last executing test programs: 1.455507963s ago: executing program 4 (id=8458): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x0, 0x0, 0x0, 0x2}, 0x48) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r2) setsockopt$sock_attach_bpf(r3, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(r3) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000006c0)={r5, 0x0, 0x39, 0x51, &(0x7f0000000180)="ae2e327a4ee6ec9b5bb81b680a62d1eb67b434f9da222e1762eece1fa2746eaa6bcd7efdeb08cb37642ef5f25066fa6ba00780c9de5bb90772", &(0x7f00000003c0)=""/81, 0x7, 0x0, 0xb6, 0x1000, &(0x7f0000000580)="584c083348e576d06495b5c74a2cdb92706ea70af7bbc54aed9e464aa4de76813fa7af227f502b182be32234f2d35f1a8ef7d3fc82ed7421d5b8fa5afa45bc66e9a7d5d32bac54b252cdbc9c330381ba8e2a39e5207f3632d6c64716c81a471e1c5db5a712960ba1ab8c171cb55099978c08d535ae2316cc70cb26d5686b9c685839d7d7920b2782da4809efef4a1597fb85575e560c16e53c60d9055c4a81f0c45fa625d32f9f8f0b3af64e63b4cf3ceebce90cb269", &(0x7f0000000b00)="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", 0x1, 0x0, 0x2}, 0x50) sendmsg$tipc(r2, &(0x7f0000001e00)={&(0x7f0000000200)=@id={0x1e, 0x3, 0x1, {0x4e23}}, 0x10, &(0x7f0000001d40)=[{&(0x7f0000000300)="a41b864888a7b9761912b8f341b030d8b94f8eac1a7fe9df08458b11dd2da6a614f4d73fdd2744d57232180b7c68dac71d0bf1635234d3280ad1d720b19acc0de0aa877c38fb2fc422ab428338e4cd7bd7bc6dfde30792520eb106202a3eac43448910cf825fa3110fe78a47f15478cab44ac3e12bd13ec5ebc31552065e9ba9d51536b1b9cf0f8d244ded4606a5a607cd36e8600a5b49f443fd1d1f0a0cc669065f9123a0814c5060083aa3d407eea219b714c9f76e863d4e0a4865ff92", 0xbe}, {&(0x7f0000000740)="6a530620d1bf9a2c84b258dffe85fba94965b52c21bc90ab05001307c8c68f90e3e87bb63a3e24f0410c57cbfd62e182a91e5733c88c161c6bcca64a7c9aeca3bb3081230151bc0e4a8d75e7eabbdc4409e7ba9b8119bce0fdfac73a272bb6cd475c9fa984882d", 0x67}, {&(0x7f0000000240)="43977d3757db3eec25901021c30b1b6c6ee8a968f5e515f0916068e7341dc64c85449b3fe5b166daf7d29329b686b9268e", 0x31}, {&(0x7f00000007c0)="fac61874cb81ee76263be9d33f87f6edef671649e90b24d13407c4fec5f01869fce5eb90e271b8a50b7705934a941f2d87cf21ca2366ef124dd53ae0c0ff1c432977f9b07e88d1d7134e827d349820a131a58e931203c76a3a6c57e6ff2625d8e960612d0cb29543771c13065a8b2bba18130f0c1639fbedecdaeca459f50ffa9d8f854542ddff68a81c82cde08d11670abe3674b0f870ea2d", 0x99}, {&(0x7f0000000880)="6492e01e8deb76ddd088dd03358abaa1895b47c2e16dd63aea8a2b88ed967cd2b5cb7f629bbee4724df252b36dc2318985155a37659c4274f15640a0e91a4ce194a3dde151482052fb602db0157bcb", 0x4f}, {&(0x7f0000001b00)="1049db6dce0f04988e9c935cfff02779565ae30137ae639e8b0a43c93ead683ea5a9524954c58e4a6bce7f6cc7fbb06c2e9c02e33f55271150fa43661fcf7a2ecbe08708d64fe21644e0b0dc4f2645e4602c0d31579d031e95b335f818bd18a5cd971be6e4f793861a23e5c455a3a8734563e6bbb55d1672a6d97922f79fd7539fef8c33234259def15a2f3b31660db927d58f2d49c1c5e54889123ac733abff9c16c8d377e6509d26f4aba539a2d7ec547b6d6a5059143244c14b36d6f3246b80823744003fd53e0f1b5240d220a01baabd294bc1dc5bbc49c5b57149d4b1b351", 0xe1}, {&(0x7f0000001c00)="24999e6eafe35e73c245904ddbeac84885be2a2b9564912b26a4ad9105bf63fb667886c4ec44cd8148714d217cfdec979e503205e94baadeea75d71134339eece8f14ae4b848ea41c406e78f695c7699a6f46e13d39893c79d0a922da4857840d064e6373214055fd38eb82496c0c59cf867af4afe79fe7628d46ae02346dd740c4e6f96484c39ef1fa632e83ec75e335ab07882fd405fcf98952a9f6134cbfc049f693a43dbe03d20bc90f0bc9bd578c306b31184fcd135ce7bfa2ce7aea4b0f86d27b4f8955e4d1a8733c842c58dc283f66e217439432d236e3af78e8520fcfd625ddc9c", 0xe5}, {&(0x7f0000000980)="1cd51a49446ae298720cf26a82873766472dabccd5c3d03958d71656aa369fa216a3cac1aeee0a912b66769ed657ffe141a3d2a2b5e6a9febd35b69b16c200e07a8b378daf92abd9d9360164c822ce8822d1cc95e35d6ac3d288da5d8ed6e127b09f405773d0f2825f36e49d98260a1cca491c42c7cff8b90e974bafb3bdb2e0a931ad700ff6cd9893ccc413e84790d0627870c86e722e93abfc003de791d6fd67504d", 0xa3}, {&(0x7f0000000900)="4714236fedfb", 0x6}, {&(0x7f0000001d00)="789c88e5d8919111b3f8e8fae4517cad26ca490159", 0x15}], 0xa, 0x0, 0x0, 0x20040081}, 0x20044050) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r7}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'pim6reg0\x00', 0x2}) ioctl$TUNSETOFFLOAD(r8, 0x400454c9, 0x3) ioctl$TUNSETLINK(r8, 0x400454cd, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='console\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 1.172503056s ago: executing program 4 (id=8464): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) 1.095405222s ago: executing program 0 (id=8467): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x0, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x13, 0xf, &(0x7f0000000000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0xf4240}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r4, 0x0, 0x10, 0x200002d0, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f00000002c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='signal_deliver\x00', r5}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x7, 0x6, 0x0, 0x1}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, &(0x7f0000000640)=[0x0, 0x0, 0x0], &(0x7f0000000680)=[0x0], 0x0, 0x90, &(0x7f00000006c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000780), &(0x7f0000000880), 0x8, 0xbd, 0x8, 0x8, &(0x7f00000008c0)}}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000980)={&(0x7f0000000c40)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000005000000090000010000000a07000000320004010b0000000000000800000000005f005f008e64a522c9661ee42ee839b14b2f0b640a77a8a79192296847e87d7b1562497eee42c56c4f7a43bf350f031d84bd35b80615c37f1f3baf2f634b12668f957644d767cf5b65c180b5bbe6b3136b2e112d20e009dfe698e92966a3cd08ee43a79a8654e3ded4052583b338c9bbeebde43d2a93"], &(0x7f0000000b40)=""/207, 0x39, 0xcf, 0x0, 0x2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x20001400) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.062374885s ago: executing program 4 (id=8468): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe6, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r0}, &(0x7f0000000380), &(0x7f0000000400)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008400000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) gettid() bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x55, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x6}, 0x8}, 0x90) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xffff}, 0x0, 0xa, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid_for_children\x00') r3 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpuset.memory_migrate\x00', 0x2, 0x0) write$cgroup_pressure(r3, &(0x7f00000001c0)={'full'}, 0x2f) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/syz1\x00', 0x200002, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00'}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000680)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x28, 0x809, 0xb5, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f0000000080)) 784.086407ms ago: executing program 0 (id=8474): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x0, 0x4, 0x0, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4}, 0x48) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000380)={0x0, r3, 0x0, 0x6, &(0x7f0000000300)=':\x7f]!]\x00'}, 0x30) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd01, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1e, 0xe, &(0x7f0000001600)=ANY=[@ANYBLOB="b702000000000000bfa30000000000001403000000feffff7a0af0ff1100000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7040000050000006a0af2fe00000000850000007c000000b700000000000000950000000000000000e154cd844a954b26c933f7ffffffffffffff55bb2007ee51050512b5b42128aa090a79507df79f298129da487130d5f24bf901115e17392ac66ad029d1c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a670838337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b2173619ccf55520f22c9ca8b6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacda1efc5f9094fa737c28b994a8512c816fdcceaede3faedc51d29a47fc813a2ec00f4c7a53ac271d6d6f4ea6bf97f2f33e2ea2e534300bcb3fdc4b4861004eefbda7f54f82a804d4a69bf9bc5fa77ee293fbd165a5a7c31de7910d1ed4065a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b849a5a787e814c4fd21a18986252a70f8f92eb6f0e8c7db3503680e5e5971ff4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa99dacfeb47479321a0574fb304bc2a1681989328c8ddc20ea011bf5742e0e0d4334db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f3de8726c2a61ec45c19f97a8f17da954aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc7de058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde0745db06753a7ac7fe13cab6692422a46e9ffe2d4a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c9bdce38c2153a6eee01738b0c10671f4f559b7dcb98a6273b8c5f1e24d9f679e4fbe948dfb4cc4af05c28308241730459f0123fd39206000000000000eb55dad46de56ef907b059b90b8aa49afb9a79ae5490f6589880ed6eea7b9c670012be05e7de0940313c5870786554df2623d58f5ace92d028f2c71a6ebced9390cb6941b8375d936a7d2120eca291963eb2d537d8ee4de5c183c960119451c31539b22809e1d7f0cda06a9fa87d64cb77962a2cd8a104e16b77d5f7f13b1640d43e11801140caf1a8b1a2bacf13464ca03aff14a9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b905fa02208d304d455c36300000000022320178b00cc6ed7966130b547dbf8b497af0a77fbcf2cd1d0000002000000001c800000000000000000000000928ee53595a779d243a48cea769470424d28804c026ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b745f3bf2cf7908b6d7d748308eea09fc361b4735efbf34117a82a96b2ced73abb8e4bb718d6ee7aebf9ef40662d7836d252c566f5ee938a836804ed3a1079b0282a12043408cd60b687dcff91af19010000000000000000456f7d2a42bd13da2022f23daec61854f640f701db0276652f6c74f20675eb781925441578e93046aaddea8ec4ca37f71c2710a7ea8ae0dc214e1cc275b26adfa892e6de92000000000000000000ddff004cff9ec7eee50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab50fe82d5a96b09c68c73de2f04f15d005387577f480000ea65559eb00e76e9d0ada209bcbb5c252b28a60ca770663da451790cc36000906d5a9fad98c308e39bd5ffb6151d79c1cee1cdfba05e3633be3f00000001762e5f5a3a0bc33fdbe28a5ffc83f2f08544eb2794e7f791e8f6429309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5d81e750d50515a59a3ad09e8802e8f4f535447cc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f85d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d801002653c4d9818708e27c89b552d3fcd11ebce9c764c714c9402c21d181aae59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff2a8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9ecd1e877b0d8ca84c044859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af4000000000000000749efd3763655500344bae34137f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419adc16e2055b850580994484305d7a1759782ae57773e0d8b0ab900edf5e9020c09ab004321610b857e8717764b633b21cb32f0e03280e09758bd445ab91d20baca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92332af0bd91e328b6a6f732a91f0e2e9120be61e58c79d497247d278888901d44bf77ff246605a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f31019876026888c8ccb85c86b4f8ffffff7f000000002c2d0836395fe39f0e11c28ed61c525708a13d115b43f8b1894c8fa8a14dc4810f61ae96c18cc71300000000000021000000b12f0ec0412268860027c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77819ee214e49666c464d35ca9b50f3ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861ddb54684cb73e7aeefae47fa09fd88e6043bd52ae84c1bb0c8a6b769f952283a1f4e3842edb3d42c68a2102fa1296dfff4a979369b0e8ebc62887aa46e820a74f91381dcc198e353047db70686d147357024eb3cb94f1e89cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c860495b240e81163bde261fd00000000007271e28ef6806bc8e139c49b91c76b0d3958f7f05b47d3e519f1634e8fbd8d31330d89069f9648a2ff93060ff073b3a113e47edf76f7d1b8b90bc0df4c4b51b1f922a44ec675203bf8d1548e49262727c3de6daab3b4ed15aa99802e45d0620617e839b5237ddfcf103c91e61d174e3be6c9fd47398797e3b814e751ff31ecb42de6dd9d6b88121aaa680c236a303914e00150e1ec3f144ebc28287d5b51cfb8cabb844d12b140767d0fc24425590024b2e431722392489e3d43b3e31438a0138988083c47c61384d54e9a40fba01cac6e59ec82edc764840fe551c1d57442970cd8e59b9f41094e158c0a1ee855d8515599685486c2a21fa1c107531a0db8306441e8408b34aa90e9736e672d74cb8e78f8bdb93a23d024fc200796836ab396911a56231e953efad6cd83db32ffc595d970108e9547ea0000002730d5d1b70fe8b458ac1651135037b6cb9c8053299f77ab84c5b9fd2f764c3caa9c69377c397d310ddc7bc4bfa165def7b49e28ef196ae263b6829a8419d8860f56c86c288964ac4bc19839d96ff24b981c3a4fd6f93a000000ea9d6b06dafae4c91177"], &(0x7f0000000b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffedf, 0x10, &(0x7f0000000040)}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0xa}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000980)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x4, '\x00', 0x0, r1, 0x0, 0x5, 0x5}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000005c0)={r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{}, &(0x7f0000000480), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000006c0)={0xffffffffffffffff, &(0x7f00000003c0)="a6e3960c0684802c83c375877fa4797f163562aa9c200599f2e06f6dad50125583563344feca240efb963f568969cac95122682885276dbdd38c", &(0x7f0000000680)=""/31}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'\x00', 0x52d35ce30131f272}) 733.178811ms ago: executing program 4 (id=8476): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x4, 0x2, 0x7, 0x104, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00'}, 0x10) unlink(&(0x7f0000000200)='./cgroup\x00') r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000fcff000000000000000000850000002200000085000000070000009500000000000000e3b791f4a4a3972200e1d2acd44498f2cfbf4ae21867953463a9211404aa0e942d2460473901162b5db03303d2731c0e8ff5f76396f3a69ef52a00e8ae396de506de923c26c5bc87e3461c93cca3b186787c11d06d49d19896534d476fb6550cd031867572ce45503f6f46284b1ce64c582ae6c0e66319f800991ca2b186824cd560affec254ea32"], &(0x7f0000000080)='GPL\x00', 0x4, 0xbd, &(0x7f0000000340)=""/189, 0x0, 0x51}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x7, 0x0, &(0x7f0000000100)="e0b9547ed387db", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000e40)='ns/net\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4b47, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b5181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000880)=""/197, 0x0, 0xfffffed7, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 683.504595ms ago: executing program 3 (id=8478): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) 580.205503ms ago: executing program 0 (id=8481): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000700000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'dvmrp0\x00', 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000500)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff034}, {0x16}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1808000000a000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000002000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f00000000c0)=r4, 0x4) sendmsg$inet(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0xf, 0x9, &(0x7f0000000300)=ANY=[@ANYRESOCT], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8}, 0x90) sendmsg$inet(r6, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80), 0xc, 0x0, 0xfffffffffffffec8}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x1, 0xffffffff, 0x7, 0x0, 0x800, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/12, @ANYRES32, @ANYBLOB="0d00ff0000000000830000000000000045"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x3, 0x0, &(0x7f0000000000)='GPL\x00'}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'sit0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x89f1, &(0x7f0000000080)) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x0, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="850200000000000018100000", @ANYRES32, @ANYBLOB='\x00\x00\x00'], 0x0}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000080)='GPL\x00'}, 0x90) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f3, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 550.498056ms ago: executing program 4 (id=8482): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000018007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000200000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000023008500000017000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 534.891107ms ago: executing program 1 (id=8483): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b708000000003f007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 533.398887ms ago: executing program 2 (id=8484): bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000003000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2b703000008000000b70400000000000085000000030000009500"/72], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x3, 0x0, r1, 0x0, '\x00', 0x0, 0x0, 0x0, 0xfffffffc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18006f00000000000000080000fb0000000000000000000000000000030018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000183a00000300000000000000000000009500000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="00000000000c0000b7080000000000007b8a080000000000000000000000000007020000f8ffffffb779d10f3e5410fd3a043e8ea30d0000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000780)=@bpf_ext={0x1c, 0x21, &(0x7f0000000b00)=ANY=[@ANYBLOB="1800000009000000000000000500000082581000100000007fa050000800000085000000480000008510000007000000850000000a0000008520000005", @ANYRES32, @ANYBLOB="0000000000000000b7080000070000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082000000b70800000000", @ANYRES32, @ANYBLOB="0000000000000000b705000008000000850000008500"], &(0x7f0000000000)='GPL\x00', 0x0, 0xc0, &(0x7f0000000980)=""/192, 0x40f00, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000ec0)={0x0, 0xc, 0x1}, 0x10, 0x27a6f, 0xffffffffffffffff, 0x0, &(0x7f0000000f80), 0x0, 0x10, 0x2}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0x9, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="00879d0014000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095000000000000006694d8c57368291aa8b68df9c27c0f20ff43f47555fedc"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{0x0}], 0x1}, 0x0) recvmsg(r6, &(0x7f0000000b00)={0x0, 0x0, 0x0}, 0x40fd) close(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 531.864567ms ago: executing program 3 (id=8485): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x1, 0x5, 0x9, 0x2430, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x3}, 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000d80)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c0000000300000007000000060000060400000008000000020000000f00000000000000000000080000090000000000ff070000005f00fc79497f146593a4a508537e9903bd5bcc16cc2ceaa5f33909302802a2bb62a7c545e37dcfd73c8aa2474c7eba8cb72553b2f92d2737971c0f7d6baf420000"], &(0x7f0000000cc0)=""/140, 0x57, 0x8c, 0x1, 0xfbf0}, 0x20) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fc08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) r10 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000e40)={0xffffffffffffffff, 0xfffff001, 0x8}, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000f00)={0x6, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000008000000000000000500000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70200000000000085000000860000008500000076000000185300000600000000000000000000007f7709000100000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70200001db5dd3655dbd53e860000009500000000000000"], &(0x7f0000000200)='syzkaller\x00', 0x4, 0xb3, &(0x7f0000000780)=""/179, 0x40f00, 0x80, '\x00', 0x0, 0x25, r3, 0x8, &(0x7f0000000dc0)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000e00)={0x2, 0x4, 0x0, 0x3ff}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000e80)=[r1, r10], &(0x7f0000000ec0)=[{0x3, 0x1, 0x9, 0x5}, {0x1, 0x4, 0x2, 0x4}, {0x4, 0x2, 0x0, 0x1}, {0x5, 0x2, 0xd, 0xd}], 0x10, 0x7ff}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000045b7030000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r12) recvmsg$unix(r11, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000002300)=ANY=[@ANYBLOB="8fed007907001175f37538e486dd6317ce2200102f00fe80000000000000875a65059ff57b00000000000000000000000000ac1414aa0bf06558"], 0xcfa4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 511.841969ms ago: executing program 1 (id=8486): openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES16, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x10) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000080)={r3, &(0x7f0000000080), 0x0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000800000000000000080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0xae1, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8188048bbf11156437d5a086599ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, 0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) write$cgroup_int(r6, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r6, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff}, 0x48) 509.486849ms ago: executing program 2 (id=8487): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xa93, 