last executing test programs: 5.3260547s ago: executing program 3 (id=2295): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000500) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa0}, 0x0, 0x7, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0xfffffffffffff8c0, 0xfffffffffffffff6}, 0x0, 0x4, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000001050000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff4cff80850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x11, 0xe, 0x0, &(0x7f00000009c0)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 5.249665742s ago: executing program 4 (id=2297): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000440)=ANY=[@ANYBLOB="0a00000a51f09f852f0009000000080000000200", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) write$cgroup_devices(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="1e03f2003c5ca601288763"], 0xffdd) socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0x3) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0xc3, 0x9810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x7ff, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000980)='sys_exit\x00'}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000380)='ns/user\x00') syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x202, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xd, 0x8}, 0x10000, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r2, 0x18000000000002a0, 0xeff, 0x7, &(0x7f0000001240)="b9ff03076804268c989e14f088a8657986dd", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xc, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3.925147789s ago: executing program 2 (id=2301): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000240000002400000002000000180000000000000400000003000000000000001301000000000000000000000d020000000000"], 0xffffffffffffffff, 0x3e, 0xb1, 0x2, 0x0, 0x0, @void, @value}, 0x20) unlink(&(0x7f0000000040)='./file0\x00') 3.924674159s ago: executing program 2 (id=2302): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) socketpair(0x1, 0x1, 0x8000, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c0000000200009100000000005a4d0105000000200000000000000000000010020000000000"], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) 3.924366739s ago: executing program 4 (id=2303): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="180010000095fbde40789200000000004000000000000000d882c1781946fce2742e33bc6200ad30295e26eca23f5231f99e103fffdeee7c81080ff6f92f6c4e4540812836fb45fa2a36fb1f8df2907c64375516dd6b0a710630dd1c0fad3835a19f068b8529dd2574d5768e6a46b3a2d8b1d948a79608e8b19418137445adf18c94f0193b34497fb50cceefd207cf282e2bacabae8a2deeea1e499438dc4f3d0b4f43720096894d5c56b4ea2312fd8aa8f2e08d4736d5e35c9673566d8220b6061bccd48c4650"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000007c0000007c00000002000000000000000000000e0000000049bab69c236ab500000000000000000000000d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000900000000000000000000000904000000000000000000000902000001000057b0462251d234014f57a68d9b66b0135e535a5c88d3e2"], 0x0, 0x96, 0x0, 0x0, 0x4, 0x0, @void, @value}, 0x28) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001369b9ad516bb8e5af84030c16d0100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 3.562580264s ago: executing program 4 (id=2306): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x1}) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000200)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000180)=r4}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={r4, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000280)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xb2, &(0x7f00000004c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xae, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r7, &(0x7f0000000000), 0x2a979d) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x16, 0x9, 0x6, 0x9, 0x2000, r5, 0x5, '\x00', r6, r7, 0x2, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r8 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x119, 0x119, 0x7, [@func={0xf, 0x0, 0x0, 0xc, 0x4}, @decl_tag={0x2, 0x0, 0x0, 0x11, 0x5, 0x6}, @union={0x2, 0x2, 0x0, 0x5, 0x0, 0x4, [{0x7, 0x1, 0x181}, {0x9, 0x3, 0x5}]}, @datasec={0x6, 0x7, 0x0, 0xf, 0x1, [{0x4, 0x8, 0x5}, {0x5, 0x2ac, 0x4}, {0x2, 0x1, 0x3}, {0x2, 0x70}, {0x5, 0x8, 0xffff}, {0x1, 0x1, 0x5da}, {0x1, 0x411, 0x5}], "a5"}, @union={0xf, 0x5, 0x0, 0x5, 0x0, 0x1, [{0xc, 0x0, 0x10}, {0x6, 0x3, 0x10001}, {0xa, 0x2}, {0x1, 0x3, 0x4}, {0x7, 0x2, 0xfffff801}]}, @ptr={0x6, 0x0, 0x0, 0x2, 0x2}, @ptr={0x7, 0x0, 0x0, 0x2, 0x1}, @volatile={0x9}, @ptr={0x7, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x7f, 0x0, 0x0, 0x61, 0x5f]}}, &(0x7f0000000000)=""/84, 0x13b, 0x54, 0x1, 0x9, 0x0, @void, @value}, 0x28) r9 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0xf, 0x10001, 0x80000000, 0x1, 0x8404, 0x1, 0x1, '\x00', r6, r8, 0x3, 0x5, 0x4, 0x0, @value=r9, @void, @void, @value}, 0x50) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 3.186301559s ago: executing program 4 (id=2308): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/13], 0x48) perf_event_open(&(0x7f00000007c0)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x800}, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0xc, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018600020feffffff000000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(&(0x7f0000000200)='./cgroup/../file0\x00') r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) syz_clone(0x41980100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x6) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pim6reg0\x00', 0x2}) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000180)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r3, &(0x7f00000001c0)={'a', ' *:* ', 'rwm\x00'}, 0xa) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_procs(r4, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f00000005c0)=r2, 0x12) r6 = openat$cgroup_ro(r4, &(0x7f00000000c0)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_int(r6, &(0x7f0000000040)=0x1, 0x12) 2.954213292s ago: executing program 0 (id=2311): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x5, 0x5, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f00000003c0), 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0xfbfffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x3, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000000000000000000008500000061000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x40082404, &(0x7f0000000280)=0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 2.894155132s ago: executing program 1 (id=2312): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000200000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.893096802s ago: executing program 3 (id=2313): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000480)={0x4, &(0x7f00000004c0)=[{0x2d, 0x0, 0x2}, {0x15}, {}, {0x6}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)=@generic={&(0x7f0000000040)='./file0\x00'}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0x1, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f0000000100)=r1}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000004c0), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4}}, @enum]}}, &(0x7f0000000580)=""/162, 0x3e, 0xa2, 0x1, 0x0, 0x0, @void, @value}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6334ce6203c23c00fe80000000000000875a65969ff57b00000000000000000000000000ac1414aa3c"], 0xfdef) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r8) recvmsg$unix(r7, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r9, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{0x1, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)='%-5lx \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000006c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000640), &(0x7f0000000680)='%+9llu \x00'}, 0x20) r12 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000700)={0x0, 0x3, 0x10}, 0xc) r13 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r13, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r14}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r15, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r13) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000e80)=@bpf_ext={0x1c, 0x28, &(0x7f0000000380)=@raw=[@map_fd={0x18, 0x7, 0x1, 0x0, r2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @map_fd={0x18, 0x2, 0x1, 0x0, r1}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @exit, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xb40}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x4}, @map_idx={0x18, 0x9, 0x5, 0x0, 0x10}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc}}], &(0x7f0000000300)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, 0x0, r6, 0x8, &(0x7f0000000500)={0x9, 0x1}, 0x8, 0x10, &(0x7f0000000540)={0x4, 0x7, 0x1510, 0x6}, 0x10, 0x20490, r1, 0x6, &(0x7f0000000740)=[0x1, r10, r11, 0xffffffffffffffff, r1, 0x1, r12], &(0x7f0000000e00)=[{0x0, 0x2, 0xd, 0xd1713d0dd6a2911}, {0x4, 0x2, 0x0, 0x8}, {0x4, 0x1, 0x2, 0x8}, {0x2, 0x2, 0x9, 0x4}, {0x0, 0x2, 0xf, 0x2}, {0x0, 0x1, 0xe, 0x1}], 0x10, 0xf83, @void, @value}, 0x94) 2.820107773s ago: executing program 1 (id=2314): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={0x0, r0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1d64, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="06517dc2e6ea"}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000001000000000000000000000063010c000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x6, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000080)) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r6}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x20) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 2.750485274s ago: executing program 2 (id=2315): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYRES16=0xffffffffffffffff], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000030000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r2}, 0x0, &(0x7f0000000040)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffff9b, 0x8}, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x51a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0c000000040000000400000009"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000024c0), &(0x7f0000001280), 0xffffffff, r4}, 0x38) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(r5, &(0x7f0000000140)=ANY=[], 0xfffffdef) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="01000200", @ANYBLOB="e3f2448f788c24df3fec9990e0534b299870", @ANYBLOB="0000008000"/20, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYBLOB='\x00'/28], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000001c0)='sched_process_wait\x00', r5, 0x0, 0x10bb}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000a16c000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000ef0b06000000000000000000b7040000000000008500000003000000950000000000716afef38862650d27060f2dc9daebc65635decba53774d1fb8f97a1f32c55"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001000000", @ANYRES32, @ANYBLOB="0000000000020000000000000000001000000000", @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000280)={r7, &(0x7f0000000840)="05c6f535adcec8c60315560a05502376bfa866bd07d353ad6308744f9151e05fb18ae0db505cf80ed7e2ff5f127ed10dc7d26e5651d565f9601a92ee55d611e8c12df8e9a0272f60a42463ce4f4aa94694964759cb5397e3736abdafcdb04004e3dc2baf5f44d5354be6b34e15cd6ec0cbeb079eae059fc3415196301ee8", &(0x7f0000000700)=""/169}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)) 2.715908475s ago: executing program 0 (id=2316): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="180010000095fbde40789200000000004000000000000000d882c1781946fce2742e33bc6200ad30295e26eca23f5231f99e103fffdeee7c81080ff6f92f6c4e4540812836fb45fa2a36fb1f8df2907c64375516dd6b0a710630dd1c0fad3835a19f068b8529dd2574d5768e6a46b3a2d8b1d948a79608e8b19418137445adf18c94f0193b34497fb50cceefd207cf282e2bacabae8a2deeea1e499438dc4f3d0b4f43720096894d5c56b4ea2312fd8aa8f2e08d4736d5e35c9673566d8220b6061bccd48c4650"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000007c0000007c00000002000000000000000000000e0000000049bab69c236ab500000000000000000000000d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000900000000000000000000000904000000000000000000000902000001000057b0462251d234014f57a68d9b66b0135e535a5c88d3e2"], 0x0, 0x96, 0x0, 0x0, 0x4, 0x0, @void, @value}, 0x28) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001369b9ad516bb8e5af84030c16d0100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.580006267s ago: executing program 0 (id=2317): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 2.568362777s ago: executing program 0 (id=2318): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080", @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) recvmsg$unix(r2, 0x0, 0x2000) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x0, 0x5c, 0x1}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4c081}, 0x20000) 2.221993271s ago: executing program 2 (id=2319): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 2.159070512s ago: executing program 3 (id=2320): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0xff48, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r1}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 2.139573403s ago: executing program 2 (id=2321): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0x0, 0x0}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000040000004500000088140000", @ANYRES32, @ANYBLOB="05000000000000000000000000000000009e757e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000020b70400000000000085000000c300000095"], 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r2}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)) write$cgroup_subtree(r3, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xf9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000940)) r6 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r6, 0x4008240b, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001140)=ANY=[@ANYBLOB="bf16000000000000b70700000100e0ff5070000028000000770000000000000095000200000000007ae9413df8ff0af5aa35339f4b382c4cad9db67dc983134d04ef2fd6fa7a9b857b72abaca100af1ba23d69883c073ec10500000000000000000000000000ac0e064c27bdfbd301150500000000000000bfdc995279d64072aacbb0595b950600009ad3bf16a461e48e955a772d4062093f4cb1c3d9532abad2085401f098eb039ae4f4103699b9e079229c1a72cb6d47cef1595e84d21951010f0274b1445a2ad6a7ad73827cccc21842599e0ae7b91f0b858b7b67aa0b28d69a74ffdea61be892f0f9ff9468e42aea53ee0cb83ff180aa18b625d1667459c7cba77cff9dc8c2772fe552fecfcd1778b08381000000c0b8e14631d521207e7423d86508416780983c2f380bc01cefe9773a9a5cd5b24aa24a561e72393c0ce2bf44825b05c1779fe74f884c2472ab45c2af60289cb199963312dd1929096c6f49d116f1612a7b97f77169fa5e8a66a372ef8e3ee7167f7d2a26fc6c3cfa4dc5860277223d6eb3460e3b10a0dc9400010000ca11d7beb5e700498b43bdadc916c01264d22d7969530633f94b257fbc5da7a96820e31044c0b0f62619c9e351996185e4015510875b774666ba5c0ba9845ad25b578d7d714ff3a85586b9b452301f5470d0e0ae5d7f82f178f0c7c9c8f44c390c8a2c5be9e24a125420912ec9a3149f87b35ef1169f05e49164a4944e7b4da2097f57020dd4f1f4f15edd7a0b1e24c6f79e1ea72a29c773f40f5bd9a6d7926c5c741f5aa85405273c7967d2c1a14efe0d5322cdcf2bc058ff9acb481926312f04008b1044e8c1c17d8c562edf69f4db96e059c49ec69a6086b5a3d24f4c7810ab5f6a9f9eb5c881883e5671bbca4614df48103ca6e408910000000000f784583b63fcd46293e1ea56bd87915783a144d41669cd2c52dbb03e2b7384f100000000000000000090bd4fa6a2d30dafd3a04d373eaf151dfbbb744f0f1ce962217b32ad159f41671f002c3a25b4efbc3b193e0954f71c7f240a7cdc5bf9be12ca0e82d2a408c8f882760331612a7c3d74386b3268e0c2a95396f6d16b8309cc192295fea2d0ce983baef6deecca6b6268b6cc965f2623bac861e31026a6aba7ebf78a614092257e3a4e52b7b1628dc33a425dce56fc939b96fbb66e131ba7651b542c86650336735d315c26bae977ff5a619b2534a5d1479e9090447aa860b81b905ded2f52ab9c741fc3a05030476b159690a811416d59f9d92c84fcbf0146be0330e1127cc4bb4e4c94d603f449279874e44113e9de94fbc14891af08e20a4701f0f8788b357815cf4ca3da2066ee6604ac6ab6ec54a111bd5b1887e74eb854010cc2dc95b06ceddfbc1b914be267fc29e6cf2301291ca8de0eed796d9e5e356861349b0fc217592e962360e714bb93a2e936f70873e773b9b6c056f28a36185bb8ecdcd3332528ab2d05be93bc69a373ac9d20fa087015481cfba74612d93104db153f89d03d6ce620f1f25be68b9cb2d225711c1b288ec6464111db1b40dbce06fd1bd887d7254476c9c70fe79be0fb7810e054b6e2205c2b4b27f13751639c581dac83889ed6eea54c798f2287c9d5345b0c49f78b9aa27a9c96ce5e43b6ca11bb6375ed390773315d19b596a60500330115bb100d0ea1511e29720d5f712eedd8e165af0c1d591fdbbd84e654b0e60c338c530a9e8ae1316a889134204f9db96e870bc1c5ffc1bdb2394d77e6c751f9d87ef42f6d53293f31ff4b60912fa0777c59db1ff74ba90026eed627e0f8ab250c8c6d51d86030e6be4a8982684c12c1c435d586ce106d0b4cd0f5fabcc5fbe30db5e715646867122ef50f767e215f92d407ad1c6575eccfe25f76aaf388008ec2217c9ba0f807edebe686b420287b6e0c6f14a48c82ec45f1aa7ac2508932d0e3a5834a1a4e20bc9bb2a802304900d6bef57bd9c081b45520e7bd491a0ef1bfec4721cc70962f4d55f01bae699cb3fe31c179f00dc79140333fa4e85ec393dd01bdc5bf79677453a30c63d1561a35c5e94e3cad80136e753052b08901965293bcf5f9de9c8019a1fdebddb255427326deea4506d2cc2949df6a5c13fbcc36cbcd0f0d35602668c3bc7c7264457f161a51"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r7, 0x0, 0xe40, 0x0, &(0x7f00000006c0)="ffffffff106c3ed990f77e9eb3cf", 0x0, 0x60ff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 2.096798093s ago: executing program 0 (id=2322): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000940)=@framed={{0x18, 0x9, 0x0, 0x0, 0x4, 0x0, 0x0, 0xe00}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.046407664s ago: executing program 2 (id=2323): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETDEVNETNS(r1, 0x8982, 0x20000500) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xa0}, 0x0, 0x7, 0x0, 0x6, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0xfffffffffffff8c0, 0xfffffffffffffff6}, 0x0, 0x4, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="18020000000000000000000001050000850000009b000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ff4cff80850000007100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r2, 0x11, 0xe, 0x0, &(0x7f00000009c0)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) 2.045938914s ago: executing program 0 (id=2324): perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x0, 0xc0002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000004c0), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=@framed, &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair(0xf, 0x3, 0x80000001, &(0x7f00000001c0)) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r1}, 0x18) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000100)=ANY=[], 0x0, 0x36, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000000)={0x11, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, r3, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000004"], 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0x3, &(0x7f0000001740)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x1f6, &(0x7f00000002c0)=""/168, 