last executing test programs: 3.880847864s ago: executing program 0 (id=12070): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r0, &(0x7f0000000780)}, 0x20) 3.879567935s ago: executing program 0 (id=12071): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socketpair(0x11, 0x3, 0x0, &(0x7f00000001c0)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020f00f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000200"/28], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r4, &(0x7f0000000000), 0x2a979d) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000283d0020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001100)={&(0x7f0000001500)='mm_page_alloc\x00', r5}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r6 = openat$cgroup_procs(r3, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000c40), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r7, &(0x7f0000000840)='cgroup.procs\x00', 0x2, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="06458b0001000000850000004e0000005b2afeff00000009ee2b536bbbe8dc2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000"], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x73, 0x7}, 0x10, 0x0, r2, 0x6, 0x0, &(0x7f00000003c0)=[{0x3, 0x3, 0xe, 0x5ece48105434dadb}, {0x6, 0x5, 0x1, 0x9}, {0x0, 0x5, 0x7, 0x6}, {0x0, 0x2, 0xe, 0xd}, {0x0, 0x1, 0xf, 0x5}, {0x0, 0x5, 0x0, 0x2}], 0x10, 0x10, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000008c0)={r8, 0x0, 0x87, 0x0, &(0x7f0000000680)="a8bf38f367fa179bf4174d0e959303fb4a2c6959687a02da24cb39327e693b868160ee12cbd1e3f261fcb512cd2aa006927f461a6f0ac0a075510d38b6beb79ef79f111c40337724ff4ce871356ac380261a7e428854e9455aa31a03451b525e0edbd3bf11ed9d4eb0c827b3e99ca78f5e5cd272aef75c7859b1a93377da3d98d53dcedf5112ee", 0x0, 0xc, 0x0, 0x23, 0x0, &(0x7f0000000740)="63b96b1faa73d55df9a776bf16b982a3108eb83a0419f12545ab4981dad4e9c43fd9c1", 0x0, 0x2, 0x0, 0x7f}, 0x50) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 3.605578005s ago: executing program 2 (id=12075): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0xfdef) 3.355382733s ago: executing program 4 (id=12079): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000eeffffff000000e8ff00000009000000000000000000800000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0\x00') perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0xfc8d}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300), 0x8000, 0x0) ioctl$TUNSETOFFLOAD(r3, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r3, 0x80047456, 0x2000000a) bpf$OBJ_GET_PROG(0x7, &(0x7f00000005c0)=@generic={&(0x7f0000000580)='./file0\x00', 0x0, 0x8}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.928173484s ago: executing program 0 (id=12084): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000580)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c000000060000000000000006000006040000000003000000000000000000002e6100da85a3ee7b22c417ef51a6e180c2f77ef6050000000000000038333b3392ed92ac8b7a1e40fc56a2c5cb148242f1e3cfa5cb44d95010ec4f873626546a38a94e74bcee3f27ba9089d2b4c8c8679f695eb5c1849a35bdcd"], &(0x7f0000000380)=""/187, 0x3a, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)}, 0xb) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000003900)=ANY=[@ANYBLOB], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000850000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000640)=@framed={{}, [@printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3ff}}]}, &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) setsockopt$sock_attach_bpf(r0, 0x1, 0x22, &(0x7f0000000040), 0x4) 2.742937768s ago: executing program 1 (id=12085): syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) 2.485018287s ago: executing program 2 (id=12086): syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) 2.31340235s ago: executing program 1 (id=12089): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x2, &(0x7f0000000180)=@raw=[@cb_func={0x18, 0x1, 0x4, 0x0, 0xfffffffffffffff9}], &(0x7f00000001c0)='syzkaller\x00', 0x1, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0xa, 0x5}, 0x8, 0x10, &(0x7f00000002c0)={0x2, 0x3, 0x2, 0x1ff}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000300)=[0xffffffffffffffff], &(0x7f0000000340)=[{0x4, 0x5, 0xc, 0x5}], 0x10, 0xfffffff7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000040)='qdisc_dequeue\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x47}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="611528000000000061138c0000000000bfa00000000000001503000008004e002d3501000000000095004100000000006916000000000000bf67000000000000350605000fff07206706000005000000160302000ee60060bf500000000000000f650000000000006507f9ff0100000007070000cddfffff1e75000000000000bf54000000000000070400000400f9ffbd4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd3997f9c9c4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe01c5473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc2300000008ac86d8a297dff0445a15f21dce4de9f29eff65aadc841848c9b562a31e56723888fb126a163f16f920ae2fb494059bba8e3b680324a188076ebae3f55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932c9a6aa57f1ad2e99e0e67ab93716d20000009fbb0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f679629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253880800000000000000690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43010000207b40407d000000210000000000000000005f37d83f84e98a523d80bd970d703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f6a5489af8dc2f17923f3c40dfd1970a55c22fe3a5ac000000f4000000000000000000000000c1eb2d91fb79ea00000000000000bb0d00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba9000000000000003cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c6939628950000000000000001c7205a6b068fff496d2da7d632bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6186f117b062df67d3a63f3265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b30410856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db88aa3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f8150d999d788535a4d3114dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fb9fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff010404faf0a4da65396174b4563d54b52f06c870edf0c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202ee1192b81f428a5b3c299848649e1a6bff52f657a67463d7dbf85ae9321fc2b517dc4a29b9b5a8ded5de8206c812439ab129ae818837ee1562078fc524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2a3bc87b0da23c00d9ef418cf19e7a8c4c328be0ce95798adc2dca871073f6bd61dc18487b6feb89752cd600000000abc86b94f8cbde4d470667bee722a6a2af483ad0d3415ed0f9db059acaba9eaea93f811d434e00000000000000000000d154ba10a8e51489a614e69722bac30000000000000000000000000000c5dfd188ff555285b9743d3aac000583f42d168613151d681a2f71373f20d92c9048407c91fabecfe8b3f2d5454d127edab14ba61ba1cfc4336324c86f3dcb43e9a58208077e90f6ec1c7ac756f61dcc372cdd30b82507489f0bbfbd3c3f21752e81319c0161e154ceb16e00bc7f5a6962dff317f4d014786e432817064874d69a39cb0da31bcc5f81894d8a80756447322207b4007dff12eb95066cc6bc256f0a12282224d718b06ca80b57aa183dd0c3eee45891441f2b89b4c67aa9882281393954972046974f18df232cd7fca610e33f51c2d062020f403d85ff36c26e2f6bd1d82f4d3ceb3472d9a77e0057a3bfe697d9ab7585f4a1b381343d2cf855689232f4fc5135790662dc1419a374be9d7b3e5be2886d23add90d862f1a682ff11c798e338af3e5bb0f9d3952b15bf3e0c618c89d20ca1e18a031397693bf3cfbd8417e5b55e641c898c280356f2da222d5d68919d98158578dcf18efa404e508bcbbb8cfcf70086821ebdf34c9a1dff45af873df904c2bdbef81f246d26f4b40df949e12bdac18533d4e11c608cc31d60cb591c40a7b386fa1c753336d7220a35118d4919b45eff32aab684e62c6691de14e97aa7e9dc8ecf0cd50540246d2b746e41e5b4e2c095039dfe0f71db6265f7580d098be40ef36faee5d1695830d4242a23e541e6ce9fa1998d8961cf4fe3c8e8fbb566f148c8befc229614a4b7f80d237b8abc6fd0407de31d6e5532f360d379f20f054692b47207922fe6c14eba96c9a7ae906abc1ae1ae8c4fae92883cfa1978a04bbff4bbe0000000000000000000000000044585397feaadda3fcc64e7b0c08f7ac5c64cb190f1712a3b10fc34eb758705f1751d8c8b712eb39d2b8ad44f129c2c9aedb15"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='rxrpc_recvmsg\x00', r2, 0x0, 0xfffffffffffffff5}, 0x18) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) close(r3) 2.272060053s ago: executing program 4 (id=12090): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair(0x28, 0x2, 0x0, &(0x7f0000000040)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc6, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b01000008000000020000001bd4008005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) write$cgroup_subtree(r3, &(0x7f0000000180)=ANY=[], 0xfdef) 2.093873166s ago: executing program 1 (id=12091): write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fed009875f37438e486dd0000000003"], 0xfe1b) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000d00008500000083000000bf090000000000005509010000000000950020d000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x10, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x4c) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8946, &(0x7f0000000080)) 2.084303547s ago: executing program 3 (id=12092): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000210018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x5, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0, 0x2}, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x20008840) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) close(r4) 2.054457039s ago: executing program 2 (id=12093): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r1, 0x1, 0x10, &(0x7f0000000000), 0x4) write$cgroup_devices(r1, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x40010000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x1, 0x41, 0x2, 0x0, 0x0, 0x0, 0x0, 0x91c, 0x4156, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x12640, 0x0, 0xfffffffe, 0x6, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0x7) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0xe, 0x0, &(0x7f0000000200)="63eced8e46dc3f0adf33c9f7b986", 0x0, 0x2f00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000440)=@base={0x18, 0x4, 0x2, 0x0, 0x201, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xffffffff, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) 1.853801344s ago: executing program 4 (id=12094): bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[], 0x48) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000380)=0xffffffffffffffff, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_open_procfs$namespace(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x128}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x804) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r5, &(0x7f0000000980), 0x5) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1428437b3c8026bdfeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea2a37229c339b1f91201c2796", 0x3d}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x15, 0x1, 0xa89, 0x8001, 0x2a008, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3, 0x0, @value, @void, @void, @value}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000400)={0x3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.853380624s ago: executing program 3 (id=12095): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000700000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000022020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095", @ANYRESHEX=r0], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x57, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1428437b3c8026bdfeb6db4ee9bcb25b1811d40a203bf40b3a7da5a8a64db04ed6dd26eea2a37229c339b1f91201c2796", 0x3d}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000340)=""/60, 0x3c}], 0x1}, 0x40fd) close(r2) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a00000004000000e27f00000100000000000000", @ANYRES32, @ANYBLOB="0000c383f4684b2e2e"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, &(0x7f0000000040)=0xc00) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8, 0x4}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x4030582a, &(0x7f0000000040)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x58, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r8 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000540), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@bloom_filter={0x1e, 0x2, 0x80000000, 0xa02, 0x20000, r0, 0x0, '\x00', r7, r8, 0x0, 0x1, 0x0, 0xb, @void, @value, @void, @value}, 0x50) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r9}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r10}, 0x10) bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) 1.845323844s ago: executing program 0 (id=12096): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x21) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="020000000400000008000000010000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x20000, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00001e1c0000000000003254135baec43fa800", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x40001) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x10003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba", 0x3}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000300)='alloc_extent_state\x00', r5, 0x0, 0x10000000}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x7fffffff, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x5, @perf_bp={0x0, 0x8}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xa1e2}, 0x0, 0x4, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) 1.795095598s ago: executing program 1 (id=12097): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socketpair(0xb, 0x6, 0x86, &(0x7f0000000080)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x9030, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000001380), 0x5}, 0x12018, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0xb962}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001400)={&(0x7f00000013c0)='fsi_master_gpio_cmd_rel_addr\x00', r3, 0x0, 0x2}, 0x18) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000003040)={&(0x7f0000002d40), 0x6e, 0x0}, 0x0) socketpair(0xf, 0x80000, 0xfffe0000, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x10, &(0x7f0000000040), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0xa, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000000c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$inet(r5, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 1.490345421s ago: executing program 0 (id=12098): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000ac0)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000000280)={0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x4000000) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0xb) close(r6) close(r5) sendmsg$inet(r4, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1, 0x0, 0x3e80}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e77"], 0xfdef) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000001c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2, 0x0, @void, @value, @void, @value}, 0x50) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r11 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x4801}) write$cgroup_devices(r11, &(0x7f0000000440)=ANY=[@ANYBLOB="1b2308217f01"], 0xffdd) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0x10, &(0x7f0000000040)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffb}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@alu={0x7, 0x1, 0xd, 0x8, 0x0, 0x8}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000000c0)='syzkaller\x00', 0xf0, 0x3b, &(0x7f0000000100)=""/59, 0x40f00, 0x9, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000140)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x9, 0x4, 0x821}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000240)=[r8], &(0x7f00000002c0)=[{0x3, 0x5, 0x4, 0x7}, {0x5, 0x5, 0x4, 0xa}, {0x4, 0x2, 0xc, 0x2}, {0x5, 0xad2, 0xf, 0x9}, {0x3, 0x2, 0xd, 0x3}, {0x1, 0x5, 0x3, 0x3}], 0x10, 0xff, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)={[{0x2d, 'perf_event'}, {0x2d, 'cpuset'}, {0x2b, 'net_prio'}, {0x2b, 'net_prio'}, {0x2d, 'cpu'}]}, 0x2d) 1.423899235s ago: executing program 4 (id=12099): syz_clone(0x40b04000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000100000085"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) 1.407146256s ago: executing program 1 (id=12100): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000180)=r0) recvmsg$unix(r1, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/241, 0xf1}, {&(0x7f00000001c0)=""/233, 0xe9}, {&(0x7f0000000000)=""/62, 0x3e}, {&(0x7f00000002c0)=""/144, 0x90}, {&(0x7f0000000380)=""/253, 0xfd}, {&(0x7f0000000480)=""/214, 0xd6}], 0x6, &(0x7f0000000600)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x60}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x55, 0x1, 0x0, 0x0, 0x0, 0xd, 0x2040, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0xff}, 0x205e13, 0x1, 0x0, 0x0, 0x4, 0x10, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x40049409, 0x3) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000200)=ANY=[@ANYBLOB="01000400ffffffe9ffffaaaaaaaaaa29aaaaaaaaaa120180c2000000b40693120d09f6d7848b76f33bc1268ff6ab78e05b5dec754cec56bc9c7ca3c630ab7cfe14a9c8efa3cfbcff612d17f9caab77e1a7070000001c404e28fdbeb80a7bec0bdf294e29d7dd367d380a03e7913a4bcc8e2844180a2f3e931083d75ec35378418ca1f40b52ecbf1820e267e10c0961a336cff99b005e4757cd5da694a558a585ad4eead3"]) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000680)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000680)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x4a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x8, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="bc327075736574200063707508009e7736933a872d09847aad3aef6f63707520"], 0x52) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.397893917s ago: executing program 3 (id=12101): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], 0x0, 0xec, &(0x7f0000000180)=[{}, {}], 0x10, 0x10, &(0x7f00000001c0), &(0x7f0000000200), 0x8, 0x67, 0x8, 0x8, &(0x7f0000000280)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000800000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x3f, 0x40, 0x42, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000003c0)="d7d18a81726d4895460865716e5cf1246b349d7a9fca097e8a8f37", &(0x7f0000000080), 0x1003, r7}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000240)={r7, &(0x7f0000000400)="379f870fc9c1", &(0x7f0000000500)=""/143}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r6}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r9}, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) recvmsg$unix(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 1.189570883s ago: executing program 2 (id=12102): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000fdcad4bf781753b9e041050bf2d0a2649ec45f11b1b1077d0eac95079305680895dfc666352b6058d6372d3999656bc8859eaeaaedccbaba2376eebb1d0a6fd53c7128e307b4eb4c35a75d5d73d2ae6dc6a42f6f68ca62f300444afbc57e647afe1c4c2f288391395f57e84a54acc11358cb58f76483e780448cd249ace1bde89967c8b092284fcf0300000064bfc2eb3ec1b780c364759416d9a45564a8d399df5803c590a2a709a06bcf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e020000000000000000000000000000060400000000"], 0x0, 0x37, 0x0, 0x0, 0xfffff, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x8, 0xc, 0x80, 0x19020, r3, 0x5a4, '\x00', 0x0, r3, 0x2, 0x4, 0x2, 0x6, @value, @void, @value=r3}, 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40305828, 0x20000012) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x44) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) close(0x3) 1.188629363s ago: executing program 4 (id=12103): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x7, 0x0, @void, @value}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r2, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a0ef010095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r2, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="08fc67e8433133470000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x1c, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2674, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r3}, 0x10) close(r1) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r2, 0x20, &(0x7f0000000840)={&(0x7f0000000740)=""/191, 0xbf, 0x0, &(0x7f0000000800)=""/27, 0x1b}}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000890000000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r6, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r6}, &(0x7f0000000000), &(0x7f00000004c0), 0x2}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000005c0)={0x1, 0xffffffffffffffff}, 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000007000000080000000500000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000009a456426c00f168e334333a9"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r14}, 0x10) socketpair(0x28, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) write$cgroup_subtree(r12, &(0x7f0000000140)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22020000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x17, 0x22, &(0x7f0000000bc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [@ldst={0x1, 0x1, 0x4, 0x1, 0x7, 0xfffffffffffffff8, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}, @exit, @btf_id={0x18, 0x2, 0x3, 0x0, 0x3}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x6}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000240)='syzkaller\x00', 0x2, 0xba, &(0x7f0000000680)=""/186, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1d, r2, 0x8, &(0x7f0000000440)={0x2, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x0, 0x3, 0x1000, 0x401}, 0x10, r5, r3, 0x1, 0x0, &(0x7f00000008c0)=[{0x1, 0x5, 0x5, 0x8}], 0x10, 0xffff, @void, @value}, 0x94) 1.183280733s ago: executing program 1 (id=12104): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r5, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0xa4, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x4000}, 0x0, 0x1, r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="18000015ecc9f4649e47fd98675b91000000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r6}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) 1.008300276s ago: executing program 3 (id=12105): r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), &(0x7f0000000580)=r1}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r0, &(0x7f0000000780)}, 0x20) 860.797776ms ago: executing program 3 (id=12106): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000fdcad4bf781753b9e041050bf2d0a2649ec45f11b1b1077d0eac95079305680895dfc666352b6058d6372d3999656bc8859eaeaaedccbaba2376eebb1d0a6fd53c7128e307b4eb4c35a75d5d73d2ae6dc6a42f6f68ca62f300444afbc57e647afe1c4c2f288391395f57e84a54acc11358cb58f76483e780448cd249ace1bde89967c8b092284fcf0300000064bfc2eb3ec1b780c364759416d9a45564a8d399df5803c590a2a709a06bcf", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x15, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e020000000000000000000000000000060400000000"], 0x0, 0x37, 0x0, 0x0, 0xfffff, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x2, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r2, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x8, 0xc, 0x80, 0x19020, r3, 0x5a4, '\x00', 0x0, r3, 0x2, 0x4, 0x2, 0x6, @value, @void, @value=r3}, 0x50) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x40305828, 0x20000012) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfbfffffc, 0x0, @perf_config_ext={0x1}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000730000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095000000000000002d55715f11e961d1fde85cda4c8aae3a0c64e30cd8655910b3eb2d1451a6bf4b04dc0af703f4c87963ba1424815f140290fb3f659193ae297fdcd50b6dc8d41d9568a55e58cc6514e272e53a081168e74d7189f0e655f66e08f0e108968d80ea3cac636aa60bea16f5e27d5761f66d99ca89ad8cf4e13a2013988c4222d7cf1ff8682043d3d6f16b20de6f1ea6691dcee8e86fa2109aa7898fe15f2c973463c482db5da9926d158ee55592221796e273ccf22a74e8dd3674739087015098b80e9842e82aa484b0047773b358f02338ba5950707984fb201d101bfd1f78b0ea4f397c22d94b5a34491cf3f671af9dacdf409cc1f8d960358d99d506f9b3f52ce15d0cf72083819b4a3a6dfe62b510150dfe25ef1caf21e26954118b0c2dea8b744bed8de035a056fa2d0f7370b9df062c204e070015c5c544f5c74625ea73c563000000c1fcb5a25271"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x44) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6}, 0x10) close(0x3) 479.339794ms ago: executing program 2 (id=12107): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xbd}, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xb, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f00000700000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000000f5ffffffffffffff00000000"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r6}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, &(0x7f0000000000), &(0x7f0000000040)=r5}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r9, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 240.401052ms ago: executing program 0 (id=12108): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb7020000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000940)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) write$cgroup_pid(r5, &(0x7f0000000080), 0x12) 237.009543ms ago: executing program 3 (id=12109): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000000000800000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00b300"/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000201000085"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6c, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000080000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 197.127526ms ago: executing program 4 (id=12110): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000005000000000000000200000604000000000000000003000000000000000000002e00723f2831e0e094fb92595d5b7a91da493cce5c05af44992aea710acfbda004735996fba2195f311259525492e453ea15182e4f0a9645f335e831000000e10d2f8c1bf2dc309fef28e258e72c3c741d68030cb9db56d4cae0b54572994ffd30209edb664b0e206c73234a6b65f1479148383a01cb562d97fc97055ef252ca105de75c777dce6918536af1646f30b71a2343ca0a35584274359a1b22a4d158ff1f36cfd6ef9853b7eada86c48e182b34504acaebfa38774f1cb029043f53df2a137157ac74b95a9926ee77576571cbf89bd4a4d85a2e8f4f262baeeb77a8548c3e719a13d393d2e41657c0895ea8e521861a200cb87edf20fb6a0d65f47408449538103705757903d23cde50410fc2c6a808404cc9ff177a202163dd1136"], &(0x7f0000000380)=""/187, 0x39, 0xbb, 0x1, 0x0, 0x0, @void, @value}, 0x28) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0x3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0x58, &(0x7f0000000680)}, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000340)=""/159}, 0x6e) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000000)=0x39) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_to_bond\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/../file0/../file0/file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x1e) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = openat$cgroup_procs(r0, &(0x7f0000000240)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000880), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYRES64], 0x0, 0x2a, 0x0, 0xffffffff, 0x9, 0x0, @void, @value}, 0x28) perf_event_open$cgroup(0x0, r0, 0x1, r3, 0x7) syz_clone(0xb2199a00, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2 (id=12111): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000fc0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x2, 0x4, 0x6, 0xbaa, 0x0, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000000), &(0x7f0000000200), 0xa7c, r3}, 0x38) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000a700000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r7}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000001000)) kernel console output (not intermixed with test programs): link becomes ready [ 2386.989231][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2386.997276][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2387.051010][ T5167] FAULT_INJECTION: forcing a failure. [ 2387.051010][ T5167] name failslab, interval 1, probability 0, space 0, times 0 [ 2387.065947][ T5167] CPU: 0 PID: 5167 Comm: syz.1.10777 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2387.077123][ T5167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2387.087016][ T5167] Call Trace: [ 2387.090155][ T5167] dump_stack_lvl+0x1e2/0x24b [ 2387.094744][ T5167] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2387.100056][ T5167] ? sched_clock_cpu+0x1b/0x3b0 [ 2387.104753][ T5167] dump_stack+0x15/0x17 [ 2387.108979][ T5167] should_fail+0x3c6/0x510 [ 2387.113228][ T5167] ? security_file_alloc+0x29/0x120 [ 2387.118267][ T5167] __should_failslab+0xa4/0xe0 [ 2387.122864][ T5167] should_failslab+0x9/0x20 [ 2387.127204][ T5167] kmem_cache_alloc+0x3d/0x2e0 [ 2387.131893][ T5167] security_file_alloc+0x29/0x120 [ 2387.136749][ T5167] __alloc_file+0xbf/0x330 [ 2387.141004][ T5167] alloc_empty_file+0x95/0x180 [ 2387.145602][ T5167] path_openat+0x105/0x3000 [ 2387.149943][ T5167] ? native_set_ldt+0x360/0x360 [ 2387.154629][ T5167] ? __this_cpu_preempt_check+0x13/0x20 [ 2387.160009][ T5167] ? perf_sched_cb_inc+0x260/0x260 [ 2387.164957][ T5167] ? _raw_spin_unlock_irq+0x4e/0x70 [ 2387.169989][ T5167] ? switch_mm_irqs_off+0x71b/0x9a0 [ 2387.175021][ T5167] ? __switch_to_asm+0x34/0x60 [ 2387.179625][ T5167] ? __schedule+0xbee/0x1330 [ 2387.184048][ T5167] ? do_filp_open+0x460/0x460 [ 2387.188565][ T5167] ? release_firmware_map_entry+0x18d/0x18d [ 2387.194293][ T5167] do_filp_open+0x21c/0x460 [ 2387.198639][ T5167] ? vfs_tmpfile+0x2b0/0x2b0 [ 2387.203061][ T5167] ? get_unused_fd_flags+0x94/0xa0 [ 2387.208114][ T5167] do_sys_openat2+0x13f/0x710 [ 2387.212623][ T5167] ? lapic_next_event+0x5f/0x70 [ 2387.217325][ T5167] ? clockevents_program_event+0x214/0x2c0 [ 2387.222947][ T5167] ? do_sys_open+0x220/0x220 [ 2387.227366][ T5167] ? hrtimer_interrupt+0x6a8/0x8b0 [ 2387.232338][ T5167] __x64_sys_openat+0x243/0x290 [ 2387.237000][ T5167] ? __ia32_sys_open+0x270/0x270 [ 2387.241770][ T5167] ? debug_smp_processor_id+0x17/0x20 [ 2387.246989][ T5167] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2387.252887][ T5167] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 2387.258793][ T5167] ? irqentry_exit_to_user_mode+0x41/0x80 [ 2387.264337][ T5167] do_syscall_64+0x34/0x70 [ 2387.268591][ T5167] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2387.274315][ T5167] RIP: 0033:0x7fc405218de9 [ 2387.278565][ T5167] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2387.298017][ T5167] RSP: 002b:00007fc403883038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2387.306254][ T5167] RAX: ffffffffffffffda RBX: 00007fc405431fa0 RCX: 00007fc405218de9 [ 2387.314324][ T5167] RDX: 000000000000275a RSI: 00004000000001c0 RDI: ffffffffffffff9c [ 2387.322140][ T5167] RBP: 00007fc403883090 R08: 0000000000000000 R09: 0000000000000000 [ 2387.329942][ T5167] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2387.337755][ T5167] R13: 0000000000000000 R14: 00007fc405431fa0 R15: 00007ffe8b303c98 [ 2387.348505][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2387.381097][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2387.412216][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2387.494413][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2387.503351][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2387.778084][ T5191] device veth0_vlan left promiscuous mode [ 2387.864844][ T5191] device veth0_vlan entered promiscuous mode [ 2388.571285][ T5211] FAULT_INJECTION: forcing a failure. [ 2388.571285][ T5211] name failslab, interval 1, probability 0, space 0, times 0 [ 2388.677593][ T5211] CPU: 1 PID: 5211 Comm: syz.0.10791 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2388.689044][ T5211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2388.698938][ T5211] Call Trace: [ 2388.702063][ T5211] dump_stack_lvl+0x1e2/0x24b [ 2388.706568][ T5211] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2388.711865][ T5211] dump_stack+0x15/0x17 [ 2388.715856][ T5211] should_fail+0x3c6/0x510 [ 2388.720235][ T5211] ? security_file_alloc+0x29/0x120 [ 2388.725270][ T5211] __should_failslab+0xa4/0xe0 [ 2388.729860][ T5211] should_failslab+0x9/0x20 [ 2388.734190][ T5211] kmem_cache_alloc+0x3d/0x2e0 [ 2388.738787][ T5211] ? __alloc_file+0x29/0x330 [ 2388.743391][ T5211] security_file_alloc+0x29/0x120 [ 2388.748252][ T5211] __alloc_file+0xbf/0x330 [ 2388.752505][ T5211] alloc_empty_file+0x95/0x180 [ 2388.757101][ T5211] path_openat+0x105/0x3000 [ 2388.761441][ T5211] ? __kasan_slab_alloc+0xc3/0xe0 [ 2388.766300][ T5211] ? __kasan_slab_alloc+0xb1/0xe0 [ 2388.771164][ T5211] ? slab_post_alloc_hook+0x61/0x2f0 [ 2388.776278][ T5211] ? kmem_cache_alloc+0x168/0x2e0 [ 2388.781140][ T5211] ? getname_flags+0xba/0x520 [ 2388.785654][ T5211] ? getname+0x19/0x20 [ 2388.789560][ T5211] ? __x64_sys_openat+0x243/0x290 [ 2388.794429][ T5211] ? do_syscall_64+0x34/0x70 [ 2388.798848][ T5211] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2388.804761][ T5211] ? do_filp_open+0x460/0x460 [ 2388.809286][ T5211] do_filp_open+0x21c/0x460 [ 2388.813599][ T5211] ? vfs_tmpfile+0x2b0/0x2b0 [ 2388.818034][ T5211] ? get_unused_fd_flags+0x94/0xa0 [ 2388.823006][ T5211] do_sys_openat2+0x13f/0x710 [ 2388.827488][ T5211] ? mutex_trylock+0xa0/0xa0 [ 2388.831909][ T5211] ? do_sys_open+0x220/0x220 [ 2388.836339][ T5211] ? __kasan_check_write+0x14/0x20 [ 2388.841284][ T5211] ? ksys_write+0x260/0x2c0 [ 2388.845635][ T5211] __x64_sys_openat+0x243/0x290 [ 2388.850397][ T5211] ? __ia32_sys_open+0x270/0x270 [ 2388.855183][ T5211] ? debug_smp_processor_id+0x17/0x20 [ 2388.860399][ T5211] do_syscall_64+0x34/0x70 [ 2388.864637][ T5211] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2388.870369][ T5211] RIP: 0033:0x7f7849d1fde9 [ 2388.874613][ T5211] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2388.894055][ T5211] RSP: 002b:00007f7848369038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2388.902297][ T5211] RAX: ffffffffffffffda RBX: 00007f7849f39080 RCX: 00007f7849d1fde9 [ 2388.910107][ T5211] RDX: 0000000000000201 RSI: 0000400000001000 RDI: ffffffffffffffff [ 2388.917940][ T5211] RBP: 00007f7848369090 R08: 0000000000000000 R09: 0000000000000000 [ 2388.925734][ T5211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2388.933559][ T5211] R13: 0000000000000001 R14: 00007f7849f39080 R15: 00007ffcdc4e99e8 [ 2392.153909][ T5363] FAULT_INJECTION: forcing a failure. [ 2392.153909][ T5363] name failslab, interval 1, probability 0, space 0, times 0 [ 2392.275896][ T5363] CPU: 1 PID: 5363 Comm: syz.1.10850 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2392.287087][ T5363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2392.296982][ T5363] Call Trace: [ 2392.300114][ T5363] dump_stack_lvl+0x1e2/0x24b [ 2392.304618][ T5363] ? panic+0x812/0x812 [ 2392.308524][ T5363] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2392.313824][ T5363] dump_stack+0x15/0x17 [ 2392.317811][ T5363] should_fail+0x3c6/0x510 [ 2392.322075][ T5363] ? selinux_sk_alloc_security+0x60/0x140 [ 2392.327639][ T5363] __should_failslab+0xa4/0xe0 [ 2392.332229][ T5363] should_failslab+0x9/0x20 [ 2392.336558][ T5363] kmem_cache_alloc_trace+0x3a/0x2e0 [ 2392.341682][ T5363] selinux_sk_alloc_security+0x60/0x140 [ 2392.347056][ T5363] security_sk_alloc+0x72/0xb0 [ 2392.351670][ T5363] sk_prot_alloc+0x142/0x370 [ 2392.356089][ T5363] sk_alloc+0x38/0x4d0 [ 2392.359991][ T5363] ? bpf_ctx_init+0x16e/0x1c0 [ 2392.364503][ T5363] bpf_prog_test_run_skb+0x35c/0x1410 [ 2392.369734][ T5363] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 2392.375450][ T5363] ? __kasan_check_write+0x14/0x20 [ 2392.380400][ T5363] ? fput_many+0x160/0x1b0 [ 2392.384642][ T5363] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 2392.390376][ T5363] __se_sys_bpf+0x5235/0x11cb0 [ 2392.395070][ T5363] ? stack_trace_save+0x113/0x1c0 [ 2392.400097][ T5363] ? terminate_walk+0x407/0x4f0 [ 2392.404786][ T5363] ? stack_trace_snprint+0xf0/0xf0 [ 2392.409739][ T5363] ? kmem_cache_free+0xa9/0x1e0 [ 2392.414679][ T5363] ? kmem_cache_free+0xa9/0x1e0 [ 2392.419364][ T5363] ? kasan_set_track+0x5d/0x70 [ 2392.423953][ T5363] ? __x64_sys_bpf+0x90/0x90 [ 2392.428377][ T5363] ? __kasan_slab_free+0x11/0x20 [ 2392.433149][ T5363] ? slab_free_freelist_hook+0xc0/0x190 [ 2392.438532][ T5363] ? kmem_cache_free+0xa9/0x1e0 [ 2392.443217][ T5363] ? putname+0xe7/0x140 [ 2392.447211][ T5363] ? do_sys_openat2+0x1fc/0x710 [ 2392.451896][ T5363] ? __x64_sys_openat+0x243/0x290 [ 2392.456757][ T5363] ? do_syscall_64+0x34/0x70 [ 2392.461187][ T5363] ? _kstrtoull+0x3a0/0x4a0 [ 2392.465556][ T5363] ? kstrtouint_from_user+0x20a/0x2a0 [ 2392.470820][ T5363] ? kstrtol_from_user+0x310/0x310 [ 2392.475768][ T5363] ? memset+0x35/0x40 [ 2392.479585][ T5363] ? __fsnotify_parent+0x4b9/0x6c0 [ 2392.484534][ T5363] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 2392.490956][ T5363] ? proc_fail_nth_write+0x20b/0x290 [ 2392.496074][ T5363] ? proc_fail_nth_read+0x210/0x210 [ 2392.501108][ T5363] ? security_file_permission+0x86/0xb0 [ 2392.506489][ T5363] ? rw_verify_area+0x1c3/0x360 [ 2392.511185][ T5363] ? preempt_count_add+0x92/0x1a0 [ 2392.516210][ T5363] ? vfs_write+0x852/0xe70 [ 2392.520637][ T5363] ? kmem_cache_free+0xa9/0x1e0 [ 2392.525329][ T5363] ? kernel_write+0x3d0/0x3d0 [ 2392.529840][ T5363] ? __kasan_check_write+0x14/0x20 [ 2392.534793][ T5363] ? mutex_lock+0xa5/0x110 [ 2392.539038][ T5363] ? mutex_trylock+0xa0/0xa0 [ 2392.543462][ T5363] ? __kasan_check_write+0x14/0x20 [ 2392.548409][ T5363] ? fput_many+0x160/0x1b0 [ 2392.552666][ T5363] ? debug_smp_processor_id+0x17/0x20 [ 2392.557888][ T5363] __x64_sys_bpf+0x7b/0x90 [ 2392.562558][ T5363] do_syscall_64+0x34/0x70 [ 2392.566809][ T5363] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2392.572555][ T5363] RIP: 0033:0x7fc405218de9 [ 2392.576792][ T5363] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2392.596231][ T5363] RSP: 002b:00007fc403883038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2392.604476][ T5363] RAX: ffffffffffffffda RBX: 00007fc405431fa0 RCX: 00007fc405218de9 [ 2392.612291][ T5363] RDX: 0000000000000050 RSI: 00004000000002c0 RDI: 000000000000000a [ 2392.620098][ T5363] RBP: 00007fc403883090 R08: 0000000000000000 R09: 0000000000000000 [ 2392.627909][ T5363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2392.635721][ T5363] R13: 0000000000000000 R14: 00007fc405431fa0 R15: 00007ffe8b303c98 [ 2393.051697][ T5376] device veth0_vlan left promiscuous mode [ 2393.088950][ T5376] device veth0_vlan entered promiscuous mode [ 2393.180355][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2393.203361][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2393.210950][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2393.447025][ T5386] device veth0_vlan left promiscuous mode [ 2393.453364][ T5386] device veth0_vlan entered promiscuous mode [ 2393.478209][ T5393] device pim6reg1 entered promiscuous mode [ 2393.661572][ T5402] device syzkaller0 entered promiscuous mode [ 2394.330811][ T5430] device veth0_vlan left promiscuous mode [ 2394.366541][ T5430] device veth0_vlan entered promiscuous mode [ 2394.488204][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2394.511146][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2394.522049][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2394.681044][ T5444] FAULT_INJECTION: forcing a failure. [ 2394.681044][ T5444] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2394.694723][ T5444] CPU: 0 PID: 5444 Comm: syz.1.10881 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2394.705903][ T5444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2394.715785][ T5444] Call Trace: [ 2394.718921][ T5444] dump_stack_lvl+0x1e2/0x24b [ 2394.723446][ T5444] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2394.728738][ T5444] ? irq_exit_rcu+0x9/0x10 [ 2394.732984][ T5444] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 2394.738625][ T5444] dump_stack+0x15/0x17 [ 2394.742609][ T5444] should_fail+0x3c6/0x510 [ 2394.746867][ T5444] should_fail_usercopy+0x1a/0x20 [ 2394.751725][ T5444] _copy_to_user+0x20/0x90 [ 2394.755972][ T5444] simple_read_from_buffer+0xc7/0x150 [ 2394.761175][ T5444] proc_fail_nth_read+0x1a3/0x210 [ 2394.766048][ T5444] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2394.772026][ T5444] ? proc_fault_inject_write+0x390/0x390 [ 2394.777492][ T5444] ? vfs_read+0x15f/0xba0 [ 2394.781666][ T5444] ? vfs_read+0x1ec/0xba0 [ 2394.785925][ T5444] ? proc_fault_inject_write+0x390/0x390 [ 2394.791379][ T5444] vfs_read+0x200/0xba0 [ 2394.795465][ T5444] ? kernel_read+0x70/0x70 [ 2394.799713][ T5444] ? __kasan_check_write+0x14/0x20 [ 2394.804747][ T5444] ? mutex_lock+0xa5/0x110 [ 2394.808998][ T5444] ? mutex_trylock+0xa0/0xa0 [ 2394.813426][ T5444] ? __fdget_pos+0x2e7/0x3a0 [ 2394.817853][ T5444] ? ksys_read+0x77/0x2c0 [ 2394.822024][ T5444] ksys_read+0x199/0x2c0 [ 2394.826108][ T5444] ? kvm_sched_clock_read+0x18/0x40 [ 2394.831132][ T5444] ? vfs_write+0xe70/0xe70 [ 2394.835396][ T5444] ? debug_smp_processor_id+0x17/0x20 [ 2394.840592][ T5444] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2394.846494][ T5444] __x64_sys_read+0x7b/0x90 [ 2394.850834][ T5444] do_syscall_64+0x34/0x70 [ 2394.855083][ T5444] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2394.860814][ T5444] RIP: 0033:0x7fc4052177fc [ 2394.865080][ T5444] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2394.884596][ T5444] RSP: 002b:00007fc403883030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2394.892844][ T5444] RAX: ffffffffffffffda RBX: 00007fc405431fa0 RCX: 00007fc4052177fc [ 2394.900648][ T5444] RDX: 000000000000000f RSI: 00007fc4038830a0 RDI: 0000000000000007 [ 2394.908465][ T5444] RBP: 00007fc403883090 R08: 0000000000000000 R09: 0000000000000000 [ 2394.916284][ T5444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2394.924081][ T5444] R13: 0000000000000000 R14: 00007fc405431fa0 R15: 00007ffe8b303c98 [ 2395.190471][ T5471] FAULT_INJECTION: forcing a failure. [ 2395.190471][ T5471] name failslab, interval 1, probability 0, space 0, times 0 [ 2395.203201][ T5471] CPU: 1 PID: 5471 Comm: syz.4.10890 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2395.214804][ T5471] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2395.224696][ T5471] Call Trace: [ 2395.227833][ T5471] dump_stack_lvl+0x1e2/0x24b [ 2395.232337][ T5471] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2395.237655][ T5471] dump_stack+0x15/0x17 [ 2395.241637][ T5471] should_fail+0x3c6/0x510 [ 2395.245879][ T5471] ? __d_alloc+0x2d/0x6c0 [ 2395.250144][ T5471] __should_failslab+0xa4/0xe0 [ 2395.254751][ T5471] should_failslab+0x9/0x20 [ 2395.259085][ T5471] kmem_cache_alloc+0x3d/0x2e0 [ 2395.263685][ T5471] __d_alloc+0x2d/0x6c0 [ 2395.267679][ T5471] ? __kasan_check_write+0x14/0x20 [ 2395.272621][ T5471] ? mutex_lock+0xa5/0x110 [ 2395.276873][ T5471] d_alloc_pseudo+0x1d/0x70 [ 2395.281303][ T5471] alloc_file_pseudo+0x131/0x2f0 [ 2395.286072][ T5471] ? __kasan_check_write+0x14/0x20 [ 2395.291032][ T5471] ? alloc_empty_file_noaccount+0x80/0x80 [ 2395.296659][ T5471] anon_inode_getfile+0xa7/0x180 [ 2395.301355][ T5471] __se_sys_perf_event_open+0xfe4/0x3c30 [ 2395.306823][ T5471] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2395.312292][ T5471] ? __ia32_sys_read+0x90/0x90 [ 2395.316903][ T5471] __x64_sys_perf_event_open+0xbf/0xd0 [ 2395.322221][ T5471] do_syscall_64+0x34/0x70 [ 2395.326431][ T5471] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2395.332159][ T5471] RIP: 0033:0x7f0d888b8de9 [ 2395.336440][ T5471] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2395.355863][ T5471] RSP: 002b:00007f0d86f23038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2395.364110][ T5471] RAX: ffffffffffffffda RBX: 00007f0d88ad1fa0 RCX: 00007f0d888b8de9 [ 2395.371913][ T5471] RDX: ffefffffffffffff RSI: 0000000000000000 RDI: 0000400000000700 [ 2395.379736][ T5471] RBP: 00007f0d86f23090 R08: 0000000000000000 R09: 0000000000000000 [ 2395.387530][ T5471] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2395.395350][ T5471] R13: 0000000000000000 R14: 00007f0d88ad1fa0 R15: 00007ffc934482d8 [ 2395.926830][ T5499] device veth1_macvtap left promiscuous mode [ 2395.937180][ T5499] device macsec0 entered promiscuous mode [ 2396.883042][ T5536] device syzkaller0 entered promiscuous mode [ 2397.674453][ T5564] syz.0.10921[5564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2397.674510][ T5564] syz.0.10921[5564] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2398.322118][ T5583] device veth0_vlan left promiscuous mode [ 2398.475084][ T5583] device veth0_vlan entered promiscuous mode [ 2398.648117][ T5591] device veth0_vlan left promiscuous mode [ 2398.663318][ T5603] syz.3.10934[5603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2398.663397][ T5603] syz.3.10934[5603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2398.788690][ T5591] device veth0_vlan entered promiscuous mode [ 2399.543264][ T5642] device veth1_macvtap left promiscuous mode [ 2399.699388][ T5642] device macsec0 entered promiscuous mode [ 2399.763649][ T5648] device veth1_macvtap entered promiscuous mode [ 2400.482648][ T5668] FAULT_INJECTION: forcing a failure. [ 2400.482648][ T5668] name failslab, interval 1, probability 0, space 0, times 0 [ 2400.515639][ T5668] CPU: 0 PID: 5668 Comm: syz.3.10955 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2400.526828][ T5668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2400.536716][ T5668] Call Trace: [ 2400.539856][ T5668] dump_stack_lvl+0x1e2/0x24b [ 2400.544358][ T5668] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2400.549656][ T5668] dump_stack+0x15/0x17 [ 2400.553647][ T5668] should_fail+0x3c6/0x510 [ 2400.557902][ T5668] ? alloc_vmap_area+0x61a/0x1a90 [ 2400.562901][ T5668] __should_failslab+0xa4/0xe0 [ 2400.567579][ T5668] should_failslab+0x9/0x20 [ 2400.571920][ T5668] kmem_cache_alloc+0x3d/0x2e0 [ 2400.576511][ T5668] ? alloc_vmap_area+0x16f/0x1a90 [ 2400.581452][ T5668] alloc_vmap_area+0x61a/0x1a90 [ 2400.586142][ T5668] ? vm_map_ram+0x9d0/0x9d0 [ 2400.590481][ T5668] ? __kasan_kmalloc+0x9/0x10 [ 2400.594991][ T5668] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 2400.600458][ T5668] ? __get_vm_area_node+0x116/0x470 [ 2400.605493][ T5668] __get_vm_area_node+0x156/0x470 [ 2400.610354][ T5668] __vmalloc_node_range+0xdc/0x7c0 [ 2400.615387][ T5668] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 2400.620779][ T5668] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 2400.626411][ T5668] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 2400.631792][ T5668] __vmalloc+0x7a/0x90 [ 2400.635956][ T5668] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 2400.641437][ T5668] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 2400.646631][ T5668] bpf_prog_alloc+0x21/0x1e0 [ 2400.651058][ T5668] __se_sys_bpf+0x9856/0x11cb0 [ 2400.655667][ T5668] ? ctx_flexible_sched_in+0x100/0x100 [ 2400.660953][ T5668] ? kvm_sched_clock_read+0x18/0x40 [ 2400.665985][ T5668] ? __x64_sys_bpf+0x90/0x90 [ 2400.670430][ T5668] ? ctx_flexible_sched_in+0xa8/0x100 [ 2400.675624][ T5668] ? ctx_pinned_sched_in+0x100/0x100 [ 2400.680741][ T5668] ? kvm_sched_clock_read+0x18/0x40 [ 2400.685993][ T5668] ? sched_clock+0x3a/0x40 [ 2400.690206][ T5668] ? sched_clock_cpu+0x1b/0x3b0 [ 2400.694894][ T5668] ? _raw_spin_lock+0xa4/0x1b0 [ 2400.699494][ T5668] ? _raw_spin_trylock_bh+0x190/0x190 [ 2400.704705][ T5668] ? __this_cpu_preempt_check+0x13/0x20 [ 2400.710087][ T5668] ? __perf_event_task_sched_in+0x219/0x2a0 [ 2400.716245][ T5668] ? cgroup_rstat_updated+0xfd/0x410 [ 2400.721292][ T5668] ? __cgroup_account_cputime+0xe7/0x120 [ 2400.726758][ T5668] ? put_prev_entity+0x470/0x470 [ 2400.731546][ T5668] ? update_curr+0x356/0x6b0 [ 2400.735982][ T5668] ? pick_next_task_fair+0xa94/0xd40 [ 2400.741078][ T5668] ? __update_idle_core+0x2a0/0x2a0 [ 2400.746109][ T5668] ? task_rq_lock+0x2a0/0x2a0 [ 2400.750627][ T5668] ? __kasan_check_read+0x11/0x20 [ 2400.755648][ T5668] ? _raw_spin_unlock_irq+0x4e/0x70 [ 2400.760657][ T5668] ? __schedule+0xcbc/0x1330 [ 2400.765093][ T5668] ? __kasan_check_read+0x11/0x20 [ 2400.769970][ T5668] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 2400.775850][ T5668] __x64_sys_bpf+0x7b/0x90 [ 2400.780099][ T5668] do_syscall_64+0x34/0x70 [ 2400.784351][ T5668] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2400.790085][ T5668] RIP: 0033:0x7f709ca72de9 [ 2400.794335][ T5668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2400.813772][ T5668] RSP: 002b:00007f709b0dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2400.822016][ T5668] RAX: ffffffffffffffda RBX: 00007f709cc8bfa0 RCX: 00007f709ca72de9 [ 2400.829827][ T5668] RDX: 0000000000000090 RSI: 0000400000000840 RDI: 0000000000000005 [ 2400.837637][ T5668] RBP: 00007f709b0dd090 R08: 0000000000000000 R09: 0000000000000000 [ 2400.845448][ T5668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2400.853262][ T5668] R13: 0000000000000000 R14: 00007f709cc8bfa0 R15: 00007ffca7836ae8 [ 2403.611668][ T5726] bridge0: port 2(bridge_slave_1) entered disabled state [ 2404.356826][ T5744] device veth0_vlan left promiscuous mode [ 2404.591944][ T5744] device veth0_vlan entered promiscuous mode [ 2404.725642][ T5755] FAULT_INJECTION: forcing a failure. [ 2404.725642][ T5755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2404.738657][ T5755] CPU: 0 PID: 5755 Comm: syz.0.10985 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2404.749827][ T5755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2404.759723][ T5755] Call Trace: [ 2404.762848][ T5755] dump_stack_lvl+0x1e2/0x24b [ 2404.767364][ T5755] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2404.772670][ T5755] dump_stack+0x15/0x17 [ 2404.776645][ T5755] should_fail+0x3c6/0x510 [ 2404.780963][ T5755] should_fail_usercopy+0x1a/0x20 [ 2404.785803][ T5755] _copy_to_user+0x20/0x90 [ 2404.790013][ T5755] simple_read_from_buffer+0xc7/0x150 [ 2404.795219][ T5755] proc_fail_nth_read+0x1a3/0x210 [ 2404.800081][ T5755] ? proc_fault_inject_write+0x390/0x390 [ 2404.805548][ T5755] ? security_file_permission+0x86/0xb0 [ 2404.810928][ T5755] ? rw_verify_area+0x1c3/0x360 [ 2404.815614][ T5755] ? proc_fault_inject_write+0x390/0x390 [ 2404.821080][ T5755] vfs_read+0x200/0xba0 [ 2404.825077][ T5755] ? kernel_read+0x70/0x70 [ 2404.829324][ T5755] ? __kasan_check_write+0x14/0x20 [ 2404.834274][ T5755] ? mutex_lock+0xa5/0x110 [ 2404.838523][ T5755] ? mutex_trylock+0xa0/0xa0 [ 2404.842952][ T5755] ? __fdget_pos+0x2e7/0x3a0 [ 2404.847471][ T5755] ? ksys_read+0x77/0x2c0 [ 2404.851626][ T5755] ksys_read+0x199/0x2c0 [ 2404.855704][ T5755] ? vfs_write+0xe70/0xe70 [ 2404.859956][ T5755] ? fpu__clear_all+0x20/0x20 [ 2404.864474][ T5755] ? __kasan_check_read+0x11/0x20 [ 2404.869336][ T5755] __x64_sys_read+0x7b/0x90 [ 2404.873672][ T5755] do_syscall_64+0x34/0x70 [ 2404.877923][ T5755] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2404.883652][ T5755] RIP: 0033:0x7f7849d1e7fc [ 2404.887912][ T5755] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2404.907347][ T5755] RSP: 002b:00007f784838a030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2404.915734][ T5755] RAX: ffffffffffffffda RBX: 00007f7849f38fa0 RCX: 00007f7849d1e7fc [ 2404.923543][ T5755] RDX: 000000000000000f RSI: 00007f784838a0a0 RDI: 0000000000000004 [ 2404.931345][ T5755] RBP: 00007f784838a090 R08: 0000000000000000 R09: 0000000000000000 [ 2404.939144][ T5755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2404.946954][ T5755] R13: 0000000000000000 R14: 00007f7849f38fa0 R15: 00007ffcdc4e99e8 [ 2406.303592][ T5779] device veth0_vlan left promiscuous mode [ 2406.361985][ T5779] device veth0_vlan entered promiscuous mode [ 2406.542585][ T5786] device veth0_vlan left promiscuous mode [ 2406.578422][ T5786] device veth0_vlan entered promiscuous mode [ 2406.737438][ T5782] device pim6reg1 entered promiscuous mode [ 2406.749201][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2406.758242][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2406.767262][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2408.298545][ T5836] device veth0_vlan left promiscuous mode [ 2408.326217][ T5836] device veth0_vlan entered promiscuous mode [ 2408.344769][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2408.361576][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2408.377115][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2408.608757][ T5862] FAULT_INJECTION: forcing a failure. [ 2408.608757][ T5862] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.621253][ T5862] CPU: 0 PID: 5862 Comm: syz.3.11020 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2408.632349][ T5862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2408.642237][ T5862] Call Trace: [ 2408.645383][ T5862] dump_stack_lvl+0x1e2/0x24b [ 2408.649876][ T5862] ? panic+0x812/0x812 [ 2408.653780][ T5862] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2408.659078][ T5862] ? memcpy+0x56/0x70 [ 2408.662897][ T5862] dump_stack+0x15/0x17 [ 2408.666888][ T5862] should_fail+0x3c6/0x510 [ 2408.671144][ T5862] ? netlink_trim+0x19b/0x230 [ 2408.675654][ T5862] __should_failslab+0xa4/0xe0 [ 2408.680258][ T5862] should_failslab+0x9/0x20 [ 2408.684682][ T5862] __kmalloc_track_caller+0x5f/0x320 [ 2408.689801][ T5862] ? netlink_trim+0x19b/0x230 [ 2408.694313][ T5862] pskb_expand_head+0x12b/0x1180 [ 2408.699090][ T5862] netlink_trim+0x19b/0x230 [ 2408.703426][ T5862] netlink_broadcast_filtered+0x66/0x1270 [ 2408.709078][ T5862] ? __kmalloc_track_caller+0x184/0x320 [ 2408.714451][ T5862] ? __kasan_check_write+0x14/0x20 [ 2408.719398][ T5862] ? rtmsg_ifinfo_build_skb+0xd4/0x180 [ 2408.724698][ T5862] nlmsg_notify+0x101/0x1c0 [ 2408.729034][ T5862] rtnetlink_event+0x15a/0x1b0 [ 2408.733700][ T5862] raw_notifier_call_chain+0x8c/0xf0 [ 2408.738754][ T5862] netdev_features_change+0x13b/0x1b0 [ 2408.743959][ T5862] ? dev_get_alias+0x80/0x80 [ 2408.748385][ T5862] ? __ethtool_set_flags+0x12b/0x140 [ 2408.753792][ T5862] dev_ethtool+0x116a/0x1420 [ 2408.758208][ T5862] ? netdev_rss_key_fill+0x150/0x150 [ 2408.763324][ T5862] ? __mutex_lock_slowpath+0xe/0x10 [ 2408.768346][ T5862] ? mutex_lock+0xd6/0x110 [ 2408.772603][ T5862] ? mutex_trylock+0xa0/0xa0 [ 2408.777120][ T5862] ? dev_get_by_name_rcu+0xc5/0xf0 [ 2408.782063][ T5862] dev_ioctl+0x294/0xb40 [ 2408.786145][ T5862] sock_do_ioctl+0x295/0x3a0 [ 2408.790569][ T5862] ? sock_show_fdinfo+0xa0/0xa0 [ 2408.795340][ T5862] ? kernel_write+0x3d0/0x3d0 [ 2408.799852][ T5862] ? selinux_file_ioctl+0x3cc/0x540 [ 2408.804896][ T5862] sock_ioctl+0x4a6/0x760 [ 2408.809083][ T5862] ? sock_poll+0x340/0x340 [ 2408.813435][ T5862] ? security_file_ioctl+0x84/0xb0 [ 2408.818363][ T5862] ? sock_poll+0x340/0x340 [ 2408.822615][ T5862] __se_sys_ioctl+0x114/0x190 [ 2408.827120][ T5862] __x64_sys_ioctl+0x7b/0x90 [ 2408.831550][ T5862] do_syscall_64+0x34/0x70 [ 2408.835825][ T5862] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2408.842077][ T5862] RIP: 0033:0x7f709ca72de9 [ 2408.846314][ T5862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2408.865835][ T5862] RSP: 002b:00007f709b0dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2408.874080][ T5862] RAX: ffffffffffffffda RBX: 00007f709cc8bfa0 RCX: 00007f709ca72de9 [ 2408.881890][ T5862] RDX: 0000400000000080 RSI: 0000000000008946 RDI: 0000000000000004 [ 2408.889805][ T5862] RBP: 00007f709b0dd090 R08: 0000000000000000 R09: 0000000000000000 [ 2408.897699][ T5862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2408.905497][ T5862] R13: 0000000000000000 R14: 00007f709cc8bfa0 R15: 00007ffca7836ae8 [ 2408.930811][ T5854] device wg2 entered promiscuous mode [ 2410.196033][ T5891] device veth0_vlan left promiscuous mode [ 2410.208510][ T5891] device veth0_vlan entered promiscuous mode [ 2410.221567][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2410.231753][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2410.239570][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2410.538975][ T5910] FAULT_INJECTION: forcing a failure. [ 2410.538975][ T5910] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.730803][ T5910] CPU: 0 PID: 5910 Comm: syz.3.11040 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2410.742002][ T5910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2410.751885][ T5910] Call Trace: [ 2410.755019][ T5910] dump_stack_lvl+0x1e2/0x24b [ 2410.759526][ T5910] ? panic+0x812/0x812 [ 2410.763435][ T5910] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2410.768733][ T5910] dump_stack+0x15/0x17 [ 2410.772722][ T5910] should_fail+0x3c6/0x510 [ 2410.776971][ T5910] ? __build_skb+0x2a/0x300 [ 2410.781315][ T5910] __should_failslab+0xa4/0xe0 [ 2410.785922][ T5910] should_failslab+0x9/0x20 [ 2410.790273][ T5910] kmem_cache_alloc+0x3d/0x2e0 [ 2410.794870][ T5910] ? __put_user_ns+0x60/0x60 [ 2410.799400][ T5910] __build_skb+0x2a/0x300 [ 2410.803554][ T5910] build_skb+0x25/0x1e0 [ 2410.807544][ T5910] bpf_prog_test_run_skb+0x388/0x1410 [ 2410.812763][ T5910] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 2410.818492][ T5910] ? __kasan_check_write+0x14/0x20 [ 2410.823421][ T5910] ? fput_many+0x160/0x1b0 [ 2410.827678][ T5910] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 2410.833418][ T5910] __se_sys_bpf+0x5235/0x11cb0 [ 2410.838006][ T5910] ? stack_trace_save+0x113/0x1c0 [ 2410.842870][ T5910] ? terminate_walk+0x407/0x4f0 [ 2410.847562][ T5910] ? stack_trace_snprint+0xf0/0xf0 [ 2410.852528][ T5910] ? kmem_cache_free+0xa9/0x1e0 [ 2410.857197][ T5910] ? kmem_cache_free+0xa9/0x1e0 [ 2410.861924][ T5910] ? kasan_set_track+0x5d/0x70 [ 2410.866716][ T5910] ? __x64_sys_bpf+0x90/0x90 [ 2410.871146][ T5910] ? __kasan_slab_free+0x11/0x20 [ 2410.875907][ T5910] ? slab_free_freelist_hook+0xc0/0x190 [ 2410.881286][ T5910] ? kmem_cache_free+0xa9/0x1e0 [ 2410.886095][ T5910] ? putname+0xe7/0x140 [ 2410.890146][ T5910] ? do_sys_openat2+0x1fc/0x710 [ 2410.894837][ T5910] ? __x64_sys_openat+0x243/0x290 [ 2410.899699][ T5910] ? do_syscall_64+0x34/0x70 [ 2410.904120][ T5910] ? _kstrtoull+0x3a0/0x4a0 [ 2410.908461][ T5910] ? prepare_signal+0x85b/0xa60 [ 2410.913158][ T5910] ? send_sigqueue+0x610/0x610 [ 2410.917747][ T5910] ? __send_signal+0x8b5/0xb90 [ 2410.922362][ T5910] ? send_signal+0x4c1/0x5e0 [ 2410.926851][ T5910] ? proc_fail_nth_read+0x210/0x210 [ 2410.931902][ T5910] ? security_file_permission+0x86/0xb0 [ 2410.937283][ T5910] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 2410.942919][ T5910] ? do_send_sig_info+0xfb/0x230 [ 2410.947686][ T5910] ? group_send_sig_info+0x1b0/0x320 [ 2410.952809][ T5910] ? __lock_task_sighand+0x100/0x100 [ 2410.957929][ T5910] ? kernel_write+0x3d0/0x3d0 [ 2410.962438][ T5910] ? bpf_send_signal_common+0x2d8/0x420 [ 2410.967829][ T5910] ? bpf_do_trace_printk+0x270/0x270 [ 2410.972954][ T5910] ? __kasan_check_write+0x14/0x20 [ 2410.977903][ T5910] ? bpf_send_signal+0x19/0x20 [ 2410.982496][ T5910] ? debug_smp_processor_id+0x17/0x20 [ 2410.987707][ T5910] __x64_sys_bpf+0x7b/0x90 [ 2410.991955][ T5910] do_syscall_64+0x34/0x70 [ 2410.996190][ T5910] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2411.002002][ T5910] RIP: 0033:0x7f709ca72de9 [ 2411.006255][ T5910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2411.026058][ T5910] RSP: 002b:00007f709b0dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2411.034301][ T5910] RAX: ffffffffffffffda RBX: 00007f709cc8bfa0 RCX: 00007f709ca72de9 [ 2411.042446][ T5910] RDX: 0000000000000050 RSI: 00004000000002c0 RDI: 000000000000000a [ 2411.050258][ T5910] RBP: 00007f709b0dd090 R08: 0000000000000000 R09: 0000000000000000 [ 2411.058072][ T5910] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2411.065888][ T5910] R13: 0000000000000000 R14: 00007f709cc8bfa0 R15: 00007ffca7836ae8 [ 2411.334962][ T5929] syz.0.11045[5929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2411.335017][ T5929] syz.0.11045[5929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2413.073261][ T5949] FAULT_INJECTION: forcing a failure. [ 2413.073261][ T5949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2413.097655][ T5949] CPU: 1 PID: 5949 Comm: syz.1.11051 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2413.108846][ T5949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2413.118720][ T5949] Call Trace: [ 2413.121866][ T5949] dump_stack_lvl+0x1e2/0x24b [ 2413.126366][ T5949] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2413.131662][ T5949] dump_stack+0x15/0x17 [ 2413.135655][ T5949] should_fail+0x3c6/0x510 [ 2413.139905][ T5949] should_fail_usercopy+0x1a/0x20 [ 2413.144765][ T5949] _copy_to_user+0x20/0x90 [ 2413.149020][ T5949] simple_read_from_buffer+0xc7/0x150 [ 2413.154313][ T5949] proc_fail_nth_read+0x1a3/0x210 [ 2413.159172][ T5949] ? proc_fault_inject_write+0x390/0x390 [ 2413.164637][ T5949] ? security_file_permission+0x86/0xb0 [ 2413.170022][ T5949] ? rw_verify_area+0x1c3/0x360 [ 2413.174704][ T5949] ? proc_fault_inject_write+0x390/0x390 [ 2413.180172][ T5949] vfs_read+0x200/0xba0 [ 2413.184165][ T5949] ? kernel_read+0x70/0x70 [ 2413.188420][ T5949] ? __kasan_check_write+0x14/0x20 [ 2413.193525][ T5949] ? mutex_lock+0xa5/0x110 [ 2413.197773][ T5949] ? mutex_trylock+0xa0/0xa0 [ 2413.202200][ T5949] ? __fdget_pos+0x2e7/0x3a0 [ 2413.206618][ T5949] ? ksys_read+0x77/0x2c0 [ 2413.210787][ T5949] ksys_read+0x199/0x2c0 [ 2413.214865][ T5949] ? vfs_write+0xe70/0xe70 [ 2413.219136][ T5949] ? debug_smp_processor_id+0x17/0x20 [ 2413.224327][ T5949] __x64_sys_read+0x7b/0x90 [ 2413.228671][ T5949] do_syscall_64+0x34/0x70 [ 2413.232917][ T5949] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2413.238731][ T5949] RIP: 0033:0x7fc4052177fc [ 2413.242997][ T5949] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2413.262431][ T5949] RSP: 002b:00007fc403883030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2413.271024][ T5949] RAX: ffffffffffffffda RBX: 00007fc405431fa0 RCX: 00007fc4052177fc [ 2413.278829][ T5949] RDX: 000000000000000f RSI: 00007fc4038830a0 RDI: 0000000000000004 [ 2413.286722][ T5949] RBP: 00007fc403883090 R08: 0000000000000000 R09: 0000000000000000 [ 2413.294628][ T5949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2413.302442][ T5949] R13: 0000000000000000 R14: 00007fc405431fa0 R15: 00007ffe8b303c98 [ 2413.787569][ T5962] device veth0_vlan left promiscuous mode [ 2413.863997][ T5962] device veth0_vlan entered promiscuous mode [ 2415.452697][ T6052] FAULT_INJECTION: forcing a failure. [ 2415.452697][ T6052] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.497039][ T6052] CPU: 1 PID: 6052 Comm: syz.1.11090 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2415.508471][ T6052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2415.518634][ T6052] Call Trace: [ 2415.521752][ T6052] dump_stack_lvl+0x1e2/0x24b [ 2415.526253][ T6052] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2415.531553][ T6052] ? wake_up_klogd+0xb8/0xf0 [ 2415.535979][ T6052] ? dump_stack+0x9/0x17 [ 2415.540064][ T6052] dump_stack+0x15/0x17 [ 2415.544052][ T6052] should_fail+0x3c6/0x510 [ 2415.548403][ T6052] ? __alloc_file+0x29/0x330 [ 2415.552814][ T6052] __should_failslab+0xa4/0xe0 [ 2415.557419][ T6052] should_failslab+0x9/0x20 [ 2415.561764][ T6052] kmem_cache_alloc+0x3d/0x2e0 [ 2415.566355][ T6052] __alloc_file+0x29/0x330 [ 2415.570617][ T6052] ? alloc_empty_file+0x42/0x180 [ 2415.575380][ T6052] alloc_empty_file+0x95/0x180 [ 2415.579978][ T6052] alloc_file+0x5a/0x4e0 [ 2415.584071][ T6052] alloc_file_pseudo+0x259/0x2f0 [ 2415.589009][ T6052] ? alloc_empty_file_noaccount+0x80/0x80 [ 2415.594564][ T6052] anon_inode_getfile+0xa7/0x180 [ 2415.599465][ T6052] __se_sys_perf_event_open+0xfe4/0x3c30 [ 2415.605474][ T6052] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 2415.610913][ T6052] ? hrtimer_interrupt+0x6a8/0x8b0 [ 2415.615875][ T6052] ? debug_smp_processor_id+0x17/0x20 [ 2415.621068][ T6052] __x64_sys_perf_event_open+0xbf/0xd0 [ 2415.626359][ T6052] do_syscall_64+0x34/0x70 [ 2415.630618][ T6052] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2415.636340][ T6052] RIP: 0033:0x7fc405218de9 [ 2415.640602][ T6052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2415.660119][ T6052] RSP: 002b:00007fc403883038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 2415.668366][ T6052] RAX: ffffffffffffffda RBX: 00007fc405431fa0 RCX: 00007fc405218de9 [ 2415.676181][ T6052] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00004000000000c0 [ 2415.683995][ T6052] RBP: 00007fc403883090 R08: 0000000000000000 R09: 0000000000000000 [ 2415.691835][ T6052] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 2415.699632][ T6052] R13: 0000000000000000 R14: 00007fc405431fa0 R15: 00007ffe8b303c98 [ 2416.169157][ T6079] device wg2 entered promiscuous mode [ 2416.328942][ T24] audit: type=1400 audit(1739292110.210:159): avc: denied { append } for pid=6084 comm="syz.0.11104" name="ppp" dev="devtmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 2416.859968][ T6085] device veth0_vlan left promiscuous mode [ 2416.967441][ T6085] device veth0_vlan entered promiscuous mode [ 2417.600145][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2417.628884][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2417.819975][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2418.314989][ T6127] device veth0_vlan left promiscuous mode [ 2418.406096][ T6127] device veth0_vlan entered promiscuous mode [ 2419.053571][ T6146] device veth0_vlan left promiscuous mode [ 2419.170199][ T6146] device veth0_vlan entered promiscuous mode [ 2419.311396][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2419.328760][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2419.338640][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2419.383322][ T6154] device syzkaller0 entered promiscuous mode [ 2421.811420][ T6209] device pim6reg1 entered promiscuous mode [ 2422.225064][ T24] audit: type=1400 audit(1739292116.100:160): avc: denied { create } for pid=6220 comm="syz.2.11150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 2423.329829][ T6238] device veth0_vlan left promiscuous mode [ 2423.336068][ T6238] device veth0_vlan entered promiscuous mode [ 2425.013323][ T6273] device veth0_vlan left promiscuous mode [ 2425.257553][ T6273] device veth0_vlan entered promiscuous mode [ 2425.365882][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2425.398340][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2425.407028][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2426.009175][ T6297] syz.0.11173[6297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2426.009233][ T6297] syz.0.11173[6297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2426.408917][ T6297] syz.0.11173[6297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2426.434592][ T6297] syz.0.11173[6297] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2427.755256][ T6321] device veth0_vlan left promiscuous mode [ 2427.857249][ T6321] device veth0_vlan entered promiscuous mode [ 2429.052002][ T6347] device veth0_vlan left promiscuous mode [ 2429.239502][ T6347] device veth0_vlan entered promiscuous mode [ 2429.853090][ T6355] device veth0_vlan left promiscuous mode [ 2430.036843][ T6355] device veth0_vlan entered promiscuous mode [ 2430.374781][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2430.399107][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2430.478718][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2431.053217][ T6403] FAULT_INJECTION: forcing a failure. [ 2431.053217][ T6403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2431.218243][ T6403] CPU: 0 PID: 6403 Comm: syz.2.11208 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2431.229439][ T6403] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2431.239328][ T6403] Call Trace: [ 2431.242461][ T6403] dump_stack_lvl+0x1e2/0x24b [ 2431.246969][ T6403] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2431.252262][ T6403] dump_stack+0x15/0x17 [ 2431.256251][ T6403] should_fail+0x3c6/0x510 [ 2431.260512][ T6403] should_fail_usercopy+0x1a/0x20 [ 2431.265477][ T6403] _copy_to_user+0x20/0x90 [ 2431.269734][ T6403] simple_read_from_buffer+0xc7/0x150 [ 2431.275016][ T6403] proc_fail_nth_read+0x1a3/0x210 [ 2431.279965][ T6403] ? proc_fault_inject_write+0x390/0x390 [ 2431.285427][ T6403] ? security_file_permission+0x86/0xb0 [ 2431.290794][ T6403] ? rw_verify_area+0x1c3/0x360 [ 2431.295477][ T6403] ? slab_free_freelist_hook+0xc0/0x190 [ 2431.300947][ T6403] ? proc_fault_inject_write+0x390/0x390 [ 2431.306414][ T6403] vfs_read+0x200/0xba0 [ 2431.310408][ T6403] ? kernel_read+0x70/0x70 [ 2431.314658][ T6403] ? __kasan_check_write+0x14/0x20 [ 2431.319605][ T6403] ? mutex_lock+0xa5/0x110 [ 2431.323857][ T6403] ? mutex_trylock+0xa0/0xa0 [ 2431.328288][ T6403] ? __fdget_pos+0x2e7/0x3a0 [ 2431.332795][ T6403] ? ksys_read+0x77/0x2c0 [ 2431.336962][ T6403] ksys_read+0x199/0x2c0 [ 2431.341045][ T6403] ? vfs_write+0xe70/0xe70 [ 2431.345299][ T6403] ? debug_smp_processor_id+0x17/0x20 [ 2431.350507][ T6403] __x64_sys_read+0x7b/0x90 [ 2431.354841][ T6403] do_syscall_64+0x34/0x70 [ 2431.359104][ T6403] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2431.364821][ T6403] RIP: 0033:0x7fbd1d8ed7fc [ 2431.369079][ T6403] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 2431.388520][ T6403] RSP: 002b:00007fbd1bf59030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2431.396764][ T6403] RAX: ffffffffffffffda RBX: 00007fbd1db07fa0 RCX: 00007fbd1d8ed7fc [ 2431.404572][ T6403] RDX: 000000000000000f RSI: 00007fbd1bf590a0 RDI: 0000000000000003 [ 2431.412396][ T6403] RBP: 00007fbd1bf59090 R08: 0000000000000000 R09: 0000000000000000 [ 2431.420202][ T6403] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2431.428098][ T6403] R13: 0000000000000001 R14: 00007fbd1db07fa0 R15: 00007ffc5e098048 [ 2432.780665][ T6458] device veth0_vlan left promiscuous mode [ 2432.875832][ T6458] device veth0_vlan entered promiscuous mode [ 2433.019025][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2433.044834][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2433.147481][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2433.448922][ T6475] device veth0_vlan left promiscuous mode [ 2433.666044][ T6475] device veth0_vlan entered promiscuous mode [ 2435.882142][ T6504] device veth0_vlan left promiscuous mode [ 2435.985104][ T6504] device veth0_vlan entered promiscuous mode [ 2436.047006][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2436.055295][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2436.063027][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2436.564395][ T6515] device veth0_vlan left promiscuous mode [ 2436.633597][ T6515] device veth0_vlan entered promiscuous mode [ 2438.198771][ T6542] GPL: port 1(erspan0) entered blocking state [ 2438.204671][ T6542] GPL: port 1(erspan0) entered disabled state [ 2438.338826][ T6542] device erspan0 entered promiscuous mode [ 2440.018293][ T6570] device veth0_vlan left promiscuous mode [ 2440.046084][ T6570] device veth0_vlan entered promiscuous mode [ 2440.300995][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2440.315148][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2440.332176][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2446.586665][ T6624] device veth0_vlan left promiscuous mode [ 2446.646208][ T6624] device veth0_vlan entered promiscuous mode [ 2447.278814][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2447.327643][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2447.335124][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2448.130264][ T6633] GPL: port 1(erspan0) entered blocking state [ 2448.278622][ T6633] GPL: port 1(erspan0) entered disabled state [ 2448.407328][ T6633] device erspan0 entered promiscuous mode [ 2450.381536][ T6660] device veth0_vlan left promiscuous mode [ 2450.394031][ T6660] device veth0_vlan entered promiscuous mode [ 2450.411495][ T6663] device veth0_vlan left promiscuous mode [ 2450.492609][ T6663] device veth0_vlan entered promiscuous mode [ 2452.838352][ T6717] FAULT_INJECTION: forcing a failure. [ 2452.838352][ T6717] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2452.855819][ T6717] CPU: 1 PID: 6717 Comm: syz.2.11307 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2452.866993][ T6717] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2452.876882][ T6717] Call Trace: [ 2452.880034][ T6717] dump_stack_lvl+0x1e2/0x24b [ 2452.884522][ T6717] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2452.889818][ T6717] ? ktime_get+0x10e/0x140 [ 2452.894266][ T6717] dump_stack+0x15/0x17 [ 2452.898236][ T6717] should_fail+0x3c6/0x510 [ 2452.902496][ T6717] should_fail_usercopy+0x1a/0x20 [ 2452.907361][ T6717] _copy_to_user+0x20/0x90 [ 2452.911607][ T6717] bpf_test_finish+0x265/0x5a0 [ 2452.916205][ T6717] ? convert___skb_to_skb+0x570/0x570 [ 2452.921405][ T6717] ? convert_skb_to___skb+0x360/0x360 [ 2452.926610][ T6717] ? convert_skb_to___skb+0x208/0x360 [ 2452.931821][ T6717] bpf_prog_test_run_skb+0xd7a/0x1410 [ 2452.937048][ T6717] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 2452.942782][ T6717] ? __kasan_check_write+0x14/0x20 [ 2452.947705][ T6717] ? fput_many+0x160/0x1b0 [ 2452.951959][ T6717] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 2452.957682][ T6717] __se_sys_bpf+0x5235/0x11cb0 [ 2452.962291][ T6717] ? stack_trace_save+0x113/0x1c0 [ 2452.967140][ T6717] ? terminate_walk+0x407/0x4f0 [ 2452.971864][ T6717] ? stack_trace_snprint+0xf0/0xf0 [ 2452.976934][ T6717] ? kmem_cache_free+0xa9/0x1e0 [ 2452.981593][ T6717] ? kmem_cache_free+0xa9/0x1e0 [ 2452.986279][ T6717] ? kasan_set_track+0x5d/0x70 [ 2452.990879][ T6717] ? __x64_sys_bpf+0x90/0x90 [ 2452.995301][ T6717] ? __kasan_slab_free+0x11/0x20 [ 2453.000250][ T6717] ? slab_free_freelist_hook+0xc0/0x190 [ 2453.005653][ T6717] ? kmem_cache_free+0xa9/0x1e0 [ 2453.010316][ T6717] ? putname+0xe7/0x140 [ 2453.014307][ T6717] ? do_sys_openat2+0x1fc/0x710 [ 2453.018996][ T6717] ? __x64_sys_openat+0x243/0x290 [ 2453.023855][ T6717] ? do_syscall_64+0x34/0x70 [ 2453.028284][ T6717] ? _kstrtoull+0x3a0/0x4a0 [ 2453.032640][ T6717] ? kstrtouint_from_user+0x20a/0x2a0 [ 2453.037831][ T6717] ? kstrtol_from_user+0x310/0x310 [ 2453.042777][ T6717] ? memset+0x35/0x40 [ 2453.046596][ T6717] ? __fsnotify_parent+0x4b9/0x6c0 [ 2453.051544][ T6717] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 2453.057965][ T6717] ? proc_fail_nth_write+0x20b/0x290 [ 2453.063180][ T6717] ? proc_fail_nth_read+0x210/0x210 [ 2453.068304][ T6717] ? security_file_permission+0x86/0xb0 [ 2453.073695][ T6717] ? rw_verify_area+0x1c3/0x360 [ 2453.078374][ T6717] ? preempt_count_add+0x92/0x1a0 [ 2453.083228][ T6717] ? vfs_write+0x852/0xe70 [ 2453.087484][ T6717] ? kmem_cache_free+0xa9/0x1e0 [ 2453.092172][ T6717] ? kernel_write+0x3d0/0x3d0 [ 2453.096684][ T6717] ? __kasan_check_write+0x14/0x20 [ 2453.101630][ T6717] ? mutex_lock+0xa5/0x110 [ 2453.105903][ T6717] ? mutex_trylock+0xa0/0xa0 [ 2453.110321][ T6717] ? __kasan_check_write+0x14/0x20 [ 2453.115269][ T6717] ? fput_many+0x160/0x1b0 [ 2453.119518][ T6717] ? debug_smp_processor_id+0x17/0x20 [ 2453.124725][ T6717] __x64_sys_bpf+0x7b/0x90 [ 2453.128973][ T6717] do_syscall_64+0x34/0x70 [ 2453.133227][ T6717] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2453.138952][ T6717] RIP: 0033:0x7fbd1d8eede9 [ 2453.143204][ T6717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2453.162644][ T6717] RSP: 002b:00007fbd1bf59038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2453.170893][ T6717] RAX: ffffffffffffffda RBX: 00007fbd1db07fa0 RCX: 00007fbd1d8eede9 [ 2453.178785][ T6717] RDX: 0000000000000050 RSI: 00004000000002c0 RDI: 000000000000000a [ 2453.186684][ T6717] RBP: 00007fbd1bf59090 R08: 0000000000000000 R09: 0000000000000000 [ 2453.194491][ T6717] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2453.202925][ T6717] R13: 0000000000000000 R14: 00007fbd1db07fa0 R15: 00007ffc5e098048 [ 2456.608075][ T6758] device pim6reg1 entered promiscuous mode [ 2457.335822][ T6784] device veth0_vlan left promiscuous mode [ 2457.358743][ T6784] device veth0_vlan entered promiscuous mode [ 2457.371831][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2457.389588][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2457.410222][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2458.632913][ T6800] device veth0_vlan left promiscuous mode [ 2458.650344][ T6800] device veth0_vlan entered promiscuous mode [ 2458.729006][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2458.739957][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2458.747500][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2459.684086][ T6812] device veth0_vlan left promiscuous mode [ 2459.796839][ T6812] device veth0_vlan entered promiscuous mode [ 2459.900861][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2459.909124][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2459.931305][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2463.209641][ T6848] device veth0_vlan left promiscuous mode [ 2463.281043][ T6851] syz.2.11345[6851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2463.281103][ T6851] syz.2.11345[6851] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2463.394331][ T6848] device veth0_vlan entered promiscuous mode [ 2463.820446][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2463.936252][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2463.948739][ T351] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2463.993641][ T6861] device veth0_vlan left promiscuous mode [ 2464.153719][ T6861] device veth0_vlan entered promiscuous mode [ 2464.509868][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2464.585188][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2464.761981][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2464.772071][ T6866] device veth0_vlan left promiscuous mode [ 2464.777933][ T6866] device veth0_vlan entered promiscuous mode [ 2464.884054][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2464.996297][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2465.088879][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2465.735387][ T6888] FAULT_INJECTION: forcing a failure. [ 2465.735387][ T6888] name failslab, interval 1, probability 0, space 0, times 0 [ 2465.978433][ T6888] CPU: 1 PID: 6888 Comm: syz.0.11357 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2465.989632][ T6888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2465.999521][ T6888] Call Trace: [ 2466.002656][ T6888] dump_stack_lvl+0x1e2/0x24b [ 2466.007161][ T6888] ? panic+0x812/0x812 [ 2466.011061][ T6888] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2466.016359][ T6888] ? __kasan_kmalloc+0x9/0x10 [ 2466.020871][ T6888] dump_stack+0x15/0x17 [ 2466.024876][ T6888] should_fail+0x3c6/0x510 [ 2466.029116][ T6888] ? bpf_prog_alloc_no_stats+0x85/0x2a0 [ 2466.034497][ T6888] __should_failslab+0xa4/0xe0 [ 2466.039098][ T6888] should_failslab+0x9/0x20 [ 2466.043485][ T6888] kmem_cache_alloc_trace+0x3a/0x2e0 [ 2466.048564][ T6888] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 2466.053939][ T6888] ? __vmalloc+0x7a/0x90 [ 2466.058105][ T6888] bpf_prog_alloc_no_stats+0x85/0x2a0 [ 2466.063309][ T6888] bpf_prog_alloc+0x21/0x1e0 [ 2466.067764][ T6888] __se_sys_bpf+0x9856/0x11cb0 [ 2466.072441][ T6888] ? perf_prepare_sample+0x1af0/0x1af0 [ 2466.077723][ T6888] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2466.083713][ T6888] ? __x64_sys_bpf+0x90/0x90 [ 2466.088150][ T6888] ? __this_cpu_preempt_check+0x13/0x20 [ 2466.093517][ T6888] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 2466.099594][ T6888] ? hrtimer_forward+0x1a6/0x2c0 [ 2466.104374][ T6888] ? cpu_clock_event_read+0x50/0x50 [ 2466.109406][ T6888] ? timerqueue_add+0x24c/0x270 [ 2466.114087][ T6888] ? enqueue_hrtimer+0xad/0x200 [ 2466.118773][ T6888] ? __hrtimer_run_queues+0x438/0xa50 [ 2466.123986][ T6888] ? __hrtimer_run_queues+0x9ea/0xa50 [ 2466.129191][ T6888] ? ktime_get+0x10e/0x140 [ 2466.133449][ T6888] ? lapic_next_event+0x5f/0x70 [ 2466.138131][ T6888] ? clockevents_program_event+0x214/0x2c0 [ 2466.143778][ T6888] ? hrtimer_interrupt+0x6a8/0x8b0 [ 2466.148725][ T6888] ? debug_smp_processor_id+0x17/0x20 [ 2466.154018][ T6888] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 2466.159917][ T6888] __x64_sys_bpf+0x7b/0x90 [ 2466.164175][ T6888] do_syscall_64+0x34/0x70 [ 2466.168588][ T6888] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2466.174312][ T6888] RIP: 0033:0x7f7849d1fde9 [ 2466.178594][ T6888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2466.198278][ T6888] RSP: 002b:00007f784838a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2466.206611][ T6888] RAX: ffffffffffffffda RBX: 00007f7849f38fa0 RCX: 00007f7849d1fde9 [ 2466.214408][ T6888] RDX: 0000000000000090 RSI: 0000400000000840 RDI: 0000000000000005 [ 2466.222234][ T6888] RBP: 00007f784838a090 R08: 0000000000000000 R09: 0000000000000000 [ 2466.230042][ T6888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2466.237841][ T6888] R13: 0000000000000000 R14: 00007f7849f38fa0 R15: 00007ffcdc4e99e8 [ 2467.002036][ T6910] device veth0_vlan left promiscuous mode [ 2467.172656][ T6910] device veth0_vlan entered promiscuous mode [ 2467.480303][ T6915] device veth0_vlan left promiscuous mode [ 2467.569521][ T6915] device veth0_vlan entered promiscuous mode [ 2467.822151][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2467.859660][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2468.069352][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2469.728831][ T6927] device veth0_vlan left promiscuous mode [ 2469.936196][ T6927] device veth0_vlan entered promiscuous mode [ 2470.033085][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2470.068779][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2470.149314][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2470.514068][ T24] audit: type=1400 audit(1739292164.350:161): avc: denied { create } for pid=6938 comm="syz.3.11371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 2470.879759][ T24] audit: type=1400 audit(1739292164.760:162): avc: denied { rename } for pid=77 comm="syslogd" name="messages" dev="tmpfs" ino=11 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2470.914109][ T24] audit: type=1400 audit(1739292164.760:163): avc: denied { unlink } for pid=77 comm="syslogd" name="messages.0" dev="tmpfs" ino=10 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2470.959218][ T24] audit: type=1400 audit(1739292164.760:164): avc: denied { create } for pid=77 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2471.021972][ T24] audit: type=1400 audit(1739292164.760:165): avc: denied { append open } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2471.138989][ T24] audit: type=1400 audit(1739292164.760:166): avc: denied { getattr } for pid=77 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=12 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2471.402146][ T6957] device veth0_vlan left promiscuous mode [ 2471.409362][ T6957] device veth0_vlan entered promiscuous mode [ 2471.420478][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2471.447201][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2471.489069][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2471.541921][ T6962] device veth0_vlan left promiscuous mode [ 2471.664633][ T6962] device veth0_vlan entered promiscuous mode [ 2472.468766][ T6992] FAULT_INJECTION: forcing a failure. [ 2472.468766][ T6992] name failslab, interval 1, probability 0, space 0, times 0 [ 2472.488113][ T6992] CPU: 0 PID: 6992 Comm: syz.3.11384 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2472.499290][ T6992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2472.509355][ T6992] Call Trace: [ 2472.512491][ T6992] dump_stack_lvl+0x1e2/0x24b [ 2472.517035][ T6992] ? panic+0x812/0x812 [ 2472.520909][ T6992] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2472.526212][ T6992] ? memset+0x35/0x40 [ 2472.530012][ T6992] dump_stack+0x15/0x17 [ 2472.534010][ T6992] should_fail+0x3c6/0x510 [ 2472.538350][ T6992] ? sock_alloc_inode+0x1b/0xb0 [ 2472.543118][ T6992] __should_failslab+0xa4/0xe0 [ 2472.547722][ T6992] should_failslab+0x9/0x20 [ 2472.552145][ T6992] kmem_cache_alloc+0x3d/0x2e0 [ 2472.556771][ T6992] ? sockfs_init_fs_context+0xb0/0xb0 [ 2472.561968][ T6992] sock_alloc_inode+0x1b/0xb0 [ 2472.566469][ T6992] ? sockfs_init_fs_context+0xb0/0xb0 [ 2472.571675][ T6992] new_inode_pseudo+0x64/0x220 [ 2472.576276][ T6992] __sock_create+0x135/0x760 [ 2472.580700][ T6992] __sys_socketpair+0x313/0x6e0 [ 2472.585388][ T6992] ? __ia32_sys_socket+0x90/0x90 [ 2472.590162][ T6992] ? __ia32_sys_read+0x90/0x90 [ 2472.594766][ T6992] __x64_sys_socketpair+0x9b/0xb0 [ 2472.599637][ T6992] do_syscall_64+0x34/0x70 [ 2472.603873][ T6992] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2472.609774][ T6992] RIP: 0033:0x7f709ca72de9 [ 2472.614031][ T6992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2472.633486][ T6992] RSP: 002b:00007f709b0dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 2472.641886][ T6992] RAX: ffffffffffffffda RBX: 00007f709cc8bfa0 RCX: 00007f709ca72de9 [ 2472.649697][ T6992] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 2472.657509][ T6992] RBP: 00007f709b0dd090 R08: 0000000000000000 R09: 0000000000000000 [ 2472.665319][ T6992] R10: 0000400000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2472.673314][ T6992] R13: 0000000000000000 R14: 00007f709cc8bfa0 R15: 00007ffca7836ae8 [ 2472.682996][ T6992] socket: no more sockets [ 2472.956699][ T7005] bridge0: port 1(bridge_slave_0) entered disabled state [ 2473.412340][ T7016] device veth0_vlan left promiscuous mode [ 2473.436158][ T7016] device veth0_vlan entered promiscuous mode [ 2473.705741][ T7020] device veth0_vlan left promiscuous mode [ 2473.715120][ T7020] device veth0_vlan entered promiscuous mode [ 2474.016429][ T7032] device sit0 left promiscuous mode [ 2474.081964][ T24] audit: type=1400 audit(1739292167.960:167): avc: denied { create } for pid=7033 comm="syz.2.11399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 2474.157865][ T7032] device sit0 entered promiscuous mode [ 2474.443900][ T7047] device veth0_vlan left promiscuous mode [ 2474.501450][ T7047] device veth0_vlan entered promiscuous mode [ 2474.674455][ T7059] FAULT_INJECTION: forcing a failure. [ 2474.674455][ T7059] name failslab, interval 1, probability 0, space 0, times 0 [ 2474.818314][ T7059] CPU: 0 PID: 7059 Comm: syz.0.11407 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2474.829509][ T7059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2474.839401][ T7059] Call Trace: [ 2474.842636][ T7059] dump_stack_lvl+0x1e2/0x24b [ 2474.847228][ T7059] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2474.852512][ T7059] dump_stack+0x15/0x17 [ 2474.856692][ T7059] should_fail+0x3c6/0x510 [ 2474.860951][ T7059] ? kvmalloc_node+0x82/0x130 [ 2474.865442][ T7059] __should_failslab+0xa4/0xe0 [ 2474.870037][ T7059] should_failslab+0x9/0x20 [ 2474.874375][ T7059] __kmalloc+0x60/0x330 [ 2474.878368][ T7059] ? btf_check_all_metas+0x745/0x820 [ 2474.883495][ T7059] kvmalloc_node+0x82/0x130 [ 2474.887832][ T7059] btf_parse_type_sec+0x1dc/0x16b0 [ 2474.892982][ T7059] ? __btf_verifier_log+0x120/0x120 [ 2474.898070][ T7059] ? sort+0x37/0x50 [ 2474.901805][ T7059] ? btf_verifier_log+0x2a0/0x2a0 [ 2474.906748][ T7059] ? btf_parse_hdr+0x1d5/0x770 [ 2474.911436][ T7059] ? btf_verifier_log_vsi+0x4d0/0x4d0 [ 2474.916642][ T7059] ? btf_parse_hdr+0x597/0x770 [ 2474.921253][ T7059] ? btf_parse_str_sec+0x1b0/0x270 [ 2474.926196][ T7059] btf_new_fd+0x53b/0x9c0 [ 2474.930365][ T7059] __se_sys_bpf+0x1aed/0x11cb0 [ 2474.934990][ T7059] ? stack_trace_save+0x113/0x1c0 [ 2474.939826][ T7059] ? terminate_walk+0x407/0x4f0 [ 2474.944508][ T7059] ? stack_trace_snprint+0xf0/0xf0 [ 2474.949466][ T7059] ? kmem_cache_free+0xa9/0x1e0 [ 2474.954244][ T7059] ? kmem_cache_free+0xa9/0x1e0 [ 2474.958918][ T7059] ? kasan_set_track+0x5d/0x70 [ 2474.963514][ T7059] ? __x64_sys_bpf+0x90/0x90 [ 2474.967938][ T7059] ? __kasan_slab_free+0x11/0x20 [ 2474.972712][ T7059] ? slab_free_freelist_hook+0xc0/0x190 [ 2474.978109][ T7059] ? kmem_cache_free+0xa9/0x1e0 [ 2474.982876][ T7059] ? putname+0xe7/0x140 [ 2474.986896][ T7059] ? do_sys_openat2+0x1fc/0x710 [ 2474.991564][ T7059] ? __x64_sys_openat+0x243/0x290 [ 2474.996425][ T7059] ? do_syscall_64+0x34/0x70 [ 2475.000842][ T7059] ? _kstrtoull+0x3a0/0x4a0 [ 2475.005177][ T7059] ? kstrtouint_from_user+0x20a/0x2a0 [ 2475.010377][ T7059] ? kstrtol_from_user+0x310/0x310 [ 2475.015324][ T7059] ? memset+0x35/0x40 [ 2475.019194][ T7059] ? __fsnotify_parent+0x4b9/0x6c0 [ 2475.024099][ T7059] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 2475.030524][ T7059] ? proc_fail_nth_write+0x20b/0x290 [ 2475.035636][ T7059] ? proc_fail_nth_read+0x210/0x210 [ 2475.040751][ T7059] ? security_file_permission+0x86/0xb0 [ 2475.046145][ T7059] ? rw_verify_area+0x1c3/0x360 [ 2475.050825][ T7059] ? preempt_count_add+0x92/0x1a0 [ 2475.055684][ T7059] ? vfs_write+0x852/0xe70 [ 2475.059936][ T7059] ? kmem_cache_free+0xa9/0x1e0 [ 2475.064619][ T7059] ? kernel_write+0x3d0/0x3d0 [ 2475.069396][ T7059] ? __kasan_check_write+0x14/0x20 [ 2475.074431][ T7059] ? mutex_lock+0xa5/0x110 [ 2475.078680][ T7059] ? mutex_trylock+0xa0/0xa0 [ 2475.083120][ T7059] ? __kasan_check_write+0x14/0x20 [ 2475.088145][ T7059] ? fput_many+0x160/0x1b0 [ 2475.092601][ T7059] ? debug_smp_processor_id+0x17/0x20 [ 2475.097791][ T7059] __x64_sys_bpf+0x7b/0x90 [ 2475.102035][ T7059] do_syscall_64+0x34/0x70 [ 2475.106286][ T7059] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2475.112009][ T7059] RIP: 0033:0x7f7849d1fde9 [ 2475.116264][ T7059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2475.135901][ T7059] RSP: 002b:00007f784838a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2475.144233][ T7059] RAX: ffffffffffffffda RBX: 00007f7849f38fa0 RCX: 00007f7849d1fde9 [ 2475.152294][ T7059] RDX: 0000000000000020 RSI: 00004000000003c0 RDI: 0000000000000012 [ 2475.160166][ T7059] RBP: 00007f784838a090 R08: 0000000000000000 R09: 0000000000000000 [ 2475.168000][ T7059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2475.175898][ T7059] R13: 0000000000000000 R14: 00007f7849f38fa0 R15: 00007ffcdc4e99e8 [ 2475.340289][ T7070] FAULT_INJECTION: forcing a failure. [ 2475.340289][ T7070] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2475.359683][ T7069] device syzkaller0 entered promiscuous mode [ 2475.418753][ T7070] CPU: 0 PID: 7070 Comm: syz.0.11409 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2475.429949][ T7070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2475.439929][ T7070] Call Trace: [ 2475.443077][ T7070] dump_stack_lvl+0x1e2/0x24b [ 2475.447583][ T7070] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2475.452874][ T7070] ? ktime_get+0x10e/0x140 [ 2475.457119][ T7070] dump_stack+0x15/0x17 [ 2475.461119][ T7070] should_fail+0x3c6/0x510 [ 2475.465490][ T7070] should_fail_usercopy+0x1a/0x20 [ 2475.470334][ T7070] _copy_to_user+0x20/0x90 [ 2475.474585][ T7070] bpf_test_finish+0x297/0x5a0 [ 2475.479203][ T7070] ? convert___skb_to_skb+0x570/0x570 [ 2475.484420][ T7070] ? convert_skb_to___skb+0x360/0x360 [ 2475.489689][ T7070] ? convert_skb_to___skb+0x208/0x360 [ 2475.494896][ T7070] bpf_prog_test_run_skb+0xd7a/0x1410 [ 2475.500105][ T7070] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 2475.505830][ T7070] ? __kasan_check_write+0x14/0x20 [ 2475.510779][ T7070] ? fput_many+0x160/0x1b0 [ 2475.515116][ T7070] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 2475.520945][ T7070] __se_sys_bpf+0x5235/0x11cb0 [ 2475.525554][ T7070] ? stack_trace_save+0x113/0x1c0 [ 2475.530500][ T7070] ? terminate_walk+0x407/0x4f0 [ 2475.535175][ T7070] ? stack_trace_snprint+0xf0/0xf0 [ 2475.540124][ T7070] ? kmem_cache_free+0xa9/0x1e0 [ 2475.544891][ T7070] ? kmem_cache_free+0xa9/0x1e0 [ 2475.549579][ T7070] ? kasan_set_track+0x5d/0x70 [ 2475.554204][ T7070] ? __x64_sys_bpf+0x90/0x90 [ 2475.558609][ T7070] ? __kasan_slab_free+0x11/0x20 [ 2475.563383][ T7070] ? slab_free_freelist_hook+0xc0/0x190 [ 2475.568762][ T7070] ? kmem_cache_free+0xa9/0x1e0 [ 2475.573475][ T7070] ? putname+0xe7/0x140 [ 2475.577447][ T7070] ? do_sys_openat2+0x1fc/0x710 [ 2475.582129][ T7070] ? __x64_sys_openat+0x243/0x290 [ 2475.586987][ T7070] ? do_syscall_64+0x34/0x70 [ 2475.591429][ T7070] ? _kstrtoull+0x3a0/0x4a0 [ 2475.595763][ T7070] ? kstrtouint_from_user+0x20a/0x2a0 [ 2475.600965][ T7070] ? kstrtol_from_user+0x310/0x310 [ 2475.605916][ T7070] ? memset+0x35/0x40 [ 2475.609731][ T7070] ? __fsnotify_parent+0x4b9/0x6c0 [ 2475.614674][ T7070] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 2475.621095][ T7070] ? proc_fail_nth_write+0x20b/0x290 [ 2475.626219][ T7070] ? proc_fail_nth_read+0x210/0x210 [ 2475.631337][ T7070] ? security_file_permission+0x86/0xb0 [ 2475.636724][ T7070] ? rw_verify_area+0x1c3/0x360 [ 2475.641521][ T7070] ? preempt_count_add+0x92/0x1a0 [ 2475.646379][ T7070] ? vfs_write+0x852/0xe70 [ 2475.650632][ T7070] ? kmem_cache_free+0xa9/0x1e0 [ 2475.655316][ T7070] ? kernel_write+0x3d0/0x3d0 [ 2475.659853][ T7070] ? __kasan_check_write+0x14/0x20 [ 2475.664795][ T7070] ? mutex_lock+0xa5/0x110 [ 2475.669038][ T7070] ? mutex_trylock+0xa0/0xa0 [ 2475.673459][ T7070] ? __kasan_check_write+0x14/0x20 [ 2475.678423][ T7070] ? fput_many+0x160/0x1b0 [ 2475.682662][ T7070] ? debug_smp_processor_id+0x17/0x20 [ 2475.687910][ T7070] __x64_sys_bpf+0x7b/0x90 [ 2475.692125][ T7070] do_syscall_64+0x34/0x70 [ 2475.696483][ T7070] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2475.702197][ T7070] RIP: 0033:0x7f7849d1fde9 [ 2475.706448][ T7070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2475.725891][ T7070] RSP: 002b:00007f784838a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2475.734124][ T7070] RAX: ffffffffffffffda RBX: 00007f7849f38fa0 RCX: 00007f7849d1fde9 [ 2475.741933][ T7070] RDX: 0000000000000050 RSI: 00004000000002c0 