374][ T7904] ? alloc_empty_file_noaccount+0x80/0x80 [ 314.238935][ T7904] anon_inode_getfile+0xa7/0x180 [ 314.243704][ T7904] __se_sys_perf_event_open+0x1006/0x3d60 [ 314.249257][ T7904] ? clockevents_program_event+0x22f/0x300 [ 314.254912][ T7904] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 314.260371][ T7904] ? kvm_sched_clock_read+0x18/0x40 [ 314.265407][ T7904] ? sched_clock+0x9/0x10 [ 314.269580][ T7904] __x64_sys_perf_event_open+0xbf/0xd0 [ 314.274870][ T7904] x64_sys_call+0x7de/0x9a0 [ 314.279199][ T7904] do_syscall_64+0x3b/0xb0 [ 314.283458][ T7904] ? clear_bhb_loop+0x55/0xb0 [ 314.287971][ T7904] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 314.293781][ T7904] RIP: 0033:0x7fd159585d29 [ 314.298041][ T7904] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 314.317725][ T7904] RSP: 002b:00007fd15a49c038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 314.326163][ T7904] RAX: ffffffffffffffda RBX: 00007fd159775fa0 RCX: 00007fd159585d29 [ 314.334157][ T7904] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000000020000040 [ 314.341969][ T7904] RBP: 00007fd15a49c090 R08: 0000000000000000 R09: 0000000000000000 [ 314.349780][ T7904] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 314.357590][ T7904] R13: 0000000000000000 R14: 00007fd159775fa0 R15: 00007ffd4be3d738 [ 314.365442][ T7904] [ 314.481291][ T7900] device pim6reg1 entered promiscuous mode [ 319.279806][ T8050] device pim6reg1 entered promiscuous mode [ 321.389364][ T8115] device pim6reg1 entered promiscuous mode [ 321.438227][ T8115] FAULT_INJECTION: forcing a failure. [ 321.438227][ T8115] name failslab, interval 1, probability 0, space 0, times 0 [ 321.493217][ T8115] CPU: 1 PID: 8115 Comm: syz.0.2641 Not tainted 6.1.118-syzkaller-00079-geeccb2921815 #0 [ 321.502883][ T8115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 321.512764][ T8115] Call Trace: [ 321.515886][ T8115] [ 321.518750][ T8115] dump_stack_lvl+0x151/0x1b7 [ 321.523453][ T8115] ? nf_tcp_handle_invalid+0x3f1/0x3f1 [ 321.528750][ T8115] dump_stack+0x15/0x18 [ 321.532737][ T8115] should_fail_ex+0x3d0/0x520 [ 321.537254][ T8115] __should_failslab+0xaf/0xf0 [ 321.541950][ T8115] ? ipv6_add_addr+0x41b/0xdf0 [ 321.546660][ T8115] should_failslab+0x9/0x20 [ 321.551004][ T8115] __kmem_cache_alloc_node+0x3d/0x2a0 [ 321.556209][ T8115] ? ipv6_add_addr+0x41b/0xdf0 [ 321.560807][ T8115] kmalloc_trace+0x2a/0xa0 [ 321.565061][ T8115] ipv6_add_addr+0x41b/0xdf0 [ 321.569536][ T8115] ? ipv6_generate_stable_address+0x6e0/0x6e0 [ 321.575393][ T8115] addrconf_add_linklocal+0x326/0x9e0 [ 321.580616][ T8115] ? urandom_read_iter+0x150/0x150 [ 321.585642][ T8115] ? inet6_addr_del+0x550/0x550 [ 321.590327][ T8115] ? sha1_transform+0xc47/0x13f0 [ 321.595111][ T8115] ? __local_bh_enable_ip+0x58/0x80 [ 321.600136][ T8115] ? _raw_spin_unlock_bh+0x50/0x60 [ 321.605081][ T8115] ? ipv6_generate_stable_address+0x539/0x6e0 [ 321.610988][ T8115] ? in6_ifa_put+0x80/0x80 [ 321.615239][ T8115] ? skb_gro_incr_csum_unnecessary+0x330/0x330 [ 321.621226][ T8115] ? ipv6_addr_prefix+0x42/0x180 [ 321.626004][ T8115] addrconf_addr_gen+0x891/0xcf0 [ 321.630776][ T8115] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 321.636324][ T8115] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 321.641190][ T8115] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 321.646227][ T8115] ? __kasan_check_write+0x14/0x20 [ 321.651173][ T8115] ? ip6_route_add+0x102/0x130 [ 321.655770][ T8115] ? addrconf_add_dev+0x419/0x5f0 [ 321.660627][ T8115] ? __kasan_kmalloc+0x9c/0xb0 [ 321.665227][ T8115] ? kmalloc_trace+0x44/0xa0 [ 321.669655][ T8115] ? addrconf_verify_rtnl+0xeb0/0xeb0 [ 321.674862][ T8115] ? dev_change_flags+0xf0/0x1a0 [ 321.679646][ T8115] ? __kasan_check_read+0x11/0x20 [ 321.684499][ T8115] addrconf_init_auto_addrs+0xb96/0x1050 [ 321.689969][ T8115] ? addrconf_dad_run+0x610/0x610 [ 321.694824][ T8115] ? __local_bh_enable_ip+0x58/0x80 [ 321.699858][ T8115] ? _raw_write_unlock_bh+0x32/0x50 [ 321.704980][ T8115] ? addrconf_permanent_addr+0xb40/0xba0 [ 