last executing test programs: 1.190009513s ago: executing program 0 (id=13080): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffd98, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@typedef={0x2}]}, {0x0, [0x0, 0x61, 0x25]}}, &(0x7f00000001c0)=""/235, 0x29, 0xeb, 0x1}, 0x20) sendmsg$tipc(r2, &(0x7f0000001380)={&(0x7f0000000080)=@id, 0x10, &(0x7f0000000100)=[{&(0x7f0000000180)="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", 0xffffff9f}, {&(0x7f00000000c0)="fccef1d5c5298e41486ed64b17", 0xd}, {&(0x7f0000001180)="a333ce3ac17fd00f11ba58100e9e87285d83ad267fee4ebef849242f1d283e1797a7a54d4223ca0711e4da36c6996704836ab45b580ab5c49273c39c242f9bd2d920da129fd48436deefd1ae2c88cff0fa0131ca09fcc0eaf177bb495dd6", 0x5e}, {&(0x7f0000001200)="f685f1d6c28acfaeff635ab11394dca9b1c2ae977517936b918f8aa877298948c2da9e6675ae3f825ab629b982d7f6731ead33a88eab01b83ab381fbf11284b58c0360ed996f1357c997806cc89dd5ccb3827286f2226ab4f354f3b8d292f4c4edc877c2e83ef9bc3d7eece4e6b06a48ac8e2f500aebb4b063a6cb78e5731ccfe9554e762badae868ccc50dfa26d3369ef724842daf8232e10b715966b6bdf8d30541c1df5dd787ef8a63deeac0ca28e9cc6e585076d4ca78042b427112ead6e2ac989adb39aba897d9abf8f", 0xcc}], 0x4, &(0x7f0000001300)="4e8871156675acdc02acee0bbdc531bf0e08e17ff729300143eb8177ca5be860e4f84a8d7830b15e7db3c7aa98c0c674eb32ade4d300fef4cbb57b9da7828f3926867d1cf8df2e7b5d5ee7508d8a71486d3a9d0881", 0x55, 0x4000080}, 0x4040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x6, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r7, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) close(r6) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext, 0x100a0, 0xc8, 0x2000000, 0x0, 0x9, 0x0, 0xfffc, 0x0, 0x4, 0x0, 0x1}, 0x0, 0x20000, 0xffffffffffffffff, 0x0) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd63fecd8102036c00fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x9, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000d907bdf180a31e28c235cd000000036658", @ANYRES32, @ANYRES16=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x17}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={r9, 0x10e, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000400)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x3, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000540)=[0x0, 0x0, 0x0], 0x0, 0xf, &(0x7f0000000580)=[{}, {}, {}], 0x56, 0x10, &(0x7f0000000680), &(0x7f00000006c0), 0x8, 0xd3, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f00000013c0)=ANY=[@ANYRESDEC=r4], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2c8c}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={0xffffffffffffffff, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x4) 1.148290117s ago: executing program 0 (id=13083): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000fc0)={0x1b, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), 0x0, 0xbc, &(0x7f0000000680), 0x0, 0x10, &(0x7f00000006c0), 0x0, 0x0, 0x57, 0x8, 0x0, 0x0}}, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc020662a, &(0x7f0000000040)=0xfff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001800)={{r1}, 0x0, &(0x7f00000017c0)}, 0x20) gettid() perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000800000095000000000000009500a5050000000077d8f3b423cdac8d8000000000000020e16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f68a7d06d10bfe150a7487535f7866907dc6751dfb265a0e3ccae669e173a649c1cfd6587d452d46b7c57d77578f4c35235138d5521f9453559c3421eed73d5661cfeecf9c66c54c3b3ffe1b4ce25d7c983c044c03bf3ff03fe3e26e7a23129d6606fd28a7f9105f82317874b33d96b39fa4e045469989d552af6200000003a00000000000000abecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f1623ed38ae89d24e14b40234756ddcebfba2f87925bfacba83109753f543ad027edd68149ee99eebc6f7d6dd4aed4afe1f44ccb19e810879b70a70900000000000000000000d7900a820b6327944e9a217b9800e02a92895614cd50cbf83a1ed25268816b004519c9c5cff097d8000000000009d27d753a30a147b24a48435bd8a568669596e9e08679b3ce48e90defb6670c3d6209000000c773713a66b223fa8b148871c8d31d24000025449f106b99893ed20fa7a050fbbef90327e827e513e9606800000000e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e69ee52b59d13182e1f24ed208ada12f7a1525320e71666f472a972d5eb1affb87ba55b2d72078e9f40b4ae7dc3b2aeb0d11cd22c35d32940f19dff00ffffffff080000ff003853e59de7621e348955735264f34b1046a1813668297a7edad187ef106ae7fcbb25090f17d0baadeb8ae190a1fb5a315f8347fb0379659500000000000000000000000000000000000000002fdf0193ec79c90ed210ebc2fbed6d4216770c1b0dec886b388d138c2b69c6aacb714e7264093061c660a5100b7cc165889eb94c8d7c77b6fa06f1a4f8e4a6b6cb37e319c5c22f276b03cae853f42b07ca0b03b1eb32a6b1a81cd511fd0b59d57a11c6a3ebf9731464ad21f07f618efc31023ac60007426162b57e803519954d7c956fda392fa84be38e937d36af1c35138e05a9e8d6dc0272de72c41500000000304402e22af23437126f330f8eb4075daaeae3134ece35cd86d95bd9836bd186c4b6565e967a4e3e86f299b7400994ba136b4eccf3b0f001a266c0d160b3ce1182001d64b52a5ce7f506295d59eea6903b84ffbabf5a5b91c1d6ecce8728a224aec66c610e3becd60a35e848c224f8251947eed20e2b612cb099bfe8924d33ba7f0691fed04a43e9c64b7a1e3165e86cdb9871c678a6bbb14821f441c6c14d1bd78d8ffdfea12c19ea04264335d60b6b7a7da6fb83f33101db32f6ab137d943dd3c1e8db9f3e1263573dc721ae82fe0bc63598751a5092c9f7dbfc39d564834e3703492c2a651643d8ce5c36d97a4812cf73fc8ea0d68d7489cfcb0176"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{0x1}, 0x0, &(0x7f0000000040)}, 0x20) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffffbffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x89f1, &(0x7f0000000080)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bridge0\x00'}) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x0, 0x8}, 0x48) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) 1.09870182s ago: executing program 0 (id=13087): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000c000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000380)=ANY=[@ANYRESOCT=r1, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x14, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x14, &(0x7f0000000600)=ANY=[@ANYBLOB="b956046d2beabd129b00", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000628000085000000060000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x0, 0x33, 0x7259, 0x200, r3, 0x7f, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x3, 0xf}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000090000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1c, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000003c0)=ANY=[@ANYBLOB="187e60afd1808300000004000000000000e110feb1fa7bcb230052", @ANYRES16=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000700)=ANY=[@ANYRES64=0x0, @ANYRES64=r6, @ANYRES32=r2], &(0x7f0000000740)='syzkaller\x00', 0x80000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r7}, 0x10) socketpair(0xa, 0x3, 0x9, &(0x7f0000000000)) close(r4) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xb, 0xd86, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x7109, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000006c0)=@generic={&(0x7f0000000500)='./file0\x00', r5}, 0x18) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r8}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000004c0)='mm_vmscan_write_folio\x00'}, 0xb) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x40140, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) close(r9) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x2, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r10}, 0x10) 1.060454483s ago: executing program 0 (id=13092): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9}, 0x48) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) close(r7) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb0, &(0x7f0000000300)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x2a, 0x8, 0x8, &(0x7f0000000540)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYRESOCT], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r9, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_writepages\x00'}, 0x10) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x20001400) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$TUNSETOFFLOAD(r11, 0x40047451, 0x2000000c) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r2}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r12}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r13, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r14, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) sendmsg$inet(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) 1.060010633s ago: executing program 3 (id=13093): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x3, &(0x7f0000001cc0)=ANY=[@ANYRESHEX=r0], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)=0xffffffffffff0000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x80082407, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="63202a3a2a03856d00"], 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000500)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000002380)=""/192}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000004000), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 1.007326578s ago: executing program 2 (id=13097): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0xe32}, 0x28) 974.462781ms ago: executing program 2 (id=13100): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x36) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x4}, [@ldst={0x3, 0x0, 0x6, 0x1c10a1, 0x0, 0x2c}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0xc1}, 0x90) (async) r5 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={0x0, &(0x7f0000000780)=""/233, 0x0, 0xe9, 0x0, 0x5e2b}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) (async, rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) (rerun: 64) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async, rerun: 32) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffdfffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) unlink(0x0) socketpair(0x1, 0x1, 0x0, 0x0) (async) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x3}, 0x48) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, '\x00', 0x0, r5, 0xfffffffe, 0x2}, 0x6c) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x8, 0x24, &(0x7f00000002c0)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x2, 0x3, 0xa, 0x9, 0xfe00}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0x2, 0xfff8}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x7, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {0x7, 0x0, 0xb, 0x9}, {0x46, 0x8, 0xfff0, 0x76}}, @printk={@u, {0x3, 0x3, 0x3, 0x4, 0x9}, {0x7, 0x1, 0xb, 0x1, 0x2}, {}, {}, {}, {0x85, 0x0, 0x0, 0x5e}}], {{0x7, 0x1, 0x7, 0x8}, {0x6, 0x0, 0x5, 0x8}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000080)) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000040), 0xc) 974.045141ms ago: executing program 3 (id=13101): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000880)=ANY=[@ANYBLOB="18050000000300000000000000000000000000000000000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823000000000000467b8d9f27c5713ab236e07e4e50719141155d6ef4cac56572bc8e6cf3d5645d78ebcd47d13a0a1bfc4a442d341ed99a2befbc7b0168f4757b08e45e26f775ec83e3d76cdca0e538bddf809d", @ANYRES32=r0, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000680)='consume_skb\x00', r1}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x729ab24de8a880c4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="9feb01001800000000000000180000009edf3c3cd6e6f55bbc3c8dd16fbb2bfd1800000002000000000000000000000200000000000012e34c7df082719824baeb2cb7d835c1000000000009000000000000"], &(0x7f00000006c0)=""/211, 0x32, 0xd3, 0x1}, 0x20) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r4}, 0x10) (async) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="0900000000000000000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) socketpair(0x27, 0x5, 0x8, &(0x7f00000003c0)) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r5}, 0x10) (async, rerun: 64) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='mm_page_alloc\x00', r8}, 0x10) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800086}, 0x10}, 0x90) (async) ioctl$TUNSETOFFLOAD(r9, 0xc004743e, 0x20001410) (async) ioctl$TUNSETOFFLOAD(r9, 0x40047451, 0x2000000c) 964.172892ms ago: executing program 4 (id=13102): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xa93, 0x2, 0x1000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7916009875f37515e486"], 0xfdef) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r8}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7ffb, 0xcc}, 0x48) write$cgroup_subtree(r6, &(0x7f0000000000), 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r10}, 0x10) 893.826967ms ago: executing program 3 (id=13103): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x3, 0x6}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r3, &(0x7f0000000200)=ANY=[@ANYBLOB="1e0308003c5c980128876360864668f82ffdd569d2f630b5e033ff11edf1c5ffc733d2acb165fe588cd568cd1f31b87b68b00ad88906"], 0xffdd) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r0}, &(0x7f00000007c0), &(0x7f0000000800)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000570000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 890.315078ms ago: executing program 4 (id=13104): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x0, 0x0, 0x4}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1a, 0x0, 0x10001, 0x9}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x2005000, 0x0, 0x300, 0x0, 0x0, 0x0) 887.811937ms ago: executing program 2 (id=13105): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x19, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000010040), 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@bloom_filter={0x1e, 0x6ca, 0x3, 0x8, 0x2101, 0x1, 0x14, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x2, 0x0, 0xd}, 0x48) bpf$MAP_DELETE_ELEM(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff52, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb01005ffc00000000000000000000004c57000000020000000000eb30eaf7dcb030cf4fb359362827e806fd062832d1d23ce621756216d6e511607bf3f1a9ad"], 0x0, 0xfc5f}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x16, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000000)={0x0, 0x0}) close(r3) setsockopt$sock_attach_bpf(r4, 0x10f, 0x87, &(0x7f0000000180), 0x127) bpf$MAP_CREATE(0x100000000000000, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70200001400e900b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000300)='fib6_table_lookup\x00', r6}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x5, 0x0, &(0x7f0000000140)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 883.183608ms ago: executing program 0 (id=13106): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='blkio.bfq.dequeue\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000004000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000a70400000800000085000000950000000200000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x5, 0x5, 0x9fd, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r4, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f00000002c0), &(0x7f0000000340)=[0x0, 0x0], 0x0, 0x87, &(0x7f0000000380), 0x0, 0x10, &(0x7f00000003c0), &(0x7f00000004c0), 0x8, 0x6c, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000006c0)={&(0x7f0000000b40)=ANY=[], &(0x7f0000000a40)=""/242, 0xd9, 0xf2, 0x0, 0x1}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x9e0}, 0x48) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000480)={@cgroup, 0x1d, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0}, 0x40) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000", @ANYRES32, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0xa, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="720ac4ff0000000071108600000000009500000000000000"], &(0x7f0000000480)='GPL\x00'}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x1a, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000002800)=""/4096, 0x1a, 0x1000, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r6, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x42cb, &(0x7f00000002c0)=[0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xac, 0x0, 0x0, 0x10, &(0x7f0000000380), &(0x7f00000003c0), 0x8, 0xde, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x8, &(0x7f0000000080)=ANY=[@ANYRES32=r7, @ANYBLOB='\x00'/12], &(0x7f00000001c0)='GPL\x00', 0x5, 0x30, &(0x7f0000000200)=""/48, 0x41100, 0x16, '\x00', r8, 0x25, r7, 0x8, &(0x7f0000000600)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000640)=[0xffffffffffffffff, r5, r7], &(0x7f0000000680)=[{0x1, 0x3, 0x2, 0xa}, {0x5, 0x2, 0x2, 0x5}, {0x0, 0x0, 0x0, 0x7}, {0x0, 0x5, 0xd, 0x1}, {0x5, 0x2, 0xd, 0x3}, {0x5, 0x2, 0x6}, {0x0, 0x0, 0xe}, {0x0, 0x4, 0x10}, {0x3, 0x1, 0x3, 0x7}], 0x10, 0x6}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00', r9}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 544.044966ms ago: executing program 2 (id=13111): r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1d, 0x3, &(0x7f0000001cc0)=ANY=[@ANYRESHEX=r0], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000180)=0xffffffffffff0000) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x80082407, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000200f1ff8500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="63202a3a2a03856d00"], 0x9) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000500)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000002380)=""/192}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) r6 = openat$cgroup_int(r5, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) write$cgroup_int(r6, &(0x7f0000004000), 0x12) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) close(0xffffffffffffffff) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 542.444266ms ago: executing program 4 (id=13113): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000ec0)='%pB \x00'}, 0x20) (async) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000a40)={'netdevsim0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001200)=@bloom_filter={0x1e, 0xcd9b, 0x8, 0x80000000, 0x0, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x1, 0x0, 0x7}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000012c0)=@bpf_lsm={0x1d, 0x22, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x3}, {}, {}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x101}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @map_val={0x18, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, @func={0x85, 0x0, 0x1, 0x0, 0x2000009}, @alu={0x4, 0x0, 0x4, 0xb, 0x5, 0xffffffffffffffff, 0x4}, @call={0x85, 0x0, 0x0, 0x4a}, @map_fd={0x18, 0xa}, @btf_id={0x18, 0x1, 0x3, 0x0, 0x3}]}, &(0x7f0000000040)='syzkaller\x00', 0xfa, 0xf1, &(0x7f0000001100)=""/241, 0x40f00, 0x12, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x6, 0x1}, 0x8, 0x10, &(0x7f0000000700)={0x3}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x218}, 0x90) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000001000)={0x2, 0x4, 0x8, 0x1, 0x80, r0, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x3}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x51, 0x10, &(0x7f0000000b00)=ANY=[@ANYBLOB="180100002020642500000000002020207b1af8ff0007010000f8ffffffb702000008000000b7030000010400008500000006000000182300"/68, @ANYRES32=r0, @ANYBLOB="000000001b000000186a00000f000000000000000000f0ff18400000feffffff000000000000000065a7fcff100000007d29100001000000"], &(0x7f0000000e40)='syzkaller\x00', 0x5d11, 0x0, 0x0, 0x41000, 0x29, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, &(0x7f0000001080)=[r0, r2, r0], &(0x7f00000010c0)=[{0x2, 0x4, 0xd, 0x4}, {0x4, 0x2, 0xc, 0x3}], 0x10, 0x10001}, 0x90) (async, rerun: 64) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) (async, rerun: 64) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000e8f70000000000ff000044850000000e000000650000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r4}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0xf8, 0x0, 0x2, 0x0, 0x0, 0x4403a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x454, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001640)=@bloom_filter={0x1e, 0x7fff, 0xfffffff8, 0x7, 0x41, 0xffffffffffffffff, 0xf2, '\x00', 0x0, r0, 0x1, 0x4, 0x2, 