0x0, 0x0, '\x00', 0x0, @sock_ops, r4, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200), 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6d) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xe0, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000880)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2c, 0x2, 0x3, &(0x7f0000000300)) socketpair(0x27, 0x800, 0x853d, &(0x7f0000000600)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000440)='btrfs_find_cluster\x00', r6, 0x0, 0x4}, 0x18) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2.043966084s ago: executing program 3 (id=2325): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r0}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000300)}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180), 0x4) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f00000700000000000000", @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="000000000000000000140000000079e78be2ceb85100000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r2}, &(0x7f0000000200), &(0x7f0000000400)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0xb, 0x0, &(0x7f0000000140)="e0274239ed0d0800000000", 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) syz_clone(0x0, &(0x7f0000000500)="bea6a204d344d10018067beb60d35d7101bc74c0e6871be6371b13b0cb5027e4080009b5178af50a28f10de606e85ef701ec620b2b9d5c90947394f9c91f50d76e5dbd2b183bb496a6672818101344c15806d5f86954d0755bb9a404a14adf709b25e8d36ded1da55501d5596d2fde1ce604cec89fa0878acdaded48fd2d60d9527c3b41525206b6cb52f050ded3908ecbda55f25e096fdd8eb4463a31daeea4e389a11b47584b472bc62f219327fd12f250f3af6c1ace42b83a24615ce204da56a0a05a98e568ce25241a1586de4d968029afef06debbb20dc81c50d026930ab4ce", 0xe2, &(0x7f0000000280), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x45) 1.818291976s ago: executing program 1 (id=2326): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b000000050000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB="0e0000000000009475f600001068830fd5b2f2ae96cd291a3d34cf0b0e", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x9d, 0x3c, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40c2, 0x2000000, 0xfffffffe, 0x3, 0x3, 0xa547, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) close(r1) 1.772282827s ago: executing program 4 (id=2327): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000e00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r0}, 0x10) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={0xffffffffffffffff, 0x58, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="1b00000005000000fbff", @ANYBLOB="0900000000000000000000000000000000000000e969540aa45ce730dbcc32ff17cd37c5141dfc05d5711417728f67fb6faffce74bcca0f9016faeb3cc5d2de068eb490c1eca3381754e5452a5d441374104f71458a973fa28ae10204c8abbbb5965be97f4c3c6211d23bff8756f3484442ad5d94d370345f02bf59b4ff2df521db3960eee1d8b4a8788b7728a033223dde09eae68de1214b680372e990971c9", @ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="02000000050000000500"/28], 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0xa, 0x1fffffffffffffcd, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)) write$cgroup_subtree(r6, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r4}, &(0x7f0000000200), &(0x7f0000000400)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESHEX=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00b399a22eaa4d1ef200000000000000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, 0x0, 0x40, 0x0) close(r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x4, 0x5, &(0x7f0000000000)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r7, 0x0, 0xe, 0x0, &(0x7f0000000140)="e0274239ed0d08000000000000b1", 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) syz_clone(0x0, &(0x7f0000000500), 0x0, &(0x7f0000000280), &(0x7f0000000340), &(0x7f0000000740)="4b47b78cbc589868b6e9f1ba6bf272230b7068e81f09798db88f55457d558b8bbe7005f22807a85e46d1eb92a24f8b2d0e20e9b1479a0f5206ca4f65e6a632293b24c1f40f0511befaa82fc68d56eba58282a14f7c009656179da9cbf63fc87cfcdeac9d3f5c6dba1b761cb2d6413b42bb97d7f622b58a7533ffbb2816e499a55acbd4") 1.022389567s ago: executing program 3 (id=2328): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x1f, 0x2, &(0x7f0000001c40)=ANY=[@ANYBLOB="85000000a800000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="180010000095fbde40789200000000004000000000000000d882c1781946fce2742e33bc6200ad30295e26eca23f5231f99e103fffdeee7c81080ff6f92f6c4e4540812836fb45fa2a36fb1f8df2907c64375516dd6b0a710630dd1c0fad3835a19f068b8529dd2574d5768e6a46b3a2d8b1d948a79608e8b19418137445adf18c94f0193b34497fb50cceefd207cf282e2bacabae8a2deeea1e499438dc4f3d0b4f43720096894d5c56b4ea2312fd8aa8f2e08d4736d5e35c9673566d8220b6061bccd48c4650"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000008c0)=ANY=[@ANYBLOB="9feb010018000000000000007c0000007c00000002000000000000000000000e0000000049bab69c236ab500000000000000000000000d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000900000000000000000000000904000000000000000000000902000001000057b0462251d234014f57a68d9b66b0135e535a5c88d3e2"], 0x0, 0x96, 0x0, 0x0, 0x4, 0x0, @void, @value}, 0x28) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000040)=""/247, 0x26, 0xf7, 0x1, 0x0, 0x0, @void, @value}, 0x20) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0xe2, &(0x7f00000002c0)=""/226, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000780)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f00000005c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0x0, 0x0}}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0a00000001369b9ad516bb8e5af84030c16d0100", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 938.683838ms ago: executing program 1 (id=2329): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r0}, 0x10) (async, rerun: 32) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000900000000000000213f0000c50000000e800000850000000e00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (rerun: 32) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='mmap_lock_acquire_returned\x00', r1}, 0x10) r3 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r2}, 0x8) write$cgroup_int(r3, &(0x7f00000001c0), 0xfffffdef) (async) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@base={0x19, 0x4, 0x4, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000900000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffff"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='tlb_flush\x00', r5}, 0x10) (async, rerun: 64) syz_clone(0xc0001480, 0x0, 0x0, 0x0, 0x0, 0x0) (rerun: 64) bpf$ITER_CREATE(0x21, &(0x7f0000000240), 0x8) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0x200000b9, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000000006110b000000000006351080000000000950009000000002d"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (rerun: 32) 653.203912ms ago: executing program 3 (id=2330): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) (fail_nth: 14) 119.501889ms ago: executing program 1 (id=2331): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x18) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) 30.0705ms ago: executing program 1 (id=2332): perf_event_open(&(0x7f0000001480)={0x2, 0x80, 0x8b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x6, 0x9, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000e3ff000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) close(r1) (fail_nth: 1) 0s ago: executing program 4 (id=2333): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000818110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="1b00000000000000000000000080", @ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) recvmsg$unix(r2, 0x0, 0x2000) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000027c0)=@base={0x4, 0x4, 0x4, 0x10002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r3, 0x58, &(0x7f0000000340)={0x0, 0x0}}, 0x10) r5 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r4}, 0xc) close(r5) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r6, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x0, 0x5c, 0x1}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x4c081}, 0x20000) kernel console output (not intermixed with test programs): 4][ T2065] name failslab, interval 1, probability 0, space 0, times 0 [ 142.521896][ T2065] CPU: 1 PID: 2065 Comm: syz.2.543 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 142.533130][ T2065] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 142.543173][ T2065] Call Trace: [ 142.546438][ T2065] [ 142.549397][ T2065] __dump_stack+0x21/0x24 [ 142.553742][ T2065] dump_stack_lvl+0xee/0x150 [ 142.558320][ T2065] ? __cfi_dump_stack_lvl+0x8/0x8 [ 142.563335][ T2065] ? __stack_depot_save+0x36/0x480 [ 142.568438][ T2065] dump_stack+0x15/0x24 [ 142.572589][ T2065] should_fail_ex+0x3d4/0x520 [ 142.577255][ T2065] __should_failslab+0xac/0xf0 [ 142.582002][ T2065] ? bpf_raw_tp_link_attach+0x171/0x550 [ 142.587536][ T2065] should_failslab+0x9/0x20 [ 142.592032][ T2065] __kmem_cache_alloc_node+0x3d/0x2c0 [ 142.597393][ T2065] ? bpf_raw_tp_link_attach+0x171/0x550 [ 142.602921][ T2065] kmalloc_trace+0x29/0xb0 [ 142.607338][ T2065] bpf_raw_tp_link_attach+0x171/0x550 [ 142.612695][ T2065] ? bpf_insn_prepare_dump+0x840/0x840 [ 142.618173][ T2065] ? __kasan_check_write+0x14/0x20 [ 142.623278][ T2065] bpf_raw_tracepoint_open+0x258/0x480 [ 142.628718][ T2065] ? slab_free_freelist_hook+0xc2/0x190 [ 142.634253][ T2065] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 142.639962][ T2065] ? selinux_bpf+0xce/0xf0 [ 142.644372][ T2065] ? security_bpf+0x93/0xb0 [ 142.648862][ T2065] __sys_bpf+0x4d1/0x780 [ 142.653098][ T2065] ? bpf_link_show_fdinfo+0x320/0x320 [ 142.658467][ T2065] ? __cfi_ksys_write+0x10/0x10 [ 142.663314][ T2065] ? debug_smp_processor_id+0x17/0x20 [ 142.668686][ T2065] __x64_sys_bpf+0x7c/0x90 [ 142.673114][ T2065] x64_sys_call+0x488/0x9a0 [ 142.677624][ T2065] do_syscall_64+0x4c/0xa0 [ 142.682039][ T2065] ? clear_bhb_loop+0x15/0x70 [ 142.686707][ T2065] ? clear_bhb_loop+0x15/0x70 [ 142.691375][ T2065] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 142.697272][ T2065] RIP: 0033:0x7fedf958e969 [ 142.701685][ T2065] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.721280][ T2065] RSP: 002b:00007fedfa4d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 142.729683][ T2065] RAX: ffffffffffffffda RBX: 00007fedf97b5fa0 RCX: 00007fedf958e969 [ 142.737647][ T2065] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 142.745625][ T2065] RBP: 00007fedfa4d6090 R08: 0000000000000000 R09: 0000000000000000 [ 142.753586][ T2065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.761547][ T2065] R13: 0000000000000000 R14: 00007fedf97b5fa0 R15: 00007ffc9c9869e8 [ 142.769510][ T2065] [ 145.121672][ T2101] FAULT_INJECTION: forcing a failure. [ 145.121672][ T2101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 145.134811][ T2101] CPU: 1 PID: 2101 Comm: syz.2.554 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 145.146000][ T2101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 145.156051][ T2101] Call Trace: [ 145.159322][ T2101] [ 145.162248][ T2101] __dump_stack+0x21/0x24 [ 145.166589][ T2101] dump_stack_lvl+0xee/0x150 [ 145.171183][ T2101] ? __cfi_dump_stack_lvl+0x8/0x8 [ 145.176214][ T2101] ? __kasan_check_write+0x14/0x20 [ 145.181328][ T2101] ? _raw_spin_lock_irq+0x8f/0xe0 [ 145.186353][ T2101] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 145.191902][ T2101] dump_stack+0x15/0x24 [ 145.196103][ T2101] should_fail_ex+0x3d4/0x520 [ 145.200796][ T2101] should_fail+0xb/0x10 [ 145.204970][ T2101] should_fail_usercopy+0x1a/0x20 [ 145.210004][ T2101] copy_page_from_iter_atomic+0x35c/0x1210 [ 145.215814][ T2101] ? __cfi_copy_page_from_iter_atomic+0x10/0x10 [ 145.222055][ T2101] ? __kasan_check_read+0x11/0x20 [ 145.227094][ T2101] ? shmem_write_begin+0x151/0x2c0 [ 145.232204][ T2101] generic_perform_write+0x348/0x6d0 [ 145.237499][ T2101] ? __cfi_generic_perform_write+0x10/0x10 [ 145.243306][ T2101] ? __cfi_file_update_time+0x10/0x10 [ 145.248770][ T2101] __generic_file_write_iter+0x227/0x580 [ 145.254404][ T2101] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 145.260137][ T2101] ? __cfi___generic_file_write_iter+0x10/0x10 [ 145.266288][ T2101] ? rwsem_write_trylock+0x130/0x300 [ 145.271580][ T2101] ? generic_write_checks_count+0x3c6/0x4a0 [ 145.277486][ T2101] ? generic_write_checks+0xca/0x100 [ 145.282765][ T2101] generic_file_write_iter+0xae/0x310 [ 145.288133][ T2101] vfs_write+0x5db/0xca0 [ 145.292384][ T2101] ? slab_free_freelist_hook+0xc2/0x190 [ 145.297942][ T2101] ? __cfi_vfs_write+0x10/0x10 [ 145.302709][ T2101] ? __cfi_mutex_lock+0x10/0x10 [ 145.307570][ T2101] ? __fdget_pos+0x2cd/0x380 [ 145.312166][ T2101] ? ksys_write+0x71/0x240 [ 145.316586][ T2101] ksys_write+0x140/0x240 [ 145.320914][ T2101] ? __cfi_ksys_write+0x10/0x10 [ 145.325756][ T2101] ? debug_smp_processor_id+0x17/0x20 [ 145.331115][ T2101] __x64_sys_write+0x7b/0x90 [ 145.335690][ T2101] x64_sys_call+0x27b/0x9a0 [ 145.340176][ T2101] do_syscall_64+0x4c/0xa0 [ 145.344580][ T2101] ? clear_bhb_loop+0x15/0x70 [ 145.349240][ T2101] ? clear_bhb_loop+0x15/0x70 [ 145.353896][ T2101] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 145.359774][ T2101] RIP: 0033:0x7fedf958e969 [ 145.364166][ T2101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.383751][ T2101] RSP: 002b:00007fedfa4d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 145.392150][ T2101] RAX: ffffffffffffffda RBX: 00007fedf97b5fa0 RCX: 00007fedf958e969 [ 145.400104][ T2101] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 145.408148][ T2101] RBP: 00007fedfa4d6090 R08: 0000000000000000 R09: 0000000000000000 [ 145.416106][ T2101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 145.424079][ T2101] R13: 0000000000000000 R14: 00007fedf97b5fa0 R15: 00007ffc9c9869e8 [ 145.432043][ T2101] [ 147.916022][ T2140] device veth0_vlan left promiscuous mode [ 147.988111][ T2140] device veth0_vlan entered promiscuous mode [ 148.171178][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.202509][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.239190][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.440821][ T2156] FAULT_INJECTION: forcing a failure. [ 148.440821][ T2156] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 148.638563][ T2156] CPU: 1 PID: 2156 Comm: syz.0.574 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 148.649785][ T2156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 148.659848][ T2156] Call Trace: [ 148.663123][ T2156] [ 148.666052][ T2156] __dump_stack+0x21/0x24 [ 148.670395][ T2156] dump_stack_lvl+0xee/0x150 [ 148.675007][ T2156] ? __cfi_dump_stack_lvl+0x8/0x8 [ 148.680041][ T2156] ? kasan_set_track+0x60/0x70 [ 148.684811][ T2156] ? kasan_save_alloc_info+0x25/0x30 [ 148.690102][ T2156] ? __kasan_slab_alloc+0x72/0x80 [ 148.695130][ T2156] ? slab_post_alloc_hook+0x4f/0x2d0 [ 148.700421][ T2156] dump_stack+0x15/0x24 [ 148.704584][ T2156] should_fail_ex+0x3d4/0x520 [ 148.709277][ T2156] should_fail_alloc_page+0x61/0x90 [ 148.714488][ T2156] prepare_alloc_pages+0x148/0x5f0 [ 148.719624][ T2156] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 148.724854][ T2156] __alloc_pages+0x115/0x3a0 [ 148.729451][ T2156] ? __cfi___alloc_pages+0x10/0x10 [ 148.734571][ T2156] ? kasan_save_alloc_info+0x25/0x30 [ 148.739862][ T2156] ? __kasan_slab_alloc+0x72/0x80 [ 148.744895][ T2156] ? slab_post_alloc_hook+0x6d/0x2d0 [ 148.750190][ T2156] __get_free_pages+0xe/0x30 [ 148.754798][ T2156] pgd_alloc+0x21/0x280 [ 148.758972][ T2156] mm_init+0x4ca/0x920 [ 148.763051][ T2156] copy_mm+0x1ab/0x1a10 [ 148.767222][ T2156] ? __kasan_slab_alloc+0x72/0x80 [ 148.772252][ T2156] ? copy_signal+0x630/0x630 [ 148.776849][ T2156] ? _raw_spin_lock+0x8e/0xe0 [ 148.781543][ T2156] ? __cfi__raw_spin_lock+0x10/0x10 [ 148.786771][ T2156] ? memset+0x35/0x40 [ 148.790762][ T2156] ? __init_rwsem+0x12c/0x240 [ 148.795448][ T2156] ? copy_signal+0x4ea/0x630 [ 148.800056][ T2156] copy_process+0x12a8/0x3470 [ 148.804748][ T2156] ? idle_dummy+0x10/0x10 [ 148.809135][ T2156] kernel_clone+0x23a/0x810 [ 148.813647][ T2156] ? __cfi_kernel_clone+0x10/0x10 [ 148.818681][ T2156] ? __kasan_check_write+0x14/0x20 [ 148.823798][ T2156] ? mutex_unlock+0x89/0x220 [ 148.828399][ T2156] __x64_sys_clone+0x168/0x1b0 [ 148.833174][ T2156] ? __cfi___x64_sys_clone+0x10/0x10 [ 148.838472][ T2156] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 148.844541][ T2156] x64_sys_call+0x990/0x9a0 [ 148.849051][ T2156] do_syscall_64+0x4c/0xa0 [ 148.853468][ T2156] ? clear_bhb_loop+0x15/0x70 [ 148.858138][ T2156] ? clear_bhb_loop+0x15/0x70 [ 148.862815][ T2156] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 148.868717][ T2156] RIP: 0033:0x7f7042f8e969 [ 148.873128][ T2156] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 148.892730][ T2156] RSP: 002b:00007f7043d5cfe8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 148.901147][ T2156] RAX: ffffffffffffffda RBX: 00007f70431b5fa0 RCX: 00007f7042f8e969 [ 148.909119][ T2156] RDX: 0000000000000000 RSI: fffffffffffffd70 RDI: 000000006a02f080 [ 148.917090][ T2156] RBP: 00007f7043d5d090 R08: 0000000000000000 R09: 0000000000000000 [ 148.925057][ T2156] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000002 [ 148.933027][ T2156] R13: 0000000000000000 R14: 00007f70431b5fa0 R15: 00007fffbc9f2ab8 [ 148.941015][ T2156] [ 150.282053][ T2170] FAULT_INJECTION: forcing a failure. [ 150.282053][ T2170] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 150.392770][ T2170] CPU: 0 PID: 2170 Comm: syz.3.579 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 150.404015][ T2170] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 150.414072][ T2170] Call Trace: [ 150.417349][ T2170] [ 150.420277][ T2170] __dump_stack+0x21/0x24 [ 150.424648][ T2170] dump_stack_lvl+0xee/0x150 [ 150.429251][ T2170] ? __cfi_dump_stack_lvl+0x8/0x8 [ 150.434286][ T2170] ? __rcu_read_unlock+0xa0/0xa0 [ 150.439234][ T2170] ? migrate_enable+0x19c/0x280 [ 150.444084][ T2170] dump_stack+0x15/0x24 [ 150.448257][ T2170] should_fail_ex+0x3d4/0x520 [ 150.452943][ T2170] should_fail+0xb/0x10 [ 150.457100][ T2170] should_fail_usercopy+0x1a/0x20 [ 150.462125][ T2170] _copy_to_user+0x1e/0x90 [ 150.466572][ T2170] bpf_test_finish+0x48d/0x6b0 [ 150.471338][ T2170] ? convert_skb_to___skb+0x430/0x430 [ 150.476712][ T2170] ? __kasan_check_write+0x14/0x20 [ 150.481829][ T2170] bpf_prog_test_run_skb+0xce1/0x1290 [ 150.487208][ T2170] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 150.493015][ T2170] bpf_prog_test_run+0x3e3/0x630 [ 150.497953][ T2170] ? bpf_prog_query+0x270/0x270 [ 150.502803][ T2170] ? selinux_bpf+0xce/0xf0 [ 150.507242][ T2170] ? security_bpf+0x93/0xb0 [ 150.511756][ T2170] __sys_bpf+0x56d/0x780 [ 150.516006][ T2170] ? bpf_link_show_fdinfo+0x320/0x320 [ 150.521389][ T2170] ? fpregs_restore_userregs+0x128/0x260 [ 150.527025][ T2170] __x64_sys_bpf+0x7c/0x90 [ 150.531445][ T2170] x64_sys_call+0x488/0x9a0 [ 150.535950][ T2170] do_syscall_64+0x4c/0xa0 [ 150.540371][ T2170] ? clear_bhb_loop+0x15/0x70 [ 150.545045][ T2170] ? clear_bhb_loop+0x15/0x70 [ 150.549719][ T2170] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 150.555625][ T2170] RIP: 0033:0x7f89ef98e969 [ 150.560039][ T2170] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 150.579639][ T2170] RSP: 002b:00007f89f0720038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 150.588056][ T2170] RAX: ffffffffffffffda RBX: 00007f89efbb5fa0 RCX: 00007f89ef98e969 [ 150.596022][ T2170] RDX: 0000000000000048 RSI: 0000200000000380 RDI: 000000000000000a [ 150.603992][ T2170] RBP: 00007f89f0720090 R08: 0000000000000000 R09: 0000000000000000 [ 150.611960][ T2170] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 150.619930][ T2170] R13: 0000000000000000 R14: 00007f89efbb5fa0 R15: 00007ffe37aabdf8 [ 150.627909][ T2170] [ 151.135188][ T28] audit: type=1400 audit(1748415282.345:126): avc: denied { create } for pid=2195 comm="syz.4.