321.710450][ T8115] ? __kasan_check_write+0x14/0x20 [ 321.715400][ T8115] ? addrconf_notify+0xe10/0xe10 [ 321.720169][ T8115] ? igmpv3_del_delrec+0x740/0x740 [ 321.725117][ T8115] ? __local_bh_enable_ip+0x58/0x80 [ 321.730158][ T8115] ? __kasan_check_write+0x14/0x20 [ 321.735203][ T8115] ? mutex_unlock+0xb2/0x260 [ 321.739613][ T8115] ? tun_device_event+0x3ef/0xf80 [ 321.744472][ T8115] ? __mutex_lock_slowpath+0x10/0x10 [ 321.749596][ T8115] ? macsec_notify+0x101/0x4c0 [ 321.754194][ T8115] ? addrconf_link_ready+0xfb/0x1e0 [ 321.759225][ T8115] addrconf_notify+0x976/0xe10 [ 321.763829][ T8115] raw_notifier_call_chain+0x8c/0xf0 [ 321.768946][ T8115] __dev_notify_flags+0x304/0x610 [ 321.773806][ T8115] ? __dev_change_flags+0x6e0/0x6e0 [ 321.778927][ T8115] ? __dev_change_flags+0x569/0x6e0 [ 321.783959][ T8115] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 321.790557][ T8115] ? dev_get_flags+0x1e0/0x1e0 [ 321.795161][ T8115] ? kstrtouint+0xf6/0x180 [ 321.799411][ T8115] dev_change_flags+0xf0/0x1a0 [ 321.804012][ T8115] dev_ifsioc+0x177/0x1150 [ 321.808266][ T8115] ? dev_ioctl+0xe60/0xe60 [ 321.812514][ T8115] ? __mutex_lock_slowpath+0xe/0x10 [ 321.817550][ T8115] ? mutex_lock+0x130/0x1e0 [ 321.821899][ T8115] ? bit_wait_io_timeout+0x120/0x120 [ 321.827105][ T8115] dev_ioctl+0x543/0xe60 [ 321.831181][ T8115] sock_do_ioctl+0x26b/0x450 [ 321.835603][ T8115] ? has_cap_mac_admin+0x3c0/0x3c0 [ 321.840562][ T8115] ? sock_show_fdinfo+0xa0/0xa0 [ 321.845240][ T8115] ? selinux_file_ioctl+0x3cc/0x540 [ 321.850273][ T8115] sock_ioctl+0x455/0x740 [ 321.854443][ T8115] ? sock_poll+0x400/0x400 [ 321.858689][ T8115] ? __fget_files+0x2cb/0x330 [ 321.863207][ T8115] ? security_file_ioctl+0x84/0xb0 [ 321.868172][ T8115] ? sock_poll+0x400/0x400 [ 321.872401][ T8115] __se_sys_ioctl+0x114/0x190 [ 321.876914][ T8115] __x64_sys_ioctl+0x7b/0x90 [ 321.881344][ T8115] x64_sys_call+0x98/0x9a0 [ 321.885599][ T8115] do_syscall_64+0x3b/0xb0 [ 321.889846][ T8115] ? clear_bhb_loop+0x55/0xb0 [ 321.894360][ T8115] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 321.900110][ T8115] RIP: 0033:0x7fd159585d29 [ 321.904340][ T8115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.923871][ T8115] RSP: 002b:00007fd15a49c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 321.932113][ T8115] RAX: ffffffffffffffda RBX: 00007fd159775fa0 RCX: 00007fd159585d29 [ 321.939930][ T8115] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 321.947740][ T8115] RBP: 00007fd15a49c090 R08: 0000000000000000 R09: 0000000000000000 [ 321.955991][ T8115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 321.963812][ T8115] R13: 0000000000000000 R14: 00007fd159775fa0 R15: 00007ffd4be3d738 [ 321.971611][ T8115] [ 322.269571][ T8128] ip6_vti0: mtu greater than device maximum [ 322.299388][ T8130] device wg2 entered promiscuous mode SYZFAIL: SIGFPE pc-offset:0xffffffffffec1464 pc:0x7facded85aec addr:(nil) code=128 (errno 11: Resource temporarily unavailable) Connection to 10.128.1.59 closed by remote host. [ 324.413248][ T294] syz-executor (294) used greatest stack depth: 21232 bytes left [ 325.484472][ T10] device veth0_vlan left promiscuous mode [ 326.962966][ T296] syz-executor (296) used greatest stack depth: 21072 bytes left [ 327.838995][ T10] device veth1_macvtap left promiscuous mode [ 327.845288][ T10] device veth1_macvtap left promiscuous mode [ 327.851105][ T10] device veth0_vlan left promiscuous mode [ 328.773012][ T10] device bridge_slave_1 left promiscuous mode [ 328.779083][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.786569][ T10] device bridge_slave_0 left promiscuous mode [ 328.792679][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.800817][ T10] device bridge_slave_1 left promiscuous mode [ 328.806826][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.814344][ T10] device bridge_slave_0 left promiscuous mode [ 328.820272][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.828261][ T10] device veth1_macvtap left promiscuous mode [ 328.834122][ T10] device veth0_vlan left promiscuous mode