0xa}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000001900)=ANY=[@ANYBLOB="ac893e07340bb598356b1c6def1e6641a03c4e3400aafef21016eca74cb19de94fc7d924fa4b015ceca74b5adec13c1ea2ffffffffffffffffdc85f520624d71020000003a3e5a41c9224b759de4b6ab4f5cb22eb589a4e6ce2a8d2e1d0164f78b7ca0a6f635f917ffd65a89c0c060b6c46237b43795ef443086e89447d96cf66ad7ee28431a3e837ffe3e991c82411fc8c853f0fa494bd4485842c050e167bf68913dbd6d4cf7c7556cf6d9e5de6db88f6c11d2d36b32eb8ca02ca45d758ec8f89147529df2c226f2b331d2e1a2aaeb", @ANYRESDEC=r6, @ANYBLOB="0000000900000000b7020000030000008500000086000000329c660f90ec15d8bc755c4d95"], &(0x7f0000000600)='syzkaller\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x90) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) (async, rerun: 32) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200)=0x8, 0x12) (async, rerun: 32) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000580)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x44, 0x44, 0x2, [@enum={0x4, 0x4, 0x0, 0x6, 0x4, [{}, {0x3, 0x4}, {0x4, 0x7f}, {0xa, 0x5}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2}}]}}, &(0x7f0000000000)=""/144, 0x5e, 0x90, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000dc0)={0xffffffffffffffff, 0xe0, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000540)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0xf, &(0x7f0000000680)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x83, &(0x7f0000000a00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000640), &(0x7f0000000ac0), 0x8, 0xd8, 0x8, 0x8, &(0x7f0000000d80)}}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001580)={0x6, 0x19, &(0x7f00000017c0)=ANY=[@ANYBLOB="1800000002000000000000000700000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000851000000300000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000085200000020000008500000022000000bf91200000000000b7020000010000008500000085000000b7000000000000009500000000000000daa51a887deed3423333783f69f5d49b4badd828d223bd5b7f554c43cdcae67225cf7abb066aa06b0e2fed9b76bd5fd8956271fad22ea942a830257ecdf8d326b2c625b4a1fa06b2ec1ec35b31dabae581ac27d64d6b00242fa18e9118a321a84c839871044290a2545c5bf1bc"], &(0x7f0000000480)='GPL\x00', 0x9, 0xfc, &(0x7f0000000bc0)=""/252, 0x0, 0x1, '\x00', r9, 0x25, r8, 0x8, &(0x7f0000000e00)={0xa, 0x4}, 0x8, 0x10, &(0x7f0000000fc0)={0x4, 0x1, 0x80000001, 0xe2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfff}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x16, 0x8, 0x3, 0x1, 0x7a, 0x1, 0x0, '\x00', 0x0, r8, 0x0, 0x0, 0xa40b}, 0x48) (async) openat$cgroup_ro(r7, &(0x7f0000001280)='blkio.bfq.io_wait_time_recursive\x00', 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x73fc}, [@generic={0x9, 0x0, 0x0, 0x0, 0x200}]}, &(0x7f0000000880)='GPL\x00', 0x1f, 0x93, &(0x7f0000000cc0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x9}, 0x8}, 0x80) (async) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={r7, 0x20, &(0x7f0000000400)={&(0x7f00000003c0)=""/40, 0x28, 0x0, &(0x7f0000001380)=""/174, 0xae}}, 0x10) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x1d, 0x4, 0x4, 0x8}, 0x48) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9, 0x0, r10}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x7, 0x5, &(0x7f00000000c0)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x79, 0x10, 0xa8}, [@map_fd={0x18, 0x0, 0x1, 0x0, r11}]}, &(0x7f0000000000)='GPL\x00'}, 0x80) (async, rerun: 64) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) (rerun: 64) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000080), 0x10) 541.671716ms ago: executing program 1 (id=13115): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0xffffffd9) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) (async) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x4}, 0x0, 0x0, 0x6, 0x0, 0x0, 0xfffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x2000) (async) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000180), 0x2000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000400)='track_foreign_dirty\x00', r0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000880)={0x9}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000940)={0x0, 0x1, 0x10}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2b6875676574f6d1202b637075202b706572578920b71ee3f24f"], 0x1a) (async) write$cgroup_subtree(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2b6875676574f6d1202b637075202b706572578920b71ee3f24f"], 0x1a) r2 = openat$cgroup_procs(r1, &(0x7f0000000300)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000580), 0x12) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x12) write$cgroup_int(r1, &(0x7f0000000100), 0x1001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='scsi_eh_wakeup\x00', r3}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='scsi_eh_wakeup\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000640)=@generic={&(0x7f0000000480)='./file0\x00', r4}, 0x18) (async) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000640)=@generic={&(0x7f0000000480)='./file0\x00', r4}, 0x18) 541.166316ms ago: executing program 4 (id=13116): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x19, &(0x7f0000000100)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@btf_id={0x18, 0x0, 0x3, 0x0, 0x4}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffd}, @ldst={0x3, 0x0, 0x3, 0x9, 0xb, 0xfffffffffffffff0, 0x10}, @tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000040)='syzkaller\x00', 0xa2c, 0xd9, &(0x7f0000000580)=""/217, 0x40f00, 0x16, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000002c0)={0x8, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000680)=[{0x1, 0x4, 0x7, 0x9}, {0x2, 0x3, 0xe, 0xb}, {0x5, 0x2, 0xd, 0xa}, {0x5, 0x1, 0x10, 0x4}, {0x3, 0x3, 0x7, 0xb}, {0x1, 0x1, 0x8}], 0x10, 0x100}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000300)=ANY=[@ANYRES16, @ANYRES32=0x0, @ANYRESOCT], &(0x7f0000000340)='syzkaller\x00', 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0x25, 0x0, &(0x7f0000000440)="b9ff03316844268cb89e14f0080047e0ffff001240000e33195d69eb4b631177fbac141416e000030a44080503fe800001050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699e8fa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff400"/261, 0x0, 0xfe, 0x60000000, 0x0, 0xa4, &(0x7f0000000000), &(0x7f0000000380)="e163f83aef31263323589c2ff4d8309bf11127fb080fadc75014fad34894f2755ca6f4f5c1e09b2d1eee9ff2df1ed9c4e3693e5f5b30bdb5ebbecbdf35c6923de979fe5057283b45683837d0ec535dabd6c5ce3fbb922e12ed48a5b1b2b0bb665381e3b40c0343dfa11f3d9cefee8c934bb3ee752e68ed6b676ae39dbdd9c505c209cf5c092c0fe0c79c98075b317960f1bc869b3ab7f96200d2045c1b5fe73e6124764d"}, 0x16) 528.191637ms ago: executing program 4 (id=13117): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000400)=ANY=[@ANYBLOB="18010000004bc311ec8200000075000000a7000000080000009500000000000000799c529f"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) r2 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0x3, 0x3f, 0x20, 0x8, 0x0, 0x5, 0x182, 0x5, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x448, 0x10000, 0x0, 0x1, 0x62, 0x2, 0x5, 0x0, 0x7fff, 0x0, 0xd36}, r0, 0xb, r0, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000240)='R-\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000980)='jbd2_handle_stats\x00', r1}, 0x10) (async) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000880)='memory.events.local\x00', 0x100002, 0x0) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0x9, 0x3f, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000500), &(0x7f0000000140), 0x1000, r4}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000580)={0x0, 0x0, 0xffffffffffffffff, 0x0, 0x5, r4}, 0x38) (async) r5 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x773}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) (async) r6 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r6, 0x30, 0x25, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) (async) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000580)={0x0, 0x0}, 0x8) openat$cgroup_ro(r5, &(0x7f0000000200)='blkio.bfq.idle_time\x00', 0x0, 0x0) (async) perf_event_open(&(0x7f0000000bc0)={0xb, 0x80, 0xdf, 0x3f, 0x7, 0x5, 0x0, 0xd34, 0x1, 0xf, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x4, 0x2, @perf_config_ext={0x7b, 0xeb48}, 0x28, 0x6a7, 0x2, 0x6, 0x39, 0x2e, 0x31, 0x0, 0x2, 0x0, 0x7}, 0x0, 0x6, 0xffffffffffffffff, 0x0) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000008c0)={r6, 0x0, 0x85, 0x0, &(0x7f00000005c0)="04fda172b4008b78403cd4a64913c7e41ed13baa7b31cfc2e3d9cba50ba99d323b8ee125acb3263a715b611b43a504dc37ab2821383c72d784fa742784bf0b99953aab491684da311d5c836528b785cbb2248efecee96264d8c77c0959385fb34ccd94ad97b37ac8ece3cc716050ff1afe30dcc9de32c196bed0169977e4096b517fc254fe", 0x0, 0x5, 0x0, 0x0, 0x99, 0x0, &(0x7f00000007c0)="17ad0fa955cb3bac559e55191656c6ca0e4357afe3355ec05b806d423daa4ffe9ba3952072d7fe383c7cb3643d3c27a5f4aaf563cee0921cb30b8601c5d9d3983d1b93e1fe9d8e34f8edcc60c0331f449c3fa6e1d9ca3bf7c63563c2d5ea9bdda2797ef9c358e7632d6095abb561367629d325f94b8772eff1479108075363210cbafb7716d74e2c660a79f59c1e91454ad4817f0caac48dbb", 0x3}, 0x50) (async) r8 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000010c0)=r7, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000000)={r8, r6, 0x4, r6}, 0x10) r9 = getpid() perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x1}}, r9, 0x0, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000a80)={0x0, 0x80, 0x1, 0x20, 0x8, 0xff, 0x0, 0xf404, 0x80000, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x3, 0xff}, 0x10000, 0x8, 0x0, 0x8, 0x850, 0x8001, 0x80, 0x0, 0x93, 0x0, 0xfffffffffffffffb}, r9, 0xb, 0xffffffffffffffff, 0x2) (async) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x7fffffffffffffff) (async) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map=r3, r1, 0x16, 0x21, r0, @link_fd=r8}, 0x20) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x4, 0x3}, 0x48) (async) r11 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000540)={r11, r10}, 0xc) (async) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r11, 0x8, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) 527.790627ms ago: executing program 3 (id=13118): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x201c02, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='mm_page_alloc\x00', r4}, 0x10) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x2, 0x4, 0x2300, 0x2}, 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000016c0)={0x0, &(0x7f0000000040)=""/38, &(0x7f0000000380), &(0x7f00000006c0), 0x1, r5}, 0x38) (async) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f00000006c0)=ANY=[@ANYBLOB="8f03000000000060007538e486dd630ace2200092f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa000022eb"], 0xcfa4) 527.193617ms ago: executing program 0 (id=13119): openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYRESHEX=r2, @ANYRES32=r1], 0x1d) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.empty_time\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffe17) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r6}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000055"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 516.049228ms ago: executing program 2 (id=13120): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) (async, rerun: 32) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) (async, rerun: 32) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xe, 0x4, 0x4, 0x5}, 0x48) (rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='ext4_ext_remove_space_done\x00', r2}, 0x10) (async) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) (async, rerun: 64) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) (rerun: 64) r6 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x5, 0x5, 0x6, 0x0, 0x8001, 0x10, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000000240), 0x3}, 0x1900, 0x6, 0x5714, 0x7, 0x136d, 0x89, 0xba4, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xe, r0, 0x8) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x4) (async) socketpair$unix(0x2, 0x0, 0x0, 0x0) (async, rerun: 64) perf_event_open(&(0x7f0000002180)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x5, 0xffffffffffffffff, 0x0) (async, rerun: 64) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x14, 0x28, &(0x7f0000000a40)=ANY=[@ANYBLOB="a419f8f142efc1a679060f50ef6aa9e43b11d341d2d2350c5b75a81d18000000050000000040000005000000188f0e56", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000065b70600efffffff82000000fcffffffb7080000000000007b8af8ff00000000b70800009e0500007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a5000000186000000d00000000000000eb0a000085100000f9ffffff186500000200000000000000fdffffffcf7020001000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7020000000000008500000086000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000400)='syzkaller\x00', 0x9, 0x13, &(0x7f0000000680)=""/19, 0x41100, 0x40, '\x00', 0x0, 0x33, r4, 0x8, &(0x7f00000006c0)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, r4, 0x2, &(0x7f00000008c0)=[r4, 0xffffffffffffffff, 0xffffffffffffffff, r1], &(0x7f0000000900)=[{0x4, 0x5, 0xa, 0x8}, {0x3, 0x2, 0xf, 0x6}], 0x10, 0xd4f}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x0, &(0x7f0000000380)=ANY=[@ANYRESOCT=r3, @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r8}, 0x10) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8, 0x1014}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000000)={r9, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x7, 0x8, 0x1014}, 0x48) (async) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x4, 0x4, 0x9}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f00000003c0)={r10, &(0x7f0000000300), 0x20000000}, 0x20) (async) close(r9) (async, rerun: 32) bpf$MAP_LOOKUP_ELEM(0x3, &(0x7f0000000300)={r10, &(0x7f0000000240), 0x0}, 0x20) (async, rerun: 32) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)) 460.914362ms ago: executing program 1 (id=13121): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x7, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000050001000000000095000000000000000500feff"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x80) socketpair(0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x58, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x6, 0x400, 0x7d2, 0x847, 0xffffffffffffffff, 0x8000, '\x00', r1, 0xffffffffffffffff, 0x0, 0x4, 0x5, 0xd}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7fffffff, 0x101, 0xe2b, 0x2224, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x5, 0xb}, 0x48) perf_event_open(&(0x7f00000000c0)={0x2, 0xfffffffffffffd08, 0x7f, 0xde, 0x0, 0x0, 0x0, 0x101, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x0, 0x1000000ffffffff, 0x2, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x3602e000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) openat$cgroup_ro(r2, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00'], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.swap.current\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r5}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x15) 460.071153ms ago: executing program 2 (id=13122): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000001c0)='ext4_da_reserve_space\x00', r2}, 0x10) write$cgroup_pid(r0, &(0x7f0000000580), 0x12) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r5}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 455.880942ms ago: executing program 3 (id=13123): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r2}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r1}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r4, 0x20e, 0xe40, 0xfd000004, &(0x7f00000004c0)="b9180bb76003070c009e40f086dd1fff290000003b0020010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7472ce0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4, &(0x7f0000000000), &(0x7f0000000000), 0x0, 0x2e00}, 0x28) 447.746573ms ago: executing program 1 (id=13124): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000001080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xcd, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x10) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000080000000000000000000181100", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_service_time\x00', 0x26e1, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020646c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) 146.382938ms ago: executing program 1 (id=13125): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRESHEX=0x0, @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001700)=@base={0x16, 0x0, 0xb161, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4, 0xffffffffffffffff}, 0x0, &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000200)={r5, 0x0, &(0x7f0000001780)=""/4096}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x20001410) ioctl$TUNSETOFFLOAD(r8, 0x80047441, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbb}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x1, 0x5, 0x9fd, 0x84}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f00000000c0), &(0x7f0000000240), 0x800, r9}, 0x38) bpf$MAP_LOOKUP_BATCH(0x19, &(0x7f0000000800)={0x0, &(0x7f0000000840)=""/121, 0x0, 0x0, 0x6c, r9}, 0x38) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000fcffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10], 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_free_inode\x00', r11}, 0x10) r12 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001b40)={&(0x7f0000000180)='ext4_free_inode\x00', r13}, 0x10) 59.486315ms ago: executing program 1 (id=13126): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r1) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x1a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) (async) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) (async) close(r1) (async) setsockopt$sock_attach_bpf(r2, 0x10f, 0x87, &(0x7f0000000180), 0x20000190) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x10, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x1a}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) (async) 55.015225ms ago: executing program 4 (id=13127): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2005000, 0x0, 0x300, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x2, 0x4, 0x7fe6, 0x3}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xf, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a655855", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) 795.909µs ago: executing program 3 (id=13128): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x100001, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000080), &(0x7f0000000200)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='signal_generate\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000800000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r6}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) perf_event_open(&(0x7f0000001080)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7602, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000009c0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced8468916d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d936b7a2127da79ac4d456c21519800bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646a18b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba7640861627a2e0a74b5e6aefb7eee403502734137ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65aa3aed506e80b562b236e11d22b4ff90539f6ff5da2efeaf51371b5c8b3d59ede89a4bd0c8569c590b8f3f6feadd04e382bc18b7d9d2ca0a80eb1c7177a4c15ee87e01e6cefa1fb8b8177846b33aabd897d96b9632fd6182d1e7528a3a67fd9c7eb6e4f1e532bae413678387d7994fac8eec3274eb5e5e34f438e82628622ed27b64d919d37dd23489156c320cbe50dc2f8ef0075e7c6752a339c1ebfadab6a6c72db8721a034"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r7, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 0s ago: executing program 1 (id=13129): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x0, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r3}, 0x10) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000006c0)={0x3, 0x80, 0x7, 0x5, 0xb, 0x2a, 0x0, 0x7, 0x80, 0x7, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000004c0)}, 0x0, 0xffffffff, 0x6, 0x2, 0x1, 0x6, 0x1, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000400)=@o_path={&(0x7f0000000380)='./file0\x00', r0, 0x4000, r6}, 0x18) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000500)={0x7}, 0x8) close(r4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xa, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000c80), 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r8}, &(0x7f0000000000), &(0x7f0000000280)=r2}, 0x20) kernel console output (not intermixed with test programs): ] ? convert___skb_to_skb+0x570/0x570 [ 626.027891][ T6509] ? eth_type_trans+0x2e4/0x620 [ 626.032577][ T6509] ? eth_get_headlen+0x240/0x240 [ 626.037350][ T6509] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 626.042755][ T6509] ? convert___skb_to_skb+0x44/0x570 [ 626.047960][ T6509] ? memcpy+0x56/0x70 [ 626.051851][ T6509] bpf_prog_test_run_skb+0xb6e/0x1410 [ 626.057069][ T6509] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 626.063033][ T6509] ? __kasan_check_write+0x14/0x20 [ 626.067964][ T6509] ? fput_many+0x160/0x1b0 [ 626.072215][ T6509] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 626.077947][ T6509] __se_sys_bpf+0x5235/0x11cb0 [ 626.082542][ T6509] ? stack_trace_save+0x113/0x1c0 [ 626.087402][ T6509] ? terminate_walk+0x407/0x4f0 [ 626.092093][ T6509] ? stack_trace_snprint+0xf0/0xf0 [ 626.097043][ T6509] ? kmem_cache_free+0xa9/0x1e0 [ 626.101724][ T6509] ? kmem_cache_free+0xa9/0x1e0 [ 626.106511][ T6509] ? kasan_set_track+0x5d/0x70 [ 626.111096][ T6509] ? kasan_set_track+0x4b/0x70 [ 626.115964][ T6509] ? kasan_set_free_info+0x23/0x40 [ 626.120907][ T6509] ? ____kasan_slab_free+0x121/0x160 [ 626.126024][ T6509] ? __kasan_slab_free+0x11/0x20 [ 626.130798][ T6509] ? __x64_sys_bpf+0x90/0x90 [ 626.135311][ T6509] ? do_sys_openat2+0x5e1/0x6f0 [ 626.139996][ T6509] ? __x64_sys_openat+0x243/0x290 [ 626.144859][ T6509] ? do_syscall_64+0x34/0x70 [ 626.149373][ T6509] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 626.155276][ T6509] ? _kstrtoull+0x3a0/0x4a0 [ 626.159630][ T6509] ? kstrtouint_from_user+0x20a/0x2a0 [ 626.164841][ T6509] ? kstrtol_from_user+0x310/0x310 [ 626.169774][ T6509] ? memset+0x35/0x40 [ 626.173593][ T6509] ? __fsnotify_parent+0x4b9/0x6c0 [ 626.178542][ T6509] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 626.185131][ T6509] ? proc_fail_nth_write+0x20b/0x290 [ 626.190258][ T6509] ? proc_fail_nth_read+0x210/0x210 [ 626.195288][ T6509] ? security_file_permission+0x86/0xb0 [ 626.200668][ T6509] ? rw_verify_area+0x1c3/0x360 [ 626.205353][ T6509] ? slab_free_freelist_hook+0xc0/0x190 [ 626.210740][ T6509] ? preempt_count_add+0x92/0x1a0 [ 626.215595][ T6509] ? vfs_write+0x854/0xe70 [ 626.219851][ T6509] ? kernel_write+0x3d0/0x3d0 [ 626.224542][ T6509] ? __kasan_check_write+0x14/0x20 [ 626.229489][ T6509] ? mutex_lock+0xa5/0x110 [ 626.233734][ T6509] ? mutex_trylock+0xa0/0xa0 [ 626.238166][ T6509] ? __kasan_check_write+0x14/0x20 [ 626.243112][ T6509] ? fput_many+0x160/0x1b0 [ 626.247374][ T6509] ? debug_smp_processor_id+0x17/0x20 [ 626.252571][ T6509] __x64_sys_bpf+0x7b/0x90 [ 626.256824][ T6509] do_syscall_64+0x34/0x70 [ 626.261080][ T6509] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 626.266803][ T6509] RIP: 0033:0x7fd6866f5bd9 [ 626.271066][ T6509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 626.290515][ T6509] RSP: 002b:00007fd685977048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 626.298743][ T6509] RAX: ffffffffffffffda RBX: 00007fd686883f60 RCX: 00007fd6866f5bd9 [ 626.306555][ T6509] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 626.314365][ T6509] RBP: 00007fd6859770a0 R08: 0000000000000000 R09: 0000000000000000 [ 626.322187][ T6509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 626.329991][ T6509] R13: 000000000000000b R14: 00007fd686883f60 R15: 00007ffe9e072da8 [ 626.578960][ T6542] syz.4.11789[6542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.579007][ T6542] syz.4.11789[6542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 626.706335][ T6532] device pim6reg1 entered promiscuous mode [ 628.157309][ T6610] device sit0 left promiscuous mode [ 628.412682][ T6611] device sit0 entered promiscuous mode [ 628.906847][ T6644] device syzkaller0 entered promiscuous mode [ 628.956859][ T6652] syz.1.11822[6652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.956925][ T6652] syz.1.11822[6652] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 629.095043][ T6652] device wg2 entered promiscuous mode [ 630.304515][ T6720] device syzkaller0 entered promiscuous mode [ 631.221221][ T6804] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0603:0000:0023 with DS=0x3f [ 631.329355][ T6818] FAULT_INJECTION: forcing a failure. [ 631.329355][ T6818] name failslab, interval 1, probability 0, space 0, times 0 [ 631.341927][ T6818] CPU: 0 PID: 6818 Comm: syz.3.11867 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 631.353184][ T6818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 631.363072][ T6818] Call Trace: [ 631.366207][ T6818] dump_stack_lvl+0x1e2/0x24b [ 631.370717][ T6818] ? panic+0x812/0x812 [ 631.374174][ T6820] syz.0.11868[6820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.374623][ T6818] ? slab_post_alloc_hook+0x80/0x2f0 [ 631.374682][ T6820] syz.0.11868[6820] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 631.385824][ T6818] ? bfq_pos_tree_add_move+0x43b/0x43b [ 631.385836][ T6818] ? __kasan_check_write+0x14/0x20 [ 631.385846][ T6818] dump_stack+0x15/0x17 [ 631.385855][ T6818] should_fail+0x3c6/0x510 [ 631.385880][ T6818] ? skb_clone+0x1de/0x370 [ 631.424886][ T6818] __should_failslab+0xa4/0xe0 [ 631.429474][ T6818] should_failslab+0x9/0x20 [ 631.433808][ T6818] kmem_cache_alloc+0x3d/0x2e0 [ 631.438496][ T6818] ? __bpf_redirect+0x673/0xde0 [ 631.443184][ T6818] skb_clone+0x1de/0x370 [ 631.447260][ T6818] bpf_clone_redirect+0xa6/0x390 [ 631.452040][ T6818] bpf_prog_64e505a7b7f97a05+0x55/0x7c4 [ 631.457427][ T6818] ? __kasan_slab_alloc+0xc3/0xe0 [ 631.462286][ T6818] ? __kasan_slab_alloc+0xb1/0xe0 [ 631.467136][ T6818] ? slab_post_alloc_hook+0x61/0x2f0 [ 631.472258][ T6818] ? kmem_cache_alloc+0x168/0x2e0 [ 631.477119][ T6818] ? __build_skb+0x2a/0x300 [ 631.481456][ T6818] ? build_skb+0x25/0x1e0 [ 631.485630][ T6818] ? bpf_prog_test_run_skb+0x388/0x1410 [ 631.491008][ T6818] ? __se_sys_bpf+0x5235/0x11cb0 [ 631.495779][ T6818] ? __x64_sys_bpf+0x7b/0x90 [ 631.500207][ T6818] ? do_syscall_64+0x34/0x70 [ 631.504633][ T6818] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 631.510546][ T6818] ? __kasan_check_read+0x11/0x20 [ 631.515395][ T6818] ? bpf_test_timer_continue+0x140/0x440 [ 631.520869][ T6818] bpf_test_run+0x40b/0xc20 [ 631.525206][ T6818] ? convert___skb_to_skb+0x570/0x570 [ 631.530416][ T6818] ? eth_type_trans+0x2e4/0x620 [ 631.535097][ T6818] ? eth_get_headlen+0x240/0x240 [ 631.539872][ T6818] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 631.545251][ T6818] ? convert___skb_to_skb+0x44/0x570 [ 631.550375][ T6818] ? memcpy+0x56/0x70 [ 631.554192][ T6818] bpf_prog_test_run_skb+0xb6e/0x1410 [ 631.559406][ T6818] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 631.565131][ T6818] ? __kasan_check_write+0x14/0x20 [ 631.570079][ T6818] ? fput_many+0x160/0x1b0 [ 631.574331][ T6818] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 631.580060][ T6818] __se_sys_bpf+0x5235/0x11cb0 [ 631.584663][ T6818] ? stack_trace_save+0x113/0x1c0 [ 631.589520][ T6818] ? terminate_walk+0x407/0x4f0 [ 631.594210][ T6818] ? stack_trace_snprint+0xf0/0xf0 [ 631.599159][ T6818] ? kmem_cache_free+0xa9/0x1e0 [ 631.603841][ T6818] ? kmem_cache_free+0xa9/0x1e0 [ 631.608529][ T6818] ? kasan_set_track+0x5d/0x70 [ 631.613132][ T6818] ? kasan_set_track+0x4b/0x70 [ 631.617729][ T6818] ? kasan_set_free_info+0x23/0x40 [ 631.622674][ T6818] ? ____kasan_slab_free+0x121/0x160 [ 631.627796][ T6818] ? __kasan_slab_free+0x11/0x20 [ 631.632570][ T6818] ? __x64_sys_bpf+0x90/0x90 [ 631.637000][ T6818] ? do_sys_openat2+0x5e1/0x6f0 [ 631.641683][ T6818] ? __x64_sys_openat+0x243/0x290 [ 631.646544][ T6818] ? do_syscall_64+0x34/0x70 [ 631.650970][ T6818] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 631.656873][ T6818] ? _kstrtoull+0x3a0/0x4a0 [ 631.661210][ T6818] ? kstrtouint_from_user+0x20a/0x2a0 [ 631.666418][ T6818] ? kstrtol_from_user+0x310/0x310 [ 631.671366][ T6818] ? strncpy_from_user_nofault+0xed/0x150 [ 631.676920][ T6818] ? memset+0x35/0x40 [ 631.680741][ T6818] ? __fsnotify_parent+0x4b9/0x6c0 [ 631.685688][ T6818] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 631.692281][ T6818] ? proc_fail_nth_write+0x20b/0x290 [ 631.697403][ T6818] ? proc_fail_nth_read+0x210/0x210 [ 631.702440][ T6818] ? security_file_permission+0x86/0xb0 [ 631.707820][ T6818] ? rw_verify_area+0x1c3/0x360 [ 631.712509][ T6818] ? preempt_count_add+0x92/0x1a0 [ 631.717372][ T6818] ? vfs_write+0x854/0xe70 [ 631.721622][ T6818] ? kernel_write+0x3d0/0x3d0 [ 631.726140][ T6818] ? __kasan_check_write+0x14/0x20 [ 631.731080][ T6818] ? mutex_lock+0xa5/0x110 [ 631.735330][ T6818] ? mutex_trylock+0xa0/0xa0 [ 631.739761][ T6818] ? __kasan_check_write+0x14/0x20 [ 631.744709][ T6818] ? fput_many+0x160/0x1b0 [ 631.748966][ T6818] ? debug_smp_processor_id+0x17/0x20 [ 631.754168][ T6818] __x64_sys_bpf+0x7b/0x90 [ 631.758429][ T6818] do_syscall_64+0x34/0x70 [ 631.762676][ T6818] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 631.768401][ T6818] RIP: 0033:0x7f4e48324bd9 [ 631.772655][ T6818] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 631.792100][ T6818] RSP: 002b:00007f4e475a6048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 631.800341][ T6818] RAX: ffffffffffffffda RBX: 00007f4e484b2f60 RCX: 00007f4e48324bd9 [ 631.808153][ T6818] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 631.815962][ T6818] RBP: 00007f4e475a60a0 R08: 0000000000000000 R09: 0000000000000000 [ 631.823778][ T6818] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 631.831585][ T6818] R13: 000000000000000b R14: 00007f4e484b2f60 R15: 00007fffe8787f98 [ 631.886669][ T6822] device syzkaller0 entered promiscuous mode [ 631.895580][ T6825] device wg2 left promiscuous mode [ 631.915264][ T6825] device wg2 entered promiscuous mode [ 632.139896][ T6843] device syzkaller0 entered promiscuous mode [ 632.308529][ T6881] device pim6reg1 entered promiscuous mode [ 632.896915][ T6912] device pim6reg1 entered promiscuous mode [ 633.395843][ T6948] syz.3.11907[6948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.395894][ T6948] syz.3.11907[6948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.408304][ T6948] syz.3.11907[6948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.419862][ T6948] syz.3.11907[6948] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 633.509730][ T6968] FAULT_INJECTION: forcing a failure. [ 633.509730][ T6968] name failslab, interval 1, probability 0, space 0, times 0 [ 633.533454][ T6968] CPU: 1 PID: 6968 Comm: syz.2.11918 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 633.544527][ T6968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 633.554411][ T6968] Call Trace: [ 633.557547][ T6968] dump_stack_lvl+0x1e2/0x24b [ 633.562053][ T6968] ? panic+0x812/0x812 [ 633.565956][ T6968] ? slab_post_alloc_hook+0x80/0x2f0 [ 633.571075][ T6968] ? bfq_pos_tree_add_move+0x43b/0x43b [ 633.576369][ T6968] ? __kasan_check_write+0x14/0x20 [ 633.581317][ T6968] dump_stack+0x15/0x17 [ 633.585307][ T6968] should_fail+0x3c6/0x510 [ 633.589564][ T6968] ? skb_clone+0x1de/0x370 [ 633.593816][ T6968] __should_failslab+0xa4/0xe0 [ 633.598416][ T6968] should_failslab+0x9/0x20 [ 633.602757][ T6968] kmem_cache_alloc+0x3d/0x2e0 [ 633.607358][ T6968] ? __bpf_redirect+0x673/0xde0 [ 633.612135][ T6968] skb_clone+0x1de/0x370 [ 633.616208][ T6968] bpf_clone_redirect+0xa6/0x390 [ 633.620986][ T6968] bpf_prog_64e505a7b7f97a05+0x55/0x71c [ 633.626363][ T6968] ? __kasan_slab_alloc+0xc3/0xe0 [ 633.631222][ T6968] ? __kasan_slab_alloc+0xb1/0xe0 [ 633.636083][ T6968] ? slab_post_alloc_hook+0x61/0x2f0 [ 633.641207][ T6968] ? kmem_cache_alloc+0x168/0x2e0 [ 633.646064][ T6968] ? __build_skb+0x2a/0x300 [ 633.650406][ T6968] ? build_skb+0x25/0x1e0 [ 633.654577][ T6968] ? bpf_prog_test_run_skb+0x388/0x1410 [ 633.659953][ T6968] ? __se_sys_bpf+0x5235/0x11cb0 [ 633.664725][ T6968] ? __x64_sys_bpf+0x7b/0x90 [ 633.669154][ T6968] ? do_syscall_64+0x34/0x70 [ 633.673581][ T6968] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 633.679515][ T6968] ? __kasan_check_read+0x11/0x20 [ 633.684341][ T6968] ? bpf_test_timer_continue+0x140/0x440 [ 633.689813][ T6968] bpf_test_run+0x40b/0xc20 [ 633.694153][ T6968] ? convert___skb_to_skb+0x570/0x570 [ 633.699358][ T6968] ? eth_type_trans+0x2e4/0x620 [ 633.704045][ T6968] ? eth_get_headlen+0x240/0x240 [ 633.708820][ T6968] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 633.714203][ T6968] ? convert___skb_to_skb+0x44/0x570 [ 633.719322][ T6968] ? memcpy+0x56/0x70 [ 633.723138][ T6968] bpf_prog_test_run_skb+0xb6e/0x1410 [ 633.728351][ T6968] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 633.734083][ T6968] ? __kasan_check_write+0x14/0x20 [ 633.739023][ T6968] ? fput_many+0x160/0x1b0 [ 633.743275][ T6968] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 633.749005][ T6968] __se_sys_bpf+0x5235/0x11cb0 [ 633.753605][ T6968] ? stack_trace_save+0x113/0x1c0 [ 633.758469][ T6968] ? terminate_walk+0x407/0x4f0 [ 633.763154][ T6968] ? stack_trace_snprint+0xf0/0xf0 [ 633.768101][ T6968] ? kmem_cache_free+0xa9/0x1e0 [ 633.772785][ T6968] ? kmem_cache_free+0xa9/0x1e0 [ 633.777471][ T6968] ? kasan_set_track+0x5d/0x70 [ 633.782073][ T6968] ? kasan_set_track+0x4b/0x70 [ 633.786672][ T6968] ? kasan_set_free_info+0x23/0x40 [ 633.791621][ T6968] ? ____kasan_slab_free+0x121/0x160 [ 633.796754][ T6968] ? __kasan_slab_free+0x11/0x20 [ 633.801517][ T6968] ? __x64_sys_bpf+0x90/0x90 [ 633.805940][ T6968] ? do_sys_openat2+0x5e1/0x6f0 [ 633.810627][ T6968] ? __x64_sys_openat+0x243/0x290 [ 633.815490][ T6968] ? do_syscall_64+0x34/0x70 [ 633.819915][ T6968] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 633.825818][ T6968] ? _kstrtoull+0x3a0/0x4a0 [ 633.830158][ T6968] ? kstrtouint_from_user+0x20a/0x2a0 [ 633.835372][ T6968] ? kstrtol_from_user+0x310/0x310 [ 633.840320][ T6968] ? memset+0x35/0x40 [ 633.844137][ T6968] ? __fsnotify_parent+0x4b9/0x6c0 [ 633.849195][ T6968] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 633.855796][ T6968] ? proc_fail_nth_write+0x20b/0x290 [ 633.860907][ T6968] ? proc_fail_nth_read+0x210/0x210 [ 633.865935][ T6968] ? security_file_permission+0x86/0xb0 [ 633.871322][ T6968] ? rw_verify_area+0x1c3/0x360 [ 633.876005][ T6968] ? slab_free_freelist_hook+0xc0/0x190 [ 633.881391][ T6968] ? preempt_count_add+0x92/0x1a0 [ 633.886333][ T6968] ? vfs_write+0x854/0xe70 [ 633.890588][ T6968] ? kernel_write+0x3d0/0x3d0 [ 633.895097][ T6968] ? __kasan_check_write+0x14/0x20 [ 633.900052][ T6968] ? mutex_lock+0xa5/0x110 [ 633.904296][ T6968] ? mutex_trylock+0xa0/0xa0 [ 633.908724][ T6968] ? __kasan_check_write+0x14/0x20 [ 633.913689][ T6968] ? fput_many+0x160/0x1b0 [ 633.917927][ T6968] ? debug_smp_processor_id+0x17/0x20 [ 633.923136][ T6968] __x64_sys_bpf+0x7b/0x90 [ 633.927384][ T6968] do_syscall_64+0x34/0x70 [ 633.931643][ T6968] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 633.937360][ T6968] RIP: 0033:0x7f142ce6fbd9 [ 633.941620][ T6968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 633.961182][ T6968] RSP: 002b:00007f142c0f1048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 633.969419][ T6968] RAX: ffffffffffffffda RBX: 00007f142cffdf60 RCX: 00007f142ce6fbd9 [ 633.977230][ T6968] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 633.985041][ T6968] RBP: 00007f142c0f10a0 R08: 0000000000000000 R09: 0000000000000000 [ 633.992857][ T6968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 634.000663][ T6968] R13: 000000000000000b R14: 00007f142cffdf60 R15: 00007ffdb5120048 [ 634.108491][ T6987] bridge0: port 3(vlan1) entered blocking state [ 634.114586][ T6987] bridge0: port 3(vlan1) entered disabled state [ 634.127016][ T6987] device vlan1 entered promiscuous mode [ 634.133273][ T6987] bridge0: port 3(vlan1) entered blocking state [ 634.139358][ T6987] bridge0: port 3(vlan1) entered forwarding state [ 634.189648][ T7004] FAULT_INJECTION: forcing a failure. [ 634.189648][ T7004] name failslab, interval 1, probability 0, space 0, times 0 [ 634.202148][ T7004] CPU: 1 PID: 7004 Comm: syz.1.11930 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 634.213674][ T7004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 634.223562][ T7004] Call Trace: [ 634.226701][ T7004] dump_stack_lvl+0x1e2/0x24b [ 634.231210][ T7004] ? bfq_pos_tree_add_move+0x43b/0x43b [ 634.236512][ T7004] dump_stack+0x15/0x17 [ 634.240511][ T7004] should_fail+0x3c6/0x510 [ 634.244761][ T7004] ? skb_ensure_writable+0x2d0/0x440 [ 634.249874][ T7004] __should_failslab+0xa4/0xe0 [ 634.254469][ T7004] should_failslab+0x9/0x20 [ 634.258816][ T7004] __kmalloc_track_caller+0x5f/0x320 [ 634.263930][ T7004] ? skb_ensure_writable+0x2d0/0x440 [ 634.269055][ T7004] pskb_expand_head+0x12b/0x1180 [ 634.273832][ T7004] ? __kasan_check_write+0x14/0x20 [ 634.278777][ T7004] skb_ensure_writable+0x2d0/0x440 [ 634.283719][ T7004] bpf_clone_redirect+0x117/0x390 [ 634.288581][ T7004] bpf_prog_64e505a7b7f97a05+0x55/0x190 [ 634.293960][ T7004] ? __kasan_slab_alloc+0xc3/0xe0 [ 634.298820][ T7004] ? __kasan_slab_alloc+0xb1/0xe0 [ 634.303799][ T7004] ? slab_post_alloc_hook+0x61/0x2f0 [ 634.308896][ T7004] ? kmem_cache_alloc+0x168/0x2e0 [ 634.313752][ T7004] ? __build_skb+0x2a/0x300 [ 634.318084][ T7004] ? build_skb+0x25/0x1e0 [ 634.322256][ T7004] ? bpf_prog_test_run_skb+0x388/0x1410 [ 634.327637][ T7004] ? __se_sys_bpf+0x5235/0x11cb0 [ 634.332406][ T7004] ? __x64_sys_bpf+0x7b/0x90 [ 634.336836][ T7004] ? do_syscall_64+0x34/0x70 [ 634.341272][ T7004] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 634.347171][ T7004] ? __kasan_check_read+0x11/0x20 [ 634.352024][ T7004] ? bpf_test_timer_continue+0x140/0x440 [ 634.357498][ T7004] bpf_test_run+0x40b/0xc20 [ 634.361834][ T7004] ? convert___skb_to_skb+0x570/0x570 [ 634.367036][ T7004] ? eth_type_trans+0x2e4/0x620 [ 634.371728][ T7004] ? eth_get_headlen+0x240/0x240 [ 634.376673][ T7004] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 634.382054][ T7004] ? convert___skb_to_skb+0x44/0x570 [ 634.387174][ T7004] ? memcpy+0x56/0x70 [ 634.390994][ T7004] bpf_prog_test_run_skb+0xb6e/0x1410 [ 634.396210][ T7004] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 634.401931][ T7004] ? __kasan_check_write+0x14/0x20 [ 634.406877][ T7004] ? fput_many+0x160/0x1b0 [ 634.411131][ T7004] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 634.416946][ T7004] __se_sys_bpf+0x5235/0x11cb0 [ 634.421547][ T7004] ? stack_trace_save+0x113/0x1c0 [ 634.426408][ T7004] ? terminate_walk+0x407/0x4f0 [ 634.431094][ T7004] ? stack_trace_snprint+0xf0/0xf0 [ 634.436042][ T7004] ? kmem_cache_free+0xa9/0x1e0 [ 634.440727][ T7004] ? kmem_cache_free+0xa9/0x1e0 [ 634.445413][ T7004] ? kasan_set_track+0x5d/0x70 [ 634.450011][ T7004] ? kasan_set_track+0x4b/0x70 [ 634.454614][ T7004] ? kasan_set_free_info+0x23/0x40 [ 634.459562][ T7004] ? ____kasan_slab_free+0x121/0x160 [ 634.464681][ T7004] ? __kasan_slab_free+0x11/0x20 [ 634.469457][ T7004] ? __x64_sys_bpf+0x90/0x90 [ 634.473890][ T7004] ? do_sys_openat2+0x5e1/0x6f0 [ 634.478569][ T7004] ? __x64_sys_openat+0x243/0x290 [ 634.483468][ T7004] ? do_syscall_64+0x34/0x70 [ 634.487857][ T7004] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 634.493759][ T7004] ? _kstrtoull+0x3a0/0x4a0 [ 634.498101][ T7004] ? kstrtouint_from_user+0x20a/0x2a0 [ 634.503306][ T7004] ? kstrtol_from_user+0x310/0x310 [ 634.508254][ T7004] ? memset+0x35/0x40 [ 634.512073][ T7004] ? __fsnotify_parent+0x4b9/0x6c0 [ 634.517022][ T7004] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 634.523614][ T7004] ? proc_fail_nth_write+0x20b/0x290 [ 634.528743][ T7004] ? proc_fail_nth_read+0x210/0x210 [ 634.533770][ T7004] ? security_file_permission+0x86/0xb0 [ 634.539156][ T7004] ? rw_verify_area+0x1c3/0x360 [ 634.543836][ T7004] ? slab_free_freelist_hook+0xc0/0x190 [ 634.549221][ T7004] ? preempt_count_add+0x92/0x1a0 [ 634.554080][ T7004] ? vfs_write+0x854/0xe70 [ 634.558336][ T7004] ? kernel_write+0x3d0/0x3d0 [ 634.562849][ T7004] ? __kasan_check_write+0x14/0x20 [ 634.567792][ T7004] ? mutex_lock+0xa5/0x110 [ 634.572046][ T7004] ? mutex_trylock+0xa0/0xa0 [ 634.576474][ T7004] ? __kasan_check_write+0x14/0x20 [ 634.581421][ T7004] ? fput_many+0x160/0x1b0 [ 634.585764][ T7004] ? debug_smp_processor_id+0x17/0x20 [ 634.590970][ T7004] __x64_sys_bpf+0x7b/0x90 [ 634.595219][ T7004] do_syscall_64+0x34/0x70 [ 634.599474][ T7004] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 634.605202][ T7004] RIP: 0033:0x7fa4fc08cbd9 [ 634.609456][ T7004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 634.628895][ T7004] RSP: 002b:00007fa4fb30e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 634.637143][ T7004] RAX: ffffffffffffffda RBX: 00007fa4fc21af60 RCX: 00007fa4fc08cbd9 [ 634.645473][ T7004] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 634.653282][ T7004] RBP: 00007fa4fb30e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 634.661096][ T7004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 634.668908][ T7004] R13: 000000000000000b R14: 00007fa4fc21af60 R15: 00007ffd93cd84d8 [ 634.840978][ T7026] syz.4.11937[7026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.844206][ T7026] syz.4.11937[7026] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.947567][ T7049] device syzkaller0 entered promiscuous mode [ 635.842228][ T7139] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.849400][ T7139] bridge0: port 1(bridge_slave_0) entered disabled state [ 635.856648][ T7139] device bridge_slave_0 entered promiscuous mode [ 635.868351][ T7139] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.875362][ T7139] bridge0: port 2(bridge_slave_1) entered disabled state [ 635.883005][ T7139] device bridge_slave_1 entered promiscuous mode [ 635.935879][ T7139] bridge0: port 2(bridge_slave_1) entered blocking state [ 635.942860][ T7139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 635.949950][ T7139] bridge0: port 1(bridge_slave_0) entered blocking state [ 635.956718][ T7139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 635.984925][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 635.996935][ T598] bridge0: port 1(bridge_slave_0) entered disabled state [ 636.005603][ T598] bridge0: port 2(bridge_slave_1) entered disabled state [ 636.019442][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 636.030364][ T601] bridge0: port 1(bridge_slave_0) entered blocking state [ 636.037207][ T601] bridge0: port 1(bridge_slave_0) entered forwarding state [ 636.044935][ T601] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 636.053834][ T601] bridge0: port 2(bridge_slave_1) entered blocking state [ 636.060702][ T601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 636.083429][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 636.091336][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 636.108398][T10564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 636.121487][ T759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 636.129948][ T759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 636.137604][ T759] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 636.146188][ T7139] device veth0_vlan entered promiscuous mode [ 636.158889][ T759] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 636.170353][ T7139] device veth1_macvtap entered promiscuous mode [ 636.188541][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 636.199126][ T759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 636.657568][ T7207] device syzkaller0 entered promiscuous mode [ 636.809476][ T7] device veth1_macvtap left promiscuous mode [ 636.815353][ T7] device veth0_vlan left promiscuous mode [ 637.046459][ T7253] FAULT_INJECTION: forcing a failure. [ 637.046459][ T7253] name failslab, interval 1, probability 0, space 0, times 0 [ 637.059158][ T7253] CPU: 0 PID: 7253 Comm: syz.3.12006 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 637.070333][ T7253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 637.080213][ T7253] Call Trace: [ 637.083351][ T7253] dump_stack_lvl+0x1e2/0x24b [ 637.087851][ T7253] ? panic+0x812/0x812 [ 637.091761][ T7253] ? slab_post_alloc_hook+0x80/0x2f0 [ 637.096881][ T7253] ? bfq_pos_tree_add_move+0x43b/0x43b [ 637.102181][ T7253] ? __kasan_check_write+0x14/0x20 [ 637.107123][ T7253] dump_stack+0x15/0x17 [ 637.111116][ T7253] should_fail+0x3c6/0x510 [ 637.115369][ T7253] ? skb_clone+0x1de/0x370 [ 637.119622][ T7253] __should_failslab+0xa4/0xe0 [ 637.124224][ T7253] should_failslab+0x9/0x20 [ 637.128562][ T7253] kmem_cache_alloc+0x3d/0x2e0 [ 637.133162][ T7253] ? __bpf_redirect+0x673/0xde0 [ 637.137850][ T7253] skb_clone+0x1de/0x370 [ 637.141929][ T7253] bpf_clone_redirect+0xa6/0x390 [ 637.146705][ T7253] bpf_prog_64e505a7b7f97a05+0x55/0x714 [ 637.152086][ T7253] ? __kasan_slab_alloc+0xc3/0xe0 [ 637.156941][ T7253] ? __kasan_slab_alloc+0xb1/0xe0 [ 637.161804][ T7253] ? slab_post_alloc_hook+0x61/0x2f0 [ 637.166925][ T7253] ? kmem_cache_alloc+0x168/0x2e0 [ 637.171787][ T7253] ? __build_skb+0x2a/0x300 [ 637.176122][ T7253] ? build_skb+0x25/0x1e0 [ 637.180306][ T7253] ? bpf_prog_test_run_skb+0x388/0x1410 [ 637.185681][ T7253] ? __se_sys_bpf+0x5235/0x11cb0 [ 637.190444][ T7253] ? __x64_sys_bpf+0x7b/0x90 [ 637.194958][ T7253] ? do_syscall_64+0x34/0x70 [ 637.199385][ T7253] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 637.205308][ T7253] ? __kasan_check_read+0x11/0x20 [ 637.210151][ T7253] ? bpf_test_timer_continue+0x140/0x440 [ 637.215621][ T7253] bpf_test_run+0x40b/0xc20 [ 637.219958][ T7253] ? convert___skb_to_skb+0x570/0x570 [ 637.225165][ T7253] ? eth_type_trans+0x2e4/0x620 [ 637.229850][ T7253] ? eth_get_headlen+0x240/0x240 [ 637.234626][ T7253] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 637.240005][ T7253] ? convert___skb_to_skb+0x44/0x570 [ 637.245128][ T7253] ? memcpy+0x56/0x70 [ 637.248955][ T7253] bpf_prog_test_run_skb+0xb6e/0x1410 [ 637.254159][ T7253] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 637.259884][ T7253] ? __kasan_check_write+0x14/0x20 [ 637.264831][ T7253] ? fput_many+0x160/0x1b0 [ 637.269084][ T7253] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 637.274817][ T7253] __se_sys_bpf+0x5235/0x11cb0 [ 637.279413][ T7253] ? stack_trace_save+0x113/0x1c0 [ 637.284271][ T7253] ? terminate_walk+0x407/0x4f0 [ 637.288958][ T7253] ? stack_trace_snprint+0xf0/0xf0 [ 637.293913][ T7253] ? kmem_cache_free+0xa9/0x1e0 [ 637.298679][ T7253] ? kmem_cache_free+0xa9/0x1e0 [ 637.303368][ T7253] ? kasan_set_track+0x5d/0x70 [ 637.307965][ T7253] ? kasan_set_track+0x4b/0x70 [ 637.312563][ T7253] ? kasan_set_free_info+0x23/0x40 [ 637.317512][ T7253] ? ____kasan_slab_free+0x121/0x160 [ 637.322635][ T7253] ? __kasan_slab_free+0x11/0x20 [ 637.327411][ T7253] ? __x64_sys_bpf+0x90/0x90 [ 637.331831][ T7253] ? do_sys_openat2+0x5e1/0x6f0 [ 637.336522][ T7253] ? __x64_sys_openat+0x243/0x290 [ 637.341381][ T7253] ? do_syscall_64+0x34/0x70 [ 637.345811][ T7253] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 637.351714][ T7253] ? _kstrtoull+0x3a0/0x4a0 [ 637.356052][ T7253] ? kstrtouint_from_user+0x20a/0x2a0 [ 637.361261][ T7253] ? kstrtol_from_user+0x310/0x310 [ 637.366204][ T7253] ? memset+0x35/0x40 [ 637.370024][ T7253] ? __fsnotify_parent+0x4b9/0x6c0 [ 637.374974][ T7253] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 637.381657][ T7253] ? proc_fail_nth_write+0x20b/0x290 [ 637.386793][ T7253] ? proc_fail_nth_read+0x210/0x210 [ 637.391822][ T7253] ? security_file_permission+0x86/0xb0 [ 637.397193][ T7253] ? rw_verify_area+0x1c3/0x360 [ 637.401879][ T7253] ? preempt_count_add+0x92/0x1a0 [ 637.406753][ T7253] ? vfs_write+0x854/0xe70 [ 637.410992][ T7253] ? kernel_write+0x3d0/0x3d0 [ 637.415625][ T7253] ? __kasan_check_write+0x14/0x20 [ 637.420545][ T7253] ? mutex_lock+0xa5/0x110 [ 637.424787][ T7253] ? mutex_trylock+0xa0/0xa0 [ 637.429218][ T7253] ? __kasan_check_write+0x14/0x20 [ 637.434163][ T7253] ? fput_many+0x160/0x1b0 [ 637.438421][ T7253] ? debug_smp_processor_id+0x17/0x20 [ 637.443626][ T7253] __x64_sys_bpf+0x7b/0x90 [ 637.447878][ T7253] do_syscall_64+0x34/0x70 [ 637.452659][ T7253] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 637.458384][ T7253] RIP: 0033:0x7fdfe54a7bd9 [ 637.462635][ T7253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 637.482079][ T7253] RSP: 002b:00007fdfe4729048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 637.490533][ T7253] RAX: ffffffffffffffda RBX: 00007fdfe5635f60 RCX: 00007fdfe54a7bd9 [ 637.498295][ T7253] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 637.506094][ T7253] RBP: 00007fdfe47290a0 R08: 0000000000000000 R09: 0000000000000000 [ 637.513907][ T7253] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 637.521716][ T7253] R13: 000000000000000b R14: 00007fdfe5635f60 R15: 00007ffcec4491e8 [ 637.687059][ T7300] FAULT_INJECTION: forcing a failure. [ 637.687059][ T7300] name failslab, interval 1, probability 0, space 0, times 0 [ 637.699575][ T7300] CPU: 1 PID: 7300 Comm: syz.3.12021 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 637.710651][ T7300] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 637.720539][ T7300] Call Trace: [ 637.723673][ T7300] dump_stack_lvl+0x1e2/0x24b [ 637.728184][ T7300] ? bfq_pos_tree_add_move+0x43b/0x43b [ 637.733478][ T7300] dump_stack+0x15/0x17 [ 637.737474][ T7300] should_fail+0x3c6/0x510 [ 637.741725][ T7300] ? skb_ensure_writable+0x2d0/0x440 [ 637.746844][ T7300] __should_failslab+0xa4/0xe0 [ 637.751443][ T7300] should_failslab+0x9/0x20 [ 637.755783][ T7300] __kmalloc_track_caller+0x5f/0x320 [ 637.760907][ T7300] ? skb_ensure_writable+0x2d0/0x440 [ 637.766027][ T7300] pskb_expand_head+0x12b/0x1180 [ 637.770799][ T7300] ? __kasan_check_write+0x14/0x20 [ 637.775744][ T7300] skb_ensure_writable+0x2d0/0x440 [ 637.780696][ T7300] bpf_clone_redirect+0x117/0x390 [ 637.785560][ T7300] bpf_prog_64e505a7b7f97a05+0x55/0x7f0 [ 637.790940][ T7300] ? __kasan_slab_alloc+0xc3/0xe0 [ 637.795794][ T7300] ? __kasan_slab_alloc+0xb1/0xe0 [ 637.800655][ T7300] ? slab_post_alloc_hook+0x61/0x2f0 [ 637.805780][ T7300] ? kmem_cache_alloc+0x168/0x2e0 [ 637.810638][ T7300] ? __build_skb+0x2a/0x300 [ 637.814973][ T7300] ? build_skb+0x25/0x1e0 [ 637.819157][ T7300] ? bpf_prog_test_run_skb+0x388/0x1410 [ 637.824540][ T7300] ? __se_sys_bpf+0x5235/0x11cb0 [ 637.829298][ T7300] ? __x64_sys_bpf+0x7b/0x90 [ 637.833723][ T7300] ? do_syscall_64+0x34/0x70 [ 637.838151][ T7300] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 637.844063][ T7300] ? __kasan_check_read+0x11/0x20 [ 637.848914][ T7300] ? bpf_test_timer_continue+0x140/0x440 [ 637.854382][ T7300] bpf_test_run+0x40b/0xc20 [ 637.858725][ T7300] ? convert___skb_to_skb+0x570/0x570 [ 637.863928][ T7300] ? eth_type_trans+0x2e4/0x620 [ 637.868620][ T7300] ? eth_get_headlen+0x240/0x240 [ 637.873390][ T7300] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 637.878770][ T7300] ? convert___skb_to_skb+0x44/0x570 [ 637.883893][ T7300] ? memcpy+0x56/0x70 [ 637.887712][ T7300] bpf_prog_test_run_skb+0xb6e/0x1410 [ 637.892921][ T7300] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 637.898646][ T7300] ? __kasan_check_write+0x14/0x20 [ 637.903592][ T7300] ? fput_many+0x160/0x1b0 [ 637.907844][ T7300] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 637.913580][ T7300] __se_sys_bpf+0x5235/0x11cb0 [ 637.918175][ T7300] ? stack_trace_save+0x113/0x1c0 [ 637.923038][ T7300] ? terminate_walk+0x407/0x4f0 [ 637.927724][ T7300] ? stack_trace_snprint+0xf0/0xf0 [ 637.932676][ T7300] ? kmem_cache_free+0xa9/0x1e0 [ 637.937359][ T7300] ? kmem_cache_free+0xa9/0x1e0 [ 637.942044][ T7300] ? kasan_set_track+0x5d/0x70 [ 637.946643][ T7300] ? kasan_set_track+0x4b/0x70 [ 637.951242][ T7300] ? kasan_set_free_info+0x23/0x40 [ 637.956205][ T7300] ? ____kasan_slab_free+0x121/0x160 [ 637.961324][ T7300] ? __kasan_slab_free+0x11/0x20 [ 637.966090][ T7300] ? __x64_sys_bpf+0x90/0x90 [ 637.970514][ T7300] ? do_sys_openat2+0x5e1/0x6f0 [ 637.975202][ T7300] ? __x64_sys_openat+0x243/0x290 [ 637.980062][ T7300] ? do_syscall_64+0x34/0x70 [ 637.984493][ T7300] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 637.990393][ T7300] ? _kstrtoull+0x3a0/0x4a0 [ 637.994735][ T7300] ? kstrtouint_from_user+0x20a/0x2a0 [ 637.999939][ T7300] ? kstrtol_from_user+0x310/0x310 [ 638.004890][ T7300] ? memset+0x35/0x40 [ 638.008705][ T7300] ? __fsnotify_parent+0x4b9/0x6c0 [ 638.013675][ T7300] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 638.020251][ T7300] ? proc_fail_nth_write+0x20b/0x290 [ 638.025370][ T7300] ? proc_fail_nth_read+0x210/0x210 [ 638.030521][ T7300] ? security_file_permission+0x86/0xb0 [ 638.035987][ T7300] ? rw_verify_area+0x1c3/0x360 [ 638.040659][ T7300] ? slab_free_freelist_hook+0xc0/0x190 [ 638.046039][ T7300] ? preempt_count_add+0x92/0x1a0 [ 638.050900][ T7300] ? vfs_write+0x854/0xe70 [ 638.055157][ T7300] ? kernel_write+0x3d0/0x3d0 [ 638.059672][ T7300] ? __kasan_check_write+0x14/0x20 [ 638.064616][ T7300] ? mutex_lock+0xa5/0x110 [ 638.068866][ T7300] ? mutex_trylock+0xa0/0xa0 [ 638.073298][ T7300] ? __kasan_check_write+0x14/0x20 [ 638.078243][ T7300] ? fput_many+0x160/0x1b0 [ 638.082500][ T7300] ? debug_smp_processor_id+0x17/0x20 [ 638.087706][ T7300] __x64_sys_bpf+0x7b/0x90 [ 638.091961][ T7300] do_syscall_64+0x34/0x70 [ 638.096386][ T7300] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 638.102112][ T7300] RIP: 0033:0x7fdfe54a7bd9 [ 638.106365][ T7300] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 638.125916][ T7300] RSP: 002b:00007fdfe4729048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 638.134157][ T7300] RAX: ffffffffffffffda RBX: 00007fdfe5635f60 RCX: 00007fdfe54a7bd9 [ 638.142069][ T7300] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 638.150062][ T7300] RBP: 00007fdfe47290a0 R08: 0000000000000000 R09: 0000000000000000 [ 638.157877][ T7300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 638.165686][ T7300] R13: 000000000000000b R14: 00007fdfe5635f60 R15: 00007ffcec4491e8 [ 639.095074][ T7354] syz.3.12039[7354] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.322079][ T7390] device veth1_macvtap left promiscuous mode [ 639.349782][ T7390] device macsec0 entered promiscuous mode [ 639.776660][ T7405] syz.2.12056[7405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 639.776713][ T7405] syz.2.12056[7405] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 640.334648][ T7433] syz.3.12063[7433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 640.355434][ T7433] syz.3.12063[7433] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 641.478332][ T7496] device syzkaller0 entered promiscuous mode [ 641.670134][ T7527] device syzkaller0 entered promiscuous mode [ 641.720832][ T7534] device lo entered promiscuous mode [ 641.766268][ T7543] device syzkaller0 entered promiscuous mode [ 641.844443][ T7572] device veth1_macvtap entered promiscuous mode [ 641.851100][ T7572] device macsec0 entered promiscuous mode [ 641.857277][ T598] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 642.063671][ T7610] device syzkaller0 entered promiscuous mode [ 642.158643][ T7617] Â: renamed from pim6reg1 [ 642.204942][ T7619] FAULT_INJECTION: forcing a failure. [ 642.204942][ T7619] name failslab, interval 1, probability 0, space 0, times 0 [ 642.217387][ T7619] CPU: 0 PID: 7619 Comm: syz.2.12123 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 642.228524][ T7619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 642.239201][ T7619] Call Trace: [ 642.242334][ T7619] dump_stack_lvl+0x1e2/0x24b [ 642.246928][ T7619] ? bfq_pos_tree_add_move+0x43b/0x43b [ 642.252219][ T7619] dump_stack+0x15/0x17 [ 642.256214][ T7619] should_fail+0x3c6/0x510 [ 642.260468][ T7619] ? skb_ensure_writable+0x2d0/0x440 [ 642.265585][ T7619] __should_failslab+0xa4/0xe0 [ 642.270186][ T7619] should_failslab+0x9/0x20 [ 642.274529][ T7619] __kmalloc_track_caller+0x5f/0x320 [ 642.279649][ T7619] ? skb_ensure_writable+0x2d0/0x440 [ 642.284771][ T7619] pskb_expand_head+0x12b/0x1180 [ 642.289545][ T7619] ? __kasan_check_write+0x14/0x20 [ 642.294490][ T7619] skb_ensure_writable+0x2d0/0x440 [ 642.299438][ T7619] bpf_clone_redirect+0x117/0x390 [ 642.304301][ T7619] bpf_prog_64e505a7b7f97a05+0x55/0x5f8 [ 642.309677][ T7619] ? __kasan_slab_alloc+0xc3/0xe0 [ 642.314534][ T7619] ? __kasan_slab_alloc+0xb1/0xe0 [ 642.319398][ T7619] ? slab_post_alloc_hook+0x61/0x2f0 [ 642.324517][ T7619] ? kmem_cache_alloc+0x168/0x2e0 [ 642.329381][ T7619] ? __build_skb+0x2a/0x300 [ 642.333717][ T7619] ? build_skb+0x25/0x1e0 [ 642.337883][ T7619] ? bpf_prog_test_run_skb+0x388/0x1410 [ 642.343267][ T7619] ? __se_sys_bpf+0x5235/0x11cb0 [ 642.348039][ T7619] ? __x64_sys_bpf+0x7b/0x90 [ 642.352554][ T7619] ? do_syscall_64+0x34/0x70 [ 642.356980][ T7619] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 642.362892][ T7619] ? __kasan_check_read+0x11/0x20 [ 642.367743][ T7619] ? bpf_test_timer_continue+0x140/0x440 [ 642.373212][ T7619] bpf_test_run+0x40b/0xc20 [ 642.377638][ T7619] ? convert___skb_to_skb+0x570/0x570 [ 642.382844][ T7619] ? eth_type_trans+0x2e4/0x620 [ 642.387716][ T7619] ? eth_get_headlen+0x240/0x240 [ 642.392492][ T7619] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 642.397957][ T7619] ? convert___skb_to_skb+0x44/0x570 [ 642.403079][ T7619] ? memcpy+0x56/0x70 [ 642.406898][ T7619] bpf_prog_test_run_skb+0xb6e/0x1410 [ 642.412110][ T7619] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 642.417835][ T7619] ? __kasan_check_write+0x14/0x20 [ 642.422782][ T7619] ? fput_many+0x160/0x1b0 [ 642.427036][ T7619] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 642.432761][ T7619] __se_sys_bpf+0x5235/0x11cb0 [ 642.437363][ T7619] ? stack_trace_save+0x113/0x1c0 [ 642.442223][ T7619] ? terminate_walk+0x407/0x4f0 [ 642.447341][ T7619] ? stack_trace_snprint+0xf0/0xf0 [ 642.452378][ T7619] ? __kasan_check_write+0x14/0x20 [ 642.457325][ T7619] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 642.462622][ T7619] ? memset+0x35/0x40 [ 642.466436][ T7619] ? __x64_sys_bpf+0x90/0x90 [ 642.470863][ T7619] ? __bpf_get_stack+0x3e9/0x570 [ 642.475638][ T7619] ? __x64_sys_openat+0x243/0x290 [ 642.480500][ T7619] ? do_syscall_64+0x34/0x70 [ 642.484925][ T7619] ? _kstrtoull+0x3a0/0x4a0 [ 642.489266][ T7619] ? kstrtouint_from_user+0x20a/0x2a0 [ 642.494472][ T7619] ? kstrtol_from_user+0x310/0x310 [ 642.499419][ T7619] ? bpf_get_stack+0x31/0x40 [ 642.503846][ T7619] ? memset+0x35/0x40 [ 642.507667][ T7619] ? __fsnotify_parent+0x4b9/0x6c0 [ 642.512613][ T7619] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 642.519212][ T7619] ? proc_fail_nth_write+0x20b/0x290 [ 642.524330][ T7619] ? proc_fail_nth_read+0x210/0x210 [ 642.529365][ T7619] ? security_file_permission+0x86/0xb0 [ 642.534744][ T7619] ? rw_verify_area+0x1c3/0x360 [ 642.539431][ T7619] ? preempt_count_add+0x92/0x1a0 [ 642.544302][ T7619] ? vfs_write+0x854/0xe70 [ 642.548549][ T7619] ? kernel_write+0x3d0/0x3d0 [ 642.553061][ T7619] ? __kasan_check_write+0x14/0x20 [ 642.558013][ T7619] ? mutex_lock+0xa5/0x110 [ 642.562256][ T7619] ? mutex_trylock+0xa0/0xa0 [ 642.566686][ T7619] ? __kasan_check_write+0x14/0x20 [ 642.571632][ T7619] ? fput_many+0x160/0x1b0 [ 642.575891][ T7619] ? debug_smp_processor_id+0x17/0x20 [ 642.581095][ T7619] __x64_sys_bpf+0x7b/0x90 [ 642.585348][ T7619] do_syscall_64+0x34/0x70 [ 642.589601][ T7619] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 642.595330][ T7619] RIP: 0033:0x7f142ce6fbd9 [ 642.599583][ T7619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 642.619023][ T7619] RSP: 002b:00007f142c0f1048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 642.627269][ T7619] RAX: ffffffffffffffda RBX: 00007f142cffdf60 RCX: 00007f142ce6fbd9 [ 642.635077][ T7619] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 642.642890][ T7619] RBP: 00007f142c0f10a0 R08: 0000000000000000 R09: 0000000000000000 [ 642.650701][ T7619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 642.658511][ T7619] R13: 000000000000000b R14: 00007f142cffdf60 R15: 00007ffdb5120048 [ 642.736652][ T7640] tap0: tun_chr_ioctl cmd 1074025677 [ 642.741813][ T7640] tap0: linktype set to 778 [ 642.908845][ T7656] FAULT_INJECTION: forcing a failure. [ 642.908845][ T7656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 642.935171][ T7656] CPU: 1 PID: 7656 Comm: syz.3.12134 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 642.946447][ T7656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 642.956341][ T7656] Call Trace: [ 642.959467][ T7656] dump_stack_lvl+0x1e2/0x24b [ 642.963982][ T7656] ? bfq_pos_tree_add_move+0x43b/0x43b [ 642.969283][ T7656] dump_stack+0x15/0x17 [ 642.973273][ T7656] should_fail+0x3c6/0x510 [ 642.977517][ T7656] should_fail_usercopy+0x1a/0x20 [ 642.982378][ T7656] _copy_from_user+0x20/0xd0 [ 642.986804][ T7656] memdup_user+0x5e/0xb0 [ 642.990883][ T7656] __se_sys_bpf+0x4beb/0x11cb0 [ 642.995484][ T7656] ? stack_trace_snprint+0xf0/0xf0 [ 643.000433][ T7656] ? kmem_cache_free+0xa9/0x1e0 [ 643.005134][ T7656] ? kmem_cache_free+0xa9/0x1e0 [ 643.009803][ T7656] ? kasan_set_track+0x5d/0x70 [ 643.014403][ T7656] ? kasan_set_track+0x4b/0x70 [ 643.019004][ T7656] ? kasan_set_free_info+0x23/0x40 [ 643.023952][ T7656] ? ____kasan_slab_free+0x121/0x160 [ 643.029075][ T7656] ? __kasan_slab_free+0x11/0x20 [ 643.033856][ T7656] ? __x64_sys_bpf+0x90/0x90 [ 643.038273][ T7656] ? do_sys_openat2+0x5e1/0x6f0 [ 643.042956][ T7656] ? __x64_sys_openat+0x243/0x290 [ 643.047819][ T7656] ? do_syscall_64+0x34/0x70 [ 643.052257][ T7656] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 643.058152][ T7656] ? _kstrtoull+0x3a0/0x4a0 [ 643.062494][ T7656] ? kstrtouint_from_user+0x20a/0x2a0 [ 643.067697][ T7656] ? kstrtol_from_user+0x310/0x310 [ 643.072646][ T7656] ? memset+0x35/0x40 [ 643.076463][ T7656] ? __fsnotify_parent+0x4b9/0x6c0 [ 643.081497][ T7656] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 643.088092][ T7656] ? proc_fail_nth_write+0x20b/0x290 [ 643.093224][ T7656] ? proc_fail_nth_read+0x210/0x210 [ 643.098251][ T7656] ? security_file_permission+0x86/0xb0 [ 643.103628][ T7656] ? rw_verify_area+0x1c3/0x360 [ 643.108315][ T7656] ? slab_free_freelist_hook+0xc0/0x190 [ 643.113694][ T7656] ? preempt_count_add+0x92/0x1a0 [ 643.118556][ T7656] ? vfs_write+0x854/0xe70 [ 643.121924][ T7642] device syzkaller0 entered promiscuous mode [ 643.122808][ T7656] ? kernel_write+0x3d0/0x3d0 [ 643.122825][ T7656] ? __kasan_check_write+0x14/0x20 [ 643.138087][ T7656] ? mutex_lock+0xa5/0x110 [ 643.142340][ T7656] ? mutex_trylock+0xa0/0xa0 [ 643.146766][ T7656] ? __kasan_check_write+0x14/0x20 [ 643.151714][ T7656] ? fput_many+0x160/0x1b0 [ 643.155976][ T7656] ? debug_smp_processor_id+0x17/0x20 [ 643.161368][ T7656] __x64_sys_bpf+0x7b/0x90 [ 643.165600][ T7656] do_syscall_64+0x34/0x70 [ 643.169860][ T7656] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 643.175583][ T7656] RIP: 0033:0x7fdfe54a7bd9 [ 643.179834][ T7656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 643.199277][ T7656] RSP: 002b:00007fdfe4729048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 643.207515][ T7656] RAX: ffffffffffffffda RBX: 00007fdfe5635f60 RCX: 00007fdfe54a7bd9 [ 643.215325][ T7656] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000002 [ 643.223135][ T7656] RBP: 00007fdfe47290a0 R08: 0000000000000000 R09: 0000000000000000 [ 643.230950][ T7656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 643.238760][ T7656] R13: 000000000000000b R14: 00007fdfe5635f60 R15: 00007ffcec4491e8 [ 643.269013][ T7667] FAULT_INJECTION: forcing a failure. [ 643.269013][ T7667] name failslab, interval 1, probability 0, space 0, times 0 [ 643.281483][ T7667] CPU: 1 PID: 7667 Comm: syz.2.12137 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 643.292611][ T7667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 643.302500][ T7667] Call Trace: [ 643.305632][ T7667] dump_stack_lvl+0x1e2/0x24b [ 643.310145][ T7667] ? panic+0x812/0x812 [ 643.314044][ T7667] ? slab_post_alloc_hook+0x80/0x2f0 [ 643.319167][ T7667] ? bfq_pos_tree_add_move+0x43b/0x43b [ 643.324465][ T7667] ? __kasan_check_write+0x14/0x20 [ 643.329408][ T7667] dump_stack+0x15/0x17 [ 643.333398][ T7667] should_fail+0x3c6/0x510 [ 643.337661][ T7667] ? skb_clone+0x1de/0x370 [ 643.341914][ T7667] __should_failslab+0xa4/0xe0 [ 643.346517][ T7667] should_failslab+0x9/0x20 [ 643.350856][ T7667] kmem_cache_alloc+0x3d/0x2e0 [ 643.355443][ T7667] ? __bpf_redirect+0x673/0xde0 [ 643.360139][ T7667] skb_clone+0x1de/0x370 [ 643.364218][ T7667] bpf_clone_redirect+0xa6/0x390 [ 643.368993][ T7667] bpf_prog_64e505a7b7f97a05+0x55/0xf4c [ 643.374371][ T7667] ? __kasan_slab_alloc+0xc3/0xe0 [ 643.379227][ T7667] ? __kasan_slab_alloc+0xb1/0xe0 [ 643.384090][ T7667] ? slab_post_alloc_hook+0x61/0x2f0 [ 643.389211][ T7667] ? kmem_cache_alloc+0x168/0x2e0 [ 643.394071][ T7667] ? __build_skb+0x2a/0x300 [ 643.398409][ T7667] ? build_skb+0x25/0x1e0 [ 643.402576][ T7667] ? bpf_prog_test_run_skb+0x388/0x1410 [ 643.407961][ T7667] ? __se_sys_bpf+0x5235/0x11cb0 [ 643.412732][ T7667] ? __x64_sys_bpf+0x7b/0x90 [ 643.417161][ T7667] ? do_syscall_64+0x34/0x70 [ 643.421588][ T7667] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 643.427506][ T7667] ? __kasan_check_read+0x11/0x20 [ 643.432348][ T7667] ? bpf_test_timer_continue+0x140/0x440 [ 643.437817][ T7667] bpf_test_run+0x40b/0xc20 [ 643.442158][ T7667] ? convert___skb_to_skb+0x570/0x570 [ 643.447363][ T7667] ? eth_type_trans+0x2e4/0x620 [ 643.452050][ T7667] ? eth_get_headlen+0x240/0x240 [ 643.456823][ T7667] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 643.462205][ T7667] ? convert___skb_to_skb+0x44/0x570 [ 643.467412][ T7667] ? memcpy+0x56/0x70 [ 643.471230][ T7667] bpf_prog_test_run_skb+0xb6e/0x1410 [ 643.476446][ T7667] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 643.482168][ T7667] ? __kasan_check_write+0x14/0x20 [ 643.487116][ T7667] ? fput_many+0x160/0x1b0 [ 643.491369][ T7667] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 643.497098][ T7667] __se_sys_bpf+0x5235/0x11cb0 [ 643.501699][ T7667] ? stack_trace_save+0x113/0x1c0 [ 643.506560][ T7667] ? terminate_walk+0x407/0x4f0 [ 643.511331][ T7667] ? stack_trace_snprint+0xf0/0xf0 [ 643.516280][ T7667] ? kmem_cache_free+0xa9/0x1e0 [ 643.520973][ T7667] ? kmem_cache_free+0xa9/0x1e0 [ 643.525651][ T7667] ? kasan_set_track+0x5d/0x70 [ 643.530250][ T7667] ? kasan_set_track+0x4b/0x70 [ 643.534948][ T7667] ? kasan_set_free_info+0x23/0x40 [ 643.539883][ T7667] ? ____kasan_slab_free+0x121/0x160 [ 643.545006][ T7667] ? __kasan_slab_free+0x11/0x20 [ 643.549782][ T7667] ? __x64_sys_bpf+0x90/0x90 [ 643.554205][ T7667] ? do_sys_openat2+0x5e1/0x6f0 [ 643.558893][ T7667] ? __x64_sys_openat+0x243/0x290 [ 643.563752][ T7667] ? do_syscall_64+0x34/0x70 [ 643.568182][ T7667] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 643.574082][ T7667] ? _kstrtoull+0x3a0/0x4a0 [ 643.578420][ T7667] ? kstrtouint_from_user+0x20a/0x2a0 [ 643.583627][ T7667] ? kstrtol_from_user+0x310/0x310 [ 643.588582][ T7667] ? memset+0x35/0x40 [ 643.592391][ T7667] ? __fsnotify_parent+0x4b9/0x6c0 [ 643.597343][ T7667] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 643.603938][ T7667] ? proc_fail_nth_write+0x20b/0x290 [ 643.609063][ T7667] ? proc_fail_nth_read+0x210/0x210 [ 643.614090][ T7667] ? security_file_permission+0x86/0xb0 [ 643.619473][ T7667] ? rw_verify_area+0x1c3/0x360 [ 643.624175][ T7667] ? slab_free_freelist_hook+0xc0/0x190 [ 643.629538][ T7667] ? preempt_count_add+0x92/0x1a0 [ 643.634399][ T7667] ? vfs_write+0x854/0xe70 [ 643.638654][ T7667] ? kernel_write+0x3d0/0x3d0 [ 643.643168][ T7667] ? __kasan_check_write+0x14/0x20 [ 643.648113][ T7667] ? mutex_lock+0xa5/0x110 [ 643.652369][ T7667] ? mutex_trylock+0xa0/0xa0 [ 643.656792][ T7667] ? __kasan_check_write+0x14/0x20 [ 643.661743][ T7667] ? fput_many+0x160/0x1b0 [ 643.665999][ T7667] ? debug_smp_processor_id+0x17/0x20 [ 643.671202][ T7667] __x64_sys_bpf+0x7b/0x90 [ 643.675454][ T7667] do_syscall_64+0x34/0x70 [ 643.679709][ T7667] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 643.685434][ T7667] RIP: 0033:0x7f142ce6fbd9 [ 643.689691][ T7667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 643.709131][ T7667] RSP: 002b:00007f142c0f1048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 643.717374][ T7667] RAX: ffffffffffffffda RBX: 00007f142cffdf60 RCX: 00007f142ce6fbd9 [ 643.725185][ T7667] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 643.732997][ T7667] RBP: 00007f142c0f10a0 R08: 0000000000000000 R09: 0000000000000000 [ 643.740813][ T7667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 643.748629][ T7667] R13: 000000000000000b R14: 00007f142cffdf60 R15: 00007ffdb5120048 [ 643.784394][ T7674] syz.2.12140[7674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 643.784442][ T7674] syz.2.12140[7674] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 644.059181][ T7691] FAULT_INJECTION: forcing a failure. [ 644.059181][ T7691] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 644.095041][ T7691] CPU: 1 PID: 7691 Comm: syz.2.12148 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 644.106223][ T7691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 644.116117][ T7691] Call Trace: [ 644.119247][ T7691] dump_stack_lvl+0x1e2/0x24b [ 644.123760][ T7691] ? bfq_pos_tree_add_move+0x43b/0x43b [ 644.129053][ T7691] ? __kasan_slab_alloc+0x63/0xe0 [ 644.133914][ T7691] ? avc_has_perm+0x14d/0x400 [ 644.138514][ T7691] dump_stack+0x15/0x17 [ 644.142503][ T7691] should_fail+0x3c6/0x510 [ 644.146761][ T7691] should_fail_alloc_page+0x52/0x60 [ 644.151796][ T7691] __alloc_pages_nodemask+0x1b3/0xaf0 [ 644.157005][ T7691] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 644.162387][ T7691] kmalloc_order+0x4c/0x170 [ 644.166721][ T7691] kmalloc_order_trace+0x18/0x90 [ 644.171498][ T7691] __kmalloc+0x1f1/0x330 [ 644.175572][ T7691] __se_sys_bpf+0x75e6/0x11cb0 [ 644.180176][ T7691] ? stack_trace_snprint+0xf0/0xf0 [ 644.185122][ T7691] ? kmem_cache_free+0xa9/0x1e0 [ 644.189822][ T7691] ? __kasan_check_write+0x14/0x20 [ 644.194758][ T7691] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 644.200047][ T7691] ? kasan_set_track+0x4b/0x70 [ 644.204648][ T7691] ? kasan_set_free_info+0x23/0x40 [ 644.209598][ T7691] ? ____kasan_slab_free+0x121/0x160 [ 644.214720][ T7691] ? __x64_sys_bpf+0x90/0x90 [ 644.219147][ T7691] ? do_sys_openat2+0x5e1/0x6f0 [ 644.223833][ T7691] ? do_syscall_64+0x34/0x70 [ 644.228257][ T7691] ? _kstrtoull+0x3a0/0x4a0 [ 644.232598][ T7691] ? kstrtouint_from_user+0x20a/0x2a0 [ 644.237818][ T7691] ? kstrtol_from_user+0x310/0x310 [ 644.242757][ T7691] ? queue_stack_map_delete_elem+0x10/0x10 [ 644.248399][ T7691] ? memset+0x35/0x40 [ 644.252223][ T7691] ? __fsnotify_parent+0x4b9/0x6c0 [ 644.257171][ T7691] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 644.263763][ T7691] ? proc_fail_nth_write+0x20b/0x290 [ 644.268881][ T7691] ? proc_fail_nth_read+0x210/0x210 [ 644.273916][ T7691] ? security_file_permission+0x86/0xb0 [ 644.279295][ T7691] ? rw_verify_area+0x1c3/0x360 [ 644.283986][ T7691] ? preempt_count_add+0x92/0x1a0 [ 644.288845][ T7691] ? vfs_write+0x854/0xe70 [ 644.293100][ T7691] ? kernel_write+0x3d0/0x3d0 [ 644.297608][ T7691] ? __kasan_check_write+0x14/0x20 [ 644.302552][ T7691] ? mutex_lock+0xa5/0x110 [ 644.306804][ T7691] ? mutex_trylock+0xa0/0xa0 [ 644.311229][ T7691] ? __kasan_check_write+0x14/0x20 [ 644.316178][ T7691] ? fput_many+0x160/0x1b0 [ 644.320452][ T7691] ? debug_smp_processor_id+0x17/0x20 [ 644.325641][ T7691] __x64_sys_bpf+0x7b/0x90 [ 644.329896][ T7691] do_syscall_64+0x34/0x70 [ 644.334149][ T7691] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 644.339875][ T7691] RIP: 0033:0x7f142ce6fbd9 [ 644.344124][ T7691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 644.363663][ T7691] RSP: 002b:00007f142c0f1048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 644.371895][ T7691] RAX: ffffffffffffffda RBX: 00007f142cffdf60 RCX: 00007f142ce6fbd9 [ 644.379707][ T7691] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000002 [ 644.387522][ T7691] RBP: 00007f142c0f10a0 R08: 0000000000000000 R09: 0000000000000000 [ 644.395334][ T7691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 644.403140][ T7691] R13: 000000000000000b R14: 00007f142cffdf60 R15: 00007ffdb5120048 [ 645.659033][ T7719] device syzkaller0 entered promiscuous mode [ 645.685593][ T7744] FAULT_INJECTION: forcing a failure. [ 645.685593][ T7744] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 645.698659][ T7744] CPU: 0 PID: 7744 Comm: syz.1.12162 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 645.709824][ T7744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 645.719715][ T7744] Call Trace: [ 645.722850][ T7744] dump_stack_lvl+0x1e2/0x24b [ 645.727358][ T7744] ? bfq_pos_tree_add_move+0x43b/0x43b [ 645.732652][ T7744] ? kasan_poison+0x5d/0x70 [ 645.736990][ T7744] ? __kasan_kmalloc_large+0xad/0xc0 [ 645.742107][ T7744] dump_stack+0x15/0x17 [ 645.746111][ T7744] should_fail+0x3c6/0x510 [ 645.750358][ T7744] should_fail_usercopy+0x1a/0x20 [ 645.755214][ T7744] _copy_from_user+0x20/0xd0 [ 645.759646][ T7744] __se_sys_bpf+0x761c/0x11cb0 [ 645.764246][ T7744] ? stack_trace_snprint+0xf0/0xf0 [ 645.769192][ T7744] ? kmem_cache_free+0xa9/0x1e0 [ 645.773875][ T7744] ? kmem_cache_free+0xa9/0x1e0 [ 645.778570][ T7744] ? kasan_set_track+0x5d/0x70 [ 645.783161][ T7744] ? kasan_set_track+0x4b/0x70 [ 645.787766][ T7744] ? kasan_set_free_info+0x23/0x40 [ 645.792714][ T7744] ? ____kasan_slab_free+0x121/0x160 [ 645.797833][ T7744] ? __kasan_slab_free+0x11/0x20 [ 645.802611][ T7744] ? __x64_sys_bpf+0x90/0x90 [ 645.807029][ T7744] ? do_sys_openat2+0x5e1/0x6f0 [ 645.811728][ T7744] ? __x64_sys_openat+0x243/0x290 [ 645.816581][ T7744] ? do_syscall_64+0x34/0x70 [ 645.821158][ T7744] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 645.827049][ T7744] ? _kstrtoull+0x3a0/0x4a0 [ 645.831389][ T7744] ? kstrtouint_from_user+0x20a/0x2a0 [ 645.836598][ T7744] ? kstrtol_from_user+0x310/0x310 [ 645.841547][ T7744] ? strncpy_from_user_nofault+0xed/0x150 [ 645.847104][ T7744] ? memset+0x35/0x40 [ 645.850920][ T7744] ? __fsnotify_parent+0x4b9/0x6c0 [ 645.855864][ T7744] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 645.862463][ T7744] ? proc_fail_nth_write+0x20b/0x290 [ 645.867587][ T7744] ? proc_fail_nth_read+0x210/0x210 [ 645.872620][ T7744] ? security_file_permission+0x86/0xb0 [ 645.878005][ T7744] ? rw_verify_area+0x1c3/0x360 [ 645.882687][ T7744] ? preempt_count_add+0x92/0x1a0 [ 645.887548][ T7744] ? vfs_write+0x854/0xe70 [ 645.891798][ T7744] ? kernel_write+0x3d0/0x3d0 [ 645.896313][ T7744] ? __kasan_check_write+0x14/0x20 [ 645.901260][ T7744] ? mutex_lock+0xa5/0x110 [ 645.905683][ T7744] ? mutex_trylock+0xa0/0xa0 [ 645.910114][ T7744] ? __kasan_check_write+0x14/0x20 [ 645.915060][ T7744] ? fput_many+0x160/0x1b0 [ 645.919316][ T7744] ? debug_smp_processor_id+0x17/0x20 [ 645.924520][ T7744] __x64_sys_bpf+0x7b/0x90 [ 645.928778][ T7744] do_syscall_64+0x34/0x70 [ 645.933028][ T7744] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 645.938753][ T7744] RIP: 0033:0x7fa4fc08cbd9 [ 645.943007][ T7744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 645.962449][ T7744] RSP: 002b:00007fa4fb30e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 645.970690][ T7744] RAX: ffffffffffffffda RBX: 00007fa4fc21af60 RCX: 00007fa4fc08cbd9 [ 645.978503][ T7744] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000002 [ 645.986316][ T7744] RBP: 00007fa4fb30e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 645.994128][ T7744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 646.001938][ T7744] R13: 000000000000000b R14: 00007fa4fc21af60 R15: 00007ffd93cd84d8 [ 646.043866][ T7742] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.051597][ T7742] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.060883][ T7742] device bridge_slave_0 entered promiscuous mode [ 646.071406][ T7742] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.078425][ T7742] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.085621][ T7742] device bridge_slave_1 entered promiscuous mode [ 646.154197][ T7742] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.161102][ T7742] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.168213][ T7742] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.174943][ T7742] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.203449][ T6783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 646.236129][ T6783] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.252956][ T6783] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.272105][T10570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 646.280638][T10570] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.287488][T10570] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.295944][T10570] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 646.305061][T10570] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.311931][T10570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.330317][ T6783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 646.348995][ T6783] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 646.376565][ T7742] device veth0_vlan entered promiscuous mode [ 646.393864][T10566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 646.405479][T10566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 646.420374][T10566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 646.427876][T10566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 646.440279][ T7787] device pim6reg1 entered promiscuous mode [ 646.464481][ T7810] device wg2 left promiscuous mode [ 646.473468][ T7810] device wg2 entered promiscuous mode [ 646.480400][ T6783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 646.490549][ T7742] device veth1_macvtap entered promiscuous mode [ 646.511072][ T6783] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 646.535823][T10566] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 646.728667][ T7816] device veth1_macvtap left promiscuous mode [ 646.756873][ T7849] device pim6reg1 entered promiscuous mode [ 646.861194][ T24] audit: type=1400 audit(1720626349.179:189): avc: denied { create } for pid=7862 comm="syz.2.12197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=irda_socket permissive=1 [ 646.878463][ T7872] device syzkaller0 entered promiscuous mode [ 647.707966][ T7924] FAULT_INJECTION: forcing a failure. [ 647.707966][ T7924] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 647.720899][ T7924] CPU: 0 PID: 7924 Comm: syz.2.12215 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 647.732007][ T7924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 647.741898][ T7924] Call Trace: [ 647.745033][ T7924] dump_stack_lvl+0x1e2/0x24b [ 647.749549][ T7924] ? bfq_pos_tree_add_move+0x43b/0x43b [ 647.754852][ T7924] dump_stack+0x15/0x17 [ 647.758838][ T7924] should_fail+0x3c6/0x510 [ 647.763085][ T7924] should_fail_usercopy+0x1a/0x20 [ 647.767943][ T7924] _copy_to_user+0x20/0x90 [ 647.772197][ T7924] simple_read_from_buffer+0xc7/0x150 [ 647.777405][ T7924] proc_fail_nth_read+0x1a3/0x210 [ 647.782266][ T7924] ? security_file_permission+0x7b/0xb0 [ 647.787649][ T7924] ? proc_fault_inject_write+0x390/0x390 [ 647.793118][ T7924] ? security_file_permission+0x86/0xb0 [ 647.798495][ T7924] ? rw_verify_area+0x1c3/0x360 [ 647.803181][ T7924] ? proc_fault_inject_write+0x390/0x390 [ 647.808781][ T7924] vfs_read+0x204/0xbb0 [ 647.812735][ T7924] ? kernel_read+0x70/0x70 [ 647.817072][ T7924] ? __kasan_check_write+0x14/0x20 [ 647.822021][ T7924] ? mutex_lock+0xa5/0x110 [ 647.826269][ T7924] ? mutex_trylock+0xa0/0xa0 [ 647.830702][ T7924] ? __fdget_pos+0x2e7/0x3a0 [ 647.835119][ T7924] ? ksys_read+0x77/0x2c0 [ 647.839293][ T7924] ksys_read+0x199/0x2c0 [ 647.843368][ T7924] ? vfs_write+0xe70/0xe70 [ 647.847625][ T7924] ? debug_smp_processor_id+0x17/0x20 [ 647.852837][ T7924] __x64_sys_read+0x7b/0x90 [ 647.857168][ T7924] do_syscall_64+0x34/0x70 [ 647.861422][ T7924] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 647.867148][ T7924] RIP: 0033:0x7f142ce6e6bc [ 647.871406][ T7924] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 647.890974][ T7924] RSP: 002b:00007f142c0f1040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 647.899220][ T7924] RAX: ffffffffffffffda RBX: 00007f142cffdf60 RCX: 00007f142ce6e6bc [ 647.907030][ T7924] RDX: 000000000000000f RSI: 00007f142c0f10b0 RDI: 0000000000000006 [ 647.914843][ T7924] RBP: 00007f142c0f10a0 R08: 0000000000000000 R09: 0000000000000000 [ 647.922644][ T7924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 647.930466][ T7924] R13: 000000000000000b R14: 00007f142cffdf60 R15: 00007ffdb5120048 [ 647.987980][ T24] audit: type=1400 audit(1720626350.299:190): avc: denied { read } for pid=7928 comm="syz.4.12218" name="cgroup.subtree_control" dev="cgroup2" ino=286 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 648.013958][ T24] audit: type=1400 audit(1720626350.339:191): avc: denied { ioctl } for pid=7928 comm="syz.4.12218" path="" dev="cgroup2" ino=286 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 648.118944][ T7945] device syzkaller0 entered promiscuous mode [ 648.159633][ T7949] device syzkaller0 entered promiscuous mode [ 648.313446][ T7972] FAULT_INJECTION: forcing a failure. [ 648.313446][ T7972] name failslab, interval 1, probability 0, space 0, times 0 [ 648.326328][ T7972] CPU: 0 PID: 7972 Comm: syz.4.12231 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 648.337415][ T7972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 648.347307][ T7972] Call Trace: [ 648.350437][ T7972] dump_stack_lvl+0x1e2/0x24b [ 648.354944][ T7972] ? panic+0x812/0x812 [ 648.358865][ T7972] ? bfq_pos_tree_add_move+0x43b/0x43b [ 648.364156][ T7972] dump_stack+0x15/0x17 [ 648.368142][ T7972] should_fail+0x3c6/0x510 [ 648.372395][ T7972] ? __alloc_skb+0x80/0x510 [ 648.376736][ T7972] __should_failslab+0xa4/0xe0 [ 648.381332][ T7972] should_failslab+0x9/0x20 [ 648.385676][ T7972] kmem_cache_alloc+0x3d/0x2e0 [ 648.390273][ T7972] __alloc_skb+0x80/0x510 [ 648.394446][ T7972] alloc_skb_with_frags+0xa1/0x570 [ 648.399383][ T7972] ? 