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 151.793317][ T2209] FAULT_INJECTION: forcing a failure. [ 151.793317][ T2209] name failslab, interval 1, probability 0, space 0, times 0 [ 151.831671][ T2209] CPU: 0 PID: 2209 Comm: syz.1.595 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 151.842902][ T2209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 151.852958][ T2209] Call Trace: [ 151.856234][ T2209] [ 151.859162][ T2209] __dump_stack+0x21/0x24 [ 151.863500][ T2209] dump_stack_lvl+0xee/0x150 [ 151.868105][ T2209] ? __cfi_dump_stack_lvl+0x8/0x8 [ 151.873142][ T2209] dump_stack+0x15/0x24 [ 151.877302][ T2209] should_fail_ex+0x3d4/0x520 [ 151.881984][ T2209] __should_failslab+0xac/0xf0 [ 151.886748][ T2209] ? sk_prot_alloc+0xed/0x320 [ 151.891436][ T2209] should_failslab+0x9/0x20 [ 151.895950][ T2209] __kmem_cache_alloc_node+0x3d/0x2c0 [ 151.901334][ T2209] ? sk_prot_alloc+0xed/0x320 [ 151.906015][ T2209] __kmalloc+0xa1/0x1e0 [ 151.910177][ T2209] sk_prot_alloc+0xed/0x320 [ 151.914689][ T2209] sk_alloc+0x3b/0x460 [ 151.918785][ T2209] packet_create+0x109/0x850 [ 151.923375][ T2209] __sock_create+0x39e/0x7c0 [ 151.927997][ T2209] __sys_socketpair+0x1a1/0x5b0 [ 151.932860][ T2209] __x64_sys_socketpair+0x9b/0xb0 [ 151.937886][ T2209] x64_sys_call+0x6e/0x9a0 [ 151.942308][ T2209] do_syscall_64+0x4c/0xa0 [ 151.946741][ T2209] ? clear_bhb_loop+0x15/0x70 [ 151.951414][ T2209] ? clear_bhb_loop+0x15/0x70 [ 151.956087][ T2209] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 151.961990][ T2209] RIP: 0033:0x7f20f398e969 [ 151.966402][ T2209] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 151.986090][ T2209] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 151.994504][ T2209] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 152.002473][ T2209] RDX: 0000000000000000 RSI: 000000000000000a RDI: 0000000000000011 [ 152.010442][ T2209] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 152.018410][ T2209] R10: 0000200000001080 R11: 0000000000000246 R12: 0000000000000001 [ 152.026380][ T2209] R13: 0000000000000001 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 152.034357][ T2209] [ 152.172863][ T28] audit: type=1400 audit(1748415283.385:127): avc: denied { tracepoint } for pid=2210 comm="syz.4.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 152.701984][ T2240] FAULT_INJECTION: forcing a failure. [ 152.701984][ T2240] name failslab, interval 1, probability 0, space 0, times 0 [ 152.717958][ T2240] CPU: 1 PID: 2240 Comm: syz.1.605 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 152.729155][ T2240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 152.739197][ T2240] Call Trace: [ 152.742461][ T2240] [ 152.745376][ T2240] __dump_stack+0x21/0x24 [ 152.749703][ T2240] dump_stack_lvl+0xee/0x150 [ 152.754285][ T2240] ? __cfi_dump_stack_lvl+0x8/0x8 [ 152.759311][ T2240] dump_stack+0x15/0x24 [ 152.763459][ T2240] should_fail_ex+0x3d4/0x520 [ 152.768137][ T2240] ? sk_prot_alloc+0x5f/0x320 [ 152.772804][ T2240] __should_failslab+0xac/0xf0 [ 152.777555][ T2240] should_failslab+0x9/0x20 [ 152.782048][ T2240] kmem_cache_alloc+0x3b/0x330 [ 152.786819][ T2240] ? security_inode_alloc+0x33/0x120 [ 152.792099][ T2240] sk_prot_alloc+0x5f/0x320 [ 152.796593][ T2240] sk_alloc+0x3b/0x460 [ 152.800649][ T2240] ? __cfi__raw_spin_lock+0x10/0x10 [ 152.805844][ T2240] ? security_inode_alloc+0xd1/0x120 [ 152.811134][ T2240] inet_create+0x5db/0xf30 [ 152.815539][ T2240] __sock_create+0x39e/0x7c0 [ 152.820124][ T2240] __sys_socketpair+0x1a1/0x5b0 [ 152.824965][ T2240] __x64_sys_socketpair+0x9b/0xb0 [ 152.829982][ T2240] x64_sys_call+0x6e/0x9a0 [ 152.834392][ T2240] do_syscall_64+0x4c/0xa0 [ 152.838801][ T2240] ? clear_bhb_loop+0x15/0x70 [ 152.843460][ T2240] ? clear_bhb_loop+0x15/0x70 [ 152.848122][ T2240] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 152.854004][ T2240] RIP: 0033:0x7f20f398e969 [ 152.858402][ T2240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 152.877993][ T2240] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 152.886395][ T2240] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 152.894349][ T2240] RDX: 0000000000000088 RSI: 0000000000000002 RDI: 0000000000000002 [ 152.902305][ T2240] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 152.910258][ T2240] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 152.918209][ T2240] R13: 0000000000000001 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 152.926176][ T2240] [ 157.974129][ T2360] syz.0.643[2360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 157.974199][ T2360] syz.0.643[2360] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.085796][ T2362] FAULT_INJECTION: forcing a failure. [ 158.085796][ T2362] name failslab, interval 1, probability 0, space 0, times 0 [ 158.114762][ T2362] CPU: 0 PID: 2362 Comm: syz.4.644 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 158.125996][ T2362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 158.136061][ T2362] Call Trace: [ 158.139360][ T2362] [ 158.142298][ T2362] __dump_stack+0x21/0x24 [ 158.146642][ T2362] dump_stack_lvl+0xee/0x150 [ 158.151238][ T2362] ? __cfi_dump_stack_lvl+0x8/0x8 [ 158.156273][ T2362] dump_stack+0x15/0x24 [ 158.160434][ T2362] should_fail_ex+0x3d4/0x520 [ 158.165120][ T2362] __should_failslab+0xac/0xf0 [ 158.169893][ T2362] ? dev_ethtool+0x117/0x1190 [ 158.174579][ T2362] should_failslab+0x9/0x20 [ 158.179093][ T2362] __kmem_cache_alloc_node+0x3d/0x2c0 [ 158.184474][ T2362] ? dev_ethtool+0x117/0x1190 [ 158.189161][ T2362] kmalloc_trace+0x29/0xb0 [ 158.193589][ T2362] dev_ethtool+0x117/0x1190 [ 158.198092][ T2362] ? kstrtouint+0x74/0xe0 [ 158.202419][ T2362] ? __cfi_dev_ethtool+0x10/0x10 [ 158.207348][ T2362] ? irqentry_exit+0x37/0x40 [ 158.211929][ T2362] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 158.217756][ T2362] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 158.223899][ T2362] ? full_name_hash+0x9d/0xf0 [ 158.228571][ T2362] ? dev_get_by_name_rcu+0xe5/0x130 [ 158.233769][ T2362] dev_ioctl+0x473/0xd10 [ 158.238003][ T2362] sock_do_ioctl+0x23f/0x310 [ 158.242584][ T2362] ? sock_show_fdinfo+0xb0/0xb0 [ 158.247425][ T2362] sock_ioctl+0x4d8/0x6e0 [ 158.251762][ T2362] ? __cfi_sock_ioctl+0x10/0x10 [ 158.256603][ T2362] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 158.262398][ T2362] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 158.268546][ T2362] ? __cfi_sock_ioctl+0x10/0x10 [ 158.273393][ T2362] __se_sys_ioctl+0x12f/0x1b0 [ 158.278099][ T2362] __x64_sys_ioctl+0x7b/0x90 [ 158.282696][ T2362] x64_sys_call+0x58b/0x9a0 [ 158.287194][ T2362] do_syscall_64+0x4c/0xa0 [ 158.291603][ T2362] ? clear_bhb_loop+0x15/0x70 [ 158.296354][ T2362] ? clear_bhb_loop+0x15/0x70 [ 158.301019][ T2362] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 158.306910][ T2362] RIP: 0033:0x7f18ac38e969 [ 158.311315][ T2362] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.330996][ T2362] RSP: 002b:00007f18ad2c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 158.339395][ T2362] RAX: ffffffffffffffda RBX: 00007f18ac5b5fa0 RCX: 00007f18ac38e969 [ 158.347370][ T2362] RDX: 0000200000000080 RSI: 0000000000008946 RDI: 000000000000004e [ 158.355350][ T2362] RBP: 00007f18ad2c5090 R08: 0000000000000000 R09: 0000000000000000 [ 158.363309][ T2362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 158.371275][ T2362] R13: 0000000000000000 R14: 00007f18ac5b5fa0 R15: 00007fffbb75a2e8 [ 158.379246][ T2362] [ 158.574779][ T2363] device syzkaller0 entered promiscuous mode [ 158.860615][ T2375] @0Ù: renamed from bond_slave_1 [ 160.416714][ T2421] syz.3.669[2421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.416782][ T2421] syz.3.669[2421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.457522][ T2421] device syzkaller0 entered promiscuous mode [ 163.645903][ T2490] syz.0.690[2490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.645974][ T2490] syz.0.690[2490] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.333217][ T2494] device syzkaller0 entered promiscuous mode [ 167.868272][ T2546] syz.4.708[2546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.868351][ T2546] syz.4.708[2546] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.235180][ T2549] device syzkaller0 entered promiscuous mode [ 170.275965][ T2601] syz.2.726[2601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 170.276035][ T2601] syz.2.726[2601] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.056098][ T2601] device syzkaller0 entered promiscuous mode [ 173.131544][ T2642] syz.0.741[2642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.131617][ T2642] syz.0.741[2642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.639698][ T2644] device syzkaller0 entered promiscuous mode [ 175.159264][ T2676] device pim6reg1 entered promiscuous mode [ 175.315781][ T28] audit: type=1400 audit(1748415306.525:128): avc: denied { create } for pid=2677 comm="syz.3.753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 176.517637][ T2700] syz.2.760[2700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.517692][ T2700] syz.2.760[2700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.783498][ T2700] device syzkaller0 entered promiscuous mode [ 178.779038][ T2754] syz.0.780[2754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.779113][ T2754] syz.0.780[2754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.973186][ T2754] device syzkaller0 entered promiscuous mode [ 182.265619][ T2787] syz.3.793[2787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.265703][ T2787] syz.3.793[2787] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.936737][ T2787] device syzkaller0 entered promiscuous mode [ 184.753381][ T2855] syz.2.816[2855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 184.753453][ T2855] syz.2.816[2855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.013396][ T2894] syz.3.831[2894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.137689][ T2894] syz.3.831[2894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.273463][ T2897] FAULT_INJECTION: forcing a failure. [ 188.273463][ T2897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 188.422429][ T2897] CPU: 1 PID: 2897 Comm: syz.1.833 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 188.433652][ T2897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 188.443725][ T2897] Call Trace: [ 188.447003][ T2897] [ 188.449933][ T2897] __dump_stack+0x21/0x24 [ 188.454285][ T2897] dump_stack_lvl+0xee/0x150 [ 188.458888][ T2897] ? __cfi_dump_stack_lvl+0x8/0x8 [ 188.463918][ T2897] ? __rcu_read_unlock+0xa0/0xa0 [ 188.468859][ T2897] ? migrate_enable+0x19c/0x280 [ 188.473715][ T2897] dump_stack+0x15/0x24 [ 188.477861][ T2897] should_fail_ex+0x3d4/0x520 [ 188.482536][ T2897] should_fail+0xb/0x10 [ 188.486683][ T2897] should_fail_usercopy+0x1a/0x20 [ 188.491756][ T2897] _copy_to_user+0x1e/0x90 [ 188.496165][ T2897] bpf_test_finish+0x1a8/0x6b0 [ 188.500915][ T2897] ? convert_skb_to___skb+0x430/0x430 [ 188.506277][ T2897] bpf_prog_test_run_skb+0xce1/0x1290 [ 188.511639][ T2897] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 188.517452][ T2897] bpf_prog_test_run+0x3e3/0x630 [ 188.522386][ T2897] ? bpf_prog_query+0x270/0x270 [ 188.527225][ T2897] ? selinux_bpf+0xce/0xf0 [ 188.531634][ T2897] ? security_bpf+0x93/0xb0 [ 188.536124][ T2897] __sys_bpf+0x56d/0x780 [ 188.540372][ T2897] ? bpf_link_show_fdinfo+0x320/0x320 [ 188.545740][ T2897] ? __cfi_sched_clock_cpu+0x10/0x10 [ 188.551019][ T2897] __x64_sys_bpf+0x7c/0x90 [ 188.555428][ T2897] x64_sys_call+0x488/0x9a0 [ 188.559935][ T2897] do_syscall_64+0x4c/0xa0 [ 188.564350][ T2897] ? clear_bhb_loop+0x15/0x70 [ 188.569020][ T2897] ? clear_bhb_loop+0x15/0x70 [ 188.573699][ T2897] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 188.579588][ T2897] RIP: 0033:0x7f20f398e969 [ 188.584001][ T2897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 188.603593][ T2897] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 188.611995][ T2897] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 188.619958][ T2897] RDX: 0000000000000050 RSI: 0000200000000440 RDI: 000000000000000a [ 188.627920][ T2897] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 188.635880][ T2897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 188.643838][ T2897] R13: 0000000000000000 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 188.651799][ T2897] [ 189.959389][ T2940] syz.1.845[2940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.959453][ T2940] syz.1.845[2940] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.824466][ T2943] device syzkaller0 entered promiscuous mode [ 193.333165][ T2997] syz.1.867[2997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.333240][ T2997] syz.1.867[2997] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.581435][ T2997] device syzkaller0 entered promiscuous mode [ 198.509143][ T3059] syz.3.887[3059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.509213][ T3059] syz.3.887[3059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.972603][ T3059] device syzkaller0 entered promiscuous mode [ 200.621821][ T3082] device veth0_vlan left promiscuous mode [ 200.651039][ T3082] device veth0_vlan entered promiscuous mode [ 200.670515][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 200.718352][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 200.787804][ T304] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 200.941673][ T3091] Â: renamed from pim6reg1 [ 201.098826][ T3110] syz.4.902[3110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.098900][ T3110] syz.4.902[3110] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 201.759157][ T3110] device syzkaller0 entered promiscuous mode [ 203.651429][ T3155] syz.3.919[3155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 203.651500][ T3155] syz.3.919[3155] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.258608][ T3155] device syzkaller0 entered promiscuous mode [ 207.187692][ T3214] syz.4.938[3214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.187765][ T3214] syz.4.938[3214] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.615653][ T3214] device syzkaller0 entered promiscuous mode [ 208.026961][ T3251] bridge0: port 1(bridge_slave_0) entered disabled state [ 208.398636][ T3251] O3ãc¤±: renamed from bridge_slave_0 [ 208.415677][ T3255] device pim6reg1 entered promiscuous mode [ 209.464403][ T3281] syz.1.958[3281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.464492][ T3281] syz.1.958[3281] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.728852][ T3277] FAULT_INJECTION: forcing a failure. [ 209.728852][ T3277] name failslab, interval 1, probability 0, space 0, times 0 [ 209.768360][ T3277] CPU: 0 PID: 3277 Comm: syz.2.957 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 209.779579][ T3277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 209.789628][ T3277] Call Trace: [ 209.792907][ T3277] [ 209.795851][ T3277] __dump_stack+0x21/0x24 [ 209.800179][ T3277] dump_stack_lvl+0xee/0x150 [ 209.804775][ T3277] ? __cfi_dump_stack_lvl+0x8/0x8 [ 209.809795][ T3277] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 209.816548][ T3277] dump_stack+0x15/0x24 [ 209.820702][ T3277] should_fail_ex+0x3d4/0x520 [ 209.825377][ T3277] ? sched_create_group+0x22/0x250 [ 209.830479][ T3277] __should_failslab+0xac/0xf0 [ 209.835230][ T3277] should_failslab+0x9/0x20 [ 209.839746][ T3277] kmem_cache_alloc+0x3b/0x330 [ 209.844505][ T3277] sched_create_group+0x22/0x250 [ 209.849432][ T3277] cpu_cgroup_css_alloc+0xe/0x30 [ 209.854360][ T3277] cgroup_apply_control_enable+0x392/0xe10 [ 209.860163][ T3277] cgroup_apply_control+0x8f/0x690 [ 209.865268][ T3277] ? css_next_child+0x170/0x170 [ 209.870111][ T3277] ? irqentry_exit+0x37/0x40 [ 209.874689][ T3277] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 209.880493][ T3277] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 209.886638][ T3277] ? cgroup_subtree_control_write+0x55c/0x1410 [ 209.892786][ T3277] cgroup_subtree_control_write+0xdf7/0x1410 [ 209.898765][ T3277] ? __cfi_cgroup_subtree_control_write+0x10/0x10 [ 209.905185][ T3277] ? __kasan_check_write+0x14/0x20 [ 209.910295][ T3277] ? _copy_from_iter+0x205/0xfd0 [ 209.915221][ T3277] ? __cfi_cgroup_subtree_control_write+0x10/0x10 [ 209.921630][ T3277] cgroup_file_write+0x2a7/0x580 [ 209.926558][ T3277] ? __cfi_cgroup_file_write+0x10/0x10 [ 209.932010][ T3277] ? mutex_lock+0x8d/0x1a0 [ 209.936420][ T3277] ? __cfi_mutex_lock+0x10/0x10 [ 209.941264][ T3277] ? __kasan_check_write+0x14/0x20 [ 209.946367][ T3277] kernfs_fop_write_iter+0x2d6/0x410 [ 209.951644][ T3277] ? __cfi_cgroup_file_write+0x10/0x10 [ 209.957099][ T3277] vfs_write+0x5db/0xca0 [ 209.961338][ T3277] ? __cfi_vfs_write+0x10/0x10 [ 209.966095][ T3277] ? __cfi_mutex_lock+0x10/0x10 [ 209.970939][ T3277] ? __fdget_pos+0x2cd/0x380 [ 209.975518][ T3277] ? ksys_write+0x71/0x240 [ 209.979939][ T3277] ksys_write+0x140/0x240 [ 209.984289][ T3277] ? __cfi_ksys_write+0x10/0x10 [ 209.989134][ T3277] ? debug_smp_processor_id+0x17/0x20 [ 209.994494][ T3277] __x64_sys_write+0x7b/0x90 [ 209.999073][ T3277] x64_sys_call+0x27b/0x9a0 [ 210.003571][ T3277] do_syscall_64+0x4c/0xa0 [ 210.007981][ T3277] ? clear_bhb_loop+0x15/0x70 [ 210.012641][ T3277] ? clear_bhb_loop+0x15/0x70 [ 210.017306][ T3277] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 210.023190][ T3277] RIP: 0033:0x7fedf958e969 [ 210.027592][ T3277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.047190][ T3277] RSP: 002b:00007fedfa494038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 210.055589][ T3277] RAX: ffffffffffffffda RBX: 00007fedf97b6160 RCX: 00007fedf958e969 [ 210.063551][ T3277] RDX: 000000000000000b RSI: 00002000000000c0 RDI: 0000000000000006 [ 210.071504][ T3277] RBP: 00007fedfa494090 R08: 0000000000000000 R09: 0000000000000000 [ 210.079459][ T3277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.087434][ T3277] R13: 0000000000000000 R14: 00007fedf97b6160 