RDI: 000000000000000a [ 2475.749749][ T7070] RBP: 00007f784838a090 R08: 0000000000000000 R09: 0000000000000000 [ 2475.757779][ T7070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2475.765707][ T7070] R13: 0000000000000000 R14: 00007f7849f38fa0 R15: 00007ffcdc4e99e8 [ 2477.560530][ T7102] device pim6reg1 entered promiscuous mode [ 2479.288983][ T24] audit: type=1400 audit(1739292173.170:168): avc: denied { create } for pid=7145 comm="syz.0.11434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2481.616214][ T7174] device veth0_vlan left promiscuous mode [ 2481.627054][ T7174] device veth0_vlan entered promiscuous mode [ 2481.639397][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2481.651729][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2481.677684][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2481.994583][ T7184] device wg2 left promiscuous mode [ 2485.069253][ T7223] FAULT_INJECTION: forcing a failure. [ 2485.069253][ T7223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2485.218890][ T7223] CPU: 0 PID: 7223 Comm: syz.4.11455 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2485.230088][ T7223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2485.239968][ T7223] Call Trace: [ 2485.243117][ T7223] dump_stack_lvl+0x1e2/0x24b [ 2485.247623][ T7223] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2485.252910][ T7223] dump_stack+0x15/0x17 [ 2485.256900][ T7223] should_fail+0x3c6/0x510 [ 2485.261153][ T7223] should_fail_usercopy+0x1a/0x20 [ 2485.266035][ T7223] _copy_from_user+0x20/0xd0 [ 2485.270448][ T7223] __se_sys_bpf+0xa2f2/0x11cb0 [ 2485.275053][ T7223] ? kmem_cache_free+0xa9/0x1e0 [ 2485.279725][ T7223] ? kmem_cache_free+0xa9/0x1e0 [ 2485.284411][ T7223] ? kasan_set_track+0x5d/0x70 [ 2485.289012][ T7223] ? __x64_sys_bpf+0x90/0x90 [ 2485.293437][ T7223] ? __kasan_slab_free+0x11/0x20 [ 2485.298215][ T7223] ? slab_free_freelist_hook+0xc0/0x190 [ 2485.303593][ T7223] ? kmem_cache_free+0xa9/0x1e0 [ 2485.308278][ T7223] ? putname+0xe7/0x140 [ 2485.312271][ T7223] ? do_sys_openat2+0x1fc/0x710 [ 2485.316957][ T7223] ? __x64_sys_openat+0x243/0x290 [ 2485.321825][ T7223] ? do_syscall_64+0x34/0x70 [ 2485.326250][ T7223] ? _kstrtoull+0x3a0/0x4a0 [ 2485.330592][ T7223] ? memset+0x35/0x40 [ 2485.334412][ T7223] ? __fsnotify_parent+0x4b9/0x6c0 [ 2485.339355][ T7223] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 2485.345772][ T7223] ? proc_fail_nth_write+0x20b/0x290 [ 2485.350896][ T7223] ? proc_fail_nth_read+0x210/0x210 [ 2485.356080][ T7223] ? security_file_permission+0x86/0xb0 [ 2485.361508][ T7223] ? rw_verify_area+0x1c3/0x360 [ 2485.366179][ T7223] ? preempt_count_add+0x92/0x1a0 [ 2485.371042][ T7223] ? vfs_write+0x852/0xe70 [ 2485.375393][ T7223] ? kmem_cache_free+0xa9/0x1e0 [ 2485.380085][ T7223] ? kernel_write+0x3d0/0x3d0 [ 2485.384596][ T7223] ? __kasan_check_write+0x14/0x20 [ 2485.389534][ T7223] ? mutex_lock+0xa5/0x110 [ 2485.393800][ T7223] ? mutex_trylock+0xa0/0xa0 [ 2485.398209][ T7223] ? __kasan_check_write+0x14/0x20 [ 2485.403169][ T7223] ? fput_many+0x160/0x1b0 [ 2485.407414][ T7223] ? debug_smp_processor_id+0x17/0x20 [ 2485.412617][ T7223] __x64_sys_bpf+0x7b/0x90 [ 2485.416949][ T7223] do_syscall_64+0x34/0x70 [ 2485.421203][ T7223] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2485.427021][ T7223] RIP: 0033:0x7f0d888b8de9 [ 2485.431273][ T7223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2485.450805][ T7223] RSP: 002b:00007f0d86f02038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2485.459051][ T7223] RAX: ffffffffffffffda RBX: 00007f0d88ad2080 RCX: 00007f0d888b8de9 [ 2485.466864][ T7223] RDX: 0000000000000070 RSI: 00004000000000c0 RDI: 0000000000000005 [ 2485.475292][ T7223] RBP: 00007f0d86f02090 R08: 0000000000000000 R09: 0000000000000000 [ 2485.483278][ T7223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2485.491176][ T7223] R13: 0000000000000000 R14: 00007f0d88ad2080 R15: 00007ffc934482d8 [ 2486.186855][ T7243] FAULT_INJECTION: forcing a failure. [ 2486.186855][ T7243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2486.538206][ T7243] CPU: 1 PID: 7243 Comm: syz.4.11465 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2486.549520][ T7243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2486.559405][ T7243] Call Trace: [ 2486.562550][ T7243] dump_stack_lvl+0x1e2/0x24b [ 2486.567049][ T7243] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2486.572342][ T7243] dump_stack+0x15/0x17 [ 2486.576348][ T7243] should_fail+0x3c6/0x510 [ 2486.580695][ T7243] should_fail_usercopy+0x1a/0x20 [ 2486.585552][ T7243] _copy_from_user+0x20/0xd0 [ 2486.589957][ T7243] __se_sys_bpf+0xa2f2/0x11cb0 [ 2486.594556][ T7243] ? ktime_get+0x10e/0x140 [ 2486.598803][ T7243] ? lapic_next_event+0x5f/0x70 [ 2486.603494][ T7243] ? clockevents_program_event+0x214/0x2c0 [ 2486.609130][ T7243] ? __x64_sys_bpf+0x90/0x90 [ 2486.613570][ T7243] ? visit_groups_merge+0x2434/0x24b0 [ 2486.618772][ T7243] ? ctx_flexible_sched_in+0xa8/0x100 [ 2486.623969][ T7243] ? ctx_pinned_sched_in+0x100/0x100 [ 2486.629091][ T7243] ? kvm_sched_clock_read+0x18/0x40 [ 2486.634126][ T7243] ? sched_clock+0x3a/0x40 [ 2486.638377][ T7243] ? sched_clock_cpu+0x1b/0x3b0 [ 2486.643077][ T7243] ? _raw_spin_lock+0xa4/0x1b0 [ 2486.647666][ T7243] ? _raw_spin_trylock_bh+0x190/0x190 [ 2486.652892][ T7243] ? ctx_sched_in+0x276/0x310 [ 2486.657400][ T7243] ? _raw_spin_unlock+0x4d/0x70 [ 2486.662082][ T7243] ? perf_event_context_sched_in+0x48f/0x580 [ 2486.667944][ T7243] ? __this_cpu_preempt_check+0x13/0x20 [ 2486.673270][ T7243] ? __perf_event_task_sched_in+0x219/0x2a0 [ 2486.678999][ T7243] ? perf_pmu_sched_task+0x190/0x190 [ 2486.684120][ T7243] ? trace_event_raw_event_sched_switch+0x440/0x440 [ 2486.690545][ T7243] ? __this_cpu_preempt_check+0x13/0x20 [ 2486.695920][ T7243] ? perf_sched_cb_inc+0x260/0x260 [ 2486.700869][ T7243] ? _raw_spin_unlock_irq+0x4e/0x70 [ 2486.705902][ T7243] ? finish_task_switch+0x130/0x5a0 [ 2486.710937][ T7243] ? switch_mm_irqs_off+0x2f9/0x9a0 [ 2486.715970][ T7243] ? __switch_to_asm+0x34/0x60 [ 2486.720593][ T7243] ? __schedule+0xbee/0x1330 [ 2486.725001][ T7243] ? __kasan_check_read+0x11/0x20 [ 2486.729857][ T7243] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 2486.735756][ T7243] __x64_sys_bpf+0x7b/0x90 [ 2486.740011][ T7243] do_syscall_64+0x34/0x70 [ 2486.744393][ T7243] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2486.750081][ T7243] RIP: 0033:0x7f0d888b8de9 [ 2486.754332][ T7243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2486.773769][ T7243] RSP: 002b:00007f0d86ee1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2486.782030][ T7243] RAX: ffffffffffffffda RBX: 00007f0d88ad2160 RCX: 00007f0d888b8de9 [ 2486.789921][ T7243] RDX: 0000000000000080 RSI: 0000400000000040 RDI: 0000000000000005 [ 2486.797724][ T7243] RBP: 00007f0d86ee1090 R08: 0000000000000000 R09: 0000000000000000 [ 2486.805622][ T7243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2486.813614][ T7243] R13: 0000000000000000 R14: 00007f0d88ad2160 R15: 00007ffc934482d8 [ 2487.802327][ T7264] device veth0_vlan left promiscuous mode [ 2487.845306][ T7264] device veth0_vlan entered promiscuous mode [ 2487.990201][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2488.020304][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2488.084825][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2491.383775][ T7361] FAULT_INJECTION: forcing a failure. [ 2491.383775][ T7361] name failslab, interval 1, probability 0, space 0, times 0 [ 2491.533975][ T7361] CPU: 1 PID: 7361 Comm: syz.3.11499 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2491.545254][ T7361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2491.555142][ T7361] Call Trace: [ 2491.558278][ T7361] dump_stack_lvl+0x1e2/0x24b [ 2491.562790][ T7361] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2491.568079][ T7361] dump_stack+0x15/0x17 [ 2491.572086][ T7361] should_fail+0x3c6/0x510 [ 2491.576348][ T7361] ? kvmalloc_node+0x82/0x130 [ 2491.580847][ T7361] __should_failslab+0xa4/0xe0 [ 2491.585447][ T7361] should_failslab+0x9/0x20 [ 2491.589776][ T7361] __kmalloc+0x60/0x330 [ 2491.593768][ T7361] ? btf_check_all_metas+0x745/0x820 [ 2491.598890][ T7361] ? kvmalloc_node+0x82/0x130 [ 2491.603411][ T7361] kvmalloc_node+0x82/0x130 [ 2491.607953][ T7361] btf_parse_type_sec+0x1fa/0x16b0 [ 2491.612855][ T7361] ? __btf_verifier_log+0x120/0x120 [ 2491.617890][ T7361] ? sort+0x37/0x50 [ 2491.621533][ T7361] ? btf_verifier_log+0x2a0/0x2a0 [ 2491.626392][ T7361] ? btf_parse_hdr+0x1d5/0x770 [ 2491.631016][ T7361] ? btf_verifier_log_vsi+0x4d0/0x4d0 [ 2491.636253][ T7361] ? btf_parse_hdr+0x597/0x770 [ 2491.640815][ T7361] ? btf_parse_str_sec+0x1b0/0x270 [ 2491.645751][ T7361] btf_new_fd+0x53b/0x9c0 [ 2491.649914][ T7361] __se_sys_bpf+0x1aed/0x11cb0 [ 2491.654517][ T7361] ? stack_trace_save+0x113/0x1c0 [ 2491.659374][ T7361] ? terminate_walk+0x407/0x4f0 [ 2491.664059][ T7361] ? stack_trace_snprint+0xf0/0xf0 [ 2491.669013][ T7361] ? kmem_cache_free+0xa9/0x1e0 [ 2491.673706][ T7361] ? kmem_cache_free+0xa9/0x1e0 [ 2491.678385][ T7361] ? kasan_set_track+0x5d/0x70 [ 2491.682986][ T7361] ? __x64_sys_bpf+0x90/0x90 [ 2491.687405][ T7361] ? __kasan_slab_free+0x11/0x20 [ 2491.692181][ T7361] ? slab_free_freelist_hook+0xc0/0x190 [ 2491.697560][ T7361] ? kmem_cache_free+0xa9/0x1e0 [ 2491.702270][ T7361] ? putname+0xe7/0x140 [ 2491.706243][ T7361] ? do_sys_openat2+0x1fc/0x710 [ 2491.710926][ T7361] ? __x64_sys_openat+0x243/0x290 [ 2491.715797][ T7361] ? do_syscall_64+0x34/0x70 [ 2491.720237][ T7361] ? _kstrtoull+0x3a0/0x4a0 [ 2491.724558][ T7361] ? kstrtouint_from_user+0x20a/0x2a0 [ 2491.729765][ T7361] ? kstrtol_from_user+0x310/0x310 [ 2491.734710][ T7361] ? memset+0x35/0x40 [ 2491.738530][ T7361] ? __fsnotify_parent+0x4b9/0x6c0 [ 2491.743498][ T7361] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 2491.750169][ T7361] ? proc_fail_nth_write+0x20b/0x290 [ 2491.755278][ T7361] ? proc_fail_nth_read+0x210/0x210 [ 2491.760326][ T7361] ? security_file_permission+0x86/0xb0 [ 2491.765711][ T7361] ? rw_verify_area+0x1c3/0x360 [ 2491.770382][ T7361] ? preempt_count_add+0x92/0x1a0 [ 2491.775239][ T7361] ? vfs_write+0x852/0xe70 [ 2491.779496][ T7361] ? kmem_cache_free+0xa9/0x1e0 [ 2491.784179][ T7361] ? kernel_write+0x3d0/0x3d0 [ 2491.788693][ T7361] ? __kasan_check_write+0x14/0x20 [ 2491.793639][ T7361] ? mutex_lock+0xa5/0x110 [ 2491.797895][ T7361] ? mutex_trylock+0xa0/0xa0 [ 2491.802321][ T7361] ? __kasan_check_write+0x14/0x20 [ 2491.807270][ T7361] ? fput_many+0x160/0x1b0 [ 2491.811534][ T7361] ? debug_smp_processor_id+0x17/0x20 [ 2491.816727][ T7361] __x64_sys_bpf+0x7b/0x90 [ 2491.820981][ T7361] do_syscall_64+0x34/0x70 [ 2491.825231][ T7361] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2491.830962][ T7361] RIP: 0033:0x7f709ca72de9 [ 2491.835214][ T7361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2491.854655][ T7361] RSP: 002b:00007f709b0dd038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2491.862914][ T7361] RAX: ffffffffffffffda RBX: 00007f709cc8bfa0 RCX: 00007f709ca72de9 [ 2491.870710][ T7361] RDX: 0000000000000020 RSI: 00004000000003c0 RDI: 0000000000000012 [ 2491.878519][ T7361] RBP: 00007f709b0dd090 R08: 0000000000000000 R09: 0000000000000000 [ 2491.886332][ T7361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2491.894144][ T7361] R13: 0000000000000000 R14: 00007f709cc8bfa0 R15: 00007ffca7836ae8 [ 2492.604231][ T7373] device veth0_vlan left promiscuous mode [ 2492.677855][ T7373] device veth0_vlan entered promiscuous mode [ 2493.205555][ T7409] device pim6reg1 entered promiscuous mode [ 2495.046520][ T7446] bridge0: port 1(bridge_slave_0) entered disabled state [ 2495.055795][ T7453] syz.4.11527[7453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2495.055849][ T7453] syz.4.11527[7453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2496.977845][ T7498] device veth1_macvtap left promiscuous mode [ 2497.004117][ T7500] device veth1_macvtap entered promiscuous mode [ 2497.010413][ T7500] device macsec0 entered promiscuous mode [ 2497.639101][ T7524] device veth0_vlan left promiscuous mode [ 2497.720582][ T7524] device veth0_vlan entered promiscuous mode [ 2498.121844][ T7531] device veth0_vlan left promiscuous mode [ 2498.251726][ T7531] device veth0_vlan entered promiscuous mode [ 2498.576711][ T7539] device syzkaller0 entered promiscuous mode [ 2498.967127][ T7573] device sit0 left promiscuous mode [ 2499.239868][ T7569] device veth0_vlan left promiscuous mode [ 2499.297880][ T7569] device veth0_vlan entered promiscuous mode [ 2499.573088][ T7576] device veth0_vlan left promiscuous mode [ 2499.709862][ T7576] device veth0_vlan entered promiscuous mode [ 2500.377599][ T7604] device veth0_vlan left promiscuous mode [ 2500.512020][ T7604] device veth0_vlan entered promiscuous mode [ 2500.840449][ T7624] FAULT_INJECTION: forcing a failure. [ 2500.840449][ T7624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2500.853588][ T7624] CPU: 1 PID: 7624 Comm: syz.0.11582 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2500.864757][ T7624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2500.874644][ T7624] Call Trace: [ 2500.877779][ T7624] dump_stack_lvl+0x1e2/0x24b [ 2500.882295][ T7624] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2500.887673][ T7624] dump_stack+0x15/0x17 [ 2500.891668][ T7624] should_fail+0x3c6/0x510 [ 2500.895912][ T7624] should_fail_usercopy+0x1a/0x20 [ 2500.900776][ T7624] strncpy_from_user+0x24/0x2d0 [ 2500.905458][ T7624] ? 0xffffffffa0022178 [ 2500.909460][ T7624] strncpy_from_user_nofault+0x73/0x150 [ 2500.914838][ T7624] bpf_trace_printk+0x7f2/0xd50 [ 2500.919524][ T7624] ? skb_release_data+0x5b4/0x6f0 [ 2500.924382][ T7624] ? bpf_probe_write_user+0xf0/0xf0 [ 2500.929427][ T7624] ? skb_release_data+0x5c6/0x6f0 [ 2500.934276][ T7624] bpf_prog_7c77c7e0f6645ad8+0x35/0x508 [ 2500.939671][ T7624] bpf_trace_run2+0xef/0x280 [ 2500.944090][ T7624] ? is_bpf_text_address+0x172/0x190 [ 2500.949346][ T7624] ? bpf_trace_run1+0x210/0x210 [ 2500.954027][ T7624] ? skb_release_data+0x5c6/0x6f0 [ 2500.958880][ T7624] ? unwind_get_return_address+0x4d/0x90 [ 2500.964344][ T7624] ? skb_release_data+0x5c6/0x6f0 [ 2500.969490][ T7624] ? skb_release_data+0x5c6/0x6f0 [ 2500.974354][ T7624] __bpf_trace_kmem_free+0x6f/0x90 [ 2500.979391][ T7624] kfree+0x24b/0x270 [ 2500.983104][ T7624] skb_release_data+0x5c6/0x6f0 [ 2500.987786][ T7624] ? sock_rfree+0xee/0x180 [ 2500.992109][ T7624] ? __tipc_shutdown+0x97e/0x1510 [ 2500.996903][ T7624] kfree_skb+0xb9/0x320 [ 2501.000929][ T7624] __tipc_shutdown+0x97e/0x1510 [ 2501.005582][ T7624] ? tipc_recvstream+0xf70/0xf70 [ 2501.010355][ T7624] ? sock_init_data+0xc0/0xc0 [ 2501.014878][ T7624] ? wait_woken+0x250/0x250 [ 2501.019302][ T7624] tipc_release+0x76/0x1440 [ 2501.023726][ T7624] sock_close+0xdf/0x270 [ 2501.027909][ T7624] ? sock_mmap+0xa0/0xa0 [ 2501.031978][ T7624] __fput+0x33d/0x7b0 [ 2501.035786][ T7624] ____fput+0x15/0x20 [ 2501.039621][ T7624] task_work_run+0x129/0x190 [ 2501.044053][ T7624] exit_to_user_mode_loop+0xbf/0xd0 [ 2501.049066][ T7624] syscall_exit_to_user_mode+0xa2/0x1a0 [ 2501.054443][ T7624] do_syscall_64+0x40/0x70 [ 2501.058696][ T7624] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2501.064425][ T7624] RIP: 0033:0x7f7849d1fde9 [ 2501.068690][ T7624] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2501.089200][ T7624] RSP: 002b:00007f784838a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 2501.097405][ T7624] RAX: 0000000000000000 RBX: 00007f7849f38fa0 RCX: 00007f7849d1fde9 [ 2501.105215][ T7624] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 2501.113201][ T7624] RBP: 00007f784838a090 R08: 0000000000000000 R09: 0000000000000000 [ 2501.121011][ T7624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2501.128824][ T7624] R13: 0000000000000000 R14: 00007f7849f38fa0 R15: 00007ffcdc4e99e8 [ 2501.650940][ T7643] device veth0_vlan left promiscuous mode [ 2501.731664][ T7643] device veth0_vlan entered promiscuous mode [ 2501.967621][ T7652] device veth0_vlan left promiscuous mode [ 2502.033828][ T7652] device veth0_vlan entered promiscuous mode [ 2502.754624][ T7675] device veth0_vlan left promiscuous mode [ 2502.799834][ T7675] device veth0_vlan entered promiscuous mode [ 2502.911028][ T7681] device veth0_vlan left promiscuous mode [ 2502.946734][ T7681] device veth0_vlan entered promiscuous mode [ 2503.513373][ T7701] device veth0_vlan left promiscuous mode [ 2503.665298][ T7701] device veth0_vlan entered promiscuous mode [ 2503.684416][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2503.692734][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2503.700485][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2503.744748][ T7719] device veth0_vlan left promiscuous mode [ 2503.752870][ T7719] device veth0_vlan entered promiscuous mode [ 2503.800750][ T7720] device veth0_vlan left promiscuous mode [ 2503.892340][ T7720] device veth0_vlan entered promiscuous mode [ 2504.927141][ T7760] FAULT_INJECTION: forcing a failure. [ 2504.927141][ T7760] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2504.948197][ T7760] CPU: 0 PID: 7760 Comm: syz.1.11626 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2504.959381][ T7760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2504.969296][ T7760] Call Trace: [ 2504.972400][ T7760] dump_stack_lvl+0x1e2/0x24b [ 2504.976911][ T7760] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2504.982207][ T7760] dump_stack+0x15/0x17 [ 2504.986200][ T7760] should_fail+0x3c6/0x510 [ 2504.990456][ T7760] should_fail_usercopy+0x1a/0x20 [ 2504.995313][ T7760] _copy_from_iter+0x22c/0xd10 [ 2504.999926][ T7760] ? __napi_alloc_skb+0x15d/0x2e0 [ 2505.004786][ T7760] ? copyout_mc+0x90/0x90 [ 2505.009004][ T7760] ? __check_object_size+0x2e6/0x3c0 [ 2505.014059][ T7760] skb_copy_datagram_from_iter+0x100/0x6d0 [ 2505.019696][ T7760] ? __napi_alloc_skb+0x16a/0x2e0 [ 2505.024559][ T7760] tun_get_user+0x1904/0x38f0 [ 2505.029078][ T7760] ? _kstrtoull+0x3a0/0x4a0 [ 2505.033403][ T7760] ? tun_do_read+0x1f60/0x1f60 [ 2505.038004][ T7760] ? kstrtouint_from_user+0x20a/0x2a0 [ 2505.043211][ T7760] ? kstrtol_from_user+0x310/0x310 [ 2505.048162][ T7760] ? avc_policy_seqno+0x1b/0x70 [ 2505.052848][ T7760] ? selinux_file_permission+0x2bb/0x560 [ 2505.058322][ T7760] ? fsnotify_perm+0x67/0x4e0 [ 2505.062829][ T7760] tun_chr_write_iter+0x1a8/0x250 [ 2505.067699][ T7760] vfs_write+0xb4c/0xe70 [ 2505.071767][ T7760] ? kernel_write+0x3d0/0x3d0 [ 2505.076280][ T7760] ? __fdget_pos+0x209/0x3a0 [ 2505.080703][ T7760] ? ksys_write+0x77/0x2c0 [ 2505.084958][ T7760] ksys_write+0x199/0x2c0 [ 2505.089145][ T7760] ? __ia32_sys_read+0x90/0x90 [ 2505.093738][ T7760] ? debug_smp_processor_id+0x17/0x20 [ 2505.098938][ T7760] __x64_sys_write+0x7b/0x90 [ 2505.103361][ T7760] do_syscall_64+0x34/0x70 [ 2505.107614][ T7760] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2505.113339][ T7760] RIP: 0033:0x7fc405218de9 [ 2505.117594][ T7760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2505.137035][ T7760] RSP: 002b:00007fc403883038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2505.145277][ T7760] RAX: ffffffffffffffda RBX: 00007fc405431fa0 RCX: 00007fc405218de9 [ 2505.153194][ T7760] RDX: 0000000000000066 RSI: 0000400000000100 RDI: 0000000000000003 [ 2505.161007][ T7760] RBP: 00007fc403883090 R08: 0000000000000000 R09: 0000000000000000 [ 2505.168817][ T7760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2505.176626][ T7760] R13: 0000000000000000 R14: 00007fc405431fa0 R15: 00007ffe8b303c98 [ 2506.972662][ T7803] device wg2 entered promiscuous mode [ 2508.079169][ T7832] device macsec0 left promiscuous mode [ 2510.134673][ T7882] FAULT_INJECTION: forcing a failure. [ 2510.134673][ T7882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2510.149288][ T7882] CPU: 1 PID: 7882 Comm: syz.0.11662 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2510.160476][ T7882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2510.170472][ T7882] Call Trace: [ 2510.173592][ T7882] dump_stack_lvl+0x1e2/0x24b [ 2510.178102][ T7882] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2510.183492][ T7882] ? is_bpf_text_address+0x172/0x190 [ 2510.189037][ T7882] dump_stack+0x15/0x17 [ 2510.193063][ T7882] should_fail+0x3c6/0x510 [ 2510.197367][ T7882] should_fail_usercopy+0x1a/0x20 [ 2510.202233][ T7882] _copy_from_user+0x20/0xd0 [ 2510.206659][ T7882] __se_sys_bpf+0x232/0x11cb0 [ 2510.211174][ T7882] ? stack_trace_save+0x113/0x1c0 [ 2510.216089][ T7882] ? terminate_walk+0x407/0x4f0 [ 2510.220719][ T7882] ? stack_trace_snprint+0xf0/0xf0 [ 2510.225664][ T7882] ? kmem_cache_free+0xa9/0x1e0 [ 2510.230534][ T7882] ? kmem_cache_free+0xa9/0x1e0 [ 2510.235298][ T7882] ? kasan_set_track+0x5d/0x70 [ 2510.239906][ T7882] ? __x64_sys_bpf+0x90/0x90 [ 2510.244358][ T7882] ? __kasan_slab_free+0x11/0x20 [ 2510.249103][ T7882] ? slab_free_freelist_hook+0xc0/0x190 [ 2510.254488][ T7882] ? kmem_cache_free+0xa9/0x1e0 [ 2510.259171][ T7882] ? putname+0xe7/0x140 [ 2510.263155][ T7882] ? do_sys_openat2+0x1fc/0x710 [ 2510.267847][ T7882] ? __x64_sys_openat+0x243/0x290 [ 2510.272708][ T7882] ? do_syscall_64+0x34/0x70 [ 2510.277132][ T7882] ? _kstrtoull+0x3a0/0x4a0 [ 2510.281469][ T7882] ? kstrtouint_from_user+0x20a/0x2a0 [ 2510.286694][ T7882] ? kstrtol_from_user+0x310/0x310 [ 2510.291715][ T7882] ? memset+0x35/0x40 [ 2510.295535][ T7882] ? __fsnotify_parent+0x4b9/0x6c0 [ 2510.300482][ T7882] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 2510.306992][ T7882] ? proc_fail_nth_write+0x20b/0x290 [ 2510.312304][ T7882] ? proc_fail_nth_read+0x210/0x210 [ 2510.317422][ T7882] ? security_file_permission+0x86/0xb0 [ 2510.323411][ T7882] ? rw_verify_area+0x1c3/0x360 [ 2510.328225][ T7882] ? preempt_count_add+0x92/0x1a0 [ 2510.333044][ T7882] ? vfs_write+0x852/0xe70 [ 2510.337295][ T7882] ? kmem_cache_free+0xa9/0x1e0 [ 2510.342069][ T7882] ? kernel_write+0x3d0/0x3d0 [ 2510.346688][ T7882] ? __kasan_check_write+0x14/0x20 [ 2510.351622][ T7882] ? mutex_lock+0xa5/0x110 [ 2510.355963][ T7882] ? mutex_trylock+0xa0/0xa0 [ 2510.360403][ T7882] ? __kasan_check_write+0x14/0x20 [ 2510.365345][ T7882] ? fput_many+0x160/0x1b0 [ 2510.369594][ T7882] ? debug_smp_processor_id+0x17/0x20 [ 2510.374811][ T7882] __x64_sys_bpf+0x7b/0x90 [ 2510.379063][ T7882] do_syscall_64+0x34/0x70 [ 2510.383302][ T7882] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2510.389204][ T7882] RIP: 0033:0x7f7849d1fde9 [ 2510.393463][ T7882] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2510.413397][ T7882] RSP: 002b:00007f784838a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2510.421826][ T7882] RAX: ffffffffffffffda RBX: 00007f7849f38fa0 RCX: 00007f7849d1fde9 [ 2510.429809][ T7882] RDX: 0000000000000020 RSI: 0000400000000080 RDI: 0000000000000002 [ 2510.437619][ T7882] RBP: 00007f784838a090 R08: 0000000000000000 R09: 0000000000000000 [ 2510.445561][ T7882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2510.453973][ T7882] R13: 0000000000000000 R14: 00007f7849f38fa0 R15: 00007ffcdc4e99e8 [ 2512.105554][ T7915] device veth0_vlan left promiscuous mode [ 2512.130442][ T7915] device veth0_vlan entered promiscuous mode [ 2514.434331][ T7959] device veth0_vlan left promiscuous mode [ 2514.471207][ T7959] device veth0_vlan entered promiscuous mode [ 2515.011963][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2515.092187][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2515.201769][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2516.085865][ T7990] device sit0 entered promiscuous mode [ 2516.722807][ T7998] device veth0_vlan left promiscuous mode [ 2516.851049][ T7998] device veth0_vlan entered promiscuous mode [ 2517.140826][ T8025] device sit0 left promiscuous mode [ 2517.376442][ T8028] device sit0 entered promiscuous mode [ 2517.446454][ T8031] device veth0_vlan left promiscuous mode [ 2517.507910][ T8031] device veth0_vlan entered promiscuous mode [ 2517.604913][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2517.625164][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2517.665771][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2517.966401][ T8059] device veth1_macvtap left promiscuous mode [ 2518.055277][ T8059] device macsec0 left promiscuous mode [ 2519.046172][ T8084] device veth0_vlan left promiscuous mode [ 2519.094303][ T8084] device veth0_vlan entered promiscuous mode [ 2519.317517][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2519.356898][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2519.447415][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2520.931356][ T8130] device veth0_vlan left promiscuous mode [ 2520.970555][ T8130] device veth0_vlan entered promiscuous mode [ 2521.118529][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2521.137798][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2521.150949][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2521.701286][ T8157] device sit0 left promiscuous mode [ 2521.914285][ T8166] device sit0 entered promiscuous mode [ 2522.002349][ T8185] device veth0_vlan left promiscuous mode [ 2522.062548][ T8185] device veth0_vlan entered promiscuous mode [ 2522.398264][ T24] audit: type=1400 audit(1739292216.270:169): avc: denied { create } for pid=8189 comm="syz.2.11761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 2522.886549][ T8202] bridge0: port 1(bridge_slave_0) entered blocking state [ 2522.893562][ T8202] bridge0: port 1(bridge_slave_0) entered disabled state [ 2522.904943][ T8202] device bridge_slave_0 entered promiscuous mode [ 2523.072392][ T8202] bridge0: port 2(bridge_slave_1) entered blocking state [ 2523.088172][ T8202] bridge0: port 2(bridge_slave_1) entered disabled state [ 2523.097043][ T8202] device bridge_slave_1 entered promiscuous mode [ 2523.304652][ T8229] device veth0_vlan left promiscuous mode [ 2523.340806][ T8229] device veth0_vlan entered promiscuous mode [ 2523.396314][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2523.407800][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2523.416255][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2523.427255][ T8230] device veth0_vlan left promiscuous mode [ 2523.516599][ T8230] device veth0_vlan entered promiscuous mode [ 2524.441031][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2524.453393][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2524.534166][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2524.542452][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2524.550823][T25431] bridge0: port 1(bridge_slave_0) entered blocking state [ 2524.557703][T25431] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2524.565497][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 2524.944933][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2524.953663][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2524.962073][T25431] bridge0: port 2(bridge_slave_1) entered blocking state [ 2524.968952][T25431] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2524.976397][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2524.986843][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2524.995063][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2525.028487][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2525.067209][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2525.075863][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2525.152780][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2525.160944][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2525.186666][ T8202] device veth0_vlan entered promiscuous mode [ 2525.196980][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2525.209378][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2525.363670][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2525.418846][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2525.520766][ T8202] device veth1_macvtap entered promiscuous mode [ 2525.569136][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2525.889486][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2525.901483][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2525.968511][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2526.047241][ T6867] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2527.744110][ T483] device erspan0 left promiscuous mode [ 2527.763272][ T483] GPL: port 1(erspan0) entered disabled state [ 2527.928056][ T8321] device veth0_vlan left promiscuous mode [ 2527.978085][ T8321] device veth0_vlan entered promiscuous mode [ 2528.120779][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2528.182271][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2528.210358][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2528.735599][ T483] bridge0: port 2(bridge_slave_1) entered disabled state [ 2528.785802][ T483] device bridge_slave_0 left promiscuous mode [ 2528.852259][ T483] bridge0: port 1(bridge_slave_0) entered disabled state [ 2528.862745][ T483] device veth0_vlan left promiscuous mode [ 2529.006261][ T8356] syz.1.11815 uses obsolete (PF_INET,SOCK_PACKET) [ 2529.694757][ T8388] device veth0_vlan left promiscuous mode [ 2529.807223][ T8388] device veth0_vlan entered promiscuous mode [ 2531.312777][ T8420] bridge0: port 1(bridge_slave_0) entered blocking state [ 2531.482440][ T8420] bridge0: port 1(bridge_slave_0) entered disabled state [ 2531.489852][ T8420] device bridge_slave_0 entered promiscuous mode [ 2531.581096][ T8420] bridge0: port 2(bridge_slave_1) entered blocking state [ 2531.659473][ T8420] bridge0: port 2(bridge_slave_1) entered disabled state [ 2531.759699][ T8420] device bridge_slave_1 entered promiscuous mode [ 2532.098903][ T8420] bridge0: port 2(bridge_slave_1) entered blocking state [ 2532.105859][ T8420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2532.113138][ T8420] bridge0: port 1(bridge_slave_0) entered blocking state [ 2532.120188][ T8420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2532.224991][ T6867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2532.265037][ T6867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2533.284208][ T8461] device syzkaller0 entered promiscuous mode [ 2533.511605][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2533.528650][T25431] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2533.652683][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2533.714530][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2533.738249][ T483] bridge0: port 1(bridge_slave_0) entered blocking state [ 2533.745122][ T483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2533.763061][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 2533.771474][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2533.780026][ T483] bridge0: port 2(bridge_slave_1) entered blocking state [ 2533.786879][ T483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2533.803155][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 2533.848804][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2533.856853][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 2533.864983][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2534.195366][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2534.203987][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2534.213431][ T8482] ªªªªªª: renamed from vlan0 [ 2534.224271][ T8420] device veth0_vlan entered promiscuous mode [ 2534.237648][ T8420] device veth1_macvtap entered promiscuous mode [ 2534.299464][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2534.388627][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2534.495917][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2534.528895][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2534.537193][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2534.546188][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2534.554416][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2534.608862][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2534.704264][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2534.732697][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2534.833913][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2534.932294][ T8500] device veth0_vlan left promiscuous mode [ 2534.950725][ T8500] device veth0_vlan entered promiscuous mode [ 2535.079584][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2535.123386][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2535.256352][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2535.963590][ T6867] device bridge_slave_1 left promiscuous mode [ 2536.000377][ T6867] bridge0: port 2(bridge_slave_1) entered disabled state [ 2536.280189][ T6867] device bridge_slave_0 left promiscuous mode [ 2536.568434][ T6867] bridge0: port 1(bridge_slave_0) entered disabled state [ 2536.701021][ T6867] device veth1_macvtap left promiscuous mode [ 2536.706863][ T6867] device veth0_vlan left promiscuous mode [ 2537.120958][ T8542] device veth0_vlan left promiscuous mode [ 2537.127607][ T8542] device veth0_vlan entered promiscuous mode [ 2537.135699][ T8542] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2537.184534][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2537.192792][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2537.200858][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2537.731355][ T8567] device veth0_vlan left promiscuous mode [ 2537.876355][ T8567] device veth0_vlan entered promiscuous mode [ 2538.021396][ T8577] device veth0_vlan left promiscuous mode [ 2538.105160][ T8577] device veth0_vlan entered promiscuous mode [ 2539.461851][ T8612] device veth0_vlan left promiscuous mode [ 2539.523899][ T8612] device veth0_vlan entered promiscuous mode [ 2539.664222][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2539.695648][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2539.733979][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2539.795617][ T8627] FAULT_INJECTION: forcing a failure. [ 2539.795617][ T8627] name failslab, interval 1, probability 0, space 0, times 0 [ 2539.838498][ T8627] CPU: 1 PID: 8627 Comm: syz.1.11898 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2539.849866][ T8627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2539.859943][ T8627] Call Trace: [ 2539.863064][ T8627] dump_stack_lvl+0x1e2/0x24b [ 2539.867590][ T8627] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2539.872872][ T8627] ? __kasan_check_write+0x14/0x20 [ 2539.877819][ T8627] ? _raw_spin_lock+0xa4/0x1b0 [ 2539.882512][ T8627] dump_stack+0x15/0x17 [ 2539.886674][ T8627] should_fail+0x3c6/0x510 [ 2539.891010][ T8627] ? __kernfs_new_node+0xdb/0x700 [ 2539.895877][ T8627] __should_failslab+0xa4/0xe0 [ 2539.900468][ T8627] should_failslab+0x9/0x20 [ 2539.904946][ T8627] kmem_cache_alloc+0x3d/0x2e0 [ 2539.909489][ T8627] ? down_read_killable+0x220/0x220 [ 2539.914521][ T8627] __kernfs_new_node+0xdb/0x700 [ 2539.919232][ T8627] ? __kasan_check_write+0x14/0x20 [ 2539.924151][ T8627] ? up_write+0x59/0x120 [ 2539.928404][ T8627] ? kernfs_activate+0x356/0x370 [ 2539.933203][ T8627] ? kernfs_new_node+0x230/0x230 [ 2539.937976][ T8627] ? kernfs_add_one+0x524/0x650 [ 2539.942646][ T8627] ? make_kgid+0x1f2/0x6f0 [ 2539.946900][ T8627] ? from_kuid_munged+0x7b0/0x7b0 [ 2539.951756][ T8627] kernfs_new_node+0x130/0x230 [ 2539.956349][ T8627] __kernfs_create_file+0x4a/0x270 [ 2539.961497][ T8627] sysfs_add_file_mode_ns+0x273/0x320 [ 2539.966688][ T8627] sysfs_create_file_ns+0x196/0x2a0 [ 2539.971738][ T8627] ? sysfs_add_file_mode_ns+0x320/0x320 [ 2539.977132][ T8627] device_create_file+0x112/0x1d0 [ 2539.981953][ T8627] device_add+0x48a/0xbc0 [ 2539.986170][ T8627] netdev_register_kobject+0x177/0x320 [ 2539.991440][ T8627] ? raw_notifier_call_chain+0xdf/0xf0 [ 2539.996741][ T8627] register_netdevice+0xe9b/0x13f0 [ 2540.001669][ T8627] ? netif_stacked_transfer_operstate+0x240/0x240 [ 2540.007924][ T8627] vti6_tnl_create2+0xbd/0x2f0 [ 2540.012518][ T8627] ? memcpy+0x56/0x70 [ 2540.016326][ T8627] vti6_locate+0x560/0x610 [ 2540.020576][ T8627] ? __switch_to_asm+0x34/0x60 [ 2540.025179][ T8627] ? vti6_link_config+0x580/0x580 [ 2540.030198][ T8627] ? vti6_ioctl+0xa5d/0x17d0 [ 2540.034670][ T8627] ? memcpy+0x56/0x70 [ 2540.038492][ T8627] vti6_ioctl+0xa83/0x17d0 [ 2540.042744][ T8627] ? vti6_tnl_xmit+0x1780/0x1780 [ 2540.047509][ T8627] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 2540.054102][ T8627] ? preempt_count_add+0x92/0x1a0 [ 2540.058957][ T8627] ? full_name_hash+0xbd/0xf0 [ 2540.063475][ T8627] dev_ifsioc+0x6a1/0xae0 [ 2540.067652][ T8627] ? dev_ioctl+0xb40/0xb40 [ 2540.071889][ T8627] ? dev_get_by_name_rcu+0xc5/0xf0 [ 2540.076838][ T8627] dev_ioctl+0x5cc/0xb40 [ 2540.080934][ T8627] sock_ioctl+0x685/0x760 [ 2540.085081][ T8627] ? sock_poll+0x340/0x340 [ 2540.089333][ T8627] ? security_file_ioctl+0x84/0xb0 [ 2540.094280][ T8627] ? sock_poll+0x340/0x340 [ 2540.098555][ T8627] __se_sys_ioctl+0x114/0x190 [ 2540.103053][ T8627] __x64_sys_ioctl+0x7b/0x90 [ 2540.107476][ T8627] do_syscall_64+0x34/0x70 [ 2540.111731][ T8627] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2540.117567][ T8627] RIP: 0033:0x7fc405218de9 [ 2540.121830][ T8627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2540.141256][ T8627] RSP: 002b:00007fc403883038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2540.149849][ T8627] RAX: ffffffffffffffda RBX: 00007fc405431fa0 RCX: 00007fc405218de9 [ 2540.157838][ T8627] RDX: 0000400000000080 RSI: 00000000000089f1 RDI: 000000000000000d [ 2540.165758][ T8627] RBP: 00007fc403883090 R08: 