last executing test programs: 7.485391701s ago: executing program 4 (id=1874): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 7.318230103s ago: executing program 4 (id=1877): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='rpcgss_import_ctx\x00', r0, 0x0, 0x8}, 0x18) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) mkdir(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_netprio_ifpriomap(r7, &(0x7f0000000040), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r8, &(0x7f00000009c0)=ANY=[@ANYBLOB="76b9"], 0x12) 4.946949414s ago: executing program 2 (id=1890): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x28}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRES8=r1], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) syz_clone(0x29518000, &(0x7f0000000300)="d2fcdb9785ec227ff6c6f450689ed75f15a4a948649062cdd6726038140b67fd04b44019d304c37b3882edeccef584ea2577f25da03f0c4d05e3d65b838301ce9982102bdce57d6d99f8a4cb3f39ecd4d1563c1b89256358f0c09e7f543d7b11f1f0ab67ab053e57527315ceacea46867080a4061bf838f1a34f42be186d1d65525087c0078d0ade26f00a1c4cd7a6ae5a97f0995d96edfa3fa25d49d6825f0e6b707bd8e5078f20627a08bcce61f381f972e1f8a7fd1fba92d58fa6375ba405e953af1207b0040d112f5eb0", 0xcc, &(0x7f0000000040), &(0x7f0000000280), &(0x7f00000005c0)="a4852eec1a8cf2b16f5b3f9d57b2353fcc3ddaf9fb938cf7cfec30b909c2435bd116d13e392266d8db5cadd12e76e5c9e7222d4a7de3147cf4d02c3ce989fbaef067b4c223f078bfc38731cb57633e42df01cd7a41c9cd75b593795fee68b1bf52ed90800187e37d5c1c0d05d58f247760aa59804389e7a59d4cdf07fe73f3f5146b99f078bcb9d458b60ffa131e9217957f9e5f5715ae1f8828d834a0bb39a5e074") r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r9}, 0x10) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r12, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0xc, &(0x7f00000012c0)=ANY=[@ANYRESOCT=r8, @ANYRES16=r2, @ANYRES32=r7, @ANYRESOCT=r12, @ANYRES32=r1, @ANYRES16, @ANYRES16=r0, @ANYRES64=r10, @ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 4.112483995s ago: executing program 3 (id=1896): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x7ee, 0x0, &(0x7f0000000e80)="b9e403c6631e39495aa05dc7cf1c", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000bc0)='./cgroup/syz1\x00', 0x1ff) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x400120c2) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="950000000000000082000010b4000000"], &(0x7f0000000340)='GPL\x00', 0x2, 0x16, &(0x7f0000000380)=""/22, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0xffffffff, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x4, 0x6}, {0x2, 0x1, 0x2}, {0x3, 0x2, 0xd, 0x5}, {0x3, 0x1, 0x2, 0x1}, {0x4, 0x2, 0x4}], 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="12000000990000000400000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000480), 0x0}, 0x20) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xfffffffffffffffe}, 0x8042, 0x100, 0x1, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0e00020400", @ANYRES32, @ANYBLOB="ff0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000000000000300"/28], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x19, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d0000008500000008"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff1d6405000000000065040400210000000404000001e37c60b7040000000000006a0a00fe000000008500000032000000b70000000000000095000000000000000ce0de7621e5e832249c04112cf7af2b75d0d1f034b1b3fb6bd3ce8fa62c7941272ff49142d860010ab162aa2264ab67e55a00000000000000edfe0969a9ddc125b686a1e83c8790c893d713b3295dad0ea697181d1e85b64126b5d72f204754d1d4a93f24215dee354e93cfc3f50ff23f8432c72012f021c84c59a9d4c142f439d3040cfee621589fb3a2f1407c7cbed48e7026f8d52d4bca2608c79aa4a73732028f88ce07ed1075da4a2ef44e3d8b88873f0b1de87dfb6d15936ec0a27cb554def9e27396df6b7851ffa26237ea6730880f06371beb3b290b7d8629a6f0373fefa0acb60888fc14ad2b83ca03ac2aee792482ced58af4140cc4ce3efef26e00c5b2200a91cb80c6065a697d6fc8aa8b65aee0783b04cff0218ce82c9687b4474da89c474c23727555fc5e5f8ad0f2f7a261140440fce1f12cc6df312accd011d888384283092d987c40bbb46f68c2431b97906f00000000349834fa147bd5923bbd4e606708034931a8f1a89bdf77093a0000427aab8e21e1a33d3fe093547532fce6549dd648ad233e05a7b3ea178007c1c32e871ac81f287c4aabbd153390b16d1d41ee433e3aee000000000009e106d6b5289f0000000000000000000000f7bc9f46cb71f6b889d37807865e3b4e9916dd0f72c9d58ea333b90f8886dcbf5ddda0e42ca08e3303632401f2f5212b40c0e88c957fd767dbfc80b07ad668b4f6f92fb209d7c2dbac597843c8eb7bf92fe6d0bb0b72549795c2ed19e441eb69869844152ba9da0588e42cdbc5fcd245ce5e3ef0dca64931276702a312db7956f0a75eb9caa17d47a6331c7c963cbf86a845ce27c26b7136d3e7207318b1df7a6320c64f18ccd926eaeddcde8d5006d6c38db117fb1115221a66169172720ccca770bff37e59511b2606138377eda44b2f288b491ab8aae0e11a98303b0e407e0f9d21f4a3ebbd3fabf6da9a1a1f869a339fab465d8322b7280b0734fd115a19b33c8644fff71b3c62f2e1b827e2663e06a751182e968c8ab05fb1d0115d4b11d944f2c06acc023a02b7416a9a10218d21503cda13bb5df6c992e52e1c01793b728eac000058ab3b3900d279297dadc127e2f38fc60c23af2e1fefa5a83456647191ba1953d320f59aa261fe79613df6bf43884e9649691e32680d75a541c27ffe74f9d13340f2cf1c7dc2b7db01213216cd4ecfd30efe137641471987289b7e23482e026b26eacd1b97443e2ea2d1d6e31a01ee0ae7fa195a2152b2338b086423a3883f2ce3e2f84e04f4d52c985eac4b46336908599564b47db0e6aa97ee51a360f4382fd99745725d44c77d097f69d19fe86f71c38a0226d44ebe0ecbd959f14b540745cd03b8c9f02b825ba45ca85706c73115f70871db9d2a1bc2a517b39f9648123917a5db07ba4e27f961373767e1ea8f7cc558e483abef1a9923c5cfa2081e430680950b7d7c377726b557ad31fdee17ba7057741f39d29d8ab295222f96297a777bb235416e72c84afef2bdb08fb375147b028b89f15af45bc8976b91158c13c9876daa71e7db0f5a17376be39ea79ce1246c547c740e31c64e5d293e0e5a544dd166010061d6ccae46c173b8e11721e4bce22c16af00000021f80ac6c3971006db853e3c40a5417d6eac09eb0e01ac6bd4c6dacdcb1d6d2ef9c8bdea91c984022821e961236d08f8b9072ec6cb5d5a68833fd5b4e80a5ac2bc6ff323f5ce612b59ce8177956c1affcc8baf4c8b59ab959aff9a7bd81f7c7c1f1bb92ddbeed6bce8041c7f0c1c584e6ae027678ce3cfbfea938aecc3c5119c5875b7fb35dc20f5c7aaae1e276104f607a73fe501c1045873a2b1eb80e95c87f099d98028dc82bdc7ef08c871fb3061c3c5ebd613e6e5e8cf099bb6e8c0441a133c85138b36a02c47fbedf7ed1d3ce74c9ec2c676c0b2d4b5eca61dbf5769b483c2a9f6bec666dae4e81960e9bad7f17cfc3d5bcc7b7f437110ca8ffa908c12086b2227eb202a8d56e0925ba994b05c98c39de44d25932449ddf08e5377814a40877eab4440ca01b3f50d2014a61a7d32105254b424238122386424efa3a7041254f686a5faac120942287f75e8e3db569ce47b120059d774a37e11d013be50cd2cbb00f6d2a23af61ec7d30bb7dc33a92f900b6ff1d29dc61cc40b846040dbafd00c6bcfbcf700"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x702, 0xe, 0x0, &(0x7f0000000380)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 3.978953217s ago: executing program 2 (id=1898): bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000280)={'wg2\x00'}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r3}, 0x0, &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_deliver\x00', r4}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) socketpair(0x1, 0x4, 0xf, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) 3.910652708s ago: executing program 2 (id=1899): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r3}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x14000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x0, r4, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0xfdef) ioctl$TUNSETDEBUG(r7, 0x400454c9, &(0x7f0000000180)=0xfffffffe) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r5, 0x4008240b, &(0x7f00000001c0)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r2}, 0x10) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000081}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_int(r8, &(0x7f0000000080)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_subtree(r9, &(0x7f0000000180)=ANY=[@ANYRESOCT, @ANYBLOB='b'], 0x31) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 3.909123318s ago: executing program 4 (id=1900): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000380)='task_rename\x00', r0}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r2}, &(0x7f00000008c0), &(0x7f0000000900)=r1}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000100000000002e"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1, 0x0, 0x0, @void, @value}, 0x20) r5 = syz_clone(0x0, &(0x7f0000000140)="b5cc5ee9bf92bf85e7f9863e2f3d2fb0e6c6521111edf8fe44c684964f22cadc36", 0x21, &(0x7f0000000240), &(0x7f00000003c0), &(0x7f0000000400)="0234a9ed3ce4a2eb5b9273ffd96c3db6db6522993990bf5b7e00afe145a7b7858d20c0772301782acd26785fcb34fc4427f63a4a4cd2d0719d1beda762aae01362eff0f5321be561a6a1c9705bb5") perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xb, 0x3, 0x4, 0x4, 0x0, 0x2, 0x20004, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x6, 0x6}, 0x81004, 0x9, 0x288e, 0x4, 0x1, 0x1, 0x1, 0x0, 0x7f, 0x0, 0x7}, r5, 0x10, r4, 0x1) 3.74524387s ago: executing program 3 (id=1902): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRES8=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r5}, 0x10) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r8, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0xc, &(0x7f00000012c0)=ANY=[@ANYRESOCT=r4, @ANYRES16=r2, @ANYRES32=r3, @ANYRESOCT=r8, @ANYRES32=r1, @ANYRES16, @ANYRES16=r0, @ANYRES64=r6, @ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3.670635831s ago: executing program 4 (id=1903): syz_clone(0x1101c000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000800000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0, 0x0, 0x3}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x9000, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r1, &(0x7f0000003000), 0x201, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001180)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000000000000073000000000000e5ffffff00007ed7351d0536d40db3696cb450e2ca62f82a5e8066be51b4980391c170add8cc324402afda4bad1661f44a361cef9e22240ac5065ada27ffe4c1f0b08b515bf4760d7dfc2f720cbbcc37770274436b04b11f6c44bb39a17f2d03173c59fdfb3c9b176558ea6a0dbe5e98d7cce765ef021017a99c1691648b3958fae75ee5c8299729620867ef8b931d9d76e9e44f078b2aba1b9b45a0317b7df43bad789109aa2a63d36948dd849a6e808755f6d7b87871e624b825471cf90bffabb3c97f24b7a8ad1414fec7f9bf6e3714168d2c78bdbe2f1da20f"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) close(r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r5, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 3.547736373s ago: executing program 4 (id=1904): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x7ee, 0x0, &(0x7f0000000e80)="b9e403c6631e39495aa05dc7cf1c", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000bc0)='./cgroup/syz1\x00', 0x1ff) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/22, 0x16}], 0x1}, 0x400120c2) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="950000000000000082000010b4000000"], &(0x7f0000000340)='GPL\x00', 0x2, 0x16, &(0x7f0000000380)=""/22, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0xffffffff, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x4, 0x6}, {0x2, 0x1, 0x2}, {0x3, 0x2, 0xd, 0x5}, {0x3, 0x1, 0x2, 0x1}, {0x4, 0x2, 0x4}], 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="12000000990000000400000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000480), 0x0}, 0x20) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xfffffffffffffffe}, 0x8042, 0x100, 0x1, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0e00020400", @ANYRES32, @ANYBLOB="ff0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000000000000300"/28], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x19, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d0000008500000008"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x702, 0xe, 0x0, &(0x7f0000000380)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 3.495095263s ago: executing program 0 (id=1905): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x1, 0x6, 0x0) socketpair(0x1a, 0x800, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x144000, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0xffffffffffffffff, 0x58, &(0x7f0000000380)}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='blkio.bfq.time\x00', 0x26e1, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000011c0)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000002c0)="b9ff03076804268c989e14f088a8", 0x0, 0x4068, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xe, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) 3.251790557s ago: executing program 0 (id=1906): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e00000002000000f50c00000700000000000000", @ANYRES32, @ANYBLOB="10a700"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000008ff79a3099ca03c5107000000000000800000000000000000"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001340), &(0x7f0000000900), 0x404, r1, 0x0, 0x1ba8847c99}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x0, 0x4, 0x0, 0x0, 0x504}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socketpair(0x10, 0x3, 0xfffffdff, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'gre0\x00'}) socketpair(0x1, 0x1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) 2.301924589s ago: executing program 2 (id=1908): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x28}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRES8=r1], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) syz_clone(0x29518000, &(0x7f0000000300)="d2fcdb9785ec227ff6c6f450689ed75f15a4a948649062cdd6726038140b67fd04b44019d304c37b3882edeccef584ea2577f25da03f0c4d05e3d65b838301ce9982102bdce57d6d99f8a4cb3f39ecd4d1563c1b89256358f0c09e7f543d7b11f1f0ab67ab053e57527315ceacea46867080a4061bf838f1a34f42be186d1d65525087c0078d0ade26f00a1c4cd7a6ae5a97f0995d96edfa3fa25d49d6825f0e6b707bd8e5078f20627a08bcce61f381f972e1f8a7fd1fba92d58fa6375ba405e953af1207b0040d112f5eb0", 0xcc, &(0x7f0000000040), &(0x7f0000000280), &(0x7f00000005c0)="a4852eec1a8cf2b16f5b3f9d57b2353fcc3ddaf9fb938cf7cfec30b909c2435bd116d13e392266d8db5cadd12e76e5c9e7222d4a7de3147cf4d02c3ce989fbaef067b4c223f078bfc38731cb57633e42df01cd7a41c9cd75b593795fee68b1bf52ed90800187e37d5c1c0d05d58f247760aa59804389e7a59d4cdf07fe73f3f5146b99f078bcb9d458b60ffa131e9217957f9e5f5715ae1f8828d834a0bb39a5e074") r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r9}, 0x10) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r12, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0xc, &(0x7f00000012c0)=ANY=[@ANYRESOCT=r8, @ANYRES16=r2, @ANYRES32=r7, @ANYRESOCT=r12, @ANYRES32=r1, @ANYRES16, @ANYRES16=r0, @ANYRES64=r10, @ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)) 2.300028699s ago: executing program 3 (id=1909): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x28}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRES8=r1], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) syz_clone(0x29518000, &(0x7f0000000300)="d2fcdb9785ec227ff6c6f450689ed75f15a4a948649062cdd6726038140b67fd04b44019d304c37b3882edeccef584ea2577f25da03f0c4d05e3d65b838301ce9982102bdce57d6d99f8a4cb3f39ecd4d1563c1b89256358f0c09e7f543d7b11f1f0ab67ab053e57527315ceacea46867080a4061bf838f1a34f42be186d1d65525087c0078d0ade26f00a1c4cd7a6ae5a97f0995d96edfa3fa25d49d6825f0e6b707bd8e5078f20627a08bcce61f381f972e1f8a7fd1fba92d58fa6375ba405e953af1207b0040d112f5eb0", 0xcc, &(0x7f0000000040), &(0x7f0000000280), &(0x7f00000005c0)="a4852eec1a8cf2b16f5b3f9d57b2353fcc3ddaf9fb938cf7cfec30b909c2435bd116d13e392266d8db5cadd12e76e5c9e7222d4a7de3147cf4d02c3ce989fbaef067b4c223f078bfc38731cb57633e42df01cd7a41c9cd75b593795fee68b1bf52ed90800187e37d5c1c0d05d58f247760aa59804389e7a59d4cdf07fe73f3f5146b99f078bcb9d458b60ffa131e9217957f9e5f5715ae1f8828d834a0bb39a5e074") r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r9}, 0x10) r11 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r12 = openat$cgroup_ro(r11, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r12, &(0x7f0000000200)=0x1, 0x12) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0xc, &(0x7f00000012c0)=ANY=[@ANYRESOCT=r8, @ANYRES16=r2, @ANYRES32=r7, @ANYRESOCT=r12, @ANYRES32=r1, @ANYRES16, @ANYRES16=r0, @ANYRES64=r10, @ANYRESOCT=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.135341831s ago: executing program 0 (id=1911): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r2}, &(0x7f0000000380), &(0x7f00000003c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='rpcgss_import_ctx\x00', r0, 0x0, 0x8}, 0x18) syz_clone(0x42a00180, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r6}, 0x10) mkdir(0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz0\x00', 0x200002, 0x0) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_netprio_ifpriomap(r7, &(0x7f0000000040), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r8, &(0x7f00000009c0)=ANY=[@ANYBLOB="76b9"], 0x12) 1.341337252s ago: executing program 1 (id=1912): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1.313229032s ago: executing program 3 (id=1913): bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x9, 0xa, 0x42, 0x40, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3, r0}, 0x38) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000e8000000000040d900008500000023000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000000c0)='mm_page_alloc\x00', r1}, 0x18) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000012c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x18, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000003040)={&(0x7f0000002d40), 0x6e, 0x0}, 0x0) syz_clone(0x27041280, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$inet(r5, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r6}, 0x3d) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r7, &(0x7f0000000300)="0139aa8089d82dc6ec5b8a25e4", &(0x7f00000006c0)=""/200}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000002c0)='hrtimer_start\x00', r8}, 0x3d) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r2}, 0x10) 1.307551632s ago: executing program 0 (id=1914): bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x400, 0x1e37cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x401, 0x200, 0x0, 0x7, 0x0, 0x100}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000500) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x34, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='mm_page_alloc\x00', r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2080}, 0x20008004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="12000000070000000400000008"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r3, 0xffffffffffffffff}, &(0x7f0000000440), &(0x7f0000000480)=r2}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000400)={r4, &(0x7f0000000380), 0x0}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[], 