R15: 00007ffc9c9869e8 [ 210.095400][ T3277] [ 210.304416][ T3281] device syzkaller0 entered promiscuous mode [ 211.206091][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.225028][ T3310] O3ãc¤±: renamed from bridge_slave_0 [ 211.265564][ T3310] device pim6reg1 entered promiscuous mode [ 211.434341][ T3310] bond_slave_1: mtu less than device minimum [ 211.744757][ T3326] syz.4.973[3326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.744871][ T3326] syz.4.973[3326] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.959970][ T3328] device syzkaller0 entered promiscuous mode [ 213.206733][ T3356] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.394550][ T3356] O3ãc¤±: renamed from bridge_slave_0 [ 213.487002][ T3356] device pim6reg1 entered promiscuous mode [ 213.522338][ T3356] bond_slave_1: mtu less than device minimum [ 213.542642][ T3363] syz.4.988[3363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.542709][ T3363] syz.4.988[3363] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.257590][ T3363] device syzkaller0 entered promiscuous mode [ 215.357342][ T28] audit: type=1400 audit(1748415346.565:129): avc: denied { create } for pid=3405 comm="syz.1.1002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 216.343957][ T3427] syz.1.1010[3427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.344030][ T3427] syz.1.1010[3427] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.817219][ T3427] device syzkaller0 entered promiscuous mode [ 222.399470][ T3518] device syzkaller0 entered promiscuous mode [ 225.091882][ T3570] syz.1.1058[3570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.091964][ T3570] syz.1.1058[3570] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.198623][ T3572] syz.2.1059[3572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.307769][ T3572] syz.2.1059[3572] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.363844][ T3570] device syzkaller0 entered promiscuous mode [ 225.727491][ T3572] device syzkaller0 entered promiscuous mode [ 227.281029][ T3621] syz.1.1074[3621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.281096][ T3621] syz.1.1074[3621] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 227.813579][ T3621] device syzkaller0 entered promiscuous mode [ 228.445649][ T3650] FAULT_INJECTION: forcing a failure. [ 228.445649][ T3650] name failslab, interval 1, probability 0, space 0, times 0 [ 228.458310][ T3650] CPU: 0 PID: 3650 Comm: syz.0.1084 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 228.469597][ T3650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 228.479654][ T3650] Call Trace: [ 228.482941][ T3650] [ 228.485868][ T3650] __dump_stack+0x21/0x24 [ 228.490208][ T3650] dump_stack_lvl+0xee/0x150 [ 228.494799][ T3650] ? __cfi_dump_stack_lvl+0x8/0x8 [ 228.499827][ T3650] ? __bpf_redirect+0x8db/0x1130 [ 228.504772][ T3650] ? bpf_prog_6893982b85ceadf7+0x56/0x5b [ 228.510410][ T3650] ? bpf_test_run+0x349/0x8d0 [ 228.515099][ T3650] ? bpf_prog_test_run_skb+0xaec/0x1290 [ 228.520651][ T3650] ? __sys_bpf+0x56d/0x780 [ 228.525085][ T3650] ? __x64_sys_bpf+0x7c/0x90 [ 228.529689][ T3650] ? x64_sys_call+0x488/0x9a0 [ 228.534367][ T3650] ? do_syscall_64+0x4c/0xa0 [ 228.538960][ T3650] dump_stack+0x15/0x24 [ 228.543117][ T3650] should_fail_ex+0x3d4/0x520 [ 228.547790][ T3650] ? dst_alloc+0x16a/0x1e0 [ 228.552209][ T3650] __should_failslab+0xac/0xf0 [ 228.556970][ T3650] should_failslab+0x9/0x20 [ 228.561478][ T3650] kmem_cache_alloc+0x3b/0x330 [ 228.566239][ T3650] dst_alloc+0x16a/0x1e0 [ 228.570486][ T3650] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 228.576558][ T3650] ip_route_output_key_hash+0x131/0x1e0 [ 228.582113][ T3650] ? __cfi_ip_route_output_key_hash+0x10/0x10 [ 228.588185][ T3650] vti6_tnl_xmit+0xd9c/0x1980 [ 228.592868][ T3650] ? bpf_trace_run2+0x104/0x250 [ 228.597720][ T3650] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 228.602834][ T3650] ? __bpf_trace_net_dev_start_xmit+0x25/0x30 [ 228.608902][ T3650] ? __cfi___bpf_trace_net_dev_start_xmit+0x10/0x10 [ 228.615491][ T3650] dev_hard_start_xmit+0x20b/0x750 [ 228.620602][ T3650] __dev_queue_xmit+0x18d9/0x3420 [ 228.625635][ T3650] ? __dev_queue_xmit+0x250/0x3420 [ 228.630749][ T3650] ? __cfi___dev_queue_xmit+0x10/0x10 [ 228.636117][ T3650] ? __kasan_check_write+0x14/0x20 [ 228.641235][ T3650] ? skb_release_data+0x1d2/0x890 [ 228.646261][ T3650] ? skb_ensure_writable+0x2f8/0x470 [ 228.651546][ T3650] ? __kasan_check_write+0x14/0x20 [ 228.656669][ T3650] ? pskb_expand_head+0xc4a/0x1210 [ 228.661783][ T3650] __bpf_redirect+0x8db/0x1130 [ 228.666549][ T3650] bpf_clone_redirect+0x26a/0x3c0 [ 228.671573][ T3650] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 228.677036][ T3650] ? setup_swap_map_and_extents+0x14b0/0x18e0 [ 228.683106][ T3650] ? __build_skb+0x2d/0x410 [ 228.687611][ T3650] ? build_skb+0x24/0x200 [ 228.691944][ T3650] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 228.697490][ T3650] ? bpf_prog_test_run+0x3e3/0x630 [ 228.702600][ T3650] ? __sys_bpf+0x56d/0x780 [ 228.707035][ T3650] ? __x64_sys_bpf+0x7c/0x90 [ 228.711641][ T3650] ? x64_sys_call+0x488/0x9a0 [ 228.716317][ T3650] ? do_syscall_64+0x4c/0xa0 [ 228.720912][ T3650] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 228.726991][ T3650] ? __kasan_check_read+0x11/0x20 [ 228.732019][ T3650] ? bpf_test_timer_continue+0x147/0x4a0 [ 228.737662][ T3650] bpf_test_run+0x349/0x8d0 [ 228.742166][ T3650] ? kasan_save_alloc_info+0x25/0x30 [ 228.747464][ T3650] ? __kasan_slab_alloc+0x72/0x80 [ 228.752490][ T3650] ? convert___skb_to_skb+0x5b0/0x5b0 [ 228.757867][ T3650] ? __cfi_eth_type_trans+0x10/0x10 [ 228.763062][ T3650] ? __kasan_check_write+0x14/0x20 [ 228.768183][ T3650] ? convert___skb_to_skb+0x40/0x5b0 [ 228.773476][ T3650] bpf_prog_test_run_skb+0xaec/0x1290 [ 228.778853][ T3650] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 228.784658][ T3650] bpf_prog_test_run+0x3e3/0x630 [ 228.789590][ T3650] ? slab_free_freelist_hook+0xc2/0x190 [ 228.795139][ T3650] ? bpf_prog_query+0x270/0x270 [ 228.799984][ T3650] ? selinux_bpf+0xce/0xf0 [ 228.804409][ T3650] ? security_bpf+0x93/0xb0 [ 228.808906][ T3650] __sys_bpf+0x56d/0x780 [ 228.813154][ T3650] ? bpf_link_show_fdinfo+0x320/0x320 [ 228.818536][ T3650] ? __cfi_ksys_write+0x10/0x10 [ 228.823394][ T3650] ? debug_smp_processor_id+0x17/0x20 [ 228.828768][ T3650] __x64_sys_bpf+0x7c/0x90 [ 228.833194][ T3650] x64_sys_call+0x488/0x9a0 [ 228.837700][ T3650] do_syscall_64+0x4c/0xa0 [ 228.842124][ T3650] ? clear_bhb_loop+0x15/0x70 [ 228.846803][ T3650] ? clear_bhb_loop+0x15/0x70 [ 228.851503][ T3650] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 228.857407][ T3650] RIP: 0033:0x7f7042f8e969 [ 228.861819][ T3650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 228.881422][ T3650] RSP: 002b:00007f7043d5d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 228.889836][ T3650] RAX: ffffffffffffffda RBX: 00007f70431b5fa0 RCX: 00007f7042f8e969 [ 228.897806][ T3650] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 228.905769][ T3650] RBP: 00007f7043d5d090 R08: 0000000000000000 R09: 0000000000000000 [ 228.913735][ T3650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 228.921702][ T3650] R13: 0000000000000000 R14: 00007f70431b5fa0 R15: 00007fffbc9f2ab8 [ 228.929675][ T3650] [ 229.067191][ T3664] syz.1.1089[3664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.067250][ T3664] syz.1.1089[3664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 229.650229][ T3664] device syzkaller0 entered promiscuous mode [ 231.117146][ T3714] syz.2.1105[3714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.117216][ T3714] syz.2.1105[3714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.406036][ T3714] device syzkaller0 entered promiscuous mode [ 236.759519][ T3826] syz.4.1140[3826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.759590][ T3826] syz.4.1140[3826] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.862355][ T3829] syz.3.1143[3829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.071925][ T3829] syz.3.1143[3829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.386713][ T3830] device syzkaller0 entered promiscuous mode [ 237.679655][ T3835] device syzkaller0 entered promiscuous mode [ 241.018087][ T3882] syz.4.1160[3882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.018169][ T3882] syz.4.1160[3882] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.106972][ T3887] syz.0.1162[3887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.118455][ T3887] syz.0.1162[3887] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.417485][ T3882] device syzkaller0 entered promiscuous mode [ 241.974431][ T3895] device syzkaller0 entered promiscuous mode [ 244.909506][ T3945] syz.2.1180[3945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.909581][ T3945] syz.2.1180[3945] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 245.107695][ T3945] device syzkaller0 entered promiscuous mode [ 247.207761][ T3992] syz.4.1196[3992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.207830][ T3992] syz.4.1196[3992] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.467293][ T3992] device syzkaller0 entered promiscuous mode [ 247.925969][ T4009] syz.0.1213[4009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.926044][ T4009] syz.0.1213[4009] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 248.275748][ T4011] device syzkaller0 entered promiscuous mode [ 249.850633][ T4047] syz.3.1216[4047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.850700][ T4047] syz.3.1216[4047] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 249.973833][ T4052] FAULT_INJECTION: forcing a failure. [ 249.973833][ T4052] name failslab, interval 1, probability 0, space 0, times 0 [ 249.998292][ T4052] CPU: 1 PID: 4052 Comm: syz.0.1220 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 250.009573][ T4052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 250.019623][ T4052] Call Trace: [ 250.022899][ T4052] [ 250.025835][ T4052] __dump_stack+0x21/0x24 [ 250.030174][ T4052] dump_stack_lvl+0xee/0x150 [ 250.034779][ T4052] ? __cfi_dump_stack_lvl+0x8/0x8 [ 250.039807][ T4052] dump_stack+0x15/0x24 [ 250.043961][ T4052] should_fail_ex+0x3d4/0x520 [ 250.048641][ T4052] __should_failslab+0xac/0xf0 [ 250.053405][ T4052] ? tipc_nametbl_insert_publ+0x9a0/0x1460 [ 250.059222][ T4052] should_failslab+0x9/0x20 [ 250.063744][ T4052] __kmem_cache_alloc_node+0x3d/0x2c0 [ 250.069132][ T4052] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 250.074598][ T4052] ? tipc_nametbl_insert_publ+0x9a0/0x1460 [ 250.080405][ T4052] kmalloc_trace+0x29/0xb0 [ 250.084825][ T4052] tipc_nametbl_insert_publ+0x9a0/0x1460 [ 250.090465][ T4052] tipc_nametbl_publish+0x176/0x2f0 [ 250.095672][ T4052] tipc_sk_publish+0x1f8/0x440 [ 250.100444][ T4052] ? tipc_sk_withdraw+0x620/0x620 [ 250.105473][ T4052] ? tipc_nametbl_build_group+0x3d2/0x430 [ 250.111201][ T4052] tipc_sk_join+0x389/0x6a0 [ 250.115714][ T4052] ? __cfi_lock_sock_nested+0x10/0x10 [ 250.121093][ T4052] ? __tipc_sendstream+0x11a0/0x11a0 [ 250.126393][ T4052] ? __kasan_check_write+0x14/0x20 [ 250.131512][ T4052] tipc_setsockopt+0x684/0x900 [ 250.136283][ T4052] ? __cfi_tipc_setsockopt+0x10/0x10 [ 250.141574][ T4052] ? security_socket_setsockopt+0x93/0xb0 [ 250.147297][ T4052] ? __cfi_tipc_setsockopt+0x10/0x10 [ 250.152588][ T4052] __sys_setsockopt+0x306/0x4e0 [ 250.157450][ T4052] ? __cfi___sys_setsockopt+0x10/0x10 [ 250.162846][ T4052] ? ksys_write+0x1eb/0x240 [ 250.167382][ T4052] ? debug_smp_processor_id+0x17/0x20 [ 250.172760][ T4052] ? perf_trace_sys_enter+0x30/0x150 [ 250.178052][ T4052] __x64_sys_setsockopt+0xbf/0xd0 [ 250.183086][ T4052] x64_sys_call+0x124/0x9a0 [ 250.187601][ T4052] do_syscall_64+0x4c/0xa0 [ 250.192030][ T4052] ? clear_bhb_loop+0x15/0x70 [ 250.196707][ T4052] ? clear_bhb_loop+0x15/0x70 [ 250.201380][ T4052] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 250.207287][ T4052] RIP: 0033:0x7f7042f8e969 [ 250.211699][ T4052] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 250.231300][ T4052] RSP: 002b:00007f7043d5d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 250.239711][ T4052] RAX: ffffffffffffffda RBX: 00007f70431b5fa0 RCX: 00007f7042f8e969 [ 250.247677][ T4052] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000004 [ 250.255640][ T4052] RBP: 00007f7043d5d090 R08: 00000000000004bd R09: 0000000000000000 [ 250.263605][ T4052] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 250.271571][ T4052] R13: 0000000000000000 R14: 00007f70431b5fa0 R15: 00007fffbc9f2ab8 [ 250.279545][ T4052] [ 250.282605][ T4052] tipc: Failed to bind to 4294967295,0,0 [ 250.568069][ T4047] device syzkaller0 entered promiscuous mode [ 252.229294][ T4099] syz.3.1237[4099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.229354][ T4099] syz.3.1237[4099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.776615][ T4099] device syzkaller0 entered promiscuous mode [ 255.110352][ T4140] syz.4.1254[4140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.110574][ T4140] syz.4.1254[4140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.558855][ T4140] device syzkaller0 entered promiscuous mode [ 257.821412][ T4178] syz.2.1269[4178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.821481][ T4178] syz.2.1269[4178] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.013859][ T4178] device syzkaller0 entered promiscuous mode [ 258.412570][ T4195] ref_ctr_offset mismatch. inode: 0x557 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 258.538152][ T4196] GPL: port 1(erspan0) entered blocking state [ 258.561295][ T4196] GPL: port 1(erspan0) entered disabled state [ 258.589228][ T4196] device erspan0 entered promiscuous mode [ 258.615155][ T4195] GPL: port 1(erspan0) entered blocking state [ 258.621895][ T4195] GPL: port 1(erspan0) entered forwarding state [ 259.315411][ T4220] syz.3.1284[4220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.315482][ T4220] syz.3.1284[4220] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.489777][ T4217] device syzkaller0 entered promiscuous mode [ 261.244964][ T4265] syz.4.1300[4265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.250603][ T4265] syz.4.1300[4265] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 261.682875][ T4265] device syzkaller0 entered promiscuous mode [ 261.806434][ T4274] device syzkaller0 entered promiscuous mode [ 262.180618][ T4282] syz.0.1315[4282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.180686][ T4282] syz.0.1315[4282] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.487442][ T4332] device sit0 left promiscuous mode [ 264.578848][ T4336] syz.2.1323[4336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 264.578914][ T4336] syz.2.1323[4336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 265.214883][ T28] audit: type=1400 audit(1748415396.425:130): avc: denied { create } for pid=4358 comm="syz.4.1329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 265.731875][ T4378] ref_ctr_offset mismatch. inode: 0x55e offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 266.016485][ T4378] GPL: port 1(erspan0) entered blocking state [ 266.036251][ T4378] GPL: port 1(erspan0) entered disabled state [ 266.100645][ T4378] device erspan0 entered promiscuous mode [ 266.141812][ T4386] GPL: port 1(erspan0) entered blocking state [ 266.147926][ T4386] GPL: port 1(erspan0) entered forwarding state [ 266.904948][ T4411] device veth0_vlan left promiscuous mode [ 266.919567][ T4411] device veth0_vlan entered promiscuous mode [ 267.444361][ T4446] syz.1.1354[4446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.444425][ T4446] syz.1.1354[4446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.812701][ T4456] FAULT_INJECTION: forcing a failure. [ 267.812701][ T4456] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 267.839507][ T4456] CPU: 0 PID: 4456 Comm: syz.0.1358 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 267.850816][ T4456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 267.860879][ T4456] Call Trace: [ 267.864157][ T4456] [ 267.867092][ T4456] __dump_stack+0x21/0x24 [ 267.871432][ T4456] dump_stack_lvl+0xee/0x150 [ 267.876041][ T4456] ? __cfi_dump_stack_lvl+0x8/0x8 [ 267.881080][ T4456] dump_stack+0x15/0x24 [ 267.885243][ T4456] should_fail_ex+0x3d4/0x520 [ 267.889926][ T4456] should_fail+0xb/0x10 [ 267.894083][ T4456] should_fail_usercopy+0x1a/0x20 [ 267.899106][ T4456] _copy_from_user+0x1e/0xc0 [ 267.903699][ T4456] generic_map_update_batch+0x458/0x780 [ 267.909254][ T4456] ? __cfi_generic_map_update_batch+0x10/0x10 [ 267.915326][ T4456] ? __fdget+0x19c/0x220 [ 267.919574][ T4456] ? __cfi_generic_map_update_batch+0x10/0x10 [ 267.925640][ T4456] bpf_map_do_batch+0x48c/0x620 [ 267.930488][ T4456] __sys_bpf+0x624/0x780 [ 267.934735][ T4456] ? bpf_link_show_fdinfo+0x320/0x320 [ 267.940102][ T4456] ? debug_smp_processor_id+0x17/0x20 [ 267.945461][ T4456] ? perf_trace_sys_enter+0x30/0x150 [ 267.950731][ T4456] __x64_sys_bpf+0x7c/0x90 [ 267.955136][ T4456] x64_sys_call+0x488/0x9a0 [ 267.959630][ T4456] do_syscall_64+0x4c/0xa0 [ 267.964037][ T4456] ? clear_bhb_loop+0x15/0x70 [ 267.968698][ T4456] ? clear_bhb_loop+0x15/0x70 [ 267.973360][ T4456] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 267.979246][ T4456] RIP: 0033:0x7f7042f8e969 [ 267.983641][ T4456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.003230][ T4456] RSP: 002b:00007f7043d5d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 268.011627][ T4456] RAX: ffffffffffffffda RBX: 00007f70431b5fa0 RCX: 00007f7042f8e969 [ 268.019590][ T4456] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 268.027558][ T4456] RBP: 00007f7043d5d090 R08: 0000000000000000 R09: 0000000000000000 [ 268.035526][ T4456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 268.043482][ T4456] R13: 0000000000000000 R14: 00007f70431b5fa0 R15: 00007fffbc9f2ab8 [ 268.051444][ T4456] [ 268.298297][ T4461] device wg2 entered promiscuous mode [ 268.747589][ T4478] syz.0.1369[4478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 268.747662][ T4478] syz.0.1369[4478] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.299112][ T4508] syz.0.1381[4508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.340477][ T4508] syz.0.1381[4508] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.716485][ T4511] syz.0.1392[4511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 269.765577][ T4511] syz.0.1392[4511] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.550948][ T4552] device syzkaller0 entered promiscuous mode [ 271.581077][ T4555] syz.3.1399[4555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.581143][ T4555] syz.3.1399[4555] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.445866][ T4585] syz.4.1411[4585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.472562][ T4585] syz.4.1411[4585] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.627233][ T4677] bond_slave_1: mtu less than device minimum [ 276.689421][ T4680] syz.4.1446[4680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 276.689488][ T4680] syz.4.1446[4680] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.072411][ T4687] device pim6reg1 entered promiscuous mode [ 277.884282][ T28] audit: type=1400 audit(1748415409.095:131): avc: denied { create } for pid=4706 comm="syz.3.1457" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 277.944907][ T4714] syz.1.1460[4714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 277.945047][ T4714] syz.1.1460[4714] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 278.501803][ T4736] device macsec0 entered promiscuous mode [ 279.442197][ T4768] FAULT_INJECTION: forcing a failure. [ 279.442197][ T4768] name failslab, interval 1, probability 0, space 0, times 0 [ 279.454942][ T4768] CPU: 0 PID: 4768 Comm: syz.3.1482 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 279.466246][ T4768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 279.476301][ T4768] Call Trace: [ 279.479586][ T4768] [ 279.482526][ T4768] __dump_stack+0x21/0x24 [ 279.486873][ T4768] dump_stack_lvl+0xee/0x150 [ 279.491481][ T4768] ? __cfi_dump_stack_lvl+0x8/0x8 [ 279.496520][ T4768] ? __bpf_redirect+0x8db/0x1130 [ 279.501462][ T4768] ? bpf_prog_6893982b85ceadf7+0x56/0x5b [ 279.507092][ T4768] ? bpf_test_run+0x349/0x8d0 [ 279.511775][ T4768] ? bpf_prog_test_run_skb+0xaec/0x1290 [ 279.517329][ T4768] ? __sys_bpf+0x56d/0x780 [ 279.521760][ T4768] ? __x64_sys_bpf+0x7c/0x90 [ 279.526359][ T4768] ? x64_sys_call+0x488/0x9a0 [ 279.531044][ T4768] ? do_syscall_64+0x4c/0xa0 [ 279.535646][ T4768] dump_stack+0x15/0x24 [ 279.539813][ T4768] should_fail_ex+0x3d4/0x520 [ 279.544493][ T4768] ? dst_alloc+0x16a/0x1e0 [ 279.548911][ T4768] __should_failslab+0xac/0xf0 [ 279.553675][ T4768] should_failslab+0x9/0x20 [ 279.558181][ T4768] kmem_cache_alloc+0x3b/0x330 [ 279.562950][ T4768] dst_alloc+0x16a/0x1e0 [ 279.567198][ T4768] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 279.573279][ T4768] ip_route_output_key_hash+0x131/0x1e0 [ 279.578844][ T4768] ? __cfi_ip_route_output_key_hash+0x10/0x10 [ 279.584938][ T4768] ? 