0x4, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000008009500f10100000000487591731cba12c07d57d995b61e89a4530f92344f242b416ae9eeefc0e9c6f203cb1276bfdbb4ddffffff7f82dc2b938189a7ca02f732e4c2eab72bf40c0682fd0a0c4ac106b29e220dc2880072599456d4c4e6f3fe684ab8373bb4df9d72876ef3834293812e927c01c7da1322da44c7f2ed1084a12f56d1cb39df9858037458a4ca037604007600b6be484e4c9517af216bd8ed42f7dd01008e49f4a94608c9a20819e02fc22e6be45574d4ed88b37ab8d7674c644dca2f1b4d745fd95c41f9dfc1adafd1e5a3e7f2e898961cb43e438c4e41ae43ea118e14ffffffffe4b8a80366ce5401ec61921a1b529cc8b99bffffb1ac006c67767b03b95151aeb89e6d4a43c625aa228504e4afd8c1cc3eb215ba22f43115f4d39dc7beedb130d9f2be90133a4500000058b8c9370634060105baa664953514605fba3973aa021945b985a8a66e0200000057033815717b4fdbe55b37cb8d7f41aacfbd4089ea1bd22440f64909a09b5a759a703e71f358e11ac8e13db15d792e604a4f279b3bd6621bdf2c17bc0400001000000000ff8d81006200607a9a76e5d9656a7154c75773902a1bdf399df3925130312d095e9c1f973d091c198c1a11edb6b3cc425fe203d2f2655a76865c2c34e2470fcfb1248c0add5431a7fbcb0ef4f66a09af93a09fab1daae4b518d7a5d95a017864010067d6bab101446ebfe3fdeed7ee7bb0749cacf56cf27409c60fca2e0004000000000000a9cb6f4a78444986f9b1ab61f9dab53038010000004abbfc59d6d1b18fe380df4bf024f120bd755d82033f2fb7d8fc9e0de834f7646c8dd27da1297d0c77b294e097e293db7f002c0024ab2fb4d32972cba6f49051cec1ff5d16231bbb90a2d201a500000000000000007700b06fa191ebd3a0c2ef0058ffebd7cc4cf80f74a7cdac01d998c24f34a5ba9a4a2039d0416e3f8107671141ffffffe0c7d8e94a27a06a4e3d9acee835fd0571e5bbb3e6d2b5eba505000000968983811f832dc5390f83e817c602c4f1f0d0504255c22ee8674053d0e160e5255366139bbe5863e23c3dd42d21f542816edf56a93d0a7e6f08f9ffffff64875fea6ff57ba6ae25c5e8ca4f78d5a01308243b08f1caa46be5244d64f8e875857f083144c642f71cdc8e5634c1360c056430fe77ee7ed7ac1f9743786b2fb8e0fcfcc3d36c93230b7b1da97c971c8c84a427edc3492b97e73d2060acfd8145e4a5851bc4d6fdc5ad939d7795f3879baa88bd194d48e50c84892c97c800d156b059a718f6b10274b077a710f27ab8ee953de70ea860b74a0f3c3dc11177b11cc2e62a95f1ecf607a8dc38e525f415a1bd46b38845ebca04061bacbf627f7975fe599678fee48f83b5989543729e3600000000bc86cd51704f309130f534741377ea7b7bea3c46c0c4c4b7c27c5d057d95ac85a41cdcee8e6fa31f7d2137ed1fb4b21c13b9a2c5e3f7c9ef9e45a35adbf0b9312be929863f000000000000004a82bc080de1f87808d0711dd76f2977ca7f2684bfa5c14a0cd6f1f561e34e4e8e51e81d4a355a7d00d917c16a2bb0cfb2b5f59dfead7ac6e7fa84746e2e425769b9ee2c8ff10e934847604d930f62924d0562ce17f6dadf5053ed8f33092a41bb46e1878c5295fecc27f9c6d1f62da58c0002ea00000000009aa38a05e70591d5cdab1c488ef3c1984c7c0a566cfc2a080000009ec206a54fb49056a555414178ef00d8b8f3c59f01eb5d83415994efcc6ec4b3c275cd6b1b5ff82ef7d7abb1d218e7a1d0afa285706841aac9ccc89df41c39dd58dd70569dde45f8adeaad7d3328fbb6e279f745d2872f0208635e465ca443c3a64c7803760880af23fb3f430a0311fffc96dd13b951642f1433f65b4e170a62a5f7b7d0f9d5cef0d17289c43d4aee0001f7a343899434594cc23e1c864164e130754b337e560f285dc670a31241bf657babf0615b85dc200a10294b7d5885b43ac62fc7f97a85586168483427072a535f2c7481ec261c00f725de74e48d9a86f7d4a5d28da3f099ca3e6472b9d7c86d961f525f799b4517141f018af0673b8296f867eca1ec07be11bc497a6f7d2b752bcf77c2908b64630e7fa0c2261bc2d5de32ab6bbcf296d36807544aa7c3d3301fe227b713a371414c98695e559f9cbf6b046184064a5f24a4cc6f41f21fc24a3ad7d20a89e00a9dc99a40f890869d35fba3ce6f297661d3f8ba21c65badf55d1859581f9e7ef3e2693b46a8fc85be061ce79a08002c04dc04de8b6536123b24be2ef80eb06b2db900fb30596c1574b2a31f81d61ccfd58080d2330b9c7b87b5d17d48c32daffead3414b91603e250eeedc7d601000000037426f643797be3e93da96b5643d3feed0b7c885d06006b830d7cbf3152f27522f5142dcc84a9e48a07518f0142167abf5d6685d09945cbc778bcc3e7dcfaee5d9c1689a3bafc0d3b51b5a3bfd6007954c36d532960964183842601e5364ecb6ad9168040388c7640bfa2f88643de7eebf4da8d1c3e76daace5217761d933d06bbe9609fcf5971aa1e77c3123910e63daaadd8878ad468eabaf78a96012a4ada1a9cd217fb2a0da2d521454ea9e8fcd3b5badfd6f00003a73345b841d04a02bf441955b932c59608a555bc44873272812e0fb874618a0b56b4cf44990f60000000000000000000000b20000da0ca6797590ed13b0bccf71a39e05e877893646d185a77882f866785af6b0149e336c31fb177e3e85f4c60cd4de4ce6ea73a95f434328620fa493937386ad2e2a0d60eb815aa05c33e02c32276dab36d14c63af66a31409ab2a403ec3c7a4e07bd745efa2835a8c932f22aa6da40af9bcdf808b916bc8deb37d5b8c422b65c42d17e61751c561ce775a31b52703d398d52694cfbb7d2b3791b030093b321d9f16b2f06676cf94d75cbba6491ae0b5a16ce92320321314d8d2e88d1cd7e7b1216bdaecba309a38e107103e649d46958cc6ba2d660dd41b78d832beb7206ae01508377273ea96e40760410aeed1866971e04f578e9d856d01000000045aea928f5f669be0636dc3f34f90c34531735f271527412d1ae755a9243da523d713071f9370b509a34eeb46415b2f0d271a7072cbd17e293f20132e6c15756e92776c6a0d7c3a9f512ce17edf3f1ea190853bbf93e220a6ce968b79d504c057000e7d8f8249a8158e68a90bbea8bfab2bd3c067c28e185fe62ce7020f5282cf045b9c790984c6fb65fd3187bd8bfcbe663df6b7770000f58fbad41e6eee5c9595950c4172b9c925403b2f99bbf3cb1981bb0d14bded8eae35e08278020a1ec7f508628056fd3d408a02a1cf8594bcbb21a88f477673442804f714212d000045b9f563b5352fe460a30489b1b6a6d37daead86151492f7fd4b5c64007b68a1b04027eac124478a2ef7f59fe472795785de83578cb96334e0f7c1370dc397d3aa42d937b5718b7610cdcdfe104db7801ec74980b8b111a2748321f81512e4204eb2b024b9fc9e0f257f8c6037b93b2caa236d4354b32434d5a6b01e00000000ee2ea723ea2e1accb97a200609c77e0000000000000000d3a54ccd6e13a966801e9341260d6cbce5fe03999214462cbaa297448677ab659102d0f430fbeae119a7ef2e962d2829d4dd2201c4b30d491269594c88252fbd09aced90609851bd9e5c307e7e0d39e73579c1f3563eff1a6237d3699d61acdc8e36010d76093ddd237df1c4181b0a0c4543b4249e9ff2f5e8b5e0ba2048d542de40f643fda4036124b8feb2dd45d0fa52300518c8052cc09ad73f89734fce82cc627356aa2c651ed2644f34cfbc32e8b29cf29e895e43b473ddb9a43421b4b25f8bbce8e2d7cb8547d156d5972021ae4c9e30f85413276ddebde55999d2ec3c524632b74d703147ba09e0dcb26c4b89636d28428b67e955f53bfd0c9eeb7a9d17000000000096cd8ecf1c511eea07aefa1c5cae1841efa9329d80eafefe00000000000000009111274a44c722ff9f5151aa7cb99ea3e8b2c51eadbd2d0ba1a25b08cc3e67cd186c12ea62a55ff905388bb30d1a63d42593c9aea3a84f5a6fc470d8aaaafeccb373ca26c3685679e6a048af19fca3fc5315a33687"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000006c0)={'syzkaller0\x00', @multicast}) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0x36) 509.220839ms ago: executing program 4 (id=8488): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000c80)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca7f8fbc9cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b2cdf41dc10d1e8bf076d83923dd29c0301000000010000003d5d78c07fa1f7e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6e70af07da5ceb01b7551ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc0476619f28d99cde7a6b73340cc2160a1fe3c184b751c51160fbce841dfebd31a08b32808b80200000000009dd27080e71113610e10d8fb9c2aec61ce63a3462fd50117b89a9ab759b4eeb8cb000067d42b4e54861d0227dbfd2ed8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed0030000002cab154ad029a119ca3c972780870014605c83d7d11c3c975d5aec84222fff0d7216fdb0d3a0ec4bfae563858dc06e7c337642d3e5a815212f5e16c1b30c3a2a71bc85018e5ff2c910496f18afc9ffc2cc788bee1b47683db01a46939868d75211bbae0e7313bff5d4c391ddece00fc772dd6b4d4d0a917b239fe12280fc92c88c5b8dcdcc22ee1747790a8992533ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5cc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673fffffff7f23877a6b24db0e067345560942fa629fbef2461c96a08707671215c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e42e50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b4000000000000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859adfe38f77b91bd7d5ca1664fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc874b2f663ddeef0005b3d96c7aae73835d5a3cda9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5b6154eb2eea0d0df414b315f65112412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7ade8a5b859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3ffea0000000000000be959096ea948cfa8e7194123e918914a71ad5a8521fb9553bc60f7d9719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd80701018e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fc03000000000000001547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f0000000011d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d28307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e540c9ba9c2a589c95d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000070000000000000000000000005333c6199c12dcd926891927a7267c47cf897853d160100b39b613faefe16bed1fc105dddd77ab929b837d4442d13d5a29179a00837918dd7854aa17eb9fbdc2bdc0e98ae2c3f23a6131e2879f04ff01000030b92dd493be66c2242f8184733b80ba28e8ffffff7f00000000bb2f89049c5f6d63d56995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc17587641ed01889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5d371c61f550e9d86aabda45706bda78ab60200000000000000000000000000000000000000706f78f0a2ea9667fb5b951808545a46830970c2dfae01adbda7d29bf1f7abdaf52e0de6f9d7150808ed086642e64ebf98762b34338b80e41b704c3eefaf0bb5ff070000000000000ea15ccc0d7a830b6eb33b6b61675511d693ef5e3c44bbf71cabc5f45c879e7499f8baae2a1a09cf38da73297764fbc0e723e1cc3abb12e3076982ed32c94a2ce3e6f37c47e983da4ca5c96187db5a2a2e1742bc93a65d7187126126b3a80f17dd2f7dbbe82d104ede9ba6925afc2ee6cb94f56f1363cad635abf8f983292c49c0ebf5005154c7b58a3a2a2ea86d2fd92b8661264f781e3fb02d05a28f3f17b64d0258853d45cb5ebde10cd3d82eeed2f1ed925b7cf400304932c5ed0a362b235ce37e1f17700f7d1fecf8be8a2c5d25a9c60657560d05441387ff158a018d19a286c58684a1d2f624c3eb59d509ee89cc2df52881d005b2e5c27563ba54e4153c132d0366aa660000000000000009c1aaec93ec0f925921fb2e9eb202a29bef28224dbabe723de5c584bc398a8792e493048c87f60a51a391e95921218149403558fd13c649f90b0911d57eeb298b590581eba1ce383b539ab80fd15445987b1bb4eb512545e1ab65fef3103ce10b1ee362b51c72f82edf2f502ddf52567775e34a56d1be892f1e62b08950d517fa6fb1b0ef2edf1b67f8644786116b037d4a36fdd30b000063e58c856ec44cbbc2d370553f832af9480215e09aaa3843fe360b1c293a14627f2cfbe278f31d0abc0f5aaa10926dbbfe8a4b131c13a73d4e6d065c2c0fed3ab8442520ce0e0ad7d2d177377ab197ace3ef8b1c24ceb0bdee84bd6e6317633938dd19dc42de7f8f860eca6d9c74525fcd3497526df4c13e3ba5f0d75365a4542ae9440d2fede416d618cdaaf7e038879c5d177b3876fda4121e00000100000000003edd3d43cc64e0d26b46907b42e08d000000000000903350932d3eef7fdada20c19807066e2c72d0d816eb9fa50be213bf6bbb7ccb9f2e8a153e6ced68f192ebed6e86af0f2cec7335fa8039fd6eb025440bc2a34d071f0a0e6774308a74748b8cd994ed368695aa2c5986aa9200a1306ffa5a71ca69e89a6980612b35fc858f37c2c398515a910a35e22ab0573c10b85df4c2972a2fb8b9c080fbb41a753791df727fdeaded2930376eda31312256191c620cce34d1e3bf40a4a207ab1575b399eb8155781bfc7cb5920b49c039935a888d77041894f60fbbcafa487ee96b368e8769da90b44190e569fe8b923c32c288baaca5c5558b5a78bb43e5d9e47a1d5809bb178184b5672d08e29aecf1f572ac1e6cab7e820751e95999b7532603494d37a2bff35a9eec46dfc8a52433f605ebf151c837b4966b5f3628a406175a87e32c5e4268d3000933b580415b162e2946446b8f02554c8a1225217d69d049685dd06aa8528673a9673a723ac414af77f523ad730d00e8700c213f95c87a94f39f506b9e000000000000000000000000000000000000000000000000000090668ac41a1c2a4f7831e6c6a3e9c68ca2c449482bb70a994e71a7f24873848fbb128c820c1de19cc003dfa65a2b296caeb1253802080e08eeb724c4c7b7e052afa19b0f2cd7a13bda4b5a8f3b8fa3ca70bb756a3d529718d5c79d9bdb89e5d33793533211d76d00a45079eff797476106bf76f1fed952a7c9162b88911b5b00c3d26fd2fb4d7b29d1ce025e102d458efd5cca3f3835ce760359eaa01cb13cb28d60e8942fdc02b6824c00dac62f8a2d4c680ae284a82f09d6641921536814b444e4188d9b2e97eb3b108e7876f0f3f3863147ab694218c7cecc075d52d590dddbb57fc6fedf5ec69d7894a7b5c8109f303dab998815c80534b0bd34c49eea63997e56728a8185a8bb6988a7197b87f5548f5edfdfb3efc907fe561b33a6f7c707f7828c6adaf3b2a39929b4b65253e787d65c08aff5e4a9b2267bd8f803ea38f10a6e9c4a49bf23525e08c12d229211fe4d88cf1440f29accfa50f327ac1fb20d7f164100111bd21fca713b2475f1c997f3000000000080c426bcec79c6bc83ce4e6cbb17c01be69db342192d0a716cc24710d23321441f475ec485d642b61c6bd907071dbbe37c0b78f60fd2ad0d13ca62d9d9aafb01c3920b64cb5e023810e2de4327f90c389ce36d90ff9f3cb9d8cd2260d05a8126943a3df17157470595c68ac8df7fea6d42ecb2cdb65b4f2aef0db2b2de949a6d4ec37f2fd693ae44944041a64fe6336aba1c66b1b95d2edbc40364a049616ae962d75eae619548aa86bd5f0bad56e7ad7de2ee5e6f3b42e3a27094b6b5face99456d9af1926b21d37faf7612d9752cf58e6424decd530b5419e117ec08647566b1bdd75d6a9a1e600aaf0f42ce94b4725d4c2da80150dc34e5975d6904f061ed9a7608959f2d24ee6ec4f2395d16e02f53c746f74b12013f738d76456c3407188eff97f31ca36e5d79e1f1c7c3b688ee21d37ba5ebf4afc2a61f16"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x55}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe06, 0x1000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) syz_clone(0x4d100000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffffff93}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x4}, [@ldst={0x4, 0x3}]}, 0x0, 0x4, 0x8f, &(0x7f0000000200)=""/143, 0x0, 0x0, '\x00', 0x0, 0xd}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x9d, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001400)={{r7}, &(0x7f0000001380), &(0x7f00000013c0)='%-010d \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000080)={r7, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) r8 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX=r8], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0xfffffffffffffef9) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) 504.18669ms ago: executing program 3 (id=8496): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000eaffffffffffffff18110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0xe, &(0x7f0000000ac0)=ANY=[@ANYBLOB="b700000081000000bfa30000000000000703000002feffff720af0fff8ffffff71a4f0ff000000002d030000000000001d400500000000004704000001ed000072030000000000001d44000000000000730a00fe000000007303000000000000b5000000000000009500000000000000023bc065b58111c6dfa041b63af4a3912435f1a864a710aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168c50000000190f32050e436fe275daf51efd601b6bf01c8e8b1b526375ec4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e654400e2438ec649dc74a28610643a98d9ec21ead2ed51b104d4d91af25b845d8a7925c3109b151b8b9f75dd08d123deda88c658d42ecbf28bf7076c15b463bebc72f526d8e8afcb913466aaa7f6df70252e79166d858fcd0e06dd31af9612f2460d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff616236fd9aa58f2477184b6a89adaf17b0a6041bdef728d236619074d6ebdfd1f5089048ddff6da40f9411fe722631cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564162a27afea62d84f3a10746443d6438e959532e0617d419c6bc6ea9f2bca4464f56e24e6d2105bd901204a1deeed4155617572652d950ad31928b0b0c3dc2869f478341d02d0f5ad94b081fcd507acb4b9c65fee9d5a17f48a7382f13d000000225d85ae49cee383dc5049076b989b40000000000000da60d2ae20cfb91d6a49964757cdf538f9ce2bdb1ab062cd54e67011d355d84ce97bb0c6b4a595e487efbb2d71cde2c140952f9a0f0bc6980fe78683ac5c0c31032599ddd71063be9261b2e1aab1675b34a22048ef8c126aeef5f510a8f1aded94a129e4aec6f8d9ab06faffc3a15d96c2ea3e2e04cfe031b2875353193f82ade69d0540059fe6c7fe7cd8697502c7596566d674e425da5e87e59602a9f6590521d31d3804b3e0a1053abdc31282dfb15eb6841bb64a1b304502dda787343ce3c953992e4a982f3c48153baae244e7bf37548c7f1a4cad2422ee965a38f7defbd2160242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a9de44028d6112a0c2d21b2dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc4e95dd2d18383117c039862198899b212c55318294270a1ad10c80fef7c24d47afce829ba0f85da6d888f18ea40ab959f6074ab2a40d85d15017ab513cdc6c0e57fb1c1ca571380d7b4ead35a385e0b4a26b702396df7e0c1e02b6e4114f244a9bf93f04bf072f0861f7580e69db384ac7eeedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba34015ea5aacb1188883ad2a3b1832371fe5bc621426d1ed0a4a99702cc1b6912a1e717d29135753208165b9cdbae2ed9dc7358f0ebadde0b727f27feeb744ddcc536cbae315c7d1fe1399562ba6824840bd2951680f6f2f9a6a8346962a350845ffa0d829e4f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010aec0e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa5b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ceb201ddeb6dc5f6a903792283c42efc54fa84323afc4c10eff462c8843187f1dd48ef3fa293774d582956ff0f40b10ca94f6feeb2893c17888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538d6ee6ba65893ff1f908ba7554ba583fef3ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738012e4fee18a22da19fcdb4c2890cda1f96b952511e3a69d694d625e0b2f808890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e96753b639a924599c1f69219927ea5301fff0a6063d427f0688430754c02180d61542c2571f983e9673560000000000000000005a7b57f03ca91a01ba2e30ca99e8ebc15ecb4d91675767999d146aef7799738b292fd640dfef6b04d086f737a159d7e0c6e4d81ad64a8bbca48568325b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a7bce14c6de4e7c0660d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b91b7d120617d12d91db2633d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec86a4555d89fe0120f64c62e8e3ed8bcb45202c3d4bbec8d722824c0ebca8db1ea4a003d2fbdc1f9be78537756ab5bbe4fe9af5d785d0128171c90d9900ce2532b0f9d01c4b45294fbba468df3e1b393cb4e62e754598e47df6bd06431c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a8811922929e085392ab3d1311b8243266d87047f601fa88a0da36b9f302e8262395174328f2482d14008de83070744f143fdec90ba5a82668d5fac114c13955ad6dca5db2231d8ba14c54c47ed04a4b4ace17e357e1d6432399f87a7a14245bbd796a09313b247b95d37ff40a404bdad74bd20000000000000000000099fef7cd7af3ce64a92f95d89d125b1e641240d7e5e27a3d1f7684448c3e3822d617e205061298b939a191be4b48e169bde2cae3accc5bd40a2968b59c93d35f8e42366fdef9a2abae1cf01ce68abff28861aac8302d268569dd42e194e330c7aaa54ebbcefd23f21ce8153b9926e12e925cb56119df72c7533a48d028ad0c74e2a9478fa3be18a1a2b65079cc1c7bc46dd12305a1ae9dd19e8d525206c0a728cfd42193abe8130bc01a2d69841f3d7799ac04bdc590bb1c89b9c695f163e57343c9bfb59909433c9001c5f8b23e38534a538fc933cac6c2a92d038df638a0f226df9fb857bd414c2cd69985e8053e3dfa41614d7c74d04d8c2471041d17c730fad28395f8d4688898cd58b9d600c851626529bb58aa364b55e73f053450665e7b94ad1012fd7a8139166fd5e59c84f4ab279b1b99c028db4cb9680c8035f967db18de738844da7e260a830c1ffa49f5af3c15423a0e315acb82a3e89218cb314e68fda4d94aa1d815babc13b9fd336d205c5913ef67"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x3}, 0x10}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x9, 0x11, 0xffffffffffffffff, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x90) close(r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x10) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x124, 0x1}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r2) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r5, &(0x7f0000000600)="07187cff173841d5170f8fcedd6ac3ee695986ab527d20cc83daf3b4da0295fb7d23e595b055eec3980e92b8f557b13724581a6099a4393a5ef51e70e02142d0f7bed8b1e2dee313b3c77bfbc0052bdf014b328c7275ca7f580c569688a0b4beddfa9fc72ce3d2bfb7a767664564d18dd3a4a396282d9e3f039572f2ebed3d07d0e651684f7cef4749eba2e4c2baceac5fb56d7e24f42c", &(0x7f0000000540)=""/154}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r6}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRES32=r3], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000004}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_config_ext={0x2, 0xe68c}, 0x10210, 0x88, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r8, &(0x7f0000000140)=ANY=[], 0x32600) ioctl$PERF_EVENT_IOC_PERIOD(r8, 0x40305829, &(0x7f0000000040)) 502.66585ms ago: executing program 0 (id=8489): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002300)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100180000000000000014000000140000000500000002000000010000060400000002000000000000000000610000202fc845f87652e9d3bbd74f91"], 0x0, 0x31}, 0x20) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000006d00000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x6, 0x2, 0x5bb, 0x10, r1, 0xd, '\x00', 0x0, r2, 0x2, 0x4, 0x1, 0xc}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1, 0x12}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r4, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r6}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@id={0x1e, 0x3, 0x0, {0x0, 0xfffffffc}}, 0x10, 0x0}, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000300)={0x3, 0x4, 0x4, 0xa, 0x0, r3, 0xffff9d9e, '\x00', 0x0, r0, 0x0, 0x4, 0x2}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r9}, 0x10) sendmsg(r7, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[], 0x2008}, 0x84d5) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34f677969c599f24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xf101}) 331.430044ms ago: executing program 3 (id=8490): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0xf}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) (async) write$cgroup_subtree(r0, 0x0, 0xffe3) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r3, &(0x7f00000028c0)={0x0, 0x0, 0x0}, 0x0) (async) ioctl$SIOCSIFHWADDR(r2, 0x541b, &(0x7f0000000280)={'lo\x00', @random}) close(0xffffffffffffffff) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r4 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f00000000c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000040)=0x7ff, 0x12) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xee, 0x1, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) (async) r6 = perf_event_open$cgroup(&(0x7f0000000080)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x89}, [@ldst={0x7}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x22e, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000000040)='(\"@]K@{.