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES32, @ANYBLOB, @ANYRES64], 0x10) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_subtree(r5, &(0x7f0000000200), 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000180)='cpu.weight\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) 1.295555703s ago: executing program 1 (id=1915): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) syz_clone(0x2000400, 0x0, 0xfffffebf, 0x0, 0x0, 0x0) 1.292576933s ago: executing program 2 (id=1916): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0e000000040000000400000002"], 0x48) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, 0x0, &(0x7f00000000c0)=""/102}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYRES32=0x1, @ANYRES32=0x0, @ANYBLOB="0000000000000000e1ff"], 0x48) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005000000", @ANYRES32, @ANYBLOB="000000000000000000008302ff89b45a32920000fdd436552a7a219099c7138625be9d0fe4eecf63384df4f8d86cacd0d3625348ee3abea9f127390161290155028b4031eaca6258611105ed3962246ea49a1d6016f5d3eef56432ea645fd311764f8e58f6f93951724a16eb3615744f9bf1e685c66efb4af53f6b203ea433d93348704c21e29162b47bbbc23ad4c3b5f631455803f7780029cf7e1d064a5e45fbc9dbbec418e81ced3a812f3cb6df", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000780)=ANY=[@ANYBLOB="9feb01001800000000000000180000001800000004000000020000000000000c02000000000000000000000d0000000000005f"], 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0600000004000000030080000500000000000000da25a2055c1bb3349e4d0b9b289ca0b7e9f108c068955859f8de9c688e9c7dbd69d35f23c733bc8fc408b329b9e209f4ef21323bb183ad0de943b6bdeeb374e1758e2bfaebb566910de2b954d834c17d677dcb81cb1adc0213134c5bd393f57689bfd0e570e533a98782abc2ae806a9a08627104c7669d270d7530367b955007304571c568757b8c6b695d1cf53046cbbca889b68304e2226c922e22bc5e81c55312aa433ba8361536ba24b143fd49c256675764a6039eab19fc69ba", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x4030582b, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0xf8}], 0x1}, 0x1f00) sendmsg$tipc(r4, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f0000009500000000586100"], 0x0, 0x4, 0xdb, &(0x7f00000002c0)=""/219, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.267181963s ago: executing program 1 (id=1917): perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x9}, 0x8080, 0x5, 0x0, 0x0, 0xed}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x8, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2f}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f2, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'tunl0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x89f1, &(0x7f0000000080)) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000880), &(0x7f00000008c0)=r0}, 0x20) 1.216821873s ago: executing program 1 (id=1918): socketpair(0x1, 0x1, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b703000008000040850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='kfree\x00', r1}, 0x18) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRESHEX=0x0, @ANYBLOB], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000080"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) close(r2) 1.214679224s ago: executing program 1 (id=1919): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000003c0)='cgroup.procs\x00', 0x2, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r3 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000280)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0xf, 0x10, &(0x7f0000000600)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB="000000000400875918428126be900000850000006a01000095dde88b6c9b41815b9d4eee71c45ffbfc73b8d5b6a56b9255cf999673fc0481e9c844cd7836ac1cb79d6b2faf9dadeb6750a1555ed314a0f811e17a90385ebaba65ecf4bbb39d8cbd76063e5e90aa48c71d9803ba06fbca1de72e4101c2737db9f3d4650d8206967943faedb7c8ff57ab5c8b"], 0x0, 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="1e00000000000000050000009100000000080000", @ANYRES32, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES64=r1, @ANYBLOB="02000000000000000100"/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffb) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0xffffffc8) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x60, 0x0, 0x0, 0x0, 0x200, 0x10100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x408, 0x0, @perf_config_ext={0x8000, 0xd}, 0x1e005, 0x0, 0xffff792e, 0x0, 0x100, 0x10000001, 0xffff}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0xf752187d79f8e21b) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="850000000c000000760000000000001027000000000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffed8, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3f) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r7, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r8, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r6, 0x0, 0x0}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="0100000004000000e57f00000100000000000000", @ANYRES32, @ANYBLOB="db784db2ab902681380345e71afd0000000073cb5ff79358a41d4b07000070275374c183a35a9700f4d7b6330ba3429126ea2304d86a4eb9993712786011c72f255ec69e93474e91f1ac0c10a82623112258d06b2182a818ffc7ab8d9f29440f8ae329fe06767438087ba6f909d89e50150ac4c4a0114449cd2fd6d9a8ec7a67ab60e81648736588fd", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) close(r5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030027da7d50f1e97946b81f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.055959576s ago: executing program 0 (id=1920): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0xa, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x7, 0x5, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa3, &(0x7f0000000280)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000002c0), &(0x7f0000000300), 0x8, 0x3d, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) write$cgroup_int(r0, &(0x7f0000000000), 0xfffffd26) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x401c5820, &(0x7f00000001c0)=0x8) 1.037077206s ago: executing program 3 (id=1921): r0 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffe, 0x22a0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x40, 0x4}, 0x110, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0500000004000000040000000400000000000000", @ANYRES32, @ANYBLOB="0000000000000080244831163e71a8fa6a021dccb800"/34, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x7, 0x17, &(0x7f0000000380)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000040000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/22], 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000017b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x56, 0x1, 0x0, 0x0, 0x0, 0x7fef, 0x82, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7b, 0x1, @perf_config_ext={0x407fff, 0xaea}, 0x14005, 0x2e, 0xfffffbff, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0xa9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000240)='ns/user\x00') perf_event_open(&(0x7f0000000480)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x5}, 0x100e64, 0xc78, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000480)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x78}, 0x40000122) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0900000018000000070000004000000042000000", @ANYRES32=0x1], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000580), 0x1000, r5}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000001600)={r5, &(0x7f0000000580), &(0x7f0000001580)=""/92}, 0x20) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000c80)={@cgroup, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, 0x0, &(0x7f0000000080)='GPL\x00', 0x5, 0xfffffffffffffe1e, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x20, @void, @value}, 0x90) perf_event_open(&(0x7f0000000200)={0x2, 0xff69, 0x99, 0x1, 0x0, 0x2, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1e000000f8000000060000000900000080000000", @ANYRES32, @ANYBLOB='\t\x00'/20, @ANYRES32=0x0, @ANYRES32=r4, @ANYBLOB="0100000200000000000000000b00"/28], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000002c0), 0x8, r6}, 0x38) 666.824881ms ago: executing program 4 (id=1922): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r0}, 0x18) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={0xffffffffffffffff, 0x18000000000002a0, 0x7ee, 0x0, &(0x7f0000000e80)="b9e403c6631e39495aa05dc7cf1c", 0x0, 0x7ab, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000bc0)='./cgroup/syz1\x00', 0x1ff) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000400)=""/22, 0x16}], 0x1}, 0x400120c2) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r1}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0xd, 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="950000000000000082000010b4000000"], &(0x7f0000000340)='GPL\x00', 0x2, 0x16, &(0x7f0000000380)=""/22, 0x41000, 0x2, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000a00)={0x3, 0x2, 0x9, 0x85}, 0x10, 0xffffffffffffffff, 0xffffffffffffffff, 0x7, &(0x7f0000000a40)=[0x1], &(0x7f0000000a80)=[{0xffffffff, 0x1, 0x1, 0x9}, {0x3, 0x2, 0x8, 0x9}, {0x4, 0x4, 0x6}, {0x2, 0x1, 0x2}, {0x3, 0x2, 0xd, 0x5}, {0x3, 0x1, 0x2, 0x1}, {0x4, 0x2, 0x4}], 0x10, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="12000000990000000400000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000500)={r2, &(0x7f0000000480), 0x0}, 0x20) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe, 0xfffffffffffffffe}, 0x8042, 0x100, 0x1, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unlink(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="0e00020400", @ANYRES32, @ANYBLOB="ff0100"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="05000000000000000300"/28], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x19, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d0000008500000008"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"/1664], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x702, 0xe, 0x0, &(0x7f0000000380)="e460334470b8d480eb00c15286dd", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x9) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 451.552094ms ago: executing program 0 (id=1923): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000071120b000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_switch\x00', r0}, 0x10) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x7a05, 0x1700) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, 0x0) (async) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) (async) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) (async) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) (async) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000071120b000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) 450.605464ms ago: executing program 3 (id=1924): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x28}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0xac, &(0x7f0000000200)=""/4096, 0x0, 0x0, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRES8=r1], 0x48) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) close(r3) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r6}, 0x10) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001e80)={&(0x7f0000000180)=@abs={0x1, 0x5c, 0x1}, 0x6e, 0x0}, 0x20000) ioctl$TUNGETVNETLE(r3, 0x40047451, &(0x7f0000000180)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) syz_clone(0x29518000, &(0x7f0000000300)="d2fcdb9785ec227ff6c6f450689ed75f15a4a948649062cdd6726038140b67fd04b44019d304c37b3882edeccef584ea2577f25da03f0c4d05e3d65b838301ce9982102bdce57d6d99f8a4cb3f39ecd4d1563c1b89256358f0c09e7f543d7b11f1f0ab67ab053e57527315ceacea46867080a4061bf838f1a34f42be186d1d65525087c0078d0ade26f00a1c4cd7a6ae5a97f0995d96edfa3fa25d49d6825f0e6b707bd8e5078f20627a08bcce61f381f972e1f8a7fd1fba92d58fa6375ba405e953af1207b0040d112f5eb0", 0xcc, &(0x7f0000000040), &(0x7f0000000280), &(0x7f00000005c0)="a4852eec1a8cf2b16f5b3f9d57b2353fcc3ddaf9fb938cf7cfec30b909c2435bd116d13e392266d8db5cadd12e76e5c9e7222d4a7de3147cf4d02c3ce989fbaef067b4c223f078bfc38731cb57633e42df01cd7a41c9cd75b593795fee68b1bf52ed90800187e37d5c1c0d05d58f247760aa59804389e7a59d4cdf07fe73f3f5146b99f078bcb9d458b60ffa131e9217957f9e5f5715ae1f8828d834a0bb39a5e074") r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r7}, 0x10) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, &(0x7f0000000200)=0x1, 0x12) 409.804424ms ago: executing program 2 (id=1925): perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x62, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0, 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000010000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000001c0)='percpu_alloc_percpu\x00', r0}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x1e, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000010000000000"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x50) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x24008081}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(0x3) (fail_nth: 1) 0s ago: executing program 1 (id=1926): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.152' (ED25519) to the list of known hosts. [ 19.295533][ T28] audit: type=1400 audit(1747363240.845:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 19.296566][ T275] cgroup: Unknown subsys name 'net' [ 19.299031][ T28] audit: type=1400 audit(1747363240.845:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.302660][ T28] audit: type=1400 audit(1747363240.855:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 19.302763][ T275] cgroup: Unknown subsys name 'devices' [ 19.420774][ T275] cgroup: Unknown subsys name 'hugetlb' [ 19.426549][ T275] cgroup: Unknown subsys name 'rlimit' [ 19.526963][ T28] audit: type=1400 audit(1747363241.075:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 19.550113][ T28] audit: type=1400 audit(1747363241.075:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 19.561592][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 19.575013][ T28] audit: type=1400 audit(1747363241.075:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 19.606549][ T28] audit: type=1400 audit(1747363241.145:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.621425][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 19.640584][ T28] audit: type=1400 audit(1747363241.145:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.640627][ T28] audit: type=1400 audit(1747363241.175:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 19.640651][ T28] audit: type=1400 audit(1747363241.175:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 20.504344][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.511552][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.518768][ T284] device bridge_slave_0 entered promiscuous mode [ 20.525626][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.532692][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.540018][ T284] device bridge_slave_1 entered promiscuous mode [ 20.593731][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.600849][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.608283][ T283] device bridge_slave_0 entered promiscuous mode [ 20.618823][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.625896][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.633202][ T285] device bridge_slave_0 entered promiscuous mode [ 20.641320][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.648343][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.655799][ T286] device bridge_slave_0 entered promiscuous mode [ 20.662366][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.669848][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.677065][ T283] device bridge_slave_1 entered promiscuous mode [ 20.687145][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.694234][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.701551][ T285] device bridge_slave_1 entered promiscuous mode [ 20.709319][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.716320][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.723862][ T286] device bridge_slave_1 entered promiscuous mode [ 20.771102][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.778155][ T287] bridge0: port 1(bridge_slave_0) entered disabled state [ 20.785595][ T287] device bridge_slave_0 entered promiscuous mode [ 20.792365][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.799396][ T287] bridge0: port 2(bridge_slave_1) entered disabled state [ 20.806821][ T287] device bridge_slave_1 entered promiscuous mode [ 20.959414][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 20.966440][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 20.973718][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 20.980762][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.010906][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.018051][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.025366][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.032395][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.046433][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.053521][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.060817][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.067838][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.076904][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.083959][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.091251][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.098269][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.128203][ T287] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.135276][ T287] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.142563][ T287] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.149611][ T287] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.162414][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.169738][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.176811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.184672][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.192251][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.199411][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.206555][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.213915][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.221067][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.228184][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.235449][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.257342][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.265563][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.272609][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.291451][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.300173][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.308270][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.315289][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.342402][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.350594][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.357591][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.364953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.373701][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.380751][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.390108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.403771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 