0xffffffffa0014280 [ 648.403382][ T7972] ? is_bpf_text_address+0x172/0x190 [ 648.408503][ T7972] ? stack_trace_save+0x1c0/0x1c0 [ 648.413366][ T7972] sock_alloc_send_pskb+0x915/0xa50 [ 648.418484][ T7972] ? sock_kzfree_s+0x60/0x60 [ 648.422908][ T7972] ? stack_trace_snprint+0xf0/0xf0 [ 648.427861][ T7972] tun_get_user+0xe90/0x38f0 [ 648.432280][ T7972] ? kasan_set_track+0x4b/0x70 [ 648.436891][ T7972] ? kasan_set_free_info+0x23/0x40 [ 648.441831][ T7972] ? do_syscall_64+0x34/0x70 [ 648.446257][ T7972] ? _kstrtoull+0x3a0/0x4a0 [ 648.450597][ T7972] ? tun_do_read+0x1f60/0x1f60 [ 648.455194][ T7972] ? kstrtouint_from_user+0x20a/0x2a0 [ 648.460404][ T7972] ? kstrtol_from_user+0x310/0x310 [ 648.465354][ T7972] ? avc_policy_seqno+0x1b/0x70 [ 648.470038][ T7972] ? selinux_file_permission+0x2bb/0x560 [ 648.475507][ T7972] ? fsnotify_perm+0x67/0x4e0 [ 648.480021][ T7972] tun_chr_write_iter+0x1a8/0x250 [ 648.484881][ T7972] vfs_write+0xb55/0xe70 [ 648.488960][ T7972] ? kernel_write+0x3d0/0x3d0 [ 648.493597][ T7972] ? __fdget_pos+0x209/0x3a0 [ 648.498016][ T7972] ? ksys_write+0x77/0x2c0 [ 648.502272][ T7972] ksys_write+0x199/0x2c0 [ 648.506447][ T7972] ? __ia32_sys_read+0x90/0x90 [ 648.511038][ T7972] ? debug_smp_processor_id+0x17/0x20 [ 648.516247][ T7972] __x64_sys_write+0x7b/0x90 [ 648.520669][ T7972] do_syscall_64+0x34/0x70 [ 648.524936][ T7972] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 648.530648][ T7972] RIP: 0033:0x7fb86d722bd9 [ 648.534906][ T7972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 648.554348][ T7972] RSP: 002b:00007fb86c9a4048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 648.562585][ T7972] RAX: ffffffffffffffda RBX: 00007fb86d8b0f60 RCX: 00007fb86d722bd9 [ 648.570488][ T7972] RDX: 000000000000fdef RSI: 00000000200004c0 RDI: 00000000000000c8 [ 648.578298][ T7972] RBP: 00007fb86c9a40a0 R08: 0000000000000000 R09: 0000000000000000 [ 648.586200][ T7972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 648.594008][ T7972] R13: 000000000000000b R14: 00007fb86d8b0f60 R15: 00007ffd5b2cb8c8 [ 648.859233][ T8010] FAULT_INJECTION: forcing a failure. [ 648.859233][ T8010] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 648.872384][ T8010] CPU: 1 PID: 8010 Comm: syz.4.12243 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 648.883544][ T8010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 648.893435][ T8010] Call Trace: [ 648.896573][ T8010] dump_stack_lvl+0x1e2/0x24b [ 648.901080][ T8010] ? bfq_pos_tree_add_move+0x43b/0x43b [ 648.906379][ T8010] dump_stack+0x15/0x17 [ 648.910372][ T8010] should_fail+0x3c6/0x510 [ 648.914627][ T8010] should_fail_alloc_page+0x52/0x60 [ 648.919657][ T8010] __alloc_pages_nodemask+0x1b3/0xaf0 [ 648.924867][ T8010] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 648.930251][ T8010] kmalloc_order+0x4c/0x170 [ 648.934589][ T8010] kmalloc_order_trace+0x18/0x90 [ 648.939361][ T8010] ? alloc_skb_with_frags+0xa1/0x570 [ 648.944483][ T8010] __kmalloc_track_caller+0x1dd/0x320 [ 648.949687][ T8010] ? __alloc_skb+0x80/0x510 [ 648.954024][ T8010] ? alloc_skb_with_frags+0xa1/0x570 [ 648.959153][ T8010] __alloc_skb+0xbc/0x510 [ 648.963317][ T8010] alloc_skb_with_frags+0xa1/0x570 [ 648.968257][ T8010] ? 0xffffffffa0014280 [ 648.972249][ T8010] ? is_bpf_text_address+0x172/0x190 [ 648.977378][ T8010] ? stack_trace_save+0x1c0/0x1c0 [ 648.982240][ T8010] sock_alloc_send_pskb+0x915/0xa50 [ 648.987271][ T8010] ? sock_kzfree_s+0x60/0x60 [ 648.991698][ T8010] ? stack_trace_snprint+0xf0/0xf0 [ 648.996645][ T8010] tun_get_user+0xe90/0x38f0 [ 649.001066][ T8010] ? kasan_set_track+0x4b/0x70 [ 649.005668][ T8010] ? kasan_set_free_info+0x23/0x40 [ 649.010617][ T8010] ? do_syscall_64+0x34/0x70 [ 649.015041][ T8010] ? _kstrtoull+0x3a0/0x4a0 [ 649.019397][ T8010] ? tun_do_read+0x1f60/0x1f60 [ 649.023974][ T8010] ? kstrtouint_from_user+0x20a/0x2a0 [ 649.029191][ T8010] ? kstrtol_from_user+0x310/0x310 [ 649.034140][ T8010] ? avc_policy_seqno+0x1b/0x70 [ 649.038835][ T8010] ? selinux_file_permission+0x2bb/0x560 [ 649.044297][ T8010] ? fsnotify_perm+0x67/0x4e0 [ 649.048814][ T8010] tun_chr_write_iter+0x1a8/0x250 [ 649.053667][ T8010] vfs_write+0xb55/0xe70 [ 649.057747][ T8010] ? kernel_write+0x3d0/0x3d0 [ 649.062261][ T8010] ? __fdget_pos+0x209/0x3a0 [ 649.066695][ T8010] ? ksys_write+0x77/0x2c0 [ 649.070947][ T8010] ksys_write+0x199/0x2c0 [ 649.075107][ T8010] ? __ia32_sys_read+0x90/0x90 [ 649.079706][ T8010] ? debug_smp_processor_id+0x17/0x20 [ 649.085017][ T8010] __x64_sys_write+0x7b/0x90 [ 649.089424][ T8010] do_syscall_64+0x34/0x70 [ 649.093679][ T8010] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 649.099405][ T8010] RIP: 0033:0x7fb86d722bd9 [ 649.103658][ T8010] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 649.123101][ T8010] RSP: 002b:00007fb86c9a4048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 649.131340][ T8010] RAX: ffffffffffffffda RBX: 00007fb86d8b0f60 RCX: 00007fb86d722bd9 [ 649.139155][ T8010] RDX: 000000000000fdef RSI: 00000000200004c0 RDI: 00000000000000c8 [ 649.146970][ T8010] RBP: 00007fb86c9a40a0 R08: 0000000000000000 R09: 0000000000000000 [ 649.154779][ T8010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 649.162588][ T8010] R13: 000000000000000b R14: 00007fb86d8b0f60 R15: 00007ffd5b2cb8c8 [ 649.239778][ T8025] device sit0 entered promiscuous mode [ 650.616161][ T8098] device syzkaller0 entered promiscuous mode [ 651.140294][ T8150] device syzkaller0 entered promiscuous mode [ 651.786042][ T8213] syz.3.12310[8213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 651.786091][ T8213] syz.3.12310[8213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.846075][ T8319] syz.1.12339[8319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.857431][ T8319] syz.1.12339[8319] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.915862][ T8326] syz.3.12341[8326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.927358][ T8326] syz.3.12341[8326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.941606][ T8326] syz.3.12341[8326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 652.956268][ T8326] syz.3.12341[8326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.034040][ T8333] FAULT_INJECTION: forcing a failure. [ 653.034040][ T8333] name failslab, interval 1, probability 0, space 0, times 0 [ 653.057720][ T8333] CPU: 1 PID: 8333 Comm: syz.3.12344 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 653.069010][ T8333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 653.078908][ T8333] Call Trace: [ 653.082040][ T8333] dump_stack_lvl+0x1e2/0x24b [ 653.086559][ T8333] ? bfq_pos_tree_add_move+0x43b/0x43b [ 653.091841][ T8333] dump_stack+0x15/0x17 [ 653.095825][ T8333] should_fail+0x3c6/0x510 [ 653.100080][ T8333] ? skb_ensure_writable+0x2d0/0x440 [ 653.105198][ T8333] __should_failslab+0xa4/0xe0 [ 653.109796][ T8333] should_failslab+0x9/0x20 [ 653.114136][ T8333] __kmalloc_track_caller+0x5f/0x320 [ 653.119258][ T8333] ? skb_ensure_writable+0x2d0/0x440 [ 653.124378][ T8333] pskb_expand_head+0x12b/0x1180 [ 653.129153][ T8333] ? __kasan_check_write+0x14/0x20 [ 653.134101][ T8333] skb_ensure_writable+0x2d0/0x440 [ 653.139050][ T8333] bpf_clone_redirect+0x117/0x390 [ 653.143909][ T8333] bpf_prog_64e505a7b7f97a05+0x55/0xe1c [ 653.149290][ T8333] ? __kasan_slab_alloc+0xc3/0xe0 [ 653.154146][ T8333] ? __kasan_slab_alloc+0xb1/0xe0 [ 653.159008][ T8333] ? slab_post_alloc_hook+0x61/0x2f0 [ 653.164126][ T8333] ? kmem_cache_alloc+0x168/0x2e0 [ 653.168987][ T8333] ? __build_skb+0x2a/0x300 [ 653.173326][ T8333] ? build_skb+0x25/0x1e0 [ 653.177499][ T8333] ? bpf_prog_test_run_skb+0x388/0x1410 [ 653.182878][ T8333] ? __se_sys_bpf+0x5235/0x11cb0 [ 653.187647][ T8333] ? __x64_sys_bpf+0x7b/0x90 [ 653.192076][ T8333] ? do_syscall_64+0x34/0x70 [ 653.196504][ T8333] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 653.202413][ T8333] ? __kasan_check_read+0x11/0x20 [ 653.207263][ T8333] ? bpf_test_timer_continue+0x140/0x440 [ 653.212736][ T8333] bpf_test_run+0x40b/0xc20 [ 653.217075][ T8333] ? convert___skb_to_skb+0x570/0x570 [ 653.222279][ T8333] ? eth_type_trans+0x2e4/0x620 [ 653.226968][ T8333] ? eth_get_headlen+0x240/0x240 [ 653.231760][ T8333] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 653.237124][ T8333] ? convert___skb_to_skb+0x44/0x570 [ 653.242243][ T8333] ? memcpy+0x56/0x70 [ 653.246061][ T8333] bpf_prog_test_run_skb+0xb6e/0x1410 [ 653.251273][ T8333] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 653.256998][ T8333] ? __kasan_check_write+0x14/0x20 [ 653.261947][ T8333] ? fput_many+0x160/0x1b0 [ 653.266198][ T8333] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 653.271927][ T8333] __se_sys_bpf+0x5235/0x11cb0 [ 653.276528][ T8333] ? stack_trace_save+0x113/0x1c0 [ 653.281391][ T8333] ? terminate_walk+0x407/0x4f0 [ 653.286075][ T8333] ? stack_trace_snprint+0xf0/0xf0 [ 653.291024][ T8333] ? kmem_cache_free+0xa9/0x1e0 [ 653.295708][ T8333] ? kmem_cache_free+0xa9/0x1e0 [ 653.300396][ T8333] ? kasan_set_track+0x5d/0x70 [ 653.304993][ T8333] ? kasan_set_track+0x4b/0x70 [ 653.309595][ T8333] ? kasan_set_free_info+0x23/0x40 [ 653.314541][ T8333] ? ____kasan_slab_free+0x121/0x160 [ 653.319664][ T8333] ? __kasan_slab_free+0x11/0x20 [ 653.324438][ T8333] ? __x64_sys_bpf+0x90/0x90 [ 653.328864][ T8333] ? do_sys_openat2+0x5e1/0x6f0 [ 653.333552][ T8333] ? __x64_sys_openat+0x243/0x290 [ 653.338411][ T8333] ? do_syscall_64+0x34/0x70 [ 653.342839][ T8333] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 653.348740][ T8333] ? _kstrtoull+0x3a0/0x4a0 [ 653.353079][ T8333] ? kstrtouint_from_user+0x20a/0x2a0 [ 653.358288][ T8333] ? kstrtol_from_user+0x310/0x310 [ 653.363237][ T8333] ? memset+0x35/0x40 [ 653.367053][ T8333] ? __fsnotify_parent+0x4b9/0x6c0 [ 653.372183][ T8333] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 653.378758][ T8333] ? proc_fail_nth_write+0x20b/0x290 [ 653.383880][ T8333] ? proc_fail_nth_read+0x210/0x210 [ 653.388914][ T8333] ? security_file_permission+0x86/0xb0 [ 653.394293][ T8333] ? rw_verify_area+0x1c3/0x360 [ 653.398983][ T8333] ? preempt_count_add+0x92/0x1a0 [ 653.403836][ T8333] ? vfs_write+0x854/0xe70 [ 653.408093][ T8333] ? kernel_write+0x3d0/0x3d0 [ 653.412605][ T8333] ? __kasan_check_write+0x14/0x20 [ 653.417551][ T8333] ? mutex_lock+0xa5/0x110 [ 653.421804][ T8333] ? mutex_trylock+0xa0/0xa0 [ 653.426237][ T8333] ? __kasan_check_write+0x14/0x20 [ 653.431177][ T8333] ? fput_many+0x160/0x1b0 [ 653.435437][ T8333] ? debug_smp_processor_id+0x17/0x20 [ 653.440640][ T8333] __x64_sys_bpf+0x7b/0x90 [ 653.444890][ T8333] do_syscall_64+0x34/0x70 [ 653.449147][ T8333] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 653.454980][ T8333] RIP: 0033:0x7fdfe54a7bd9 [ 653.459236][ T8333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 653.478677][ T8333] RSP: 002b:00007fdfe4729048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 653.486919][ T8333] RAX: ffffffffffffffda RBX: 00007fdfe5635f60 RCX: 00007fdfe54a7bd9 [ 653.494730][ T8333] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 653.502540][ T8333] RBP: 00007fdfe47290a0 R08: 0000000000000000 R09: 0000000000000000 [ 653.510355][ T8333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 653.518165][ T8333] R13: 000000000000000b R14: 00007fdfe5635f60 R15: 00007ffcec4491e8 [ 653.940118][ T8396] device wg2 entered promiscuous mode [ 654.766598][ T8417] device pim6reg1 entered promiscuous mode [ 654.842615][ T8432] device veth0_vlan left promiscuous mode [ 654.849957][ T8432] device veth0_vlan entered promiscuous mode [ 655.857515][ T8486] FAULT_INJECTION: forcing a failure. [ 655.857515][ T8486] name failslab, interval 1, probability 0, space 0, times 0 [ 655.870252][ T8486] CPU: 0 PID: 8486 Comm: syz.4.12387 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 655.881419][ T8486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 655.891343][ T8486] Call Trace: [ 655.894438][ T8486] dump_stack_lvl+0x1e2/0x24b [ 655.898944][ T8486] ? panic+0x812/0x812 [ 655.902846][ T8486] ? bfq_pos_tree_add_move+0x43b/0x43b [ 655.908146][ T8486] ? __kasan_check_write+0x14/0x20 [ 655.913087][ T8486] ? __switch_to+0x5f6/0x1240 [ 655.917600][ T8486] dump_stack+0x15/0x17 [ 655.921599][ T8486] should_fail+0x3c6/0x510 [ 655.925847][ T8486] ? skb_clone+0x1de/0x370 [ 655.930101][ T8486] __should_failslab+0xa4/0xe0 [ 655.934702][ T8486] should_failslab+0x9/0x20 [ 655.939048][ T8486] kmem_cache_alloc+0x3d/0x2e0 [ 655.943640][ T8486] skb_clone+0x1de/0x370 [ 655.947719][ T8486] bpf_clone_redirect+0xa6/0x390 [ 655.952497][ T8486] ? __schedule+0xbee/0x1330 [ 655.956925][ T8486] bpf_prog_64e505a7b7f97a05+0x55/0x654 [ 655.962391][ T8486] ? rcu_gp_kthread+0x490/0x23a0 [ 655.967166][ T8486] ? rcu_read_unlock_special+0xd8/0x4c0 [ 655.972543][ T8486] ? schedule_preempt_disabled+0x20/0x20 [ 655.978013][ T8486] ? __rcu_read_unlock+0x90/0x90 [ 655.982787][ T8486] ? ktime_get+0x10e/0x140 [ 655.987134][ T8486] ? bpf_test_timer_continue+0x31e/0x440 [ 655.992682][ T8486] bpf_test_run+0x40b/0xc20 [ 655.997023][ T8486] ? convert___skb_to_skb+0x570/0x570 [ 656.002316][ T8486] ? eth_type_trans+0x2e4/0x620 [ 656.006998][ T8486] ? eth_get_headlen+0x240/0x240 [ 656.011772][ T8486] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 656.017155][ T8486] ? convert___skb_to_skb+0x44/0x570 [ 656.022275][ T8486] ? memcpy+0x56/0x70 [ 656.026092][ T8486] bpf_prog_test_run_skb+0xb6e/0x1410 [ 656.031311][ T8486] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 656.037034][ T8486] ? __kasan_check_write+0x14/0x20 [ 656.041978][ T8486] ? fput_many+0x160/0x1b0 [ 656.046230][ T8486] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 656.051962][ T8486] __se_sys_bpf+0x5235/0x11cb0 [ 656.056583][ T8486] ? stack_trace_save+0x113/0x1c0 [ 656.061432][ T8486] ? terminate_walk+0x407/0x4f0 [ 656.066126][ T8486] ? stack_trace_snprint+0xf0/0xf0 [ 656.071071][ T8486] ? kmem_cache_free+0xa9/0x1e0 [ 656.075743][ T8486] ? kmem_cache_free+0xa9/0x1e0 [ 656.080429][ T8486] ? kasan_set_track+0x5d/0x70 [ 656.085025][ T8486] ? kasan_set_track+0x4b/0x70 [ 656.089631][ T8486] ? kasan_set_free_info+0x23/0x40 [ 656.094573][ T8486] ? ____kasan_slab_free+0x121/0x160 [ 656.099789][ T8486] ? __kasan_slab_free+0x11/0x20 [ 656.104678][ T8486] ? __x64_sys_bpf+0x90/0x90 [ 656.109096][ T8486] ? do_sys_openat2+0x5e1/0x6f0 [ 656.113777][ T8486] ? __x64_sys_openat+0x243/0x290 [ 656.118639][ T8486] ? do_syscall_64+0x34/0x70 [ 656.123063][ T8486] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 656.128965][ T8486] ? _kstrtoull+0x3a0/0x4a0 [ 656.133301][ T8486] ? kstrtouint_from_user+0x20a/0x2a0 [ 656.138511][ T8486] ? kstrtol_from_user+0x310/0x310 [ 656.143459][ T8486] ? memset+0x35/0x40 [ 656.147280][ T8486] ? __fsnotify_parent+0x4b9/0x6c0 [ 656.152224][ T8486] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 656.158823][ T8486] ? proc_fail_nth_write+0x20b/0x290 [ 656.163939][ T8486] ? proc_fail_nth_read+0x210/0x210 [ 656.168976][ T8486] ? security_file_permission+0x86/0xb0 [ 656.174359][ T8486] ? rw_verify_area+0x1c3/0x360 [ 656.179043][ T8486] ? slab_free_freelist_hook+0xc0/0x190 [ 656.184424][ T8486] ? preempt_count_add+0x92/0x1a0 [ 656.189283][ T8486] ? vfs_write+0x854/0xe70 [ 656.193539][ T8486] ? kernel_write+0x3d0/0x3d0 [ 656.198053][ T8486] ? __kasan_check_write+0x14/0x20 [ 656.202997][ T8486] ? mutex_lock+0xa5/0x110 [ 656.207249][ T8486] ? mutex_trylock+0xa0/0xa0 [ 656.211679][ T8486] ? __kasan_check_write+0x14/0x20 [ 656.216624][ T8486] ? fput_many+0x160/0x1b0 [ 656.220883][ T8486] ? debug_smp_processor_id+0x17/0x20 [ 656.226087][ T8486] __x64_sys_bpf+0x7b/0x90 [ 656.230340][ T8486] do_syscall_64+0x34/0x70 [ 656.234594][ T8486] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 656.240319][ T8486] RIP: 0033:0x7fb86d722bd9 [ 656.244575][ T8486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 656.264018][ T8486] RSP: 002b:00007fb86c9a4048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 656.272262][ T8486] RAX: ffffffffffffffda RBX: 00007fb86d8b0f60 RCX: 00007fb86d722bd9 [ 656.280070][ T8486] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 656.287880][ T8486] RBP: 00007fb86c9a40a0 R08: 0000000000000000 R09: 0000000000000000 [ 656.295693][ T8486] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 656.303504][ T8486] R13: 000000000000000b R14: 00007fb86d8b0f60 R15: 00007ffd5b2cb8c8 [ 656.382675][ T8506] device syzkaller0 entered promiscuous mode [ 656.390848][ T8508] device wg2 left promiscuous mode [ 656.422739][ T8508] device wg2 entered promiscuous mode [ 656.822361][ T8547] FAULT_INJECTION: forcing a failure. [ 656.822361][ T8547] name failslab, interval 1, probability 0, space 0, times 0 [ 656.834869][ T8547] CPU: 1 PID: 8547 Comm: syz.0.12404 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 656.845952][ T8547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 656.855844][ T8547] Call Trace: [ 656.858980][ T8547] dump_stack_lvl+0x1e2/0x24b [ 656.863487][ T8547] ? panic+0x812/0x812 [ 656.867403][ T8547] ? slab_post_alloc_hook+0x80/0x2f0 [ 656.872529][ T8547] ? bfq_pos_tree_add_move+0x43b/0x43b [ 656.877812][ T8547] ? __kasan_check_write+0x14/0x20 [ 656.882761][ T8547] dump_stack+0x15/0x17 [ 656.886852][ T8547] should_fail+0x3c6/0x510 [ 656.891102][ T8547] ? skb_clone+0x1de/0x370 [ 656.895350][ T8547] __should_failslab+0xa4/0xe0 [ 656.899945][ T8547] should_failslab+0x9/0x20 [ 656.904282][ T8547] kmem_cache_alloc+0x3d/0x2e0 [ 656.908880][ T8547] ? __bpf_redirect+0x673/0xde0 [ 656.913569][ T8547] skb_clone+0x1de/0x370 [ 656.917651][ T8547] bpf_clone_redirect+0xa6/0x390 [ 656.922428][ T8547] bpf_prog_64e505a7b7f97a05+0x55/0x668 [ 656.927803][ T8547] ? rcu_gp_kthread+0x490/0x23a0 [ 656.932581][ T8547] ? rcu_read_unlock_special+0xd8/0x4c0 [ 656.937957][ T8547] ? schedule_preempt_disabled+0x20/0x20 [ 656.943428][ T8547] ? __rcu_read_unlock+0x90/0x90 [ 656.948199][ T8547] ? ktime_get+0x10e/0x140 [ 656.952453][ T8547] ? __kasan_check_read+0x11/0x20 [ 656.957313][ T8547] ? bpf_test_timer_continue+0x140/0x440 [ 656.962790][ T8547] bpf_test_run+0x40b/0xc20 [ 656.967124][ T8547] ? convert___skb_to_skb+0x570/0x570 [ 656.972326][ T8547] ? eth_type_trans+0x2e4/0x620 [ 656.977013][ T8547] ? eth_get_headlen+0x240/0x240 [ 656.981787][ T8547] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 656.987169][ T8547] ? convert___skb_to_skb+0x44/0x570 [ 656.992293][ T8547] ? memcpy+0x56/0x70 [ 656.996108][ T8547] bpf_prog_test_run_skb+0xb6e/0x1410 [ 657.001321][ T8547] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 657.007046][ T8547] ? __kasan_check_write+0x14/0x20 [ 657.011989][ T8547] ? fput_many+0x160/0x1b0 [ 657.016488][ T8547] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 657.022207][ T8547] __se_sys_bpf+0x5235/0x11cb0 [ 657.026800][ T8547] ? stack_trace_save+0x113/0x1c0 [ 657.031657][ T8547] ? terminate_walk+0x407/0x4f0 [ 657.036353][ T8547] ? stack_trace_snprint+0xf0/0xf0 [ 657.041385][ T8547] ? kmem_cache_free+0xa9/0x1e0 [ 657.046075][ T8547] ? kmem_cache_free+0xa9/0x1e0 [ 657.050757][ T8547] ? kasan_set_track+0x5d/0x70 [ 657.055352][ T8547] ? kasan_set_track+0x4b/0x70 [ 657.059955][ T8547] ? kasan_set_free_info+0x23/0x40 [ 657.064899][ T8547] ? ____kasan_slab_free+0x121/0x160 [ 657.070019][ T8547] ? __kasan_slab_free+0x11/0x20 [ 657.074796][ T8547] ? __x64_sys_bpf+0x90/0x90 [ 657.079223][ T8547] ? do_sys_openat2+0x5e1/0x6f0 [ 657.083904][ T8547] ? __x64_sys_openat+0x243/0x290 [ 657.088765][ T8547] ? do_syscall_64+0x34/0x70 [ 657.093193][ T8547] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 657.099102][ T8547] ? _kstrtoull+0x3a0/0x4a0 [ 657.103450][ T8547] ? kstrtouint_from_user+0x20a/0x2a0 [ 657.108653][ T8547] ? kstrtol_from_user+0x310/0x310 [ 657.113594][ T8547] ? memset+0x35/0x40 [ 657.117412][ T8547] ? __fsnotify_parent+0x4b9/0x6c0 [ 657.122358][ T8547] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 657.128952][ T8547] ? proc_fail_nth_write+0x20b/0x290 [ 657.134075][ T8547] ? proc_fail_nth_read+0x210/0x210 [ 657.139109][ T8547] ? security_file_permission+0x86/0xb0 [ 657.144488][ T8547] ? rw_verify_area+0x1c3/0x360 [ 657.149175][ T8547] ? slab_free_freelist_hook+0xc0/0x190 [ 657.154568][ T8547] ? preempt_count_add+0x92/0x1a0 [ 657.159428][ T8547] ? vfs_write+0x854/0xe70 [ 657.163676][ T8547] ? kernel_write+0x3d0/0x3d0 [ 657.168189][ T8547] ? __kasan_check_write+0x14/0x20 [ 657.173135][ T8547] ? mutex_lock+0xa5/0x110 [ 657.177384][ T8547] ? mutex_trylock+0xa0/0xa0 [ 657.181816][ T8547] ? __kasan_check_write+0x14/0x20 [ 657.186758][ T8547] ? fput_many+0x160/0x1b0 [ 657.191025][ T8547] ? debug_smp_processor_id+0x17/0x20 [ 657.196218][ T8547] __x64_sys_bpf+0x7b/0x90 [ 657.200474][ T8547] do_syscall_64+0x34/0x70 [ 657.204725][ T8547] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 657.210454][ T8547] RIP: 0033:0x7fe920b29bd9 [ 657.214704][ T8547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 657.234150][ T8547] RSP: 002b:00007fe91fdab048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 657.242394][ T8547] RAX: ffffffffffffffda RBX: 00007fe920cb7f60 RCX: 00007fe920b29bd9 [ 657.250208][ T8547] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 657.258014][ T8547] RBP: 00007fe91fdab0a0 R08: 0000000000000000 R09: 0000000000000000 [ 657.265911][ T8547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 657.273728][ T8547] R13: 000000000000000b R14: 00007fe920cb7f60 R15: 00007ffd55b58778 [ 657.360791][ T8562] device syzkaller0 entered promiscuous mode [ 657.373216][ T8568] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 657.381113][ T8568] pim6reg0: linktype set to 0 [ 657.486487][ T8575] syz.3.12413[8575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.486520][ T8575] syz.3.12413[8575] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 657.523147][ T8583] device pim6reg1 entered promiscuous mode [ 657.589441][ T8590] FAULT_INJECTION: forcing a failure. [ 657.589441][ T8590] name failslab, interval 1, probability 0, space 0, times 0 [ 657.601927][ T8590] CPU: 1 PID: 8590 Comm: syz.1.12419 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 657.613042][ T8590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 657.622932][ T8590] Call Trace: [ 657.626058][ T8590] dump_stack_lvl+0x1e2/0x24b [ 657.630567][ T8590] ? panic+0x812/0x812 [ 657.634471][ T8590] ? slab_post_alloc_hook+0x80/0x2f0 [ 657.639593][ T8590] ? bfq_pos_tree_add_move+0x43b/0x43b [ 657.644886][ T8590] ? __kasan_check_write+0x14/0x20 [ 657.649834][ T8590] dump_stack+0x15/0x17 [ 657.653825][ T8590] should_fail+0x3c6/0x510 [ 657.658084][ T8590] ? skb_clone+0x1de/0x370 [ 657.662333][ T8590] __should_failslab+0xa4/0xe0 [ 657.666933][ T8590] should_failslab+0x9/0x20 [ 657.671272][ T8590] kmem_cache_alloc+0x3d/0x2e0 [ 657.675963][ T8590] ? __bpf_redirect+0x673/0xde0 [ 657.680647][ T8590] skb_clone+0x1de/0x370 [ 657.684729][ T8590] bpf_clone_redirect+0xa6/0x390 [ 657.689501][ T8590] bpf_prog_64e505a7b7f97a05+0x55/0x9f8 [ 657.694880][ T8590] ? __kasan_slab_alloc+0xc3/0xe0 [ 657.699738][ T8590] ? __kasan_slab_alloc+0xb1/0xe0 [ 657.704599][ T8590] ? slab_post_alloc_hook+0x61/0x2f0 [ 657.709726][ T8590] ? kmem_cache_alloc+0x168/0x2e0 [ 657.714581][ T8590] ? __build_skb+0x2a/0x300 [ 657.718922][ T8590] ? build_skb+0x25/0x1e0 [ 657.723089][ T8590] ? bpf_prog_test_run_skb+0x388/0x1410 [ 657.728469][ T8590] ? __se_sys_bpf+0x5235/0x11cb0 [ 657.733246][ T8590] ? __x64_sys_bpf+0x7b/0x90 [ 657.737670][ T8590] ? do_syscall_64+0x34/0x70 [ 657.742101][ T8590] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 657.748007][ T8590] ? __kasan_check_read+0x11/0x20 [ 657.752858][ T8590] ? bpf_test_timer_continue+0x140/0x440 [ 657.758334][ T8590] bpf_test_run+0x40b/0xc20 [ 657.762670][ T8590] ? convert___skb_to_skb+0x570/0x570 [ 657.767876][ T8590] ? eth_type_trans+0x2e4/0x620 [ 657.772559][ T8590] ? eth_get_headlen+0x240/0x240 [ 657.777334][ T8590] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 657.782715][ T8590] ? convert___skb_to_skb+0x44/0x570 [ 657.787922][ T8590] ? memcpy+0x56/0x70 [ 657.791752][ T8590] bpf_prog_test_run_skb+0xb6e/0x1410 [ 657.796957][ T8590] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 657.802682][ T8590] ? __kasan_check_write+0x14/0x20 [ 657.807625][ T8590] ? fput_many+0x160/0x1b0 [ 657.811881][ T8590] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 657.817609][ T8590] __se_sys_bpf+0x5235/0x11cb0 [ 657.822212][ T8590] ? get_perf_callchain+0x5cb/0x810 [ 657.827240][ T8590] ? put_callchain_entry+0xb0/0xb0 [ 657.832192][ T8590] ? kmem_cache_free+0xa9/0x1e0 [ 657.836876][ T8590] ? __bpf_get_stack+0x476/0x570 [ 657.841651][ T8590] ? __x64_sys_bpf+0x90/0x90 [ 657.846076][ T8590] ? __bpf_get_stack+0x3e9/0x570 [ 657.850871][ T8590] ? _kstrtoull+0x3a0/0x4a0 [ 657.855203][ T8590] ? kstrtouint_from_user+0x20a/0x2a0 [ 657.860412][ T8590] ? kstrtol_from_user+0x310/0x310 [ 657.865351][ T8590] ? bpf_get_stack+0x31/0x40 [ 657.869776][ T8590] ? memset+0x35/0x40 [ 657.873593][ T8590] ? __fsnotify_parent+0x4b9/0x6c0 [ 657.878542][ T8590] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 657.885134][ T8590] ? proc_fail_nth_write+0x20b/0x290 [ 657.890258][ T8590] ? proc_fail_nth_read+0x210/0x210 [ 657.895378][ T8590] ? security_file_permission+0x86/0xb0 [ 657.900759][ T8590] ? rw_verify_area+0x1c3/0x360 [ 657.905443][ T8590] ? preempt_count_add+0x92/0x1a0 [ 657.910305][ T8590] ? vfs_write+0x854/0xe70 [ 657.914567][ T8590] ? kernel_write+0x3d0/0x3d0 [ 657.919074][ T8590] ? __kasan_check_write+0x14/0x20 [ 657.924017][ T8590] ? mutex_lock+0xa5/0x110 [ 657.928270][ T8590] ? mutex_trylock+0xa0/0xa0 [ 657.932704][ T8590] ? __kasan_check_write+0x14/0x20 [ 657.937645][ T8590] ? fput_many+0x160/0x1b0 [ 657.941902][ T8590] ? debug_smp_processor_id+0x17/0x20 [ 657.947107][ T8590] __x64_sys_bpf+0x7b/0x90 [ 657.951357][ T8590] do_syscall_64+0x34/0x70 [ 657.955612][ T8590] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 657.961340][ T8590] RIP: 0033:0x7fa4fc08cbd9 [ 657.965594][ T8590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 657.985044][ T8590] RSP: 002b:00007fa4fb30e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 657.993281][ T8590] RAX: ffffffffffffffda RBX: 00007fa4fc21af60 RCX: 00007fa4fc08cbd9 [ 658.001088][ T8590] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 658.008901][ T8590] RBP: 00007fa4fb30e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 658.016713][ T8590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 658.024522][ T8590] R13: 000000000000000b R14: 00007fa4fc21af60 R15: 00007ffd93cd84d8 [ 661.263899][ T8757] device syzkaller0 entered promiscuous mode [ 662.499933][ T8828] bridge0: port 3(vlan1) entered disabled state [ 662.762394][ T8852] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.769340][ T8852] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.777056][ T8852] device bridge0 left promiscuous mode [ 662.783986][ T8852] device bridge_slave_1 left promiscuous mode [ 662.790043][ T8852] bridge0: port 2(bridge_slave_1) entered disabled state [ 662.799297][ T8852] device bridge_slave_0 left promiscuous mode [ 662.805321][ T8852] bridge0: port 1(bridge_slave_0) entered disabled state [ 662.941333][ T8884] syz.2.12510[8884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.941404][ T8884] syz.2.12510[8884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 662.977830][ T8894] device pim6reg1 entered promiscuous mode [ 663.069879][ T8906] device syzkaller0 entered promiscuous mode [ 663.087135][ T8907] device syzkaller0 entered promiscuous mode [ 663.095339][ T8904] syz.4.12516[8904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.095408][ T8904] syz.4.12516[8904] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.187806][ T8923] device pim6reg1 entered promiscuous mode [ 663.270232][ T8936] device pim6reg1 entered promiscuous mode [ 663.292433][ T8940] device pim6reg1 entered promiscuous mode [ 663.587058][ T9000] device syzkaller0 entered promiscuous mode [ 663.616285][ T9000] device pim6reg1 entered promiscuous mode [ 663.708297][ T9010] device syzkaller0 entered promiscuous mode [ 663.840376][ T9030] device syzkaller0 entered promiscuous mode [ 663.902536][ T9042] syz.0.12562[9042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.902585][ T9042] syz.0.12562[9042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.915079][ T9042] syz.0.12562[9042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.928137][ T9042] syz.0.12562[9042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.946353][ T9042] syz.0.12562[9042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.957693][ T9042] syz.0.12562[9042] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 664.001715][ T9067] device sit0 left promiscuous mode [ 664.056762][ T9071] device pim6reg1 entered promiscuous mode [ 664.068940][ T9067] device sit0 entered promiscuous mode [ 664.186921][ T9082] device pim6reg1 entered promiscuous mode [ 665.278772][ T9242] device pim6reg1 entered promiscuous mode [ 665.440584][ T9254] FAULT_INJECTION: forcing a failure. [ 665.440584][ T9254] name failslab, interval 1, probability 0, space 0, times 0 [ 665.453301][ T9254] CPU: 1 PID: 9254 Comm: syz.4.12623 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 665.464469][ T9254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 665.474354][ T9254] Call Trace: [ 665.477492][ T9254] dump_stack_lvl+0x1e2/0x24b [ 665.481997][ T9254] ? panic+0x812/0x812 [ 665.485905][ T9254] ? slab_post_alloc_hook+0x80/0x2f0 [ 665.491032][ T9254] ? bfq_pos_tree_add_move+0x43b/0x43b [ 665.496335][ T9254] ? __kasan_check_write+0x14/0x20 [ 665.501269][ T9254] dump_stack+0x15/0x17 [ 665.505258][ T9254] should_fail+0x3c6/0x510 [ 665.509526][ T9254] ? skb_clone+0x1de/0x370 [ 665.513857][ T9254] __should_failslab+0xa4/0xe0 [ 665.518458][ T9254] should_failslab+0x9/0x20 [ 665.522789][ T9254] kmem_cache_alloc+0x3d/0x2e0 [ 665.527385][ T9254] ? __bpf_redirect+0x673/0xde0 [ 665.532074][ T9254] skb_clone+0x1de/0x370 [ 665.536151][ T9254] bpf_clone_redirect+0xa6/0x390 [ 665.540928][ T9254] bpf_prog_64e505a7b7f97a05+0x55/0x4bc [ 665.546309][ T9254] ? rcu_gp_kthread+0x490/0x23a0 [ 665.551085][ T9254] ? rcu_read_unlock_special+0xd8/0x4c0 [ 665.556460][ T9254] ? schedule_preempt_disabled+0x20/0x20 [ 665.561929][ T9254] ? __rcu_read_unlock+0x90/0x90 [ 665.566727][ T9254] ? ktime_get+0x10e/0x140 [ 665.570974][ T9254] ? __kasan_check_read+0x11/0x20 [ 665.575853][ T9254] ? bpf_test_timer_continue+0x140/0x440 [ 665.581292][ T9254] bpf_test_run+0x40b/0xc20 [ 665.585629][ T9254] ? convert___skb_to_skb+0x570/0x570 [ 665.590832][ T9254] ? eth_type_trans+0x2e4/0x620 [ 665.595518][ T9254] ? eth_get_headlen+0x240/0x240 [ 665.600293][ T9254] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 665.605670][ T9254] ? convert___skb_to_skb+0x44/0x570 [ 665.610804][ T9254] ? memcpy+0x56/0x70 [ 665.614613][ T9254] bpf_prog_test_run_skb+0xb6e/0x1410 [ 665.619839][ T9254] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 665.625551][ T9254] ? __kasan_check_write+0x14/0x20 [ 665.630498][ T9254] ? fput_many+0x160/0x1b0 [ 665.634754][ T9254] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 665.640477][ T9254] __se_sys_bpf+0x5235/0x11cb0 [ 665.645078][ T9254] ? sched_clock+0x3a/0x40 [ 665.649327][ T9254] ? sched_clock+0x3a/0x40 [ 665.653584][ T9254] ? debug_smp_processor_id+0x17/0x20 [ 665.658793][ T9254] ? __irq_exit_rcu+0x40/0x150 [ 665.663391][ T9254] ? irq_exit_rcu+0x9/0x10 [ 665.667651][ T9254] ? sysvec_irq_work+0xc8/0xd0 [ 665.672243][ T9254] ? __x64_sys_bpf+0x90/0x90 [ 665.676673][ T9254] ? _kstrtoull+0x3a0/0x4a0 [ 665.681008][ T9254] ? kstrtouint_from_user+0x20a/0x2a0 [ 665.686215][ T9254] ? kstrtol_from_user+0x310/0x310 [ 665.691166][ T9254] ? memset+0x35/0x40 [ 665.694986][ T9254] ? __fsnotify_parent+0x4b9/0x6c0 [ 665.699932][ T9254] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 665.706526][ T9254] ? proc_fail_nth_write+0x20b/0x290 [ 665.711737][ T9254] ? proc_fail_nth_read+0x210/0x210 [ 665.716773][ T9254] ? security_file_permission+0x86/0xb0 [ 665.722151][ T9254] ? rw_verify_area+0x1c3/0x360 [ 665.726837][ T9254] ? preempt_count_add+0x92/0x1a0 [ 665.731696][ T9254] ? vfs_write+0x854/0xe70 [ 665.735951][ T9254] ? kernel_write+0x3d0/0x3d0 [ 665.740465][ T9254] ? __kasan_check_write+0x14/0x20 [ 665.745409][ T9254] ? mutex_lock+0xa5/0x110 [ 665.749663][ T9254] ? mutex_trylock+0xa0/0xa0 [ 665.754090][ T9254] ? __kasan_check_write+0x14/0x20 [ 665.759040][ T9254] ? fput_many+0x160/0x1b0 [ 665.763295][ T9254] ? debug_smp_processor_id+0x17/0x20 [ 665.768498][ T9254] __x64_sys_bpf+0x7b/0x90 [ 665.772751][ T9254] do_syscall_64+0x34/0x70 [ 665.777005][ T9254] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 665.782732][ T9254] RIP: 0033:0x7fb86d722bd9 [ 665.786986][ T9254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 665.806514][ T9254] RSP: 002b:00007fb86c9a4048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 665.814758][ T9254] RAX: ffffffffffffffda RBX: 00007fb86d8b0f60 RCX: 00007fb86d722bd9 [ 665.822569][ T9254] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 665.830381][ T9254] RBP: 00007fb86c9a40a0 R08: 0000000000000000 R09: 0000000000000000 [ 665.838190][ T9254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 665.846002][ T9254] R13: 000000000000000b R14: 00007fb86d8b0f60 R15: 00007ffd5b2cb8c8 [ 666.504769][ T9348] device pim6reg1 entered promiscuous mode [ 667.105373][ T9389] FAULT_INJECTION: forcing a failure. [ 667.105373][ T9389] name failslab, interval 1, probability 0, space 0, times 0 [ 667.117836][ T9389] CPU: 0 PID: 9389 Comm: syz.2.12670 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 667.128978][ T9389] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 667.138863][ T9389] Call Trace: [ 667.141995][ T9389] dump_stack_lvl+0x1e2/0x24b [ 667.146525][ T9389] ? panic+0x812/0x812 [ 667.150410][ T9389] ? slab_post_alloc_hook+0x80/0x2f0 [ 667.155530][ T9389] ? bfq_pos_tree_add_move+0x43b/0x43b [ 667.160944][ T9389] ? __kasan_check_write+0x14/0x20 [ 667.165874][ T9389] dump_stack+0x15/0x17 [ 667.169867][ T9389] should_fail+0x3c6/0x510 [ 667.174119][ T9389] ? skb_clone+0x1de/0x370 [ 667.178376][ T9389] __should_failslab+0xa4/0xe0 [ 667.182975][ T9389] should_failslab+0x9/0x20 [ 667.187312][ T9389] kmem_cache_alloc+0x3d/0x2e0 [ 667.191915][ T9389] ? __bpf_redirect+0x673/0xde0 [ 667.196602][ T9389] skb_clone+0x1de/0x370 [ 667.200688][ T9389] bpf_clone_redirect+0xa6/0x390 [ 667.205456][ T9389] bpf_prog_64e505a7b7f97a05+0x55/0x738 [ 667.210851][ T9389] ? __kasan_slab_alloc+0xc3/0xe0 [ 667.215697][ T9389] ? __kasan_slab_alloc+0xb1/0xe0 [ 667.220563][ T9389] ? slab_post_alloc_hook+0x61/0x2f0 [ 667.225695][ T9389] ? kmem_cache_alloc+0x168/0x2e0 [ 667.230541][ T9389] ? __build_skb+0x2a/0x300 [ 667.234875][ T9389] ? build_skb+0x25/0x1e0 [ 667.239044][ T9389] ? bpf_prog_test_run_skb+0x388/0x1410 [ 667.244422][ T9389] ? __se_sys_bpf+0x5235/0x11cb0 [ 667.249195][ T9389] ? __x64_sys_bpf+0x7b/0x90 [ 667.253623][ T9389] ? do_syscall_64+0x34/0x70 [ 667.258052][ T9389] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 667.263962][ T9389] ? __kasan_check_read+0x11/0x20 [ 667.268816][ T9389] ? bpf_test_timer_continue+0x140/0x440 [ 667.274284][ T9389] bpf_test_run+0x40b/0xc20 [ 667.278624][ T9389] ? convert___skb_to_skb+0x570/0x570 [ 667.283863][ T9389] ? eth_type_trans+0x2e4/0x620 [ 667.288517][ T9389] ? eth_get_headlen+0x240/0x240 [ 667.293288][ T9389] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 667.298669][ T9389] ? convert___skb_to_skb+0x44/0x570 [ 667.303794][ T9389] ? memcpy+0x56/0x70 [ 667.307691][ T9389] bpf_prog_test_run_skb+0xb6e/0x1410 [ 667.312837][ T9389] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 667.318555][ T9389] ? __kasan_check_write+0x14/0x20 [ 667.323494][ T9389] ? fput_many+0x160/0x1b0 [ 667.327747][ T9389] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 667.333477][ T9389] __se_sys_bpf+0x5235/0x11cb0 [ 667.338077][ T9389] ? stack_trace_save+0x113/0x1c0 [ 667.342935][ T9389] ? terminate_walk+0x407/0x4f0 [ 667.347625][ T9389] ? stack_trace_snprint+0xf0/0xf0 [ 667.352571][ T9389] ? kmem_cache_free+0xa9/0x1e0 [ 667.357255][ T9389] ? kmem_cache_free+0xa9/0x1e0 [ 667.361943][ T9389] ? kasan_set_track+0x5d/0x70 [ 667.366546][ T9389] ? kasan_set_track+0x4b/0x70 [ 667.371149][ T9389] ? kasan_set_free_info+0x23/0x40 [ 667.376091][ T9389] ? ____kasan_slab_free+0x121/0x160 [ 667.381211][ T9389] ? __kasan_slab_free+0x11/0x20 [ 667.385986][ T9389] ? __x64_sys_bpf+0x90/0x90 [ 667.390420][ T9389] ? do_sys_openat2+0x5e1/0x6f0 [ 667.395099][ T9389] ? __x64_sys_openat+0x243/0x290 [ 667.399959][ T9389] ? do_syscall_64+0x34/0x70 [ 667.404388][ T9389] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 667.410292][ T9389] ? _kstrtoull+0x3a0/0x4a0 [ 667.414630][ T9389] ? kstrtouint_from_user+0x20a/0x2a0 [ 667.419837][ T9389] ? kstrtol_from_user+0x310/0x310 [ 667.424784][ T9389] ? memset+0x35/0x40 [ 667.428603][ T9389] ? __fsnotify_parent+0x4b9/0x6c0 [ 667.433551][ T9389] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 667.440144][ T9389] ? proc_fail_nth_write+0x20b/0x290 [ 667.445265][ T9389] ? proc_fail_nth_read+0x210/0x210 [ 667.450301][ T9389] ? security_file_permission+0x86/0xb0 [ 667.455685][ T9389] ? rw_verify_area+0x1c3/0x360 [ 667.460375][ T9389] ? preempt_count_add+0x92/0x1a0 [ 667.465228][ T9389] ? vfs_write+0x854/0xe70 [ 667.469571][ T9389] ? kernel_write+0x3d0/0x3d0 [ 667.474084][ T9389] ? __kasan_check_write+0x14/0x20 [ 667.479028][ T9389] ? mutex_lock+0xa5/0x110 [ 667.483282][ T9389] ? mutex_trylock+0xa0/0xa0 [ 667.487712][ T9389] ? __kasan_check_write+0x14/0x20 [ 667.492657][ T9389] ? fput_many+0x160/0x1b0 [ 667.496916][ T9389] ? debug_smp_processor_id+0x17/0x20 [ 667.502122][ T9389] __x64_sys_bpf+0x7b/0x90 [ 667.506377][ T9389] do_syscall_64+0x34/0x70 [ 667.510662][ T9389] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 667.516352][ T9389] RIP: 0033:0x7f142ce6fbd9 [ 667.520604][ T9389] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 667.540136][ T9389] RSP: 002b:00007f142c0f1048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 667.548378][ T9389] RAX: ffffffffffffffda RBX: 00007f142cffdf60 RCX: 00007f142ce6fbd9 [ 667.556187][ T9389] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 667.563999][ T9389] RBP: 00007f142c0f10a0 R08: 0000000000000000 R09: 0000000000000000 [ 667.571809][ T9389] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 667.579623][ T9389] R13: 000000000000000b R14: 00007f142cffdf60 R15: 00007ffdb5120048 [ 668.064081][ T9428] tap0: tun_chr_ioctl cmd 1074025673 [ 669.588734][ T9484] bpf_get_probe_write_proto: 4 callbacks suppressed [ 669.588745][ T9484] syz.4.12699[9484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.701833][ T9484] syz.4.12699[9484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 669.979031][ T9484] device wg2 left promiscuous mode [ 670.758105][ T9513] device sit0 entered promiscuous mode [ 672.409355][ T9569] device syzkaller0 entered promiscuous mode [ 673.819089][ T9604] device macsec0 entered promiscuous mode [ 675.088344][ T9662] FAULT_INJECTION: forcing a failure. [ 675.088344][ T9662] name failslab, interval 1, probability 0, space 0, times 0 [ 675.101099][ T9662] CPU: 1 PID: 9662 Comm: syz.4.12752 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 675.112276][ T9662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 675.122174][ T9662] Call Trace: [ 675.125304][ T9662] dump_stack_lvl+0x1e2/0x24b [ 675.129811][ T9662] ? bfq_pos_tree_add_move+0x43b/0x43b [ 675.135099][ T9662] ? kmem_cache_free+0xa9/0x1e0 [ 675.139873][ T9662] ? kasan_set_track+0x5d/0x70 [ 675.144469][ T9662] ? kasan_set_free_info+0x23/0x40 [ 675.149436][ T9662] ? ____kasan_slab_free+0x121/0x160 [ 675.154548][ T9662] ? __kasan_slab_free+0x11/0x20 [ 675.159313][ T9662] ? kmem_cache_free+0xa9/0x1e0 [ 675.164013][ T9662] dump_stack+0x15/0x17 [ 675.168006][ T9662] should_fail+0x3c6/0x510 [ 675.172250][ T9662] ? dup_task_struct+0x57/0xc30 [ 675.176938][ T9662] __should_failslab+0xa4/0xe0 [ 675.181556][ T9662] should_failslab+0x9/0x20 [ 675.185874][ T9662] kmem_cache_alloc+0x3d/0x2e0 [ 675.190478][ T9662] dup_task_struct+0x57/0xc30 [ 675.194987][ T9662] ? __kasan_check_write+0x14/0x20 [ 675.199954][ T9662] copy_process+0x5c8/0x3340 [ 675.204361][ T9662] ? proc_fail_nth_write+0x20b/0x290 [ 675.209481][ T9662] ? proc_fail_nth_read+0x210/0x210 [ 675.214515][ T9662] ? security_file_permission+0x86/0xb0 [ 675.219894][ T9662] ? rw_verify_area+0x1c3/0x360 [ 675.224616][ T9662] ? slab_free_freelist_hook+0xc0/0x190 [ 675.229965][ T9662] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 675.234908][ T9662] ? vfs_write+0x854/0xe70 [ 675.239168][ T9662] kernel_clone+0x21e/0x9e0 [ 675.243502][ T9662] ? __kasan_check_write+0x14/0x20 [ 675.248451][ T9662] ? create_io_thread+0x1e0/0x1e0 [ 675.253311][ T9662] __x64_sys_clone+0x23f/0x290 [ 675.257913][ T9662] ? __do_sys_vfork+0x130/0x130 [ 675.262602][ T9662] ? debug_smp_processor_id+0x17/0x20 [ 675.267811][ T9662] do_syscall_64+0x34/0x70 [ 675.272059][ T9662] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 675.277795][ T9662] RIP: 0033:0x7fb86d722bd9 [ 675.282042][ T9662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 675.301479][ T9662] RSP: 002b:00007fb86c9a3ff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 675.309725][ T9662] RAX: ffffffffffffffda RBX: 00007fb86d8b0f60 RCX: 00007fb86d722bd9 [ 675.317549][ T9662] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 675.325358][ T9662] RBP: 00007fb86c9a40a0 R08: 0000000000000000 R09: 0000000000000000 [ 675.333161][ T9662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 675.340980][ T9662] R13: 000000000000000b R14: 00007fb86d8b0f60 R15: 00007ffd5b2cb8c8 [ 675.852529][ T9708] FAULT_INJECTION: forcing a failure. [ 675.852529][ T9708] name failslab, interval 1, probability 0, space 0, times 0 [ 675.884332][ T9708] CPU: 1 PID: 9708 Comm: syz.1.12766 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 675.895675][ T9708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 675.905574][ T9708] Call Trace: [ 675.908693][ T9708] dump_stack_lvl+0x1e2/0x24b [ 675.913199][ T9708] ? panic+0x812/0x812 [ 675.917114][ T9708] ? do_syscall_64+0x34/0x70 [ 675.921537][ T9708] ? bfq_pos_tree_add_move+0x43b/0x43b [ 675.926843][ T9708] dump_stack+0x15/0x17 [ 675.930828][ T9708] should_fail+0x3c6/0x510 [ 675.935077][ T9708] ? __get_vm_area_node+0x116/0x470 [ 675.940118][ T9708] __should_failslab+0xa4/0xe0 [ 675.944718][ T9708] should_failslab+0x9/0x20 [ 675.949049][ T9708] kmem_cache_alloc_trace+0x3a/0x2e0 [ 675.954168][ T9708] __get_vm_area_node+0x116/0x470 [ 675.959050][ T9708] __vmalloc_node_range+0xdc/0x7c0 [ 675.963984][ T9708] ? copy_process+0x5c8/0x3340 [ 675.968581][ T9708] ? kmem_cache_alloc+0x168/0x2e0 [ 675.973441][ T9708] dup_task_struct+0x429/0xc30 [ 675.978046][ T9708] ? copy_process+0x5c8/0x3340 [ 675.982634][ T9708] copy_process+0x5c8/0x3340 [ 675.987060][ T9708] ? proc_fail_nth_write+0x20b/0x290 [ 675.992199][ T9708] ? proc_fail_nth_read+0x210/0x210 [ 675.997221][ T9708] ? security_file_permission+0x86/0xb0 [ 676.002717][ T9708] ? rw_verify_area+0x1c3/0x360 [ 676.007404][ T9708] ? slab_free_freelist_hook+0xc0/0x190 [ 676.012769][ T9708] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 676.017747][ T9708] ? vfs_write+0x854/0xe70 [ 676.021986][ T9708] kernel_clone+0x21e/0x9e0 [ 676.026331][ T9708] ? __kasan_check_write+0x14/0x20 [ 676.031261][ T9708] ? create_io_thread+0x1e0/0x1e0 [ 676.036142][ T9708] __x64_sys_clone+0x23f/0x290 [ 676.040722][ T9708] ? __do_sys_vfork+0x130/0x130 [ 676.045408][ T9708] ? debug_smp_processor_id+0x17/0x20 [ 676.050636][ T9708] do_syscall_64+0x34/0x70 [ 676.054884][ T9708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 676.060603][ T9708] RIP: 0033:0x7fa4fc08cbd9 [ 676.064864][ T9708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 676.084299][ T9708] RSP: 002b:00007fa4fb30dff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 676.092534][ T9708] RAX: ffffffffffffffda RBX: 00007fa4fc21af60 RCX: 00007fa4fc08cbd9 [ 676.100353][ T9708] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 676.108162][ T9708] RBP: 00007fa4fb30e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 676.116157][ T9708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 676.123954][ T9708] R13: 000000000000000b R14: 00007fa4fc21af60 R15: 00007ffd93cd84d8 [ 676.138442][ T9708] syz.1.12766: vmalloc: allocation failure: 32768 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 676.153225][ T9708] CPU: 1 PID: 9708 Comm: syz.1.12766 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 676.164493][ T9708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 676.174384][ T9708] Call Trace: [ 676.177509][ T9708] dump_stack_lvl+0x1e2/0x24b [ 676.182014][ T9708] ? wake_up_klogd+0xb8/0xf0 [ 676.186441][ T9708] ? bfq_pos_tree_add_move+0x43b/0x43b [ 676.191735][ T9708] ? pr_cont_kernfs_name+0xf0/0x100 [ 676.196775][ T9708] dump_stack+0x15/0x17 [ 676.200765][ T9708] warn_alloc+0x21a/0x390 [ 676.204927][ T9708] ? __get_vm_area_node+0x116/0x470 [ 676.210066][ T9708] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 676.215436][ T9708] ? __get_vm_area_node+0x34b/0x470 [ 676.220472][ T9708] __vmalloc_node_range+0x287/0x7c0 [ 676.225508][ T9708] ? kmem_cache_alloc+0x168/0x2e0 [ 676.230368][ T9708] dup_task_struct+0x429/0xc30 [ 676.234965][ T9708] ? copy_process+0x5c8/0x3340 [ 676.239591][ T9708] copy_process+0x5c8/0x3340 [ 676.243985][ T9708] ? proc_fail_nth_write+0x20b/0x290 [ 676.249104][ T9708] ? proc_fail_nth_read+0x210/0x210 [ 676.254285][ T9708] ? security_file_permission+0x86/0xb0 [ 676.259675][ T9708] ? rw_verify_area+0x1c3/0x360 [ 676.264352][ T9708] ? slab_free_freelist_hook+0xc0/0x190 [ 676.269742][ T9708] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 676.274671][ T9708] ? vfs_write+0x854/0xe70 [ 676.278967][ T9708] kernel_clone+0x21e/0x9e0 [ 676.283352][ T9708] ? __kasan_check_write+0x14/0x20 [ 676.288295][ T9708] ? create_io_thread+0x1e0/0x1e0 [ 676.293170][ T9708] __x64_sys_clone+0x23f/0x290 [ 676.297761][ T9708] ? __do_sys_vfork+0x130/0x130 [ 676.302539][ T9708] ? debug_smp_processor_id+0x17/0x20 [ 676.307772][ T9708] do_syscall_64+0x34/0x70 [ 676.311996][ T9708] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 676.317729][ T9708] RIP: 0033:0x7fa4fc08cbd9 [ 676.321975][ T9708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 676.341415][ T9708] RSP: 002b:00007fa4fb30dff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 676.349776][ T9708] RAX: ffffffffffffffda RBX: 00007fa4fc21af60 RCX: 00007fa4fc08cbd9 [ 676.357672][ T9708] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 676.365477][ T9708] RBP: 00007fa4fb30e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 676.373299][ T9708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 676.381104][ T9708] R13: 000000000000000b R14: 00007fa4fc21af60 R15: 00007ffd93cd84d8 [ 676.389155][ T9708] Mem-Info: [ 676.392151][ T9708] active_anon:97 inactive_anon:26887 isolated_anon:0 [ 676.392151][ T9708] active_file:22704 inactive_file:3452 isolated_file:0 [ 676.392151][ T9708] unevictable:0 dirty:176 writeback:0 [ 676.392151][ T9708] slab_reclaimable:7231 slab_unreclaimable:89667 [ 676.392151][ T9708] mapped:15451 shmem:154 pagetables:541 bounce:0 [ 676.392151][ T9708] free:1549478 free_pcp:1226 free_cma:0 [ 676.446685][ T9708] Node 0 active_anon:388kB inactive_anon:107648kB active_file:90816kB inactive_file:13808kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:61804kB dirty:704kB writeback:0kB shmem:616kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:8000kB all_unreclaimable? no [ 676.481678][ T9708] DMA32 free:2981840kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984788kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2948kB local_pcp:1444kB free_cma:0kB [ 676.513803][ T9708] lowmem_reserve[]: 0 3941 3941 [ 676.518598][ T9708] Normal free:3216200kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:388kB inactive_anon:107448kB active_file:90816kB inactive_file:13808kB unevictable:0kB writepending:704kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2016kB bounce:0kB free_pcp:2548kB local_pcp:1476kB free_cma:0kB [ 676.549570][ T9708] lowmem_reserve[]: 0 0 0 [ 676.555510][ T9708] DMA32: 8*4kB (UM) 4*8kB (M) 3*16kB (M) 7*32kB (UM) 8*64kB (UM) 7*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2981840kB [ 676.572655][ T9708] Normal: 426*4kB (UME) 278*8kB (UME) 222*16kB (UME) 516*32kB (UME) 202*64kB (UME) 132*128kB (UME) 41*256kB (UM) 14*512kB (UM) 7*1024kB (UM) 6*2048kB (UME) 763*4096kB (UM) = 3216184kB [ 676.595310][ T9708] 26310 total pagecache pages [ 676.600667][ T9708] 0 pages in swap cache [ 676.604781][ T9708] Swap cache stats: add 0, delete 0, find 0/0 [ 676.612401][ T9708] Free swap = 124996kB [ 676.628606][ T9708] Total swap = 124996kB [ 676.632593][ T9708] 2097051 pages RAM [ 676.647416][ T9708] 0 pages HighMem/MovableOnly [ 676.652012][ T9708] 341890 pages reserved [ 676.655918][ T9708] 0 pages cma reserved [ 676.960572][ T9740] device syzkaller0 entered promiscuous mode [ 677.021530][ T9757] device syzkaller0 entered promiscuous mode [ 677.197362][ T9776] tap0: tun_chr_ioctl cmd 1074025677 [ 677.202544][ T9776] tap0: linktype set to 774 [ 677.453266][ T9798] device syzkaller0 entered promiscuous mode [ 678.065018][ T9815] device syzkaller0 entered promiscuous mode [ 678.932670][ T9899] device syzkaller0 entered promiscuous mode [ 679.211379][ T9932] device syzkaller0 entered promiscuous mode [ 680.871715][T10040] device pim6reg1 entered promiscuous mode [ 680.919076][T10049] syz.0.12866[10049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 680.919132][T10049] syz.0.12866[10049] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 682.184564][T10080] tap0: tun_chr_ioctl cmd 1074025678 [ 682.201170][T10080] tap0: group set to 0 [ 684.346074][T10190] device macsec0 entered promiscuous mode [ 684.352652][ T6783] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 684.371124][T10193] device wg2 entered promiscuous mode [ 684.398911][T10187] device syzkaller0 entered promiscuous mode [ 684.492110][T10224] : renamed from veth0_vlan [ 684.513468][T10214] bridge0: port 1(bridge_slave_0) entered disabled state [ 684.556374][T10228] device pim6reg1 entered promiscuous mode [ 684.570463][T10214] O3ãc¤±: renamed from bridge_slave_0 [ 686.038221][T10306] device macsec0 left promiscuous mode [ 686.159879][T10324] FAULT_INJECTION: forcing a failure. [ 686.159879][T10324] name failslab, interval 1, probability 0, space 0, times 0 [ 686.172365][T10324] CPU: 0 PID: 10324 Comm: syz.1.12950 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 686.183567][T10324] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 686.193458][T10324] Call Trace: [ 686.196588][T10324] dump_stack_lvl+0x1e2/0x24b [ 686.201096][T10324] ? bfq_pos_tree_add_move+0x43b/0x43b [ 686.206389][T10324] dump_stack+0x15/0x17 [ 686.210385][T10324] should_fail+0x3c6/0x510 [ 686.214638][T10324] ? skb_ensure_writable+0x2d0/0x440 [ 686.219755][T10324] __should_failslab+0xa4/0xe0 [ 686.224360][T10324] should_failslab+0x9/0x20 [ 686.228697][T10324] __kmalloc_track_caller+0x5f/0x320 [ 686.233817][T10324] ? skb_ensure_writable+0x2d0/0x440 [ 686.238936][T10324] pskb_expand_head+0x12b/0x1180 [ 686.243712][T10324] ? __kasan_check_write+0x14/0x20 [ 686.248662][T10324] skb_ensure_writable+0x2d0/0x440 [ 686.253606][T10324] bpf_clone_redirect+0x117/0x390 [ 686.258477][T10324] bpf_prog_64e505a7b7f97a05+0x55/0xe98 [ 686.263848][T10324] ? __kasan_slab_alloc+0xc3/0xe0 [ 686.268705][T10324] ? __kasan_slab_alloc+0xb1/0xe0 [ 686.273567][T10324] ? slab_post_alloc_hook+0x61/0x2f0 [ 686.278688][T10324] ? kmem_cache_alloc+0x168/0x2e0 [ 686.283548][T10324] ? __build_skb+0x2a/0x300 [ 686.287887][T10324] ? build_skb+0x25/0x1e0 [ 686.292056][T10324] ? bpf_prog_test_run_skb+0x388/0x1410 [ 686.297438][T10324] ? __se_sys_bpf+0x5235/0x11cb0 [ 686.302207][T10324] ? __x64_sys_bpf+0x7b/0x90 [ 686.306636][T10324] ? do_syscall_64+0x34/0x70 [ 686.311061][T10324] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 686.316973][T10324] ? __kasan_check_read+0x11/0x20 [ 686.321824][T10324] ? bpf_test_timer_continue+0x140/0x440 [ 686.327293][T10324] bpf_test_run+0x40b/0xc20 [ 686.331637][T10324] ? convert___skb_to_skb+0x570/0x570 [ 686.336838][T10324] ? eth_type_trans+0x2e4/0x620 [ 686.341535][T10324] ? eth_get_headlen+0x240/0x240 [ 686.346304][T10324] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 686.351686][T10324] ? convert___skb_to_skb+0x44/0x570 [ 686.356802][T10324] ? memcpy+0x56/0x70 [ 686.360621][T10324] bpf_prog_test_run_skb+0xb6e/0x1410 [ 686.365834][T10324] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 686.371559][T10324] ? __kasan_check_write+0x14/0x20 [ 686.376507][T10324] ? fput_many+0x160/0x1b0 [ 686.380757][T10324] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 686.386488][T10324] __se_sys_bpf+0x5235/0x11cb0 [ 686.391114][T10324] ? stack_trace_save+0x113/0x1c0 [ 686.395948][T10324] ? terminate_walk+0x407/0x4f0 [ 686.401246][T10324] ? stack_trace_snprint+0xf0/0xf0 [ 686.406189][T10324] ? kmem_cache_free+0xa9/0x1e0 [ 686.410877][T10324] ? kmem_cache_free+0xa9/0x1e0 [ 686.416110][T10324] ? kasan_set_track+0x5d/0x70 [ 686.420685][T10324] ? kasan_set_track+0x4b/0x70 [ 686.425288][T10324] ? kasan_set_free_info+0x23/0x40 [ 686.430233][T10324] ? ____kasan_slab_free+0x121/0x160 [ 686.435353][T10324] ? __x64_sys_bpf+0x90/0x90 [ 686.439786][T10324] ? __kasan_check_write+0x14/0x20 [ 686.444725][T10324] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 686.450040][T10324] ? _kstrtoull+0x3a0/0x4a0 [ 686.454377][T10324] ? kstrtouint_from_user+0x20a/0x2a0 [ 686.459578][T10324] ? kstrtol_from_user+0x310/0x310 [ 686.464519][T10324] ? trie_delete_elem+0x59a/0x760 [ 686.469408][T10324] ? memset+0x35/0x40 [ 686.473284][T10324] ? __fsnotify_parent+0x4b9/0x6c0 [ 686.478232][T10324] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 686.484824][T10324] ? proc_fail_nth_write+0x20b/0x290 [ 686.490030][T10324] ? proc_fail_nth_read+0x210/0x210 [ 686.495066][T10324] ? security_file_permission+0x86/0xb0 [ 686.500447][T10324] ? rw_verify_area+0x1c3/0x360 [ 686.505138][T10324] ? preempt_count_add+0x92/0x1a0 [ 686.509994][T10324] ? vfs_write+0x854/0xe70 [ 686.514342][T10324] ? kernel_write+0x3d0/0x3d0 [ 686.518850][T10324] ? __kasan_check_write+0x14/0x20 [ 686.523806][T10324] ? mutex_lock+0xa5/0x110 [ 686.528048][T10324] ? mutex_trylock+0xa0/0xa0 [ 686.532476][T10324] ? __kasan_check_write+0x14/0x20 [ 686.537422][T10324] ? fput_many+0x160/0x1b0 [ 686.541683][T10324] ? debug_smp_processor_id+0x17/0x20 [ 686.546882][T10324] __x64_sys_bpf+0x7b/0x90 [ 686.551140][T10324] do_syscall_64+0x34/0x70 [ 686.555388][T10324] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 686.561114][T10324] RIP: 0033:0x7fa4fc08cbd9 [ 686.565371][T10324] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 686.584900][T10324] RSP: 002b:00007fa4fb30e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 686.593146][T10324] RAX: ffffffffffffffda RBX: 00007fa4fc21af60 RCX: 00007fa4fc08cbd9 [ 686.600965][T10324] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 686.608763][T10324] RBP: 00007fa4fb30e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 686.616575][T10324] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 686.624393][T10324] R13: 000000000000000b R14: 00007fa4fc21af60 R15: 00007ffd93cd84d8 [ 686.662350][T10328] device pim6reg1 entered promiscuous mode [ 686.713999][T10328] device vlan1 entered promiscuous mode [ 687.370764][T10382] device pim6reg1 entered promiscuous mode [ 687.553246][T10416] syz.1.12973[10416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 687.553358][T10416] syz.1.12973[10416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.608758][T10438] syz.4.12976[10438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 688.626381][T10438] syz.4.12976[10438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 689.396827][T10534] Â: renamed from pim6reg1 [ 690.797566][T10544] syz.1.13002[10544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 690.797625][T10544] syz.1.13002[10544] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.002346][T10587] device syzkaller0 entered promiscuous mode [ 691.154768][T10605] device veth0_vlan left promiscuous mode [ 691.160802][T10614] syz.2.13013[10614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.160868][T10614] syz.2.13013[10614] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 691.215107][T10605] device veth0_vlan entered promiscuous mode [ 691.352401][T10557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 691.360937][T10557] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 691.370865][T10557] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 691.378307][T10557] bridge0: port 3(vlan1) entered blocking state [ 691.384374][T10557] bridge0: port 3(vlan1) entered forwarding state [ 691.624092][T10645] device pim6reg1 entered promiscuous mode [ 692.074658][T10671] device syzkaller0 entered promiscuous mode [ 692.534352][T10683] syz.3.13032[10683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 692.534413][T10683] syz.3.13032[10683] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 692.767139][T10698] Â: renamed from pim6reg1 [ 692.875868][T10729] device pim6reg1 entered promiscuous mode [ 692.901409][T10727] device syzkaller0 entered promiscuous mode [ 692.966759][T10749] device macsec0 left promiscuous mode [ 692.977978][T10748] device veth1_macvtap entered promiscuous mode [ 692.985510][T10748] device macsec0 entered promiscuous mode [ 692.995342][T10569] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 693.042923][T10778] Â: renamed from pim6reg1 [ 693.550582][T10817] bridge0: port 3(vlan1) entered disabled state [ 693.595370][T10823] device veth1_macvtap left promiscuous mode [ 693.604477][T10823] device macsec0 left promiscuous mode [ 694.000307][T10924] device syzkaller0 entered promiscuous mode [ 694.156404][T10936] syz.1.13108[10936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.156458][T10936] syz.1.13108[10936] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 694.458631][T10985] device sit0 entered promiscuous mode Connection to 10.128.0.180 closed by remote host. [ 695.258172][ T1] Kernel panic - not syncing: Attempted to kill init! exitcode=0x00000007 [ 695.266589][ T1] CPU: 1 PID: 1 Comm: init Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 695.276908][ T1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 695.286798][ T1] Call Trace: [ 695.289933][ T1] dump_stack_lvl+0x1e2/0x24b [ 695.294445][ T1] ? panic+0x22b/0x812 [ 695.298436][ T1] ? bfq_pos_tree_add_move+0x43b/0x43b [ 695.303732][ T1] dump_stack+0x15/0x17 [ 695.307721][ T1] panic+0x2cf/0x812 [ 695.311540][ T1] ? do_exit+0x239a/0x2a50 [ 695.315797][ T1] ? fb_is_primary_device+0xd4/0xd4 [ 695.320829][ T1] ? __kasan_check_write+0x14/0x20 [ 695.325776][ T1] ? sync_mm_rss+0x28a/0x2e0 [ 695.330206][ T1] do_exit+0x23b4/0x2a50 [ 695.334281][ T1] ? sched_group_set_shares+0x490/0x490 [ 695.339667][ T1] ? put_task_struct+0x80/0x80 [ 695.344262][ T1] ? schedule+0x154/0x1d0 [ 695.348432][ T1] ? schedule_timeout+0xa9/0x360 [ 695.353246][ T1] ? cgroup_freezing+0x88/0xb0 [ 695.357906][ T1] do_group_exit+0x141/0x310 [ 695.362332][ T1] get_signal+0x10a0/0x1410 [ 695.366667][ T1] arch_do_signal_or_restart+0xbd/0x17c0 [ 695.372141][ T1] ? put_pid+0xd7/0x110 [ 695.376120][ T1] ? kernel_clone+0x6ca/0x9e0 [ 695.380642][ T1] ? bpf_send_signal_common+0x335/0x420 [ 695.386020][ T1] ? bpf_do_trace_printk+0x270/0x270 [ 695.391218][ T1] ? get_timespec64+0x197/0x270 [ 695.395908][ T1] ? timespec64_add_safe+0x220/0x220 [ 695.401032][ T1] ? __do_sys_rt_sigreturn+0x1e0/0x1e0 [ 695.406340][ T1] ? bpf_send_signal+0x19/0x20 [ 695.410941][ T1] ? bpf_trace_run2+0xf4/0x280 [ 695.415726][ T1] exit_to_user_mode_loop+0x9b/0xd0 [ 695.420828][ T1] syscall_exit_to_user_mode+0xa2/0x1a0 [ 695.426202][ T1] do_syscall_64+0x40/0x70 [ 695.430460][ T1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 695.436186][ T1] RIP: 0033:0x7f9ab741da68 [ 695.440442][ T1] Code: 00 48 8d b8 e0 02 00 00 48 89 b8 d8 02 00 00 48 89 b8 e0 02 00 00 b8 11 01 00 00 0f 05 44 89 c0 c3 90 5f b8 3a 00 00 00 0f 05 <57> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 90 43 0f 00 f7 d8 64 89 01 48 [ 695.459889][ T1] RSP: 002b:00007ffd996de8c0 EFLAGS: 00000246 ORIG_RAX: 000000000000003a [ 695.468127][ T1] RAX: 0000000000002b06 RBX: 0000562b48f2ca50 RCX: 00007f9ab741da68 [ 695.475939][ T1] RDX: 0000000000000008 RSI: 0000000000000000 RDI: 00007f9ab75a8bed [ 695.483744][ T1] RBP: 00007f9ab75e3528 R08: 0000000000000007 R09: a8b207c31e00159d [ 695.491559][ T1] R10: 00007ffd996de900 R11: 0000000000000246 R12: 0000000000000000 [ 695.499367][ T1] R13: 0000000000000018 R14: 0000562b48178169 R15: 00007f9ab7614a80 [ 695.507453][ T1] Kernel Offset: disabled [ 695.511584][ T1] Rebooting in 86400 seconds..