\"\x00') (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, 0x0, 0x0}, 0x90) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) r7 = openat$cgroup_devices(r1, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r7, &(0x7f00000001c0)={'a', ' *:* ', 'rwm\x00'}, 0xa) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) 330.687964ms ago: executing program 1 (id=8491): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vxcan1\x00', 0x2}) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x10, 0x4, &(0x7f0000000400)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_alloc\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={0x1, &(0x7f00000007c0)="59d26038d5a4907283b981a902cac2ed7ce0dfa111f2665090986e2ee258a4b631790cfc7b51db6b2a6e209c149b98bc3d381f2d6ce55d237f87d9d7670f8c3bff4d89e4402dea1c67afa67ec6b25c3fa56799763924c003137b1125b085efdb37008777c5cfc1", &(0x7f0000000700)=""/165}, 0x5f) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r3}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4090, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000080)) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x15, 0xc, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0x327, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{r5}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r6}, 0x10) 294.463267ms ago: executing program 2 (id=8492): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x4, 0x2, 0x7, 0x104, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='ext4_unlink_exit\x00'}, 0x10) unlink(&(0x7f0000000200)='./cgroup\x00') r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="1802000000fcff000000000000000000850000002200000085000000070000009500000000000000e3b791f4a4a3972200e1d2acd44498f2cfbf4ae21867953463a9211404aa0e942d2460473901162b5db03303d2731c0e8ff5f76396f3a69ef52a00e8ae396de506de923c26c5bc87e3461c93cca3b186787c11d06d49d19896534d476fb6550cd031867572ce45503f6f46284b1ce64c582ae6c0e66319f800991ca2b186824cd560affec254ea32"], &(0x7f0000000080)='GPL\x00', 0x4, 0xbd, &(0x7f0000000340)=""/189, 0x0, 0x51}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x0, 0x7, 0x0, &(0x7f0000000100)="e0b9547ed387db", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000e40)='ns/net\x00') ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4b47, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b5181100", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={0x0, &(0x7f0000000880)=""/197, 0x0, 0xfffffed7, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r1, @ANYRES32], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 284.173378ms ago: executing program 1 (id=8493): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2}}, @func={0x2}]}, {0x0, [0x0, 0x2e]}}, 0x0, 0x40}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r8}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r6}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r11}, &(0x7f00000014c0), &(0x7f0000001500)=r10}, 0x20) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1, 0x5}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r12, &(0x7f0000000000), 0x20000000}, 0x20) 265.670219ms ago: executing program 3 (id=8494): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000540)={r0, 0x58, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x5, &(0x7f0000000700)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1e7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa1ff}]}, &(0x7f0000000740)='GPL\x00', 0x1000, 0x1000, &(0x7f0000001340)=""/4096, 0x40f00, 0x52, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRESOCT=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000178500000043000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0xbd243, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000018110000e7f7716a38661318f27fd20d0b13b98f94a52486010100000000000025e0013e232da1c31c445d619bbf347215c0fcceea1a46f620d3b4ac08bd04c8cae8885944afc2f0c4762cad819f032fda30df33b3e943cd4a8d23ea98854848c5653d31fe29f6bf418105a5c1c03477cc9e6db7a6f01c2c5962519f1d1a1213e6373af24c2ff32e47233d4a065d26fa791abf95a6f0a28e3dc8f512ad590585ae44ada1fd2670f6daf0c315fc7e6a1860ea5b424cf594b9a5c57f57e7221dc3bb7446", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000003000008850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='module_request\x00', r9}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=0xffffffffffffffff, 0x4) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r10 = perf_event_open$cgroup(&(0x7f0000000340)={0x0, 0x80, 0xea, 0x9, 0x0, 0x6, 0x0, 0x2, 0x940, 0x9, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffbff, 0x2, @perf_config_ext={0x3, 0x5}, 0x200, 0x100, 0xfffffffa, 0x6, 0x9, 0xde, 0x4, 0x0, 0x3, 0x0, 0x4}, r7, 0xe, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x8, 0xd, 0xf4, 0x1, 0x0, 0xb, 0x4591, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x8, 0x4}, 0x0, 0x5, 0x1, 0x9, 0x8, 0x6, 0xffff, 0x0, 0x96a, 0x0, 0x9}, 0xffffffffffffffff, 0x1, r10, 0x1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x9, [@struct={0x0, 0x2, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3}, {0x0, 0x2}]}, @func={0x7}, @restrict={0x0, 0x0, 0x0, 0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e]}}, 0x0, 0x5d}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r6, 0x2402, 0x8001) r11 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x1, 0x101}]}]}}, 0x0, 0x32}, 0x20) ioctl$TUNSETOFFLOAD(r11, 0xc004743e, 0x7d9437282000) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000940)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad1f50ad32d3fd25dfd73a015e0ca6a0f68a7d007f15451dfb265a0e3ccae669e173a64bc1cfd5587d452d64e7cc957d77578f4c25235138d5521f9453559c35da860e8efbc64e57cbb7aee976f2b54421eed73d5661ca3dbe74bd09de8793dbcceef76b2e5feecf9c66c54c3b3ffe1b4ce25d7c983c044c06cd0a48dfe3e26e7a23129d6606fd28a69989d552af6d9a9df2c3af36e0360050011bbecc2f4a3799af2551ce935b0f327cb3f011a7d06602e2fd5234712596b696418f163d1a13ed38ae82f87925bfacba83109753f541cd027edd68149ee99eebc6f7d6dd4aed4af7588c8e1b44ccb19e810879b70a7000000e7ffffff00000000d7900a820b63278f4e9a217b98ef7042ad2a92895614cd50cbe43a1ed25268816b00000000000009d27d753a30a147b24a48435bd8a568669596e9e0867958e1dd7a0defb6670c06054002238260000000000040587c1ed797aa21a38e1e389f640a0b8b0000000000a835ad0f61ba73c31b05c00fba8a4aee676d7c45bb29671a68ee2e60da7b01a2e5785a238afa4aba70c07fcd95bf8b0d71b6f72d6a8d87fb08533d97ad96d3943c4cc8306dac433a5cdf334178b04963d67dd5a5707e618a1ef9057fec00f9e930219fa8d30e716de8cde9c60f0000000c3b64d10f0939b42b788daa7075fa542242b00f6bf9b64ad460e386b6f388351fbdacb3ad074574ee9d450f9dcfaef1be95ff3c449e6482e4403174618c20e887d6f320616d31d78a0e5421d5742cc52509fd90cf2df6d1404f6b8f810d7b94d421971b77a3270153a0d57cccfe27872f3e8e44480f93c33421986a7737842627301fb2fee8cabab074adaa2024ff57e609ba2f4d83b3bbf52309484532416f48f43b31395c6f45fee8f1682a4e8d5e3b9ae634ed24fb0e8b5fadaf5cb7eea62b7bb4264e72950c9dc791d771acc24c08cdb6ef24c813d082a86d9b879bdf5aefdfd905a2bd4ea36b0b54915a68fe149db154a8340017e1855511e9c0fe62d0cf55"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) 243.133421ms ago: executing program 0 (id=8495): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00'}, 0x10) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r7) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) 157.838737ms ago: executing program 2 (id=8497): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b708000000004d007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000000000000850000001c00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 154.307448ms ago: executing program 1 (id=8498): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='cpuacct.usage_user\x00', 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000340)='cpuset.effective_mems\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000680), &(0x7f0000000780), 0x6, r5}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008088100b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r5}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x7}, 0x48) 51.806767ms ago: executing program 1 (id=8499): perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x95, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x6}, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[], 0x0, 0x26}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xf, &(0x7f0000001040)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0x3, &(0x7f0000000040)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0xb9, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000040), &(0x7f0000000440)=""/183}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000000)={r2, &(0x7f0000000180), &(0x7f0000000680)=""/141}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 49.282117ms ago: executing program 2 (id=8500): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0x1c, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000001a007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000200000850000008200000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000023008500000017000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 46.599447ms ago: executing program 3 (id=8501): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x8, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000}, 0x48) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}, 0x48) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) 46.199997ms ago: executing program 2 (id=8502): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000a40)={0x5, 0x80, 0x0, 0x0, 0xb5, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x3, 0x7}, 0x0, 0x2, 0x4, 0x7}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x9, 0x7fff, 0xb, 0x994, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000002600181100", @ANYRES32=r2, @ANYBLOB], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r4, &(0x7f0000000000), 0x400000) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x0, 0x5, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000000000)={'vlan0\x00', @local}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000004c0)={0xffffffffffffffff, &(0x7f0000000340)="c263b0259ad2d8382d1e9ce289241edeee597dafec8d9635bb8c2b33635e620662c83b8d96f30e6c8c5e02f562b09468fafbbbaafebb42a5b7ab34bc9854a43ebc3d6b4a695aeea3b581472e", &(0x7f00000003c0)=""/91}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB='b'], 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=@base={0x11, 0x4, 0x4, 0x1f}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000340)={r8, &(0x7f0000000480)}, 0x20) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 0s ago: executing program 0 (id=8503): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0xa93, 0x4, 0x1000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002e00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r5, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="b0ff04c66b0d698cb89e2fe086dd1f74ffff06000000fe80000000000000ac14140746647b7954c4c06b580febc28eb143d0f6c0bad62c67a04402ba4125c7024f63fdb0b6c8ee826b4dfe6042a2f057c66cad677d850ea9928bcfcb47e585e427746ed3b27c40060cbd030a6d675c9926af53cd3085b24f9b7a486775c4f284f8c5a572ca115bce90c0ee9d4e7a07f5f1518092cb1f156694036f6618a59196631e6303fd5307d1112601d3641c9492f7dc3503416836b14590c53b1fc1ac149b70cc1142d6bc57fc3a76839fa2f96878b520fedfb9f64d81584a2e85ab4f6ec718b02d78f2ebf04e6b3b94610a21616181629a03c3dc0bf05e0a71f887833b81db7a10bc53259cb80716f6804934a411d424c1db98d454be1adb2776fdbb92b299d3b80af6987a871b4549fdb4c8297ee31ad925c8b0fb1a9d2589b08ed52602cbc26b56df71201bc4ea8621c56f33d251c1d4589af2dcd78fbb4e34bde02cb3920a30cee9489ee72c3e19304c16c2110e1839712d484b80abe77786a7e2ba834874a4e16b93dd07297554a06c2ad2c906f8ebb1db8730df096709184728d48f0a806696bd0d4b12d0064b933d9675353dae77fe8419451f85da63be78b70ca2a84a77f572d9f289d4313e6f6039fe756ac13a5d08838315dff44cda433cc7bc6b77449f8c", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) close(0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f00000006c0)={'syzkaller0\x00', @multicast}) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0x36) kernel console output (not intermixed with test programs): 339004][T16412] CPU: 0 PID: 16412 Comm: syz.0.5405 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 436.350207][T16412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 436.360184][T16412] Call Trace: [ 436.363326][T16412] dump_stack_lvl+0x1e2/0x24b [ 436.367923][T16412] ? bfq_pos_tree_add_move+0x43b/0x43b [ 436.373220][T16412] ? ___ratelimit+0xb5/0x580 [ 436.377633][T16412] dump_stack+0x15/0x17 [ 436.381763][T16412] should_fail+0x3c6/0x510 [ 436.386060][T16412] should_fail_alloc_page+0x52/0x60 [ 436.391101][T16412] __alloc_pages_nodemask+0x1b3/0xaf0 [ 436.396294][T16412] ? debug_smp_processor_id+0x17/0x20 [ 436.401520][T16412] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 436.406902][T16412] wp_page_copy+0x201/0x1940 [ 436.411314][T16412] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 436.416955][T16412] ? bpf_do_trace_printk+0x128/0x270 [ 436.422170][T16412] ? trace_spf_pte_lock+0x130/0x130 [ 436.427201][T16412] ? lapic_next_event+0x5f/0x70 [ 436.431883][T16412] do_wp_page+0x71b/0xca0 [ 436.436052][T16412] handle_pte_fault+0xd59/0x3e30 [ 436.440827][T16412] ? ctx_flexible_sched_in+0xa8/0x100 [ 436.446037][T16412] ? ctx_pinned_sched_in+0x100/0x100 [ 436.451323][T16412] ? vmf_allows_speculation+0x6f0/0x6f0 [ 436.456816][T16412] ? __this_cpu_preempt_check+0x13/0x20 [ 436.462189][T16412] handle_mm_fault+0x11d6/0x1a10 [ 436.467056][T16412] ? can_reuse_spf_vma+0xe0/0xe0 [ 436.471929][T16412] ? irq_exit_rcu+0x9/0x10 [ 436.476169][T16412] ? vmacache_find+0x2a9/0x4d0 [ 436.480759][T16412] ? vmacache_update+0xb7/0x120 [ 436.485456][T16412] ? find_vma+0x136/0x150 [ 436.489608][T16412] exc_page_fault+0x2a6/0x5b0 [ 436.494214][T16412] asm_exc_page_fault+0x1e/0x30 [ 436.498895][T16412] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 436.505327][T16412] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 0f 1f 80 00 00 00 00 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 66 2e 0f 1f 84 00 00 00 00 00 89 d1 83 f8 [ 436.524934][T16412] RSP: 0018:ffffc90000af76b8 EFLAGS: 00050206 [ 436.530888][T16412] RAX: ffffffff82512101 RBX: 00000000000101d0 RCX: 000000000000e5d0 [ 436.538742][T16412] RDX: 00000000000101d0 RSI: ffff888134f61cc8 RDI: 0000000020002000 [ 436.546542][T16412] RBP: ffffc90000af7820 R08: dffffc0000000000 R09: ffffed10269ee053 [ 436.554359][T16412] R10: 0000000000000003 R11: dffffc0000000001 R12: ffff888134f600c8 [ 436.562341][T16412] R13: 00007ffffffff000 R14: 0000000020000400 R15: ffffc90000af7e88 [ 436.570340][T16412] ? _copy_to_iter+0x281/0xda0 [ 436.574931][T16412] ? _copy_to_iter+0x2a4/0xda0 [ 436.579536][T16412] ? irq_exit_rcu+0x9/0x10 [ 436.583779][T16412] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 436.589770][T16412] ? iov_iter_init+0x120/0x120 [ 436.594371][T16412] ? __check_object_size+0x73/0x3c0 [ 436.599394][T16412] ? __virt_addr_valid+0x1ac/0x2e0 [ 436.604344][T16412] ? __kasan_check_read+0x11/0x20 [ 436.609200][T16412] ? __check_object_size+0x2e6/0x3c0 [ 436.614325][T16412] simple_copy_to_iter+0x50/0x70 [ 436.619097][T16412] __skb_datagram_iter+0xcd/0x780 [ 436.623956][T16412] ? tipc_sk_anc_data_recv+0xbd/0x980 [ 436.629163][T16412] ? tsk_importance+0x150/0x150 [ 436.633859][T16412] ? skb_copy_datagram_iter+0x180/0x180 [ 436.639232][T16412] ? kvm_sched_clock_read+0x18/0x40 [ 436.644267][T16412] skb_copy_datagram_iter+0x46/0x180 [ 436.649484][T16412] tipc_recvstream+0x7a4/0xf70 [ 436.654077][T16412] ? tipc_sendstream+0x70/0x70 [ 436.658762][T16412] ? ____sys_recvmsg+0x1f1/0x530 [ 436.663537][T16412] ? tipc_sendstream+0x70/0x70 [ 436.668134][T16412] ____sys_recvmsg+0x286/0x530 [ 436.672736][T16412] ? __sys_recvmsg_sock+0x50/0x50 [ 436.677712][T16412] ? import_iovec+0xe5/0x120 [ 436.682139][T16412] ___sys_recvmsg+0x1ec/0x690 [ 436.686736][T16412] ? __sys_recvmsg+0x270/0x270 [ 436.691319][T16412] ? sched_clock+0x3a/0x40 [ 436.695579][T16412] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 436.701565][T16412] __x64_sys_recvmsg+0x1ee/0x2c0 [ 436.706333][T16412] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 436.711978][T16412] ? ___sys_recvmsg+0x690/0x690 [ 436.716781][T16412] ? debug_smp_processor_id+0x17/0x20 [ 436.721969][T16412] do_syscall_64+0x34/0x70 [ 436.726299][T16412] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 436.732022][T16412] RIP: 0033:0x7f44c54cc9f9 [ 436.736278][T16412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 436.755903][T16412] RSP: 002b:00007f44c414a038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 436.764172][T16412] RAX: ffffffffffffffda RBX: 00007f44c5668f80 RCX: 00007f44c54cc9f9 [ 436.772041][T16412] RDX: 0000000000001f00 RSI: 0000000020000500 RDI: 0000000000000005 [ 436.779843][T16412] RBP: 00007f44c414a090 R08: 0000000000000000 R09: 0000000000000000 [ 436.787662][T16412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 436.795466][T16412] R13: 0000000000000000 R14: 00007f44c5668f80 R15: 00007ffdd1b0d4f8 [ 436.832737][T16423] device wg2 entered promiscuous mode [ 437.656232][T16449] device pim6reg1 entered promiscuous mode [ 438.601534][T16498] device sit0 entered promiscuous mode [ 439.164567][T16529] syzkaller0: create flow: hash 1240786286 index 1 [ 439.256262][T13370] syzkaller0: tun_net_xmit 76 [ 439.265922][T13370] syzkaller0: tun_net_xmit 48 [ 439.279757][ C1] syzkaller0: tun_net_xmit 76 [ 440.008097][T16525] syzkaller0: delete flow: hash 1240786286 index 1 [ 441.894868][T16627] device syzkaller0 entered promiscuous mode [ 444.403286][T16757] syz.0.5520[16757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.403348][T16757] syz.0.5520[16757] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.689213][T16803] device syzkaller0 entered promiscuous mode [ 446.813185][T16832] device pim6reg1 entered promiscuous mode [ 447.545295][T16860] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.952927][T16963] device syzkaller0 entered promiscuous mode [ 453.817938][T17111] device veth1_macvtap entered promiscuous mode [ 453.849935][T17111] device macsec0 entered promiscuous mode [ 453.902217][ T4812] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 454.411450][T17147] device veth1_macvtap left promiscuous mode [ 454.462553][T17147] device macsec0 left promiscuous mode [ 454.571566][T17150] device veth1_macvtap entered promiscuous mode [ 454.598128][T17150] device macsec0 entered promiscuous mode [ 456.383183][T17227] device vxcan1 entered promiscuous mode [ 456.397199][T17244] device pim6reg1 entered promiscuous mode [ 456.875618][T17271] device pim6reg1 entered promiscuous mode [ 457.024949][T17276] device veth1_macvtap left promiscuous mode [ 457.044293][T17276] device macsec0 left promiscuous mode [ 459.772924][T17372] device syzkaller0 entered promiscuous mode [ 461.084377][T17486] device syzkaller0 entered promiscuous mode [ 465.869612][T17666] device pim6reg1 entered promiscuous mode [ 465.931447][T17666] bridge0: port 2(bridge_slave_1) entered disabled state [ 465.939703][T17666] bridge0: port 1(bridge_slave_0) entered disabled state [ 465.970048][T17666] device bridge0 left promiscuous mode [ 468.482970][T17783] device syzkaller0 entered promiscuous mode [ 468.498407][T17785] device veth0_vlan left promiscuous mode [ 468.505454][T17785] device veth0_vlan entered promiscuous mode [ 468.514096][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 468.538063][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 468.548700][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 469.471419][T17849] syz.3.5864[17849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 469.471482][T17849] syz.3.5864[17849] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 470.959568][T17928] syz.0.5888[17928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.039942][T17928] syz.0.5888[17928] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 471.197448][T17939] device pim6reg1 entered promiscuous mode [ 471.285513][T17922] bridge0: port 2(bridge_slave_1) entered disabled state [ 471.962834][T17996] FAULT_INJECTION: forcing a failure. [ 471.962834][T17996] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 471.989842][T17996] CPU: 0 PID: 17996 Comm: syz.2.5915 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 472.001030][T17996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 472.010917][T17996] Call Trace: [ 472.014058][T17996] dump_stack_lvl+0x1e2/0x24b [ 472.018665][T17996] ? bfq_pos_tree_add_move+0x43b/0x43b [ 472.023958][T17996] dump_stack+0x15/0x17 [ 472.027968][T17996] should_fail+0x3c6/0x510 [ 472.032572][T17996] should_fail_usercopy+0x1a/0x20 [ 472.037426][T17996] _copy_from_user+0x20/0xd0 [ 472.041850][T17996] sock_ioctl+0x648/0x760 [ 472.046099][T17996] ? sock_poll+0x340/0x340 [ 472.050365][T17996] ? security_file_ioctl+0x84/0xb0 [ 472.055298][T17996] ? sock_poll+0x340/0x340 [ 472.059555][T17996] __se_sys_ioctl+0x114/0x190 [ 472.064069][T17996] __x64_sys_ioctl+0x7b/0x90 [ 472.068504][T17996] do_syscall_64+0x34/0x70 [ 472.072922][T17996] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 472.078645][T17996] RIP: 0033:0x7f7fd1ec09f9 [ 472.082902][T17996] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 472.102338][T17996] RSP: 002b:00007f7fd0b3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 472.110587][T17996] RAX: ffffffffffffffda RBX: 00007f7fd205cf80 RCX: 00007f7fd1ec09f9 [ 472.118428][T17996] RDX: 0000000020000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 472.126294][T17996] RBP: 00007f7fd0b3e090 R08: 0000000000000000 R09: 0000000000000000 [ 472.134108][T17996] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 472.141926][T17996] R13: 0000000000000000 R14: 00007f7fd205cf80 R15: 00007ffe0f632d68 [ 473.859027][T18084] device veth0_vlan left promiscuous mode [ 473.896436][T18084] device veth0_vlan entered promiscuous mode [ 473.960068][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 473.970522][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 473.983098][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 474.465474][T18120] FAULT_INJECTION: forcing a failure. [ 474.465474][T18120] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 474.606414][T18120] CPU: 0 PID: 18120 Comm: syz.3.5954 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 474.617780][T18120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 474.627672][T18120] Call Trace: [ 474.630809][T18120] dump_stack_lvl+0x1e2/0x24b [ 474.635322][T18120] ? bfq_pos_tree_add_move+0x43b/0x43b [ 474.640629][T18120] dump_stack+0x15/0x17 [ 