21.411244][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.418616][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 21.426375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.434664][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.441708][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.477639][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.486732][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.495095][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.502124][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.509736][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.517706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.525675][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.534158][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.542325][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.549337][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.556613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.564921][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.572939][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.580942][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.588756][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.596745][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.604711][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.613336][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.621608][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.628624][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.635976][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.643994][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.652036][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.660023][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.667880][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.676163][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.684145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 21.692373][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 21.700697][ T8] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.707721][ T8] bridge0: port 1(bridge_slave_0) entered forwarding state [ 21.715114][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 21.723387][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 21.731545][ T8] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.738541][ T8] bridge0: port 2(bridge_slave_1) entered forwarding state [ 21.765102][ T287] device veth0_vlan entered promiscuous mode [ 21.771988][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.780852][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 21.788186][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 21.795814][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.803991][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.812108][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 21.820137][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 21.827945][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 21.836395][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 21.844328][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.852596][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.861006][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.869337][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.880911][ T284] device veth0_vlan entered promiscuous mode [ 21.895669][ T283] device veth0_vlan entered promiscuous mode [ 21.906888][ T285] device veth0_vlan entered promiscuous mode [ 21.913541][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.922111][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.930769][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.938618][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.946706][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.955152][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.963848][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 21.971816][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 21.979985][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 21.988184][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 21.996512][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.004344][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.013214][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.020854][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.028157][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.035652][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.043852][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.051375][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.062554][ T284] device veth1_macvtap entered promiscuous mode [ 22.075312][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.083423][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.091771][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.099869][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 22.107649][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.115810][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.124106][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.132613][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 22.140233][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 22.147648][ T286] device veth0_vlan entered promiscuous mode [ 22.165987][ T283] device veth1_macvtap entered promiscuous mode [ 22.175072][ T287] device veth1_macvtap entered promiscuous mode [ 22.182623][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.191003][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.199824][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.208027][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.216142][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 22.224315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.232539][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 22.249602][ T286] device veth1_macvtap entered promiscuous mode [ 22.267298][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 22.276053][ T287] request_module fs-gadgetfs succeeded, but still no fs? [ 22.278408][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.295782][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.304227][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.312597][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.321177][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.329404][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.337575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.345798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.354060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.362429][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.370798][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.379060][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.393204][ T285] device veth1_macvtap entered promiscuous mode [ 22.450954][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 22.459489][ C1] hrtimer: interrupt took 24706 ns [ 22.479470][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 22.535019][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 22.599651][ T43] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 22.649269][ T320] device sit0 entered promiscuous mode [ 22.722076][ T318] device sit0 entered promiscuous mode [ 25.478864][ C1] sched: RT throttling activated [ 26.309016][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 26.309034][ T28] audit: type=1400 audit(1747363247.835:111): avc: denied { write } for pid=330 comm="syz.4.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 28.209200][ T370] device sit0 entered promiscuous mode [ 30.754702][ T405] device sit0 entered promiscuous mode [ 31.849855][ T427] device sit0 left promiscuous mode [ 32.000673][ T28] audit: type=1400 audit(1747363253.545:112): avc: denied { setopt } for pid=428 comm="syz.1.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 32.210666][ T432] device sit0 entered promiscuous mode [ 32.816290][ T28] audit: type=1400 audit(1747363254.295:113): avc: denied { create } for pid=440 comm="syz.4.35" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 32.913994][ T441] device syzkaller0 entered promiscuous mode [ 32.991533][ T28] audit: type=1400 audit(1747363254.545:114): avc: denied { create } for pid=445 comm="syz.2.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 33.576349][ T448] device sit0 entered promiscuous mode [ 33.923189][ T468] Illegal XDP return value 3829564620 on prog (id 39) dev N/A, expect packet loss! [ 34.296668][ T28] audit: type=1400 audit(1747363255.845:115): avc: denied { cpu } for pid=466 comm="syz.3.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 34.376265][ T28] audit: type=1400 audit(1747363255.925:116): avc: denied { write } for pid=466 comm="syz.3.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 35.379673][ T487] GPL: port 1(erspan0) entered blocking state [ 35.518988][ T487] GPL: port 1(erspan0) entered disabled state [ 35.560050][ T487] device erspan0 entered promiscuous mode [ 35.627437][ T488] GPL: port 1(erspan0) entered blocking state [ 35.633588][ T488] GPL: port 1(erspan0) entered forwarding state [ 35.727348][ T495] device sit0 left promiscuous mode [ 35.839685][ T496] device sit0 entered promiscuous mode [ 36.158086][ T496] syz.2.47 (496) used greatest stack depth: 22240 bytes left [ 36.283731][ T510] device sit0 left promiscuous mode [ 36.329658][ T508] device sit0 left promiscuous mode [ 36.352643][ T510] device sit0 entered promiscuous mode [ 36.544702][ T508] device sit0 entered promiscuous mode [ 36.713484][ T519] device sit0 left promiscuous mode [ 36.843450][ T520] device sit0 entered promiscuous mode [ 39.406974][ T558] device sit0 left promiscuous mode [ 39.750074][ T558] device sit0 entered promiscuous mode [ 39.977121][ T567] GPL: port 1(erspan0) entered blocking state [ 39.983581][ T567] GPL: port 1(erspan0) entered disabled state [ 39.992881][ T567] device erspan0 entered promiscuous mode [ 40.034777][ T567] GPL: port 1(erspan0) entered blocking state [ 40.041124][ T567] GPL: port 1(erspan0) entered forwarding state [ 40.052423][ T571] GPL: port 1(erspan0) entered blocking state [ 40.059003][ T571] GPL: port 1(erspan0) entered disabled state [ 40.069886][ T571] device erspan0 entered promiscuous mode [ 40.134847][ T576] GPL: port 1(erspan0) entered blocking state [ 40.140982][ T576] GPL: port 1(erspan0) entered forwarding state [ 40.156597][ T578] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.164438][ T578] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.241715][ T580] device bridge_slave_1 left promiscuous mode [ 40.248003][ T580] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.345376][ T580] device bridge_slave_0 left promiscuous mode [ 40.353731][ T580] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.677385][ T595] device sit0 left promiscuous mode [ 40.707234][ T596] device sit0 entered promiscuous mode [ 40.929812][ T600] device sit0 left promiscuous mode [ 41.068546][ T600] device sit0 entered promiscuous mode [ 42.998280][ T28] audit: type=1400 audit(1747363264.545:117): avc: denied { relabelfrom } for pid=676 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 43.062860][ T28] audit: type=1400 audit(1747363264.545:118): avc: denied { relabelto } for pid=676 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 44.694657][ T28] audit: type=1400 audit(1747363266.245:119): avc: denied { attach_queue } for pid=749 comm="syz.2.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 44.912037][ T784] device sit0 left promiscuous mode [ 44.957686][ T784] device sit0 entered promiscuous mode [ 45.960245][ T814] device sit0 left promiscuous mode [ 46.162968][ T817] device sit0 entered promiscuous mode [ 46.349925][ T820] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.357957][ T820] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.388977][ T821] device bridge_slave_1 left promiscuous mode [ 46.395280][ T821] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.403320][ T821] device bridge_slave_0 left promiscuous mode [ 46.409584][ T821] bridge0: port 1(bridge_slave_0) entered disabled state [ 46.842038][ T837] device sit0 left promiscuous mode [ 46.911363][ T837] device sit0 entered promiscuous mode [ 47.725121][ T860] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.733527][ T860] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.808751][ T861] device bridge_slave_1 left promiscuous mode [ 47.816470][ T861] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.835766][ T861] device bridge_slave_0 left promiscuous mode [ 47.875421][ T861] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.109348][ T869] device sit0 left promiscuous mode [ 48.250020][ T871] device sit0 entered promiscuous mode [ 48.525095][ T878] device sit0 left promiscuous mode [ 48.557979][ T878] device sit0 entered promiscuous mode [ 49.090273][ T895] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.098698][ T895] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.216879][ T895] device bridge_slave_1 left promiscuous mode [ 49.253175][ T895] bridge0: port 2(bridge_slave_1) entered disabled state [ 49.321272][ T895] device bridge_slave_0 left promiscuous mode [ 49.349862][ T895] bridge0: port 1(bridge_slave_0) entered disabled state [ 49.950000][ T924] device sit0 left promiscuous mode [ 50.187605][ T925] device sit0 entered promiscuous mode [ 50.439765][ T931] device sit0 left promiscuous mode [ 50.457459][ T931] device sit0 entered promiscuous mode [ 51.046061][ T950] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.054942][ T950] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.167414][ T950] device bridge_slave_1 left promiscuous mode [ 51.174558][ T950] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.186541][ T950] device bridge_slave_0 left promiscuous mode [ 51.193520][ T950] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.992685][ T978] device sit0 left promiscuous mode [ 52.096113][ T980] device sit0 left promiscuous mode [ 52.146049][ T985] device sit0 entered promiscuous mode [ 52.428151][ T978] device sit0 entered promiscuous mode [ 54.429951][ T1040] device sit0 left promiscuous mode [ 54.512827][ T1043] device sit0 entered promiscuous mode [ 54.627225][ T1045] device sit0 left promiscuous mode [ 54.742394][ T1046] device sit0 entered promiscuous mode [ 56.114560][ T1086] device sit0 left promiscuous mode [ 56.176034][ T1089] device sit0 entered promiscuous mode [ 56.667053][ T1106] device sit0 left promiscuous mode [ 56.810021][ T1110] device sit0 entered promiscuous mode [ 58.277985][ T1146] device sit0 left promiscuous mode [ 58.375362][ T1151] device sit0 entered promiscuous mode [ 58.951554][ T1166] device sit0 left promiscuous mode [ 59.076349][ T1167] device sit0 entered promiscuous mode [ 63.904855][ T1219] device sit0 left promiscuous mode [ 64.073959][ T1220] device sit0 entered promiscuous mode [ 64.309073][ T1225] device sit0 left promiscuous mode [ 64.431247][ T1227] device sit0 entered promiscuous mode [ 64.596847][ T1241] device sit0 left promiscuous mode [ 64.617600][ T1243] device sit0 entered promiscuous mode [ 65.948894][ T1272] device sit0 left promiscuous mode [ 66.011366][ T1275] device sit0 entered promiscuous mode [ 66.498801][ T1288] device sit0 left promiscuous mode [ 66.588623][ T1291] device sit0 entered promiscuous mode [ 68.413612][ T1339] device sit0 left promiscuous mode [ 68.629263][ T1343] device sit0 entered promiscuous mode [ 70.142085][ T1387] device sit0 left promiscuous mode [ 70.376453][ T1390] device sit0 entered promiscuous mode [ 72.547834][ T1446] device sit0 left promiscuous mode [ 72.596661][ T1446] device sit0 entered promiscuous mode [ 72.831224][ T1448] device sit0 left promiscuous mode [ 72.948348][ T1448] device sit0 entered promiscuous mode [ 73.259353][ T1456] device sit0 left promiscuous mode [ 73.285224][ T1456] device sit0 entered promiscuous mode [ 75.050555][ T1505] device sit0 left promiscuous mode [ 75.598645][ T1508] device sit0 left promiscuous mode [ 75.611506][ T1506] device sit0 entered promiscuous mode [ 75.779165][ T1511] device sit0 entered promiscuous mode [ 78.512036][ T1557] device sit0 left promiscuous mode [ 78.689010][ T1559] device sit0 entered promiscuous mode [ 78.976650][ T1572] device sit0 left promiscuous mode [ 78.987772][ T1572] device sit0 entered promiscuous mode [ 79.445945][ T1586] device sit0 left promiscuous mode [ 79.531781][ T1588] device sit0 entered promiscuous mode [ 80.037463][ T1607] device sit0 left promiscuous mode [ 80.061868][ T1609] device sit0 left promiscuous mode [ 80.109376][ T1609] device sit0 entered promiscuous mode [ 80.455216][ T1607] device sit0 entered promiscuous mode [ 80.830798][ T1638] device sit0 left promiscuous mode [ 81.126917][ T1641] device sit0 entered promiscuous mode [ 86.393226][ T1713] device sit0 left promiscuous mode [ 86.471526][ T1711] device sit0 entered promiscuous mode [ 88.127667][ T1750] GPL: port 1(erspan0) entered blocking state [ 88.138265][ T1750] GPL: port 1(erspan0) entered disabled state [ 88.183504][ T1750] device erspan0 entered promiscuous mode [ 88.202547][ T1750] GPL: port 1(erspan0) entered blocking state [ 88.208960][ T1750] GPL: port 1(erspan0) entered forwarding state [ 88.316036][ T1756] device sit0 left promiscuous mode [ 88.347276][ T1757] device sit0 entered promiscuous mode [ 89.655213][ T1777] device sit0 left promiscuous mode [ 89.699336][ T1777] device sit0 entered promiscuous mode [ 90.351921][ T1789] device sit0 left promiscuous mode [ 90.474071][ T1791] device sit0 entered promiscuous mode [ 90.592708][ T1793] device sit0 left promiscuous mode [ 90.729036][ T1798] device sit0 entered promiscuous mode [ 90.833119][ T1804] device sit0 left promiscuous mode [ 90.904792][ T1806] device sit0 entered promiscuous mode [ 92.640273][ T1846] device sit0 left promiscuous mode [ 92.714930][ T1856] device sit0 entered promiscuous mode [ 93.119264][ T1870] device sit0 left promiscuous mode [ 93.383670][ T1872] device sit0 entered promiscuous mode [ 93.988093][ T1889] device sit0 left promiscuous mode [ 94.042982][ T1890] device sit0 entered promiscuous mode [ 94.085934][ T28] audit: type=1400 audit(1747363315.635:120): avc: denied { create } for pid=1891 comm="syz.2.