0xffffffffa0000960 [ 279.589094][ T4768] vti6_tnl_xmit+0xd9c/0x1980 [ 279.593810][ T4768] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 279.599974][ T4768] ? skb_network_protocol+0x505/0x750 [ 279.605350][ T4768] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 279.610476][ T4768] dev_hard_start_xmit+0x20b/0x750 [ 279.615600][ T4768] __dev_queue_xmit+0x18d9/0x3420 [ 279.620635][ T4768] ? __dev_queue_xmit+0x250/0x3420 [ 279.625746][ T4768] ? __cfi___dev_queue_xmit+0x10/0x10 [ 279.631122][ T4768] ? __kasan_check_write+0x14/0x20 [ 279.636240][ T4768] ? skb_release_data+0x1d2/0x890 [ 279.641281][ T4768] ? skb_ensure_writable+0x2f8/0x470 [ 279.646572][ T4768] ? __kasan_check_write+0x14/0x20 [ 279.651691][ T4768] ? pskb_expand_head+0xc4a/0x1210 [ 279.656813][ T4768] __bpf_redirect+0x8db/0x1130 [ 279.661584][ T4768] bpf_clone_redirect+0x26a/0x3c0 [ 279.666611][ T4768] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 279.672067][ T4768] ? setup_swap_map_and_extents+0x14b0/0x18e0 [ 279.678141][ T4768] ? __build_skb+0x2d/0x410 [ 279.682647][ T4768] ? build_skb+0x24/0x200 [ 279.686994][ T4768] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 279.692540][ T4768] ? bpf_prog_test_run+0x3e3/0x630 [ 279.697649][ T4768] ? __sys_bpf+0x56d/0x780 [ 279.702074][ T4768] ? __x64_sys_bpf+0x7c/0x90 [ 279.706671][ T4768] ? x64_sys_call+0x488/0x9a0 [ 279.711361][ T4768] ? do_syscall_64+0x4c/0xa0 [ 279.715964][ T4768] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 279.722050][ T4768] ? __kasan_check_read+0x11/0x20 [ 279.727077][ T4768] ? bpf_test_timer_continue+0x147/0x4a0 [ 279.732709][ T4768] bpf_test_run+0x349/0x8d0 [ 279.737212][ T4768] ? kasan_save_alloc_info+0x25/0x30 [ 279.742497][ T4768] ? __kasan_slab_alloc+0x72/0x80 [ 279.747530][ T4768] ? convert___skb_to_skb+0x5b0/0x5b0 [ 279.752903][ T4768] ? __cfi_eth_type_trans+0x10/0x10 [ 279.758099][ T4768] ? __kasan_check_write+0x14/0x20 [ 279.763214][ T4768] ? convert___skb_to_skb+0x40/0x5b0 [ 279.768504][ T4768] bpf_prog_test_run_skb+0xaec/0x1290 [ 279.773882][ T4768] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 279.779693][ T4768] bpf_prog_test_run+0x3e3/0x630 [ 279.784628][ T4768] ? slab_free_freelist_hook+0xc2/0x190 [ 279.790178][ T4768] ? bpf_prog_query+0x270/0x270 [ 279.795062][ T4768] ? selinux_bpf+0xce/0xf0 [ 279.799492][ T4768] ? security_bpf+0x93/0xb0 [ 279.803992][ T4768] __sys_bpf+0x56d/0x780 [ 279.808333][ T4768] ? bpf_link_show_fdinfo+0x320/0x320 [ 279.813724][ T4768] ? __cfi_ksys_write+0x10/0x10 [ 279.818581][ T4768] ? debug_smp_processor_id+0x17/0x20 [ 279.823958][ T4768] __x64_sys_bpf+0x7c/0x90 [ 279.828382][ T4768] x64_sys_call+0x488/0x9a0 [ 279.832886][ T4768] do_syscall_64+0x4c/0xa0 [ 279.837305][ T4768] ? clear_bhb_loop+0x15/0x70 [ 279.841982][ T4768] ? clear_bhb_loop+0x15/0x70 [ 279.846660][ T4768] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 279.852563][ T4768] RIP: 0033:0x7f89ef98e969 [ 279.856972][ T4768] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.876577][ T4768] RSP: 002b:00007f89f0720038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 279.884991][ T4768] RAX: ffffffffffffffda RBX: 00007f89efbb5fa0 RCX: 00007f89ef98e969 [ 279.892962][ T4768] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 279.900927][ T4768] RBP: 00007f89f0720090 R08: 0000000000000000 R09: 0000000000000000 [ 279.908894][ T4768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 279.916858][ T4768] R13: 0000000000000000 R14: 00007f89efbb5fa0 R15: 00007ffe37aabdf8 [ 279.924827][ T4768] [ 285.211015][ T4856] syz.4.1509[4856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.211086][ T4856] syz.4.1509[4856] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.131623][ T4876] device sit0 entered promiscuous mode [ 286.215189][ T4890] syz.3.1521[4890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.215254][ T4890] syz.3.1521[4890] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.483317][ T4899] syz.2.1523[4899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.562822][ T4895] device syzkaller0 entered promiscuous mode [ 286.586289][ T4899] syz.2.1523[4899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 286.961436][ T4899] device syzkaller0 entered promiscuous mode [ 289.633809][ T4964] syz.1.1541[4964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.633882][ T4964] syz.1.1541[4964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.456418][ T4964] device syzkaller0 entered promiscuous mode [ 292.041214][ T5006] syz.0.1556[5006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.041298][ T5006] syz.0.1556[5006] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.750873][ T5006] device syzkaller0 entered promiscuous mode [ 292.952250][ T5017] syz.4.1560[5017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.952323][ T5017] syz.4.1560[5017] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.409590][ T5244] syz.2.1644[5244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.455709][ T5244] syz.2.1644[5244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.263347][ T5244] device syzkaller0 entered promiscuous mode [ 311.826722][ T5290] device wg2 entered promiscuous mode [ 312.201786][ T5303] syz.4.1668[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.201852][ T5303] syz.4.1668[5303] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.633831][ T5340] syz.1.1681[5340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.692909][ T5340] syz.1.1681[5340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.336441][ T5342] device syzkaller0 entered promiscuous mode [ 319.351337][ T5436] syz.1.1716[5436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.351419][ T5436] syz.1.1716[5436] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.569005][ T5436] device syzkaller0 entered promiscuous mode [ 320.047129][ T5449] device veth0_vlan left promiscuous mode [ 320.125414][ T5449] device veth0_vlan entered promiscuous mode [ 320.157216][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 320.175408][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 320.202404][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.142922][ T5471] syz.2.1730[5471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.143014][ T5471] syz.2.1730[5471] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.553837][ T5471] device syzkaller0 entered promiscuous mode [ 322.514521][ T5504] FAULT_INJECTION: forcing a failure. [ 322.514521][ T5504] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.531213][ T5504] CPU: 1 PID: 5504 Comm: syz.3.1739 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 322.542513][ T5504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 322.552583][ T5504] Call Trace: [ 322.555863][ T5504] [ 322.558796][ T5504] __dump_stack+0x21/0x24 [ 322.563133][ T5504] dump_stack_lvl+0xee/0x150 [ 322.567720][ T5504] ? __cfi_dump_stack_lvl+0x8/0x8 [ 322.572743][ T5504] ? migrate_enable+0x19c/0x280 [ 322.577595][ T5504] dump_stack+0x15/0x24 [ 322.581750][ T5504] should_fail_ex+0x3d4/0x520 [ 322.586418][ T5504] should_fail+0xb/0x10 [ 322.590565][ T5504] should_fail_usercopy+0x1a/0x20 [ 322.595581][ T5504] _copy_from_user+0x1e/0xc0 [ 322.600163][ T5504] generic_map_update_batch+0x458/0x780 [ 322.605701][ T5504] ? __cfi_generic_map_update_batch+0x10/0x10 [ 322.611760][ T5504] ? __cfi_generic_map_update_batch+0x10/0x10 [ 322.617818][ T5504] bpf_map_do_batch+0x48c/0x620 [ 322.622657][ T5504] __sys_bpf+0x624/0x780 [ 322.626900][ T5504] ? bpf_link_show_fdinfo+0x320/0x320 [ 322.632283][ T5504] ? __cfi_ksys_write+0x10/0x10 [ 322.637122][ T5504] ? debug_smp_processor_id+0x17/0x20 [ 322.642484][ T5504] __x64_sys_bpf+0x7c/0x90 [ 322.646900][ T5504] x64_sys_call+0x488/0x9a0 [ 322.651395][ T5504] do_syscall_64+0x4c/0xa0 [ 322.655800][ T5504] ? clear_bhb_loop+0x15/0x70 [ 322.660461][ T5504] ? clear_bhb_loop+0x15/0x70 [ 322.665121][ T5504] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 322.671007][ T5504] RIP: 0033:0x7f89ef98e969 [ 322.675409][ T5504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.694999][ T5504] RSP: 002b:00007f89f0720038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 322.703414][ T5504] RAX: ffffffffffffffda RBX: 00007f89efbb5fa0 RCX: 00007f89ef98e969 [ 322.711374][ T5504] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 322.719341][ T5504] RBP: 00007f89f0720090 R08: 0000000000000000 R09: 0000000000000000 [ 322.727300][ T5504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 322.735265][ T5504] R13: 0000000000000000 R14: 00007f89efbb5fa0 R15: 00007ffe37aabdf8 [ 322.743228][ T5504] [ 323.631597][ T5538] syz.3.1754[5538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 323.631702][ T5538] syz.3.1754[5538] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.539339][ T5538] device syzkaller0 entered promiscuous mode [ 327.348913][ T5605] syz.1.1787[5605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.348982][ T5605] syz.1.1787[5605] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 327.776283][ T5617] FAULT_INJECTION: forcing a failure. [ 327.776283][ T5617] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 327.801299][ T5617] CPU: 1 PID: 5617 Comm: syz.3.1779 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 327.812585][ T5617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 327.822639][ T5617] Call Trace: [ 327.825916][ T5617] [ 327.828844][ T5617] __dump_stack+0x21/0x24 [ 327.833205][ T5617] dump_stack_lvl+0xee/0x150 [ 327.837807][ T5617] ? __cfi_dump_stack_lvl+0x8/0x8 [ 327.842842][ T5617] ? __rcu_read_unlock+0xa0/0xa0 [ 327.847786][ T5617] ? migrate_enable+0x19c/0x280 [ 327.852637][ T5617] dump_stack+0x15/0x24 [ 327.856799][ T5617] should_fail_ex+0x3d4/0x520 [ 327.861485][ T5617] should_fail+0xb/0x10 [ 327.865646][ T5617] should_fail_usercopy+0x1a/0x20 [ 327.870676][ T5617] _copy_to_user+0x1e/0x90 [ 327.875097][ T5617] bpf_test_finish+0x247/0x6b0 [ 327.879873][ T5617] ? convert_skb_to___skb+0x430/0x430 [ 327.885256][ T5617] ? bpf_prog_test_run_skb+0xabc/0x1290 [ 327.890810][ T5617] bpf_prog_test_run_skb+0xce1/0x1290 [ 327.896188][ T5617] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 327.901996][ T5617] bpf_prog_test_run+0x3e3/0x630 [ 327.906945][ T5617] ? bpf_prog_query+0x270/0x270 [ 327.911794][ T5617] ? selinux_bpf+0xce/0xf0 [ 327.912269][ T5605] device syzkaller0 entered promiscuous mode [ 327.916217][ T5617] ? security_bpf+0x93/0xb0 [ 327.916241][ T5617] __sys_bpf+0x56d/0x780 [ 327.916272][ T5617] ? bpf_link_show_fdinfo+0x320/0x320 [ 327.916313][ T5617] __x64_sys_bpf+0x7c/0x90 [ 327.916342][ T5617] x64_sys_call+0x488/0x9a0 [ 327.916367][ T5617] do_syscall_64+0x4c/0xa0 [ 327.916395][ T5617] ? clear_bhb_loop+0x15/0x70 [ 327.916416][ T5617] ? clear_bhb_loop+0x15/0x70 [ 327.916437][ T5617] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 327.964945][ T5617] RIP: 0033:0x7f89ef98e969 [ 327.969360][ T5617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 327.988966][ T5617] RSP: 002b:00007f89f0720038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 327.997388][ T5617] RAX: ffffffffffffffda RBX: 00007f89efbb5fa0 RCX: 00007f89ef98e969 [ 328.005356][ T5617] RDX: 0000000000000050 RSI: 0000200000000440 RDI: 000000000000000a [ 328.013331][ T5617] RBP: 00007f89f0720090 R08: 0000000000000000 R09: 0000000000000000 [ 328.021306][ T5617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.029278][ T5617] R13: 0000000000000000 R14: 00007f89efbb5fa0 R15: 00007ffe37aabdf8 [ 328.037285][ T5617] [ 328.325657][ T5631] device wg2 entered promiscuous mode [ 329.077251][ T5654] syz.2.1793[5654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.077328][ T5654] syz.2.1793[5654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.222268][ T5654] device syzkaller0 entered promiscuous mode [ 331.042628][ T5699] syz.0.1810[5699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.042700][ T5699] syz.0.1810[5699] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.298514][ T5699] device syzkaller0 entered promiscuous mode [ 331.999148][ T28] audit: type=1400 audit(1748415463.205:132): avc: denied { ioctl } for pid=5725 comm="syz.1.1821" path="socket:[33676]" dev="sockfs" ino=33676 ioctlcmd=0x8924 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 332.854345][ T5754] syz.2.1832[5754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 332.854417][ T5754] syz.2.1832[5754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 333.435184][ T5754] device syzkaller0 entered promiscuous mode [ 334.102480][ T5789] syz.0.1846[5789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.102559][ T5789] syz.0.1846[5789] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.499091][ T5789] device syzkaller0 entered promiscuous mode [ 337.363068][ T5843] syz.2.1865[5843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.363146][ T5843] syz.2.1865[5843] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 337.767895][ T5843] device syzkaller0 entered promiscuous mode [ 337.840296][ T5854] FAULT_INJECTION: forcing a failure. [ 337.840296][ T5854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.853955][ T5854] CPU: 0 PID: 5854 Comm: syz.4.1869 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 337.865248][ T5854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 337.875294][ T5854] Call Trace: [ 337.878563][ T5854] [ 337.881480][ T5854] __dump_stack+0x21/0x24 [ 337.885805][ T5854] dump_stack_lvl+0xee/0x150 [ 337.890388][ T5854] ? __cfi_dump_stack_lvl+0x8/0x8 [ 337.895409][ T5854] dump_stack+0x15/0x24 [ 337.899554][ T5854] should_fail_ex+0x3d4/0x520 [ 337.904217][ T5854] should_fail+0xb/0x10 [ 337.908357][ T5854] should_fail_usercopy+0x1a/0x20 [ 337.913367][ T5854] _copy_from_user+0x1e/0xc0 [ 337.917949][ T5854] generic_map_update_batch+0x4b1/0x780 [ 337.923506][ T5854] ? __cfi_generic_map_update_batch+0x10/0x10 [ 337.929564][ T5854] ? __fdget+0x19c/0x220 [ 337.933795][ T5854] ? __cfi_generic_map_update_batch+0x10/0x10 [ 337.939853][ T5854] bpf_map_do_batch+0x48c/0x620 [ 337.944693][ T5854] __sys_bpf+0x624/0x780 [ 337.948932][ T5854] ? bpf_link_show_fdinfo+0x320/0x320 [ 337.954298][ T5854] ? fpregs_restore_userregs+0x128/0x260 [ 337.959918][ T5854] __x64_sys_bpf+0x7c/0x90 [ 337.964331][ T5854] x64_sys_call+0x488/0x9a0 [ 337.968821][ T5854] do_syscall_64+0x4c/0xa0 [ 337.973227][ T5854] ? clear_bhb_loop+0x15/0x70 [ 337.977888][ T5854] ? clear_bhb_loop+0x15/0x70 [ 337.982551][ T5854] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 337.988435][ T5854] RIP: 0033:0x7f18ac38e969 [ 337.992833][ T5854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 338.012423][ T5854] RSP: 002b:00007f18ad2c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 338.020823][ T5854] RAX: ffffffffffffffda RBX: 00007f18ac5b5fa0 RCX: 00007f18ac38e969 [ 338.028785][ T5854] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 338.036741][ T5854] RBP: 00007f18ad2c5090 R08: 0000000000000000 R09: 0000000000000000 [ 338.044700][ T5854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 338.052656][ T5854] R13: 0000000000000000 R14: 00007f18ac5b5fa0 R15: 00007fffbb75a2e8 [ 338.060614][ T5854] [ 338.099521][ T5857] device wg2 left promiscuous mode [ 340.049008][ T5897] syz.3.1884[5897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.049075][ T5897] syz.3.1884[5897] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.622163][ T5922] FAULT_INJECTION: forcing a failure. [ 341.622163][ T5922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 341.652645][ T5922] CPU: 1 PID: 5922 Comm: syz.4.1893 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 341.663946][ T5922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 341.674002][ T5922] Call Trace: [ 341.677276][ T5922] [ 341.680207][ T5922] __dump_stack+0x21/0x24 [ 341.684564][ T5922] dump_stack_lvl+0xee/0x150 [ 341.689185][ T5922] ? __cfi_dump_stack_lvl+0x8/0x8 [ 341.694222][ T5922] ? __rcu_read_unlock+0xa0/0xa0 [ 341.699193][ T5922] ? migrate_enable+0x19c/0x280 [ 341.702805][ T5897] device syzkaller0 entered promiscuous mode [ 341.704051][ T5922] dump_stack+0x15/0x24 [ 341.714164][ T5922] should_fail_ex+0x3d4/0x520 [ 341.718854][ T5922] should_fail+0xb/0x10 [ 341.723013][ T5922] should_fail_usercopy+0x1a/0x20 [ 341.728043][ T5922] _copy_to_user+0x1e/0x90 [ 341.732462][ T5922] bpf_test_finish+0x247/0x6b0 [ 341.737237][ T5922] ? convert_skb_to___skb+0x430/0x430 [ 341.742634][ T5922] ? __kasan_check_write+0x14/0x20 [ 341.747795][ T5922] bpf_prog_test_run_skb+0xce1/0x1290 [ 341.753175][ T5922] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 341.758979][ T5922] bpf_prog_test_run+0x3e3/0x630 [ 341.763904][ T5922] ? bpf_prog_query+0x270/0x270 [ 341.768741][ T5922] ? selinux_bpf+0xce/0xf0 [ 341.773169][ T5922] ? security_bpf+0x93/0xb0 [ 341.777669][ T5922] __sys_bpf+0x56d/0x780 [ 341.781915][ T5922] ? bpf_link_show_fdinfo+0x320/0x320 [ 341.787285][ T5922] ? __cfi_sched_clock_cpu+0x10/0x10 [ 341.792565][ T5922] __x64_sys_bpf+0x7c/0x90 [ 341.796975][ T5922] x64_sys_call+0x488/0x9a0 [ 341.801473][ T5922] do_syscall_64+0x4c/0xa0 [ 341.805899][ T5922] ? clear_bhb_loop+0x15/0x70 [ 341.810562][ T5922] ? clear_bhb_loop+0x15/0x70 [ 341.815222][ T5922] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 341.821107][ T5922] RIP: 0033:0x7f18ac38e969 [ 341.825504][ T5922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.845099][ T5922] RSP: 002b:00007f18ad2c5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.853498][ T5922] RAX: ffffffffffffffda RBX: 00007f18ac5b5fa0 RCX: 00007f18ac38e969 [ 341.861458][ T5922] RDX: 0000000000000050 RSI: 0000200000000440 RDI: 000000000000000a [ 341.869431][ T5922] RBP: 00007f18ad2c5090 R08: 0000000000000000 R09: 0000000000000000 [ 341.877388][ T5922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.885347][ T5922] R13: 0000000000000000 R14: 00007f18ac5b5fa0 R15: 00007fffbb75a2e8 [ 341.893326][ T5922] [ 343.419127][ T5967] device pim6reg1 entered promiscuous mode [ 345.086096][ T5998] device syzkaller0 entered promiscuous mode [ 345.933381][ T6035] syz.2.1931[6035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 345.933450][ T6035] syz.2.1931[6035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.470601][ T6035] device syzkaller0 entered promiscuous mode [ 346.951323][ T6059] device veth1_macvtap entered promiscuous mode [ 346.990989][ T6059] device macsec0 entered promiscuous mode [ 347.012858][ T28] audit: type=1400 audit(1748415478.215:133): avc: denied { create } for pid=6047 comm="syz.4.1936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 347.104448][ T484] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 350.399406][ T6099] syz.1.1951[6099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.399475][ T6099] syz.1.1951[6099] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 351.785409][ T6099] device syzkaller0 entered promiscuous mode [ 356.825215][ T6157] syz.0.1974[6157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.825283][ T6157] syz.0.1974[6157] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 357.819462][ T6157] device syzkaller0 entered promiscuous mode [ 358.210820][ T6147] device pim6reg1 entered promiscuous mode [ 363.160023][ T6197] device wg2 left promiscuous mode [ 363.545416][ T6207] syz.3.1990[6207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.545497][ T6207] syz.3.1990[6207] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.557386][ T6201] device veth0_vlan left promiscuous mode [ 363.595880][ T6201] device veth0_vlan entered promiscuous mode [ 363.651113][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.662223][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.671304][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 364.057158][ T6214] device syzkaller0 entered promiscuous mode [ 364.223845][ T6225] syz.2.1996[6225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.223914][ T6225] syz.2.1996[6225] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 364.845108][ T6225] device syzkaller0 entered promiscuous mode [ 365.561439][ T6249] device wg2 entered promiscuous mode [ 365.595687][ T6257] syz.2.2007[6257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.595752][ T6257] syz.2.2007[6257] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 365.669383][ T6249] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.795354][ T6261] device bridge_slave_1 left promiscuous mode [ 365.861780][ T6261] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.872411][ T6261] device O3ãc¤± left promiscuous mode [ 365.877991][ T6261] bridge0: port 1(O3ãc¤±) entered disabled state [ 366.206941][ T6268] device syzkaller0 entered promiscuous mode [ 366.821470][ T6287] FAULT_INJECTION: forcing a failure. [ 366.821470][ T6287] name failslab, interval 1, probability 0, space 0, times 0 [ 366.902131][ T6287] CPU: 1 PID: 6287 Comm: syz.1.2016 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 366.913442][ T6287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 366.923500][ T6287] Call Trace: [ 366.926775][ T6287] [ 366.929710][ T6287] __dump_stack+0x21/0x24 [ 366.934049][ T6287] dump_stack_lvl+0xee/0x150 [ 366.938643][ T6287] ? __cfi_dump_stack_lvl+0x8/0x8 [ 366.943683][ T6287] dump_stack+0x15/0x24 [ 366.947850][ T6287] should_fail_ex+0x3d4/0x520 [ 366.952530][ T6287] __should_failslab+0xac/0xf0 [ 366.957300][ T6287] should_failslab+0x9/0x20 [ 366.961812][ T6287] slab_pre_alloc_hook+0x30/0x1e0 [ 366.966888][ T6287] kmem_cache_alloc_lru+0x49/0x280 [ 366.972002][ T6287] ? __d_alloc+0x34/0x6c0 [ 366.976357][ T6287] __d_alloc+0x34/0x6c0 [ 366.980521][ T6287] ? radix_tree_iter_tag_clear+0x68/0x80 [ 366.986156][ T6287] d_alloc_pseudo+0x1d/0x70 [ 366.990660][ T6287] alloc_file_pseudo+0xc8/0x1f0 [ 366.995511][ T6287] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 367.000968][ T6287] ? __kasan_check_write+0x14/0x20 [ 367.006089][ T6287] ? _raw_spin_lock_bh+0x8e/0xe0 [ 367.011037][ T6287] anon_inode_getfile+0xa6/0x180 [ 367.015977][ T6287] bpf_link_prime+0xf0/0x250 [ 367.020655][ T6287] bpf_raw_tp_link_attach+0x273/0x550 [ 367.026016][ T6287] ? bpf_insn_prepare_dump+0x840/0x840 [ 367.031463][ T6287] ? __kasan_check_write+0x14/0x20 [ 367.036567][ T6287] bpf_raw_tracepoint_open+0x258/0x480 [ 367.042014][ T6287] ? slab_free_freelist_hook+0xc2/0x190 [ 367.047554][ T6287] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 367.053258][ T6287] ? selinux_bpf+0xce/0xf0 [ 367.057667][ T6287] ? security_bpf+0x93/0xb0 [ 367.062158][ T6287] __sys_bpf+0x4d1/0x780 [ 367.066398][ T6287] ? bpf_link_show_fdinfo+0x320/0x320 [ 367.071765][ T6287] ? __cfi_ksys_write+0x10/0x10 [ 367.076612][ T6287] ? debug_smp_processor_id+0x17/0x20 [ 367.081977][ T6287] __x64_sys_bpf+0x7c/0x90 [ 367.086387][ T6287] x64_sys_call+0x488/0x9a0 [ 367.090884][ T6287] do_syscall_64+0x4c/0xa0 [ 367.095297][ T6287] ? clear_bhb_loop+0x15/0x70 [ 367.099972][ T6287] ? clear_bhb_loop+0x15/0x70 [ 367.104643][ T6287] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 367.110537][ T6287] RIP: 0033:0x7f20f398e969 [ 367.114938][ T6287] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.134533][ T6287] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 367.142939][ T6287] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 367.150900][ T6287] RDX: 0000000000000010 RSI: 0000200000000040 RDI: 0000000000000011 [ 367.158864][ T6287] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 367.166828][ T6287] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 367.174792][ T6287] R13: 0000000000000000 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 367.182772][ T6287] [ 367.280289][ T6295] syz.3.2018[6295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.280355][ T6295] syz.3.2018[6295] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 367.338991][ T6303] FAULT_INJECTION: forcing a failure. [ 367.338991][ T6303] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 367.364306][ T6303] CPU: 1 PID: 6303 Comm: syz.1.2022 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 367.375593][ T6303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 367.385646][ T6303] Call Trace: [ 367.388927][ T6303] [ 367.391856][ T6303] __dump_stack+0x21/0x24 [ 367.396196][ T6303] dump_stack_lvl+0xee/0x150 [ 367.400795][ T6303] ? __cfi_dump_stack_lvl+0x8/0x8 [ 367.405824][ T6303] ? xas_create+0x618/0x16d0 [ 367.410413][ T6303] ? shmem_add_to_page_cache+0x6d8/0xac0 [ 367.416049][ T6303] dump_stack+0x15/0x24 [ 367.420210][ T6303] should_fail_ex+0x3d4/0x520 [ 367.424880][ T6303] should_fail_alloc_page+0x61/0x90 [ 367.430074][ T6303] prepare_alloc_pages+0x148/0x5f0 [ 367.435176][ T6303] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 367.440368][ T6303] __alloc_pages+0x115/0x3a0 [ 367.444950][ T6303] ? __cfi___alloc_pages+0x10/0x10 [ 367.450064][ T6303] ? percpu_counter_add_batch+0x13c/0x160 [ 367.455783][ T6303] __folio_alloc+0x12/0x40 [ 367.460196][ T6303] shmem_alloc_and_acct_folio+0x650/0x870 [ 367.465903][ T6303] ? shmem_replace_folio+0x590/0x590 [ 367.471180][ T6303] ? xas_load+0x39e/0x3b0 [ 367.475497][ T6303] ? __filemap_get_folio+0x93e/0x980 [ 367.480781][ T6303] ? __cfi___filemap_get_folio+0x10/0x10 [ 367.486417][ T6303] ? do_user_addr_fault+0x9ac/0x1050 [ 367.491698][ T6303] shmem_get_folio_gfp+0x119f/0x2230 [ 367.496989][ T6303] shmem_write_begin+0xea/0x2c0 [ 367.501830][ T6303] generic_perform_write+0x2f6/0x6d0 [ 367.507112][ T6303] ? __cfi_generic_perform_write+0x10/0x10 [ 367.512914][ T6303] ? __cfi_file_update_time+0x10/0x10 [ 367.518287][ T6303] __generic_file_write_iter+0x227/0x580 [ 367.523906][ T6303] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 367.529617][ T6303] ? __cfi___generic_file_write_iter+0x10/0x10 [ 367.535762][ T6303] ? rwsem_write_trylock+0x130/0x300 [ 367.541048][ T6303] ? generic_write_checks_count+0x3c6/0x4a0 [ 367.546935][ T6303] ? generic_write_checks+0xca/0x100 [ 367.552207][ T6303] generic_file_write_iter+0xae/0x310 [ 367.557565][ T6303] vfs_write+0x5db/0xca0 [ 367.561799][ T6303] ? slab_free_freelist_hook+0xc2/0x190 [ 367.567342][ T6303] ? __cfi_vfs_write+0x10/0x10 [ 367.572097][ T6303] ? __cfi_mutex_lock+0x10/0x10 [ 367.576947][ T6303] ? __fdget_pos+0x2cd/0x380 [ 367.581527][ T6303] ? ksys_write+0x71/0x240 [ 367.585938][ T6303] ksys_write+0x140/0x240 [ 367.590290][ T6303] ? __cfi_ksys_write+0x10/0x10 [ 367.595133][ T6303] ? debug_smp_processor_id+0x17/0x20 [ 367.600497][ T6303] __x64_sys_write+0x7b/0x90 [ 367.605079][ T6303] x64_sys_call+0x27b/0x9a0 [ 367.609578][ T6303] do_syscall_64+0x4c/0xa0 [ 367.613988][ T6303] ? clear_bhb_loop+0x15/0x70 [ 367.618650][ T6303] ? clear_bhb_loop+0x15/0x70 [ 367.623313][ T6303] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 367.629202][ T6303] RIP: 0033:0x7f20f398e969 [ 367.633608][ T6303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.653201][ T6303] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 367.661602][ T6303] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 367.669567][ T6303] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000008 [ 367.677528][ T6303] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 367.685490][ T6303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 367.693450][ T6303] R13: 0000000000000000 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 367.701420][ T6303] [ 367.965490][ T6295] device syzkaller0 entered promiscuous mode [ 368.148794][ T6312] syz.2.2026[6312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.148865][ T6312] syz.2.2026[6312] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.494305][ T6312] device syzkaller0 entered promiscuous mode [ 368.526505][ T6320] device wg2 entered promiscuous mode [ 368.532429][ T6321] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.552548][ T6317] device bridge_slave_1 left promiscuous mode [ 368.558683][ T6317] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.569342][ T6317] device O3ãc¤± left promiscuous mode [ 368.575063][ T6317] bridge0: port 1(O3ãc¤±) entered disabled state [ 369.096022][ T28] audit: type=1400 audit(1748415500.305:134): avc: denied { create } for pid=6332 comm="syz.1.2032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 369.647482][ T6353] syz.2.2039[6353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.647546][ T6353] syz.2.2039[6353] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.184791][ T6353] device syzkaller0 entered promiscuous mode [ 372.632022][ T6406] syz.0.2056[6406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.632089][ T6406] syz.0.2056[6406] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.309716][ T6406] device syzkaller0 entered promiscuous mode [ 373.864260][ T6433] device sit0 entered promiscuous mode [ 376.119823][ T28] audit: type=1400 audit(1748415507.325:135): avc: denied { ioctl } for pid=6460 comm="syz.4.2071" path="net:[4026532631]" dev="nsfs" ino=4026532631 ioctlcmd=0x9409 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 376.803145][ T6470] device pim6reg1 entered promiscuous mode [ 377.619694][ T6484] syz.0.2080[6484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 377.619763][ T6484] syz.0.2080[6484] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 378.154328][ T6484] device syzkaller0 entered promiscuous mode [ 380.433690][ T6534] syz.2.2097[6534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.433799][ T6534] syz.2.2097[6534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.118830][ T6540] syz.3.2099[6540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.130345][ T6540] syz.3.2099[6540] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.279281][ T6540] device syzkaller0 entered promiscuous mode [ 386.105437][ T6615] syz.3.2124[6615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.105508][ T6615] syz.3.2124[6615] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.522058][ T6615] device syzkaller0 entered promiscuous mode [ 386.687761][ T6632] FAULT_INJECTION: forcing a failure. [ 386.687761][ T6632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.707125][ T6632] CPU: 1 PID: 6632 Comm: syz.0.2130 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 386.718417][ T6632] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 386.728471][ T6632] Call Trace: [ 386.731744][ T6632] [ 386.734672][ T6632] __dump_stack+0x21/0x24 [ 386.739018][ T6632] dump_stack_lvl+0xee/0x150 [ 386.743616][ T6632] ? __cfi_dump_stack_lvl+0x8/0x8 [ 386.748647][ T6632] dump_stack+0x15/0x24 [ 386.752810][ T6632] should_fail_ex+0x3d4/0x520 [ 386.757491][ T6632] should_fail+0xb/0x10 [ 386.761647][ T6632] should_fail_usercopy+0x1a/0x20 [ 386.766680][ T6632] _copy_to_user+0x1e/0x90 [ 386.771109][ T6632] simple_read_from_buffer+0xe9/0x160 [ 386.776494][ T6632] proc_fail_nth_read+0x19a/0x210 [ 386.781533][ T6632] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 386.787087][ T6632] ? security_file_permission+0x94/0xb0 [ 386.792637][ T6632] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 386.798194][ T6632] vfs_read+0x26e/0x8c0 [ 386.802357][ T6632] ? __cfi_vfs_read+0x10/0x10 [ 386.807035][ T6632] ? irqentry_exit+0x37/0x40 [ 386.811639][ T6632] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 386.817443][ T6632] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 386.823594][ T6632] ksys_read+0x140/0x240 [ 386.827854][ T6632] ? __cfi_ksys_read+0x10/0x10 [ 386.832619][ T6632] ? fpregs_restore_userregs+0x128/0x260 [ 386.838248][ T6632] __x64_sys_read+0x7b/0x90 [ 386.842754][ T6632] x64_sys_call+0x2f/0x9a0 [ 386.847168][ T6632] do_syscall_64+0x4c/0xa0 [ 386.851584][ T6632] ? clear_bhb_loop+0x15/0x70 [ 386.856253][ T6632] ? clear_bhb_loop+0x15/0x70 [ 386.860923][ T6632] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 386.866820][ T6632] RIP: 0033:0x7f7042f8d37c [ 386.871231][ T6632] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 386.890829][ T6632] RSP: 002b:00007f7043d5d030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 386.899239][ T6632] RAX: ffffffffffffffda RBX: 00007f70431b5fa0 RCX: 00007f7042f8d37c [ 386.907207][ T6632] RDX: 000000000000000f RSI: 00007f7043d5d0a0 RDI: 000000000000004d [ 386.915171][ T6632] RBP: 00007f7043d5d090 R08: 0000000000000000 R09: 0000000000000000 [ 386.923139][ T6632] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 386.931102][ T6632] R13: 0000000000000000 R14: 00007f70431b5fa0 R15: 00007fffbc9f2ab8 [ 386.939074][ T6632] [ 387.298645][ T28] audit: type=1400 audit(1748415518.505:136): avc: denied { create } for pid=6653 comm="syz.3.2140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 388.566891][ T6688] tap0: tun_chr_ioctl cmd 1074025677 [ 388.573236][ T6688] tap0: linktype set to 823 [ 390.302427][ T6716] device pim6reg1 entered promiscuous mode [ 393.150189][ T28] audit: type=1400 audit(1748415524.355:137): avc: denied { create } for pid=6761 comm="syz.1.2175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 393.202347][ T6759] device veth0_vlan left promiscuous mode [ 393.228382][ T6759] device veth0_vlan entered promiscuous mode [ 394.849305][ T28] audit: type=1400 audit(1748415526.055:138): avc: denied { create } for pid=6777 comm="syz.1.2180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 395.929715][ T6812] device veth1_macvtap left promiscuous mode [ 396.035308][ T6812] device macsec0 left promiscuous mode [ 396.145128][ T6814] device veth1_macvtap entered promiscuous mode [ 396.169150][ T6814] device macsec0 entered promiscuous mode [ 397.194690][ T6853] FAULT_INJECTION: forcing a failure. [ 397.194690][ T6853] name failslab, interval 1, probability 0, space 0, times 0 [ 397.207473][ T6853] CPU: 0 PID: 6853 Comm: syz.2.2206 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 397.218759][ T6853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 397.228814][ T6853] Call Trace: [ 397.232094][ T6853] [ 397.235024][ T6853] __dump_stack+0x21/0x24 [ 397.239366][ T6853] dump_stack_lvl+0xee/0x150 [ 397.243975][ T6853] ? __cfi_dump_stack_lvl+0x8/0x8 [ 397.249006][ T6853] dump_stack+0x15/0x24 [ 397.253169][ T6853] should_fail_ex+0x3d4/0x520 [ 397.257860][ T6853] __should_failslab+0xac/0xf0 [ 397.262626][ T6853] ? alloc_fair_sched_group+0x4d/0x670 [ 397.268139][ T6853] should_failslab+0x9/0x20 [ 397.272662][ T6853] __kmem_cache_alloc_node+0x3d/0x2c0 [ 397.278055][ T6853] ? alloc_fair_sched_group+0x4d/0x670 [ 397.283508][ T6853] __kmalloc+0xa1/0x1e0 [ 397.287659][ T6853] alloc_fair_sched_group+0x4d/0x670 [ 397.292958][ T6853] ? sched_create_group+0x22/0x250 [ 397.298059][ T6853] ? kmem_cache_alloc+0x16e/0x330 [ 397.303073][ T6853] ? sched_create_group+0x22/0x250 [ 397.308168][ T6853] sched_create_group+0x43/0x250 [ 397.313093][ T6853] cpu_cgroup_css_alloc+0xe/0x30 [ 397.318016][ T6853] cgroup_apply_control_enable+0x392/0xe10 [ 397.323829][ T6853] cgroup_apply_control+0x8f/0x690 [ 397.328931][ T6853] ? css_next_child+0x170/0x170 [ 397.333780][ T6853] ? __cfi_autoremove_wake_function+0x10/0x10 [ 397.339836][ T6853] ? __kasan_check_write+0x14/0x20 [ 397.344938][ T6853] ? cgroup_kn_lock_live+0x19f/0x2e0 [ 397.350216][ T6853] cgroup_subtree_control_write+0xdf7/0x1410 [ 397.356190][ T6853] ? __cfi_cgroup_subtree_control_write+0x10/0x10 [ 397.362595][ T6853] ? __kasan_check_write+0x14/0x20 [ 397.367694][ T6853] ? _copy_from_iter+0x205/0xfd0 [ 397.372622][ T6853] ? __cfi_cgroup_subtree_control_write+0x10/0x10 [ 397.379027][ T6853] cgroup_file_write+0x2a7/0x580 [ 397.383959][ T6853] ? __cfi_cgroup_file_write+0x10/0x10 [ 397.389406][ T6853] ? mutex_lock+0x8d/0x1a0 [ 397.393822][ T6853] ? __cfi_mutex_lock+0x10/0x10 [ 397.398671][ T6853] ? __kasan_check_write+0x14/0x20 [ 397.403777][ T6853] kernfs_fop_write_iter+0x2d6/0x410 [ 397.409056][ T6853] ? __cfi_cgroup_file_write+0x10/0x10 [ 397.414527][ T6853] vfs_write+0x5db/0xca0 [ 397.418767][ T6853] ? slab_free_freelist_hook+0xc2/0x190 [ 397.424310][ T6853] ? __cfi_vfs_write+0x10/0x10 [ 397.429071][ T6853] ? __cfi_mutex_lock+0x10/0x10 [ 397.433931][ T6853] ? __fdget_pos+0x2cd/0x380 [ 397.438534][ T6853] ? ksys_write+0x71/0x240 [ 397.442961][ T6853] ksys_write+0x140/0x240 [ 397.447302][ T6853] ? __cfi_ksys_write+0x10/0x10 [ 397.452168][ T6853] ? debug_smp_processor_id+0x17/0x20 [ 397.457554][ T6853] __x64_sys_write+0x7b/0x90 [ 397.462147][ T6853] x64_sys_call+0x27b/0x9a0 [ 397.466650][ T6853] do_syscall_64+0x4c/0xa0 [ 397.471066][ T6853] ? clear_bhb_loop+0x15/0x70 [ 397.475740][ T6853] ? clear_bhb_loop+0x15/0x70 [ 397.480411][ T6853] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 397.486309][ T6853] RIP: 0033:0x7fedf958e969 [ 397.490716][ T6853] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 397.510314][ T6853] RSP: 002b:00007fedfa4d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 397.518724][ T6853] RAX: ffffffffffffffda RBX: 00007fedf97b5fa0 RCX: 00007fedf958e969 [ 397.526692][ T6853] RDX: 000000000000000b RSI: 00002000000000c0 RDI: 0000000000000006 [ 397.534657][ T6853] RBP: 00007fedfa4d6090 R08: 0000000000000000 R09: 0000000000000000 [ 397.542622][ T6853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.550585][ T6853] R13: 0000000000000000 R14: 00007fedf97b5fa0 R15: 00007ffc9c9869e8 [ 397.558555][ T6853] [ 399.188745][ T6891] syz.4.2221[6891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.188812][ T6891] syz.4.2221[6891] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 400.682238][ T6937] FAULT_INJECTION: forcing a failure. [ 400.682238][ T6937] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 400.822522][ T6937] CPU: 0 PID: 6937 Comm: syz.1.2236 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 400.833835][ T6937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 400.843893][ T6937] Call Trace: [ 400.847182][ T6937] [ 400.850111][ T6937] __dump_stack+0x21/0x24 [ 400.854449][ T6937] dump_stack_lvl+0xee/0x150 [ 400.859046][ T6937] ? __cfi_dump_stack_lvl+0x8/0x8 [ 400.864078][ T6937] dump_stack+0x15/0x24 [ 400.868245][ T6937] should_fail_ex+0x3d4/0x520 [ 400.872928][ T6937] should_fail_alloc_page+0x61/0x90 [ 400.878126][ T6937] prepare_alloc_pages+0x148/0x5f0 [ 400.883242][ T6937] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 400.888442][ T6937] ? __sys_bpf+0x30b/0x780 [ 400.892862][ T6937] ? x64_sys_call+0x488/0x9a0 [ 400.897539][ T6937] ? do_syscall_64+0x4c/0xa0 [ 400.902130][ T6937] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 400.908217][ T6937] __alloc_pages+0x115/0x3a0 [ 400.912819][ T6937] ? __cfi___alloc_pages+0x10/0x10 [ 400.917937][ T6937] ? __cfi__raw_spin_lock+0x10/0x10 [ 400.923137][ T6937] __get_free_pages+0xe/0x30 [ 400.927732][ T6937] kasan_populate_vmalloc_pte+0x29/0x120 [ 400.933371][ T6937] __apply_to_page_range+0x8c1/0xc00 [ 400.938662][ T6937] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 400.944914][ T6937] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 400.951158][ T6937] apply_to_page_range+0x3b/0x50 [ 400.956097][ T6937] kasan_populate_vmalloc+0x60/0x70 [ 400.961308][ T6937] alloc_vmap_area+0x173e/0x1870 [ 400.966255][ T6937] ? vm_map_ram+0x930/0x930 [ 400.970769][ T6937] ? __kasan_kmalloc+0x95/0xb0 [ 400.975538][ T6937] ? kmalloc_node_trace+0x3d/0xb0 [ 400.980656][ T6937] __get_vm_area_node+0x160/0x360 [ 400.985685][ T6937] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 400.991777][ T6937] __vmalloc_node_range+0x326/0x13d0 [ 400.997076][ T6937] ? dev_map_alloc+0x227/0x540 [ 401.001847][ T6937] ? __cfi___vmalloc_node_range+0x10/0x10 [ 401.007579][ T6937] ? kasan_save_alloc_info+0x25/0x30 [ 401.012877][ T6937] ? __kasan_kmalloc+0x95/0xb0 [ 401.017648][ T6937] ? bpf_map_area_alloc+0x4b/0xe0 [ 401.022679][ T6937] ? __kmalloc_node+0xb2/0x1e0 [ 401.027455][ T6937] bpf_map_area_alloc+0xd7/0xe0 [ 401.032313][ T6937] ? dev_map_alloc+0x227/0x540 [ 401.037082][ T6937] dev_map_alloc+0x227/0x540 [ 401.041677][ T6937] map_create+0x49c/0xd80 [ 401.046015][ T6937] __sys_bpf+0x30b/0x780 [ 401.050261][ T6937] ? bpf_link_show_fdinfo+0x320/0x320 [ 401.055644][ T6937] ? __cfi_ksys_write+0x10/0x10 [ 401.060495][ T6937] ? debug_smp_processor_id+0x17/0x20 [ 401.065866][ T6937] __x64_sys_bpf+0x7c/0x90 [ 401.070293][ T6937] x64_sys_call+0x488/0x9a0 [ 401.074797][ T6937] do_syscall_64+0x4c/0xa0 [ 401.079221][ T6937] ? clear_bhb_loop+0x15/0x70 [ 401.083926][ T6937] ? clear_bhb_loop+0x15/0x70 [ 401.088600][ T6937] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 401.094495][ T6937] RIP: 0033:0x7f20f398e969 [ 401.098906][ T6937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 401.118508][ T6937] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 401.126917][ T6937] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 401.134882][ T6937] RDX: 0000000000000048 RSI: 0000200000000580 RDI: 0000000000000000 [ 401.142849][ T6937] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 401.150813][ T6937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.158776][ T6937] R13: 0000000000000000 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 401.166749][ T6937] [ 402.451036][ T6964] device syzkaller0 entered promiscuous mode [ 402.501338][ T6962] device veth1_macvtap entered promiscuous mode [ 402.511063][ T6962] device macsec0 entered promiscuous mode [ 402.521134][ T484] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 402.536041][ T6968] FAULT_INJECTION: forcing a failure. [ 402.536041][ T6968] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 402.549189][ T6968] CPU: 1 PID: 6968 Comm: syz.1.2247 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 402.560452][ T6968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 402.570491][ T6968] Call Trace: [ 402.573759][ T6968] [ 402.576676][ T6968] __dump_stack+0x21/0x24 [ 402.581000][ T6968] dump_stack_lvl+0xee/0x150 [ 402.585603][ T6968] ? __cfi_dump_stack_lvl+0x8/0x8 [ 402.590616][ T6968] dump_stack+0x15/0x24 [ 402.594764][ T6968] should_fail_ex+0x3d4/0x520 [ 402.599435][ T6968] should_fail+0xb/0x10 [ 402.603581][ T6968] should_fail_usercopy+0x1a/0x20 [ 402.608596][ T6968] copyin+0x20/0xa0 [ 402.612391][ T6968] _copy_from_iter+0x3e2/0xfd0 [ 402.617138][ T6968] ? tipc_buf_acquire+0x2b/0xe0 [ 402.621986][ T6968] ? __cfi__copy_from_iter+0x10/0x10 [ 402.627253][ T6968] ? __kasan_check_write+0x14/0x20 [ 402.632378][ T6968] ? check_stack_object+0x81/0x140 [ 402.637483][ T6968] ? __check_object_size+0x45a/0x600 [ 402.642755][ T6968] tipc_msg_build+0x8ab/0xfd0 [ 402.647421][ T6968] __tipc_sendmsg+0x19dd/0x2680 [ 402.652265][ T6968] ? rht_lock+0x120/0x120 [ 402.656586][ T6968] ? __cfi_woken_wake_function+0x10/0x10 [ 402.662208][ T6968] ? avc_has_perm+0x158/0x240 [ 402.666874][ T6968] ? __kasan_check_write+0x14/0x20 [ 402.671981][ T6968] ? _raw_spin_lock_bh+0x8e/0xe0 [ 402.676918][ T6968] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 402.682365][ T6968] ? kernel_text_address+0xa0/0xd0 [ 402.687465][ T6968] ? __local_bh_enable_ip+0x58/0x80 [ 402.692655][ T6968] ? lock_sock_nested+0x1ec/0x280 [ 402.697666][ T6968] ? __cfi_lock_sock_nested+0x10/0x10 [ 402.703026][ T6968] ? stack_trace_save+0x98/0xe0 [ 402.707870][ T6968] ? __stack_depot_save+0x36/0x480 [ 402.712973][ T6968] tipc_sendmsg+0x55/0x70 [ 402.717292][ T6968] ? __cfi_tipc_sendmsg+0x10/0x10 [ 402.722306][ T6968] ____sys_sendmsg+0x5a9/0x990 [ 402.727060][ T6968] ? __sys_sendmsg_sock+0x40/0x40 [ 402.732085][ T6968] ? import_iovec+0x7c/0xb0 [ 402.736578][ T6968] ___sys_sendmsg+0x21c/0x290 [ 402.741247][ T6968] ? __sys_sendmsg+0x270/0x270 [ 402.746000][ T6968] ? __kasan_check_write+0x14/0x20 [ 402.751099][ T6968] ? proc_fail_nth_write+0x17a/0x1f0 [ 402.756378][ T6968] ? vfs_write+0x9d6/0xca0 [ 402.760787][ T6968] ? __fdget+0x19c/0x220 [ 402.765022][ T6968] __x64_sys_sendmsg+0x1f0/0x2c0 [ 402.769951][ T6968] ? __cfi___x64_sys_sendmsg+0x10/0x10 [ 402.775402][ T6968] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 402.781457][ T6968] x64_sys_call+0x171/0x9a0 [ 402.785948][ T6968] do_syscall_64+0x4c/0xa0 [ 402.790367][ T6968] ? clear_bhb_loop+0x15/0x70 [ 402.795028][ T6968] ? clear_bhb_loop+0x15/0x70 [ 402.799693][ T6968] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 402.805578][ T6968] RIP: 0033:0x7f20f398e969 [ 402.809991][ T6968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.829585][ T6968] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 402.837984][ T6968] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 402.845948][ T6968] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000007 [ 402.853905][ T6968] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 402.861863][ T6968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.869821][ T6968] R13: 0000000000000000 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 402.877783][ T6968] [ 404.894503][ T7023] device pim6reg1 entered promiscuous mode [ 404.913589][ T7023] FAULT_INJECTION: forcing a failure. [ 404.913589][ T7023] name failslab, interval 1, probability 0, space 0, times 0 [ 404.926595][ T7023] CPU: 1 PID: 7023 Comm: syz.1.2266 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 404.937895][ T7023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 404.947981][ T7023] Call Trace: [ 404.951253][ T7023] [ 404.954179][ T7023] __dump_stack+0x21/0x24 [ 404.958518][ T7023] dump_stack_lvl+0xee/0x150 [ 404.963110][ T7023] ? __cfi_dump_stack_lvl+0x8/0x8 [ 404.968141][ T7023] dump_stack+0x15/0x24 [ 404.972299][ T7023] should_fail_ex+0x3d4/0x520 [ 404.976978][ T7023] __should_failslab+0xac/0xf0 [ 404.981743][ T7023] ? fib6_info_alloc+0x34/0xe0 [ 404.986516][ T7023] should_failslab+0x9/0x20 [ 404.991024][ T7023] __kmem_cache_alloc_node+0x3d/0x2c0 [ 404.996393][ T7023] ? 0xffffffffa000094c [ 405.000544][ T7023] ? fib6_info_alloc+0x34/0xe0 [ 405.005317][ T7023] __kmalloc+0xa1/0x1e0 [ 405.009482][ T7023] fib6_info_alloc+0x34/0xe0 [ 405.014078][ T7023] ip6_route_info_create+0x526/0x1510 [ 405.019451][ T7023] ? __cfi_mutex_unlock+0x10/0x10 [ 405.024491][ T7023] ip6_route_add+0x27/0x130 [ 405.029003][ T7023] addrconf_add_dev+0x32c/0x420 [ 405.033866][ T7023] ? addrconf_verify_rtnl+0xe60/0xe60 [ 405.039267][ T7023] ? __x64_sys_ioctl+0x7b/0x90 [ 405.044035][ T7023] ? x64_sys_call+0x58b/0x9a0 [ 405.048710][ T7023] ? do_syscall_64+0x4c/0xa0 [ 405.053306][ T7023] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 405.059399][ T7023] ? __kasan_check_read+0x11/0x20 [ 405.064426][ T7023] addrconf_init_auto_addrs+0x89c/0xcf0 [ 405.069993][ T7023] ? __kasan_check_write+0x14/0x20 [ 405.075116][ T7023] ? _raw_write_lock_bh+0x8e/0xe0 [ 405.080146][ T7023] ? addrconf_dad_run+0x590/0x590 [ 405.085183][ T7023] ? __local_bh_enable_ip+0x58/0x80 [ 405.090380][ T7023] ? _raw_write_unlock_bh+0x2f/0x50 [ 405.095590][ T7023] ? addrconf_permanent_addr+0x867/0x8c0 [ 405.101235][ T7023] ? igmp_group_added+0x213/0x830 [ 405.106272][ T7023] ? __cfi__raw_spin_lock_bh+0x10/0x10 [ 405.111747][ T7023] ? addrconf_notify+0xe40/0xe40 [ 405.116689][ T7023] ? igmpv3_del_delrec+0x700/0x700 [ 405.121797][ T7023] ? __local_bh_enable_ip+0x58/0x80 [ 405.126977][ T7023] ? _raw_spin_unlock_bh+0x50/0x60 [ 405.132073][ T7023] ? __kasan_check_write+0x14/0x20 [ 405.137170][ T7023] ? tun_sock_write_space+0x13b/0x1b0 [ 405.142521][ T7023] ? __kasan_check_write+0x14/0x20 [ 405.147616][ T7023] ? mutex_unlock+0x89/0x220 [ 405.152192][ T7023] ? __cfi_mutex_unlock+0x10/0x10 [ 405.157199][ T7023] ? macsec_notify+0xff/0x490 [ 405.161859][ T7023] ? inetdev_event+0xe17/0x10e0 [ 405.166701][ T7023] ? addrconf_link_ready+0x134/0x190 [ 405.171974][ T7023] addrconf_notify+0x803/0xe40 [ 405.176726][ T7023] raw_notifier_call_chain+0xa1/0x110 [ 405.182087][ T7023] __dev_notify_flags+0x28f/0x500 [ 405.187100][ T7023] ? __cfi___dev_notify_flags+0x10/0x10 [ 405.192631][ T7023] ? __dev_change_flags+0x521/0x6b0 [ 405.197833][ T7023] ? __cfi___dev_change_flags+0x10/0x10 [ 405.203367][ T7023] dev_change_flags+0xe8/0x1a0 [ 405.208122][ T7023] dev_ifsioc+0x159/0xed0 [ 405.212435][ T7023] ? dev_ioctl+0xd10/0xd10 [ 405.216833][ T7023] ? __kasan_check_write+0x14/0x20 [ 405.221934][ T7023] ? mutex_lock+0x8d/0x1a0 [ 405.226334][ T7023] ? __cfi_mutex_lock+0x10/0x10 [ 405.231171][ T7023] ? dev_get_by_name_rcu+0xe5/0x130 [ 405.236363][ T7023] dev_ioctl+0x556/0xd10 [ 405.240605][ T7023] sock_do_ioctl+0x23f/0x310 [ 405.245179][ T7023] ? sock_show_fdinfo+0xb0/0xb0 [ 405.250013][ T7023] ? selinux_file_ioctl+0x377/0x480 [ 405.255193][ T7023] sock_ioctl+0x4d8/0x6e0 [ 405.259504][ T7023] ? __cfi_sock_ioctl+0x10/0x10 [ 405.264332][ T7023] ? __fget_files+0x2d5/0x330 [ 405.268994][ T7023] ? security_file_ioctl+0x95/0xc0 [ 405.274084][ T7023] ? __cfi_sock_ioctl+0x10/0x10 [ 405.278916][ T7023] __se_sys_ioctl+0x12f/0x1b0 [ 405.283580][ T7023] __x64_sys_ioctl+0x7b/0x90 [ 405.288158][ T7023] x64_sys_call+0x58b/0x9a0 [ 405.292647][ T7023] do_syscall_64+0x4c/0xa0 [ 405.297048][ T7023] ? clear_bhb_loop+0x15/0x70 [ 405.301708][ T7023] ? clear_bhb_loop+0x15/0x70 [ 405.306385][ T7023] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 405.312271][ T7023] RIP: 0033:0x7f20f398e969 [ 405.316671][ T7023] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.336259][ T7023] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 405.344652][ T7023] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 405.352610][ T7023] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 0000000000000008 [ 405.360562][ T7023] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 405.368515][ T7023] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 405.376468][ T7023] R13: 0000000000000000 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 405.384424][ T7023] [ 407.390531][ T7067] FAULT_INJECTION: forcing a failure. [ 407.390531][ T7067] name failslab, interval 1, probability 0, space 0, times 0 [ 407.403195][ T7067] CPU: 0 PID: 7067 Comm: syz.3.2279 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 407.414475][ T7067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 407.424526][ T7067] Call Trace: [ 407.427800][ T7067] [ 407.430723][ T7067] __dump_stack+0x21/0x24 [ 407.435063][ T7067] dump_stack_lvl+0xee/0x150 [ 407.439664][ T7067] ? __cfi_dump_stack_lvl+0x8/0x8 [ 407.444693][ T7067] ? __bpf_redirect+0x8db/0x1130 [ 407.449633][ T7067] ? bpf_prog_6893982b85ceadf7+0x56/0x5b [ 407.455271][ T7067] ? bpf_test_run+0x349/0x8d0 [ 407.459950][ T7067] ? bpf_prog_test_run_skb+0xaec/0x1290 [ 407.465495][ T7067] ? __sys_bpf+0x56d/0x780 [ 407.469918][ T7067] ? __x64_sys_bpf+0x7c/0x90 [ 407.474516][ T7067] ? x64_sys_call+0x488/0x9a0 [ 407.479213][ T7067] ? do_syscall_64+0x4c/0xa0 [ 407.483812][ T7067] dump_stack+0x15/0x24 [ 407.487975][ T7067] should_fail_ex+0x3d4/0x520 [ 407.492662][ T7067] ? dst_alloc+0x16a/0x1e0 [ 407.497081][ T7067] __should_failslab+0xac/0xf0 [ 407.501845][ T7067] should_failslab+0x9/0x20 [ 407.506361][ T7067] kmem_cache_alloc+0x3b/0x330 [ 407.511124][ T7067] dst_alloc+0x16a/0x1e0 [ 407.515369][ T7067] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 407.521431][ T7067] ip_route_output_key_hash+0x131/0x1e0 [ 407.526971][ T7067] ? __cfi_ip_route_output_key_hash+0x10/0x10 [ 407.533033][ T7067] vti6_tnl_xmit+0xd9c/0x1980 [ 407.537705][ T7067] ? bpf_trace_run2+0x104/0x250 [ 407.542549][ T7067] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 407.547656][ T7067] ? __bpf_trace_net_dev_start_xmit+0x25/0x30 [ 407.553712][ T7067] ? __cfi___bpf_trace_net_dev_start_xmit+0x10/0x10 [ 407.560295][ T7067] dev_hard_start_xmit+0x20b/0x750 [ 407.565395][ T7067] __dev_queue_xmit+0x18d9/0x3420 [ 407.570406][ T7067] ? __dev_queue_xmit+0x250/0x3420 [ 407.575504][ T7067] ? __cfi___dev_queue_xmit+0x10/0x10 [ 407.580862][ T7067] ? __kasan_check_write+0x14/0x20 [ 407.585969][ T7067] ? skb_release_data+0x1d2/0x890 [ 407.590991][ T7067] ? skb_ensure_writable+0x2f8/0x470 [ 407.596268][ T7067] ? __kasan_check_write+0x14/0x20 [ 407.601371][ T7067] ? pskb_expand_head+0xc4a/0x1210 [ 407.606474][ T7067] __bpf_redirect+0x8db/0x1130 [ 407.611229][ T7067] bpf_clone_redirect+0x26a/0x3c0 [ 407.616244][ T7067] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 407.621688][ T7067] ? setup_swap_map_and_extents+0x14b0/0x18e0 [ 407.627749][ T7067] ? __build_skb+0x2d/0x410 [ 407.632245][ T7067] ? build_skb+0x24/0x200 [ 407.636563][ T7067] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 407.642099][ T7067] ? bpf_prog_test_run+0x3e3/0x630 [ 407.647201][ T7067] ? __sys_bpf+0x56d/0x780 [ 407.651617][ T7067] ? __x64_sys_bpf+0x7c/0x90 [ 407.656200][ T7067] ? x64_sys_call+0x488/0x9a0 [ 407.660864][ T7067] ? do_syscall_64+0x4c/0xa0 [ 407.665444][ T7067] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 407.671512][ T7067] ? __kasan_check_read+0x11/0x20 [ 407.676526][ T7067] ? bpf_test_timer_continue+0x147/0x4a0 [ 407.682149][ T7067] bpf_test_run+0x349/0x8d0 [ 407.686638][ T7067] ? kasan_save_alloc_info+0x25/0x30 [ 407.691918][ T7067] ? __kasan_slab_alloc+0x72/0x80 [ 407.696942][ T7067] ? convert___skb_to_skb+0x5b0/0x5b0 [ 407.702302][ T7067] ? __cfi_eth_type_trans+0x10/0x10 [ 407.707486][ T7067] ? __kasan_check_write+0x14/0x20 [ 407.712585][ T7067] ? convert___skb_to_skb+0x40/0x5b0 [ 407.717856][ T7067] bpf_prog_test_run_skb+0xaec/0x1290 [ 407.723218][ T7067] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 407.729011][ T7067] bpf_prog_test_run+0x3e3/0x630 [ 407.733934][ T7067] ? slab_free_freelist_hook+0xc2/0x190 [ 407.739473][ T7067] ? bpf_prog_query+0x270/0x270 [ 407.744306][ T7067] ? selinux_bpf+0xce/0xf0 [ 407.748724][ T7067] ? security_bpf+0x93/0xb0 [ 407.753216][ T7067] __sys_bpf+0x56d/0x780 [ 407.757449][ T7067] ? bpf_link_show_fdinfo+0x320/0x320 [ 407.762816][ T7067] ? __cfi_ksys_write+0x10/0x10 [ 407.767659][ T7067] ? __bpf_trace_sys_enter+0x62/0x70 [ 407.772927][ T7067] __x64_sys_bpf+0x7c/0x90 [ 407.777334][ T7067] x64_sys_call+0x488/0x9a0 [ 407.781829][ T7067] do_syscall_64+0x4c/0xa0 [ 407.786236][ T7067] ? clear_bhb_loop+0x15/0x70 [ 407.790897][ T7067] ? clear_bhb_loop+0x15/0x70 [ 407.795560][ T7067] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 407.801449][ T7067] RIP: 0033:0x7f89ef98e969 [ 407.805851][ T7067] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.825441][ T7067] RSP: 002b:00007f89f0720038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 407.833836][ T7067] RAX: ffffffffffffffda RBX: 00007f89efbb5fa0 RCX: 00007f89ef98e969 [ 407.841790][ T7067] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 407.849764][ T7067] RBP: 00007f89f0720090 R08: 0000000000000000 R09: 0000000000000000 [ 407.857719][ T7067] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 407.865670][ T7067] R13: 0000000000000000 R14: 00007f89efbb5fa0 R15: 00007ffe37aabdf8 [ 407.873628][ T7067] [ 409.807930][ T7119] syz.1.2299[7119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 409.808001][ T7119] syz.1.2299[7119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 410.768333][ T7119] device syzkaller0 entered promiscuous mode [ 411.902285][ T7154] device sit0 left promiscuous mode [ 412.000219][ T7161] syz.1.2314[7161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.000288][ T7161] syz.1.2314[7161] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 412.438937][ T7161] device syzkaller0 entered promiscuous mode [ 412.946118][ T28] audit: type=1400 audit(1748415544.155:139): avc: denied { create } for pid=7188 comm="syz.0.2324" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 414.176282][ T7212] FAULT_INJECTION: forcing a failure. [ 414.176282][ T7212] name failslab, interval 1, probability 0, space 0, times 0 [ 414.188940][ T7212] CPU: 1 PID: 7212 Comm: syz.3.2330 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 414.200237][ T7212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 414.210279][ T7212] Call Trace: [ 414.213542][ T7212] [ 414.216461][ T7212] __dump_stack+0x21/0x24 [ 414.220788][ T7212] dump_stack_lvl+0xee/0x150 [ 414.225365][ T7212] ? __cfi_dump_stack_lvl+0x8/0x8 [ 414.230379][ T7212] ? kasan_set_track+0x60/0x70 [ 414.235124][ T7212] ? kasan_save_alloc_info+0x25/0x30 [ 414.240401][ T7212] ? __kasan_slab_alloc+0x72/0x80 [ 414.245407][ T7212] ? slab_post_alloc_hook+0x4f/0x2d0 [ 414.250675][ T7212] ? kmem_cache_alloc+0x16e/0x330 [ 414.255687][ T7212] dump_stack+0x15/0x24 [ 414.259839][ T7212] should_fail_ex+0x3d4/0x520 [ 414.264504][ T7212] __should_failslab+0xac/0xf0 [ 414.269255][ T7212] ? ref_tracker_alloc+0x139/0x430 [ 414.274368][ T7212] should_failslab+0x9/0x20 [ 414.278858][ T7212] __kmem_cache_alloc_node+0x3d/0x2c0 [ 414.284218][ T7212] ? ref_tracker_alloc+0x139/0x430 [ 414.289317][ T7212] kmalloc_trace+0x29/0xb0 [ 414.293722][ T7212] ref_tracker_alloc+0x139/0x430 [ 414.298650][ T7212] ? __cfi_ref_tracker_alloc+0x10/0x10 [ 414.304102][ T7212] ? slab_post_alloc_hook+0x6d/0x2d0 [ 414.309380][ T7212] dst_init+0xc4/0x3d0 [ 414.313441][ T7212] dst_alloc+0x191/0x1e0 [ 414.317671][ T7212] ip_route_output_key_hash_rcu+0x1516/0x2060 [ 414.323731][ T7212] ip_route_output_key_hash+0x131/0x1e0 [ 414.329270][ T7212] ? __cfi_ip_route_output_key_hash+0x10/0x10 [ 414.335332][ T7212] ? 