474.644598][T18120] should_fail+0x3c6/0x510 [ 474.648854][T18120] should_fail_usercopy+0x1a/0x20 [ 474.653713][T18120] _copy_to_user+0x20/0x90 [ 474.657967][T18120] simple_read_from_buffer+0xc7/0x150 [ 474.663175][T18120] proc_fail_nth_read+0x1a3/0x210 [ 474.668036][T18120] ? proc_fault_inject_write+0x390/0x390 [ 474.673502][T18120] ? security_file_permission+0x86/0xb0 [ 474.678887][T18120] ? rw_verify_area+0x1c3/0x360 [ 474.683569][T18120] ? full_name_hash+0xbd/0xf0 [ 474.688177][T18120] ? proc_fault_inject_write+0x390/0x390 [ 474.693648][T18120] vfs_read+0x200/0xba0 [ 474.697633][T18120] ? netdev_refcnt_read+0x1e0/0x1e0 [ 474.702665][T18120] ? kernel_read+0x70/0x70 [ 474.706921][T18120] ? __kasan_check_write+0x14/0x20 [ 474.711952][T18120] ? mutex_lock+0xa5/0x110 [ 474.716291][T18120] ? mutex_trylock+0xa0/0xa0 [ 474.720808][T18120] ? __fdget_pos+0x2e7/0x3a0 [ 474.725233][T18120] ? ksys_read+0x77/0x2c0 [ 474.729658][T18120] ksys_read+0x199/0x2c0 [ 474.733734][T18120] ? vfs_write+0xe70/0xe70 [ 474.737994][T18120] ? debug_smp_processor_id+0x17/0x20 [ 474.743197][T18120] __x64_sys_read+0x7b/0x90 [ 474.747539][T18120] do_syscall_64+0x34/0x70 [ 474.751805][T18120] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 474.757528][T18120] RIP: 0033:0x7fed8e4aa43c [ 474.761865][T18120] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 474.781303][T18120] RSP: 002b:00007fed8d129030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 474.789543][T18120] RAX: ffffffffffffffda RBX: 00007fed8e647f80 RCX: 00007fed8e4aa43c [ 474.797353][T18120] RDX: 000000000000000f RSI: 00007fed8d1290a0 RDI: 000000000000000a [ 474.805162][T18120] RBP: 00007fed8d129090 R08: 0000000000000000 R09: 0000000000000000 [ 474.812990][T18120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 474.820957][T18120] R13: 0000000000000000 R14: 00007fed8e647f80 R15: 00007ffd430aea98 [ 475.931928][ T24] audit: type=1400 audit(1723640260.920:175): avc: denied { create } for pid=18185 comm="syz.3.5978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 476.373414][T18202] device syzkaller0 entered promiscuous mode [ 476.824652][T18220] device veth0_vlan left promiscuous mode [ 476.945434][T18220] device veth0_vlan entered promiscuous mode [ 477.735639][T18253] device syzkaller0 entered promiscuous mode [ 479.029563][T18328] device syzkaller0 entered promiscuous mode [ 479.165522][T18334] device syzkaller0 entered promiscuous mode [ 481.820427][T18458] device sit0 entered promiscuous mode [ 482.726672][T18488] bridge0: port 1(bridge_slave_0) entered blocking state [ 482.804457][T18488] bridge0: port 1(bridge_slave_0) entered disabled state [ 482.830513][T18488] device bridge_slave_0 entered promiscuous mode [ 482.881736][T18488] bridge0: port 2(bridge_slave_1) entered blocking state [ 482.888690][T18488] bridge0: port 2(bridge_slave_1) entered disabled state [ 482.896312][T18488] device bridge_slave_1 entered promiscuous mode [ 483.409168][T18488] bridge0: port 2(bridge_slave_1) entered blocking state [ 483.416069][T18488] bridge0: port 2(bridge_slave_1) entered forwarding state [ 483.423192][T18488] bridge0: port 1(bridge_slave_0) entered blocking state [ 483.430135][T18488] bridge0: port 1(bridge_slave_0) entered forwarding state [ 483.728458][ T8768] bridge0: port 1(bridge_slave_0) entered disabled state [ 483.738192][ T8768] bridge0: port 2(bridge_slave_1) entered disabled state [ 483.746850][T18516] syz.4.6078[18516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.746920][T18516] syz.4.6078[18516] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 483.921631][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 483.987106][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 484.097237][T18488] device veth0_vlan entered promiscuous mode [ 484.143310][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 484.152969][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 484.161286][T10444] bridge0: port 1(bridge_slave_0) entered blocking state [ 484.168172][T10444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 484.176420][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 484.184925][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 484.193952][T10444] bridge0: port 2(bridge_slave_1) entered blocking state [ 484.200824][T10444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 484.208419][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 484.216829][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 484.225065][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 484.234080][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 484.242461][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 484.250899][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 484.259249][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 484.267413][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 484.292288][T10445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 484.299719][T10445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 484.467460][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 484.481282][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 484.504257][T18488] device veth1_macvtap entered promiscuous mode [ 484.547524][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 484.558450][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 484.569523][ T8768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 484.600051][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 484.611486][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 484.851276][ T6703] device bridge_slave_1 left promiscuous mode [ 484.857259][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 484.904412][ T6703] device bridge_slave_0 left promiscuous mode [ 484.941486][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 484.967575][ T6703] device veth0_vlan left promiscuous mode [ 485.521068][T18593] device veth0_vlan left promiscuous mode [ 485.533884][T18593] device veth0_vlan entered promiscuous mode [ 485.711656][T18587] device syzkaller0 entered promiscuous mode [ 486.720810][T18634] device veth1_macvtap left promiscuous mode [ 487.000741][T18636] device syzkaller0 entered promiscuous mode [ 488.098861][ T24] audit: type=1400 audit(1723640273.080:176): avc: denied { create } for pid=18704 comm="syz.2.6136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 488.537232][T18732] device syzkaller0 entered promiscuous mode [ 488.858594][T18755] FAULT_INJECTION: forcing a failure. [ 488.858594][T18755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 488.871746][T18755] CPU: 1 PID: 18755 Comm: syz.3.6154 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 488.882922][T18755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 488.892812][T18755] Call Trace: [ 488.895962][T18755] dump_stack_lvl+0x1e2/0x24b [ 488.900462][T18755] ? bfq_pos_tree_add_move+0x43b/0x43b [ 488.905753][T18755] ? 0xffffffffa0016000 [ 488.909749][T18755] ? is_bpf_text_address+0x172/0x190 [ 488.914866][T18755] dump_stack+0x15/0x17 [ 488.918852][T18755] should_fail+0x3c6/0x510 [ 488.923106][T18755] should_fail_usercopy+0x1a/0x20 [ 488.927967][T18755] _copy_from_user+0x20/0xd0 [ 488.932394][T18755] __se_sys_bpf+0x232/0x11cb0 [ 488.936919][T18755] ? stack_trace_save+0x113/0x1c0 [ 488.941782][T18755] ? terminate_walk+0x407/0x4f0 [ 488.946552][T18755] ? stack_trace_snprint+0xf0/0xf0 [ 488.951505][T18755] ? kmem_cache_free+0xa9/0x1e0 [ 488.956189][T18755] ? __kasan_check_write+0x14/0x20 [ 488.961135][T18755] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 488.966529][T18755] ? __x64_sys_bpf+0x90/0x90 [ 488.970955][T18755] ? _raw_spin_lock+0x1b0/0x1b0 [ 488.975728][T18755] ? do_sys_openat2+0x1fc/0x710 [ 488.980415][T18755] ? do_syscall_64+0x34/0x70 [ 488.984842][T18755] ? _kstrtoull+0x3a0/0x4a0 [ 488.989184][T18755] ? kstrtouint_from_user+0x20a/0x2a0 [ 488.994392][T18755] ? kstrtol_from_user+0x310/0x310 [ 488.999333][T18755] ? memset+0x35/0x40 [ 489.003156][T18755] ? __fsnotify_parent+0x4b9/0x6c0 [ 489.008109][T18755] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 489.014697][T18755] ? proc_fail_nth_write+0x20b/0x290 [ 489.019825][T18755] ? proc_fail_nth_read+0x210/0x210 [ 489.024857][T18755] ? security_file_permission+0x86/0xb0 [ 489.032405][T18755] ? rw_verify_area+0x1c3/0x360 [ 489.037114][T18755] ? preempt_count_add+0x92/0x1a0 [ 489.041961][T18755] ? vfs_write+0x852/0xe70 [ 489.046219][T18755] ? kmem_cache_free+0x1c0/0x1e0 [ 489.050985][T18755] ? kernel_write+0x3d0/0x3d0 [ 489.055492][T18755] ? __kasan_check_write+0x14/0x20 [ 489.060438][T18755] ? mutex_lock+0xa5/0x110 [ 489.064691][T18755] ? mutex_trylock+0xa0/0xa0 [ 489.069123][T18755] ? __kasan_check_write+0x14/0x20 [ 489.074133][T18755] ? fput_many+0x160/0x1b0 [ 489.078324][T18755] ? debug_smp_processor_id+0x17/0x20 [ 489.083531][T18755] __x64_sys_bpf+0x7b/0x90 [ 489.087782][T18755] do_syscall_64+0x34/0x70 [ 489.092034][T18755] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 489.097762][T18755] RIP: 0033:0x7fed8e4ab9f9 [ 489.102012][T18755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 489.121799][T18755] RSP: 002b:00007fed8d129038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 489.130043][T18755] RAX: ffffffffffffffda RBX: 00007fed8e647f80 RCX: 00007fed8e4ab9f9 [ 489.137855][T18755] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 489.145668][T18755] RBP: 00007fed8d129090 R08: 0000000000000000 R09: 0000000000000000 [ 489.153661][T18755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 489.161638][T18755] R13: 0000000000000000 R14: 00007fed8e647f80 R15: 00007ffd430aea98 [ 489.303296][T18757] device veth0_vlan left promiscuous mode [ 489.309185][T18757] device veth0_vlan entered promiscuous mode [ 489.371493][ T8771] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 489.400454][ T8771] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 489.435592][ T8771] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 489.731795][T18792] FAULT_INJECTION: forcing a failure. [ 489.731795][T18792] name failslab, interval 1, probability 0, space 0, times 0 [ 489.744407][T18792] CPU: 1 PID: 18792 Comm: syz.3.6167 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 489.755585][T18792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 489.765467][T18792] Call Trace: [ 489.768606][T18792] dump_stack_lvl+0x1e2/0x24b [ 489.773106][T18792] ? panic+0x812/0x812 [ 489.777016][T18792] ? bfq_pos_tree_add_move+0x43b/0x43b [ 489.782313][T18792] ? selinux_capable+0x2f1/0x430 [ 489.787081][T18792] ? selinux_capset+0xf0/0xf0 [ 489.791628][T18792] dump_stack+0x15/0x17 [ 489.795584][T18792] should_fail+0x3c6/0x510 [ 489.799840][T18792] ? bpf_map_area_alloc+0x4c/0xf0 [ 489.804702][T18792] __should_failslab+0xa4/0xe0 [ 489.809300][T18792] should_failslab+0x9/0x20 [ 489.813645][T18792] __kmalloc+0x60/0x330 [ 489.817651][T18792] bpf_map_area_alloc+0x4c/0xf0 [ 489.822321][T18792] array_map_alloc+0x319/0x7c0 [ 489.826921][T18792] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 489.832385][T18792] ? selinux_bpf+0xcb/0x100 [ 489.836727][T18792] ? array_map_alloc_check+0x27b/0x350 [ 489.842048][T18792] __se_sys_bpf+0x620f/0x11cb0 [ 489.846625][T18792] ? stack_trace_save+0x113/0x1c0 [ 489.851488][T18792] ? terminate_walk+0x407/0x4f0 [ 489.856198][T18792] ? stack_trace_snprint+0xf0/0xf0 [ 489.861123][T18792] ? kmem_cache_free+0xa9/0x1e0 [ 489.865805][T18792] ? kmem_cache_free+0xa9/0x1e0 [ 489.870490][T18792] ? kasan_set_track+0x5d/0x70 [ 489.875085][T18792] ? __x64_sys_bpf+0x90/0x90 [ 489.879513][T18792] ? __kasan_slab_free+0x11/0x20 [ 489.884286][T18792] ? slab_free_freelist_hook+0xc0/0x190 [ 489.889669][T18792] ? kmem_cache_free+0xa9/0x1e0 [ 489.894439][T18792] ? putname+0xe7/0x140 [ 489.898434][T18792] ? do_sys_openat2+0x1fc/0x710 [ 489.903131][T18792] ? __x64_sys_openat+0x243/0x290 [ 489.908101][T18792] ? do_syscall_64+0x34/0x70 [ 489.912497][T18792] ? _kstrtoull+0x3a0/0x4a0 [ 489.916836][T18792] ? kstrtouint_from_user+0x20a/0x2a0 [ 489.922061][T18792] ? kstrtol_from_user+0x310/0x310 [ 489.927086][T18792] ? memset+0x35/0x40 [ 489.930907][T18792] ? __fsnotify_parent+0x4b9/0x6c0 [ 489.935851][T18792] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 489.942453][T18792] ? proc_fail_nth_write+0x20b/0x290 [ 489.947565][T18792] ? proc_fail_nth_read+0x210/0x210 [ 489.952601][T18792] ? security_file_permission+0x86/0xb0 [ 489.957976][T18792] ? rw_verify_area+0x1c3/0x360 [ 489.962769][T18792] ? preempt_count_add+0x92/0x1a0 [ 489.967627][T18792] ? vfs_write+0x852/0xe70 [ 489.972045][T18792] ? kmem_cache_free+0xa9/0x1e0 [ 489.976724][T18792] ? kernel_write+0x3d0/0x3d0 [ 489.981236][T18792] ? __kasan_check_write+0x14/0x20 [ 489.986184][T18792] ? mutex_lock+0xa5/0x110 [ 489.990449][T18792] ? mutex_trylock+0xa0/0xa0 [ 489.994866][T18792] ? __kasan_check_write+0x14/0x20 [ 489.999811][T18792] ? fput_many+0x160/0x1b0 [ 490.004068][T18792] ? debug_smp_processor_id+0x17/0x20 [ 490.009272][T18792] __x64_sys_bpf+0x7b/0x90 [ 490.013546][T18792] do_syscall_64+0x34/0x70 [ 490.017774][T18792] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 490.023502][T18792] RIP: 0033:0x7fed8e4ab9f9 [ 490.027756][T18792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 490.047371][T18792] RSP: 002b:00007fed8d129038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 490.055699][T18792] RAX: ffffffffffffffda RBX: 00007fed8e647f80 RCX: 00007fed8e4ab9f9 [ 490.063600][T18792] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 490.071412][T18792] RBP: 00007fed8d129090 R08: 0000000000000000 R09: 0000000000000000 [ 490.079229][T18792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.087035][T18792] R13: 0000000000000000 R14: 00007fed8e647f80 R15: 00007ffd430aea98 [ 490.420068][T18802] device syzkaller0 entered promiscuous mode [ 490.907049][T18828] FAULT_INJECTION: forcing a failure. [ 490.907049][T18828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 490.920317][T18828] CPU: 0 PID: 18828 Comm: syz.3.6180 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 490.931493][T18828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 490.941384][T18828] Call Trace: [ 490.944594][T18828] dump_stack_lvl+0x1e2/0x24b [ 490.949035][T18828] ? bfq_pos_tree_add_move+0x43b/0x43b [ 490.954506][T18828] dump_stack+0x15/0x17 [ 490.958762][T18828] should_fail+0x3c6/0x510 [ 490.963015][T18828] should_fail_usercopy+0x1a/0x20 [ 490.967876][T18828] _copy_to_user+0x20/0x90 [ 490.972133][T18828] simple_read_from_buffer+0xc7/0x150 [ 490.977333][T18828] proc_fail_nth_read+0x1a3/0x210 [ 490.982198][T18828] ? proc_fault_inject_write+0x390/0x390 [ 490.987666][T18828] ? security_file_permission+0x86/0xb0 [ 490.993042][T18828] ? rw_verify_area+0x1c3/0x360 [ 490.997817][T18828] ? proc_fault_inject_write+0x390/0x390 [ 491.003282][T18828] vfs_read+0x200/0xba0 [ 491.007276][T18828] ? kernel_read+0x70/0x70 [ 491.011529][T18828] ? __kasan_check_write+0x14/0x20 [ 491.016478][T18828] ? mutex_lock+0xa5/0x110 [ 491.020728][T18828] ? mutex_trylock+0xa0/0xa0 [ 491.025332][T18828] ? __fdget_pos+0x2e7/0x3a0 [ 491.029755][T18828] ? ksys_read+0x77/0x2c0 [ 491.033929][T18828] ksys_read+0x199/0x2c0 [ 491.038001][T18828] ? vfs_write+0xe70/0xe70 [ 491.042355][T18828] ? fpu__clear_all+0x20/0x20 [ 491.046857][T18828] ? __kasan_check_read+0x11/0x20 [ 491.051712][T18828] __x64_sys_read+0x7b/0x90 [ 491.056056][T18828] do_syscall_64+0x34/0x70 [ 491.060307][T18828] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 491.066032][T18828] RIP: 0033:0x7fed8e4aa43c [ 491.070290][T18828] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 491.089737][T18828] RSP: 002b:00007fed8d129030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 491.097977][T18828] RAX: ffffffffffffffda RBX: 00007fed8e647f80 RCX: 00007fed8e4aa43c [ 491.105783][T18828] RDX: 000000000000000f RSI: 00007fed8d1290a0 RDI: 0000000000000006 [ 491.113697][T18828] RBP: 00007fed8d129090 R08: 0000000000000000 R09: 0000000000000000 [ 491.121576][T18828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 491.129391][T18828] R13: 0000000000000000 R14: 00007fed8e647f80 R15: 00007ffd430aea98 [ 492.170126][T18875] device syzkaller0 entered promiscuous mode [ 492.350990][T18888] device syzkaller0 entered promiscuous mode [ 494.331524][T19015] syz.3.6233[19015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 494.331587][T19015] syz.3.6233[19015] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 495.721577][T19100] device pim6reg1 entered promiscuous mode [ 495.788536][T19109] device syzkaller0 entered promiscuous mode [ 495.803864][T19083] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.816682][T19083] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.830364][T19083] device bridge_slave_0 entered promiscuous mode [ 495.875141][T19083] bridge0: port 2(bridge_slave_1) entered blocking state [ 495.904864][T19083] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.933726][T19083] device bridge_slave_1 entered promiscuous mode [ 496.088254][T19131] device syzkaller0 entered promiscuous mode [ 496.165428][T19083] bridge0: port 2(bridge_slave_1) entered blocking state [ 496.172313][T19083] bridge0: port 2(bridge_slave_1) entered forwarding state [ 496.179433][T19083] bridge0: port 1(bridge_slave_0) entered blocking state [ 496.186206][T19083] bridge0: port 1(bridge_slave_0) entered forwarding state [ 496.379615][T19149] FAULT_INJECTION: forcing a failure. [ 496.379615][T19149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 496.383639][ T428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 496.404910][ T428] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.405070][T19157] FAULT_INJECTION: forcing a failure. [ 496.405070][T19157] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 496.412330][T19149] CPU: 1 PID: 19149 Comm: syz.1.6275 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 496.436053][T19149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 496.446031][T19149] Call Trace: [ 496.449164][T19149] dump_stack_lvl+0x1e2/0x24b [ 496.453681][T19149] ? bfq_pos_tree_add_move+0x43b/0x43b [ 496.459056][T19149] ? __check_object_size+0x73/0x3c0 [ 496.464087][T19149] dump_stack+0x15/0x17 [ 496.468080][T19149] should_fail+0x3c6/0x510 [ 496.472332][T19149] should_fail_usercopy+0x1a/0x20 [ 496.477190][T19149] _copy_from_user+0x20/0xd0 [ 496.481617][T19149] __se_sys_bpf+0x232/0x11cb0 [ 496.486131][T19149] ? perf_event_output_forward+0x14e/0x1b0 [ 496.491859][T19149] ? perf_prepare_sample+0x1af0/0x1af0 [ 496.497154][T19149] ? __x64_sys_bpf+0x90/0x90 [ 496.501583][T19149] ? __this_cpu_preempt_check+0x13/0x20 [ 496.506962][T19149] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 496.513036][T19149] ? hrtimer_forward+0x1a6/0x2c0 [ 496.517824][T19149] ? perf_swevent_hrtimer+0x4b8/0x560 [ 496.523020][T19149] ? irq_exit_rcu+0x9/0x10 [ 496.527357][T19149] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 496.533011][T19149] ? cpu_clock_event_read+0x50/0x50 [ 496.538124][T19149] ? timerqueue_add+0x24c/0x270 [ 496.542805][T19149] ? enqueue_hrtimer+0xad/0x200 [ 496.547498][T19149] ? __hrtimer_run_queues+0x438/0xa50 [ 496.552700][T19149] ? __hrtimer_run_queues+0x9ea/0xa50 [ 496.557917][T19149] ? ktime_get+0x10e/0x140 [ 496.562164][T19149] ? lapic_next_event+0x5f/0x70 [ 496.566847][T19149] ? clockevents_program_event+0x214/0x2c0 [ 496.572500][T19149] ? hrtimer_interrupt+0x6a8/0x8b0 [ 496.577442][T19149] ? debug_smp_processor_id+0x17/0x20 [ 496.582644][T19149] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 496.588544][T19149] __x64_sys_bpf+0x7b/0x90 [ 496.592814][T19149] do_syscall_64+0x34/0x70 [ 496.597056][T19149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 496.602865][T19149] RIP: 0033:0x7f1e3c0089f9 [ 496.607123][T19149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.626558][T19149] RSP: 002b:00007f1e3ac86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 496.634803][T19149] RAX: ffffffffffffffda RBX: 00007f1e3c1a4f80 RCX: 00007f1e3c0089f9 [ 496.642745][T19149] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000005 [ 496.650538][T19149] RBP: 00007f1e3ac86090 R08: 0000000000000000 R09: 0000000000000000 [ 496.658433][T19149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 496.666331][T19149] R13: 0000000000000000 R14: 00007f1e3c1a4f80 R15: 00007fff1b6a8b88 [ 496.678546][T19157] CPU: 0 PID: 19157 Comm: syz.4.6279 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 496.688968][ T428] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.689848][T19157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 496.689854][T19157] Call Trace: [ 496.689884][T19157] dump_stack_lvl+0x1e2/0x24b [ 496.714697][T19157] ? bfq_pos_tree_add_move+0x43b/0x43b [ 496.719994][T19157] ? kmem_cache_free+0xa9/0x1e0 [ 496.724667][T19157] dump_stack+0x15/0x17 [ 496.728831][T19157] should_fail+0x3c6/0x510 [ 496.733179][T19157] should_fail_alloc_page+0x52/0x60 [ 496.738210][T19157] __alloc_pages_nodemask+0x1b3/0xaf0 [ 496.743413][T19157] ? _kstrtoull+0x3a0/0x4a0 [ 496.747759][T19157] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 496.753136][T19157] ? memset+0x35/0x40 [ 496.756956][T19157] ? selinux_file_permission+0x2bb/0x560 [ 496.762436][T19157] __get_free_pages+0xe/0x30 [ 496.766927][T19157] mem_rw+0x8a/0x3c0 [ 496.770657][T19157] mem_write+0x33/0x40 [ 496.774557][T19157] ? mem_read+0x40/0x40 [ 496.778554][T19157] vfs_write+0x36a/0xe70 [ 496.782634][T19157] ? kmem_cache_free+0xa9/0x1e0 [ 496.787321][T19157] ? kernel_write+0x3d0/0x3d0 [ 496.791837][T19157] ? __kasan_check_write+0x14/0x20 [ 496.796780][T19157] ? mutex_lock+0xa5/0x110 [ 496.801032][T19157] ? mutex_trylock+0xa0/0xa0 [ 496.805473][T19157] ? __fdget_pos+0x2e7/0x3a0 [ 496.809969][T19157] ? ksys_write+0x77/0x2c0 [ 496.814224][T19157] ksys_write+0x199/0x2c0 [ 496.818391][T19157] ? __ia32_sys_read+0x90/0x90 [ 496.823032][T19157] ? debug_smp_processor_id+0x17/0x20 [ 496.828209][T19157] __x64_sys_write+0x7b/0x90 [ 496.832626][T19157] do_syscall_64+0x34/0x70 [ 496.836884][T19157] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 496.842604][T19157] RIP: 0033:0x7fefec6e99f9 [ 496.846864][T19157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.866397][T19157] RSP: 002b:00007fefeb367038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 496.874630][T19157] RAX: ffffffffffffffda RBX: 00007fefec885f80 RCX: 00007fefec6e99f9 [ 496.882441][T19157] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 496.890252][T19157] RBP: 00007fefeb367090 R08: 0000000000000000 R09: 0000000000000000 [ 496.898088][T19157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 496.905904][T19157] R13: 0000000000000000 R14: 00007fefec885f80 R15: 00007ffcbb989e28 [ 496.930180][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 496.938529][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 496.956268][T10444] bridge0: port 1(bridge_slave_0) entered blocking state [ 496.963155][T10444] bridge0: port 1(bridge_slave_0) entered forwarding state [ 496.971153][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 496.994698][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 497.003532][T10444] bridge0: port 2(bridge_slave_1) entered blocking state [ 497.010424][T10444] bridge0: port 2(bridge_slave_1) entered forwarding state [ 497.045236][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 497.053287][T10444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 497.163955][ T428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 497.174744][ T428] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 497.187525][ T428] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 497.260639][ T428] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 497.273588][T19083] device veth0_vlan entered promiscuous mode [ 497.352765][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 497.360607][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 497.425566][ T428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 497.435044][ T428] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 497.470927][T19083] device veth1_macvtap entered promiscuous mode [ 497.528488][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 497.541625][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 497.554344][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 497.593008][T10445] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 497.606303][T10445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 497.738366][T19196] FAULT_INJECTION: forcing a failure. [ 497.738366][T19196] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 497.746346][ T710] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 497.786140][T19196] CPU: 0 PID: 19196 Comm: syz.2.6291 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 497.797328][T19196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 497.807214][T19196] Call Trace: [ 497.810354][T19196] dump_stack_lvl+0x1e2/0x24b [ 497.814856][T19196] ? bfq_pos_tree_add_move+0x43b/0x43b [ 497.820156][T19196] dump_stack+0x15/0x17 [ 497.824141][T19196] should_fail+0x3c6/0x510 [ 497.828400][T19196] should_fail_usercopy+0x1a/0x20 [ 497.833283][T19196] _copy_to_user+0x20/0x90 [ 497.837516][T19196] simple_read_from_buffer+0xc7/0x150 [ 497.842733][T19196] proc_fail_nth_read+0x1a3/0x210 [ 497.847580][T19196] ? proc_fault_inject_write+0x390/0x390 [ 497.853047][T19196] ? security_file_permission+0x86/0xb0 [ 497.858433][T19196] ? rw_verify_area+0x1c3/0x360 [ 497.863200][T19196] ? proc_fault_inject_write+0x390/0x390 [ 497.868686][T19196] vfs_read+0x200/0xba0 [ 497.872667][T19196] ? kernel_read+0x70/0x70 [ 497.876917][T19196] ? __kasan_check_write+0x14/0x20 [ 497.881862][T19196] ? mutex_lock+0xa5/0x110 [ 497.886117][T19196] ? mutex_trylock+0xa0/0xa0 [ 497.890551][T19196] ? __fdget_pos+0x2e7/0x3a0 [ 497.894968][T19196] ? ksys_read+0x77/0x2c0 [ 497.899135][T19196] ksys_read+0x199/0x2c0 [ 497.903216][T19196] ? vfs_write+0xe70/0xe70 [ 497.907476][T19196] ? debug_smp_processor_id+0x17/0x20 [ 497.912676][T19196] __x64_sys_read+0x7b/0x90 [ 497.917012][T19196] do_syscall_64+0x34/0x70 [ 497.921289][T19196] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 497.927012][T19196] RIP: 0033:0x7f7fd1ebf43c [ 497.931266][T19196] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 497.950795][T19196] RSP: 002b:00007f7fd0b3e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 497.959018][T19196] RAX: ffffffffffffffda RBX: 00007f7fd205cf80 RCX: 00007f7fd1ebf43c [ 497.966932][T19196] RDX: 000000000000000f RSI: 00007f7fd0b3e0a0 RDI: 0000000000000007 [ 497.974728][T19196] RBP: 00007f7fd0b3e090 R08: 0000000000000000 R09: 0000000000000000 [ 497.982537][T19196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 497.990355][T19196] R13: 0000000000000000 R14: 00007f7fd205cf80 R15: 00007ffe0f632d68 [ 497.998662][ T710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 498.206140][T19202] device wg2 entered promiscuous mode [ 498.854475][T19232] FAULT_INJECTION: forcing a failure. [ 498.854475][T19232] name failslab, interval 1, probability 0, space 0, times 0 [ 498.955167][T19232] CPU: 0 PID: 19232 Comm: syz.2.6304 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 498.966371][T19232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 498.976264][T19232] Call Trace: [ 498.979389][T19232] dump_stack_lvl+0x1e2/0x24b [ 498.983907][T19232] ? panic+0x812/0x812 [ 498.987808][T19232] ? bfq_pos_tree_add_move+0x43b/0x43b [ 498.993098][T19232] ? avc_lookup+0x9d/0x2f0 [ 498.997345][T19232] ? avc_has_perm_noaudit+0x117/0x240 [ 499.002643][T19232] dump_stack+0x15/0x17 [ 499.006646][T19232] should_fail+0x3c6/0x510 [ 499.010897][T19232] ? __get_vm_area_node+0x116/0x470 [ 499.015927][T19232] __should_failslab+0xa4/0xe0 [ 499.020523][T19232] should_failslab+0x9/0x20 [ 499.024866][T19232] kmem_cache_alloc_trace+0x3a/0x2e0 [ 499.029985][T19232] __get_vm_area_node+0x116/0x470 [ 499.034855][T19232] __vmalloc_node_range+0xdc/0x7c0 [ 499.039790][T19232] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 499.045172][T19232] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 499.051161][T19232] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 499.056537][T19232] __vmalloc+0x7a/0x90 [ 499.060445][T19232] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 499.065836][T19232] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 499.071036][T19232] bpf_prog_alloc+0x21/0x1e0 [ 499.075462][T19232] __se_sys_bpf+0x9856/0x11cb0 [ 499.080065][T19232] ? perf_prepare_sample+0x1af0/0x1af0 [ 499.085351][T19232] ? sched_clock+0x3a/0x40 [ 499.089700][T19232] ? sched_clock_cpu+0x1b/0x3b0 [ 499.095115][T19232] ? __x64_sys_bpf+0x90/0x90 [ 499.099544][T19232] ? __this_cpu_preempt_check+0x13/0x20 [ 499.104924][T19232] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 499.111003][T19232] ? hrtimer_forward+0x1a6/0x2c0 [ 499.115776][T19232] ? cpu_clock_event_read+0x50/0x50 [ 499.120818][T19232] ? __fsnotify_parent+0x4b9/0x6c0 [ 499.125760][T19232] ? timerqueue_add+0x24c/0x270 [ 499.130444][T19232] ? enqueue_hrtimer+0xad/0x200 [ 499.135135][T19232] ? __hrtimer_run_queues+0x438/0xa50 [ 499.140336][T19232] ? __hrtimer_run_queues+0x9ea/0xa50 [ 499.145716][T19232] ? ktime_get+0x10e/0x140 [ 499.149970][T19232] ? lapic_next_event+0x5f/0x70 [ 499.154659][T19232] ? clockevents_program_event+0x214/0x2c0 [ 499.160302][T19232] ? hrtimer_interrupt+0x6a8/0x8b0 [ 499.165252][T19232] ? debug_smp_processor_id+0x17/0x20 [ 499.170465][T19232] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 499.176354][T19232] __x64_sys_bpf+0x7b/0x90 [ 499.180614][T19232] do_syscall_64+0x34/0x70 [ 499.184892][T19232] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 499.190588][T19232] RIP: 0033:0x7f7fd1ec09f9 [ 499.194843][T19232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.214281][T19232] RSP: 002b:00007f7fd0b3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 499.222523][T19232] RAX: ffffffffffffffda RBX: 00007f7fd205cf80 RCX: 00007f7fd1ec09f9 [ 499.230334][T19232] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000005 [ 499.238148][T19232] RBP: 00007f7fd0b3e090 R08: 0000000000000000 R09: 0000000000000000 [ 499.245958][T19232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 499.254202][T19232] R13: 0000000000000000 R14: 00007f7fd205cf80 R15: 00007ffe0f632d68 [ 499.359973][T19232] syz.2.6304: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 499.470763][T19232] CPU: 1 PID: 19232 Comm: syz.2.6304 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 499.481967][T19232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 499.492325][T19232] Call Trace: [ 499.495448][T19232] dump_stack_lvl+0x1e2/0x24b [ 499.499960][T19232] ? wake_up_klogd+0xb8/0xf0 [ 499.504385][T19232] ? bfq_pos_tree_add_move+0x43b/0x43b [ 499.509680][T19232] ? pr_cont_kernfs_name+0xf0/0x100 [ 499.514711][T19232] dump_stack+0x15/0x17 [ 499.518707][T19232] warn_alloc+0x21a/0x390 [ 499.522967][T19232] ? __get_vm_area_node+0x116/0x470 [ 499.528009][T19232] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 499.533383][T19232] ? __kasan_kmalloc+0x9/0x10 [ 499.537898][T19232] ? __get_vm_area_node+0x34b/0x470 [ 499.542931][T19232] __vmalloc_node_range+0x287/0x7c0 [ 499.547969][T19232] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 499.553956][T19232] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 499.559332][T19232] __vmalloc+0x7a/0x90 [ 499.563245][T19232] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 499.568626][T19232] bpf_prog_alloc_no_stats+0x39/0x2a0 [ 499.573826][T19232] bpf_prog_alloc+0x21/0x1e0 [ 499.578264][T19232] __se_sys_bpf+0x9856/0x11cb0 [ 499.582864][T19232] ? perf_prepare_sample+0x1af0/0x1af0 [ 499.588151][T19232] ? sched_clock+0x3a/0x40 [ 499.592408][T19232] ? sched_clock_cpu+0x1b/0x3b0 [ 499.597179][T19232] ? __x64_sys_bpf+0x90/0x90 [ 499.601606][T19232] ? __this_cpu_preempt_check+0x13/0x20 [ 499.607077][T19232] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 499.613161][T19232] ? hrtimer_forward+0x1a6/0x2c0 [ 499.617922][T19232] ? cpu_clock_event_read+0x50/0x50 [ 499.622954][T19232] ? __fsnotify_parent+0x4b9/0x6c0 [ 499.627995][T19232] ? timerqueue_add+0x24c/0x270 [ 499.632679][T19232] ? enqueue_hrtimer+0xad/0x200 [ 499.637359][T19232] ? __hrtimer_run_queues+0x438/0xa50 [ 499.642754][T19232] ? __hrtimer_run_queues+0x9ea/0xa50 [ 499.647954][T19232] ? ktime_get+0x10e/0x140 [ 499.652202][T19232] ? lapic_next_event+0x5f/0x70 [ 499.656880][T19232] ? clockevents_program_event+0x214/0x2c0 [ 499.662537][T19232] ? hrtimer_interrupt+0x6a8/0x8b0 [ 499.667570][T19232] ? debug_smp_processor_id+0x17/0x20 [ 499.672807][T19232] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 499.678664][T19232] __x64_sys_bpf+0x7b/0x90 [ 499.682925][T19232] do_syscall_64+0x34/0x70 [ 499.687176][T19232] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 499.692915][T19232] RIP: 0033:0x7f7fd1ec09f9 [ 499.697295][T19232] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 499.716769][T19232] RSP: 002b:00007f7fd0b3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 499.725012][T19232] RAX: ffffffffffffffda RBX: 00007f7fd205cf80 RCX: 00007f7fd1ec09f9 [ 499.732905][T19232] RDX: 0000000000000080 RSI: 0000000020000040 RDI: 0000000000000005 [ 499.740739][T19232] RBP: 00007f7fd0b3e090 R08: 0000000000000000 R09: 0000000000000000 [ 499.748528][T19232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 499.756348][T19232] R13: 0000000000000000 R14: 00007f7fd205cf80 R15: 00007ffe0f632d68 [ 499.780134][T19232] Mem-Info: [ 499.783453][T19232] active_anon:102 inactive_anon:11005 isolated_anon:0 [ 499.783453][T19232] active_file:23457 inactive_file:2873 isolated_file:0 [ 499.783453][T19232] unevictable:0 dirty:381 writeback:0 [ 499.783453][T19232] slab_reclaimable:7208 slab_unreclaimable:81138 [ 499.783453][T19232] mapped:32012 shmem:158 pagetables:585 bounce:0 [ 499.783453][T19232] free:1548992 free_pcp:918 free_cma:0 [ 499.852825][T19232] Node 0 active_anon:420kB inactive_anon:43888kB active_file:93832kB inactive_file:11492kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:127984kB dirty:1524kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:8416kB all_unreclaimable? no [ 499.883069][ T7] device bridge_slave_1 left promiscuous mode [ 499.889044][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 500.029984][ T7] device bridge_slave_0 left promiscuous mode [ 500.096717][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 500.149808][T19232] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984772kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1420kB local_pcp:1420kB free_cma:0kB [ 500.179422][ T7] device veth0_vlan left promiscuous mode [ 500.252945][T19232] lowmem_reserve[]: 0 3941 3941 [ 500.299757][T19232] Normal free:3209224kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:420kB inactive_anon:46492kB active_file:93832kB inactive_file:11492kB unevictable:0kB writepending:1524kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:2440kB bounce:0kB free_pcp:1160kB local_pcp:128kB free_cma:0kB [ 500.376068][T19266] device sit0 entered promiscuous mode [ 500.442647][T19232] lowmem_reserve[]: 0 0 0 [ 500.449897][T19232] DMA32: 6*4kB (UM) 2*8kB (M) 3*16kB (M) 5*32kB (UM) 7*64kB (UM) 6*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 500.474368][T19232] Normal: 86*4kB (UE) 94*8kB (UE) 30*16kB (UE) 786*32kB (UME) 382*64kB (UME) 108*128kB (UME) 77*256kB (UME) 33*512kB (UME) 16*1024kB (UME) 12*2048kB (ME) 745*4096kB (UM) = 3194088kB [ 500.492551][T19232] 30568 total pagecache pages [ 500.497046][T19232] 0 pages in swap cache [ 500.501332][T19232] Swap cache stats: add 0, delete 0, find 0/0 [ 500.508730][T19232] Free swap = 124996kB [ 500.512821][T19232] Total swap = 124996kB [ 500.518977][T19232] 2097051 pages RAM [ 500.527286][T19232] 0 pages HighMem/MovableOnly [ 500.531799][T19232] 341894 pages reserved [ 500.535766][T19232] 0 pages cma reserved [ 501.320422][T19304] syz.2.6321[19304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.320483][T19304] syz.2.6321[19304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.337842][T19305] syz.2.6321[19305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.570376][T19305] syz.2.6321[19305] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 501.682600][T19311] device syzkaller0 entered promiscuous mode [ 501.920360][ T24] audit: type=1400 audit(1723640286.910:177): avc: denied { create } for pid=19321 comm="syz.1.6326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 502.694158][T19341] device veth1_macvtap left promiscuous mode [ 503.951123][T19375] syz.0.6344[19375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 503.951186][T19375] syz.0.6344[19375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.066428][T19375] syz.0.6344[19375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.118130][T19375] syz.0.6344[19375] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.165554][T19405] device pim6reg1 entered promiscuous mode [ 507.249145][T19556] device syzkaller0 entered promiscuous mode [ 507.545490][T19580] device wg2 left promiscuous mode [ 509.115857][T19668] cgroup: fork rejected by pids controller in /syz0 [ 509.852876][T19695] bridge0: port 1(bridge_slave_0) entered blocking state [ 509.860819][T19695] bridge0: port 1(bridge_slave_0) entered disabled state [ 509.868281][T19695] device bridge_slave_0 entered promiscuous mode [ 509.879453][T19695] bridge0: port 2(bridge_slave_1) entered blocking state [ 509.897464][T19695] bridge0: port 2(bridge_slave_1) entered disabled state [ 509.911806][T19695] device bridge_slave_1 entered promiscuous mode [ 510.297403][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 510.306085][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 510.313967][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 510.322475][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 510.331541][T15789] bridge0: port 1(bridge_slave_0) entered blocking state [ 510.338688][T15789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 510.381574][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 510.389222][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 510.397553][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 510.406330][T15789] bridge0: port 2(bridge_slave_1) entered blocking state [ 510.413191][T15789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 510.451105][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 510.458895][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 510.551688][ T8766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 510.563655][T19695] device veth0_vlan entered promiscuous mode [ 510.592438][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 510.665252][T19744] ref_ctr_offset mismatch. inode: 0x676 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 510.739664][ T8766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 510.748354][ T8766] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 510.770160][T19746] device pim6reg1 entered promiscuous mode [ 510.821653][T19695] device veth1_macvtap entered promiscuous mode [ 510.842970][ T8766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 510.865072][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 510.877185][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 510.900197][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 511.061693][ T110] device bridge_slave_1 left promiscuous mode [ 511.067669][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 511.168818][ T110] device bridge_slave_0 left promiscuous mode [ 511.178174][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 511.596165][T19778] device syzkaller0 entered promiscuous mode [ 513.159217][T19832] device sit0 entered promiscuous mode [ 513.919234][T19862] device syzkaller0 entered promiscuous mode [ 514.023948][T19858] device wg2 left promiscuous mode [ 515.867548][T20022] syz.0.6531[20022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.867610][T20022] syz.0.6531[20022] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 516.112204][T20037] bridge0: port 2(bridge_slave_1) entered disabled state [ 516.130683][T20037] bridge0: port 1(bridge_slave_0) entered disabled state [ 516.467853][T20062] device sit0 entered promiscuous mode [ 517.302006][T20107] syz.3.6559[20107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.302067][T20107] syz.3.6559[20107] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 517.868133][T20130] device syzkaller0 entered promiscuous mode [ 519.030020][T20173] device pim6reg1 entered promiscuous mode [ 519.111916][T20171] device team_slave_0 entered promiscuous mode [ 519.138011][ T8758] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 519.151836][ T8758] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 519.432609][T20197] syz.2.6590[20197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 519.432671][T20197] syz.2.6590[20197] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 522.524422][T20311] device syzkaller0 entered promiscuous mode [ 522.596314][T20302] device syzkaller0 entered promiscuous mode [ 525.110940][T20449] device pim6reg1 entered promiscuous mode [ 526.852036][T20526] syz.0.6690[20526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 526.852099][T20526] syz.0.6690[20526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 527.753998][T20559] device veth1_macvtap left promiscuous mode [ 527.873049][T20570] device syzkaller0 entered promiscuous mode [ 528.284790][T20601] device sit0 left promiscuous mode [ 528.582531][T20606] device pim6reg1 entered promiscuous mode [ 530.639149][T20707] device syzkaller0 entered promiscuous mode [ 531.147484][T20733] bridge0: port 3(veth0_to_batadv) entered blocking state [ 531.180383][T20733] bridge0: port 3(veth0_to_batadv) entered disabled state [ 531.212908][T20733] device veth0_to_batadv entered promiscuous mode [ 531.274038][T20741] device veth0_to_batadv left promiscuous mode [ 531.292283][T20741] bridge0: port 3(veth0_to_batadv) entered disabled state [ 531.519214][T20761] device syzkaller0 entered promiscuous mode [ 531.984323][T20813] device syzkaller0 entered promiscuous mode [ 532.790476][T20842] device pim6reg1 entered promiscuous mode [ 534.735964][T20986] syz.4.6846[20986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.736019][T20986] syz.4.6846[20986] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.881745][T20997] syz.3.6849[20997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 534.989595][T20997] syz.3.6849[20997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.851382][T21048] syz.1.6863[21048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 535.980924][T21048] syz.1.6863[21048] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 537.893626][T21124] bridge0: port 3(veth0_to_batadv) entered blocking state [ 537.956076][T21124] bridge0: port 3(veth0_to_batadv) entered disabled state [ 538.012374][T21124] device veth0_to_batadv entered promiscuous mode [ 538.083385][T21128] device veth0_to_batadv left promiscuous mode [ 538.095386][T21128] bridge0: port 3(veth0_to_batadv) entered disabled state [ 539.305759][T21188] bridge0: port 3(veth0_to_batadv) entered blocking state [ 539.315510][T21188] bridge0: port 3(veth0_to_batadv) entered disabled state [ 539.336402][T21188] device veth0_to_batadv entered promiscuous mode [ 539.346841][T21188] bridge0: port 3(veth0_to_batadv) entered blocking state [ 539.353879][T21188] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 539.411159][T21184] device veth0_to_batadv left promiscuous mode [ 539.473960][T21184] bridge0: port 3(veth0_to_batadv) entered disabled state [ 539.569525][T21199] device wg2 entered promiscuous mode [ 539.736874][T21205] syz.4.6911[21205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.736936][T21205] syz.4.6911[21205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.346012][T21242] device wg2 entered promiscuous mode [ 541.530868][T21254] syz.2.6930[21254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 541.530951][T21254] syz.2.6930[21254] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 546.295318][T21403] device sit0 entered promiscuous mode [ 547.658351][T21439] device syzkaller0 entered promiscuous mode [ 548.927229][T21498] device syzkaller0 entered promiscuous mode [ 550.244356][T21558] device syzkaller0 entered promiscuous mode [ 564.349881][T22045] device syzkaller0 entered promiscuous mode [ 565.193768][T22098] device sit0 left promiscuous mode [ 565.316023][T22096] device sit0 entered promiscuous mode [ 565.816134][T22135] device pim6reg1 entered promiscuous mode [ 568.573482][T22212] FAULT_INJECTION: forcing a failure. [ 568.573482][T22212] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 568.687362][T22212] CPU: 1 PID: 22212 Comm: syz.2.7247 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 568.698566][T22212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 568.708451][T22212] Call Trace: [ 568.711580][T22212] dump_stack_lvl+0x1e2/0x24b [ 568.716100][T22212] ? bfq_pos_tree_add_move+0x43b/0x43b [ 568.721375][T22212] ? 