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 94.698283][ T1910] device sit0 left promiscuous mode [ 94.831427][ T1914] device sit0 left promiscuous mode [ 94.967598][ T1912] device sit0 entered promiscuous mode [ 95.087102][ T1915] device sit0 entered promiscuous mode [ 95.879974][ T28] audit: type=1400 audit(1747363317.435:121): avc: denied { create } for pid=1943 comm="syz.2.498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 97.100905][ T1980] device sit0 left promiscuous mode [ 97.355826][ T1985] device sit0 entered promiscuous mode [ 100.672337][ T2068] FAULT_INJECTION: forcing a failure. [ 100.672337][ T2068] name failslab, interval 1, probability 0, space 0, times 1 [ 100.736750][ T2068] CPU: 1 PID: 2068 Comm: syz.2.539 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 100.746515][ T2068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 100.756594][ T2068] Call Trace: [ 100.759894][ T2068] [ 100.762839][ T2068] __dump_stack+0x21/0x24 [ 100.767208][ T2068] dump_stack_lvl+0xee/0x150 [ 100.771829][ T2068] ? __cfi_dump_stack_lvl+0x8/0x8 [ 100.776969][ T2068] ? trace_raw_output_percpu_destroy_chunk+0xc0/0xc0 [ 100.783667][ T2068] ? pcpu_alloc+0xdea/0x16b0 [ 100.788288][ T2068] dump_stack+0x15/0x24 [ 100.792499][ T2068] should_fail_ex+0x3d4/0x520 [ 100.797194][ T2068] __should_failslab+0xac/0xf0 [ 100.801973][ T2068] ? percpu_ref_init+0xce/0x350 [ 100.806849][ T2068] should_failslab+0x9/0x20 [ 100.811377][ T2068] __kmem_cache_alloc_node+0x3d/0x2c0 [ 100.816781][ T2068] ? percpu_ref_init+0xce/0x350 [ 100.821655][ T2068] kmalloc_trace+0x29/0xb0 [ 100.826141][ T2068] percpu_ref_init+0xce/0x350 [ 100.830841][ T2068] ? __cfi_css_release+0x10/0x10 [ 100.835811][ T2068] cgroup_mkdir+0x2ea/0x1310 [ 100.840420][ T2068] ? __cfi_cgroup_mkdir+0x10/0x10 [ 100.845464][ T2068] ? show_sid+0x1b0/0x1b0 [ 100.849818][ T2068] ? _raw_spin_lock+0x8e/0xe0 [ 100.854528][ T2068] ? up_read+0x56/0x1d0 [ 100.858719][ T2068] ? __cfi_cgroup_mkdir+0x10/0x10 [ 100.863761][ T2068] kernfs_iop_mkdir+0x1bb/0x2c0 [ 100.868634][ T2068] vfs_mkdir+0x39c/0x580 [ 100.872910][ T2068] do_mkdirat+0x171/0x4c0 [ 100.877261][ T2068] __x64_sys_mkdirat+0x89/0xa0 [ 100.882045][ T2068] x64_sys_call+0x73d/0x9a0 [ 100.886569][ T2068] do_syscall_64+0x4c/0xa0 [ 100.891013][ T2068] ? clear_bhb_loop+0x15/0x70 [ 100.895716][ T2068] ? clear_bhb_loop+0x15/0x70 [ 100.900425][ T2068] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 100.906353][ T2068] RIP: 0033:0x7f46b818e969 [ 100.910772][ T2068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 100.930381][ T2068] RSP: 002b:00007f46b900b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 100.938792][ T2068] RAX: ffffffffffffffda RBX: 00007f46b83b5fa0 RCX: 00007f46b818e969 [ 100.946761][ T2068] RDX: 00000000000001ff RSI: 0000200000000000 RDI: ffffffffffffff9c [ 100.954816][ T2068] RBP: 00007f46b900b090 R08: 0000000000000000 R09: 0000000000000000 [ 100.962953][ T2068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 100.970917][ T2068] R13: 0000000000000000 R14: 00007f46b83b5fa0 R15: 00007ffcb0228308 [ 100.978884][ T2068] [ 101.407443][ T2083] device sit0 left promiscuous mode [ 101.441227][ T2083] device sit0 entered promiscuous mode [ 102.614611][ T2112] device sit0 left promiscuous mode [ 103.001050][ T2115] device sit0 entered promiscuous mode [ 103.125950][ T2127] device sit0 left promiscuous mode [ 103.340391][ T2127] device sit0 entered promiscuous mode [ 104.083380][ T2147] device sit0 left promiscuous mode [ 104.210375][ T2148] device sit0 entered promiscuous mode [ 104.437083][ T2153] device sit0 left promiscuous mode [ 104.831419][ T2157] device sit0 entered promiscuous mode [ 105.679858][ T2184] device sit0 left promiscuous mode [ 105.782805][ T2192] device sit0 entered promiscuous mode [ 106.854891][ T28] audit: type=1400 audit(1747363328.405:122): avc: denied { create } for pid=2215 comm="syz.1.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 107.204654][ T2223] device syzkaller0 entered promiscuous mode [ 107.323679][ T2226] device sit0 left promiscuous mode [ 107.396895][ T2227] device sit0 entered promiscuous mode [ 108.158485][ T2263] device sit0 left promiscuous mode [ 108.222453][ T2264] device sit0 entered promiscuous mode [ 108.414964][ T2268] device sit0 left promiscuous mode [ 108.526226][ T2269] device sit0 entered promiscuous mode [ 109.118634][ T2285] FAULT_INJECTION: forcing a failure. [ 109.118634][ T2285] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 109.187925][ T2285] CPU: 1 PID: 2285 Comm: syz.2.607 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 109.197712][ T2285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 109.208290][ T2285] Call Trace: [ 109.211573][ T2285] [ 109.214512][ T2285] __dump_stack+0x21/0x24 [ 109.218857][ T2285] dump_stack_lvl+0xee/0x150 [ 109.223456][ T2285] ? __cfi_dump_stack_lvl+0x8/0x8 [ 109.228489][ T2285] dump_stack+0x15/0x24 [ 109.232652][ T2285] should_fail_ex+0x3d4/0x520 [ 109.237341][ T2285] should_fail+0xb/0x10 [ 109.241512][ T2285] should_fail_usercopy+0x1a/0x20 [ 109.246558][ T2285] _copy_from_iter+0x190/0xfd0 [ 109.251333][ T2285] ? __cfi__copy_from_iter+0x10/0x10 [ 109.256622][ T2285] ? check_stack_object+0x81/0x140 [ 109.261743][ T2285] ? __check_object_size+0x45a/0x600 [ 109.267046][ T2285] kernfs_fop_write_iter+0x1a1/0x410 [ 109.272339][ T2285] vfs_write+0x5db/0xca0 [ 109.276677][ T2285] ? slab_free_freelist_hook+0xc2/0x190 [ 109.282239][ T2285] ? __cfi_vfs_write+0x10/0x10 [ 109.287017][ T2285] ? __cfi_mutex_lock+0x10/0x10 [ 109.291966][ T2285] ? __fdget_pos+0x2cd/0x380 [ 109.296654][ T2285] ? ksys_write+0x71/0x240 [ 109.301091][ T2285] ksys_write+0x140/0x240 [ 109.305425][ T2285] ? __cfi_ksys_write+0x10/0x10 [ 109.310284][ T2285] ? debug_smp_processor_id+0x17/0x20 [ 109.315659][ T2285] __x64_sys_write+0x7b/0x90 [ 109.320267][ T2285] x64_sys_call+0x27b/0x9a0 [ 109.326104][ T2285] do_syscall_64+0x4c/0xa0 [ 109.333009][ T2285] ? clear_bhb_loop+0x15/0x70 [ 109.339737][ T2285] ? clear_bhb_loop+0x15/0x70 [ 109.346095][ T2285] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 109.352450][ T2285] RIP: 0033:0x7f46b818e969 [ 109.356900][ T2285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.376514][ T2285] RSP: 002b:00007f46b900b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 109.392043][ T2285] RAX: ffffffffffffffda RBX: 00007f46b83b5fa0 RCX: 00007f46b818e969 [ 109.400047][ T2285] RDX: 0000000000000012 RSI: 0000200000000c40 RDI: 0000000000000007 [ 109.408030][ T2285] RBP: 00007f46b900b090 R08: 0000000000000000 R09: 0000000000000000 [ 109.416013][ T2285] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.423979][ T2285] R13: 0000000000000000 R14: 00007f46b83b5fa0 R15: 00007ffcb0228308 [ 109.431955][ T2285] [ 109.873982][ T2298] device sit0 left promiscuous mode [ 109.935043][ T2299] device sit0 entered promiscuous mode [ 111.210880][ T2331] device sit0 left promiscuous mode [ 111.403938][ T2334] device sit0 entered promiscuous mode [ 111.873717][ T2345] device sit0 left promiscuous mode [ 112.041400][ T2348] device sit0 entered promiscuous mode [ 112.727467][ T2367] device sit0 left promiscuous mode [ 112.873285][ T2368] device sit0 entered promiscuous mode [ 114.017711][ T2391] device sit0 left promiscuous mode [ 114.058700][ T2391] device sit0 entered promiscuous mode [ 114.324675][ T2404] GPL: port 1(erspan0) entered blocking state [ 114.331106][ T2404] GPL: port 1(erspan0) entered disabled state [ 114.342284][ T2404] device erspan0 entered promiscuous mode [ 114.397326][ T2409] GPL: port 1(erspan0) entered blocking state [ 114.403482][ T2409] GPL: port 1(erspan0) entered forwarding state [ 115.398922][ T1678] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 115.904076][ T2433] device sit0 left promiscuous mode [ 116.055523][ T2438] device sit0 entered promiscuous mode [ 119.581080][ T2480] device sit0 left promiscuous mode [ 119.652634][ T2484] device sit0 entered promiscuous mode [ 121.446374][ T2525] device sit0 left promiscuous mode [ 121.636943][ T2529] device sit0 left promiscuous mode [ 121.774864][ T2531] device sit0 entered promiscuous mode [ 122.043555][ T2546] device sit0 left promiscuous mode [ 122.138510][ T2548] device sit0 entered promiscuous mode [ 122.426225][ T2555] device sit0 left promiscuous mode [ 122.538814][ T2555] device sit0 entered promiscuous mode [ 123.244308][ T2574] device sit0 left promiscuous mode [ 123.505454][ T2584] device sit0 entered promiscuous mode [ 123.550688][ T28] audit: type=1400 audit(1747363345.105:123): avc: denied { tracepoint } for pid=2583 comm="syz.0.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 123.680638][ T2586] device pim6reg1 entered promiscuous mode [ 125.631826][ T2635] FAULT_INJECTION: forcing a failure. [ 125.631826][ T2635] name failslab, interval 1, probability 0, space 0, times 0 [ 125.645189][ T2635] CPU: 1 PID: 2635 Comm: syz.4.710 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 125.654936][ T2635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 125.665011][ T2635] Call Trace: [ 125.668320][ T2635] [ 125.671280][ T2635] __dump_stack+0x21/0x24 [ 125.675654][ T2635] dump_stack_lvl+0xee/0x150 [ 125.680284][ T2635] ? __cfi_dump_stack_lvl+0x8/0x8 [ 125.685344][ T2635] dump_stack+0x15/0x24 [ 125.689546][ T2635] should_fail_ex+0x3d4/0x520 [ 125.694263][ T2635] __should_failslab+0xac/0xf0 [ 125.699066][ T2635] ? bpf_trampoline_update+0x617/0x13f0 [ 125.704648][ T2635] should_failslab+0x9/0x20 [ 125.709201][ T2635] __kmem_cache_alloc_node+0x3d/0x2c0 [ 125.714600][ T2635] ? kasan_save_alloc_info+0x25/0x30 [ 125.719924][ T2635] ? bpf_trampoline_update+0x617/0x13f0 [ 125.725509][ T2635] kmalloc_trace+0x29/0xb0 [ 125.729951][ T2635] bpf_trampoline_update+0x617/0x13f0 [ 125.735355][ T2635] bpf_trampoline_link_prog+0x4f8/0x6f0 [ 125.740942][ T2635] bpf_tracing_prog_attach+0x833/0xfa0 [ 125.746528][ T2635] ? bpf_raw_tp_link_attach+0x550/0x550 [ 125.752102][ T2635] ? memcpy+0x56/0x70 [ 125.756118][ T2635] ? avc_has_perm_noaudit+0x2f4/0x460 [ 125.761524][ T2635] bpf_raw_tp_link_attach+0x3a5/0x550 [ 125.766928][ T2635] ? bpf_insn_prepare_dump+0x840/0x840 [ 125.772416][ T2635] ? __kasan_check_write+0x14/0x20 [ 125.777734][ T2635] bpf_raw_tracepoint_open+0x258/0x480 [ 125.783211][ T2635] ? slab_free_freelist_hook+0xc2/0x190 [ 125.788787][ T2635] ? bpf_obj_get_info_by_fd+0x2b10/0x2b10 [ 125.794530][ T2635] ? selinux_bpf+0xce/0xf0 [ 125.798968][ T2635] ? security_bpf+0x93/0xb0 [ 125.803483][ T2635] __sys_bpf+0x4d1/0x780 [ 125.807737][ T2635] ? bpf_link_show_fdinfo+0x320/0x320 [ 125.813114][ T2635] ? __cfi_ksys_write+0x10/0x10 [ 125.817964][ T2635] ? debug_smp_processor_id+0x17/0x20 [ 125.823331][ T2635] __x64_sys_bpf+0x7c/0x90 [ 125.827744][ T2635] x64_sys_call+0x488/0x9a0 [ 125.832246][ T2635] do_syscall_64+0x4c/0xa0 [ 125.836658][ T2635] ? clear_bhb_loop+0x15/0x70 [ 125.841328][ T2635] ? clear_bhb_loop+0x15/0x70 [ 125.846004][ T2635] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 125.851897][ T2635] RIP: 0033:0x7fc2b118e969 [ 125.856314][ T2635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.875931][ T2635] RSP: 002b:00007fc2b2072038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 125.884348][ T2635] RAX: ffffffffffffffda RBX: 00007fc2b13b5fa0 RCX: 00007fc2b118e969 [ 125.892326][ T2635] RDX: 0000000000000010 RSI: 0000200000000000 RDI: 0000000000000011 [ 125.900290][ T2635] RBP: 00007fc2b2072090 R08: 0000000000000000 R09: 0000000000000000 [ 125.908261][ T2635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.916242][ T2635] R13: 0000000000000000 R14: 00007fc2b13b5fa0 R15: 00007ffe94f0e618 [ 125.924225][ T2635] [ 126.230203][ T2644] device pim6reg1 entered promiscuous mode [ 126.260862][ T28] audit: type=1400 audit(1747363347.815:124): avc: denied { create } for pid=2643 comm="syz.4.714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 126.568308][ T2646] device sit0 entered promiscuous mode [ 128.719109][ T2677] FAULT_INJECTION: forcing a failure. [ 128.719109][ T2677] name failslab, interval 1, probability 0, space 0, times 0 [ 128.732650][ T2677] CPU: 0 PID: 2677 Comm: syz.3.727 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 128.743269][ T2677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 128.753373][ T2677] Call Trace: [ 128.756675][ T2677] [ 128.759623][ T2677] __dump_stack+0x21/0x24 [ 128.764005][ T2677] dump_stack_lvl+0xee/0x150 [ 128.768634][ T2677] ? __cfi_dump_stack_lvl+0x8/0x8 [ 128.773687][ T2677] ? __local_bh_enable_ip+0x58/0x80 [ 128.778909][ T2677] ? _raw_spin_unlock_bh+0x50/0x60 [ 128.784051][ T2677] ? release_sock+0x169/0x1c0 [ 128.788764][ T2677] dump_stack+0x15/0x24 [ 128.792941][ T2677] should_fail_ex+0x3d4/0x520 [ 128.797648][ T2677] __should_failslab+0xac/0xf0 [ 128.802443][ T2677] should_failslab+0x9/0x20 [ 128.806977][ T2677] slab_pre_alloc_hook+0x30/0x1e0 [ 128.812023][ T2677] kmem_cache_alloc_lru+0x49/0x280 [ 128.817167][ T2677] ? sock_alloc_inode+0x28/0xc0 [ 128.822047][ T2677] sock_alloc_inode+0x28/0xc0 [ 128.826840][ T2677] ? __cfi_sock_alloc_inode+0x10/0x10 [ 128.832231][ T2677] new_inode_pseudo+0x70/0x1f0 [ 128.837016][ T2677] __sock_create+0x12c/0x7c0 [ 128.841642][ T2677] sock_create_kern+0x3b/0x50 [ 128.846393][ T2677] udp_sock_create6+0xc8/0x630 [ 128.851192][ T2677] ? __cfi_static_key_slow_inc_cpuslocked+0x10/0x10 [ 128.857808][ T2677] ? static_key_slow_inc_cpuslocked+0x138/0x300 [ 128.864078][ T2677] ? __cfi_udp_sock_create6+0x10/0x10 [ 128.869491][ T2677] ? cpus_read_unlock+0x76/0xb0 [ 128.874367][ T2677] ? static_key_slow_inc+0x1f/0x30 [ 128.879516][ T2677] ? setup_udp_tunnel_sock+0x3af/0x490 [ 128.885013][ T2677] wg_socket_init+0x405/0x7f0 [ 128.889709][ T2677] ? __cfi_wg_socket_init+0x10/0x10 [ 128.894931][ T2677] ? __kasan_check_write+0x14/0x20 [ 128.900070][ T2677] ? __cfi_wg_receive+0x10/0x10 [ 128.904945][ T2677] ? __kasan_check_write+0x14/0x20 [ 128.910091][ T2677] ? vlan_device_event+0x49e/0x1ba0 [ 128.915322][ T2677] ? __cfi_mutex_lock+0x10/0x10 [ 128.920375][ T2677] ? udp_tunnel_nic_netdevice_event+0x1b4/0x1390 [ 128.926725][ T2677] ? ndisc_netdev_event+0x8e/0x620 [ 128.931955][ T2677] wg_open+0x18a/0x300 [ 128.936050][ T2677] __dev_open+0x363/0x4f0 [ 128.940412][ T2677] ? dev_open+0x230/0x230 [ 128.944779][ T2677] ? _raw_spin_unlock_bh+0x50/0x60 [ 128.949917][ T2677] ? dev_set_rx_mode+0x223/0x2c0 [ 128.954884][ T2677] ? __kasan_check_read+0x11/0x20 [ 128.959978][ T2677] __dev_change_flags+0x21b/0x6b0 [ 128.965033][ T2677] ? __cfi___dev_change_flags+0x10/0x10 [ 128.970614][ T2677] dev_change_flags+0x88/0x1a0 [ 128.975411][ T2677] dev_ifsioc+0x159/0xed0 [ 128.979764][ T2677] ? dev_ioctl+0xd10/0xd10 [ 128.984201][ T2677] ? __mutex_lock_slowpath+0xe/0x10 [ 128.989421][ T2677] ? mutex_lock+0xf8/0x1a0 [ 128.993865][ T2677] ? __cfi_mutex_lock+0x10/0x10 [ 128.998747][ T2677] ? dev_get_by_name_rcu+0xe5/0x130 [ 129.003978][ T2677] dev_ioctl+0x556/0xd10 [ 129.008247][ T2677] sock_do_ioctl+0x23f/0x310 [ 129.012864][ T2677] ? sock_show_fdinfo+0xb0/0xb0 [ 129.017737][ T2677] ? selinux_file_ioctl+0x377/0x480 [ 129.022958][ T2677] sock_ioctl+0x4d8/0x6e0 [ 129.027305][ T2677] ? __cfi_sock_ioctl+0x10/0x10 [ 129.032192][ T2677] ? __fget_files+0x2d5/0x330 [ 129.036895][ T2677] ? security_file_ioctl+0x95/0xc0 [ 129.042023][ T2677] ? __cfi_sock_ioctl+0x10/0x10 [ 129.046873][ T2677] __se_sys_ioctl+0x12f/0x1b0 [ 129.051550][ T2677] __x64_sys_ioctl+0x7b/0x90 [ 129.056142][ T2677] x64_sys_call+0x58b/0x9a0 [ 129.060642][ T2677] do_syscall_64+0x4c/0xa0 [ 129.065056][ T2677] ? clear_bhb_loop+0x15/0x70 [ 129.069737][ T2677] ? clear_bhb_loop+0x15/0x70 [ 129.074497][ T2677] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 129.080403][ T2677] RIP: 0033:0x7f902298e969 [ 129.084810][ T2677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 129.104450][ T2677] RSP: 002b:00007f9023750038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 129.113032][ T2677] RAX: ffffffffffffffda RBX: 00007f9022bb5fa0 RCX: 00007f902298e969 [ 129.121101][ T2677] RDX: 0000200000000040 RSI: 0000000000008914 RDI: 0000000000000006 [ 129.129084][ T2677] RBP: 00007f9023750090 R08: 0000000000000000 R09: 0000000000000000 [ 129.137064][ T2677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 129.145033][ T2677] R13: 0000000000000000 R14: 00007f9022bb5fa0 R15: 00007fff0de6f138 [ 129.153004][ T2677] [ 129.156279][ T2677] socket: no more sockets [ 129.160828][ T2677] wireguard: wg2: Could not create IPv6 socket [ 129.167968][ T2677] device wg2 entered promiscuous mode [ 129.738149][ T2690] device syzkaller0 entered promiscuous mode [ 130.162501][ T2698] device sit0 left promiscuous mode [ 130.464262][ T2698] device sit0 entered promiscuous mode [ 131.045956][ T2717] device sit0 left promiscuous mode [ 131.185053][ T2723] device sit0 left promiscuous mode [ 131.197415][ T2717] device sit0 entered promiscuous mode [ 131.339109][ T2724] device sit0 entered promiscuous mode [ 132.157881][ T2740] device syzkaller0 entered promiscuous mode [ 132.395906][ T2754] device sit0 left promiscuous mode [ 132.612474][ T2754] device sit0 entered promiscuous mode [ 133.338015][ T2775] device sit0 left promiscuous mode [ 133.519962][ T2783] FAULT_INJECTION: forcing a failure. [ 133.519962][ T2783] name failslab, interval 1, probability 0, space 0, times 0 [ 133.568902][ T2783] CPU: 1 PID: 2783 Comm: syz.0.761 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 133.578665][ T2783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 133.588738][ T2783] Call Trace: [ 133.592039][ T2783] [ 133.594997][ T2783] __dump_stack+0x21/0x24 [ 133.599356][ T2783] dump_stack_lvl+0xee/0x150 [ 133.604148][ T2783] ? __cfi_dump_stack_lvl+0x8/0x8 [ 133.609215][ T2783] dump_stack+0x15/0x24 [ 133.613496][ T2783] should_fail_ex+0x3d4/0x520 [ 133.618199][ T2783] __should_failslab+0xac/0xf0 [ 133.622990][ T2783] ? security_prepare_creds+0x4e/0x150 [ 133.628478][ T2783] should_failslab+0x9/0x20 [ 133.633098][ T2783] __kmem_cache_alloc_node+0x3d/0x2c0 [ 