0000000000000000 R09: 0000000000000000 [ 2540.173813][ T8627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2540.181560][ T8627] R13: 0000000000000000 R14: 00007fc405431fa0 R15: 00007ffe8b303c98 [ 2541.975548][ T24] audit: type=1400 audit(1739292235.850:170): avc: denied { setattr } for pid=8680 comm="syz.2.11916" path="/dev/net/tun" dev="devtmpfs" ino=147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 2542.138093][ T8677] device veth0_vlan left promiscuous mode [ 2542.378188][ T8677] device veth0_vlan entered promiscuous mode [ 2542.745549][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2542.810592][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2542.856329][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2543.179362][ T8707] bridge0: port 2(bridge_slave_1) entered disabled state [ 2543.443446][ T8712] FAULT_INJECTION: forcing a failure. [ 2543.443446][ T8712] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2543.765912][ T8712] CPU: 1 PID: 8712 Comm: syz.3.11926 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2543.777196][ T8712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2543.787082][ T8712] Call Trace: [ 2543.790306][ T8712] dump_stack_lvl+0x1e2/0x24b [ 2543.794911][ T8712] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2543.800282][ T8712] ? stack_trace_save+0x113/0x1c0 [ 2543.805140][ T8712] ? stack_trace_snprint+0xf0/0xf0 [ 2543.810190][ T8712] dump_stack+0x15/0x17 [ 2543.814166][ T8712] should_fail+0x3c6/0x510 [ 2543.818432][ T8712] should_fail_alloc_page+0x52/0x60 [ 2543.823477][ T8712] __alloc_pages_nodemask+0x1b3/0xaf0 [ 2543.828671][ T8712] ? __get_vm_area_node+0x156/0x470 [ 2543.833695][ T8712] ? __vmalloc_node_range+0xdc/0x7c0 [ 2543.838880][ T8712] ? __se_sys_bpf+0x620f/0x11cb0 [ 2543.843590][ T8712] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 2543.848985][ T8712] __get_free_pages+0xe/0x30 [ 2543.853409][ T8712] kasan_populate_vmalloc_pte+0x39/0x130 [ 2543.858867][ T8712] ? __apply_to_page_range+0x710/0x9e0 [ 2543.864180][ T8712] __apply_to_page_range+0x720/0x9e0 [ 2543.869285][ T8712] ? kasan_populate_vmalloc+0x70/0x70 [ 2543.874489][ T8712] ? kasan_populate_vmalloc+0x70/0x70 [ 2543.879698][ T8712] apply_to_page_range+0x3b/0x50 [ 2543.884467][ T8712] kasan_populate_vmalloc+0x65/0x70 [ 2543.889524][ T8712] alloc_vmap_area+0x1944/0x1a90 [ 2543.894283][ T8712] ? vm_map_ram+0x9d0/0x9d0 [ 2543.898634][ T8712] ? __kasan_kmalloc+0x9/0x10 [ 2543.903130][ T8712] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 2543.908701][ T8712] ? __get_vm_area_node+0x116/0x470 [ 2543.913719][ T8712] __get_vm_area_node+0x156/0x470 [ 2543.918593][ T8712] __vmalloc_node_range+0xdc/0x7c0 [ 2543.923526][ T8712] ? prealloc_init+0x13b/0x7f0 [ 2543.928198][ T8712] ? get_random_u64+0x5b0/0x5b0 [ 2543.932896][ T8712] bpf_map_area_alloc+0xd9/0xf0 [ 2543.937578][ T8712] ? prealloc_init+0x13b/0x7f0 [ 2543.942179][ T8712] prealloc_init+0x13b/0x7f0 [ 2543.946604][ T8712] ? __kmalloc+0x1aa/0x330 [ 2543.950858][ T8712] htab_map_alloc+0x68d/0x950 [ 2543.955372][ T8712] __se_sys_bpf+0x620f/0x11cb0 [ 2543.959982][ T8712] ? stack_trace_save+0x113/0x1c0 [ 2543.964832][ T8712] ? terminate_walk+0x407/0x4f0 [ 2543.969658][ T8712] ? stack_trace_snprint+0xf0/0xf0 [ 2543.974697][ T8712] ? kmem_cache_free+0xa9/0x1e0 [ 2543.979468][ T8712] ? kmem_cache_free+0xa9/0x1e0 [ 2543.984137][ T8712] ? kasan_set_track+0x5d/0x70 [ 2543.988736][ T8712] ? __x64_sys_bpf+0x90/0x90 [ 2543.993162][ T8712] ? __kasan_slab_free+0x11/0x20 [ 2543.998126][ T8712] ? slab_free_freelist_hook+0xc0/0x190 [ 2544.003498][ T8712] ? kmem_cache_free+0xa9/0x1e0 [ 2544.008194][ T8712] ? putname+0xe7/0x140 [ 2544.012186][ T8712] ? do_sys_openat2+0x1fc/0x710 [ 2544.016872][ T8712] ? __x64_sys_openat+0x243/0x290 [ 2544.021727][ T8712] ? do_syscall_64+0x34/0x70 [ 2544.026145][ T8712] ? _kstrtoull+0x3a0/0x4a0 [ 2544.030483][ T8712] ? kstrtouint_from_user+0x20a/0x2a0 [ 2544.035721][ T8712] ? kstrtol_from_user+0x310/0x310 [ 2544.040645][ T8712] ? memset+0x35/0x40 [ 2544.044551][ T8712] ? __fsnotify_parent+0x4b9/0x6c0 [ 2544.049494][ T8712] ? fsnotify_set_children_dentry_flags+0x210/0x210 [ 2544.055919][ T8712] ? proc_fail_nth_write+0x20b/0x290 [ 2544.061036][ T8712] ? proc_fail_nth_read+0x210/0x210 [ 2544.066102][ T8712] ? security_file_permission+0x86/0xb0 [ 2544.071459][ T8712] ? rw_verify_area+0x1c3/0x360 [ 2544.076137][ T8712] ? preempt_count_add+0x92/0x1a0 [ 2544.080996][ T8712] ? vfs_write+0x852/0xe70 [ 2544.085247][ T8712] ? kmem_cache_free+0xa9/0x1e0 [ 2544.089938][ T8712] ? kernel_write+0x3d0/0x3d0 [ 2544.094450][ T8712] ? __kasan_check_write+0x14/0x20 [ 2544.099395][ T8712] ? mutex_lock+0xa5/0x110 [ 2544.103645][ T8712] ? mutex_trylock+0xa0/0xa0 [ 2544.108083][ T8712] ? __kasan_check_write+0x14/0x20 [ 2544.113021][ T8712] ? fput_many+0x160/0x1b0 [ 2544.117284][ T8712] ? debug_smp_processor_id+0x17/0x20 [ 2544.122481][ T8712] __x64_sys_bpf+0x7b/0x90 [ 2544.126747][ T8712] do_syscall_64+0x34/0x70 [ 2544.130987][ T8712] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2544.136715][ T8712] RIP: 0033:0x7f145e1a9de9 [ 2544.140971][ T8712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2544.160428][ T8712] RSP: 002b:00007f145c814038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2544.168663][ T8712] RAX: ffffffffffffffda RBX: 00007f145e3c2fa0 RCX: 00007f145e1a9de9 [ 2544.176465][ T8712] RDX: 0000000000000048 RSI: 0000400000000840 RDI: 0000000000000000 [ 2544.184449][ T8712] RBP: 00007f145c814090 R08: 0000000000000000 R09: 0000000000000000 [ 2544.192258][ T8712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2544.200074][ T8712] R13: 0000000000000000 R14: 00007f145e3c2fa0 R15: 00007ffebf0beac8 [ 2545.134522][ T8745] FAULT_INJECTION: forcing a failure. [ 2545.134522][ T8745] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2545.148432][ T8745] CPU: 1 PID: 8745 Comm: syz.0.11935 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2545.160050][ T8745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2545.169940][ T8745] Call Trace: [ 2545.173081][ T8745] dump_stack_lvl+0x1e2/0x24b [ 2545.177794][ T8745] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2545.183157][ T8745] ? kmem_cache_free+0xa9/0x1e0 [ 2545.189436][ T8745] dump_stack+0x15/0x17 [ 2545.194012][ T8745] should_fail+0x3c6/0x510 [ 2545.198357][ T8745] should_fail_usercopy+0x1a/0x20 [ 2545.203373][ T8745] _copy_from_user+0x20/0xd0 [ 2545.207809][ T8745] __copy_msghdr_from_user+0xaf/0x7c0 [ 2545.213014][ T8745] ? __ia32_sys_shutdown+0x70/0x70 [ 2545.217953][ T8745] ___sys_sendmsg+0x166/0x2e0 [ 2545.222471][ T8745] ? __sys_sendmsg+0x280/0x280 [ 2545.227065][ T8745] ? rw_verify_area+0x1c3/0x360 [ 2545.231762][ T8745] ? __fdget+0x1bc/0x240 [ 2545.235832][ T8745] __se_sys_sendmsg+0x1b1/0x280 [ 2545.240515][ T8745] ? __x64_sys_sendmsg+0x90/0x90 [ 2545.245290][ T8745] ? ksys_write+0x260/0x2c0 [ 2545.249632][ T8745] ? debug_smp_processor_id+0x17/0x20 [ 2545.254860][ T8745] __x64_sys_sendmsg+0x7b/0x90 [ 2545.259439][ T8745] do_syscall_64+0x34/0x70 [ 2545.263689][ T8745] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2545.269415][ T8745] RIP: 0033:0x7f7849d1fde9 [ 2545.273670][ T8745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2545.293121][ T8745] RSP: 002b:00007f784838a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2545.301357][ T8745] RAX: ffffffffffffffda RBX: 00007f7849f38fa0 RCX: 00007f7849d1fde9 [ 2545.309167][ T8745] RDX: 0000000010000080 RSI: 0000400000003a00 RDI: 0000000000000003 [ 2545.316983][ T8745] RBP: 00007f784838a090 R08: 0000000000000000 R09: 0000000000000000 [ 2545.324972][ T8745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2545.332812][ T8745] R13: 0000000000000000 R14: 00007f7849f38fa0 R15: 00007ffcdc4e99e8 [ 2547.165886][ T8814] device pim6reg1 entered promiscuous mode [ 2547.244413][ T8803] bridge0: port 1(bridge_slave_0) entered blocking state [ 2547.317958][ T8803] bridge0: port 1(bridge_slave_0) entered disabled state [ 2547.388522][ T8803] device bridge_slave_0 entered promiscuous mode [ 2547.442170][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 2547.451518][ T8803] bridge0: port 2(bridge_slave_1) entered disabled state [ 2547.466698][ T8803] device bridge_slave_1 entered promiscuous mode [ 2547.555452][ T8803] bridge0: port 2(bridge_slave_1) entered blocking state [ 2547.562341][ T8803] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2547.586382][ T8830] device pim6reg1 entered promiscuous mode [ 2547.637775][ T7400] bridge0: port 2(bridge_slave_1) entered disabled state [ 2547.660383][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 2547.671184][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 2547.721477][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 2547.749745][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 2547.757809][ T7400] bridge0: port 1(bridge_slave_0) entered blocking state [ 2547.764773][ T7400] bridge0: port 1(bridge_slave_0) entered forwarding state [ 2547.772320][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 2547.780605][ T7400] bridge0: port 2(bridge_slave_1) entered blocking state [ 2547.787463][ T7400] bridge0: port 2(bridge_slave_1) entered forwarding state [ 2547.794965][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 2547.890225][ T483] bridge0: port 2(bridge_slave_1) entered disabled state [ 2547.996815][ T483] device bridge_slave_0 left promiscuous mode [ 2548.047948][ T483] bridge0: port 1(bridge_slave_0) entered disabled state [ 2548.113320][ T483] device veth0_vlan left promiscuous mode [ 2548.337983][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 2548.367175][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 2548.377598][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 2548.394335][ T8803] device veth0_vlan entered promiscuous mode [ 2548.449582][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 2548.457410][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2548.483707][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2548.491561][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2548.543288][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 2548.552505][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 2548.562718][ T8803] device veth1_macvtap entered promiscuous mode [ 2548.574732][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 2548.583637][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 2548.592614][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 2548.633276][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 2548.683171][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 2549.663889][ T8891] device veth1_macvtap left promiscuous mode [ 2550.069757][ T8899] device veth0_vlan left promiscuous mode [ 2550.248193][ T8899] device veth0_vlan entered promiscuous mode [ 2550.484673][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2550.531916][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2550.546195][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2554.040622][ T8968] device veth1_macvtap left promiscuous mode [ 2554.460109][ T8971] device veth0_vlan left promiscuous mode [ 2554.694134][ T8971] device veth0_vlan entered promiscuous mode [ 2556.040941][ T8987] device veth0_vlan left promiscuous mode [ 2556.171453][ T8987] device veth0_vlan entered promiscuous mode [ 2556.598186][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2556.669792][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2556.778349][ T483] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2558.369948][ T9019] device veth0_vlan left promiscuous mode [ 2558.376740][ T9019] device veth0_vlan entered promiscuous mode [ 2558.698629][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2558.720012][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 2558.848360][ T7400] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2559.895559][ T9042] device veth0_vlan left promiscuous mode [ 2560.054242][ T9042] device veth0_vlan entered promiscuous mode [ 2560.220833][ T9044] bridge0: port 2(bridge_slave_1) entered disabled state [ 2560.469201][ T9070] GPL: port 1(erspan0) entered blocking state [ 2560.475142][ T9070] GPL: port 1(erspan0) entered forwarding state [ 2561.447532][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 2562.155905][ T9110] syz.1.12049[9110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2562.155972][ T9110] syz.1.12049[9110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 2563.566875][ T24] audit: type=1400 audit(1739292257.440:171): avc: denied { create } for pid=9128 comm="syz.0.12055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 2564.905522][ T9164] FAULT_INJECTION: forcing a failure. [ 2564.905522][ T9164] name failslab, interval 1, probability 0, space 0, times 0 [ 2565.170172][ T9164] CPU: 1 PID: 9164 Comm: syz.2.12066 Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2565.181363][ T9164] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2565.191257][ T9164] Call Trace: [ 2565.194389][ T9164] dump_stack_lvl+0x1e2/0x24b [ 2565.198926][ T9164] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2565.204207][ T9164] ? kmem_cache_free+0xa9/0x1e0 [ 2565.208990][ T9164] ? kasan_set_track+0x5d/0x70 [ 2565.213572][ T9164] ? kasan_set_free_info+0x23/0x40 [ 2565.218516][ T9164] dump_stack+0x15/0x17 [ 2565.222502][ T9164] should_fail+0x3c6/0x510 [ 2565.226756][ T9164] ? dup_task_struct+0x57/0xc30 [ 2565.231447][ T9164] __should_failslab+0xa4/0xe0 [ 2565.236043][ T9164] should_failslab+0x9/0x20 [ 2565.240382][ T9164] kmem_cache_alloc+0x3d/0x2e0 [ 2565.244984][ T9164] ? __kasan_check_write+0x14/0x20 [ 2565.249935][ T9164] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 2565.254882][ T9164] dup_task_struct+0x57/0xc30 [ 2565.259392][ T9164] ? __kasan_check_write+0x14/0x20 [ 2565.264340][ T9164] copy_process+0x5c8/0x3340 [ 2565.268767][ T9164] ? proc_fail_nth_write+0x20b/0x290 [ 2565.273885][ T9164] ? proc_fail_nth_read+0x210/0x210 [ 2565.278917][ T9164] ? security_file_permission+0x86/0xb0 [ 2565.284304][ T9164] ? rw_verify_area+0x1c3/0x360 [ 2565.288987][ T9164] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 2565.293933][ T9164] ? vfs_write+0x852/0xe70 [ 2565.298184][ T9164] ? kmem_cache_free+0x1c0/0x1e0 [ 2565.302964][ T9164] kernel_clone+0x21e/0x9e0 [ 2565.307295][ T9164] ? __kasan_check_write+0x14/0x20 [ 2565.312243][ T9164] ? create_io_thread+0x1e0/0x1e0 [ 2565.317121][ T9164] __x64_sys_clone+0x23f/0x290 [ 2565.321729][ T9164] ? __do_sys_vfork+0x130/0x130 [ 2565.326400][ T9164] ? debug_smp_processor_id+0x17/0x20 [ 2565.331613][ T9164] do_syscall_64+0x34/0x70 [ 2565.335853][ T9164] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2565.341577][ T9164] RIP: 0033:0x7f096d527de9 [ 2565.345832][ T9164] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 2565.365549][ T9164] RSP: 002b:00007f096bb91fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 2565.373784][ T9164] RAX: ffffffffffffffda RBX: 00007f096d740fa0 RCX: 00007f096d527de9 [ 2565.381601][ T9164] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000010000000 [ 2565.389429][ T9164] RBP: 00007f096bb92090 R08: 0000000000000000 R09: 0000000000000000 [ 2565.397214][ T9164] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 2565.405019][ T9164] R13: 0000000000000000 R14: 00007f096d740fa0 R15: 00007ffe03af5a18 [ 2566.453523][ T9201] device veth0_vlan left promiscuous mode [ 2566.631662][ T9201] device veth0_vlan entered promiscuous mode [ 2567.470807][ T9235] device veth0_vlan left promiscuous mode [ 2567.482327][ T9235] device veth0_vlan entered promiscuous mode [ 2567.508227][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 2567.536988][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 2567.578503][T18608] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 2568.390549][ T9271] device veth0_vlan left promiscuous mode [ 2568.441100][ T9271] device veth0_vlan entered promiscuous mode [ 2569.224064][ T9293] device veth0_vlan left promiscuous mode [ 2569.271559][ T9293] device veth0_vlan entered promiscuous mode SYZFAIL: SIGFPE pc-offset:0xffffffffffec2793 pc:0x7f85657d87bd addr:(nil) code=128 (errno 11: Resource temporarily unavailable) Connection to 10.128.0.144 closed by remote host. [ 2570.719485][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000008 [ 2570.727833][ T1] CPU: 1 PID: 1 Comm: init Tainted: G W 5.10.234-syzkaller-00148-g6686f2996d23 #0 [ 2570.738754][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 [ 2570.748577][ T1] Call Trace: [ 2570.751708][ T1] dump_stack_lvl+0x1e2/0x24b [ 2570.756214][ T1] ? panic+0x22b/0x812 [ 2570.760119][ T1] ? bfq_pos_tree_add_move+0x43b/0x43b [ 2570.765419][ T1] dump_stack+0x15/0x17 [ 2570.769580][ T1] panic+0x2cf/0x812 [ 2570.773319][ T1] ? do_exit+0x239a/0x2a50 [ 2570.777577][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 2570.782610][ T1] ? __kasan_check_write+0x14/0x20 [ 2570.787563][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 2570.791980][ T1] do_exit+0x23b4/0x2a50 [ 2570.796066][ T1] ? sched_group_set_shares+0x490/0x490 [ 2570.801480][ T1] ? put_task_struct+0x80/0x80 [ 2570.806145][ T1] ? schedule+0x154/0x1d0 [ 2570.810300][ T1] ? schedule_timeout+0xa9/0x360 [ 2570.815075][ T1] ? __kasan_check_write+0x14/0x20 [ 2570.820022][ T1] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 2570.824969][ T1] do_group_exit+0x141/0x310 [ 2570.829498][ T1] get_signal+0x10a0/0x1410 [ 2570.833831][ T1] arch_do_signal_or_restart+0xbd/0x17c0 [ 2570.839291][ T1] ? put_pid+0xd7/0x110 [ 2570.843295][ T1] ? kernel_clone+0x6ca/0x9e0 [ 2570.847793][ T1] ? create_io_thread+0x1e0/0x1e0 [ 2570.852981][ T1] ? get_timespec64+0x197/0x270 [ 2570.857612][ T1] ? timespec64_add_safe+0x220/0x220 [ 2570.862729][ T1] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 2570.868452][ T1] ? __do_sys_vfork+0xcd/0x130 [ 2570.873081][ T1] exit_to_user_mode_loop+0x9b/0xd0 [ 2570.878195][ T1] syscall_exit_to_user_mode+0xa2/0x1a0 [ 2570.883565][ T1] do_syscall_64+0x40/0x70 [ 2570.887816][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 2570.893547][ T1] RIP: 0033:0x7fac32c47a68 [ 2570.897810][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 2570.917338][ T1] RSP: 002b:00007ffd01ce8570 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 2570.925665][ T1] RAX: 000000000000245d RBX: 0000562525f1bab0 RCX: 00007fac32c47a68 [ 2570.933468][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007fac32dd2bed [ 2570.941286][ T1] RBP: 00007fac32e0d528 R08: 0000000000000007 R09: ce48eb60e722b22e [ 2570.949100][ T1] R10: 00007ffd01ce85b0 R11: 0000000000000246 R12: 0000000000000000 [ 2570.956904][ T1] R13: 0000000000000018 R14: 0000562503b7c169 R15: 00007fac32e3ea80 [ 2570.966045][ T1] Kernel Offset: disabled [ 2570.970198][ T1] Rebooting in 86400 seconds..