0xffffffffa0016000 [ 568.725371][T22212] ? is_bpf_text_address+0x172/0x190 [ 568.730585][T22212] dump_stack+0x15/0x17 [ 568.734573][T22212] should_fail+0x3c6/0x510 [ 568.738828][T22212] should_fail_usercopy+0x1a/0x20 [ 568.743693][T22212] _copy_from_user+0x20/0xd0 [ 568.748119][T22212] __se_sys_bpf+0x232/0x11cb0 [ 568.752634][T22212] ? stack_trace_save+0x113/0x1c0 [ 568.757489][T22212] ? terminate_walk+0x407/0x4f0 [ 568.762177][T22212] ? stack_trace_snprint+0xf0/0xf0 [ 568.767127][T22212] ? kmem_cache_free+0xa9/0x1e0 [ 568.771827][T22212] ? kmem_cache_free+0xa9/0x1e0 [ 568.776497][T22212] ? kasan_set_track+0x5d/0x70 [ 568.781098][T22212] ? __x64_sys_bpf+0x90/0x90 [ 568.785529][T22212] ? __kasan_slab_free+0x11/0x20 [ 568.790295][T22212] ? slab_free_freelist_hook+0xc0/0x190 [ 568.795684][T22212] ? kmem_cache_free+0xa9/0x1e0 [ 568.800362][T22212] ? putname+0xe7/0x140 [ 568.804364][T22212] ? do_sys_openat2+0x1fc/0x710 [ 568.809038][T22212] ? __x64_sys_openat+0x243/0x290 [ 568.813904][T22212] ? do_syscall_64+0x34/0x70 [ 568.818331][T22212] ? _kstrtoull+0x3a0/0x4a0 [ 568.822668][T22212] ? kstrtouint_from_user+0x20a/0x2a0 [ 568.827873][T22212] ? kstrtol_from_user+0x310/0x310 [ 568.832845][T22212] ? memset+0x35/0x40 [ 568.836670][T22212] ? __fsnotify_parent+0x4b9/0x6c0 [ 568.841603][T22212] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 568.848279][T22212] ? proc_fail_nth_write+0x20b/0x290 [ 568.853398][T22212] ? proc_fail_nth_read+0x210/0x210 [ 568.858432][T22212] ? security_file_permission+0x86/0xb0 [ 568.863819][T22212] ? rw_verify_area+0x1c3/0x360 [ 568.868498][T22212] ? preempt_count_add+0x92/0x1a0 [ 568.873357][T22212] ? vfs_write+0x852/0xe70 [ 568.877619][T22212] ? kmem_cache_free+0xa9/0x1e0 [ 568.882307][T22212] ? kernel_write+0x3d0/0x3d0 [ 568.887161][T22212] ? __kasan_check_write+0x14/0x20 [ 568.892213][T22212] ? mutex_lock+0xa5/0x110 [ 568.896475][T22212] ? mutex_trylock+0xa0/0xa0 [ 568.900881][T22212] ? __kasan_check_write+0x14/0x20 [ 568.905823][T22212] ? fput_many+0x160/0x1b0 [ 568.910086][T22212] ? debug_smp_processor_id+0x17/0x20 [ 568.915279][T22212] __x64_sys_bpf+0x7b/0x90 [ 568.919535][T22212] do_syscall_64+0x34/0x70 [ 568.923792][T22212] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 568.929511][T22212] RIP: 0033:0x7f7fd1ec09f9 [ 568.933769][T22212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 568.953217][T22212] RSP: 002b:00007f7fd0b3e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 568.961552][T22212] RAX: ffffffffffffffda RBX: 00007f7fd205cf80 RCX: 00007f7fd1ec09f9 [ 568.969441][T22212] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 568.977252][T22212] RBP: 00007f7fd0b3e090 R08: 0000000000000000 R09: 0000000000000000 [ 568.985065][T22212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 568.992965][T22212] R13: 0000000000000000 R14: 00007f7fd205cf80 R15: 00007ffe0f632d68 [ 570.766883][T22260] FAULT_INJECTION: forcing a failure. [ 570.766883][T22260] name failslab, interval 1, probability 0, space 0, times 0 [ 570.790487][T22260] CPU: 0 PID: 22260 Comm: syz.1.7264 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 570.801777][T22260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 570.811652][T22260] Call Trace: [ 570.814785][T22260] dump_stack_lvl+0x1e2/0x24b [ 570.819376][T22260] ? panic+0x812/0x812 [ 570.823287][T22260] ? bfq_pos_tree_add_move+0x43b/0x43b [ 570.828577][T22260] ? selinux_capable+0x2f1/0x430 [ 570.833380][T22260] ? selinux_capset+0xf0/0xf0 [ 570.837882][T22260] ? avc_has_perm+0x275/0x400 [ 570.842390][T22260] dump_stack+0x15/0x17 [ 570.846413][T22260] should_fail+0x3c6/0x510 [ 570.850630][T22260] ? htab_map_alloc+0x98/0x950 [ 570.855223][T22260] __should_failslab+0xa4/0xe0 [ 570.859913][T22260] should_failslab+0x9/0x20 [ 570.864250][T22260] kmem_cache_alloc_trace+0x3a/0x2e0 [ 570.869372][T22260] ? security_capable+0x87/0xb0 [ 570.874072][T22260] htab_map_alloc+0x98/0x950 [ 570.878497][T22260] ? htab_map_alloc_check+0x35f/0x460 [ 570.883785][T22260] __se_sys_bpf+0x620f/0x11cb0 [ 570.888382][T22260] ? stack_trace_save+0x113/0x1c0 [ 570.893242][T22260] ? terminate_walk+0x407/0x4f0 [ 570.897924][T22260] ? stack_trace_snprint+0xf0/0xf0 [ 570.902912][T22260] ? kmem_cache_free+0xa9/0x1e0 [ 570.907556][T22260] ? kmem_cache_free+0xa9/0x1e0 [ 570.912248][T22260] ? kasan_set_track+0x5d/0x70 [ 570.916844][T22260] ? __x64_sys_bpf+0x90/0x90 [ 570.921277][T22260] ? __kasan_slab_free+0x11/0x20 [ 570.926044][T22260] ? slab_free_freelist_hook+0xc0/0x190 [ 570.931434][T22260] ? kmem_cache_free+0xa9/0x1e0 [ 570.936114][T22260] ? putname+0xe7/0x140 [ 570.940107][T22260] ? do_sys_openat2+0x1fc/0x710 [ 570.944882][T22260] ? __x64_sys_openat+0x243/0x290 [ 570.949911][T22260] ? do_syscall_64+0x34/0x70 [ 570.954359][T22260] ? _kstrtoull+0x3a0/0x4a0 [ 570.958769][T22260] ? kstrtouint_from_user+0x20a/0x2a0 [ 570.964063][T22260] ? kstrtol_from_user+0x310/0x310 [ 570.969008][T22260] ? memset+0x35/0x40 [ 570.972837][T22260] ? __fsnotify_parent+0x4b9/0x6c0 [ 570.977862][T22260] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 570.984459][T22260] ? proc_fail_nth_write+0x20b/0x290 [ 570.989580][T22260] ? proc_fail_nth_read+0x210/0x210 [ 570.994614][T22260] ? security_file_permission+0x86/0xb0 [ 570.999994][T22260] ? rw_verify_area+0x1c3/0x360 [ 571.004683][T22260] ? preempt_count_add+0x92/0x1a0 [ 571.009538][T22260] ? vfs_write+0x852/0xe70 [ 571.013796][T22260] ? kmem_cache_free+0xa9/0x1e0 [ 571.018485][T22260] ? kernel_write+0x3d0/0x3d0 [ 571.023080][T22260] ? __kasan_check_write+0x14/0x20 [ 571.028028][T22260] ? mutex_lock+0xa5/0x110 [ 571.032281][T22260] ? mutex_trylock+0xa0/0xa0 [ 571.036706][T22260] ? __kasan_check_write+0x14/0x20 [ 571.041652][T22260] ? fput_many+0x160/0x1b0 [ 571.045913][T22260] ? debug_smp_processor_id+0x17/0x20 [ 571.051121][T22260] __x64_sys_bpf+0x7b/0x90 [ 571.055370][T22260] do_syscall_64+0x34/0x70 [ 571.059628][T22260] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 571.065347][T22260] RIP: 0033:0x7f1e3c0089f9 [ 571.069607][T22260] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 571.089224][T22260] RSP: 002b:00007f1e3ac86038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 571.097459][T22260] RAX: ffffffffffffffda RBX: 00007f1e3c1a4f80 RCX: 00007f1e3c0089f9 [ 571.105366][T22260] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 571.113247][T22260] RBP: 00007f1e3ac86090 R08: 0000000000000000 R09: 0000000000000000 [ 571.120989][T22260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 571.128795][T22260] R13: 0000000000000000 R14: 00007f1e3c1a4f80 R15: 00007fff1b6a8b88 [ 571.415785][T22268] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.426629][T22268] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.434459][T22268] device bridge_slave_0 entered promiscuous mode [ 571.492861][T22268] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.517455][T22268] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.556272][T22268] device bridge_slave_1 entered promiscuous mode [ 571.874225][T22305] FAULT_INJECTION: forcing a failure. [ 571.874225][T22305] name failslab, interval 1, probability 0, space 0, times 0 [ 571.951719][T22268] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.958604][T22268] bridge0: port 2(bridge_slave_1) entered forwarding state [ 571.965819][T22268] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.972766][T22268] bridge0: port 1(bridge_slave_0) entered forwarding state [ 571.999305][T22305] CPU: 1 PID: 22305 Comm: syz.3.7278 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 572.010496][T22305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 572.020385][T22305] Call Trace: [ 572.023517][T22305] dump_stack_lvl+0x1e2/0x24b [ 572.028032][T22305] ? bfq_pos_tree_add_move+0x43b/0x43b [ 572.033332][T22305] dump_stack+0x15/0x17 [ 572.037314][T22305] should_fail+0x3c6/0x510 [ 572.041573][T22305] ? bpf_map_area_alloc+0x4c/0xf0 [ 572.046431][T22305] __should_failslab+0xa4/0xe0 [ 572.051033][T22305] should_failslab+0x9/0x20 [ 572.055372][T22305] __kmalloc+0x60/0x330 [ 572.059362][T22305] bpf_map_area_alloc+0x4c/0xf0 [ 572.064049][T22305] htab_map_alloc+0x4c2/0x950 [ 572.068566][T22305] __se_sys_bpf+0x620f/0x11cb0 [ 572.073169][T22305] ? stack_trace_save+0x113/0x1c0 [ 572.078022][T22305] ? terminate_walk+0x407/0x4f0 [ 572.082717][T22305] ? stack_trace_snprint+0xf0/0xf0 [ 572.087664][T22305] ? kmem_cache_free+0xa9/0x1e0 [ 572.092348][T22305] ? kmem_cache_free+0xa9/0x1e0 [ 572.097028][T22305] ? kasan_set_track+0x5d/0x70 [ 572.101717][T22305] ? __x64_sys_bpf+0x90/0x90 [ 572.106153][T22305] ? __kasan_slab_free+0x11/0x20 [ 572.111001][T22305] ? slab_free_freelist_hook+0xc0/0x190 [ 572.116394][T22305] ? kmem_cache_free+0xa9/0x1e0 [ 572.121071][T22305] ? putname+0xe7/0x140 [ 572.125060][T22305] ? do_sys_openat2+0x1fc/0x710 [ 572.129748][T22305] ? __x64_sys_openat+0x243/0x290 [ 572.134609][T22305] ? do_syscall_64+0x34/0x70 [ 572.139042][T22305] ? _kstrtoull+0x3a0/0x4a0 [ 572.143381][T22305] ? kstrtouint_from_user+0x20a/0x2a0 [ 572.148584][T22305] ? kstrtol_from_user+0x310/0x310 [ 572.153541][T22305] ? memset+0x35/0x40 [ 572.157367][T22305] ? __fsnotify_parent+0x4b9/0x6c0 [ 572.162407][T22305] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 572.169067][T22305] ? proc_fail_nth_write+0x20b/0x290 [ 572.174188][T22305] ? proc_fail_nth_read+0x210/0x210 [ 572.179225][T22305] ? security_file_permission+0x86/0xb0 [ 572.184609][T22305] ? rw_verify_area+0x1c3/0x360 [ 572.189297][T22305] ? preempt_count_add+0x92/0x1a0 [ 572.194249][T22305] ? vfs_write+0x852/0xe70 [ 572.198594][T22305] ? kmem_cache_free+0xa9/0x1e0 [ 572.203274][T22305] ? kernel_write+0x3d0/0x3d0 [ 572.207791][T22305] ? __kasan_check_write+0x14/0x20 [ 572.212732][T22305] ? mutex_lock+0xa5/0x110 [ 572.216986][T22305] ? mutex_trylock+0xa0/0xa0 [ 572.221424][T22305] ? __kasan_check_write+0x14/0x20 [ 572.226355][T22305] ? fput_many+0x160/0x1b0 [ 572.230715][T22305] ? debug_smp_processor_id+0x17/0x20 [ 572.235902][T22305] __x64_sys_bpf+0x7b/0x90 [ 572.240153][T22305] do_syscall_64+0x34/0x70 [ 572.244408][T22305] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 572.250229][T22305] RIP: 0033:0x7f3c08d1b9f9 [ 572.254478][T22305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 572.273940][T22305] RSP: 002b:00007f3c07999038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 572.282336][T22305] RAX: ffffffffffffffda RBX: 00007f3c08eb7f80 RCX: 00007f3c08d1b9f9 [ 572.290144][T22305] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 572.298043][T22305] RBP: 00007f3c07999090 R08: 0000000000000000 R09: 0000000000000000 [ 572.305854][T22305] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 572.313750][T22305] R13: 0000000000000000 R14: 00007f3c08eb7f80 R15: 00007ffec84978b8 [ 572.338793][ T4815] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.346620][ T4815] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.395762][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 572.403884][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.505337][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 572.537536][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 572.546579][T15789] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.553460][T15789] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.560872][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 572.569230][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 572.577544][T15789] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.584465][T15789] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.591942][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 572.599989][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 572.607766][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 572.615691][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 572.636591][T22268] device veth0_vlan entered promiscuous mode [ 572.643887][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 572.653427][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 572.661906][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 572.670429][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 572.685345][T22268] device veth1_macvtap entered promiscuous mode [ 572.714285][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 572.721620][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 572.728955][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 572.738455][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 572.764562][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 572.781273][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 572.793621][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 572.802290][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 572.810698][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 573.450790][T22350] FAULT_INJECTION: forcing a failure. [ 573.450790][T22350] name failslab, interval 1, probability 0, space 0, times 0 [ 573.521674][ T110] device bridge_slave_1 left promiscuous mode [ 573.533009][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.584621][ T110] device bridge_slave_0 left promiscuous mode [ 573.634515][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.660380][T22350] CPU: 0 PID: 22350 Comm: syz.0.7292 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 573.671668][T22350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 573.681564][T22350] Call Trace: [ 573.684701][T22350] dump_stack_lvl+0x1e2/0x24b [ 573.689200][T22350] ? panic+0x812/0x812 [ 573.693109][T22350] ? bfq_pos_tree_add_move+0x43b/0x43b [ 573.698414][T22350] ? stack_trace_save+0x113/0x1c0 [ 573.703279][T22350] dump_stack+0x15/0x17 [ 573.707609][T22350] should_fail+0x3c6/0x510 [ 573.711863][T22350] ? __get_vm_area_node+0x116/0x470 [ 573.716900][T22350] __should_failslab+0xa4/0xe0 [ 573.722199][T22350] should_failslab+0x9/0x20 [ 573.726558][T22350] kmem_cache_alloc_trace+0x3a/0x2e0 [ 573.731654][T22350] __get_vm_area_node+0x116/0x470 [ 573.736519][T22350] __vmalloc_node_range+0xdc/0x7c0 [ 573.741472][T22350] ? prealloc_init+0x13b/0x7f0 [ 573.746060][T22350] ? get_random_u64+0x5b0/0x5b0 [ 573.750763][T22350] bpf_map_area_alloc+0xd9/0xf0 [ 573.755432][T22350] ? prealloc_init+0x13b/0x7f0 [ 573.760044][T22350] prealloc_init+0x13b/0x7f0 [ 573.764462][T22350] ? __kmalloc+0x1aa/0x330 [ 573.768724][T22350] htab_map_alloc+0x68d/0x950 [ 573.773333][T22350] __se_sys_bpf+0x620f/0x11cb0 [ 573.778006][T22350] ? stack_trace_save+0x113/0x1c0 [ 573.783295][T22350] ? terminate_walk+0x407/0x4f0 [ 573.787976][T22350] ? stack_trace_snprint+0xf0/0xf0 [ 573.792925][T22350] ? __kasan_check_write+0x14/0x20 [ 573.797870][T22350] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 573.803168][T22350] ? _raw_spin_lock+0x1b0/0x1b0 [ 573.807851][T22350] ? kasan_set_track+0x5d/0x70 [ 573.812453][T22350] ? __x64_sys_bpf+0x90/0x90 [ 573.816881][T22350] ? __kasan_slab_free+0x11/0x20 [ 573.821999][T22350] ? slab_free_freelist_hook+0xc0/0x190 [ 573.827379][T22350] ? kmem_cache_free+0xa9/0x1e0 [ 573.832065][T22350] ? putname+0xe7/0x140 [ 573.836054][T22350] ? do_sys_openat2+0x1fc/0x710 [ 573.840748][T22350] ? do_syscall_64+0x34/0x70 [ 573.845170][T22350] ? _kstrtoull+0x3a0/0x4a0 [ 573.849512][T22350] ? kstrtouint_from_user+0x20a/0x2a0 [ 573.854728][T22350] ? kstrtol_from_user+0x310/0x310 [ 573.859669][T22350] ? bpf_ringbuf_notify+0x30/0x30 [ 573.864529][T22350] ? memset+0x35/0x40 [ 573.868348][T22350] ? __fsnotify_parent+0x4b9/0x6c0 [ 573.873296][T22350] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 573.879887][T22350] ? proc_fail_nth_write+0x20b/0x290 [ 573.885035][T22350] ? proc_fail_nth_read+0x210/0x210 [ 573.890046][T22350] ? security_file_permission+0x86/0xb0 [ 573.895431][T22350] ? rw_verify_area+0x1c3/0x360 [ 573.900202][T22350] ? preempt_count_add+0x92/0x1a0 [ 573.905057][T22350] ? vfs_write+0x852/0xe70 [ 573.909320][T22350] ? kmem_cache_free+0x1c0/0x1e0 [ 573.914143][T22350] ? kernel_write+0x3d0/0x3d0 [ 573.918603][T22350] ? __kasan_check_write+0x14/0x20 [ 573.923549][T22350] ? mutex_lock+0xa5/0x110 [ 573.927799][T22350] ? mutex_trylock+0xa0/0xa0 [ 573.932234][T22350] ? __kasan_check_write+0x14/0x20 [ 573.937170][T22350] ? fput_many+0x160/0x1b0 [ 573.941439][T22350] ? debug_smp_processor_id+0x17/0x20 [ 573.946721][T22350] __x64_sys_bpf+0x7b/0x90 [ 573.951405][T22350] do_syscall_64+0x34/0x70 [ 573.955679][T22350] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 573.961482][T22350] RIP: 0033:0x7fbeaec919f9 [ 573.965778][T22350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.985262][T22350] RSP: 002b:00007fbead90f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 573.993500][T22350] RAX: ffffffffffffffda RBX: 00007fbeaee2df80 RCX: 00007fbeaec919f9 [ 574.001308][T22350] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 574.009120][T22350] RBP: 00007fbead90f090 R08: 0000000000000000 R09: 0000000000000000 [ 574.016931][T22350] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.024753][T22350] R13: 0000000000000000 R14: 00007fbeaee2df80 R15: 00007fff7c88f7a8 [ 574.135109][ T110] device veth0_vlan left promiscuous mode [ 574.666693][T22396] : renamed from ipvlan1 [ 574.686199][T22394] device veth0_vlan left promiscuous mode [ 574.705503][T22394] device veth0_vlan entered promiscuous mode [ 574.723801][T22399] FAULT_INJECTION: forcing a failure. [ 574.723801][T22399] name failslab, interval 1, probability 0, space 0, times 0 [ 574.734520][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 574.745070][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 574.770336][ T4815] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 574.789825][T22399] CPU: 0 PID: 22399 Comm: syz.3.7306 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 574.801014][T22399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 574.810905][T22399] Call Trace: [ 574.814046][T22399] dump_stack_lvl+0x1e2/0x24b [ 574.818570][T22399] ? bfq_pos_tree_add_move+0x43b/0x43b [ 574.823847][T22399] ? __get_vm_area_node+0x116/0x470 [ 574.828917][T22399] ? ____kasan_kmalloc+0xed/0x110 [ 574.833741][T22399] ? __kasan_kmalloc+0x9/0x10 [ 574.838255][T22399] dump_stack+0x15/0x17 [ 574.842245][T22399] should_fail+0x3c6/0x510 [ 574.847413][T22399] ? alloc_vmap_area+0x16f/0x1a90 [ 574.852275][T22399] __should_failslab+0xa4/0xe0 [ 574.856921][T22399] should_failslab+0x9/0x20 [ 574.861218][T22399] kmem_cache_alloc+0x3d/0x2e0 [ 574.865988][T22399] alloc_vmap_area+0x16f/0x1a90 [ 574.870686][T22399] ? vm_map_ram+0x9d0/0x9d0 [ 574.875013][T22399] ? __kasan_kmalloc+0x9/0x10 [ 574.879527][T22399] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 574.884911][T22399] ? __get_vm_area_node+0x116/0x470 [ 574.889947][T22399] __get_vm_area_node+0x156/0x470 [ 574.894803][T22399] __vmalloc_node_range+0xdc/0x7c0 [ 574.899759][T22399] ? prealloc_init+0x13b/0x7f0 [ 574.904350][T22399] ? get_random_u64+0x5b0/0x5b0 [ 574.909058][T22399] bpf_map_area_alloc+0xd9/0xf0 [ 574.913731][T22399] ? prealloc_init+0x13b/0x7f0 [ 574.918323][T22399] prealloc_init+0x13b/0x7f0 [ 574.922756][T22399] ? __kmalloc+0x1aa/0x330 [ 574.927007][T22399] htab_map_alloc+0x68d/0x950 [ 574.931520][T22399] __se_sys_bpf+0x620f/0x11cb0 [ 574.936214][T22399] ? stack_trace_save+0x113/0x1c0 [ 574.941066][T22399] ? terminate_walk+0x407/0x4f0 [ 574.945756][T22399] ? stack_trace_snprint+0xf0/0xf0 [ 574.950706][T22399] ? kmem_cache_free+0xa9/0x1e0 [ 574.955386][T22399] ? kmem_cache_free+0xa9/0x1e0 [ 574.960081][T22399] ? kasan_set_track+0x5d/0x70 [ 574.964667][T22399] ? __x64_sys_bpf+0x90/0x90 [ 574.969098][T22399] ? __kasan_slab_free+0x11/0x20 [ 574.973867][T22399] ? slab_free_freelist_hook+0xc0/0x190 [ 574.979252][T22399] ? kmem_cache_free+0xa9/0x1e0 [ 574.983942][T22399] ? putname+0xe7/0x140 [ 574.987930][T22399] ? do_sys_openat2+0x1fc/0x710 [ 574.992623][T22399] ? __x64_sys_openat+0x243/0x290 [ 574.997477][T22399] ? do_syscall_64+0x34/0x70 [ 575.001904][T22399] ? _kstrtoull+0x3a0/0x4a0 [ 575.006243][T22399] ? kstrtouint_from_user+0x20a/0x2a0 [ 575.011539][T22399] ? kstrtol_from_user+0x310/0x310 [ 575.016494][T22399] ? memset+0x35/0x40 [ 575.020304][T22399] ? __fsnotify_parent+0x4b9/0x6c0 [ 575.025259][T22399] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 575.031847][T22399] ? proc_fail_nth_write+0x20b/0x290 [ 575.036977][T22399] ? proc_fail_nth_read+0x210/0x210 [ 575.042009][T22399] ? security_file_permission+0x86/0xb0 [ 575.047396][T22399] ? rw_verify_area+0x1c3/0x360 [ 575.052076][T22399] ? preempt_count_add+0x92/0x1a0 [ 575.056945][T22399] ? vfs_write+0x852/0xe70 [ 575.061190][T22399] ? kmem_cache_free+0xa9/0x1e0 [ 575.065877][T22399] ? kernel_write+0x3d0/0x3d0 [ 575.070478][T22399] ? __kasan_check_write+0x14/0x20 [ 575.075427][T22399] ? mutex_lock+0xa5/0x110 [ 575.079677][T22399] ? mutex_trylock+0xa0/0xa0 [ 575.084107][T22399] ? __kasan_check_write+0x14/0x20 [ 575.089052][T22399] ? fput_many+0x160/0x1b0 [ 575.093313][T22399] ? debug_smp_processor_id+0x17/0x20 [ 575.098507][T22399] __x64_sys_bpf+0x7b/0x90 [ 575.102759][T22399] do_syscall_64+0x34/0x70 [ 575.107014][T22399] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 575.112733][T22399] RIP: 0033:0x7f3c08d1b9f9 [ 575.116991][T22399] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 575.136435][T22399] RSP: 002b:00007f3c07999038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 575.144677][T22399] RAX: ffffffffffffffda RBX: 00007f3c08eb7f80 RCX: 00007f3c08d1b9f9 [ 575.152491][T22399] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 575.160300][T22399] RBP: 00007f3c07999090 R08: 0000000000000000 R09: 0000000000000000 [ 575.168112][T22399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 575.176012][T22399] R13: 0000000000000000 R14: 00007f3c08eb7f80 R15: 00007ffec84978b8 [ 576.093675][T22448] : renamed from ipvlan1 [ 576.146950][T22455] FAULT_INJECTION: forcing a failure. [ 576.146950][T22455] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 576.160217][T22455] CPU: 1 PID: 22455 Comm: syz.0.7322 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 576.171390][T22455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 576.181282][T22455] Call Trace: [ 576.184418][T22455] dump_stack_lvl+0x1e2/0x24b [ 576.188925][T22455] ? bfq_pos_tree_add_move+0x43b/0x43b [ 576.194226][T22455] ? stack_trace_save+0x113/0x1c0 [ 576.199085][T22455] ? stack_trace_snprint+0xf0/0xf0 [ 576.204028][T22455] dump_stack+0x15/0x17 [ 576.208020][T22455] should_fail+0x3c6/0x510 [ 576.212379][T22455] should_fail_alloc_page+0x52/0x60 [ 576.217485][T22455] __alloc_pages_nodemask+0x1b3/0xaf0 [ 576.222688][T22455] ? __get_vm_area_node+0x156/0x470 [ 576.227715][T22455] ? __vmalloc_node_range+0xdc/0x7c0 [ 576.232844][T22455] ? __se_sys_bpf+0x620f/0x11cb0 [ 576.237623][T22455] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 576.243000][T22455] __get_free_pages+0xe/0x30 [ 576.247421][T22455] kasan_populate_vmalloc_pte+0x39/0x130 [ 576.252890][T22455] ? __apply_to_page_range+0x710/0x9e0 [ 576.258185][T22455] __apply_to_page_range+0x720/0x9e0 [ 576.263310][T22455] ? kasan_populate_vmalloc+0x70/0x70 [ 576.268521][T22455] ? kasan_populate_vmalloc+0x70/0x70 [ 576.273724][T22455] apply_to_page_range+0x3b/0x50 [ 576.278702][T22455] kasan_populate_vmalloc+0x65/0x70 [ 576.283730][T22455] alloc_vmap_area+0x1944/0x1a90 [ 576.288513][T22455] ? vm_map_ram+0x9d0/0x9d0 [ 576.292845][T22455] ? __kasan_kmalloc+0x9/0x10 [ 576.297444][T22455] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 576.302828][T22455] ? __get_vm_area_node+0x116/0x470 [ 576.307860][T22455] __get_vm_area_node+0x156/0x470 [ 576.312724][T22455] __vmalloc_node_range+0xdc/0x7c0 [ 576.317662][T22455] ? prealloc_init+0x13b/0x7f0 [ 576.322353][T22455] ? get_random_u64+0x5b0/0x5b0 [ 576.327040][T22455] bpf_map_area_alloc+0xd9/0xf0 [ 576.331726][T22455] ? prealloc_init+0x13b/0x7f0 [ 576.336346][T22455] prealloc_init+0x13b/0x7f0 [ 576.340756][T22455] ? __kmalloc+0x1aa/0x330 [ 576.345011][T22455] htab_map_alloc+0x68d/0x950 [ 576.349523][T22455] __se_sys_bpf+0x620f/0x11cb0 [ 576.354207][T22455] ? stack_trace_save+0x113/0x1c0 [ 576.359156][T22455] ? terminate_walk+0x407/0x4f0 [ 576.363840][T22455] ? stack_trace_snprint+0xf0/0xf0 [ 576.368797][T22455] ? kmem_cache_free+0xa9/0x1e0 [ 576.373476][T22455] ? kmem_cache_free+0xa9/0x1e0 [ 576.378351][T22455] ? kasan_set_track+0x5d/0x70 [ 576.383033][T22455] ? __x64_sys_bpf+0x90/0x90 [ 576.387448][T22455] ? __kasan_slab_free+0x11/0x20 [ 576.392220][T22455] ? slab_free_freelist_hook+0xc0/0x190 [ 576.397606][T22455] ? kmem_cache_free+0xa9/0x1e0 [ 576.402287][T22455] ? putname+0xe7/0x140 [ 576.406281][T22455] ? do_sys_openat2+0x1fc/0x710 [ 576.410966][T22455] ? __x64_sys_openat+0x243/0x290 [ 576.415915][T22455] ? do_syscall_64+0x34/0x70 [ 576.420434][T22455] ? _kstrtoull+0x3a0/0x4a0 [ 576.424801][T22455] ? kstrtouint_from_user+0x20a/0x2a0 [ 576.429991][T22455] ? kstrtol_from_user+0x310/0x310 [ 576.435016][T22455] ? memset+0x35/0x40 [ 576.438844][T22455] ? __fsnotify_parent+0x4b9/0x6c0 [ 576.443793][T22455] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 576.450476][T22455] ? proc_fail_nth_write+0x20b/0x290 [ 576.455593][T22455] ? proc_fail_nth_read+0x210/0x210 [ 576.460619][T22455] ? security_file_permission+0x86/0xb0 [ 576.466000][T22455] ? rw_verify_area+0x1c3/0x360 [ 576.470699][T22455] ? preempt_count_add+0x92/0x1a0 [ 576.475545][T22455] ? vfs_write+0x852/0xe70 [ 576.479802][T22455] ? kmem_cache_free+0xa9/0x1e0 [ 576.484601][T22455] ? kernel_write+0x3d0/0x3d0 [ 576.489195][T22455] ? __kasan_check_write+0x14/0x20 [ 576.494165][T22455] ? mutex_lock+0xa5/0x110 [ 576.498396][T22455] ? mutex_trylock+0xa0/0xa0 [ 576.502917][T22455] ? __kasan_check_write+0x14/0x20 [ 576.507851][T22455] ? fput_many+0x160/0x1b0 [ 576.512352][T22455] ? debug_smp_processor_id+0x17/0x20 [ 576.517755][T22455] __x64_sys_bpf+0x7b/0x90 [ 576.521998][T22455] do_syscall_64+0x34/0x70 [ 576.526258][T22455] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 576.531978][T22455] RIP: 0033:0x7fbeaec919f9 [ 576.536237][T22455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.555761][T22455] RSP: 002b:00007fbead90f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 576.564006][T22455] RAX: ffffffffffffffda RBX: 00007fbeaee2df80 RCX: 00007fbeaec919f9 [ 576.571902][T22455] RDX: 0000000000000048 RSI: 0000000020000840 RDI: 0000000000000000 [ 576.579807][T22455] RBP: 00007fbead90f090 R08: 0000000000000000 R09: 0000000000000000 [ 576.587610][T22455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 576.595439][T22455] R13: 0000000000000000 R14: 00007fbeaee2df80 R15: 00007fff7c88f7a8 [ 576.654370][T22447] device veth0_vlan left promiscuous mode [ 576.675069][T22447] device veth0_vlan entered promiscuous mode [ 576.729086][T10445] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.747559][T10445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 576.815782][T10445] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 578.023106][T22521] device veth1_macvtap left promiscuous mode [ 578.881735][T22563] bridge0: port 1(bridge_slave_0) entered blocking state [ 578.895002][T22563] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.906294][T22563] device bridge_slave_0 entered promiscuous mode [ 578.913689][T22563] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.920764][T22563] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.928002][T22563] device bridge_slave_1 entered promiscuous mode [ 578.990299][T22563] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.997223][T22563] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.004324][T22563] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.011180][T22563] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.095511][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 579.103298][ T713] bridge0: port 1(bridge_slave_0) entered disabled state [ 579.150540][ T713] bridge0: port 2(bridge_slave_1) entered disabled state [ 579.229333][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 579.281876][ T713] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.288755][ T713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.379932][ T713] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 579.431332][ T713] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.438214][ T713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.459673][ T711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 579.467688][ T711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 579.547992][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 579.565288][T22563] device veth0_vlan entered promiscuous mode [ 579.572053][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 579.636272][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 579.695733][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 579.767604][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 579.808825][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 579.871026][T22563] device veth1_macvtap entered promiscuous mode [ 579.902742][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 579.948102][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 580.018881][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 580.055261][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 580.068391][T15789] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 580.603712][T22644] device syzkaller0 entered promiscuous mode [ 580.990584][ T6703] device bridge_slave_1 left promiscuous mode [ 580.996554][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.040418][ T6703] device bridge_slave_0 left promiscuous mode [ 581.046468][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 581.110754][ T6703] device veth0_vlan left promiscuous mode [ 607.624059][T22703] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.630991][T22703] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.638185][T22703] device bridge_slave_0 entered promiscuous mode [ 607.646218][T22703] bridge0: port 2(bridge_slave_1) entered blocking state [ 607.653408][T22703] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.660715][T22703] device bridge_slave_1 entered promiscuous mode [ 607.688009][T22702] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.695043][T22702] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.702269][T22702] device bridge_slave_0 entered promiscuous mode [ 607.709144][T22702] bridge0: port 2(bridge_slave_1) entered blocking state [ 607.716281][T22702] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.723795][T22702] device bridge_slave_1 entered promiscuous mode [ 607.797325][T22704] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.804619][T22704] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.812004][T22704] device bridge_slave_0 entered promiscuous mode [ 607.832972][T22704] bridge0: port 2(bridge_slave_1) entered blocking state [ 607.839954][T22704] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.847627][T22704] device bridge_slave_1 entered promiscuous mode [ 607.866118][T22706] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.873113][T22706] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.880815][T22706] device bridge_slave_0 entered promiscuous mode [ 607.896043][T22706] bridge0: port 2(bridge_slave_1) entered blocking state [ 607.903123][T22706] bridge0: port 2(bridge_slave_1) entered disabled state [ 607.910465][T22706] device bridge_slave_1 entered promiscuous mode [ 607.970994][T22705] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.977855][T22705] bridge0: port 1(bridge_slave_0) entered disabled state [ 607.985313][T22705] device bridge_slave_0 entered promiscuous mode [ 607.993371][T22705] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.000729][T22705] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.007893][T22705] device bridge_slave_1 entered promiscuous mode [ 608.073590][T22702] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.080466][T22702] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.087710][T22702] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.094540][T22702] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.107473][T22703] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.114459][T22703] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.121739][T22703] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.128502][T22703] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.184034][T22706] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.190908][T22706] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.197987][T22706] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.204821][T22706] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.218277][T22705] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.225166][T22705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.232340][T22705] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.239109][T22705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.254087][ T6703] device bridge_slave_1 left promiscuous mode [ 608.260160][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.267848][ T6703] device bridge_slave_0 left promiscuous mode [ 608.274196][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.282300][ T6703] device veth0_vlan left promiscuous mode [ 608.355983][T22704] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.362862][T22704] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.369969][T22704] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.376755][T22704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.402903][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.411037][ T425] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.418086][ T425] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.425604][ T425] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.433116][ T425] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.440419][ T425] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.447464][ T425] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.454965][ T425] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.462035][ T425] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.469297][ T425] bridge0: port 1(bridge_slave_0) entered disabled state [ 608.476485][ T425] bridge0: port 2(bridge_slave_1) entered disabled state [ 608.502970][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.510333][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 608.518433][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.526969][ T425] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.533944][ T425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.541677][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 608.548896][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.556360][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 608.564619][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 608.572970][ T425] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.579912][ T425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.587156][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 608.595749][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.603877][ T425] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.610719][ T425] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.636227][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 608.643687][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.651906][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 608.660431][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.668367][T15770] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.675227][T15770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.682666][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 608.691017][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 608.699137][T15770] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.706093][T15770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.713259][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 608.721471][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.729402][T15770] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.736265][T15770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.743429][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 608.751811][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 608.759832][T15770] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.766662][T15770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.789666][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 608.797602][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 608.806196][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 608.814434][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 608.822395][ T425] bridge0: port 2(bridge_slave_1) entered blocking state [ 608.829226][ T425] bridge0: port 2(bridge_slave_1) entered forwarding state [ 608.836694][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 608.844591][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 608.852900][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 608.860848][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 608.868562][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 608.899512][T22703] device veth0_vlan entered promiscuous mode [ 608.906484][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 608.914834][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 608.925495][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 608.933551][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 608.941456][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 608.948669][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 608.956109][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 608.964440][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 608.972958][T15770] bridge0: port 1(bridge_slave_0) entered blocking state [ 608.979878][T15770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 608.987248][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 608.995485][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 609.003802][T15770] bridge0: port 2(bridge_slave_1) entered blocking state [ 609.010657][T15770] bridge0: port 2(bridge_slave_1) entered forwarding state [ 609.017998][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 609.026253][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 609.034549][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 609.042356][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.051679][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.059156][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.074913][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 609.082815][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 609.098116][T22703] device veth1_macvtap entered promiscuous mode [ 609.117508][T22704] device veth0_vlan entered promiscuous mode [ 609.124296][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.134743][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.142371][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.149752][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 609.157732][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 609.165799][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 609.173287][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 609.181605][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 609.190492][T15770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 609.220583][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 609.230588][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 609.238973][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 609.247531][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.255917][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 609.264221][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 609.272429][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.280148][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.288330][T22702] device veth0_vlan entered promiscuous mode [ 609.303637][T22704] device veth1_macvtap entered promiscuous mode [ 609.314321][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 609.330653][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.338978][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 609.347963][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 609.356555][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.364048][ T705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.372757][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 609.381381][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.392011][T22705] device veth0_vlan entered promiscuous mode [ 609.403894][T22706] device veth0_vlan entered promiscuous mode [ 609.410331][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 