133.638507][ T2783] ? security_prepare_creds+0x4e/0x150 [ 133.643992][ T2783] __kmalloc+0xa1/0x1e0 [ 133.648203][ T2783] ? prepare_creds+0x2f/0x640 [ 133.652990][ T2783] security_prepare_creds+0x4e/0x150 [ 133.658304][ T2783] prepare_creds+0x456/0x640 [ 133.662921][ T2783] copy_creds+0xe4/0x640 [ 133.667203][ T2783] copy_process+0x81c/0x3470 [ 133.671822][ T2783] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 133.677576][ T2783] ? __kasan_check_write+0x14/0x20 [ 133.682717][ T2783] ? proc_fail_nth_write+0x17a/0x1f0 [ 133.688033][ T2783] ? idle_dummy+0x10/0x10 [ 133.692405][ T2783] kernel_clone+0x23a/0x810 [ 133.696944][ T2783] ? __cfi_kernel_clone+0x10/0x10 [ 133.701999][ T2783] ? __kasan_check_write+0x14/0x20 [ 133.707228][ T2783] ? mutex_unlock+0x89/0x220 [ 133.711847][ T2783] __x64_sys_clone+0x168/0x1b0 [ 133.716642][ T2783] ? __cfi___x64_sys_clone+0x10/0x10 [ 133.721959][ T2783] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 133.728053][ T2783] x64_sys_call+0x990/0x9a0 [ 133.732595][ T2783] do_syscall_64+0x4c/0xa0 [ 133.737040][ T2783] ? clear_bhb_loop+0x15/0x70 [ 133.741752][ T2783] ? clear_bhb_loop+0x15/0x70 [ 133.746451][ T2783] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 133.752372][ T2783] RIP: 0033:0x7f625118e969 [ 133.756803][ T2783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.776424][ T2783] RSP: 002b:00007f6251f3ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 133.784861][ T2783] RAX: ffffffffffffffda RBX: 00007f62513b5fa0 RCX: 00007f625118e969 [ 133.792853][ T2783] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000400c0000 [ 133.800856][ T2783] RBP: 00007f6251f40090 R08: 0000000000000000 R09: 0000000000000000 [ 133.808844][ T2783] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 133.816852][ T2783] R13: 0000000000000000 R14: 00007f62513b5fa0 R15: 00007ffd903289f8 [ 133.824825][ T2783] [ 133.828514][ T2771] device sit0 left promiscuous mode [ 133.940089][ T2781] device sit0 entered promiscuous mode [ 134.064150][ T2780] device sit0 left promiscuous mode [ 134.156892][ T2777] device sit0 entered promiscuous mode [ 134.185843][ T2784] device sit0 entered promiscuous mode [ 134.635746][ T2802] device syzkaller0 entered promiscuous mode [ 134.670164][ T2805] device sit0 left promiscuous mode [ 134.717781][ T2810] device sit0 entered promiscuous mode [ 134.942585][ T2815] device syzkaller0 entered promiscuous mode [ 135.135339][ T2833] device pim6reg1 entered promiscuous mode [ 136.705324][ T2860] device veth1_macvtap left promiscuous mode [ 136.900526][ T2880] FAULT_INJECTION: forcing a failure. [ 136.900526][ T2880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 136.913817][ T2880] CPU: 1 PID: 2880 Comm: syz.1.793 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 136.923653][ T2880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 136.933738][ T2880] Call Trace: [ 136.937041][ T2880] [ 136.940027][ T2880] __dump_stack+0x21/0x24 [ 136.944387][ T2880] dump_stack_lvl+0xee/0x150 [ 136.948994][ T2880] ? __cfi_dump_stack_lvl+0x8/0x8 [ 136.954052][ T2880] ? __kasan_check_write+0x14/0x20 [ 136.959173][ T2880] ? _raw_spin_lock_irq+0x8f/0xe0 [ 136.964226][ T2880] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 136.969779][ T2880] dump_stack+0x15/0x24 [ 136.973944][ T2880] should_fail_ex+0x3d4/0x520 [ 136.978636][ T2880] should_fail+0xb/0x10 [ 136.982801][ T2880] should_fail_usercopy+0x1a/0x20 [ 136.987832][ T2880] copy_page_from_iter_atomic+0x35c/0x1210 [ 136.993817][ T2880] ? __cfi_copy_page_from_iter_atomic+0x10/0x10 [ 137.000060][ T2880] ? __kasan_check_read+0x11/0x20 [ 137.005098][ T2880] ? shmem_write_begin+0x151/0x2c0 [ 137.010208][ T2880] generic_perform_write+0x348/0x6d0 [ 137.015489][ T2880] ? file_update_time+0x2dd/0x340 [ 137.020511][ T2880] ? __cfi_generic_perform_write+0x10/0x10 [ 137.026312][ T2880] ? __cfi_file_update_time+0x10/0x10 [ 137.031690][ T2880] __generic_file_write_iter+0x227/0x580 [ 137.037315][ T2880] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 137.043037][ T2880] ? __cfi___generic_file_write_iter+0x10/0x10 [ 137.049185][ T2880] ? rwsem_write_trylock+0x130/0x300 [ 137.054559][ T2880] ? generic_write_checks_count+0x3c6/0x4a0 [ 137.060450][ T2880] ? generic_write_checks+0xca/0x100 [ 137.065761][ T2880] generic_file_write_iter+0xae/0x310 [ 137.071130][ T2880] vfs_write+0x5db/0xca0 [ 137.075370][ T2880] ? slab_free_freelist_hook+0xc2/0x190 [ 137.080917][ T2880] ? __cfi_vfs_write+0x10/0x10 [ 137.085677][ T2880] ? __cfi_mutex_lock+0x10/0x10 [ 137.090527][ T2880] ? __fdget_pos+0x2cd/0x380 [ 137.095120][ T2880] ? ksys_write+0x71/0x240 [ 137.099538][ T2880] ksys_write+0x140/0x240 [ 137.103883][ T2880] ? __cfi_ksys_write+0x10/0x10 [ 137.108728][ T2880] ? debug_smp_processor_id+0x17/0x20 [ 137.114103][ T2880] __x64_sys_write+0x7b/0x90 [ 137.118693][ T2880] x64_sys_call+0x27b/0x9a0 [ 137.123191][ T2880] do_syscall_64+0x4c/0xa0 [ 137.127605][ T2880] ? clear_bhb_loop+0x15/0x70 [ 137.132275][ T2880] ? clear_bhb_loop+0x15/0x70 [ 137.136954][ T2880] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 137.142849][ T2880] RIP: 0033:0x7f85d898e969 [ 137.147257][ T2880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.167117][ T2880] RSP: 002b:00007f85d976c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 137.175525][ T2880] RAX: ffffffffffffffda RBX: 00007f85d8bb5fa0 RCX: 00007f85d898e969 [ 137.183488][ T2880] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 000000000000000b [ 137.191453][ T2880] RBP: 00007f85d976c090 R08: 0000000000000000 R09: 0000000000000000 [ 137.199420][ T2880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.207387][ T2880] R13: 0000000000000000 R14: 00007f85d8bb5fa0 R15: 00007ffe2d71ee68 [ 137.215357][ T2880] [ 138.413834][ T2919] device sit0 left promiscuous mode [ 138.573359][ T2919] device sit0 entered promiscuous mode [ 139.505918][ T2955] device sit0 left promiscuous mode [ 139.722788][ T2960] device syzkaller0 entered promiscuous mode [ 139.935435][ T2955] device sit0 entered promiscuous mode [ 140.361820][ T2975] device sit0 left promiscuous mode [ 140.696547][ T2975] device sit0 entered promiscuous mode [ 141.295068][ T28] audit: type=1400 audit(1747363362.845:125): avc: denied { create } for pid=2998 comm="syz.3.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 141.323256][ T28] audit: type=1400 audit(1747363362.865:126): avc: denied { create } for pid=2998 comm="syz.3.830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 142.337389][ T3016] syz.4.836 (3016) used greatest stack depth: 21984 bytes left [ 143.134783][ T28] audit: type=1400 audit(1747363364.685:127): avc: denied { write } for pid=3043 comm="syz.0.843" name="cgroup.subtree_control" dev="cgroup2" ino=329 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 143.348343][ T28] audit: type=1400 audit(1747363364.735:128): avc: denied { open } for pid=3043 comm="syz.0.843" path="" dev="cgroup2" ino=329 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 144.129530][ T3086] device sit0 left promiscuous mode [ 144.385243][ T3086] device sit0 entered promiscuous mode [ 146.326830][ T3116] device sit0 left promiscuous mode [ 146.348197][ T3116] device sit0 entered promiscuous mode [ 147.719225][ T28] audit: type=1400 audit(1747363369.265:129): avc: denied { ioctl } for pid=3151 comm="syz.3.877" path="pid:[4026532543]" dev="nsfs" ino=4026532543 ioctlcmd=0xb703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 147.981337][ T3164] device sit0 left promiscuous mode [ 148.065655][ T3165] device sit0 entered promiscuous mode [ 150.074072][ T3184] device sit0 left promiscuous mode [ 150.124998][ T3184] device sit0 entered promiscuous mode [ 151.273194][ T3199] device sit0 left promiscuous mode [ 152.428640][ T3244] device veth0_vlan left promiscuous mode [ 152.442100][ T3244] device veth0_vlan entered promiscuous mode [ 152.870549][ T3252] device sit0 left promiscuous mode [ 153.030369][ T3256] device sit0 entered promiscuous mode [ 156.607894][ T3315] device sit0 left promiscuous mode [ 156.664648][ T3318] device sit0 entered promiscuous mode [ 157.029820][ T3323] device sit0 left promiscuous mode [ 157.184891][ T3325] device sit0 entered promiscuous mode [ 158.600731][ T3350] device sit0 left promiscuous mode [ 160.289007][ T3391] device sit0 entered promiscuous mode [ 161.049084][ T3410] device sit0 left promiscuous mode [ 161.286092][ T3414] device sit0 left promiscuous mode [ 161.317509][ T3412] device sit0 entered promiscuous mode [ 161.714679][ T3415] device sit0 entered promiscuous mode [ 161.870368][ T3426] FAULT_INJECTION: forcing a failure. [ 161.870368][ T3426] name failslab, interval 1, probability 0, space 0, times 0 [ 161.926800][ T3426] CPU: 1 PID: 3426 Comm: syz.4.962 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 161.936563][ T3426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 161.946633][ T3426] Call Trace: [ 161.949933][ T3426] [ 161.952878][ T3426] __dump_stack+0x21/0x24 [ 161.957219][ T3426] dump_stack_lvl+0xee/0x150 [ 161.961818][ T3426] ? __cfi_dump_stack_lvl+0x8/0x8 [ 161.966860][ T3426] dump_stack+0x15/0x24 [ 161.971022][ T3426] should_fail_ex+0x3d4/0x520 [ 161.975710][ T3426] __should_failslab+0xac/0xf0 [ 161.980485][ T3426] ? tracepoint_add_func+0x28d/0x900 [ 161.985778][ T3426] should_failslab+0x9/0x20 [ 161.990302][ T3426] __kmem_cache_alloc_node+0x3d/0x2c0 [ 161.995696][ T3426] ? preempt_schedule_thunk+0x16/0x18 [ 162.001096][ T3426] ? tracepoint_add_func+0x28d/0x900 [ 162.006400][ T3426] __kmalloc+0xa1/0x1e0 [ 162.010694][ T3426] tracepoint_add_func+0x28d/0x900 [ 162.015906][ T3426] ? __cfi_perf_trace_hrtimer_class+0x10/0x10 [ 162.021985][ T3426] ? __cfi_perf_trace_hrtimer_class+0x10/0x10 [ 162.028066][ T3426] tracepoint_probe_register+0x5a/0x90 [ 162.033544][ T3426] ? __cfi_perf_trace_hrtimer_class+0x10/0x10 [ 162.039720][ T3426] trace_event_reg+0x150/0x260 [ 162.044532][ T3426] perf_trace_event_init+0x455/0x960 [ 162.049853][ T3426] perf_trace_init+0x240/0x2e0 [ 162.054649][ T3426] perf_tp_event_init+0x8e/0x120 [ 162.059636][ T3426] perf_try_init_event+0x15b/0x450 [ 162.064778][ T3426] perf_event_alloc+0x10f7/0x1970 [ 162.069837][ T3426] __se_sys_perf_event_open+0x5ae/0x1b80 [ 162.075507][ T3426] ? __kasan_check_write+0x14/0x20 [ 162.080658][ T3426] ? mutex_unlock+0x89/0x220 [ 162.085283][ T3426] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 162.091041][ T3426] ? sysvec_call_function_single+0x61/0xc0 [ 162.096932][ T3426] __x64_sys_perf_event_open+0xbf/0xd0 [ 162.102431][ T3426] x64_sys_call+0x385/0x9a0 [ 162.106957][ T3426] do_syscall_64+0x4c/0xa0 [ 162.111392][ T3426] ? clear_bhb_loop+0x15/0x70 [ 162.116098][ T3426] ? clear_bhb_loop+0x15/0x70 [ 162.120800][ T3426] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 162.126730][ T3426] RIP: 0033:0x7fc2b118e969 [ 162.131165][ T3426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.150918][ T3426] RSP: 002b:00007fc2b2072038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 162.159358][ T3426] RAX: ffffffffffffffda RBX: 00007fc2b13b5fa0 RCX: 00007fc2b118e969 [ 162.167357][ T3426] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 00002000000003c0 [ 162.175440][ T3426] RBP: 00007fc2b2072090 R08: 0000000000000000 R09: 0000000000000000 [ 162.183425][ T3426] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 162.191418][ T3426] R13: 0000000000000001 R14: 00007fc2b13b5fa0 R15: 00007ffe94f0e618 [ 162.199417][ T3426] [ 162.362691][ T3434] device sit0 entered promiscuous mode [ 164.075420][ T3476] device sit0 left promiscuous mode [ 164.239710][ T3479] device sit0 entered promiscuous mode [ 165.210779][ T3502] device sit0 left promiscuous mode [ 165.414999][ T3504] device sit0 entered promiscuous mode [ 167.994587][ T3569] device sit0 left promiscuous mode [ 168.077314][ T3570] device sit0 entered promiscuous mode [ 168.753580][ T3583] device sit0 left promiscuous mode [ 168.765886][ T3580] device sit0 entered promiscuous mode [ 170.234079][ T3631] device sit0 left promiscuous mode [ 170.463163][ T3631] device sit0 entered promiscuous mode [ 170.583016][ T3640] device sit0 left promiscuous mode [ 170.668630][ T3643] device sit0 entered promiscuous mode [ 170.830680][ T3648] GPL: port 1(erspan0) entered disabled state [ 171.631363][ T3665] device sit0 left promiscuous mode [ 171.858080][ T3665] device sit0 entered promiscuous mode [ 172.150337][ T3685] device sit0 left promiscuous mode [ 172.221482][ T3685] device sit0 entered promiscuous mode [ 172.730056][ T3700] GPL: port 1(erspan0) entered disabled state [ 173.167445][ T3721] device sit0 left promiscuous mode [ 173.234027][ T3721] device sit0 entered promiscuous mode [ 173.950695][ T3735] device sit0 left promiscuous mode [ 174.127907][ T3737] device sit0 entered promiscuous mode [ 174.753630][ T3754] device sit0 left promiscuous mode [ 174.862443][ T3757] device sit0 entered promiscuous mode [ 174.977137][ T3760] device wg2 entered promiscuous mode [ 175.386058][ T3784] device sit0 left promiscuous mode [ 175.528165][ T3788] device sit0 entered promiscuous mode [ 175.791528][ T3794] device sit0 left promiscuous mode [ 175.857734][ T3797] device sit0 entered promiscuous mode [ 176.136338][ T3817] device wg2 entered promiscuous mode [ 176.227171][ T3827] device sit0 left promiscuous mode [ 176.282136][ T3831] device sit0 entered promiscuous mode [ 176.428863][ T28] audit: type=1400 audit(1747363397.975:130): avc: denied { read } for pid=3832 comm="syz.2.1092" name="cgroup.subtree_control" dev="cgroup2" ino=241 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 176.795513][ T3852] FAULT_INJECTION: forcing a failure. [ 176.795513][ T3852] name failslab, interval 1, probability 0, space 0, times 0 [ 176.893987][ T3852] CPU: 0 PID: 3852 Comm: syz.2.1096 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 176.903839][ T3852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 176.913928][ T3852] Call Trace: [ 176.917279][ T3852] [ 176.920499][ T3852] __dump_stack+0x21/0x24 [ 176.924859][ T3852] dump_stack_lvl+0xee/0x150 [ 176.929468][ T3852] ? __cfi_dump_stack_lvl+0x8/0x8 [ 176.934505][ T3852] dump_stack+0x15/0x24 [ 176.938680][ T3852] should_fail_ex+0x3d4/0x520 [ 176.943357][ T3852] ? __build_skb+0x2d/0x410 [ 176.947864][ T3852] __should_failslab+0xac/0xf0 [ 176.952652][ T3852] should_failslab+0x9/0x20 [ 176.957154][ T3852] kmem_cache_alloc+0x3b/0x330 [ 176.961916][ T3852] __build_skb+0x2d/0x410 [ 176.966239][ T3852] ? __kasan_check_write+0x14/0x20 [ 176.971358][ T3852] build_skb+0x24/0x200 [ 176.975528][ T3852] bpf_prog_test_run_skb+0x39f/0x1290 [ 176.980908][ T3852] ? __fget_files+0x2d5/0x330 [ 176.985610][ T3852] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 176.991610][ T3852] bpf_prog_test_run+0x3e3/0x630 [ 176.996568][ T3852] ? slab_free_freelist_hook+0xc2/0x190 [ 177.002142][ T3852] ? bpf_prog_query+0x270/0x270 [ 177.007000][ T3852] ? selinux_bpf+0xce/0xf0 [ 177.011431][ T3852] ? security_bpf+0x93/0xb0 [ 177.016731][ T3852] __sys_bpf+0x56d/0x780 [ 177.021175][ T3852] ? bpf_link_show_fdinfo+0x320/0x320 [ 177.026554][ T3852] ? __cfi_ksys_write+0x10/0x10 [ 177.031412][ T3852] ? do_user_addr_fault+0x9ac/0x1050 [ 177.036720][ T3852] ? debug_smp_processor_id+0x17/0x20 [ 177.042116][ T3852] __x64_sys_bpf+0x7c/0x90 [ 177.046745][ T3852] x64_sys_call+0x488/0x9a0 [ 177.051266][ T3852] do_syscall_64+0x4c/0xa0 [ 177.055688][ T3852] ? clear_bhb_loop+0x15/0x70 [ 177.060375][ T3852] ? clear_bhb_loop+0x15/0x70 [ 177.065049][ T3852] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 177.070945][ T3852] RIP: 0033:0x7f46b818e969 [ 177.075354][ T3852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 177.094957][ T3852] RSP: 002b:00007f46b8fea038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 177.103375][ T3852] RAX: ffffffffffffffda RBX: 00007f46b83b6080 RCX: 00007f46b818e969 [ 177.111341][ T3852] RDX: 0000000000000050 RSI: 0000200000000240 RDI: 000000000000000a [ 177.119305][ T3852] RBP: 00007f46b8fea090 R08: 0000000000000000 R09: 0000000000000000 [ 177.127363][ T3852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 177.135326][ T3852] R13: 0000000000000001 R14: 00007f46b83b6080 R15: 00007ffcb0228308 [ 177.143325][ T3852] [ 178.122927][ T3862] device sit0 left promiscuous mode [ 178.467467][ T3862] device sit0 entered promiscuous mode [ 179.430364][ T3910] device syzkaller0 entered promiscuous mode [ 181.397147][ T3955] GPL: port 1(erspan0) entered disabled state [ 181.461739][ T28] audit: type=1400 audit(1747363403.015:131): avc: denied { create } for pid=3957 comm="syz.4.1131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 181.703284][ T28] audit: type=1400 audit(1747363403.245:132): avc: denied { create } for pid=3961 comm="syz.3.1134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 181.957637][ T3971] GPL: port 1(erspan0) entered disabled state [ 182.276813][ T28] audit: type=1400 audit(1747363403.815:133): avc: denied { create } for pid=3977 comm="syz.1.1140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 182.471523][ T3983] device sit0 left promiscuous mode [ 182.963609][ T3988] device sit0 entered promiscuous mode [ 184.612050][ T4012] device veth0_vlan left promiscuous mode [ 184.661477][ T4012] device veth0_vlan entered promiscuous mode [ 184.678241][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 184.686895][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 184.694610][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 185.077625][ T4019] FAULT_INJECTION: forcing a failure. [ 185.077625][ T4019] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 185.100419][ T4019] CPU: 1 PID: 4019 Comm: syz.2.1154 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 185.110500][ T4019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 185.121522][ T4019] Call Trace: [ 185.124812][ T4019] [ 185.127744][ T4019] __dump_stack+0x21/0x24 [ 185.132092][ T4019] dump_stack_lvl+0xee/0x150 [ 185.136805][ T4019] ? __cfi_dump_stack_lvl+0x8/0x8 [ 185.141826][ T4019] dump_stack+0x15/0x24 [ 185.145986][ T4019] should_fail_ex+0x3d4/0x520 [ 185.150660][ T4019] should_fail_alloc_page+0x61/0x90 [ 185.155855][ T4019] prepare_alloc_pages+0x148/0x5f0 [ 185.161049][ T4019] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 185.166242][ T4019] ? __x64_sys_clone+0x168/0x1b0 [ 185.171187][ T4019] ? x64_sys_call+0x990/0x9a0 [ 185.175862][ T4019] ? do_syscall_64+0x4c/0xa0 [ 185.180448][ T4019] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 185.186607][ T4019] __alloc_pages+0x115/0x3a0 [ 185.191196][ T4019] ? __cfi___alloc_pages+0x10/0x10 [ 185.196304][ T4019] __get_free_pages+0xe/0x30 [ 185.200891][ T4019] kasan_populate_vmalloc_pte+0x29/0x120 [ 185.206525][ T4019] __apply_to_page_range+0x8cc/0xc10 [ 185.211809][ T4019] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 185.218138][ T4019] ? __cfi_kasan_populate_vmalloc_pte+0x10/0x10 [ 185.224373][ T4019] apply_to_page_range+0x3b/0x50 [ 185.229309][ T4019] kasan_populate_vmalloc+0x60/0x70 [ 185.234503][ T4019] alloc_vmap_area+0x173e/0x1870 [ 185.239447][ T4019] ? vm_map_ram+0x930/0x930 [ 185.244044][ T4019] ? __kasan_kmalloc+0x95/0xb0 [ 185.248805][ T4019] ? kmalloc_node_trace+0x3d/0xb0 [ 185.253835][ T4019] __get_vm_area_node+0x160/0x360 [ 185.258858][ T4019] __vmalloc_node_range+0x326/0x13d0 [ 185.264229][ T4019] ? copy_process+0x5ac/0x3470 [ 185.269010][ T4019] ? kasan_save_alloc_info+0x25/0x30 [ 185.274293][ T4019] ? __cfi___vmalloc_node_range+0x10/0x10 [ 185.280184][ T4019] ? memcpy+0x56/0x70 [ 185.284163][ T4019] dup_task_struct+0x3ae/0x770 [ 185.288933][ T4019] ? copy_process+0x5ac/0x3470 [ 185.293749][ T4019] ? __kasan_check_write+0x14/0x20 [ 185.298861][ T4019] ? recalc_sigpending+0x168/0x1c0 [ 185.303993][ T4019] copy_process+0x5ac/0x3470 [ 185.308610][ T4019] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 185.314361][ T4019] ? __kasan_check_write+0x14/0x20 [ 185.319482][ T4019] ? proc_fail_nth_write+0x17a/0x1f0 [ 185.324772][ T4019] ? idle_dummy+0x10/0x10 [ 185.329104][ T4019] kernel_clone+0x23a/0x810 [ 185.333609][ T4019] ? __cfi_kernel_clone+0x10/0x10 [ 185.338689][ T4019] ? __kasan_check_write+0x14/0x20 [ 185.344059][ T4019] ? mutex_unlock+0x89/0x220 [ 185.348650][ T4019] __x64_sys_clone+0x168/0x1b0 [ 185.353505][ T4019] ? __cfi___x64_sys_clone+0x10/0x10 [ 185.358878][ T4019] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 185.364941][ T4019] x64_sys_call+0x990/0x9a0 [ 185.369438][ T4019] do_syscall_64+0x4c/0xa0 [ 185.373855][ T4019] ? clear_bhb_loop+0x15/0x70 [ 185.378523][ T4019] ? clear_bhb_loop+0x15/0x70 [ 185.383192][ T4019] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 185.389088][ T4019] RIP: 0033:0x7f46b818e969 [ 185.393499][ T4019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.413104][ T4019] RSP: 002b:00007f46b900afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 185.421511][ T4019] RAX: ffffffffffffffda RBX: 00007f46b83b5fa0 RCX: 00007f46b818e969 [ 185.429480][ T4019] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 185.437446][ T4019] RBP: 00007f46b900b090 R08: 0000000000000000 R09: 0000000000000000 [ 185.445409][ T4019] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 185.453372][ T4019] R13: 0000000000000000 R14: 00007f46b83b5fa0 R15: 00007ffcb0228308 [ 185.461346][ T4019] [ 185.466026][ T4019] syz.2.1154: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 185.508151][ T4019] CPU: 0 PID: 4019 Comm: syz.2.1154 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 185.518092][ T4019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 185.528249][ T4019] Call Trace: [ 185.531536][ T4019] [ 185.534476][ T4019] __dump_stack+0x21/0x24 [ 185.538820][ T4019] dump_stack_lvl+0xee/0x150 [ 185.543430][ T4019] ? __cfi_dump_stack_lvl+0x8/0x8 [ 185.548465][ T4019] ? pr_cont_kernfs_name+0x133/0x160 [ 185.553787][ T4019] dump_stack+0x15/0x24 [ 185.557974][ T4019] warn_alloc+0x1b0/0x1d0 [ 185.562329][ T4019] ? __cfi_warn_alloc+0x10/0x10 [ 185.567196][ T4019] ? __get_vm_area_node+0x175/0x360 [ 185.572415][ T4019] __vmalloc_node_range+0x34b/0x13d0 [ 185.577730][ T4019] ? kasan_save_alloc_info+0x25/0x30 [ 185.583029][ T4019] ? __cfi___vmalloc_node_range+0x10/0x10 [ 185.588768][ T4019] ? memcpy+0x56/0x70 [ 185.592790][ T4019] dup_task_struct+0x3ae/0x770 [ 185.597582][ T4019] ? copy_process+0x5ac/0x3470 [ 185.602366][ T4019] ? __kasan_check_write+0x14/0x20 [ 185.607498][ T4019] ? recalc_sigpending+0x168/0x1c0 [ 185.612666][ T4019] copy_process+0x5ac/0x3470 [ 185.617286][ T4019] ? __cfi_kstrtouint_from_user+0x10/0x10 [ 185.623108][ T4019] ? __kasan_check_write+0x14/0x20 [ 185.628234][ T4019] ? proc_fail_nth_write+0x17a/0x1f0 [ 185.633545][ T4019] ? idle_dummy+0x10/0x10 [ 185.637910][ T4019] kernel_clone+0x23a/0x810 [ 185.642519][ T4019] ? __cfi_kernel_clone+0x10/0x10 [ 185.647560][ T4019] ? __kasan_check_write+0x14/0x20 [ 185.652710][ T4019] ? mutex_unlock+0x89/0x220 [ 185.657597][ T4019] __x64_sys_clone+0x168/0x1b0 [ 185.662392][ T4019] ? __cfi___x64_sys_clone+0x10/0x10 [ 185.667790][ T4019] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 185.673870][ T4019] x64_sys_call+0x990/0x9a0 [ 185.678405][ T4019] do_syscall_64+0x4c/0xa0 [ 185.682848][ T4019] ? clear_bhb_loop+0x15/0x70 [ 185.687538][ T4019] ? clear_bhb_loop+0x15/0x70 [ 185.692252][ T4019] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 185.698160][ T4019] RIP: 0033:0x7f46b818e969 [ 185.702585][ T4019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.722289][ T4019] RSP: 002b:00007f46b900afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 185.730813][ T4019] RAX: ffffffffffffffda RBX: 00007f46b83b5fa0 RCX: 00007f46b818e969 [ 185.738804][ T4019] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000001000 [ 185.746789][ T4019] RBP: 00007f46b900b090 R08: 0000000000000000 R09: 0000000000000000 [ 185.754871][ T4019] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 185.762874][ T4019] R13: 0000000000000000 R14: 00007f46b83b5fa0 R15: 00007ffcb0228308 [ 185.770880][ T4019] [ 185.782122][ T4019] Mem-Info: [ 185.785440][ T4019] active_anon:5128 inactive_anon:0 isolated_anon:0 [ 185.785440][ T4019] active_file:26887 inactive_file:2240 isolated_file:0 [ 185.785440][ T4019] unevictable:0 dirty:605 writeback:0 [ 185.785440][ T4019] slab_reclaimable:7859 slab_unreclaimable:77438 [ 185.785440][ T4019] mapped:30961 shmem:163 pagetables:657 [ 185.785440][ T4019] sec_pagetables:0 bounce:0 [ 185.785440][ T4019] kernel_misc_reclaimable:0 [ 185.785440][ T4019] free:1511159 free_pcp:13837 free_cma:0 [ 185.839682][ T4019] Node 0 active_anon:20572kB inactive_anon:0kB active_file:107548kB inactive_file:8960kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:123912kB dirty:2424kB writeback:0kB shmem:652kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4456kB pagetables:2668kB sec_pagetables:0kB all_unreclaimable? no [ 186.094894][ T4036] device sit0 left promiscuous mode [ 186.163305][ T4036] device sit0 entered promiscuous mode [ 186.188928][ T4019] DMA32 free:2968532kB boost:0kB min:62576kB low:78220kB high:93864kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2974284kB mlocked:0kB bounce:0kB free_pcp:5752kB local_pcp:5752kB free_cma:0kB [ 186.294805][ T4019] lowmem_reserve[]: 0 3932 3932 3932 [ 186.328963][ T4019] Normal free:3073332kB boost:0kB min:84876kB low:106092kB high:127308kB reserved_highatomic:0KB active_anon:24772kB inactive_anon:0kB active_file:107548kB inactive_file:8960kB unevictable:0kB writepending:2424kB present:5242880kB managed:4026656kB mlocked:0kB bounce:0kB free_pcp:48496kB local_pcp:41580kB free_cma:0kB [ 186.452159][ T4019] lowmem_reserve[]: 0 0 0 0 [ 186.462298][ T4019] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 2*2048kB (UM) 722*4096kB (M) = 2968532kB [ 186.565021][ T4019] Normal: 1135*4kB (UME) 2081*8kB (UME) 1823*16kB (UME) 1092*32kB (UME) 779*64kB (UME) 281*128kB (UME) 111*256kB (UME) 37*512kB (UME) 26*1024kB (UM) 13*2048kB (UM) 683*4096kB (UM) = 3069300kB [ 186.745971][ T4019] 36465 total pagecache pages [ 186.750904][ T4019] 0 pages in swap cache [ 186.755103][ T4019] Free swap = 124996kB [ 186.759624][ T4019] Total swap = 124996kB [ 186.763784][ T4019] 2097051 pages RAM [ 186.767587][ T4019] 0 pages HighMem/MovableOnly [ 186.782649][ T4019] 346816 pages reserved [ 186.793182][ T4019] 0 pages cma reserved [ 187.703540][ T4069] tap0: tun_chr_ioctl cmd 1074025677 [ 187.739923][ T4069] tap0: linktype set to 805 [ 187.805779][ T4069] GPL: port 1(erspan0) entered blocking state [ 187.812108][ T4069] GPL: port 1(erspan0) entered forwarding state [ 187.835549][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 188.005802][ T4085] device sit0 left promiscuous mode [ 188.080325][ T4085] device sit0 entered promiscuous mode [ 188.649718][ T4095] device sit0 left promiscuous mode [ 188.831725][ T4095] device sit0 entered promiscuous mode [ 189.004861][ T4117] FAULT_INJECTION: forcing a failure. [ 189.004861][ T4117] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 189.038480][ T4117] CPU: 1 PID: 4117 Comm: syz.4.1182 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 189.048334][ T4117] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 189.058407][ T4117] Call Trace: [ 189.061699][ T4117] [ 189.064721][ T4117] __dump_stack+0x21/0x24 [ 189.069067][ T4117] dump_stack_lvl+0xee/0x150 [ 189.073735][ T4117] ? __cfi_dump_stack_lvl+0x8/0x8 [ 189.078776][ T4117] ? memcpy+0x56/0x70 [ 189.082771][ T4117] dump_stack+0x15/0x24 [ 189.086946][ T4117] should_fail_ex+0x3d4/0x520 [ 189.091706][ T4117] should_fail+0xb/0x10 [ 189.095876][ T4117] should_fail_usercopy+0x1a/0x20 [ 189.100911][ T4117] _copy_to_user+0x1e/0x90 [ 189.105339][ T4117] bpf_verifier_vlog+0x179/0x390 [ 189.110289][ T4117] __btf_verifier_log+0xd1/0x120 [ 189.115239][ T4117] ? kasan_save_alloc_info+0x25/0x30 [ 189.120538][ T4117] ? __kasan_kmalloc+0x95/0xb0 [ 189.125475][ T4117] ? btf_check_sec_info+0x330/0x330 [ 189.130678][ T4117] ? kvmalloc_node+0x2bf/0x480 [ 189.135440][ T4117] ? memcpy+0x56/0x70 [ 189.139420][ T4117] btf_parse_hdr+0x37d/0x830 [ 189.144013][ T4117] btf_new_fd+0x38d/0x7d0 [ 189.148340][ T4117] bpf_btf_load+0x6f/0x90 [ 189.152669][ T4117] __sys_bpf+0x556/0x780 [ 189.156925][ T4117] ? bpf_link_show_fdinfo+0x320/0x320 [ 189.162392][ T4117] ? __cfi_ksys_write+0x10/0x10 [ 189.167238][ T4117] ? do_user_addr_fault+0x9ac/0x1050 [ 189.172521][ T4117] ? debug_smp_processor_id+0x17/0x20 [ 189.177892][ T4117] __x64_sys_bpf+0x7c/0x90 [ 189.182308][ T4117] x64_sys_call+0x488/0x9a0 [ 189.186809][ T4117] do_syscall_64+0x4c/0xa0 [ 189.191222][ T4117] ? clear_bhb_loop+0x15/0x70 [ 189.195997][ T4117] ? clear_bhb_loop+0x15/0x70 [ 189.200671][ T4117] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 189.206754][ T4117] RIP: 0033:0x7fc2b118e969 [ 189.211162][ T4117] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 189.230778][ T4117] RSP: 002b:00007fc2b2072038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 189.239274][ T4117] RAX: ffffffffffffffda RBX: 00007fc2b13b5fa0 RCX: 00007fc2b118e969 [ 189.247416][ T4117] RDX: 0000000000000020 RSI: 0000200000000380 RDI: 0000000000000012 [ 189.255383][ T4117] RBP: 00007fc2b2072090 R08: 0000000000000000 R09: 0000000000000000 [ 189.263358][ T4117] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 189.271329][ T4117] R13: 0000000000000001 R14: 00007fc2b13b5fa0 R15: 00007ffe94f0e618 [ 189.279301][ T4117] [ 189.523301][ T4129] device sit0 left promiscuous mode [ 189.601027][ T4132] device sit0 left promiscuous mode [ 189.617737][ T4133] device sit0 entered promiscuous mode [ 189.832998][ T4132] device sit0 entered promiscuous mode [ 190.325785][ T4155] GPL: port 1(erspan0) entered blocking state [ 190.332007][ T4155] GPL: port 1(erspan0) entered forwarding state [ 191.057178][ T4183] device sit0 left promiscuous mode [ 191.094439][ T4183] device sit0 entered promiscuous mode [ 191.202336][ T319] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 192.480588][ T4213] GPL: port 1(erspan0) entered disabled state [ 192.643113][ T4220] device sit0 left promiscuous mode [ 192.736180][ T4223] device sit0 entered promiscuous mode [ 194.541698][ T4280] device sit0 left promiscuous mode [ 194.599308][ T4282] device macsec0 entered promiscuous mode [ 194.608925][ T4283] device sit0 entered promiscuous mode [ 195.329744][ T4304] device wg2 entered promiscuous mode [ 195.429572][ T4313] device sit0 left promiscuous mode [ 195.531175][ T4313] device sit0 entered promiscuous mode [ 195.988871][ T4336] device sit0 left promiscuous mode [ 196.024511][ T4336] device sit0 entered promiscuous mode [ 197.122904][ T4367] device sit0 left promiscuous mode [ 197.246416][ T4370] device sit0 entered promiscuous mode [ 198.747215][ T4430] device wg2 left promiscuous mode [ 198.799678][ T4430] device wg2 entered promiscuous mode [ 198.839880][ T4434] device sit0 left promiscuous mode [ 199.162736][ T4452] device syzkaller0 entered promiscuous mode [ 199.240404][ T4436] device sit0 entered promiscuous mode [ 200.316567][ T4492] device sit0 left promiscuous mode [ 200.552573][ T4493] device sit0 entered promiscuous mode [ 201.358103][ T4505] device veth0_vlan left promiscuous mode [ 201.373821][ T4505] device veth0_vlan entered promiscuous mode [ 201.495372][ T4510] device sit0 left promiscuous mode [ 201.997578][ T4521] GPL: port 1(erspan0) entered blocking state [ 202.003914][ T4521] GPL: port 1(erspan0) entered forwarding state [ 202.357084][ T4532] device pim6reg1 entered promiscuous mode [ 202.506871][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 204.029159][ T4553] device sit0 left promiscuous mode [ 204.047245][ T4558] device sit0 left promiscuous mode [ 204.109064][ T4553] device sit0 entered promiscuous mode [ 204.203027][ T4555] device sit0 entered promiscuous mode [ 204.369197][ T4560] device veth0_vlan left promiscuous mode [ 204.386596][ T4560] device veth0_vlan entered promiscuous mode [ 204.446949][ T28] audit: type=1400 audit(1747363425.995:134): avc: denied { create } for pid=4567 comm="syz.2.1315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 204.766705][ T4574] device syzkaller0 entered promiscuous mode [ 204.786213][ T4578] device pim6reg1 entered promiscuous mode [ 206.068298][ T28] audit: type=1400 audit(1747363427.615:135): avc: denied { create } for pid=4630 comm="syz.3.1333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 208.743037][ T4692] GPL: port 1(erspan0) entered blocking state [ 208.749366][ T4692] GPL: port 1(erspan0) entered forwarding state [ 208.819291][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 208.842136][ T4694] device syzkaller0 entered promiscuous mode [ 209.064999][ T4705] FAULT_INJECTION: forcing a failure. [ 209.064999][ T4705] name failslab, interval 1, probability 0, space 0, times 0 [ 209.178846][ T4705] CPU: 0 PID: 4705 Comm: syz.1.1355 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 209.188692][ T4705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 209.198757][ T4705] Call Trace: [ 209.202032][ T4705] [ 209.204954][ T4705] __dump_stack+0x21/0x24 [ 209.209290][ T4705] dump_stack_lvl+0xee/0x150 [ 209.213877][ T4705] ? __cfi_dump_stack_lvl+0x8/0x8 [ 209.218898][ T4705] ? bpf_prog_test_run+0x3e3/0x630 [ 209.224008][ T4705] ? __x64_sys_bpf+0x7c/0x90 [ 209.228600][ T4705] ? x64_sys_call+0x488/0x9a0 [ 209.233277][ T4705] ? do_syscall_64+0x4c/0xa0 [ 209.237861][ T4705] dump_stack+0x15/0x24 [ 209.242013][ T4705] should_fail_ex+0x3d4/0x520 [ 209.247386][ T4705] __should_failslab+0xac/0xf0 [ 209.252151][ T4705] ? kvmalloc_node+0x294/0x480 [ 209.256913][ T4705] should_failslab+0x9/0x20 [ 209.261435][ T4705] __kmem_cache_alloc_node+0x3d/0x2c0 [ 209.266800][ T4705] ? kvmalloc_node+0x294/0x480 [ 209.271561][ T4705] __kmalloc_node+0xa1/0x1e0 [ 209.276148][ T4705] kvmalloc_node+0x294/0x480 [ 209.280735][ T4705] ? page_pool_create+0x70/0x620 [ 209.285672][ T4705] ? __cfi_kvmalloc_node+0x10/0x10 [ 209.290781][ T4705] ? kasan_save_alloc_info+0x25/0x30 [ 209.296152][ T4705] ? __kasan_kmalloc+0x95/0xb0 [ 209.300910][ T4705] ? page_pool_create+0x70/0x620 [ 209.305844][ T4705] ? memcpy+0x56/0x70 [ 209.309821][ T4705] page_pool_create+0x1fa/0x620 [ 209.314675][ T4705] bpf_test_run_xdp_live+0x1c6/0x1a00 [ 209.320044][ T4705] ? __cfi_mutex_unlock+0x10/0x10 [ 209.325154][ T4705] ? text_poke_copy+0x7b/0x90 [ 209.329824][ T4705] ? 0xffffffffa00040c0 [ 209.333967][ T4705] ? 0xffffffffa00040c0 [ 209.338109][ T4705] ? bpf_dispatcher_change_prog+0xb30/0xd80 [ 209.344173][ T4705] ? xdp_convert_md_to_buff+0x370/0x370 [ 209.349718][ T4705] ? __cfi_xdp_test_run_init_page+0x10/0x10 [ 209.355610][ T4705] ? __kasan_check_write+0x14/0x20 [ 209.360728][ T4705] ? _copy_from_user+0x8f/0xc0 [ 209.365486][ T4705] bpf_prog_test_run_xdp+0x6f1/0xe50 [ 209.370764][ T4705] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 209.376564][ T4705] ? __kasan_check_write+0x14/0x20 [ 209.381677][ T4705] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 209.387478][ T4705] bpf_prog_test_run+0x3e3/0x630 [ 209.392416][ T4705] ? slab_free_freelist_hook+0xc2/0x190 [ 209.397958][ T4705] ? bpf_prog_query+0x270/0x270 [ 209.402813][ T4705] ? selinux_bpf+0xce/0xf0 [ 209.407229][ T4705] ? security_bpf+0x93/0xb0 [ 209.411728][ T4705] __sys_bpf+0x56d/0x780 [ 209.416403][ T4705] ? bpf_link_show_fdinfo+0x320/0x320 [ 209.422038][ T4705] ? __cfi_ksys_write+0x10/0x10 [ 209.426889][ T4705] ? debug_smp_processor_id+0x17/0x20 [ 209.432255][ T4705] __x64_sys_bpf+0x7c/0x90 [ 209.436755][ T4705] x64_sys_call+0x488/0x9a0 [ 209.441264][ T4705] do_syscall_64+0x4c/0xa0 [ 209.445693][ T4705] ? clear_bhb_loop+0x15/0x70 [ 209.450366][ T4705] ? clear_bhb_loop+0x15/0x70 [ 209.455128][ T4705] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 209.461120][ T4705] RIP: 0033:0x7f85d898e969 [ 209.465529][ T4705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.485133][ T4705] RSP: 002b:00007f85d976c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 209.493548][ T4705] RAX: ffffffffffffffda RBX: 00007f85d8bb5fa0 RCX: 00007f85d898e969 [ 209.501600][ T4705] RDX: 0000000000000050 RSI: 0000200000000280 RDI: 000000000000000a [ 209.509568][ T4705] RBP: 00007f85d976c090 R08: 0000000000000000 R09: 0000000000000000 [ 209.517532][ T4705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 209.525495][ T4705] R13: 0000000000000000 R14: 00007f85d8bb5fa0 R15: 00007ffe2d71ee68 [ 209.533477][ T4705] [ 209.578856][ T4705] page_pool_create() gave up with errno -12 [ 209.673075][ T4700] device sit0 left promiscuous mode [ 209.759748][ T4699] device sit0 entered promiscuous mode [ 211.320913][ T4743] device veth0_vlan left promiscuous mode [ 211.438555][ T4743] device veth0_vlan entered promiscuous mode [ 211.448354][ T4755] FAULT_INJECTION: forcing a failure. [ 211.448354][ T4755] name failslab, interval 1, probability 0, space 0, times 0 [ 211.651313][ T4755] CPU: 1 PID: 4755 Comm: syz.0.1369 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 211.661251][ T4755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 211.671627][ T4755] Call Trace: [ 211.674914][ T4755] [ 211.677851][ T4755] __dump_stack+0x21/0x24 [ 211.682195][ T4755] dump_stack_lvl+0xee/0x150 [ 211.686981][ T4755] ? __cfi_dump_stack_lvl+0x8/0x8 [ 211.692022][ T4755] dump_stack+0x15/0x24 [ 211.696184][ T4755] should_fail_ex+0x3d4/0x520 [ 211.700866][ T4755] __should_failslab+0xac/0xf0 [ 211.705632][ T4755] should_failslab+0x9/0x20 [ 211.710152][ T4755] slab_pre_alloc_hook+0x30/0x1e0 [ 211.715188][ T4755] kmem_cache_alloc_lru+0x49/0x280 [ 211.720301][ T4755] ? __d_alloc+0x34/0x6c0 [ 211.724640][ T4755] __d_alloc+0x34/0x6c0 [ 211.728805][ T4755] ? alloc_file+0x4c2/0x640 [ 211.733314][ T4755] d_alloc_pseudo+0x1d/0x70 [ 211.737820][ T4755] alloc_file_pseudo+0xc8/0x1f0 [ 211.742683][ T4755] ? __cfi_alloc_file_pseudo+0x10/0x10 [ 211.748151][ T4755] sock_alloc_file+0xba/0x270 [ 211.752829][ T4755] __sys_socketpair+0x3a9/0x5b0 [ 211.757690][ T4755] __x64_sys_socketpair+0x9b/0xb0 [ 211.762724][ T4755] x64_sys_call+0x6e/0x9a0 [ 211.767143][ T4755] do_syscall_64+0x4c/0xa0 [ 211.771565][ T4755] ? clear_bhb_loop+0x15/0x70 [ 211.776246][ T4755] ? clear_bhb_loop+0x15/0x70 [ 211.780921][ T4755] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 211.786907][ T4755] RIP: 0033:0x7f625118e969 [ 211.791321][ T4755] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.811015][ T4755] RSP: 002b:00007f6251f40038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 211.819437][ T4755] RAX: ffffffffffffffda RBX: 00007f62513b5fa0 RCX: 00007f625118e969 [ 211.827470][ T4755] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 000000000000001e [ 211.835449][ T4755] RBP: 00007f6251f40090 R08: 0000000000000000 R09: 0000000000000000 [ 211.843421][ T4755] R10: 0000200000000940 R11: 0000000000000246 R12: 0000000000000002 [ 211.851397][ T4755] R13: 0000000000000000 R14: 00007f62513b5fa0 R15: 00007ffd903289f8 [ 211.859384][ T4755] [ 211.950882][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 211.980119][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 211.987710][ T355] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 212.160612][ T4757] device sit0 left promiscuous mode [ 212.254813][ T4761] device sit0 entered promiscuous mode [ 213.928718][ T4811] FAULT_INJECTION: forcing a failure. [ 213.928718][ T4811] name failslab, interval 1, probability 0, space 0, times 0 [ 213.953303][ T4811] CPU: 1 PID: 4811 Comm: syz.1.1384 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 213.963256][ T4811] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 213.973420][ T4811] Call Trace: [ 213.976723][ T4811] [ 213.979675][ T4811] __dump_stack+0x21/0x24 [ 213.984041][ T4811] dump_stack_lvl+0xee/0x150 [ 213.988671][ T4811] ? __cfi_dump_stack_lvl+0x8/0x8 [ 213.993740][ T4811] ? avc_has_perm_noaudit+0x2f4/0x460 [ 213.999142][ T4811] dump_stack+0x15/0x24 [ 214.003324][ T4811] should_fail_ex+0x3d4/0x520 [ 214.008044][ T4811] __should_failslab+0xac/0xf0 [ 214.012913][ T4811] ? find_css_set+0x920/0x1580 [ 214.017694][ T4811] should_failslab+0x9/0x20 [ 214.022223][ T4811] __kmem_cache_alloc_node+0x3d/0x2c0 [ 214.027610][ T4811] ? __cfi__raw_spin_lock_irq+0x10/0x10 [ 214.033178][ T4811] ? find_css_set+0x920/0x1580 [ 214.037956][ T4811] kmalloc_trace+0x29/0xb0 [ 214.042910][ T4811] find_css_set+0x920/0x1580 [ 214.047518][ T4811] ? memcpy+0x56/0x70 [ 214.051521][ T4811] ? cgroup_migrate_prepare_dst+0x910/0x910 [ 214.057432][ T4811] ? downgrade_write+0x350/0x350 [ 214.062395][ T4811] cgroup_migrate_prepare_dst+0xe0/0x910 [ 214.068044][ T4811] cgroup_attach_task+0x2ca/0x550 [ 214.073093][ T4811] ? __cfi_cgroup_attach_task+0x10/0x10 [ 214.078655][ T4811] ? cgroup_attach_permissions+0x27f/0x8a0 [ 214.084485][ T4811] ? __kasan_check_write+0x14/0x20 [ 214.089617][ T4811] ? revert_creds+0xb5/0x140 [ 214.094222][ T4811] __cgroup_procs_write+0x271/0x2d0 [ 214.099588][ T4811] cgroup_threads_write+0x24/0x50 [ 214.104646][ T4811] ? __cfi_cgroup_threads_write+0x10/0x10 [ 214.110396][ T4811] cgroup_file_write+0x2a7/0x580 [ 214.115361][ T4811] ? __cfi_cgroup_file_write+0x10/0x10 [ 214.120845][ T4811] ? mutex_lock+0x8d/0x1a0 [ 214.125281][ T4811] ? __cfi_mutex_lock+0x10/0x10 [ 214.130153][ T4811] ? __kasan_check_write+0x14/0x20 [ 214.135360][ T4811] kernfs_fop_write_iter+0x2d6/0x410 [ 214.140622][ T4811] ? __cfi_cgroup_file_write+0x10/0x10 [ 214.146059][ T4811] vfs_write+0x5db/0xca0 [ 214.150283][ T4811] ? slab_free_freelist_hook+0xc2/0x190 [ 214.155806][ T4811] ? __cfi_vfs_write+0x10/0x10 [ 214.160554][ T4811] ? __cfi_mutex_lock+0x10/0x10 [ 214.165380][ T4811] ? __fdget_pos+0x2cd/0x380 [ 214.169967][ T4811] ? ksys_write+0x71/0x240 [ 214.174356][ T4811] ksys_write+0x140/0x240 [ 214.178668][ T4811] ? __cfi_ksys_write+0x10/0x10 [ 214.183497][ T4811] ? debug_smp_processor_id+0x17/0x20 [ 214.188866][ T4811] __x64_sys_write+0x7b/0x90 [ 214.193456][ T4811] x64_sys_call+0x27b/0x9a0 [ 214.197961][ T4811] do_syscall_64+0x4c/0xa0 [ 214.202377][ T4811] ? clear_bhb_loop+0x15/0x70 [ 214.207045][ T4811] ? clear_bhb_loop+0x15/0x70 [ 214.211713][ T4811] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 214.217606][ T4811] RIP: 0033:0x7f85d898e969 [ 214.222026][ T4811] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.241710][ T4811] RSP: 002b:00007f85d976c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 214.250204][ T4811] RAX: ffffffffffffffda RBX: 00007f85d8bb5fa0 RCX: 00007f85d898e969 [ 214.258170][ T4811] RDX: 0000000000000012 RSI: 0000200000000c40 RDI: 0000000000000007 [ 214.266145][ T4811] RBP: 00007f85d976c090 R08: 0000000000000000 R09: 0000000000000000 [ 214.274114][ T4811] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 214.282078][ T4811] R13: 0000000000000000 R14: 00007f85d8bb5fa0 R15: 00007ffe2d71ee68 [ 214.290133][ T4811] [ 214.298682][ T4805] device pim6reg1 entered promiscuous mode [ 218.733372][ T4936] device sit0 left promiscuous mode [ 218.897490][ T4940] device sit0 entered promiscuous mode [ 219.538737][ T4948] device sit0 left promiscuous mode [ 219.724210][ T4960] device sit0 entered promiscuous mode [ 220.908275][ T5012] GPL: port 1(erspan0) entered blocking state [ 220.914725][ T5012] GPL: port 1(erspan0) entered forwarding state [ 220.940371][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 221.115748][ T28] audit: type=1400 audit(1747363442.665:136): avc: denied { ioctl } for pid=5018 comm="syz.2.1450" path="socket:[33691]" dev="sockfs" ino=33691 ioctlcmd=0x8929 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 222.669404][ T5060] device sit0 left promiscuous mode [ 222.834877][ T5065] device sit0 entered promiscuous mode [ 223.777957][ T5087] device wg2 left promiscuous mode [ 223.829481][ T28] audit: type=1400 audit(1747363445.385:137): avc: denied { create } for pid=5086 comm="syz.4.1471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 224.170729][ T5093] device pim6reg1 entered promiscuous mode [ 224.343374][ T5103] device sit0 left promiscuous mode [ 224.666741][ T5105] device sit0 left promiscuous mode [ 224.698403][ T5109] device sit0 entered promiscuous mode [ 225.074664][ T5108] device sit0 entered promiscuous mode [ 226.258815][ T5138] device syzkaller0 entered promiscuous mode [ 227.814216][ T5168] device sit0 left promiscuous mode [ 228.023719][ T5175] device sit0 entered promiscuous mode [ 228.687398][ T5189] device sit0 left promiscuous mode [ 228.817512][ T5189] device sit0 entered promiscuous mode [ 230.475633][ T5244] device sit0 left promiscuous mode [ 230.705252][ T5247] device sit0 entered promiscuous mode [ 230.925634][ T5251] device sit0 left promiscuous mode [ 231.037413][ T5253] device sit0 entered promiscuous mode [ 233.515783][ T5293] device sit0 left promiscuous mode [ 233.676496][ T5300] device sit0 entered promiscuous mode [ 235.617745][ T5336] FAULT_INJECTION: forcing a failure. [ 235.617745][ T5336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 235.633958][ T5336] CPU: 0 PID: 5336 Comm: syz.2.1549 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 235.643814][ T5336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 235.653892][ T5336] Call Trace: [ 235.657193][ T5336] [ 235.660155][ T5336] __dump_stack+0x21/0x24 [ 235.664625][ T5336] dump_stack_lvl+0xee/0x150 [ 235.669253][ T5336] ? __cfi_dump_stack_lvl+0x8/0x8 [ 235.674313][ T5336] ? __kmalloc_node+0xb2/0x1e0 [ 235.679108][ T5336] dump_stack+0x15/0x24 [ 235.683285][ T5336] should_fail_ex+0x3d4/0x520 [ 235.687978][ T5336] should_fail+0xb/0x10 [ 235.692244][ T5336] should_fail_usercopy+0x1a/0x20 [ 235.697285][ T5336] _copy_from_user+0x1e/0xc0 [ 235.701906][ T5336] generic_map_update_batch+0x458/0x780 [ 235.707471][ T5336] ? __cfi_generic_map_update_batch+0x10/0x10 [ 235.713565][ T5336] ? __fdget+0x19c/0x220 [ 235.717884][ T5336] ? __cfi_generic_map_update_batch+0x10/0x10 [ 235.724065][ T5336] bpf_map_do_batch+0x48c/0x620 [ 235.728945][ T5336] __sys_bpf+0x624/0x780 [ 235.733224][ T5336] ? bpf_link_show_fdinfo+0x320/0x320 [ 235.738630][ T5336] ? __cfi_ksys_write+0x10/0x10 [ 235.743501][ T5336] ? debug_smp_processor_id+0x17/0x20 [ 235.748894][ T5336] __x64_sys_bpf+0x7c/0x90 [ 235.753316][ T5336] x64_sys_call+0x488/0x9a0 [ 235.757816][ T5336] do_syscall_64+0x4c/0xa0 [ 235.762228][ T5336] ? clear_bhb_loop+0x15/0x70 [ 235.766899][ T5336] ? clear_bhb_loop+0x15/0x70 [ 235.771669][ T5336] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 235.777559][ T5336] RIP: 0033:0x7f46b818e969 [ 235.782142][ T5336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 235.801742][ T5336] RSP: 002b:00007f46b900b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 235.810153][ T5336] RAX: ffffffffffffffda RBX: 00007f46b83b5fa0 RCX: 00007f46b818e969 [ 235.818117][ T5336] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 235.826080][ T5336] RBP: 00007f46b900b090 R08: 0000000000000000 R09: 0000000000000000 [ 235.834132][ T5336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 235.842099][ T5336] R13: 0000000000000000 R14: 00007f46b83b5fa0 R15: 00007ffcb0228308 [ 235.850068][ T5336] [ 238.224509][ T5419] device sit0 left promiscuous mode [ 238.601539][ T5431] device sit0 left promiscuous mode [ 238.665002][ T5433] device veth1_to_bond entered promiscuous mode [ 239.282857][ T5452] device sit0 entered promiscuous mode [ 240.096156][ T5476] FAULT_INJECTION: forcing a failure. [ 240.096156][ T5476] name failslab, interval 1, probability 0, space 0, times 0 [ 240.133872][ T5475] device sit0 left promiscuous mode [ 240.139482][ T5476] CPU: 0 PID: 5476 Comm: syz.2.1593 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 240.149311][ T5476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 240.159384][ T5476] Call Trace: [ 240.162672][ T5476] [ 240.165614][ T5476] __dump_stack+0x21/0x24 [ 240.169963][ T5476] dump_stack_lvl+0xee/0x150 [ 240.174563][ T5476] ? __cfi_dump_stack_lvl+0x8/0x8 [ 240.179607][ T5476] dump_stack+0x15/0x24 [ 240.183777][ T5476] should_fail_ex+0x3d4/0x520 [ 240.188559][ T5476] ? copy_signal+0x54/0x630 [ 240.193076][ T5476] __should_failslab+0xac/0xf0 [ 240.197935][ T5476] should_failslab+0x9/0x20 [ 240.202448][ T5476] kmem_cache_alloc+0x3b/0x330 [ 240.207228][ T5476] copy_signal+0x54/0x630 [ 240.211657][ T5476] ? copy_process+0x1256/0x3470 [ 240.216521][ T5476] copy_process+0x1277/0x3470 [ 240.221220][ T5476] ? idle_dummy+0x10/0x10 [ 240.225567][ T5476] kernel_clone+0x23a/0x810 [ 240.230086][ T5476] ? __cfi_kernel_clone+0x10/0x10 [ 240.235125][ T5476] ? __kasan_check_write+0x14/0x20 [ 240.240265][ T5476] ? mutex_unlock+0x89/0x220 [ 240.244885][ T5476] __x64_sys_clone+0x168/0x1b0 [ 240.249674][ T5476] ? __cfi___x64_sys_clone+0x10/0x10 [ 240.254994][ T5476] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 240.261094][ T5476] x64_sys_call+0x990/0x9a0 [ 240.265613][ T5476] do_syscall_64+0x4c/0xa0 [ 240.270051][ T5476] ? clear_bhb_loop+0x15/0x70 [ 240.274744][ T5476] ? clear_bhb_loop+0x15/0x70 [ 240.279424][ T5476] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 240.285327][ T5476] RIP: 0033:0x7f46b818e969 [ 240.289740][ T5476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.309345][ T5476] RSP: 002b:00007f46b900afe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 240.317758][ T5476] RAX: ffffffffffffffda RBX: 00007f46b83b5fa0 RCX: 00007f46b818e969 [ 240.325898][ T5476] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 240.333876][ T5476] RBP: 00007f46b900b090 R08: 0000000000000000 R09: 0000000000000000 [ 240.341837][ T5476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.349807][ T5476] R13: 0000000000000000 R14: 00007f46b83b5fa0 R15: 00007ffcb0228308 [ 240.357774][ T5476] [ 240.773009][ T5503] device sit0 left promiscuous mode [ 240.897484][ T5503] device sit0 entered promiscuous mode [ 242.028010][ T5544] device sit0 left promiscuous mode [ 246.230873][ T5620] device sit0 entered promiscuous mode [ 250.026185][ T5718] device sit0 left promiscuous mode [ 250.602493][ T5718] device sit0 entered promiscuous mode [ 253.394337][ T5843] FAULT_INJECTION: forcing a failure. [ 253.394337][ T5843] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 253.550512][ T5843] CPU: 1 PID: 5843 Comm: syz.4.1715 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 253.560358][ T5843] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 253.570438][ T5843] Call Trace: [ 253.573737][ T5843] [ 253.576688][ T5843] __dump_stack+0x21/0x24 [ 253.581058][ T5843] dump_stack_lvl+0xee/0x150 [ 253.585683][ T5843] ? __cfi_dump_stack_lvl+0x8/0x8 [ 253.590741][ T5843] dump_stack+0x15/0x24 [ 253.594926][ T5843] should_fail_ex+0x3d4/0x520 [ 253.599639][ T5843] should_fail+0xb/0x10 [ 253.604349][ T5843] should_fail_usercopy+0x1a/0x20 [ 253.609419][ T5843] _copy_from_user+0x1e/0xc0 [ 253.614043][ T5843] bpf_prog_test_run_skb+0x286/0x1290 [ 253.619448][ T5843] ? __fget_files+0x2d5/0x330 [ 253.624159][ T5843] ? __cfi_bpf_prog_test_run_skb+0x10/0x10 [ 253.629988][ T5843] bpf_prog_test_run+0x3e3/0x630 [ 253.634942][ T5843] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 253.641128][ T5843] ? bpf_prog_query+0x270/0x270 [ 253.645998][ T5843] ? __sys_bpf+0x560/0x780 [ 253.650430][ T5843] __sys_bpf+0x56d/0x780 [ 253.654700][ T5843] ? bpf_link_show_fdinfo+0x320/0x320 [ 253.660192][ T5843] ? fput+0x3a/0x1a0 [ 253.664129][ T5843] ? __cfi_ksys_write+0x10/0x10 [ 253.669017][ T5843] ? debug_smp_processor_id+0x17/0x20 [ 253.674416][ T5843] __x64_sys_bpf+0x7c/0x90 [ 253.678854][ T5843] x64_sys_call+0x488/0x9a0 [ 253.683376][ T5843] do_syscall_64+0x4c/0xa0 [ 253.687823][ T5843] ? clear_bhb_loop+0x15/0x70 [ 253.692527][ T5843] ? clear_bhb_loop+0x15/0x70 [ 253.697234][ T5843] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 253.703172][ T5843] RIP: 0033:0x7fc2b118e969 [ 253.707615][ T5843] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 253.727945][ T5843] RSP: 002b:00007fc2b2072038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 253.736391][ T5843] RAX: ffffffffffffffda RBX: 00007fc2b13b5fa0 RCX: 00007fc2b118e969 [ 253.744386][ T5843] RDX: 0000000000000050 RSI: 0000200000000080 RDI: 000000000000000a [ 253.752384][ T5843] RBP: 00007fc2b2072090 R08: 0000000000000000 R09: 0000000000000000 [ 253.760379][ T5843] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 253.768369][ T5843] R13: 0000000000000000 R14: 00007fc2b13b5fa0 R15: 00007ffe94f0e618 [ 253.776389][ T5843] [ 253.822355][ T5846] device sit0 entered promiscuous mode [ 254.317452][ T5862] device sit0 left promiscuous mode [ 254.530343][ T5865] device sit0 entered promiscuous mode [ 257.349123][ T5959] FAULT_INJECTION: forcing a failure. [ 257.349123][ T5959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 257.365248][ T5959] CPU: 0 PID: 5959 Comm: syz.1.1752 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 257.375095][ T5959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 257.379646][ T5955] device sit0 entered promiscuous mode [ 257.385160][ T5959] Call Trace: [ 257.385177][ T5959] [ 257.385184][ T5959] __dump_stack+0x21/0x24 [ 257.385214][ T5959] dump_stack_lvl+0xee/0x150 [ 257.385237][ T5959] ? __cfi_dump_stack_lvl+0x8/0x8 [ 257.385259][ T5959] ? bpf_prog_test_run_xdp+0x359/0xe50 [ 257.416285][ T5959] ? __sys_bpf+0x56d/0x780 [ 257.420740][ T5959] ? __x64_sys_bpf+0x7c/0x90 [ 257.425350][ T5959] ? x64_sys_call+0x488/0x9a0 [ 257.430044][ T5959] ? entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 257.436409][ T5959] dump_stack+0x15/0x24 [ 257.440581][ T5959] should_fail_ex+0x3d4/0x520 [ 257.445268][ T5959] should_fail_alloc_page+0x61/0x90 [ 257.450658][ T5959] prepare_alloc_pages+0x148/0x5f0 [ 257.455775][ T5959] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 257.460975][ T5959] __alloc_pages+0x115/0x3a0 [ 257.465602][ T5959] ? __cfi___alloc_pages+0x10/0x10 [ 257.470798][ T5959] ? __kasan_check_write+0x14/0x20 [ 257.475922][ T5959] ? _copy_from_user+0x8f/0xc0 [ 257.480680][ T5959] ? bpf_test_init+0x141/0x160 [ 257.485437][ T5959] ? xdp_convert_md_to_buff+0x60/0x370 [ 257.490887][ T5959] bpf_prog_test_run_xdp+0xac4/0xe50 [ 257.496175][ T5959] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 257.501979][ T5959] ? __kasan_check_write+0x14/0x20 [ 257.507089][ T5959] ? __cfi_bpf_prog_test_run_xdp+0x10/0x10 [ 257.512889][ T5959] bpf_prog_test_run+0x3e3/0x630 [ 257.517827][ T5959] ? slab_free_freelist_hook+0xc2/0x190 [ 257.523379][ T5959] ? bpf_prog_query+0x270/0x270 [ 257.528227][ T5959] ? selinux_bpf+0xce/0xf0 [ 257.532644][ T5959] ? security_bpf+0x93/0xb0 [ 257.537144][ T5959] __sys_bpf+0x56d/0x780 [ 257.541390][ T5959] ? bpf_link_show_fdinfo+0x320/0x320 [ 257.546764][ T5959] ? __cfi_ksys_write+0x10/0x10 [ 257.551622][ T5959] ? debug_smp_processor_id+0x17/0x20 [ 257.556989][ T5959] __x64_sys_bpf+0x7c/0x90 [ 257.561402][ T5959] x64_sys_call+0x488/0x9a0 [ 257.565904][ T5959] do_syscall_64+0x4c/0xa0 [ 257.570323][ T5959] ? clear_bhb_loop+0x15/0x70 [ 257.575004][ T5959] ? clear_bhb_loop+0x15/0x70 [ 257.579679][ T5959] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 257.585576][ T5959] RIP: 0033:0x7f85d898e969 [ 257.589983][ T5959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 257.609581][ T5959] RSP: 002b:00007f85d976c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 257.618007][ T5959] RAX: ffffffffffffffda RBX: 00007f85d8bb5fa0 RCX: 00007f85d898e969 [ 257.625969][ T5959] RDX: 0000000000000024 RSI: 0000200000000200 RDI: 000000000000000a [ 257.633935][ T5959] RBP: 00007f85d976c090 R08: 0000000000000000 R09: 0000000000000000 [ 257.641901][ T5959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 257.650128][ T5959] R13: 0000000000000000 R14: 00007f85d8bb5fa0 R15: 00007ffe2d71ee68 [ 257.658098][ T5959] [ 257.766749][ T5965] FAULT_INJECTION: forcing a failure. [ 257.766749][ T5965] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 257.915397][ T5957] GPL: port 1(erspan0) entered disabled state [ 257.921023][ T5965] CPU: 0 PID: 5965 Comm: syz.1.1754 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 257.931392][ T5965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 257.941643][ T5965] Call Trace: [ 257.944933][ T5965] [ 257.947882][ T5965] __dump_stack+0x21/0x24 [ 257.952291][ T5965] dump_stack_lvl+0xee/0x150 [ 257.956912][ T5965] ? __cfi_dump_stack_lvl+0x8/0x8 [ 257.961972][ T5965] ? __get_user_nocheck_8+0x6/0x13 [ 257.967278][ T5965] dump_stack+0x15/0x24 [ 257.971459][ T5965] should_fail_ex+0x3d4/0x520 [ 257.976157][ T5965] should_fail_alloc_page+0x61/0x90 [ 257.981372][ T5965] prepare_alloc_pages+0x148/0x5f0 [ 257.986501][ T5965] ? __alloc_pages_bulk+0x9c0/0x9c0 [ 257.991712][ T5965] __alloc_pages+0x115/0x3a0 [ 257.996309][ T5965] ? __cfi___alloc_pages+0x10/0x10 [ 258.001428][ T5965] ? percpu_counter_add_batch+0x13c/0x160 [ 258.007159][ T5965] __folio_alloc+0x12/0x40 [ 258.011587][ T5965] shmem_alloc_and_acct_folio+0x650/0x870 [ 258.017408][ T5965] ? shmem_replace_folio+0x590/0x590 [ 258.022708][ T5965] ? __sanitizer_cov_trace_switch+0x4/0xe0 [ 258.028521][ T5965] ? __filemap_get_folio+0x93e/0x980 [ 258.033821][ T5965] ? debug_smp_processor_id+0x17/0x20 [ 258.039805][ T5965] ? __cfi___filemap_get_folio+0x10/0x10 [ 258.045446][ T5965] ? perf_output_begin_forward+0x66a/0x900 [ 258.051262][ T5965] ? __kasan_check_write+0x14/0x20 [ 258.056391][ T5965] ? _raw_spin_lock+0x8e/0xe0 [ 258.061077][ T5965] ? __cfi__raw_spin_lock+0x10/0x10 [ 258.066282][ T5965] shmem_get_folio_gfp+0x119f/0x2230 [ 258.071588][ T5965] shmem_write_begin+0xea/0x2c0 [ 258.076468][ T5965] generic_perform_write+0x2f6/0x6d0 [ 258.081779][ T5965] ? file_update_time+0x2dd/0x340 [ 258.086818][ T5965] ? __cfi_generic_perform_write+0x10/0x10 [ 258.092626][ T5965] ? __cfi_file_update_time+0x10/0x10 [ 258.098003][ T5965] ? __cfi_perf_swevent_hrtimer+0x10/0x10 [ 258.103734][ T5965] __generic_file_write_iter+0x227/0x580 [ 258.109375][ T5965] ? __cfi___generic_file_write_iter+0x10/0x10 [ 258.115538][ T5965] ? rwsem_write_trylock+0x130/0x300 [ 258.120833][ T5965] ? sysvec_apic_timer_interrupt+0x64/0xc0 [ 258.126644][ T5965] ? generic_write_checks_count+0x3c6/0x4a0 [ 258.132539][ T5965] ? generic_write_checks+0xca/0x100 [ 258.137828][ T5965] generic_file_write_iter+0xae/0x310 [ 258.143199][ T5965] vfs_write+0x5db/0xca0 [ 258.147454][ T5965] ? __cfi_vfs_write+0x10/0x10 [ 258.152231][ T5965] ? __cfi_mutex_lock+0x10/0x10 [ 258.157099][ T5965] ? __fdget_pos+0x2cd/0x380 [ 258.161698][ T5965] ? ksys_write+0x71/0x240 [ 258.166294][ T5965] ksys_write+0x140/0x240 [ 258.170632][ T5965] ? __cfi_ksys_write+0x10/0x10 [ 258.175490][ T5965] __x64_sys_write+0x7b/0x90 [ 258.180087][ T5965] x64_sys_call+0x27b/0x9a0 [ 258.184596][ T5965] do_syscall_64+0x4c/0xa0 [ 258.189019][ T5965] ? clear_bhb_loop+0x15/0x70 [ 258.193701][ T5965] ? clear_bhb_loop+0x15/0x70 [ 258.198391][ T5965] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 258.204316][ T5965] RIP: 0033:0x7f85d898e969 [ 258.208744][ T5965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.228362][ T5965] RSP: 002b:00007f85d976c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 258.236792][ T5965] RAX: ffffffffffffffda RBX: 00007f85d8bb5fa0 RCX: 00007f85d898e969 [ 258.244768][ T5965] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000007 [ 258.252739][ T5965] RBP: 00007f85d976c090 R08: 0000000000000000 R09: 0000000000000000 [ 258.260802][ T5965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 258.268773][ T5965] R13: 0000000000000000 R14: 00007f85d8bb5fa0 R15: 00007ffe2d71ee68 [ 258.276761][ T5965] [ 258.503888][ T5981] FAULT_INJECTION: forcing a failure. [ 258.503888][ T5981] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 258.521698][ T5981] CPU: 0 PID: 5981 Comm: syz.4.1760 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 258.531539][ T5981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 258.541614][ T5981] Call Trace: [ 258.544909][ T5981] [ 258.547869][ T5981] __dump_stack+0x21/0x24 [ 258.552236][ T5981] dump_stack_lvl+0xee/0x150 [ 258.556857][ T5981] ? __cfi_dump_stack_lvl+0x8/0x8 [ 258.561911][ T5981] dump_stack+0x15/0x24 [ 258.566091][ T5981] should_fail_ex+0x3d4/0x520 [ 258.570771][ T5981] should_fail+0xb/0x10 [ 258.574934][ T5981] should_fail_usercopy+0x1a/0x20 [ 258.579974][ T5981] _copy_from_user+0x1e/0xc0 [ 258.584568][ T5981] ___sys_recvmsg+0x12b/0x510 [ 258.589254][ T5981] ? __sys_recvmsg+0x270/0x270 [ 258.594025][ T5981] ? security_file_permission+0x94/0xb0 [ 258.599572][ T5981] ? __fget_files+0x2d5/0x330 [ 258.604251][ T5981] ? __fdget+0x19c/0x220 [ 258.608494][ T5981] __x64_sys_recvmsg+0x1ed/0x2c0 [ 258.613445][ T5981] ? __cfi___x64_sys_recvmsg+0x10/0x10 [ 258.618916][ T5981] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 258.624982][ T5981] x64_sys_call+0x75/0x9a0 [ 258.629399][ T5981] do_syscall_64+0x4c/0xa0 [ 258.633904][ T5981] ? clear_bhb_loop+0x15/0x70 [ 258.638867][ T5981] ? clear_bhb_loop+0x15/0x70 [ 258.643536][ T5981] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 258.649429][ T5981] RIP: 0033:0x7fc2b118e969 [ 258.653848][ T5981] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 258.673561][ T5981] RSP: 002b:00007fc2b2072038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 258.682077][ T5981] RAX: ffffffffffffffda RBX: 00007fc2b13b5fa0 RCX: 00007fc2b118e969 [ 258.690052][ T5981] RDX: 0000000040002002 RSI: 0000200000000000 RDI: 0000000000000005 [ 258.698114][ T5981] RBP: 00007fc2b2072090 R08: 0000000000000000 R09: 0000000000000000 [ 258.706098][ T5981] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 258.714070][ T5981] R13: 0000000000000000 R14: 00007fc2b13b5fa0 R15: 00007ffe94f0e618 [ 258.722050][ T5981] [ 259.845240][ T6012] device sit0 left promiscuous mode [ 260.033634][ T6014] GPL: port 1(erspan0) entered disabled state [ 260.099349][ T6018] device sit0 entered promiscuous mode [ 260.368331][ T6031] device sit0 entered promiscuous mode [ 260.980307][ T6041] device syzkaller0 entered promiscuous mode [ 261.438752][ T6069] device sit0 left promiscuous mode [ 261.598158][ T6069] device sit0 entered promiscuous mode [ 262.173780][ T6086] device sit0 left promiscuous mode [ 262.248138][ T6089] device sit0 entered promiscuous mode [ 262.915668][ T6111] device sit0 left promiscuous mode [ 262.997786][ T6111] device sit0 entered promiscuous mode [ 263.306731][ T6109] bond_slave_1: mtu less than device minimum [ 263.380036][ T6120] device sit0 left promiscuous mode [ 263.560787][ T6127] device sit0 entered promiscuous mode [ 263.736111][ T6134] device sit0 left promiscuous mode [ 263.848928][ T6138] GPL: port 1(erspan0) entered blocking state [ 263.855236][ T6138] GPL: port 1(erspan0) entered forwarding state [ 263.884135][ T6134] device sit0 entered promiscuous mode [ 264.032833][ T452] IPv6: ADDRCONF(NETDEV_CHANGE): GPL: link becomes ready [ 265.246636][ T6191] device sit0 left promiscuous mode [ 265.427415][ T6191] device sit0 entered promiscuous mode [ 266.683905][ T6219] device sit0 left promiscuous mode [ 266.839748][ T6219] device sit0 entered promiscuous mode [ 267.961953][ T6254] device sit0 left promiscuous mode [ 268.043267][ T6258] device sit0 entered promiscuous mode [ 274.349422][ T6374] device sit0 left promiscuous mode [ 274.568343][ T6376] device sit0 entered promiscuous mode [ 274.824463][ T6378] device sit0 left promiscuous mode [ 274.946818][ T6379] device sit0 entered promiscuous mode [ 279.725440][ T6505] FAULT_INJECTION: forcing a failure. [ 279.725440][ T6505] name failslab, interval 1, probability 0, space 0, times 0 [ 279.766612][ T6505] CPU: 1 PID: 6505 Comm: syz.2.1925 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 279.776547][ T6505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 279.786617][ T6505] Call Trace: [ 279.789909][ T6505] [ 279.792846][ T6505] __dump_stack+0x21/0x24 [ 279.797194][ T6505] dump_stack_lvl+0xee/0x150 [ 279.801814][ T6505] ? __cfi_dump_stack_lvl+0x8/0x8 [ 279.806850][ T6505] dump_stack+0x15/0x24 [ 279.811020][ T6505] should_fail_ex+0x3d4/0x520 [ 279.815723][ T6505] __should_failslab+0xac/0xf0 [ 279.820515][ T6505] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 279.826522][ T6505] should_failslab+0x9/0x20 [ 279.831047][ T6505] __kmem_cache_alloc_node+0x3d/0x2c0 [ 279.836433][ T6505] ? __cfi_mutex_lock+0x10/0x10 [ 279.841303][ T6505] ? tracepoint_probe_unregister+0x1e6/0x8b0 [ 279.847298][ T6505] __kmalloc+0xa1/0x1e0 [ 279.851482][ T6505] ? __kasan_check_write+0x14/0x20 [ 279.856612][ T6505] ? __cfi_perf_trace_percpu_alloc_percpu+0x10/0x10 [ 279.863227][ T6505] tracepoint_probe_unregister+0x1e6/0x8b0 [ 279.869051][ T6505] trace_event_reg+0x21c/0x260 [ 279.873836][ T6505] perf_trace_event_unreg+0xcc/0x1c0 [ 279.879142][ T6505] perf_trace_destroy+0xbe/0x180 [ 279.884094][ T6505] tp_perf_event_destroy+0x15/0x20 [ 279.889215][ T6505] ? __cfi_tp_perf_event_destroy+0x10/0x10 [ 279.895026][ T6505] _free_event+0x9cd/0xce0 [ 279.899545][ T6505] perf_event_release_kernel+0x819/0x8a0 [ 279.905204][ T6505] ? __cfi_perf_event_release_kernel+0x10/0x10 [ 279.911559][ T6505] perf_release+0x3b/0x40 [ 279.915916][ T6505] ? __cfi_perf_release+0x10/0x10 [ 279.920957][ T6505] __fput+0x1fc/0x8f0 [ 279.924956][ T6505] ____fput+0x15/0x20 [ 279.929086][ T6505] task_work_run+0x1db/0x240 [ 279.933688][ T6505] ? __cfi_task_work_run+0x10/0x10 [ 279.938811][ T6505] ? filp_close+0x111/0x160 [ 279.943327][ T6505] exit_to_user_mode_loop+0x9b/0xb0 [ 279.948542][ T6505] exit_to_user_mode_prepare+0x5a/0xa0 [ 279.954009][ T6505] syscall_exit_to_user_mode+0x1a/0x30 [ 279.959486][ T6505] do_syscall_64+0x58/0xa0 [ 279.963918][ T6505] ? clear_bhb_loop+0x15/0x70 [ 279.968784][ T6505] ? clear_bhb_loop+0x15/0x70 [ 279.973471][ T6505] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 279.979382][ T6505] RIP: 0033:0x7f46b818e969 [ 279.983978][ T6505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.003594][ T6505] RSP: 002b:00007f46b900b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 280.012205][ T6505] RAX: 0000000000000000 RBX: 00007f46b83b5fa0 RCX: 00007f46b818e969 [ 280.020189][ T6505] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 280.028172][ T6505] RBP: 00007f46b900b090 R08: 0000000000000000 R09: 0000000000000000 [ 280.036409][ T6505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 280.044393][ T6505] R13: 0000000000000000 R14: 00007f46b83b5fa0 R15: 00007ffcb0228308 [ 280.052376][ T6505] [ 280.145444][ T6512] CFI failure at __traceiter_percpu_alloc_percpu+0xb3/0x110 (target: 0xffffc90000ccf9b0; expected type: 0x42e72b63) [ 280.145996][ T6506] CFI failure at __traceiter_percpu_alloc_percpu+0xb3/0x110 (target: 0xffffc9000dd07930; expected type: 0x42e72b63) [ 280.157750][ T6512] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 280.175949][ T6512] CPU: 1 PID: 6512 Comm: syz.1.1926 Not tainted 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 280.185730][ T6512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 280.195768][ T6512] RIP: 0010:__traceiter_percpu_alloc_percpu+0xb3/0x110 [ 280.202594][ T6512] Code: d4 44 89 e9 4c 8b 45 c0 4c 8b 4d b8 8b 45 30 50 ff 75 28 ff 75 20 8b 45 18 50 ff 75 10 41 ba 9d d4 18 bd 45 03 54 24 fc 74 02 <0f> 0b 41 ff d4 48 83 c4 28 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 [ 280.222791][ T6512] RSP: 0018:ffffc90000ccf9b0 EFLAGS: 00010a17 [ 280.228837][ T6512] RAX: 00000000000c8000 RBX: ffff8881336c0c10 RCX: 0000000000000000 [ 280.236779][ T6512] RDX: 0000000000000000 RSI: ffffffff81a45b25 RDI: ffffffff87053360 [ 280.244735][ T6512] RBP: ffffc90000ccfa20 R08: 0000000000008000 R09: 0000000000000008 [ 280.252710][ T6512] R10: 0000000062593ba9 R11: 1ffffffff0ee43fd R12: ffffffff81710320 [ 280.260653][ T6512] R13: 0000000000000000 R14: ffff8881336c0c10 R15: dffffc0000000000 [ 280.268689][ T6512] FS: 00007f85d976c6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 280.277619][ T6512] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 280.284193][ T6512] CR2: 0000000000000000 CR3: 00000001335f1000 CR4: 00000000003506a0 [ 280.292588][ T6512] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 280.300571][ T6512] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 280.308536][ T6512] Call Trace: [ 280.311808][ T6512] [ 280.314721][ T6512] ? __alloc_percpu_gfp+0x25/0x30 [ 280.319737][ T6512] ? __alloc_percpu_gfp+0x25/0x30 [ 280.324840][ T6512] pcpu_alloc+0x1566/0x16b0 [ 280.329322][ T6512] __alloc_percpu_gfp+0x25/0x30 [ 280.334236][ T6512] bpf_map_alloc_percpu+0xc0/0x2b0 [ 280.339318][ T6512] prealloc_init+0x24e/0x8f0 [ 280.343882][ T6512] htab_map_alloc+0xb24/0xfd0 [ 280.348539][ T6512] map_create+0x49c/0xd80 [ 280.352865][ T6512] __sys_bpf+0x30b/0x780 [ 280.357096][ T6512] ? bpf_link_show_fdinfo+0x320/0x320 [ 280.362452][ T6512] ? up_read+0x56/0x1d0 [ 280.366675][ T6512] ? do_user_addr_fault+0x9ac/0x1050 [ 280.371951][ T6512] ? debug_smp_processor_id+0x17/0x20 [ 280.377301][ T6512] __x64_sys_bpf+0x7c/0x90 [ 280.381714][ T6512] x64_sys_call+0x488/0x9a0 [ 280.386300][ T6512] do_syscall_64+0x4c/0xa0 [ 280.390705][ T6512] ? clear_bhb_loop+0x15/0x70 [ 280.395367][ T6512] ? clear_bhb_loop+0x15/0x70 [ 280.400012][ T6512] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 280.405880][ T6512] RIP: 0033:0x7f85d898e969 [ 280.410271][ T6512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.429955][ T6512] RSP: 002b:00007f85d976c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 280.438357][ T6512] RAX: ffffffffffffffda RBX: 00007f85d8bb5fa0 RCX: 00007f85d898e969 [ 280.446324][ T6512] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 280.454290][ T6512] RBP: 00007f85d8a10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 280.462251][ T6512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 280.470294][ T6512] R13: 0000000000000001 R14: 00007f85d8bb5fa0 R15: 00007ffe2d71ee68 [ 280.478254][ T6512] [ 280.481273][ T6512] Modules linked in: [ 280.485196][ T6506] invalid opcode: 0000 [#2] PREEMPT SMP KASAN [ 280.485770][ T6512] ---[ end trace 0000000000000000 ]--- [ 280.491275][ T6506] CPU: 0 PID: 6506 Comm: syz.3.1924 Tainted: G D 6.1.134-syzkaller-00015-g218e2bd24587 #0 [ 280.491298][ T6506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 280.491309][ T6506] RIP: 0010:__traceiter_percpu_alloc_percpu+0xb3/0x110 [ 280.491343][ T6506] Code: d4 44 89 e9 4c 8b 45 c0 4c 8b 4d b8 8b 45 30 50 ff 75 28 ff 75 20 8b 45 18 50 ff 75 10 41 ba 9d d4 18 bd 45 03 54 24 fc 74 02 <0f> 0b 41 ff d4 48 83 c4 28 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 [ 280.491359][ T6506] RSP: 0018:ffffc9000dd07930 EFLAGS: 00010a17 [ 280.491378][ T6506] RAX: 000000000001bb0c RBX: ffff8881336c0c10 RCX: 0000000000000000 [ 280.496822][ T6512] RIP: 0010:__traceiter_percpu_alloc_percpu+0xb3/0x110 [ 280.508442][ T6506] RDX: 0000000000000000 RSI: ffffffff81a45b25 RDI: ffffffff87053360 [ 280.508458][ T6506] RBP: ffffc9000dd079a0 R08: 0000000000000004 R09: 0000000000000004 [ 280.508470][ T6506] R10: 0000000062593ba9 R11: 1ffffffff0ee43fd R12: ffffffff81710320 [ 280.508482][ T6506] R13: 0000000000000000 R14: ffff8881336c0c10 R15: dffffc0000000000 [ 280.518575][ T6512] Code: d4 44 89 e9 4c 8b 45 c0 4c 8b 4d b8 8b 45 30 50 ff 75 28 ff 75 20 8b 45 18 50 ff 75 10 41 ba 9d d4 18 bd 45 03 54 24 fc 74 02 <0f> 0b 41 ff d4 48 83 c4 28 48 83 c3 18 48 89 d8 48 c1 e8 03 42 80 [ 280.525365][ T6506] FS: 00007f902372f6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 280.525385][ T6506] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 280.545040][ T6512] RSP: 0018:ffffc90000ccf9b0 EFLAGS: 00010a17 [ 280.551069][ T6506] CR2: 0000000000000000 CR3: 00000001109fa000 CR4: 00000000003506b0 [ 280.551092][ T6506] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 280.559074][ T6512] [ 280.565894][ T6506] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 280.565909][ T6506] Call Trace: [ 280.573893][ T6512] RAX: 00000000000c8000 RBX: ffff8881336c0c10 RCX: 0000000000000000 [ 280.581912][ T6506] [ 280.581924][ T6506] ? __alloc_percpu_gfp+0x25/0x30 [ 280.589996][ T6512] RDX: 0000000000000000 RSI: ffffffff81a45b25 RDI: ffffffff87053360 [ 280.597955][ T6506] ? __alloc_percpu_gfp+0x25/0x30 [ 280.617688][ T6512] RBP: ffffc90000ccfa20 R08: 0000000000008000 R09: 0000000000000008 [ 280.626574][ T6506] pcpu_alloc+0x1566/0x16b0 [ 280.626615][ T6506] __alloc_percpu_gfp+0x25/0x30 [ 280.633227][ T6512] R10: 0000000062593ba9 R11: 1ffffffff0ee43fd R12: ffffffff81710320 [ 280.639334][ T6506] bpf_prog_alloc_no_stats+0xc3/0x3f0 [ 280.647302][ T6512] R13: 0000000000000000 R14: ffff8881336c0c10 R15: dffffc0000000000 [ 280.655434][ T6506] ? security_capable+0x99/0xc0 [ 280.657779][ T6512] FS: 00007f85d976c6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 280.665772][ T6506] bpf_prog_alloc+0x22/0x1c0 [ 280.669063][ T6512] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 280.677015][ T6506] bpf_prog_load+0x7c6/0x15a0 [ 280.679961][ T6512] CR2: 0000000000000000 CR3: 00000001335f1000 CR4: 00000000003506a0 [ 280.684951][ T6506] ? map_freeze+0x390/0x390 [ 280.692937][ T6512] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 280.697915][ T6506] ? selinux_bpf+0xc7/0xf0 [ 280.705892][ T6512] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 280.710357][ T6506] ? security_bpf+0x93/0xb0 [ 280.710381][ T6506] __sys_bpf+0x504/0x780 [ 280.715207][ T6512] Kernel panic - not syncing: Fatal exception [ 280.723173][ T6506] ? bpf_link_show_fdinfo+0x320/0x320 [ 280.723203][ T6506] ? fpregs_restore_userregs+0x128/0x260 [ 280.723222][ T6506] __x64_sys_bpf+0x7c/0x90 [ 280.723243][ T6506] x64_sys_call+0x488/0x9a0 [ 280.723262][ T6506] do_syscall_64+0x4c/0xa0 [ 280.723283][ T6506] ? clear_bhb_loop+0x15/0x70 [ 280.723298][ T6506] ? clear_bhb_loop+0x15/0x70 [ 280.723313][ T6506] entry_SYSCALL_64_after_hwframe+0x68/0xd2 [ 280.723337][ T6506] RIP: 0033:0x7f902298e969 [ 280.723352][ T6506] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 280.723366][ T6506] RSP: 002b:00007f902372f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 280.723384][ T6506] RAX: ffffffffffffffda RBX: 00007f9022bb6080 RCX: 00007f902298e969 [ 280.723396][ T6506] RDX: 0000000000000094 RSI: 00002000000004c0 RDI: 0000000000000005 [ 280.723407][ T6506] RBP: 00007f9022a10ab1 R08: 0000000000000000 R09: 0000000000000000 [ 280.723419][ T6506] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 280.723429][ T6506] R13: 0000000000000000 R14: 00007f9022bb6080 R15: 00007fff0de6f138 [ 280.723444][ T6506] [ 280.723449][ T6506] Modules linked in: [ 280.729096][ T6512] Kernel Offset: disabled [ 280.937009][ T6512] Rebooting in 86400 seconds..