0xffffffffa0000988 [ 414.339468][ T7212] vti6_tnl_xmit+0xd9c/0x1980 [ 414.344133][ T7212] ? __cfi_stack_trace_consume_entry+0x10/0x10 [ 414.350303][ T7212] ? skb_network_protocol+0x505/0x750 [ 414.355669][ T7212] ? __cfi_vti6_tnl_xmit+0x10/0x10 [ 414.360773][ T7212] dev_hard_start_xmit+0x20b/0x750 [ 414.365872][ T7212] __dev_queue_xmit+0x18d9/0x3420 [ 414.370911][ T7212] ? __dev_queue_xmit+0x250/0x3420 [ 414.376008][ T7212] ? __cfi___dev_queue_xmit+0x10/0x10 [ 414.381366][ T7212] ? __kasan_check_write+0x14/0x20 [ 414.386466][ T7212] ? skb_release_data+0x1d2/0x890 [ 414.391478][ T7212] ? skb_ensure_writable+0x2f8/0x470 [ 414.396751][ T7212] ? __kasan_check_write+0x14/0x20 [ 414.401850][ T7212] ? pskb_expand_head+0xc4a/0x1210 [ 414.406953][ T7212] __bpf_redirect+0x8db/0x1130 [ 414.411706][ T7212] bpf_clone_redirect+0x26a/0x3c0 [ 414.416723][ T7212] bpf_prog_6893982b85ceadf7+0x56/0x5b [ 414.422170][ T7212] ? setup_swap_map_and_extents+0x14b0/0x18e0 [ 414.428224][ T7212] ? __build_skb+0x2d/0x410 [ 414.432716][ T7212] ? build_skb+0x24/0x200 [ 414.437032][ T7212] ? bpf_prog_test_run_skb+0x39f/0x1290 [ 414.442561][ T7212] ? bpf_prog_test_run+0x3e3/0x630 [ 414.447654][ T7212] ? __sys_bpf+0x56d/0x780 [ 414.452059][ T7212] ? __x64_sys_bpf+0x7c/0x90 [ 414.456639][ T7212] ? x64_sys_call+0x488/0x9a0 [ 414.461302][ T7212] ? do_syscall_64+0x4c/0xa0 [ 414.465878][ T7212] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 414.471944][ T7212] ? __kasan_check_read+0x11/0x20 [ 414.476965][ T7212] ? bpf_test_timer_continue+0x147/0x4a0 [ 414.482595][ T7212] bpf_test_run+0x349/0x8d0 [ 414.487085][ T7212] ? kasan_save_alloc_info+0x25/0x30 [ 414.492365][ T7212] ? __kasan_slab_alloc+0x72/0x80 [ 414.497382][ T7212] ? convert___skb_to_skb+0x5b0/0x5b0 [ 414.502741][ T7212] ? __cfi_eth_type_trans+0x10/0x10 [ 414.507930][ T7212] ? __kasan_check_write+0x14/0x20 [ 414.513034][ T7212] ? convert___skb_to_skb+0x40/0x5b0 [ 414.518307][ T7212] bpf_prog_test_run_skb+0xaec/0x1290 [ 414.523669][ T7212] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 414.529464][ T7212] bpf_prog_test_run+0x3e3/0x630 [ 414.534384][ T7212] ? slab_free_freelist_hook+0xc2/0x190 [ 414.539922][ T7212] ? bpf_prog_query+0x270/0x270 [ 414.544757][ T7212] ? selinux_bpf+0xce/0xf0 [ 414.549169][ T7212] ? security_bpf+0x93/0xb0 [ 414.553659][ T7212] __sys_bpf+0x56d/0x780 [ 414.557895][ T7212] ? bpf_link_show_fdinfo+0x320/0x320 [ 414.563263][ T7212] ? __cfi_ksys_write+0x10/0x10 [ 414.568110][ T7212] ? debug_smp_processor_id+0x17/0x20 [ 414.573474][ T7212] __x64_sys_bpf+0x7c/0x90 [ 414.577879][ T7212] x64_sys_call+0x488/0x9a0 [ 414.582369][ T7212] do_syscall_64+0x4c/0xa0 [ 414.586774][ T7212] ? clear_bhb_loop+0x15/0x70 [ 414.591436][ T7212] ? clear_bhb_loop+0x15/0x70 [ 414.596096][ T7212] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 414.601988][ T7212] RIP: 0033:0x7f89ef98e969 [ 414.606388][ T7212] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.625982][ T7212] RSP: 002b:00007f89f0720038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 414.634383][ T7212] RAX: ffffffffffffffda RBX: 00007f89efbb5fa0 RCX: 00007f89ef98e969 [ 414.642354][ T7212] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 414.650317][ T7212] RBP: 00007f89f0720090 R08: 0000000000000000 R09: 0000000000000000 [ 414.658272][ T7212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 414.666238][ T7212] R13: 0000000000000000 R14: 00007f89efbb5fa0 R15: 00007ffe37aabdf8 [ 414.674211][ T7212] [ 414.677268][ T7212] memory allocation failure, unreliable refcount tracker. [ 414.809408][ T7216] FAULT_INJECTION: forcing a failure. [ 414.809408][ T7216] name failslab, interval 1, probability 0, space 0, times 0 [ 414.825302][ T7216] CPU: 0 PID: 7216 Comm: syz.1.2332 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 414.836594][ T7216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 414.846649][ T7216] Call Trace: [ 414.849923][ T7216] [ 414.852857][ T7216] __dump_stack+0x21/0x24 [ 414.857197][ T7216] dump_stack_lvl+0xee/0x150 [ 414.861797][ T7216] ? __cfi_dump_stack_lvl+0x8/0x8 [ 414.866834][ T7216] ? call_rcu+0xb83/0xf90 [ 414.871172][ T7216] dump_stack+0x15/0x24 [ 414.875344][ T7216] should_fail_ex+0x3d4/0x520 [ 414.880023][ T7216] __should_failslab+0xac/0xf0 [ 414.884789][ T7216] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 414.890775][ T7216] should_failslab+0x9/0x20 [ 414.895291][ T7216] __kmem_cache_alloc_node+0x3d/0x2c0 [ 414.900671][ T7216] ? __cfi_mutex_lock+0x10/0x10 [ 414.905532][ T7216] ? delete_node+0x3e6/0xa60 [ 414.910120][ T7216] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 414.916111][ T7216] __kmalloc+0xa1/0x1e0 [ 414.920286][ T7216] ? __cfi___bpf_trace_tlb_flush+0x10/0x10 [ 414.926093][ T7216] tracepoint_probe_unregister+0x1e6/0x8b0 [ 414.931901][ T7216] bpf_probe_unregister+0x61/0x70 [ 414.936936][ T7216] bpf_raw_tp_link_release+0x63/0x90 [ 414.942220][ T7216] bpf_link_free+0x13a/0x390 [ 414.946817][ T7216] ? bpf_link_put_deferred+0x20/0x20 [ 414.952115][ T7216] bpf_link_release+0x15f/0x170 [ 414.956968][ T7216] ? __cfi_bpf_link_release+0x10/0x10 [ 414.962350][ T7216] __fput+0x1fc/0x8f0 [ 414.966337][ T7216] ____fput+0x15/0x20 [ 414.970321][ T7216] task_work_run+0x1db/0x240 [ 414.974914][ T7216] ? __cfi_task_work_run+0x10/0x10 [ 414.980033][ T7216] ? filp_close+0x111/0x160 [ 414.984541][ T7216] exit_to_user_mode_loop+0x9b/0xb0 [ 414.989745][ T7216] exit_to_user_mode_prepare+0x5a/0xa0 [ 414.995202][ T7216] syscall_exit_to_user_mode+0x1a/0x30 [ 415.000662][ T7216] do_syscall_64+0x58/0xa0 [ 415.005081][ T7216] ? clear_bhb_loop+0x15/0x70 [ 415.009758][ T7216] ? clear_bhb_loop+0x15/0x70 [ 415.014434][ T7216] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 415.020342][ T7216] RIP: 0033:0x7f20f398e969 [ 415.024756][ T7216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.044367][ T7216] RSP: 002b:00007f20f47e4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 415.052788][ T7216] RAX: 0000000000000000 RBX: 00007f20f3bb5fa0 RCX: 00007f20f398e969 [ 415.060760][ T7216] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 415.068730][ T7216] RBP: 00007f20f47e4090 R08: 0000000000000000 R09: 0000000000000000 [ 415.077133][ T7216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.085098][ T7216] R13: 0000000000000000 R14: 00007f20f3bb5fa0 R15: 00007ffc6437e478 [ 415.093074][ T7216] [ 415.104668][ T7216] CFI failure at __traceiter_tlb_flush+0x80/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0x205553a5) [ 415.104662][ T7217] CFI failure at __traceiter_tlb_flush+0x80/0xd0 (target: tp_stub_func+0x0/0x10; expected type: 0x205553a5) [ 415.104733][ T7217] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 415.133599][ T7217] CPU: 1 PID: 7217 Comm: syz.4.2333 Tainted: G W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 415.144851][ T7217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 415.154881][ T7217] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 415.160757][ T7217] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 68 5f 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 415.180338][ T7217] RSP: 0018:ffffc9000fc2f6a8 EFLAGS: 00010093 [ 415.186382][ T7217] RAX: 1ffff11023b927a6 RBX: ffffffff81710d60 RCX: ffff888114473cc0 [ 415.194330][ T7217] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc9000ff3b000 [ 415.202277][ T7217] RBP: ffffc9000fc2f6d8 R08: dffffc0000000000 R09: fffffbfff0ee425e [ 415.210238][ T7217] R10: 0000000084eb1367 R11: 1ffffffff0ee425d R12: ffff88811dc93d28 [ 415.218184][ T7217] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88811dc93d28 [ 415.226137][ T7217] FS: 0000555582673500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 415.235045][ T7217] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 415.241605][ T7217] CR2: 0000000100000000 CR3: 000000011f053000 CR4: 00000000003506a0 [ 415.249555][ T7217] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 415.257502][ T7217] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 415.265454][ T7217] Call Trace: [ 415.268715][ T7217] [ 415.271635][ T7217] switch_mm_irqs_off+0x61f/0x980 [ 415.276642][ T7217] __schedule+0x9eb/0x14e0 [ 415.281043][ T7217] ? release_firmware_map_entry+0x194/0x194 [ 415.286938][ T7217] ? check_preempt_wakeup+0x5be/0xbc0 [ 415.292292][ T7217] ? preempt_schedule+0xa7/0xb0 [ 415.297120][ T7217] preempt_schedule_common+0x9b/0xf0 [ 415.302383][ T7217] preempt_schedule+0xa7/0xb0 [ 415.307042][ T7217] ? __cfi_preempt_schedule+0x10/0x10 [ 415.312395][ T7217] ? probe_sched_wakeup+0x71/0x90 [ 415.317404][ T7217] ? ttwu_do_wakeup+0x468/0x490 [ 415.322235][ T7217] preempt_schedule_thunk+0x16/0x18 [ 415.327415][ T7217] try_to_wake_up+0x6b8/0x1220 [ 415.332154][ T7217] ? _raw_spin_lock+0x8e/0xe0 [ 415.336812][ T7217] wake_up_q+0xdc/0x1b0 [ 415.340943][ T7217] __mutex_unlock_slowpath+0x262/0x3b0 [ 415.346386][ T7217] ? mutex_unlock+0x220/0x220 [ 415.351046][ T7217] ? unregister_netdevice_many+0x1673/0x1820 [ 415.357006][ T7217] mutex_unlock+0xd8/0x220 [ 415.361426][ T7217] ? __cfi_mutex_unlock+0x10/0x10 [ 415.366436][ T7217] ? __cfi_locks_remove_file+0x10/0x10 [ 415.371881][ T7217] __rtnl_unlock+0x68/0xc0 [ 415.376284][ T7217] netdev_run_todo+0xf3/0xc00 [ 415.380956][ T7217] ? __kasan_check_read+0x11/0x20 [ 415.385968][ T7217] ? __cfi_netdev_run_todo+0x10/0x10 [ 415.391231][ T7217] ? mutex_lock+0x8d/0x1a0 [ 415.395634][ T7217] ? __cfi_unregister_netdevice_queue+0x10/0x10 [ 415.401858][ T7217] rtnl_unlock+0xe/0x10 [ 415.405998][ T7217] ppp_release+0xf4/0x1f0 [ 415.410317][ T7217] ? __cfi_ppp_release+0x10/0x10 [ 415.415240][ T7217] __fput+0x1fc/0x8f0 [ 415.419217][ T7217] ____fput+0x15/0x20 [ 415.423182][ T7217] task_work_run+0x1db/0x240 [ 415.427755][ T7217] ? __cfi_task_work_run+0x10/0x10 [ 415.432847][ T7217] ? __cfi___close_range+0x10/0x10 [ 415.437946][ T7217] exit_to_user_mode_loop+0x9b/0xb0 [ 415.443124][ T7217] exit_to_user_mode_prepare+0x5a/0xa0 [ 415.448562][ T7217] syscall_exit_to_user_mode+0x1a/0x30 [ 415.454002][ T7217] do_syscall_64+0x58/0xa0 [ 415.458405][ T7217] ? clear_bhb_loop+0x15/0x70 [ 415.463061][ T7217] ? clear_bhb_loop+0x15/0x70 [ 415.467716][ T7217] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 415.473598][ T7217] RIP: 0033:0x7f18ac38e969 [ 415.478001][ T7217] Code: Unable to access opcode bytes at 0x7f18ac38e93f. [ 415.484992][ T7217] RSP: 002b:00007fffbb75a448 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 415.493380][ T7217] RAX: 0000000000000000 RBX: 000000000006547b RCX: 00007f18ac38e969 [ 415.501329][ T7217] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 415.509274][ T7217] RBP: 00007f18ac5b7ba0 R08: 0000000000000001 R09: 00000013bb75a73f [ 415.517227][ T7217] R10: 00007f18ac000000 R11: 0000000000000246 R12: 00007f18ac5b5fac [ 415.525175][ T7217] R13: 00007f18ac5b5fa0 R14: ffffffffffffffff R15: 00007fffbb75a560 [ 415.533125][ T7217] [ 415.536120][ T7217] Modules linked in: [ 415.539997][ T7217] ---[ end trace 0000000000000000 ]--- [ 415.540040][ T7216] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 415.545452][ T7217] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 415.551499][ T7216] CPU: 0 PID: 7216 Comm: syz.1.2332 Tainted: G D W 6.1.138-syzkaller-00046-gdb710ea87c32 #0 [ 415.557362][ T7217] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 68 5f 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 415.568604][ T7216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 415.588181][ T7217] RSP: 0018:ffffc9000fc2f6a8 EFLAGS: 00010093 [ 415.598210][ T7216] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 415.604250][ T7217] RAX: 1ffff11023b927a6 RBX: ffffffff81710d60 RCX: ffff888114473cc0 [ 415.610118][ T7216] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 68 5f 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 415.618062][ T7217] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc9000ff3b000 [ 415.637638][ T7216] RSP: 0018:ffffc9000fed78e8 EFLAGS: 00010093 [ 415.645585][ T7217] RBP: ffffc9000fc2f6d8 R08: dffffc0000000000 R09: fffffbfff0ee425e [ 415.651628][ T7216] RAX: 1ffff11023b927a6 RBX: ffffffff81710d60 RCX: ffff888114476540 [ 415.659576][ T7217] R10: 0000000084eb1367 R11: 1ffffffff0ee425d R12: ffff88811dc93d28 [ 415.667525][ T7216] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc9000ff3b000 [ 415.675473][ T7217] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88811dc93d28 [ 415.683434][ T7216] RBP: ffffc9000fed7918 R08: dffffc0000000000 R09: fffffbfff0ee425e [ 415.691382][ T7217] FS: 0000555582673500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 415.699331][ T7216] R10: 0000000084eb1367 R11: 1ffffffff0ee425d R12: ffff88811dc93d28 [ 415.708236][ T7217] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 415.716185][ T7216] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88811dc93d28 [ 415.722746][ T7217] CR2: 0000000100000000 CR3: 000000011f053000 CR4: 00000000003506a0 [ 415.730697][ T7216] FS: 00007f20f47e46c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 415.738655][ T7217] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 415.747566][ T7216] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 415.755518][ T7217] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 415.762088][ T7216] CR2: 00007f89f06e56c0 CR3: 0000000130950000 CR4: 00000000003506b0 [ 415.770041][ T7217] Kernel panic - not syncing: Fatal exception [ 415.777997][ T7216] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 415.778009][ T7216] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 415.778020][ T7216] Call Trace: [ 415.778026][ T7216] [ 415.778036][ T7216] switch_mm_irqs_off+0x61f/0x980 [ 415.778058][ T7216] __schedule+0x9eb/0x14e0 [ 415.778080][ T7216] ? plist_add+0x3e8/0x470 [ 415.778107][ T7216] ? release_firmware_map_entry+0x194/0x194 [ 415.778130][ T7216] ? __cfi___futex_queue+0x10/0x10 [ 415.778162][ T7216] ? futex_wait_setup+0x1b0/0x240 [ 415.778179][ T7216] schedule+0xbd/0x170 [ 415.778198][ T7216] futex_wait_queue+0xf5/0x230 [ 415.778213][ T7216] futex_wait+0x1a3/0x750 [ 415.778230][ T7216] ? __cfi_futex_wait+0x10/0x10 [ 415.778245][ T7216] ? __cfi_futex_wake+0x10/0x10 [ 415.778262][ T7216] ? __cfi_call_rcu+0x10/0x10 [ 415.778279][ T7216] ? security_file_free+0xd8/0xf0 [ 415.778296][ T7216] do_futex+0x2dc/0x420 [ 415.778317][ T7216] ? percpu_counter_add_batch+0x13c/0x160 [ 415.778336][ T7216] ? __cfi_do_futex+0x10/0x10 [ 415.778359][ T7216] __se_sys_futex+0x273/0x2e0 [ 415.778382][ T7216] ? __x64_sys_futex+0x100/0x100 [ 415.778404][ T7216] ? __cfi_mem_cgroup_handle_over_high+0x10/0x10 [ 415.778426][ T7216] ? filp_close+0x111/0x160 [ 415.778445][ T7216] __x64_sys_futex+0xe5/0x100 [ 415.778467][ T7216] x64_sys_call+0x7ec/0x9a0 [ 415.778485][ T7216] do_syscall_64+0x4c/0xa0 [ 415.778505][ T7216] ? clear_bhb_loop+0x15/0x70 [ 415.778520][ T7216] ? clear_bhb_loop+0x15/0x70 [ 415.778534][ T7216] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 415.778558][ T7216] RIP: 0033:0x7f20f398e969 [ 415.778569][ T7216] Code: Unable to access opcode bytes at 0x7f20f398e93f. [ 415.778577][ T7216] RSP: 002b:00007f20f47e40e8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 415.778593][ T7216] RAX: ffffffffffffffda RBX: 00007f20f3bb5fa8 RCX: 00007f20f398e969 [ 415.778604][ T7216] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f20f3bb5fa8 [ 415.778614][ T7216] RBP: 00007f20f3bb5fa0 R08: 0000000000000000 R09: 0000000000000000 [ 415.778624][ T7216] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f20f3bb5fac [ 415.778633][ T7216] R13: 0000000000000000 R14: 00007ffc6437e390 R15: 00007ffc6437e478 [ 415.778647][ T7216] [ 415.778652][ T7216] Modules linked in: [ 415.784731][ T7216] ---[ end trace 0000000000000000 ]--- [ 415.784738][ T7216] RIP: 0010:__traceiter_tlb_flush+0x80/0xd0 [ 415.784757][ T7216] Code: 89 f8 48 c1 e8 03 42 80 3c 28 00 74 05 e8 68 5f 07 00 49 8b 7c 24 08 44 89 f6 48 8b 55 d0 41 ba 5b ac aa df 44 03 53 fc 74 02 <0f> 0b ff d3 49 83 c7 18 4c 89 f8 48 c1 e8 03 42 80 3c 28 00 74 08 [ 415.784771][ T7216] RSP: 0018:ffffc9000fc2f6a8 EFLAGS: 00010093 [ 415.784783][ T7216] RAX: 1ffff11023b927a6 RBX: ffffffff81710d60 RCX: ffff888114473cc0 [ 415.784795][ T7216] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffc9000ff3b000 [ 415.784806][ T7216] RBP: ffffc9000fc2f6d8 R08: dffffc0000000000 R09: fffffbfff0ee425e [ 415.784817][ T7216] R10: 0000000084eb1367 R11: 1ffffffff0ee425d R12: ffff88811dc93d28 [ 415.784828][ T7216] R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88811dc93d28 [ 415.784838][ T7216] FS: 00007f20f47e46c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 415.784852][ T7216] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 415.784862][ T7216] CR2: 00007f89f06e56c0 CR3: 0000000130950000 CR4: 00000000003506b0 [ 415.784875][ T7216] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 415.784884][ T7216] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 416.944171][ T7217] Shutting down cpus with NMI [ 417.278976][ T7217] Kernel Offset: disabled [ 417.283286][ T7217] Rebooting in 86400 seconds..