609.418511][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 609.426960][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 609.447307][T22706] device veth1_macvtap entered promiscuous mode [ 609.455616][T22702] device veth1_macvtap entered promiscuous mode [ 609.463409][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 609.472489][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 609.480376][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 609.487637][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 609.495422][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 609.503816][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 609.512261][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 609.520715][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.546292][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 609.555597][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 609.577339][T22705] device veth1_macvtap entered promiscuous mode [ 609.639962][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 609.648150][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 609.663165][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 609.671580][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.679862][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 609.688036][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.696780][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 609.705336][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 609.714106][ T53] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 609.801734][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 609.823227][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 609.835635][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 609.844805][ T425] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 610.069996][T22744] device veth1_macvtap left promiscuous mode [ 610.122656][T22757] ref_ctr_offset mismatch. inode: 0x1b offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x7602 [ 610.162122][T22749] device veth1_macvtap left promiscuous mode [ 610.302722][T22751] device veth1_macvtap left promiscuous mode [ 611.251422][ T6703] device bridge_slave_1 left promiscuous mode [ 611.277610][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.292808][ T6703] device bridge_slave_0 left promiscuous mode [ 611.312359][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.373808][ T6703] device bridge_slave_1 left promiscuous mode [ 611.434474][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.516202][ T6703] device bridge_slave_0 left promiscuous mode [ 611.522257][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.552920][ T6703] device bridge_slave_1 left promiscuous mode [ 611.559417][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.567605][ T6703] device bridge_slave_0 left promiscuous mode [ 611.573992][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.582622][ T6703] device bridge_slave_1 left promiscuous mode [ 611.588892][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.596861][ T6703] device bridge_slave_0 left promiscuous mode [ 611.603618][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.613983][ T6703] device veth1_macvtap left promiscuous mode [ 611.620013][ T6703] device veth0_vlan left promiscuous mode [ 611.626114][ T6703] device veth0_vlan left promiscuous mode [ 613.545434][T22848] ¯Ê®¸}p: renamed from pim6reg1 [ 615.041975][T22868] device syzkaller0 entered promiscuous mode [ 615.578805][T22879] device syzkaller0 entered promiscuous mode [ 616.566077][T22899] device syzkaller0 entered promiscuous mode [ 617.437628][T22917] device syzkaller0 entered promiscuous mode [ 617.535220][T22922] device pim6reg1 entered promiscuous mode [ 619.350369][T22980] device pim6reg1 entered promiscuous mode [ 620.361235][T23015] device syzkaller0 entered promiscuous mode [ 620.855524][T23032] device syzkaller0 entered promiscuous mode [ 621.132955][T23039] geneve1: tun_chr_ioctl cmd 1074025677 [ 621.145008][T23039] geneve1: linktype set to 6 [ 621.465994][T23045] device syzkaller0 entered promiscuous mode [ 621.857336][T23063] device sit0 entered promiscuous mode [ 622.646402][T23078] device veth0_vlan left promiscuous mode [ 622.687643][T23078] device veth0_vlan entered promiscuous mode [ 623.781876][T23125] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.788927][T23125] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.864198][T23128] device bridge_slave_1 left promiscuous mode [ 623.879768][T23128] bridge0: port 2(bridge_slave_1) entered disabled state [ 623.898120][T23128] device bridge_slave_0 left promiscuous mode [ 623.910061][T23128] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.953647][T23123] device veth1_macvtap left promiscuous mode [ 624.062507][T23135] device syzkaller0 entered promiscuous mode [ 624.071751][T23130] device pim6reg1 entered promiscuous mode [ 624.795078][T23177] device syzkaller0 entered promiscuous mode [ 626.466801][T23324] ªªªªªª: renamed from vlan0 [ 628.329610][T23403] device sit0 entered promiscuous mode [ 629.284686][T23445] device wg2 entered promiscuous mode [ 631.967772][T23560] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.975356][T23560] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.982802][T23560] device bridge_slave_0 entered promiscuous mode [ 631.990079][T23560] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.997089][T23560] bridge0: port 2(bridge_slave_1) entered disabled state [ 632.004743][T23560] device bridge_slave_1 entered promiscuous mode [ 632.568420][T23560] bridge0: port 2(bridge_slave_1) entered blocking state [ 632.575310][T23560] bridge0: port 2(bridge_slave_1) entered forwarding state [ 632.582554][T23560] bridge0: port 1(bridge_slave_0) entered blocking state [ 632.590302][T23560] bridge0: port 1(bridge_slave_0) entered forwarding state [ 632.917758][T15787] bridge0: port 1(bridge_slave_0) entered disabled state [ 632.939345][T15787] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.073729][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 633.090970][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 633.102267][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 633.111155][T15793] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 633.119241][T15793] bridge0: port 1(bridge_slave_0) entered blocking state [ 633.126220][T15793] bridge0: port 1(bridge_slave_0) entered forwarding state [ 633.220277][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 633.233012][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 633.249230][T15787] bridge0: port 2(bridge_slave_1) entered blocking state [ 633.256241][T15787] bridge0: port 2(bridge_slave_1) entered forwarding state [ 633.265311][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 633.273840][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 633.282197][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 633.291183][T15787] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 633.335430][ T4812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 633.346481][ T4812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 633.367800][T23560] device veth0_vlan entered promiscuous mode [ 633.396945][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 633.414996][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 633.486106][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 633.493422][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 633.632784][T23560] device veth1_macvtap entered promiscuous mode [ 633.639765][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 633.648029][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 633.656607][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 633.745465][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 633.759363][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 633.777936][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 633.792092][ T707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 634.580251][T23692] device sit0 left promiscuous mode [ 634.929527][T23707] syz.1.7696[23707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 634.968611][T23707] syz.1.7696[23707] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.123709][T23709] device syzkaller0 entered promiscuous mode [ 635.427345][T23728] device pim6reg1 entered promiscuous mode [ 636.116439][T23762] syzkaller0: refused to change device tx_queue_len [ 637.512064][T23814] device pim6reg1 entered promiscuous mode [ 637.671165][T23819] device pim6reg1 entered promiscuous mode [ 638.405261][T23853] device syzkaller0 entered promiscuous mode [ 640.504299][T23945] device pim6reg1 entered promiscuous mode [ 640.661733][T23961] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.668747][T23961] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.698289][T23961] device bridge_slave_1 left promiscuous mode [ 640.704862][T23961] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.712619][T23961] device bridge_slave_0 left promiscuous mode [ 640.718678][T23961] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.773459][T23965] bridge0: port 2(bridge_slave_1) entered disabled state [ 640.780514][T23965] bridge0: port 1(bridge_slave_0) entered disabled state [ 640.871901][T23971] device pim6reg1 entered promiscuous mode [ 641.302949][T24005] device pim6reg1 entered promiscuous mode [ 642.486563][T24088] device pim6reg1 entered promiscuous mode [ 643.576283][T24192] device wg2 entered promiscuous mode [ 643.591159][T24183] device wg2 left promiscuous mode [ 644.458275][T24254] device pim6reg1 entered promiscuous mode [ 644.898944][T24264] device syzkaller0 entered promiscuous mode [ 645.745362][T24274] bridge0: port 1(bridge_slave_0) entered blocking state [ 645.789822][T24274] bridge0: port 1(bridge_slave_0) entered disabled state [ 645.797168][T24274] device bridge_slave_0 entered promiscuous mode [ 645.880778][T24274] bridge0: port 2(bridge_slave_1) entered blocking state [ 645.887722][T24274] bridge0: port 2(bridge_slave_1) entered disabled state [ 645.993100][T24274] device bridge_slave_1 entered promiscuous mode [ 646.538995][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 646.546717][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 646.563661][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 646.585376][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 646.606715][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 646.613621][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 646.646895][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 646.672179][ T292] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 646.692314][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 646.699315][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 646.768667][ T4812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 646.786826][ T4812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 646.799225][ T4812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 646.836362][T24274] device veth0_vlan entered promiscuous mode [ 646.854027][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 646.868931][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 646.886736][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 646.941960][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 647.032788][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 647.044106][T24274] device veth1_macvtap entered promiscuous mode [ 647.062477][ T4812] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 647.075331][ T4812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 647.100967][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 647.122937][T15792] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 649.696225][T24392] device syzkaller0 entered promiscuous mode [ 652.548911][T24546] device pim6reg1 entered promiscuous mode [ 652.825670][T24573] device veth1_macvtap left promiscuous mode [ 654.793320][T24676] bridge0: port 2(bridge_slave_1) entered disabled state [ 654.800533][T24676] bridge0: port 1(bridge_slave_0) entered disabled state [ 655.880555][T24743] device syzkaller0 entered promiscuous mode [ 656.024555][T24740] device pim6reg1 entered promiscuous mode [ 656.355254][T24751] device syzkaller0 entered promiscuous mode [ 656.494752][T24764] device veth0_vlan left promiscuous mode [ 656.545382][T24764] device veth0_vlan entered promiscuous mode [ 656.785562][T24782] device syzkaller0 entered promiscuous mode [ 658.916136][T24862] device pim6reg1 entered promiscuous mode [ 662.359843][T25033] device sit0 entered promiscuous mode [ 663.008021][T25059] device syzkaller0 entered promiscuous mode [ 663.653759][T25083] FAULT_INJECTION: forcing a failure. [ 663.653759][T25083] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 663.667274][T25083] CPU: 0 PID: 25083 Comm: syz.2.8175 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 663.678542][T25083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 663.688610][T25083] Call Trace: [ 663.691747][T25083] dump_stack_lvl+0x1e2/0x24b [ 663.696599][T25083] ? bfq_pos_tree_add_move+0x43b/0x43b [ 663.701893][T25083] ? __x32_compat_sys_ioctl+0x90/0x90 [ 663.707105][T25083] ? has_cap_mac_admin+0x3c0/0x3c0 [ 663.712054][T25083] dump_stack+0x15/0x17 [ 663.716058][T25083] should_fail+0x3c6/0x510 [ 663.720299][T25083] should_fail_usercopy+0x1a/0x20 [ 663.725166][T25083] _copy_from_user+0x20/0xd0 [ 663.729591][T25083] ppp_ioctl+0xf48/0x1810 [ 663.733747][T25083] ? ppp_poll+0x250/0x250 [ 663.737926][T25083] ? __rcu_read_unlock+0x61/0x90 [ 663.742697][T25083] ? __fget_files+0x31e/0x380 [ 663.747292][T25083] ? security_file_ioctl+0x84/0xb0 [ 663.752238][T25083] ? ppp_poll+0x250/0x250 [ 663.756399][T25083] __se_sys_ioctl+0x114/0x190 [ 663.760912][T25083] __x64_sys_ioctl+0x7b/0x90 [ 663.765339][T25083] do_syscall_64+0x34/0x70 [ 663.769599][T25083] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 663.775405][T25083] RIP: 0033:0x7fe1dc1009f9 [ 663.779661][T25083] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 663.799181][T25083] RSP: 002b:00007fe1dad7e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 663.807433][T25083] RAX: ffffffffffffffda RBX: 00007fe1dc29cf80 RCX: 00007fe1dc1009f9 [ 663.815326][T25083] RDX: 0000000020000000 RSI: 000000004010744d RDI: 0000000000000005 [ 663.823154][T25083] RBP: 00007fe1dad7e090 R08: 0000000000000000 R09: 0000000000000000 [ 663.830946][T25083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 663.838761][T25083] R13: 0000000000000000 R14: 00007fe1dc29cf80 R15: 00007ffc12195358 [ 665.245901][T25145] FAULT_INJECTION: forcing a failure. [ 665.245901][T25145] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 665.263522][T25145] CPU: 0 PID: 25145 Comm: syz.2.8194 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 665.274796][T25145] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 665.284700][T25145] Call Trace: [ 665.287817][T25145] dump_stack_lvl+0x1e2/0x24b [ 665.292324][T25145] ? bfq_pos_tree_add_move+0x43b/0x43b [ 665.297618][T25145] ? __check_object_size+0x73/0x3c0 [ 665.302648][T25145] ? ___ratelimit+0xb5/0x580 [ 665.307082][T25145] dump_stack+0x15/0x17 [ 665.311084][T25145] should_fail+0x3c6/0x510 [ 665.315325][T25145] should_fail_usercopy+0x1a/0x20 [ 665.320185][T25145] _copy_to_user+0x20/0x90 [ 665.324440][T25145] simple_read_from_buffer+0xc7/0x150 [ 665.329654][T25145] proc_fail_nth_read+0x1a3/0x210 [ 665.334505][T25145] ? proc_fault_inject_write+0x390/0x390 [ 665.340077][T25145] ? security_file_permission+0x86/0xb0 [ 665.345613][T25145] ? rw_verify_area+0x1c3/0x360 [ 665.350300][T25145] ? proc_fault_inject_write+0x390/0x390 [ 665.355765][T25145] vfs_read+0x200/0xba0 [ 665.359761][T25145] ? kernel_read+0x70/0x70 [ 665.364013][T25145] ? __irq_exit_rcu+0x40/0x150 [ 665.368614][T25145] ? irq_exit_rcu+0x9/0x10 [ 665.372955][T25145] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 665.378596][T25145] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 665.384583][T25145] ? ksys_read+0xfd/0x2c0 [ 665.388753][T25145] ksys_read+0x199/0x2c0 [ 665.392827][T25145] ? kvm_sched_clock_read+0x18/0x40 [ 665.397860][T25145] ? vfs_write+0xe70/0xe70 [ 665.402117][T25145] ? debug_smp_processor_id+0x17/0x20 [ 665.407435][T25145] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 665.413430][T25145] __x64_sys_read+0x7b/0x90 [ 665.417758][T25145] do_syscall_64+0x34/0x70 [ 665.422017][T25145] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 665.427887][T25145] RIP: 0033:0x7fe1dc0ff43c [ 665.432124][T25145] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 665.451963][T25145] RSP: 002b:00007fe1dad7e030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 665.460178][T25145] RAX: ffffffffffffffda RBX: 00007fe1dc29cf80 RCX: 00007fe1dc0ff43c [ 665.468262][T25145] RDX: 000000000000000f RSI: 00007fe1dad7e0a0 RDI: 0000000000000006 [ 665.476138][T25145] RBP: 00007fe1dad7e090 R08: 0000000000000000 R09: 0000000000000000 [ 665.483857][T25145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 665.491669][T25145] R13: 0000000000000000 R14: 00007fe1dc29cf80 R15: 00007ffc12195358 [ 666.862191][T25221] device sit0 entered promiscuous mode [ 666.991928][T25217] device syzkaller0 entered promiscuous mode [ 667.019156][T25227] device syzkaller0 entered promiscuous mode [ 670.378777][T25372] FAULT_INJECTION: forcing a failure. [ 670.378777][T25372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 670.392597][T25372] CPU: 0 PID: 25372 Comm: syz.0.8272 Tainted: G W 5.10.223-syzkaller-01561-g0890c03b8b7d #0 [ 670.403987][T25372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 670.414928][T25372] Call Trace: [ 670.420201][T25372] dump_stack_lvl+0x1e2/0x24b [ 670.424958][T25372] ? bfq_pos_tree_add_move+0x43b/0x43b [ 670.430250][T25372] dump_stack+0x15/0x17 [ 670.434508][T25372] should_fail+0x3c6/0x510 [ 670.439710][T25372] should_fail_usercopy+0x1a/0x20 [ 670.444591][T25372] _copy_to_user+0x20/0x90 [ 670.448843][T25372] simple_read_from_buffer+0xc7/0x150 [ 670.454046][T25372] proc_fail_nth_read+0x1a3/0x210 [ 670.459004][T25372] ? proc_fault_inject_write+0x390/0x390 [ 670.464466][T25372] ? security_file_permission+0x86/0xb0 [ 670.470275][T25372] ? rw_verify_area+0x1c3/0x360 [ 670.475152][T25372] ? proc_fault_inject_write+0x390/0x390 [ 670.480599][T25372] vfs_read+0x200/0xba0 [ 670.484605][T25372] ? kernel_read+0x70/0x70 [ 670.488834][T25372] ? __kasan_check_write+0x14/0x20 [ 670.493873][T25372] ? mutex_lock+0xa5/0x110 [ 670.498296][T25372] ? mutex_trylock+0xa0/0xa0 [ 670.503703][T25372] ? __fdget_pos+0x2e7/0x3a0 [ 670.508110][T25372] ? ksys_read+0x77/0x2c0 [ 670.513589][T25372] ksys_read+0x199/0x2c0 [ 670.517814][T25372] ? vfs_write+0xe70/0xe70 [ 670.522440][T25372] ? fpu__clear_all+0x20/0x20 [ 670.527486][T25372] ? __kasan_check_read+0x11/0x20 [ 670.532508][T25372] __x64_sys_read+0x7b/0x90 [ 670.536925][T25372] do_syscall_64+0x34/0x70 [ 670.541271][T25372] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 670.547613][T25372] RIP: 0033:0x7f11427de43c [ 670.551854][T25372] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8d 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8d 02 00 48 [ 670.572541][T25372] RSP: 002b:00007f114143c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 670.580871][T25372] RAX: ffffffffffffffda RBX: 00007f114297c058 RCX: 00007f11427de43c [ 670.589575][T25372] RDX: 000000000000000f RSI: 00007f114143c0a0 RDI: 000000000000000b [ 670.597719][T25372] RBP: 00007f114143c090 R08: 0000000000000000 R09: 0000000000000000 [ 670.605504][T25372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 670.613308][T25372] R13: 0000000000000001 R14: 00007f114297c058 R15: 00007ffcbc3234b8 [ 673.145313][T25520] device syzkaller0 entered promiscuous mode [ 676.741428][T25779] device syzkaller0 entered promiscuous mode [ 678.910635][T25921] pim6reg0: tun_chr_ioctl cmd 1074025677 [ 678.921348][T25921] pim6reg0: linktype set to 0 [ 678.935156][T25921] device pim6reg1 entered promiscuous mode [ 680.939936][T26031] ªªªªªª: renamed from vlan0 SYZFAIL: failed to send rpc fd=3 want=832 sent=0 n=-1 (errno 32: Broken pipe) [ 696.161733][T26056] bridge0: port 1(bridge_slave_0) entered blocking state [ 696.168597][T26056] bridge0: port 1(bridge_slave_0) entered disabled state [ 696.200129][T26056] device bridge_slave_0 entered promiscuous mode [ 696.910790][ T6703] device bridge_slave_1 left promiscuous mode [ 696.916806][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 696.924134][ T6703] device bridge_slave_0 left promiscuous mode [ 696.930192][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.390195][ T6703] device bridge_slave_0 left promiscuous mode [ 698.396144][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.404926][ T6703] device bridge_slave_1 left promiscuous mode [ 698.411052][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.418211][ T6703] device bridge_slave_0 left promiscuous mode [ 698.424218][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.433516][ T6703] device bridge_slave_1 left promiscuous mode [ 698.439441][ T6703] bridge0: port 2(bridge_slave_1) entered disabled state [ 698.446973][ T6703] device bridge_slave_0 left promiscuous mode [ 698.452934][ T6703] bridge0: port 1(bridge_slave_0) entered disabled state [ 698.461278][ T6703] device veth0_vlan left promiscuous mode [ 698.466886][ T6703] device veth0_vlan left promiscuous mode